What should you include in the recommendation?

You need to recommend a solution to scan the application code. The solution must meet the application development requirements. What should you include in the recommendation?A . Azure Key VaultB . GitHub Advanced SecurityC . Application Insights in Azure MonitorD . Azure DevTest LabsView AnswerAnswer: B Explanation: https://docs.microsoft.com/en-us/learn/modules/introduction-github-advanced-security/2-what-is-github-advanced-security

September 27, 2023 No Comments READ MORE +

Which two services should you leverage in the strategy?

You need to design a strategy for securing the SharePoint Online and Exchange Online data. The solution must meet the application security requirements. Which two services should you leverage in the strategy? Each correct answer presents part of the solution. NOTE; Each correct selection is worth one point.A . Azure...

September 26, 2023 No Comments READ MORE +

What should you include in the recommendation?

HOTSPOT You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point. View AnswerAnswer: Explanation:

September 26, 2023 No Comments READ MORE +

What should you include in the recommendation for each activity?

DRAG DROP You have a Microsoft 365 subscription You need to recommend a security solution to monitor the following activities: • User accounts that were potentially compromised • Users performing bulk file downloads from Microsoft SharePoint Online What should you include in the recommendation for each activity? To answer, drag...

September 26, 2023 No Comments READ MORE +

Which two actions should you include in the solution?

You need to design a solution to provide administrators with secure remote access to the virtual machines. The solution must meet the following requirements: • Prevent the need to enable ports 3389 and 22 from the internet. • Only provide permission to connect the virtual machines when required. • Ensure...

September 25, 2023 No Comments READ MORE +

What should you include in the recommendation?

HOTSPOT You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point. View AnswerAnswer: Explanation:

September 25, 2023 No Comments READ MORE +

What should you include in the recommendation?

HOTSPOT You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point. View AnswerAnswer: Explanation:

September 25, 2023 No Comments READ MORE +

What should you recommend?

HOTSPOT You need to recommend a multi-tenant and hybrid security solution that meets to the business requirements and the hybrid requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

September 25, 2023 No Comments READ MORE +

Does this meet the goal?

You have an Azure subscription that has Microsoft Defender for Cloud enabled. You are evaluating the Azure Security Benchmark V3 report. In the Secure management ports controls, you discover that you have 0 out of a potential 8 points. You need to recommend configurations to increase the score of the...

September 25, 2023 No Comments READ MORE +

Which two configurations meet the compliance and privacy requirements?

You are designing security for an Azure landing zone. Your company identifies the following compliance and privacy requirements: • Encrypt cardholder data by using encryption keys managed by the company. • Encrypt insurance claim files by using encryption keys hosted on-premises. Which two configurations meet the compliance and privacy requirements?...

September 24, 2023 No Comments READ MORE +