{"id":82704,"date":"2024-06-21T08:20:40","date_gmt":"2024-06-21T08:20:40","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=82704"},"modified":"2024-06-21T08:20:45","modified_gmt":"2024-06-21T08:20:45","slug":"most-updated-sc-100-dumps-v17-02-perfect-choice-to-pass-microsoft-cybersecurity-architect-sc-100-exam","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/most-updated-sc-100-dumps-v17-02-perfect-choice-to-pass-microsoft-cybersecurity-architect-sc-100-exam.html","title":{"rendered":"Most Updated SC-100 Dumps (V17.02) &#8211; Perfect Choice to Pass Microsoft Cybersecurity Architect SC-100 Exam"},"content":{"rendered":"\n<p>DumpsBase has gathered the most updated Microsoft SC-100 dumps (V17.02) with 182 practice questions and answers to be your perfect choice to pass the Microsoft Cybersecurity Architect exam. Provided by experienced experts, the most updated Microsoft SC-100 exam dumps of DumpsBase are guaranteed to be 100% valid. Use this updated version to efficiently understand how to respond to the real Microsoft Cybersecurity Architect certification exam. Encompassing all SC-100 Microsoft Cybersecurity Architect Exam topics, these updated SC-100 dumps offer the most comprehensive source of SC-100 Microsoft Cybersecurity Architect exam information. The Microsoft SC-100 dumps are designed for on-the-go learning, making DumpsBase a perfect option for students and busy professionals who prefer not to attend academies for Microsoft Cybersecurity Architect SC-100 exam preparation.<\/p>\n<h2>Microsoft Cybersecurity Architect Certification Exam <em><span style=\"background-color: #00ffff;\">SC-100 Free Dumps<\/span><\/em><\/h2>\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam8680\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-8680\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-336614'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>Topic 1, Fabrikam, Inc Case Study 1 <br \/>\r<br><br \/>\r<br>OverView <br \/>\r<br>Fabrikam, Inc. is an insurance company that has a main office in New York and a branch office in Paris. <br \/>\r<br><br \/>\r<br>On-premises Environment <br \/>\r<br>The on-premises network contains a single Active Directory Domain Services (AD DS) domain named corp.fabrikam.com. <br \/>\r<br><br \/>\r<br>Azure Environment <br \/>\r<br>Fabrikam has the following Azure resources: <br \/>\r<br>&#8226; An Azure Active Directory (Azure AD) tenant named fabrikam.onmicrosoft.com that syncs with corp.fabnkam.com <br \/>\r<br>&#8226; A single Azure subscription named Sub1 <br \/>\r<br>&#8226; A virtual network named Vnetl in the East US Azure region <br \/>\r<br>&#8226; A virtual network named Vnet2 in the West Europe Azure region <br \/>\r<br>&#8226; An instance of Azure Front Door named FD1 that has Azure Web Application Firewall (WAR enabled <br \/>\r<br>&#8226; A Microsoft Sentinel workspace <br \/>\r<br>&#8226; An Azure SQL database named ClaimsDB that contains a table named ClaimDetails <br \/>\r<br>&#8226; 20 virtual machines that are configured as application servers and are NOT onboarded to Microsoft Defender for Cloud <br \/>\r<br>&#8226; A resource group named TestRG that is used for testing purposes only <br \/>\r<br>&#8226; An Azure Virtual Desktop host pool that contains personal assigned session hosts <br \/>\r<br>All the resources in Sub1 are in either the East US or the West Europe region. <br \/>\r<br><br \/>\r<br>Partners <br \/>\r<br>Fabrikam has contracted a company named Contoso, Ltd. to develop applications. <br \/>\r<br>Contoso has the following infrastructure-. <br \/>\r<br>&#8226; An Azure AD tenant named contoso.onmicrosoft.com <br \/>\r<br>&#8226; An Amazon Web Services (AWS) implementation named ContosoAWS1 that contains AWS EC2 instances used to host test workloads for the applications of Fabrikam Developers at Contoso will connect to the resources of Fabrikam to test or update applications. The developers will be added to a security Group named Contoso Developers in fabrikam.onmicrosoft.com that will be assigned to roles in Sub1. <br \/>\r<br>The ContosoDevelopers group is assigned the db.owner role for the ClaimsDB database. <br \/>\r<br><br \/>\r<br>Compliance Event <br \/>\r<br>Fabrikam deploys the following compliance environment: <br \/>\r<br>&#8226; Defender for Cloud is configured to assess all the resources in Sub1 for compliance to the HIPAA HITRUST standard. <br \/>\r<br>&#8226; Currently, resources that are noncompliant with the HIPAA HITRUST standard are remediated manually. <br \/>\r<br>&#8226; Qualys is used as the standard vulnerability assessment tool for servers. <br \/>\r<br><br \/>\r<br>Problem Statements <br \/>\r<br>The secure score in Defender for Cloud shows that all the virtual machines generate the following recommendation-. Machines should have a vulnerability assessment solution. All the virtual machines must be compliant in Defender for Cloud. <br \/>\r<br><br \/>\r<br>ClaimApp Deployment <br \/>\r<br>Fabrikam plans to implement an internet-accessible application named ClaimsApp that will have the following specification <br \/>\r<br>&#8226; ClaimsApp will be deployed to Azure App Service instances that connect to Vnetl and Vnet2. <br \/>\r<br>&#8226; Users will connect to ClaimsApp by using a URL of https:\/\/claims.fabrikam.com. <br \/>\r<br>&#8226; ClaimsApp will access data in ClaimsDB. <br \/>\r<br>&#8226; ClaimsDB must be accessible only from Azure virtual networks. <br \/>\r<br>&#8226; The app services permission for ClaimsApp must be assigned to ClaimsDB. <br \/>\r<br><br \/>\r<br>Application Development Requirements <br \/>\r<br>Fabrikam identifies the following requirements for application development: <br \/>\r<br>&#8226; Azure DevTest labs will be used by developers for testing. <br \/>\r<br>&#8226; All the application code must be stored in GitHub Enterprise. <br \/>\r<br>&#8226; Azure Pipelines will be used to manage application deployments. <br \/>\r<br>&#8226; All application code changes must be scanned for security vulnerabilities, including application code or configuration files that contain secrets in clear text. Scanning must be done at the time the code is pushed to a repository. <br \/>\r<br><br \/>\r<br>Security Requirement <br \/>\r<br>Fabrikam identifies the following security requirements: <br \/>\r<br>&#8226; Internet-accessible applications must prevent