What should you recommend?
HOTSPOT You need to recommend a SIEM and SOAR strategy that meets the hybrid requirements, the Microsoft Sentinel requirements, and the regulatory compliance requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Segment...
What should you use to evaluate the components?
HOTSPOT You have a Microsoft 365 E5 subscription and an Azure subscripts. You need to evaluate the existing environment to increase the overall security posture for the following components: • Windows 11 devices managed by Microsoft Intune • Azure Storage accounts • Azure virtual machines What should you use to...
What should you recommend?
HOTSPOT You need to recommend a solution to evaluate regulatory compliance across the entire managed environment. The solution must meet the regulatory compliance requirements and the business requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point....
To meet the application security requirements, which two authentication methods must the applications support?
Topic 2, Litware, inc. Case Study 2 Overview Litware, inc. is a financial services company that has main offices in New York and San Francisco. litware has 30 branch offices and remote employees across the United States. The remote employees connect to the main offices by using a VPN. Litware...
Which two configurations should you include in the recommendation?
You are planning the security requirements for Azure Cosmos DB Core (SQL) API accounts. You need to recommend a solution to audit all users that access the data in the Azure Cosmos DB accounts. Which two configurations should you include in the recommendation? Each correct answer presents part of the...
What should you include in the recommendation?
Your company has a Microsoft 365 E5 subscription. The company wants to identify and classify data in Microsoft Teams, SharePoint Online, and Exchange Online. You need to recommend a solution to identify documents that contain sensitive information. What should you include in the recommendation?A . data classification content explorerB ....
Where should you integrate code scanning for each phase?
HOTSPOT Your company has an Azure App Service plan that is used to deploy containerized web apps. You are designing a secure DevOps strategy for deploying the web apps to the App Service plan. You need to recommend a strategy to integrate code scanning tools into a secure software development...
What should you use?
You have an Azure subscription that has Microsoft Defender for Cloud enabled. You need to enforce ISO 2700V2013 standards for the subscription. The solution must ensure that noncompliant resources are remediated automatically What should you use?A . the regulatory compliance dashboard in Defender for CloudB . Azure PolicyC . Azure...
After remediating the threat which policy definition should you assign to prevent the threat from reoccurring?
You receive a security alert in Microsoft Defender for Cloud as shown in the exhibit. (Click the Exhibit tab.) After remediating the threat which policy definition should you assign to prevent the threat from reoccurring?A . Storage account public access should be disallowedB . Azure Key Vault Managed HSM should...
Which identity service should you include in the recommendation?
You have an on-premises network that has several legacy applications. The applications perform LDAP queries against an existing directory service. You are migrating the on-premises infrastructure to a cloud-only infrastructure. You need to recommend an identity solution for the infrastructure that supports the legacy applications. The solution must minimize the...