What should you recommend using to prevent the PHI from being shared outside the company?

Your company has a Microsoft 365 E5 subscription. Users use Microsoft Teams, Exchange Online, SharePoint Online, and OneDrive for sharing and collaborating. The company identifies protected health information (PHI) within stored documents and communications. What should you recommend using to prevent the PHI from being shared outside the company?A ....

September 23, 2023 No Comments READ MORE +

What should you create in Azure AD to meet the Contoso developer requirements?

HOTSPOT What should you create in Azure AD to meet the Contoso developer requirements? View AnswerAnswer: Explanation: Box 1: A synced user account - Need to use a synched user account. Box 2: An access review https://docs.microsoft.com/en-us/azure/active-directory-domain-services/synchronization https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview

September 23, 2023 No Comments READ MORE +

Based on the virtual network design, how many Azure Bastion subnets are required?

Your company plans to move all on-premises virtual machines to Azure. A network engineer proposes the Azure virtual network design shown in the following table. You need to recommend an Azure Bastion deployment to provide secure remote access to all the virtual machines. Based on the virtual network design, how...

September 22, 2023 No Comments READ MORE +

What should you include in the recommendation?

You need to recommend a solution to secure the MedicalHistory data in the ClaimsDetail table. The solution must meet the Contoso developer requirements. What should you include in the recommendation?A . Transparent Data Encryption (TDE)B . Always EncryptedC . row-level security (RLS)D . dynamic data maskingE . data classificationView AnswerAnswer:...

September 22, 2023 No Comments READ MORE +

In which two environments can you use Defender for Containers to scan for known vulnerabilities?

You are designing the security standards for containerized applications onboarded to Azure. You are evaluating the use of Microsoft Defender for Containers. In which two environments can you use Defender for Containers to scan for known vulnerabilities? Each correct answer presents a complete solution. NOTE: Each correct selection is worth...

September 21, 2023 No Comments READ MORE +

What should you include in the recommendation?

Azure subscription that uses Azure Storage. The company plans to share specific blobs with vendors. You need to recommend a solution to provide the vendors with secure access to specific blobs without exposing the blobs publicly. The access must be tme-Vimted. What should you include in the recommendation?A . Create...

September 21, 2023 No Comments READ MORE +

What should you recommend?

HOTSPOT You need to recommend an identity security solution for the Azure AD tenant of Litware. The solution must meet the identity requirements and the regulatory compliance requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point....

September 20, 2023 No Comments READ MORE +

What should you configure for each landing zone?

You need to recommend a solution for securing the landing zones. The solution must meet the landing zone requirements and the business requirements. What should you configure for each landing zone?A . Azure DDoS Protection StandardB . an Azure Private DNS zoneC . Microsoft Defender for CloudD . an ExpressRoute...

September 20, 2023 No Comments READ MORE +

What should you recommend using for each requirement?

HOTSPOT You need to recommend a solution to meet the requirements for connections to ClaimsDB. What should you recommend using for each requirement? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

September 20, 2023 No Comments READ MORE +

What should you include in the recommendation?

Your company has a hybrid cloud infrastructure that contains an on-premises Active Directory Domain Services (AD DS) forest, a Microsoft B65 subscription, and an Azure subscription. The company's on-premises network contains internal web apps that use Kerberos authentication. Currently, the web apps are accessible only from the network. You have...

September 19, 2023 No Comments READ MORE +