You are evaluating the security of ClaimsApp

HOTSPOT You are evaluating the security of ClaimsApp. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer:

April 14, 2023 No Comments READ MORE +

What should you recommend?

Topic 2, Litware, inc. Case Study 2 Overview Litware, inc. is a financial services company that has main offices in New York and San Francisco. litware has 30 branch offices and remote employees across the United States. The remote employees connect to the main offices by using a VPN. Litware...

April 14, 2023 No Comments READ MORE +

You open Microsoft Defender for Cloud as shown in the following exhibit

HOTSPOT You open Microsoft Defender for Cloud as shown in the following exhibit. Use the drop-down menus to select the answer choice that complete each statements based on the information presented in the graphic. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Selection 1: NSG Selection Selection...

April 14, 2023 No Comments READ MORE +

Which two controls should you include in the recommendation?

You have an Azure subscription that contains virtual machines, storage accounts, and Azure SQL databases. All resources are backed up multiple times a day by using Azure Backup. You are developing a strategy to protect against ransomware attacks. You need to recommend which controls must be enabled to ensure that...

April 14, 2023 No Comments READ MORE +

To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . Security Assertion Markup Language (SAML) B. NTLMv2 C. certificate-based authentication D. KerberosView AnswerAnswer: A,D Explanation: https://docs.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-configure-single-sign-on-on-premises-apps https://docs.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-configure-single-sign-on-with-kcd https://docs.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-configure-custom-domain

April 13, 2023 No Comments READ MORE +

What should you recommend?

Topic 1, Fabrikam, Inc Case Study 1 OverView Fabrikam, Inc. is an insurance company that has a main office in New York and a branch office in Paris. On-premises Environment The on-premises network contains a single Active Directory Domain Services (AD DS) domain named corp.fabrikam.com. Azure Environment Fabrikam has the...

April 13, 2023 No Comments READ MORE +

Which type of diagram should you create?

Your company is developing a modern application that will run as an Azure App Service web app. You plan to perform threat modeling to identify potential security issues by using the Microsoft Threat Modeling Tool. Which type of diagram should you create?A . data flow B. system flow C. process...

April 12, 2023 No Comments READ MORE +

What should you include in the recommendation?

HOTSPOT You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point. View AnswerAnswer: Explanation:

April 12, 2023 No Comments READ MORE +

What should you include in the recommendation for each stage?

HOTSPOT You use Azure Pipelines with Azure Repos to implement continuous integration and continuous deployment (CI/CO) workflows. You need to recommend best practices to secure the stages of the CI/CD workflows based on the Microsoft Cloud Adoption Framework for Azure. What should you include in the recommendation for each stage?...

April 11, 2023 No Comments READ MORE +

Does this meet the goal?

You are designing the encryption standards for data at rest for an Azure resource You need to provide recommendations to ensure that the data at rest is encrypted by using AES-256 keys. The solution must support rotating the encryption keys monthly. Solution: For Azure SQL databases, you recommend Transparent Data...

April 10, 2023 No Comments READ MORE +