For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Yes NO NO YES - As an administrator, you can lock a subscription, resource group, or resource to prevent other users in...
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Graphical user interface, text, application, email Description automatically generated Box 1: Yes Azure Defender provides security alerts and advanced threat protection for...
In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?
In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?A . the management of mobile devicesB . the permissions for the user data stored in AzureC . the creation and management of user accountsD . the management of the physical hardwareView AnswerAnswer: D
Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments at your organization?
Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments at your organization?A . sensitivity label policiesB . Customer LockboxC . information BarriersD . Privileged Access Management (PAM)View AnswerAnswer: C Explanation: Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/information-barriers
Select the answer that correctly completes the sentence
HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: Text, letter Description automatically generated
Select the answer that correctly completes the sentence
HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: Text, letter Description automatically generated
Which security methodology does this represent?
You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure. Which security methodology does this represent?A . threat modelingB . identity as the security perimeterC . defense in depthD . the shared responsibility modelView AnswerAnswer: C Explanation: Reference: https://docs.microsoft.com/en-us/learn/modules/secure-network-connectivity-azure/2-what-is-defense-in-depth
Select the answer that correctly completes the sentence
HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: Graphical user interface, application Description automatically generated
What should you use in the Microsoft 365 security center to view security trends and track the protection status of identities?
What should you use in the Microsoft 365 security center to view security trends and track the protection status of identities?A . Attack simulatorB . ReportsC . HuntingD . IncidentsView AnswerAnswer: B Explanation: Reference: https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/reports-and-insights-in-security- and-compliance?view=o365-worldwide
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: Yes A certificate is required that provides a private and a public key. Box 2: Yes The public key is...