What should you include in the recommendation?

You need to recommend a solution to resolve the virtual machine issue. What should you include in the recommendation?A . Onboard the virtual machines to Microsoft Defender for Endpoint.B . Onboard the virtual machines to Azure Arc.C . Create a device compliance policy in Microsoft Endpoint Manager.D . Enable the...

August 13, 2022 No Comments READ MORE +

What should you recommend using for each requirement?

HOTSPOT You need to recommend a solution to meet the requirements for connections to ClaimsDB. What should you recommend using for each requirement? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

August 12, 2022 No Comments READ MORE +

Which two components should you include in the recommendation?

You have a Microsoft 365 E5 subscription. You are designing a solution to protect confidential data in Microsoft SharePoint Online sites that contain more than one million documents. You need to recommend a solution to prevent Personally Identifiable Information (Pll) from being shared. Which two components should you include in...

August 12, 2022 No Comments READ MORE +

Which service should you recommend to complete the design?

A customer uses Azure to develop a mobile app that will be consumed by external users as shown in the following exhibit. You need to design an identity strategy for the app. The solution must meet the following requirements: • Enable the usage of external IDs such as Google, Facebook,...

August 11, 2022 No Comments READ MORE +

Does this meet the goal?

Your on-premises network contains an e-commerce web app that was developed inAngular and Node.js. The web app uses a MongoDB database. You plan to migrate the web app to Azure. The solution architecture team proposes the following architecture as an Azure landing zone. You need to provide recommendations to secure...

August 11, 2022 No Comments READ MORE +

To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . Security Assertion Markup Language (SAML)B . NTLMv2C . certificate-based authenticationD . KerberosView AnswerAnswer: A,C

August 11, 2022 No Comments READ MORE +

Which two components can you use to achieve the goal?

You have Microsoft Defender for Cloud assigned to Azure management groups. You have a Microsoft Sentinel deployment. During the triage of alerts, you require additional information about the security events, including suggestions for remediation. Which two components can you use to achieve the goal? Each correct answer presents a complete...

August 10, 2022 No Comments READ MORE +

What should you recommend?

HOTSPOT You need to recommend a SIEM and SOAR strategy that meets the hybrid requirements, the Microsoft Sentinel requirements, and the regulatory compliance requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

August 10, 2022 No Comments READ MORE +

What should you recommend?

HOTSPOT You need to recommend a solution to meet the compliance requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

August 10, 2022 No Comments READ MORE +

What should you include in the solution?

You have a customer that has a Microsoft 365 subscription and an Azure subscription. The customer has devices that run either Windows, iOS, Android, or macOS. The Windows devices are deployed on-premises and in Azure. You need to design a security solution to assess whether all the devices meet the...

August 9, 2022 No Comments READ MORE +