connections that originate in North Korea. <br \/>\r<br>&#8226; Only members of a group named InfraSec must be allowed to configure network security groups (NSGs} and instances of Azure Firewall, VJM. And Front Door in Sub1. <br \/>\r<br>&#8226; Administrators must connect to a secure host to perform any remote administration of the virtual machines. The secure host must be provisioned from a custom operating system image. <br \/>\r<br><br \/>\r<br>AWS Requirements <br \/>\r<br>Fabrikam identifies the following security requirements for the data hosted in ContosoAWSV. <br \/>\r<br>&#8226; Notify security administrators at Fabrikam if any AWS EC2 instances are noncompliant with secure score recommendations. <br \/>\r<br>&#8226; Ensure that the security administrators can query AWS service logs directly from the Azure environment. <br \/>\r<br><br \/>\r<br>Contoso Developer Requirements <br \/>\r<br>Fabrikam identifies the following requirements for the Contoso developers; <br \/>\r<br>&#8226; Every month, the membership of the ContosoDevelopers group must be verified. <br \/>\r<br>&#8226; The Contoso developers must use their existing contoso.onmicrosoft.com credentials to access the resources in Sub1. <br \/>\r<br>&#8226; The Comoro developers must be prevented from viewing the data in a column named MedicalHistory in the ClaimDetails table. <br \/>\r<br><br \/>\r<br>Compliance Requirement <br \/>\r<br>Fabrikam wants to automatically remediate the virtual machines in Sub1 to be compliant with the HIPPA HITRUST standard. The virtual machines in TestRG must be excluded from the compliance assessment. <br \/>\r<br><br \/>\r<br>You need to recommend a solution to meet the security requirements for the InfraSec group. <br \/>\r<br>What should you use to delegate the access?<\/div><input type='hidden' name='question_id[]' id='qID_1' value='336614' \/><input type='hidden' id='answerType336614' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336614[]' id='answer-id-1316823' class='answer   answerof-336614 ' value='1316823'   \/><label for='answer-id-1316823' id='answer-label-1316823' class=' answer'><span>a subscription<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336614[]' id='answer-id-1316824' class='answer   answerof-336614 ' value='1316824'   \/><label for='answer-id-1316824' id='answer-label-1316824' class=' answer'><span>a custom role-based access control (RBAC) role<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336614[]' id='answer-id-1316825' class='answer   answerof-336614 ' value='1316825'   \/><label for='answer-id-1316825' id='answer-label-1316825' class=' answer'><span>a resource group<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336614[]' id='answer-id-1316826' class='answer   answerof-336614 ' value='1316826'   \/><label for='answer-id-1316826' id='answer-label-1316826' class=' answer'><span>a management group<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-336615'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>You need to recommend a solution to scan the application code. The solution must meet the application development requirements. <br \/>\r<br>What should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_2' value='336615' \/><input type='hidden' id='answerType336615' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336615[]' id='answer-id-1316827' class='answer   answerof-336615 ' value='1316827'   \/><label for='answer-id-1316827' id='answer-label-1316827' class=' answer'><span>Azure Key Vault<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336615[]' id='answer-id-1316828' class='answer   answerof-336615 ' value='1316828'   \/><label for='answer-id-1316828' id='answer-label-1316828' class=' answer'><span>GitHub Advanced Security<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336615[]' id='answer-id-1316829' class='answer   answerof-336615 ' value='1316829'   \/><label for='answer-id-1316829' id='answer-label-1316829' class=' answer'><span>Application Insights in Azure Monitor<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336615[]' id='answer-id-1316830' class='answer   answerof-336615 ' value='1316830'   \/><label for='answer-id-1316830' id='answer-label-1316830' class=' answer'><span>Azure DevTest Labs<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-336616'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>You need to recommend a solution to resolve the virtual machine issue. <br \/>\r<br>What should you include in the recommendation? (Choose Two)<\/div><input type='hidden' name='question_id[]' id='qID_3' value='336616' \/><input type='hidden' id='answerType336616' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336616[]' id='answer-id-1316831' class='answer   answerof-336616 ' value='1316831'   \/><label for='answer-id-1316831' id='answer-label-1316831' class=' answer'><span>Onboard the virtual machines to Microsoft Defender for Endpoint.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336616[]' id='answer-id-1316832' class='answer   answerof-336616 ' value='1316832'   \/><label for='answer-id-1316832' id='answer-label-1316832' class=' answer'><span>Onboard the virtual machines to Azure Arc.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336616[]' id='answer-id-1316833' class='answer   answerof-336616 ' value='1316833'   \/><label for='answer-id-1316833' id='answer-label-1316833' class=' answer'><span>Create a device compliance policy in Microsoft Endpoint Manager.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336616[]' id='answer-id-1316834' class='answer   answerof-336616 ' value='1316834'   \/><label for='answer-id-1316834' id='answer-label-1316834' class=' answer'><span>Enable the Qualys scanner in Defender for Cloud.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-336617'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>HOTSPOT <br \/>\r<br>What should you create in Azure AD to meet the Contoso developer requirements? <br \/>\r<br><br><img decoding=\"async\" width=649 height=209 id=\"\u56fe\u7247 2810\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image001-2.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_4' value='336617' \/><input type='hidden' id='answerType336617' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336617[]' id='textarea_q_336617' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-336618'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>HOTSPOT <br \/>\r<br>You are evaluating the security of ClaimsApp. <br \/>\r<br>For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. <br \/>\r<br><br><img decoding=\"async\" width=651 height=159 id=\"\u56fe\u7247 1\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image003-4.