What should you recommend?

HOTSPOT You need to recommend a solution to evaluate regulatory compliance across the entire managed environment. The solution must meet the regulatory compliance requirements and the business requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point....

May 30, 2022 No Comments READ MORE +

What should you include in the recommendation?

You need to recommend a solution to resolve the virtual machine issue. What should you include in the recommendation?A . Onboard the virtual machines to Microsoft Defender for Endpoint.B . Onboard the virtual machines to Azure Arc.C . Create a device compliance policy in Microsoft Endpoint Manager.D . Enable the...

May 30, 2022 No Comments READ MORE +

What should you include in the recommendation?

HOTSPOT You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point. View AnswerAnswer:

May 28, 2022 No Comments READ MORE +

What should you recommend?

HOTSPOT You need to recommend an identity security solution for the Azure AD tenant of Litware. The solution must meet the identity requirements and the regulatory compliance requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point....

May 28, 2022 No Comments READ MORE +

Which two configurations should you include in the recommendation?

Topic 3, Mix Questions You are planning the security requirements for Azure Cosmos DB Core (SQL) API accounts. You need to recommend a solution to audit all users that access the data in the Azure Cosmos DB accounts. Which two configurations should you include in the recommendation? Each correct answer...

May 27, 2022 No Comments READ MORE +

Which two components should you include in the recommendation?

You have a Microsoft 365 E5 subscription. You are designing a solution to protect confidential data in Microsoft SharePoint Online sites that contain more than one million documents. You need to recommend a solution to prevent Personally Identifiable Information (Pll) from being shared. Which two components should you include in...

May 27, 2022 No Comments READ MORE +

You open Microsoft Defender for Cloud as shown in the following exhibit

HOTSPOT You open Microsoft Defender for Cloud as shown in the following exhibit. Use the drop-down menus to select the answer choice that complete each statements based on the information presented in the graphic. NOTE: Each correct selection is worth one point. View AnswerAnswer:

May 27, 2022 No Comments READ MORE +

Which identity service should you include in the recommendation?

You have an on-premises network that has several legacy applications. The applications perform LDAP queries against an existing directory service. You are migrating the on-premises infrastructure to a cloud-only infrastructure. You need to recommend an identity solution for the infrastructure that supports the legacy applications. The solution must minimize the...

May 26, 2022 No Comments READ MORE +

What should you include in the recommendation?

Your company has a hybrid cloud infrastructure that contains an on-premises Active Directory Domain Services (AD DS) forest, a Microsoft B65 subscription, and an Azure subscription. The company's on-premises network contains internal web apps that use Kerberos authentication. Currently, the web apps are accessible only from the network. You have...

May 25, 2022 1 Comment READ MORE +

To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . Security Assertion Markup Language (SAML)B . NTLMv2C . certificate-based authenticationD . KerberosView AnswerAnswer: A,C

May 25, 2022 2 Comments READ MORE +