Select the answer that correctly completes the sentence

HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/cloud-app-security/what-is-cloud-app-security

February 28, 2025 No Comments READ MORE +

Which security methodology does this represent?

You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure. Which security methodology does this represent?A . threat modelingB . identity as the security perimeterC . defense in depthD . the shared responsibility modelView AnswerAnswer: C Explanation: Reference: https://docs.microsoft.com/en-us/learn/modules/secure-network-connectivity-azure/2-what-is-defense-in-depth

February 26, 2025 No Comments READ MORE +

Select the answer that correctly completes the sentence

HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/azure/ddos-protection/ddos-protection-overview

February 25, 2025 No Comments READ MORE +

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point

HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: No Compliance Manager tracks Microsoft managed controls, customer-managed controls, and shared controls. Box 2: Yes Box 3: Yes Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager?view=o365-worldwide

February 25, 2025 No Comments READ MORE +

What is an example of encryption at rest?

What is an example of encryption at rest?A . encrypting communications by using a site-to-site VPNB . encrypting a virtual machine diskC . accessing a website by using an encrypted HTTPS connectionD . sending an encrypted emailView AnswerAnswer: B Explanation: Reference: https://docs.microsoft.com/en-us/azure/security/fundamentals/encryption-atrest

February 23, 2025 No Comments READ MORE +

Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for Standardization (ISO)?

Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for Standardization (ISO)?A . the Microsoft Endpoint Manager admin centerB . Azure Cost Management + BillingC . Microsoft Service Trust PortalD . the Azure Active Directory admin centerView AnswerAnswer: C Explanation: The...

February 23, 2025 No Comments READ MORE +

Select the answer that correctly completes the sentence

HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to enter a code on their cellphone or to provide a fingerprint scan. Reference: https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-mfa-howitworks

February 20, 2025 No Comments READ MORE +

Select the answer that correctly completes the sentence

HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/external-identities/what-is-b2b

February 18, 2025 No Comments READ MORE +

Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?

Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?A . conditional access policiesB . Azure AD Identity ProtectionC . Azure AD Privileged Identity Management (PIM)D . authentication method policiesView AnswerAnswer: C Explanation: Azure AD Privileged Identity Management (PIM) provides just-in-time...

February 14, 2025 No Comments READ MORE +

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point

HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: You can use an Azure network security group to filter network traffic to and from Azure resources in an Azure virtual network....

February 11, 2025 No Comments READ MORE +