For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Graphical user interface, text, application Description automatically generated
Match the types Of compliance score actions to the appropriate tasks
DRAG DROP Match the types Of compliance score actions to the appropriate tasks. To answer. drag the appropriate action type from the column on the left to its task on the right. Each type may be used once. more than once, or not at all. NOTE: Each correct match is...
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: No Phishing scams are external threats. Box 2: Yes Insider risk management is a compliance solution in Microsoft 365. Box...
Select the answer that correctly completes the sentence
HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: eDiscovery https://docs.microsoft.com/en-us/microsoft-365/compliance/ediscovery?view=o365-worldwide
In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . Plan B. Manage C. Adopt D. Govern E. Define StrategyView AnswerAnswer: A,E Explanation: Reference: https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/overview
To which type of resource can Azure Bastion provide secure access?
To which type of resource can Azure Bastion provide secure access?A . Azure Files B. Azure SQL Managed Instances C. Azure virtual machines D. Azure App ServiceView AnswerAnswer: C Explanation: Azure Bastion provides secure and seamless RDP/SSH connectivity to your virtual machines directly from the Azure portal over TLS. Reference:...
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Graphical user interface, text, application, email Description automatically generated
What can you use to provision Azure resources across multiple subscriptions in a consistent manner?
What can you use to provision Azure resources across multiple subscriptions in a consistent manner?A . Azure Defender B. Azure Blueprints C. Azure Sentinel D. Azure PolicyView AnswerAnswer: B Explanation: Reference: https://docs.microsoft.com/en-us/azure/governance/blueprints/overview
Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?
Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?A . conditional access policies B. Azure AD Identity Protection C. Azure AD Privileged Identity Management (PIM) D. authentication method policiesView AnswerAnswer: C Explanation: Azure AD Privileged Identity Management (PIM) provides just-in-time...
Select the answer that correctly completes the sentence
HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: playbooks https://docs.microsoft.com/en-us/azure/sentinel/tutorial-respond-threats-playbook