What should you include in the recommendation?
You need to recommend a solution to meet the security requirements for the virtual machines. What should you include in the recommendation?A . an Azure Bastion hostB . a network security group (NSG)C . just-in-time (JIT) VM accessD . Azure Virtual DesktopView AnswerAnswer: A
Which two conditions must be met before endpoint users can access the corporate applications again?
A customer follows the Zero Trust model and explicitly verifies each attempt to access its corporate applications. The customer discovers that several endpoints are infected with malware. The customer suspends access attempts from the infected endpoints. The malware is removed from the end point. Which two conditions must be met...
What should you include in the recommendation?
Your company is developing a serverless application in Azure that will have the architecture shown in the following exhibit. You need to recommend a solution to isolate the compute components on an Azure virtual network. What should you include in the recommendation?A . Azure Active Directory (Azure AD) enterprise applicationsB...
What should you include in the recommendation?
Your company has on-premises Microsoft SQL Server databases. The company plans to move the databases to Azure. You need to recommend a secure architecture for the databases that will minimize operational requirements for patching and protect sensitive data by using dynamic data masking. The solution must minimize costs. What should...
What should you recommend?
HOTSPOT You need to recommend an identity security solution for the Azure AD tenant of Litware. The solution must meet the identity requirements and the regulatory compliance requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point....
What should you include in the recommendation?
Your company has the virtual machine infrastructure shown in the following table. The company plans to use Microsoft Azure Backup Server (MABS) to back up the virtual machines to Azure. You need to provide recommendations to increase the resiliency of the backup strategy to mitigate attacks such as ransomware. What...
Which two configurations can you include in the recommendation?
A customer has a hybrid cloud infrastructure that contains a Microsoft 365 E5 subscription and an Azure subscription. All the on-premises servers in the perimeter network are prevented from connecting directly to the internet. The customer recently recovered from a ransomware attack. The customer plans to deploy Microsoft Sentinel. You...
What should you use to delegate the access?
You need to recommend a solution to meet the security requirements for the InfraSec group. What should you use to delegate the access?A . a subscriptionB . a custom role-based access control (RBAC) roleC . a resource groupD . a management groupView AnswerAnswer: D
Which two configurations should you include in the recommendation?
Topic 3, Mix Questions You are planning the security requirements for Azure Cosmos DB Core (SQL) API accounts. You need to recommend a solution to audit all users that access the data in the Azure Cosmos DB accounts. Which two configurations should you include in the recommendation? Each correct answer...
What should you include in the recommendation?
You have a Microsoft 365 E5 subscription. You need to recommend a solution to add a watermark to email attachments that contain sensitive data. What should you include in the recommendation?A . Microsoft Defender for Cloud AppsB . insider risk managementC . Microsoft Information ProtectionD . Azure PurviewView AnswerAnswer: A