Which sensitivity labels can you apply to Microsoft SharePoint Online in Policy1?

You create three sensitivity labels named Sensitivity1, Sensitivity2, and Sensitivity3 and perform the following actions: ✑ Publish Sensitivity1. ✑ Create an auto-labeling policy for Sensitivity2. You plan to create a file policy named Policy1 in Microsoft Cloud App Security. Which sensitivity labels can you apply to Microsoft SharePoint Online in...

May 6, 2023 No Comments READ MORE +

Which queue types should you use?

DRAG DROP You are a Dynamics 365 for Customer Service administrator. You need to implement queues to manage cases. Which queue types should you use? To answer, drag the appropriate queue types to the correct scenarios. Each queue type may be used once, more than once, or not at all....

May 6, 2023 No Comments READ MORE +

Which database engine meets these requirements?

A startup company is building a new application to allow users to visualize their on-premises and cloud networking components. The company expects billions of components to be stored and requires responses in milliseconds. The application should be able to identify: ✑ The networks and routes affected if a particular component...

May 6, 2023 No Comments READ MORE +

What should you do?

You configure multi-region writes for account1. You need to ensure that App1 supports the new configuration for account1. The solution must meet the business requirements and the product catalog requirements. What should you do?A . Set the default consistency level of accountl to bounded staleness. B. Create a private endpoint...

May 6, 2023 No Comments READ MORE +

Which two actions could the delegated administrator complete after delegated administration is granted for a custom object? Choose 2 answers

Which two actions could the delegated administrator complete after delegated administration is granted for a custom object? Choose 2 answersA . Change organization-wide snaring rules for the object. B. Create a custom tab for the object C. Add a custom picklist field to the object D. Change the relationship with...

May 6, 2023 No Comments READ MORE +

What should you do?

You have a Microsoft 365 environment that contains 1,000 mailboxes. You need to ensure that only an administrator named Admin1 can use the Exchange Management Shell to manage What should you do?A . Create a conditional access policy and apply the policy to all users. B. For all users, run...

May 6, 2023 No Comments READ MORE +

You design a solution for the web tier of WebApp1 as shown in the exhibit

HOTSPOT You design a solution for the web tier of WebApp1 as shown in the exhibit. For each of the following statements, select Yes if the statement is true. Otherwise, select No. View AnswerAnswer: Explanation: Box 1: Yes Any new deployments to Azure must be redundant in case an Azure...

May 6, 2023 No Comments READ MORE +

Which SYN flood mitigation mode must the customer use?

A customer wants to enable SYN flood mitigation in a FortiDDoS device. The FortiDDoS must reply with one SYN/ACK packet per SYN packet from a new source IP address. Which SYN flood mitigation mode must the customer use?A . SYN retransmission B. SYN/ACK cookie C. SYN cookie D. ACK cookieView...

May 6, 2023 No Comments READ MORE +

What should you include in the recommendation?

Topic 1, Litware, Inc Case Study This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to...

May 6, 2023 No Comments READ MORE +

Which of the following types of malware is MOST likely infecting the hosts?

A security analyst is investigating multiple hosts that are communicating to external IP addresses during the hours of 2:00 a.m - 4:00 am. The malware has evaded detection by traditional antivirus software. Which of the following types of malware is MOST likely infecting the hosts?A . A RAT B. Ransomware...

May 6, 2023 No Comments READ MORE +