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_5' value='336618' \/><input type='hidden' id='answerType336618' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336618[]' id='textarea_q_336618' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-336619'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>You need to recommend a solution to secure the MedicalHistory data in the ClaimsDetail table. The solution must meet the Contoso developer requirements. <br \/>\r<br>What should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_6' value='336619' \/><input type='hidden' id='answerType336619' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336619[]' id='answer-id-1316837' class='answer   answerof-336619 ' value='1316837'   \/><label for='answer-id-1316837' id='answer-label-1316837' class=' answer'><span>Transparent Data Encryption (TDE)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336619[]' id='answer-id-1316838' class='answer   answerof-336619 ' value='1316838'   \/><label for='answer-id-1316838' id='answer-label-1316838' class=' answer'><span>Always Encrypted<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336619[]' id='answer-id-1316839' class='answer   answerof-336619 ' value='1316839'   \/><label for='answer-id-1316839' id='answer-label-1316839' class=' answer'><span>row-level security (RLS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336619[]' id='answer-id-1316840' class='answer   answerof-336619 ' value='1316840'   \/><label for='answer-id-1316840' id='answer-label-1316840' class=' answer'><span>dynamic data masking<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336619[]' id='answer-id-1316841' class='answer   answerof-336619 ' value='1316841'   \/><label for='answer-id-1316841' id='answer-label-1316841' class=' answer'><span>data classification<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-336620'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>HOTSPOT <br \/>\r<br>You need to recommend a solution to meet the AWS requirements. <br \/>\r<br>What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. <br \/>\r<br><br><img decoding=\"async\" width=649 height=280 id=\"\u56fe\u7247 5\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image005-4.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_7' value='336620' \/><input type='hidden' id='answerType336620' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336620[]' id='textarea_q_336620' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-336621'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>You need to recommend a solution to meet the security requirements for the virtual machines. <br \/>\r<br>What should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_8' value='336621' \/><input type='hidden' id='answerType336621' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336621[]' id='answer-id-1316843' class='answer   answerof-336621 ' value='1316843'   \/><label for='answer-id-1316843' id='answer-label-1316843' class=' answer'><span>an Azure Bastion host<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336621[]' id='answer-id-1316844' class='answer   answerof-336621 ' value='1316844'   \/><label for='answer-id-1316844' id='answer-label-1316844' class=' answer'><span>a network security group (NSG)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336621[]' id='answer-id-1316845' class='answer   answerof-336621 ' value='1316845'   \/><label for='answer-id-1316845' id='answer-label-1316845' class=' answer'><span>just-in-time (JIT) VM access<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336621[]' id='answer-id-1316846' class='answer   answerof-336621 ' value='1316846'   \/><label for='answer-id-1316846' id='answer-label-1316846' class=' answer'><span>Azure Virtual Desktop<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-336622'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>HOTSPOT <br \/>\r<br>You need to recommend a solution to meet the requirements for connections to ClaimsDB. <br \/>\r<br>What should you recommend using for each requirement? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. <br \/>\r<br><br><img decoding=\"async\" width=649 height=182 id=\"\u56fe\u7247 7\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image007-3.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_9' value='336622' \/><input type='hidden' id='answerType336622' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336622[]' id='textarea_q_336622' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-336623'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>HOTSPOT <br \/>\r<br>You need to recommend a solution to meet the compliance requirements. <br \/>\r<br>What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. <br \/>\r<br><br><img decoding=\"async\" width=649 height=170 id=\"\u56fe\u7247 9\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image009-3.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_10' value='336623' \/><input type='hidden' id='answerType336623' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336623[]' id='textarea_q_336623' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-336624'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>Topic 2, Litware, inc. Case Study 2 <br \/>\r<br><br \/>\r<br>Overview <br \/>\r<br>Litware, inc. is a financial services company that has main offices in New York and San Francisco. litware has 30 branch offices and remote employees across the United States. The remote employees connect to the main offices by using a VPN. <br \/>\r<br>Litware has grown significantly during the last two years due to mergers and acquisitions. <br \/>\r<br>The acquisitions include several companies based in France. <br \/>\r<br><br \/>\r<br>Existing Environment <br \/>\r<br>Litware has an Azure Active Directory (Azure AD) tenant that syncs with an Active Directory Domain Services (AD D%) forest named Utvvare.com and is linked to 20 Azure subscriptions. Azure AD Connect is used to implement pass-through authentication. Password hash synchronization is disabled, and password writeback is enabled. All