Does this meet the goal?

You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance. You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance. Solution: You recommend access restrictions to allow traffic from...

October 2, 2024 No Comments READ MORE +

What should you include in the recommendation for each activity?

DRAG DROP You have a Microsoft 365 subscription You need to recommend a security solution to monitor the following activities: • User accounts that were potentially compromised • Users performing bulk file downloads from Microsoft SharePoint Online What should you include in the recommendation for each activity? To answer, drag...

October 1, 2024 No Comments READ MORE +

What should you include in the recommendation?

You need to recommend a solution to scan the application code. The solution must meet the application development requirements. What should you include in the recommendation?A . Azure Key VaultB . GitHub Advanced SecurityC . Application Insights in Azure MonitorD . Azure DevTest LabsView AnswerAnswer: B Explanation: https://docs.microsoft.com/en-us/learn/modules/introduction-github-advanced-security/2-what-is-github-advanced-security

October 1, 2024 No Comments READ MORE +

Which two configurations meet the compliance and privacy requirements?

You are designing security for an Azure landing zone. Your company identifies the following compliance and privacy requirements: • Encrypt cardholder data by using encryption keys managed by the company. • Encrypt insurance claim files by using encryption keys hosted on-premises. Which two configurations meet the compliance and privacy requirements?...

October 1, 2024 No Comments READ MORE +

What should you include in the recommendation?

Your company has a third-party security information and event management (SIEM) solution that uses Splunk and Microsoft Sentinel. You plan to integrate Microsoft Sentinel with Splunk. You need to recommend a solution to send security events from Microsoft Sentinel to Splunk. What should you include in the recommendation?A . Azure...

September 30, 2024 No Comments READ MORE +

Does this meet the goal?

You have an Azure subscription that has Microsoft Defender for Cloud enabled. You are evaluating the Azure Security Benchmark V3 report. In the Secure management ports controls, you discover that you have 0 out of a potential 8 points. You need to recommend configurations to increase the score of the...

September 30, 2024 No Comments READ MORE +

What should you include in the recommendation?

Your company is designing an application architecture for Azure App Service Environment (ASE) web apps as shown in the exhibit. (Click the Exhibit tab.) Communication between the on-premises network and Azure uses an ExpressRoute connection. You need to recommend a solution to ensure that the web apps can communicate with...

September 30, 2024 No Comments READ MORE +

What should you include in the recommendation?

HOTSPOT You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point. View AnswerAnswer: Explanation:

September 30, 2024 No Comments READ MORE +

You have 50 Azure subscriptions.

You have 50 Azure subscriptions. You need to monitor resource in the subscriptions for compliance with the ISO 27001:2013 standards. The solution must minimize the effort required to modify the list of monitored policy definitions for the subscriptions. NOTE: Each correct selection is worth one point.A . Assign an initiative...

September 29, 2024 No Comments READ MORE +

What should you include in the recommendation?

Your company is developing a new Azure App Service web app. You are providing design assistance to verify the security of the web app. You need to recommend a solution to test the web app for vulnerabilities such as insecure server configurations, cross-site scripting (XSS), and SQL injection. What should...

September 29, 2024 No Comments READ MORE +