What should you recommend?
HOTSPOT You need to recommend an identity security solution for the Azure AD tenant of Litware. The solution must meet the identity requirements and the regulatory compliance requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point....
What should you include in the recommendation?
HOTSPOT You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point. View AnswerAnswer: Explanation:
What should you include in the recommendation?
Azure subscription that uses Azure Storage. The company plans to share specific blobs with vendors. You need to recommend a solution to provide the vendors with secure access to specific blobs without exposing the blobs publicly. The access must be tme-Vimted. What should you include in the recommendation?A . Create...
What should you recommend using to prevent the PHI from being shared outside the company?
Your company has a Microsoft 365 E5 subscription. Users use Microsoft Teams, Exchange Online, SharePoint Online, and OneDrive for sharing and collaborating. The company identifies protected health information (PHI) within stored documents and communications. What should you recommend using to prevent the PHI from being shared outside the company?A ....
What should you include in the solution?
HOTSPOT Your company uses Microsoft Defender for Cloud and Microsoft Sentinel. The company is designing an application that will have the architecture shown in the following exhibit. You are designing a logging and auditing solution for the proposed architecture. The solution must meet the following requirements-. • Integrate Azure Web...
Which two configurations meet the compliance and privacy requirements?
You are designing security for an Azure landing zone. Your company identifies the following compliance and privacy requirements: • Encrypt cardholder data by using encryption keys managed by the company. • Encrypt insurance claim files by using encryption keys hosted on-premises. Which two configurations meet the compliance and privacy requirements?...
After remediating the threat which policy definition should you assign to prevent the threat from reoccurring?
You receive a security alert in Microsoft Defender for Cloud as shown in the exhibit. (Click the Exhibit tab.) After remediating the threat which policy definition should you assign to prevent the threat from reoccurring?A . Storage account public access should be disallowedB . Azure Key Vault Managed HSM should...
Which two services should you leverage in the strategy?
You need to design a strategy for securing the SharePoint Online and Exchange Online data. The solution must meet the application security requirements. Which two services should you leverage in the strategy? Each correct answer presents part of the solution. NOTE; Each correct selection is worth one point.A . Azure...
What should you create in Azure AD to meet the Contoso developer requirements?
HOTSPOT What should you create in Azure AD to meet the Contoso developer requirements? View AnswerAnswer: Explanation: Box 1: A synced user account - Need to use a synched user account. Box 2: An access review https://docs.microsoft.com/en-us/azure/active-directory-domain-services/synchronization https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview
To meet the application security requirements, which two authentication methods must the applications support?
Topic 2, Litware, inc. Case Study 2 Overview Litware, inc. is a financial services company that has main offices in New York and San Francisco. litware has 30 branch offices and remote employees across the United States. The remote employees connect to the main offices by using a VPN. Litware...