Litware users have Microsoft 365 E5 licenses. <br \/>\r<br>The environment also includes several AD DS forests, Azure AD tenants, and hundreds of Azure subscriptions that belong to the subsidiaries of Litware. <br \/>\r<br><br \/>\r<br>Planned Changes <br \/>\r<br>Litware plans to implement the following changes: <br \/>\r<br>&#8226; Create a management group hierarchy for each Azure AD tenant. <br \/>\r<br>&#8226; Design a landing zone strategy to refactor the existing Azure environment of Litware and deploy all future Azure workloads. <br \/>\r<br>&#8226; Implement Azure AD Application Proxy to provide secure access to internal applications that are currently accessed by using the VPN. <br \/>\r<br><br \/>\r<br>Business Requirements <br \/>\r<br>Litware identifies the following business requirements: <br \/>\r<br>&#8226; Minimize any additional on-premises infrastructure. <br \/>\r<br>&#8226; Minimize the operational costs associated with administrative overhead. <br \/>\r<br><br \/>\r<br>Hybrid Requirements <br \/>\r<br>Litware identifies the following hybrid cloud requirements: <br \/>\r<br>&#8226; Enable the management of on-premises resources from Azure, including the following: &#8226;Use Azure Policy for enforcement and compliance evaluation. <br \/>\r<br>&#8226; Provide change tracking and asset inventory. <br \/>\r<br>&#8226; Implement patch management. <br \/>\r<br>&#8226; Provide centralized, cross-tenant subscription management without the overhead of maintaining guest accounts. <br \/>\r<br><br \/>\r<br>Microsoft Sentinel Requirements <br \/>\r<br>Litware plans to leverage the security information and event management (SIEM) and security orchestration automated response (SOAK) capabilities of Microsoft Sentinel. The company wants to centralize Security Operations Center (SOQ by using Microsoft Sentinel. <br \/>\r<br><br \/>\r<br>Identity Requirements <br \/>\r<br>Litware identifies the following identity requirements: <br \/>\r<br>&#8226; Detect brute force attacks that directly target AD DS user accounts. <br \/>\r<br>&#8226; Implement leaked credential detection in the Azure AD tenant of Litware. <br \/>\r<br>&#8226; Prevent AD DS user accounts from being locked out by brute force attacks that target Azure AD user accounts. <br \/>\r<br>&#8226; Implement delegated management of users and groups in the Azure AD tenant of Litware, including support for. <br \/>\r<br>&#8226; The management of group properties, membership, and licensing &laquo; The management of user properties, passwords, and licensing <br \/>\r<br>&#8226; The delegation of user management based on business units. <br \/>\r<br><br \/>\r<br>Regulatory Compliance Requirements <br \/>\r<br>Litware identifies the following regulatory compliance requirements: <br \/>\r<br>&#8226; insure data residency compliance when collecting logs, telemetry, and data owned by each United States- and France-based subsidiary. <br \/>\r<br>&#8226; Leverage built-in Azure Policy definitions to evaluate regulatory compliance across the entire managed environment. <br \/>\r<br>&#8226; Use the principle of least privilege. <br \/>\r<br><br \/>\r<br>Azure Landing Zone Requirements <br \/>\r<br>Litware identifies the following landing zone requirements: <br \/>\r<br>&#8226; Route all internet-bound traffic from landing zones through Azure Firewall in a dedicated Azure subscription. <br \/>\r<br>&#8226; Provide a secure score scoped to the landing zone. <br \/>\r<br>&#8226; Ensure that the Azure virtual machines in each landing zone communicate with Azure App Service web apps in the same zone over the Microsoft backbone network, rather than over public endpoints. <br \/>\r<br>&#8226; Minimize the possibility of data exfiltration. <br \/>\r<br>&#8226; Maximize network bandwidth. <br \/>\r<br>The landing zone architecture will include the dedicated subscription, which will serve as the hub for internet and hybrid connectivity. <br \/>\r<br>Each landing zone will have the following characteristics: <br \/>\r<br>&#8226; Be created in a dedicated subscription. <br \/>\r<br>&#8226; Use a DNS namespace of litware.com. <br \/>\r<br><br \/>\r<br>Application Security Requirements <br \/>\r<br>Litware identifies the following application security requirements: <br \/>\r<br>&#8226; Identify internal applications that will support single sign-on (SSO) by using Azure AD Application Proxy. <br \/>\r<br>&#8226; Monitor and control access to Microsoft SharePoint Online and Exchange Online data in real time. <br \/>\r<br><br \/>\r<br>To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.<\/div><input type='hidden' name='question_id[]' id='qID_11' value='336624' \/><input type='hidden' id='answerType336624' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336624[]' id='answer-id-1316849' class='answer   answerof-336624 ' value='1316849'   \/><label for='answer-id-1316849' id='answer-label-1316849' class=' answer'><span>Security Assertion Markup Language (SAML)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336624[]' id='answer-id-1316850' class='answer   answerof-336624 ' value='1316850'   \/><label for='answer-id-1316850' id='answer-label-1316850' class=' answer'><span>NTLMv2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336624[]' id='answer-id-1316851' class='answer   answerof-336624 ' value='1316851'   \/><label for='answer-id-1316851' id='answer-label-1316851' class=' answer'><span>certificate-based authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336624[]' id='answer-id-1316852' class='answer   answerof-336624 ' value='1316852'   \/><label for='answer-id-1316852' id='answer-label-1316852' class=' answer'><span>Kerberos<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-336625'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>You need to recommend a solution for securing the landing zones. The solution must meet the landing zone requirements and the business requirements. <br \/>\r<br>What should you configure for each landing zone?