Which three actions should you recommend?

Your company has an on-premise network in Seattle and an Azure subscription. The on-premises network contains a Remote Desktop server. The company contracts a third-party development firm from France to develop and deploy resources to the virtual machines hosted in the Azure subscription. Currently, the firm establishes an RDP connection...

September 24, 2024 No Comments READ MORE +

After remediating the threat which policy definition should you assign to prevent the threat from reoccurring?

You receive a security alert in Microsoft Defender for Cloud as shown in the exhibit. (Click the Exhibit tab.) After remediating the threat which policy definition should you assign to prevent the threat from reoccurring?A . Storage account public access should be disallowedB . Azure Key Vault Managed HSM should...

September 23, 2024 No Comments READ MORE +

What should you recommend using to prevent the PHI from being shared outside the company?

Your company has a Microsoft 365 E5 subscription. Users use Microsoft Teams, Exchange Online, SharePoint Online, and OneDrive for sharing and collaborating. The company identifies protected health information (PHI) within stored documents and communications. What should you recommend using to prevent the PHI from being shared outside the company?A ....

September 23, 2024 No Comments READ MORE +

What should you recommend?

Your company finalizes the adoption of Azure and is implementing Microsoft Defender for Cloud. You receive the following recommendations in Defender for Cloud • Access to storage accounts with firewall and virtual network configurations should be restricted, • Storage accounts should restrict network access using virtual network rules. • Storage...

September 23, 2024 No Comments READ MORE +

What should you use to evaluate the components?

HOTSPOT You have a Microsoft 365 E5 subscription and an Azure subscripts. You need to evaluate the existing environment to increase the overall security posture for the following components: • Windows 11 devices managed by Microsoft Intune • Azure Storage accounts • Azure virtual machines What should you use to...

September 21, 2024 No Comments READ MORE +

What should you include in the recommendation?

Your company has a hybrid cloud infrastructure that contains an on-premises Active Directory Domain Services (AD DS) forest, a Microsoft B65 subscription, and an Azure subscription. The company's on-premises network contains internal web apps that use Kerberos authentication. Currently, the web apps are accessible only from the network. You have...

September 20, 2024 No Comments READ MORE +

What should you include in the solution?

HOTSPOT Your company uses Microsoft Defender for Cloud and Microsoft Sentinel. The company is designing an application that will have the architecture shown in the following exhibit. You are designing a logging and auditing solution for the proposed architecture. The solution must meet the following requirements: • Integrate Azure Web...

September 20, 2024 No Comments READ MORE +

Which identity service should you include in the recommendation?

You have an on-premises network that has several legacy applications. The applications perform LDAP queries against an existing directory service. You are migrating the on-premises infrastructure to a cloud-only infrastructure. You need to recommend an identity solution for the infrastructure that supports the legacy applications. The solution must minimize the...

September 20, 2024 No Comments READ MORE +

What should you include in the recommendation?

Your company has an on-premises network and an Azure subscription. The company does NOT have a Site-to-Site VPN or an ExpressRoute connection to Azure. You are designing the security standards for Azure App Service web apps. The web apps will access Microsoft SQL Server databases on the network. You need...

September 19, 2024 No Comments READ MORE +

In which two environments can you use Defender for Containers to scan for known vulnerabilities?

You are designing the security standards for containerized applications onboarded to Azure. You are evaluating the use of Microsoft Defender for Containers. In which two environments can you use Defender for Containers to scan for known vulnerabilities? Each correct answer presents a complete solution. NOTE: Each correct selection is worth...

September 19, 2024 No Comments READ MORE +