Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

June 17, 2022 No Comments READ MORE +

What should you use?

You have an Azure environment. You need to identify any Azure configurations and workloads that are non-compliant with ISO 27001 standards. What should you use?A . Azure SentinelB . Azure Active Directory (Azure AD) Identity ProtectionC . Azure Security CenterD . Azure Advanced Threat Protection (ATP)View AnswerAnswer: C Explanation: Reference:...

June 17, 2022 No Comments READ MORE +

You plan to configure Azure Disk Encryption for VM4 Which key vault can you use to store the encryption key?

You plan to configure Azure Disk Encryption for VM4 Which key vault can you use to store the encryption key?A . KeyVault1B . KeyVault3C . KeyVault2View AnswerAnswer: A Explanation: The key vault needs to be in the same subscription and same region as the VM. VM4 is in West US....

June 17, 2022 No Comments READ MORE +

What should you do first?

You need to ensure that you can meet the security operations requirements. What should you do first?A . Turn on Auto Provisioning in Security Center.B . Integrate Security Center and Microsoft Cloud App Security.C . Upgrade the pricing tier of Security Center to Standard.D . Modify the Security Center workspace...

June 17, 2022 No Comments READ MORE +

What should you do?

You have an Azure resource group that contains 100 virtual machines. You have an initiative named Initiative1 that contains multiple policy definitions. Initiative1 is assigned to the resource group. You need to identify which resources do NOT match the policy definitions. What should you do?A . From Azure Security Center,...

June 17, 2022 No Comments READ MORE +

For which virtual machine can you enable Update Management?

You have the Azure virtual machines shown in the following table. For which virtual machine can you enable Update Management?A . VM2 and VM3 onlyB . VM2, VM3, and VM4 onlyC . VM1, VM2, and VM4 onlyD . VM1, VM2, VM3, and VM4E . VM1, VM2, and VM3 onlyView AnswerAnswer:...

June 16, 2022 No Comments READ MORE +

What should you do first?

From Azure Security Center, you need to deploy SecPol1. What should you do first?A . Enable Azure Defender.B . Create an Azure Management group.C . Create an initiative.D . Configure continuous export.View AnswerAnswer: B Explanation: Reference: https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/security-center/custom-security-policies.md https://zimmergren.net/create-custom-security-center-recommendation-with-azure-policy/

June 16, 2022 No Comments READ MORE +

Which users can create a group named Contoso Sales in contoso.com?

HOTSPOT You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table. Contoso.com contains a group naming policy. The policy has a custom blocked word list rule that includes the word Contoso. Which users can create a group named Contoso Sales...

June 16, 2022 No Comments READ MORE +

You are evaluating the effect of the application security groups on the network communication between the virtual machines in Sub2

HOTSPOT You are evaluating the effect of the application security groups on the network communication between the virtual machines in Sub2. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1:...

June 16, 2022 No Comments READ MORE +

How many NSGs and network security rules should you create?

HOTSPOT You have an Azure subscription named Sub1. You create a virtual network that contains one subnet. On the subnet, you provision the virtual machines shown in the following table. Currently, you have not provisioned any network security groups (NSGs). You need to implement network security to meet the following...

June 16, 2022 No Comments READ MORE +