<\/div><input type='hidden' name='question_id[]' id='qID_12' value='336625' \/><input type='hidden' id='answerType336625' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336625[]' id='answer-id-1316853' class='answer   answerof-336625 ' value='1316853'   \/><label for='answer-id-1316853' id='answer-label-1316853' class=' answer'><span>Azure DDoS Protection Standard<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336625[]' id='answer-id-1316854' class='answer   answerof-336625 ' value='1316854'   \/><label for='answer-id-1316854' id='answer-label-1316854' class=' answer'><span>an Azure Private DNS zone<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336625[]' id='answer-id-1316855' class='answer   answerof-336625 ' value='1316855'   \/><label for='answer-id-1316855' id='answer-label-1316855' class=' answer'><span>Microsoft Defender for Cloud<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336625[]' id='answer-id-1316856' class='answer   answerof-336625 ' value='1316856'   \/><label for='answer-id-1316856' id='answer-label-1316856' class=' answer'><span>an ExpressRoute gateway<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-336626'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>HOTSPOT <br \/>\r<br>You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements. <br \/>\r<br>What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point. <br \/>\r<br><br><img decoding=\"async\" width=651 height=181 id=\"\u56fe\u7247 2827\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image011-3.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_13' value='336626' \/><input type='hidden' id='answerType336626' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336626[]' id='textarea_q_336626' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-336627'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>HOTSPOT <br \/>\r<br>You need to recommend a multi-tenant and hybrid security solution that meets to the business requirements and the hybrid requirements. <br \/>\r<br>What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. <br \/>\r<br><br><img decoding=\"async\" width=649 height=204 id=\"\u56fe\u7247 11\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image013-2.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_14' value='336627' \/><input type='hidden' id='answerType336627' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336627[]' id='textarea_q_336627' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-336628'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>HOTSPOT <br \/>\r<br>You need to recommend a SIEM and SOAR strategy that meets the hybrid requirements, the Microsoft Sentinel requirements, and the regulatory compliance requirements. <br \/>\r<br>What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. <br \/>\r<br><br><img decoding=\"async\" width=649 height=161 id=\"\u56fe\u7247 2814\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image015-2.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_15' value='336628' \/><input type='hidden' id='answerType336628' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336628[]' id='textarea_q_336628' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-336629'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>HOTSPOT <br \/>\r<br>You need to recommend an identity security solution for the Azure AD tenant of Litware. The solution must meet the identity requirements and the regulatory compliance requirements. <br \/>\r<br>What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. <br \/>\r<br><br><img decoding=\"async\" width=649 height=132 id=\"\u56fe\u7247 19\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image017-2.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_16' value='336629' \/><input type='hidden' id='answerType336629' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336629[]' id='textarea_q_336629' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-336630'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>HOTSPOT <br \/>\r<br>You need to recommend a strategy for App Service web app connectivity. The solution must meet the landing zone requirements. <br \/>\r<br>What should you recommend? To answer, select the appropriate options in the answer area. NOTE Each correct selection is worth one point. <br \/>\r<br><br><img decoding=\"async\" width=650 height=247 id=\"\u56fe\u7247 2823\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image019-1.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_17' value='336630' \/><input type='hidden' id='answerType336630' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336630[]' id='textarea_q_336630' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-336631'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>HOTSPOT <br \/>\r<br>You need to recommend a solution to evaluate regulatory compliance across the entire managed environment. The solution must meet the regulatory compliance requirements and the business requirements. <br \/>\r<br>What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. <br \/>\r<br><br><img decoding=\"async\" width=651 height=163 id=\"\u56fe\u7247 15\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image021-1.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_18' value='336631' \/><input type='hidden' id='answerType336631' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336631[]' id='textarea_q_336631' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-336632'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>You need to design a strategy for securing the SharePoint Online and Exchange Online data. The solution must meet the application security requirements. <br \/>\r<br>Which two services should you leverage in the strategy? Each correct answer presents part of the solution. NOTE; Each correct selection is worth one point.