To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . Security Assertion Markup Language (SAML) B. NTLMv2 C. certificate-based authentication D. KerberosView AnswerAnswer: A,D Explanation: https://docs.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-configure-single-sign-on-on-premises-apps https://docs.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-configure-single-sign-on-with-kcd https://docs.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-configure-custom-domain
What should you recommend?
Topic 1, Fabrikam, Inc Case Study 1 OverView Fabrikam, Inc. is an insurance company that has a main office in New York and a branch office in Paris. On-premises Environment The on-premises network contains a single Active Directory Domain Services (AD DS) domain named corp.fabrikam.com. Azure Environment Fabrikam has the...
Which type of diagram should you create?
Your company is developing a modern application that will run as an Azure App Service web app. You plan to perform threat modeling to identify potential security issues by using the Microsoft Threat Modeling Tool. Which type of diagram should you create?A . data flow B. system flow C. process...
What should you include in the recommendation?
HOTSPOT You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point. View AnswerAnswer: Explanation:
What should you include in the recommendation for each stage?
HOTSPOT You use Azure Pipelines with Azure Repos to implement continuous integration and continuous deployment (CI/CO) workflows. You need to recommend best practices to secure the stages of the CI/CD workflows based on the Microsoft Cloud Adoption Framework for Azure. What should you include in the recommendation for each stage?...
Does this meet the goal?
You are designing the encryption standards for data at rest for an Azure resource You need to provide recommendations to ensure that the data at rest is encrypted by using AES-256 keys. The solution must support rotating the encryption keys monthly. Solution: For Azure SQL databases, you recommend Transparent Data...
What should you recommend?
HOTSPOT You need to recommend a strategy for App Service web app connectivity. The solution must meet the landing zone requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: Virtual Network...
What should you configure for each landing zone?
You need to recommend a solution for securing the landing zones. The solution must meet the landing zone requirements and the business requirements. What should you configure for each landing zone?A . Azure DDoS Protection Standard B. an Azure Private DNS zone C. Microsoft Defender for Cloud D. an ExpressRoute...
What should you include in the recommendation?
You have an Azure AD tenant that syncs with an Active Directory Domain Services {AD DS) domain. Client computers run Windows and are hybrid-joined to Azure AD. You are designing a strategy to protect endpoints against ransomware. The strategy follows Microsoft Security Best Practices. You plan to remove all the...
What should you include in the recommendation?
You need to recommend a solution to secure the MedicalHistory data in the ClaimsDetail table. The solution must meet the Contoso developer requirements. What should you include in the recommendation?A . Transparent Data Encryption (TDE) B. Always Encrypted C. row-level security (RLS) D. dynamic data masking E. data classificationView AnswerAnswer:...