Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

March 28, 2024 No Comments READ MORE +

What should you use to detect which documents are sensitive?

You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365. You have Microsoft SharePoint Online sites that contain sensitive documents. The documents contain customer account numbers that each consists of 32 alphanumeric characters. You need to create a data loss prevention (DLP) policy to protect the sensitive...

March 28, 2024 No Comments READ MORE +

Which subscription-level role should you assign to Group1?

You need to implement the Defender for Cloud requirements. Which subscription-level role should you assign to Group1?A . Security AdminB . OwnerC . Security Assessment ContributorD . ContributorView AnswerAnswer: B

March 28, 2024 No Comments READ MORE +

What should you do?

HOTSPOT You need to monitor the password resets. The solution must meet the Microsoft Sentinel requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

March 28, 2024 No Comments READ MORE +

Which two actions should you perform?

Your company stores the data for every project in a different Azure subscription. All the subscriptions use the same Azure Active Directory (Azure AD) tenant. Every project consists of multiple Azure virtual machines that run Windows Server. The Windows events of the virtual machines are stored in a Log Analytics...

March 28, 2024 No Comments READ MORE +

Which two actions should you perform in Azure Sentinel?

You are configuring Azure Sentinel. You need to send a Microsoft Teams message to a channel whenever a sign-in from a suspicious IP address is detected. Which two actions should you perform in Azure Sentinel? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one...

March 27, 2024 No Comments READ MORE +

The issue for which team can be resolved by using Microsoft Defender for Endpoint?

Topic 1, Contoso Ltd Case study This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to...

March 27, 2024 No Comments READ MORE +

Which indicator type should you use?

You receive a security bulletin about a potential attack that uses an image file. You need to create an indicator of compromise (IoC) in Microsoft Defender for Endpoint to prevent the attack. Which indicator type should you use?A . a URL/domain indicator that has Action set to Alert onlyB ....

March 27, 2024 No Comments READ MORE +

What should you configure for Server2?

You need to implement the Defender for Cloud requirements. What should you configure for Server2?A . the Microsoft Antimalware extensionB . an Azure resource lockC . an Azure resource tagD . the Azure Automanage machine configuration extension for WindowsView AnswerAnswer: D

March 27, 2024 No Comments READ MORE +

Which rule setting should you configure to meet the Microsoft Sentinel requirements?

Which rule setting should you configure to meet the Microsoft Sentinel requirements?A . From Set rule logic, turn off suppression.B . From Analytic rule details, configure the tactics.C . From Set rule logic, map the entities.D . From Analytic rule details, configure the severity.View AnswerAnswer: C

March 26, 2024 No Comments READ MORE +