<\/div><input type='hidden' name='question_id[]' id='qID_19' value='336632' \/><input type='hidden' id='answerType336632' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336632[]' id='answer-id-1316863' class='answer   answerof-336632 ' value='1316863'   \/><label for='answer-id-1316863' id='answer-label-1316863' class=' answer'><span>Azure AD Conditional Access<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336632[]' id='answer-id-1316864' class='answer   answerof-336632 ' value='1316864'   \/><label for='answer-id-1316864' id='answer-label-1316864' class=' answer'><span>Microsoft Defender for Cloud Apps<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336632[]' id='answer-id-1316865' class='answer   answerof-336632 ' value='1316865'   \/><label for='answer-id-1316865' id='answer-label-1316865' class=' answer'><span>Microsoft Defender for Cloud<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336632[]' id='answer-id-1316866' class='answer   answerof-336632 ' value='1316866'   \/><label for='answer-id-1316866' id='answer-label-1316866' class=' answer'><span>Microsoft Defender for Endpoint<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336632[]' id='answer-id-1316867' class='answer   answerof-336632 ' value='1316867'   \/><label for='answer-id-1316867' id='answer-label-1316867' class=' answer'><span>access reviews in Azure AD<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-336633'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>Topic 3, Mix Questions <br \/>\r<br><br \/>\r<br>Your company has on-premises Microsoft SQL Server databases. <br \/>\r<br>The company plans to move the databases to Azure. <br \/>\r<br>You need to recommend a secure architecture for the databases that will minimize operational requirements for patching and protect sensitive data by using dynamic data masking. The solution must minimize costs. <br \/>\r<br>What should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_20' value='336633' \/><input type='hidden' id='answerType336633' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336633[]' id='answer-id-1316868' class='answer   answerof-336633 ' value='1316868'   \/><label for='answer-id-1316868' id='answer-label-1316868' class=' answer'><span>Azure SQL Managed Instance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336633[]' id='answer-id-1316869' class='answer   answerof-336633 ' value='1316869'   \/><label for='answer-id-1316869' id='answer-label-1316869' class=' answer'><span>Azure Synapse Analytics dedicated SQL pools<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336633[]' id='answer-id-1316870' class='answer   answerof-336633 ' value='1316870'   \/><label for='answer-id-1316870' id='answer-label-1316870' class=' answer'><span>Azure SQL Database<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336633[]' id='answer-id-1316871' class='answer   answerof-336633 ' value='1316871'   \/><label for='answer-id-1316871' id='answer-label-1316871' class=' answer'><span>SQL Server on Azure Virtual Machines<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-336634'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>You have an Azure subscription that contains several storage accounts. The storage accounts are accessed by legacy applications that are authenticated by using access keys. <br \/>\r<br>You need to recommend a solution to prevent new applications from obtaining the access keys of the storage accounts. The solution must minimize the impact on the legacy applications. <br \/>\r<br>What should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_21' value='336634' \/><input type='hidden' id='answerType336634' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336634[]' id='answer-id-1316872' class='answer   answerof-336634 ' value='1316872'   \/><label for='answer-id-1316872' id='answer-label-1316872' class=' answer'><span>Apply read-only locks on the storage accounts.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336634[]' id='answer-id-1316873' class='answer   answerof-336634 ' value='1316873'   \/><label for='answer-id-1316873' id='answer-label-1316873' class=' answer'><span>Set the AllowSharcdKeyAccess property to false.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336634[]' id='answer-id-1316874' class='answer   answerof-336634 ' value='1316874'   \/><label for='answer-id-1316874' id='answer-label-1316874' class=' answer'><span>Set the AllowBlobPublicAcccss property to false.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336634[]' id='answer-id-1316875' class='answer   answerof-336634 ' value='1316875'   \/><label for='answer-id-1316875' id='answer-label-1316875' class=' answer'><span>Configure automated key rotation.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-336635'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>Azure subscription that uses Azure Storage. <br \/>\r<br>The company plans to share specific blobs with vendors. You need to recommend a solution to provide the vendors with secure access to specific blobs without exposing the blobs publicly. The access must be tme-Vimted. <br \/>\r<br>What should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_22' value='336635' \/><input type='hidden' id='answerType336635' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336635[]' id='answer-id-1316876' class='answer   answerof-336635 ' value='1316876'   \/><label for='answer-id-1316876' id='answer-label-1316876' class=' answer'><span>Create shared access signatures (SAS).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336635[]' id='answer-id-1316877' class='answer   answerof-336635 ' value='1316877'   \/><label for='answer-id-1316877' id='answer-label-1316877' class=' answer'><span>Share the connection string of the access key.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336635[]' id='answer-id-1316878' class='answer   answerof-336635 ' value='1316878'   \/><label for='answer-id-1316878' id='answer-label-1316878' class=' answer'><span>Configure private link connections.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336635[]' id='answer-id-1316879' class='answer   answerof-336635 ' value='1316879'   \/><label for='answer-id-1316879' id='answer-label-1316879' class=' answer'><span>Configure encryption by using customer-managed keys (CMKs)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-336636'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>You are planning the security requirements for Azure Cosmos DB Core (SQL) API accounts. You need to recommend a solution to audit all users that access the data in the Azure Cosmos DB accounts. <br \/>\r<br>Which two configurations should you include in the recommendation? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.<\/div><input type='hidden' name='question_id[]' id='qID_23' value='336636' \/><input type='hidden' id='answerType336636' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336636[]' id='answer-id-1316880' class='answer   answerof-336636 ' value='1316880'   \/><label for='answer-id-1316880' id='answer-label-1316880' class=' answer'><span>Enable Microsoft Defender for Cosmos D<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336636[]' id='answer-id-1316881' class='answer   answerof-336636 ' value='1316881'   \/><label for='answer-id-1316881' id='answer-label-1316881' class=' answer'><span>Send the Azure Active Directory (Azure AD) sign-in logs to a Log Analytics workspace.