Which two types of resources can be protected by using Azure Firewall? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
Which two types of resources can be protected by using Azure Firewall? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . Azure virtual machinesB . Azure Active Directory (Azure AD) usersC . Microsoft Exchange Online inboxesD . Azure virtual networksE . Microsoft SharePoint...
What is the purpose of Azure Active Directory (Azure AD) Password Protection?
What is the purpose of Azure Active Directory (Azure AD) Password Protection?A . to control how often users must change their passwordsB . to identify devices to which users can sign in without using multi-factor authentication (MFA)C . to encrypt a password by using globally recognized encryption standardsD . to...
What do you use to provide real-time integration between Azure Sentinel and another security source?
What do you use to provide real-time integration between Azure Sentinel and another security source?A . Azure AD ConnectB . a Log Analytics workspaceC . Azure Information ProtectionD . a data connectorView AnswerAnswer: D Explanation: To on-board Azure Sentinel, you first need to connect to your security sources. Azure Sentinel...
Select the answer that correctly completes the sentence
HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: Microsoft Defender for Identity is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. Reference: https://docs.microsoft.com/en-us/defender-for-identity/what-is
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: Yes A certificate is required that provides a private and a public key. Box 2: Yes The public key is...
What can you use to provide a user with a two-hour window to complete an administrative task in Azure?
What can you use to provide a user with a two-hour window to complete an administrative task in Azure?A . Azure Active Directory (Azure AD) Privileged Identity Management (PIM)B . Azure Multi-Factor Authentication (MFA)C . Azure Active Directory (Azure AD) Identity ProtectionD . conditional access policiesView AnswerAnswer: D Explanation: https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure...
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: Yes System updates reduces security vulnerabilities, and provide a more stable environment for end users. Not applying updates leaves unpatched...
Which score measures an organization's progress in completing actions that help reduce risks associated to data protection and regulatory standards?
Which score measures an organization's progress in completing actions that help reduce risks associated to data protection and regulatory standards?A . Microsoft Secure ScoreB . Productivity ScoreC . Secure score in Azure Security CenterD . Compliance scoreView AnswerAnswer: D Explanation: Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager?view=o365-worldwide https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-score-calculation?view=o365- worldwide
Select the answer that correctly completes the sentence
HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer:
What is a use case for implementing information barrier policies in Microsoft 365?
What is a use case for implementing information barrier policies in Microsoft 365?A . to restrict unauthenticated access to Microsoft 365B . to restrict Microsoft Teams chats between certain groups within an organizationC . to restrict Microsoft Exchange Online email between certain groups within an organizationD . to restrict data...