What should you use to onboard the servers to Microsoft Sentinel?

You have a Microsoft Sentinel deployment and 100 Azure Arc-enabled on-premises servers. All the Azure Arc enabled resources are in the same resource group. You need to onboard the servers to Microsoft Sentinel. The solution must minimize administrative effort. What should you use to onboard the servers to Microsoft Sentinel?A...

February 23, 2022 No Comments READ MORE +

Which type of Microsoft Sentinel data connector should you use to meet the security requirements?

You are planning the deployment of Microsoft Sentinel. Which type of Microsoft Sentinel data connector should you use to meet the security requirements?A . Threat Intelligence - TAXIIB . Azure Active DirectoryC . Microsoft Defender for CloudD . Microsoft Defender for IdentityView AnswerAnswer: D Explanation: Reference: https://docs.microsoft.com/en-us/defender-for-identity/cas-isp-legacy-protocols Secure Windows Server...

February 23, 2022 No Comments READ MORE +

Which authentication method should you configure in a connection security rule?

You have 10 servers that run Windows Server in a workgroup. You need to configure the servers to encrypt all the network traffic between the servers. The solution must be as secure as possible. Which authentication method should you configure in a connection security rule?A . NTLMv2B . pre-shared keyC...

February 23, 2022 No Comments READ MORE +

Which service should you use to enforce the security policy, and what should you use to manage the policy settings?

HOTSPOT You need to implement a security policy solution to authorize the applications. The solution must meet the security requirements. Which service should you use to enforce the security policy, and what should you use to manage the policy settings? To answer, select the appropriate options in the answer area....

February 23, 2022 No Comments READ MORE +

What should you do?

You have an on-premises Active Directory Domain Services (AD DS) domain that syncs with an Azure Active Directory (Azure AD) tenant by using password hash synchronization. You have a Microsoft 365 subscription. All devices are hybrid Azure AD-joined. Users report that they must enter their password manually when accessing Microsoft...

February 22, 2022 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

February 21, 2022 No Comments READ MORE +

What should you do?

DRAG DROP You have an on-premises Active Directory Domain Services (AD DS) domain that syncs with an Azure Active Directory (Azure AD) tenant. The AD DS domain contains a domain controller named DC1. DC1 does NOT have internet access. You need to configure password security for on-premises users. The solution...

February 20, 2022 No Comments READ MORE +

What is the effective minimum password length for User1 and Admin1?

HOTSPOT What is the effective minimum password length for User1 and Admin1? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: 9 When multiple PSOs apply to a user, the PSO with the highest precedence (lowest...

February 20, 2022 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

February 20, 2022 No Comments READ MORE +

Which extension should you enable on the virtual machines?

You have an Azure subscription that has Microsoft Defender for Cloud enabled. You have 50 Azure virtual machines that run Windows Server. You need to ensure that any security exploits detected on the virtual machines are forwarded to Defender for Cloud. Which extension should you enable on the virtual machines?A...

February 20, 2022 No Comments READ MORE +