Which security level should you configure for each job role?

HOTSPOT You are planning the security levels for a security access strategy. You need to identify which job roles to configure at which security levels. The solution must meet security best practices of the Microsoft Cybersecurity Reference Architectures (MCRA). Which security level should you configure for each job role? To...

April 8, 2023 No Comments READ MORE +

What should you recommend?

HOTSPOT You need to recommend a solution to evaluate regulatory compliance across the entire managed environment. The solution must meet the regulatory compliance requirements and the business requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point....

April 8, 2023 No Comments READ MORE +

What should you include in the recommendation?

You need to recommend a solution to meet the security requirements for the virtual machines. What should you include in the recommendation?A . an Azure Bastion host B. a network security group (NSG) C. just-in-time (JIT) VM access D. Azure Virtual DesktopView AnswerAnswer: D Explanation: The security requirement this question...

April 8, 2023 No Comments READ MORE +

What should you create in Azure AD to meet the Contoso developer requirements?

HOTSPOT What should you create in Azure AD to meet the Contoso developer requirements? View AnswerAnswer: Explanation: Box 1: A synced user account - Need to use a synched user account. Box 2: An access review https://docs.microsoft.com/en-us/azure/active-directory-domain-services/synchronization https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview

April 7, 2023 No Comments READ MORE +

What should you include during the application design phase?

You are creating an application lifecycle management process based on the Microsoft Security Development Lifecycle (SDL). You need to recommend a security standard for onboarding applications to Azure. The standard will include recommendations for application design, development, and deployment What should you include during the application design phase?A . static...

April 7, 2023 No Comments READ MORE +

In which two environments can you use Defender for Containers to scan for known vulnerabilities?

You are designing the security standards for containerized applications onboarded to Azure. You are evaluating the use of Microsoft Defender for Containers. In which two environments can you use Defender for Containers to scan for known vulnerabilities? Each correct answer presents a complete solution. NOTE: Each correct selection is worth...

April 7, 2023 No Comments READ MORE +

What should you use to start the threat modeling process?

Your company plans to follow DevSecOps best practices of the Microsoft Cloud Adoption Framework for Azure. You need to perform threat modeling by using a top-down approach based on the Microsoft Cloud Adoption Framework for Azure. What should you use to start the threat modeling process?A . the STRIDE model...

April 6, 2023 No Comments READ MORE +

What should you recommend using in Microsoft Sentinel?

You have a Microsoft 365 E5 subscription and an Azure subscription. You are designing a Microsoft Sentinel deployment. You need to recommend a solution for the security operations team. The solution must include custom views and a dashboard for analyzing security events. What should you recommend using in Microsoft Sentinel?A...

April 6, 2023 No Comments READ MORE +

What should you recommend?

HOTSPOT You need to recommend a multi-tenant and hybrid security solution that meets to the business requirements and the hybrid requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

April 6, 2023 No Comments READ MORE +

What should you include in the recommendation?

You need to recommend a solution to resolve the virtual machine issue. What should you include in the recommendation? (Choose Two)A . Onboard the virtual machines to Microsoft Defender for Endpoint. B. Onboard the virtual machines to Azure Arc. C. Create a device compliance policy in Microsoft Endpoint Manager. D....

April 6, 2023 No Comments READ MORE +