To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . Security Assertion Markup Language (SAML) B. NTLMv2 C. certificate-based authentication D. KerberosView AnswerAnswer: A,C

September 30, 2022 No Comments READ MORE +

What should you include in the recommendation?

Your company has on-premises Microsoft SQL Server databases. The company plans to move the databases to Azure. You need to recommend a secure architecture for the databases that will minimize operational requirements for patching and protect sensitive data by using dynamic data masking. The solution must minimize costs. What should...

September 30, 2022 No Comments READ MORE +

What should you recommend?

HOTSPOT You need to recommend a SIEM and SOAR strategy that meets the hybrid requirements, the Microsoft Sentinel requirements, and the regulatory compliance requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

September 30, 2022 No Comments READ MORE +

What should you include in the recommendation?

Your company has a hybrid cloud infrastructure that contains an on-premises Active Directory Domain Services (AD DS) forest, a Microsoft B65 subscription, and an Azure subscription. The company's on-premises network contains internal web apps that use Kerberos authentication. Currently, the web apps are accessible only from the network. You have...

September 29, 2022 No Comments READ MORE +

What should you include in the recommendation?

Your company is developing a serverless application in Azure that will have the architecture shown in the following exhibit. You need to recommend a solution to isolate the compute components on an Azure virtual network. What should you include in the recommendation?A . Azure Active Directory (Azure AD) enterprise applications...

September 29, 2022 No Comments READ MORE +

What should you recommend using for each requirement?

HOTSPOT You need to recommend a solution to meet the requirements for connections to ClaimsDB. What should you recommend using for each requirement? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

September 29, 2022 No Comments READ MORE +

What should you recommend?

Topic 2, Litware, inc. Case Study 2 Overview Litware, inc. is a financial services company that has main offices in New York and San Francisco. litware has 30 branch offices and remote employees across the United States. The remote employees connect to the main offices by using a VPN. Litware...

September 29, 2022 No Comments READ MORE +

What should you include in the recommendation?

Your company has the virtual machine infrastructure shown in the following table. The company plans to use Microsoft Azure Backup Server (MABS) to back up the virtual machines to Azure. You need to provide recommendations to increase the resiliency of the backup strategy to mitigate attacks such as ransomware. What...

September 29, 2022 No Comments READ MORE +

Which CLI command do you use to perform real-time troubleshooting for ADVPN on either a hub or a spoke FortiGate?

Which CLI command do you use to perform real-time troubleshooting for ADVPN on either a hub or a spoke FortiGate?A . diagnose sys virtual-wan-link service B. get router info routing-table C. diagnose debug application ike D. get ipsec tunnel listView AnswerAnswer: C

September 28, 2022 No Comments READ MORE +

What should you include in the recommendation?

You need to recommend a solution to meet the security requirements for the virtual machines. What should you include in the recommendation?A . an Azure Bastion host B. a network security group (NSG) C. just-in-time (JIT) VM access D. Azure Virtual DesktopView AnswerAnswer: A

September 27, 2022 No Comments READ MORE +