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336636[]' id='answer-id-1316882' class='answer   answerof-336636 ' value='1316882'   \/><label for='answer-id-1316882' id='answer-label-1316882' class=' answer'><span>Disable local authentication for Azure Cosmos D<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336636[]' id='answer-id-1316883' class='answer   answerof-336636 ' value='1316883'   \/><label for='answer-id-1316883' id='answer-label-1316883' class=' answer'><span>Enable Microsoft Defender for Identity.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336636[]' id='answer-id-1316884' class='answer   answerof-336636 ' value='1316884'   \/><label for='answer-id-1316884' id='answer-label-1316884' class=' answer'><span>Send the Azure Cosmos DB logs to a Log Analytics workspace.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-336637'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>You need to design a solution to provide administrators with secure remote access to the virtual machines. <br \/>\r<br>The solution must meet the following requirements: <br \/>\r<br>&#8226; Prevent the need to enable ports 3389 and 22 from the internet. <br \/>\r<br>&#8226; Only provide permission to connect the virtual machines when required. <br \/>\r<br>&#8226; Ensure that administrators use the Azure portal to connect to the virtual machines. <br \/>\r<br>Which two actions should you include in the solution? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.<\/div><input type='hidden' name='question_id[]' id='qID_24' value='336637' \/><input type='hidden' id='answerType336637' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336637[]' id='answer-id-1316885' class='answer   answerof-336637 ' value='1316885'   \/><label for='answer-id-1316885' id='answer-label-1316885' class=' answer'><span>Enable Azure Active Directory (Azure AD) Privileged Identity Management (PIM) roles as virtual machine contributors.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336637[]' id='answer-id-1316886' class='answer   answerof-336637 ' value='1316886'   \/><label for='answer-id-1316886' id='answer-label-1316886' class=' answer'><span>Configure Azure VPN Gateway.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336637[]' id='answer-id-1316887' class='answer   answerof-336637 ' value='1316887'   \/><label for='answer-id-1316887' id='answer-label-1316887' class=' answer'><span>Enable Just Enough Administration (JEA).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336637[]' id='answer-id-1316888' class='answer   answerof-336637 ' value='1316888'   \/><label for='answer-id-1316888' id='answer-label-1316888' class=' answer'><span>Enable just-in-time (JIT) VM access.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336637[]' id='answer-id-1316889' class='answer   answerof-336637 ' value='1316889'   \/><label for='answer-id-1316889' id='answer-label-1316889' class=' answer'><span>Configure Azure Bastion.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-336638'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>Your company is designing an application architecture for Azure App Service Environment (ASE) web apps as shown in the exhibit. (Click the Exhibit tab.) <br \/>\r<br><br><img decoding=\"async\" width=649 height=279 id=\"\u56fe\u7247 2899\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image023-1.jpg\"><br><br \/>\r<br>Communication between the on-premises network and Azure uses an ExpressRoute connection. <br \/>\r<br>You need to recommend a solution to ensure that the web apps can communicate with the on-premises application server. The solution must minimize the number of public IP addresses that are allowed to access the on-premises network. <br \/>\r<br>What should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_25' value='336638' \/><input type='hidden' id='answerType336638' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336638[]' id='answer-id-1316890' class='answer   answerof-336638 ' value='1316890'   \/><label for='answer-id-1316890' id='answer-label-1316890' class=' answer'><span>Azure Traffic Manager with priority traffic-routing methods<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336638[]' id='answer-id-1316891' class='answer   answerof-336638 ' value='1316891'   \/><label for='answer-id-1316891' id='answer-label-1316891' class=' answer'><span>Azure Application Gateway v2 with user-defined routes (UDRs).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336638[]' id='answer-id-1316892' class='answer   answerof-336638 ' value='1316892'   \/><label for='answer-id-1316892' id='answer-label-1316892' class=' answer'><span>Azure Front Door with Azure Web Application Firewall (WAF)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336638[]' id='answer-id-1316893' class='answer   answerof-336638 ' value='1316893'   \/><label for='answer-id-1316893' id='answer-label-1316893' class=' answer'><span>Azure Firewall with policy rule sets<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-336639'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>You have Windows 11 devices and Microsoft 365 E5 licenses. <br \/>\r<br>You need to recommend a solution to prevent users from accessing websites that contain adult content such as gambling sites. <br \/>\r<br>What should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_26' value='336639' \/><input type='hidden' id='answerType336639' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336639[]' id='answer-id-1316894' class='answer   answerof-336639 ' value='1316894'   \/><label for='answer-id-1316894' id='answer-label-1316894' class=' answer'><span>Microsoft Endpoint Manager<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336639[]' id='answer-id-1316895' class='answer   answerof-336639 ' value='1316895'   \/><label for='answer-id-1316895' id='answer-label-1316895' class=' answer'><span>Compliance Manager<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336639[]' id='answer-id-1316896' class='answer   answerof-336639 ' value='1316896'   \/><label for='answer-id-1316896' id='answer-label-1316896' class=' answer'><span>Microsoft Defender for Cloud Apps<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336639[]' id='answer-id-1316897' class='answer   answerof-336639 ' value='1316897'   \/><label for='answer-id-1316897' id='answer-label-1316897' class=' answer'><span>Microsoft Defender for Endpoint<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-336640'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>Your company plans to move all on-premises virtual machines to Azure. <br \/>\r<br>A network engineer proposes the Azure virtual network design shown in the following table. <br \/>\r<br><br><img decoding=\"async\" width=649 height=151 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image024-1.jpg\"><br><br \/>\r<br>You need to recommend an Azure Bastion deployment to provide secure remote access to all the virtual machines. <br \/>\r<br>Based on the virtual network design, how many Azure Bastion subnets are required?