What are three uses of Microsoft Cloud App Security? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
What are three uses of Microsoft Cloud App Security? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . to discover and control the use of shadow IT B. to provide secure connections to Azure virtual machines C. to protect sensitive information hosted anywhere...
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Graphical user interface, text, application, email Description automatically generated Box 1: No Azure Active Directory (Azure AD) is a cloud-based user identity...
Which service should you use to view your Azure secure score?
HOTSPOT Which service should you use to view your Azure secure score? To answer, select the appropriate service in the answer area. View AnswerAnswer: Explanation: Security Center
In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?
In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?A . the management of mobile devices B. the permissions for the user data stored in Azure C. the creation and management of user accounts D. the management of the physical hardwareView AnswerAnswer: D
Which two types of resources can be protected by using Azure Firewall? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
Which two types of resources can be protected by using Azure Firewall? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . Azure virtual machines B. Azure Active Directory (Azure AD) users C. Microsoft Exchange Online inboxes D. Azure virtual networks E. Microsoft SharePoint...
Which Microsoft 365 compliance feature can you use to encrypt content automatically based on specific conditions?
Which Microsoft 365 compliance feature can you use to encrypt content automatically based on specific conditions?A . Content Search B. sensitivity labels C. retention policies D. eDiscoveryView AnswerAnswer: B Explanation: Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/information-protection?view=o365-worldwide
What can you use to provide threat detection for Azure SQL Managed Instance?
What can you use to provide threat detection for Azure SQL Managed Instance?A . Microsoft Secure Score B. application security groups C. Azure Defender D. Azure BastionView AnswerAnswer: C
Which score measures an organization's progress in completing actions that help reduce risks associated to data protection and regulatory standards?
Which score measures an organization's progress in completing actions that help reduce risks associated to data protection and regulatory standards?A . Microsoft Secure Score B. Productivity Score C. Secure score in Azure Security Center D. Compliance scoreView AnswerAnswer: D Explanation: Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager?view=o365-worldwide https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-score-calculation?view=o365- worldwide
Select the answer that correctly completes the sentence
HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer:
What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?
What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?A . automated remediation B. automated investigation C. advanced hunting D. network protectionView AnswerAnswer: D Explanation: Network protection helps protect devices from Internet-based events. Network protection is an attack surface reduction...