What should you recommend using for each requirement?
HOTSPOT You need to recommend a solution to meet the requirements for connections to ClaimsDB. What should you recommend using for each requirement? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:
What should you include in the recommendation?
HOTSPOT You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point. View AnswerAnswer: Explanation:
Which security level should you configure for each job role?
HOTSPOT You are planning the security levels for a security access strategy. You need to identify which job roles to configure at which security levels. The solution must meet security best practices of the Microsoft Cybersecurity Reference Architectures (MCRA). Which security level should you configure for each job role? To...
What should you recommend?
HOTSPOT You need to recommend a solution to evaluate regulatory compliance across the entire managed environment. The solution must meet the regulatory compliance requirements and the business requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point....
What should you include in the recommendation?
You need to recommend a solution to meet the security requirements for the virtual machines. What should you include in the recommendation?A . an Azure Bastion host B. a network security group (NSG) C. just-in-time (JIT) VM access D. Azure Virtual DesktopView AnswerAnswer: D Explanation: The security requirement this question...
What should you create in Azure AD to meet the Contoso developer requirements?
HOTSPOT What should you create in Azure AD to meet the Contoso developer requirements? View AnswerAnswer: Explanation: Box 1: A synced user account - Need to use a synched user account. Box 2: An access review https://docs.microsoft.com/en-us/azure/active-directory-domain-services/synchronization https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview
What should you include during the application design phase?
You are creating an application lifecycle management process based on the Microsoft Security Development Lifecycle (SDL). You need to recommend a security standard for onboarding applications to Azure. The standard will include recommendations for application design, development, and deployment What should you include during the application design phase?A . static...
In which two environments can you use Defender for Containers to scan for known vulnerabilities?
You are designing the security standards for containerized applications onboarded to Azure. You are evaluating the use of Microsoft Defender for Containers. In which two environments can you use Defender for Containers to scan for known vulnerabilities? Each correct answer presents a complete solution. NOTE: Each correct selection is worth...
What should you use to start the threat modeling process?
Your company plans to follow DevSecOps best practices of the Microsoft Cloud Adoption Framework for Azure. You need to perform threat modeling by using a top-down approach based on the Microsoft Cloud Adoption Framework for Azure. What should you use to start the threat modeling process?A . the STRIDE model...
What should you recommend using in Microsoft Sentinel?
You have a Microsoft 365 E5 subscription and an Azure subscription. You are designing a Microsoft Sentinel deployment. You need to recommend a solution for the security operations team. The solution must include custom views and a dashboard for analyzing security events. What should you recommend using in Microsoft Sentinel?A...