<\/div><input type='hidden' name='question_id[]' id='qID_27' value='336640' \/><input type='hidden' id='answerType336640' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336640[]' id='answer-id-1316898' class='answer   answerof-336640 ' value='1316898'   \/><label for='answer-id-1316898' id='answer-label-1316898' class=' answer'><span>1<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336640[]' id='answer-id-1316899' class='answer   answerof-336640 ' value='1316899'   \/><label for='answer-id-1316899' id='answer-label-1316899' class=' answer'><span>2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336640[]' id='answer-id-1316900' class='answer   answerof-336640 ' value='1316900'   \/><label for='answer-id-1316900' id='answer-label-1316900' class=' answer'><span>3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336640[]' id='answer-id-1316901' class='answer   answerof-336640 ' value='1316901'   \/><label for='answer-id-1316901' id='answer-label-1316901' class=' answer'><span>4<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336640[]' id='answer-id-1316902' class='answer   answerof-336640 ' value='1316902'   \/><label for='answer-id-1316902' id='answer-label-1316902' class=' answer'><span>5<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-336641'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>HOTSPOT <br \/>\r<br>You open Microsoft Defender for Cloud as shown in the following exhibit. <br \/>\r<br><br><img decoding=\"async\" width=649 height=505 id=\"\u56fe\u7247 27\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image025-1.jpg\"><br><br \/>\r<br>Use the drop-down menus to select the answer choice that complete each statements based on the information presented in the graphic. NOTE: Each correct selection is worth one point. <br \/>\r<br><br><img decoding=\"async\" width=649 height=146 id=\"\u56fe\u7247 2907\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image026-1.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_28' value='336641' \/><input type='hidden' id='answerType336641' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336641[]' id='textarea_q_336641' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-336642'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>You have an Azure subscription that has Microsoft Defender for Cloud enabled. You need to enforce ISO 2700V2013 standards for the subscription. The solution must ensure that noncompliant resources are remediated automatically <br \/>\r<br>What should you use?<\/div><input type='hidden' name='question_id[]' id='qID_29' value='336642' \/><input type='hidden' id='answerType336642' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336642[]' id='answer-id-1316904' class='answer   answerof-336642 ' value='1316904'   \/><label for='answer-id-1316904' id='answer-label-1316904' class=' answer'><span>the regulatory compliance dashboard in Defender for Cloud<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336642[]' id='answer-id-1316905' class='answer   answerof-336642 ' value='1316905'   \/><label for='answer-id-1316905' id='answer-label-1316905' class=' answer'><span>Azure Policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336642[]' id='answer-id-1316906' class='answer   answerof-336642 ' value='1316906'   \/><label for='answer-id-1316906' id='answer-label-1316906' class=' answer'><span>Azure Blueprints<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336642[]' id='answer-id-1316907' class='answer   answerof-336642 ' value='1316907'   \/><label for='answer-id-1316907' id='answer-label-1316907' class=' answer'><span>Azure role-based access control (Azure RBAC)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-336643'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>You receive a security alert in Microsoft Defender for Cloud as shown in the exhibit. (Click the Exhibit tab.) <br \/>\r<br><br><img decoding=\"async\" width=649 height=335 id=\"\u56fe\u7247 2864\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image028-1.jpg\"><br><br \/>\r<br>After remediating the threat which policy definition should you assign to prevent the threat from reoccurring?<\/div><input type='hidden' name='question_id[]' id='qID_30' value='336643' \/><input type='hidden' id='answerType336643' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336643[]' id='answer-id-1316908' class='answer   answerof-336643 ' value='1316908'   \/><label for='answer-id-1316908' id='answer-label-1316908' class=' answer'><span>Storage account public access should be disallowed<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336643[]' id='answer-id-1316909' class='answer   answerof-336643 ' value='1316909'   \/><label for='answer-id-1316909' id='answer-label-1316909' class=' answer'><span>Azure Key Vault Managed HSM should have purge protection enabled<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336643[]' id='answer-id-1316910' class='answer   answerof-336643 ' value='1316910'   \/><label for='answer-id-1316910' id='answer-label-1316910' class=' answer'><span>Storage accounts should prevent shared key access<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336643[]' id='answer-id-1316911' class='answer   answerof-336643 ' value='1316911'   \/><label for='answer-id-1316911' id='answer-label-1316911' class=' answer'><span>Storage account keys should not be expired<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-31' style=';'><div id='questionWrap-31'  class='   watupro-question-id-336644'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>31. <\/span>Your company is preparing for cloud adoption. <br \/>\r<br>You are designing security for Azure landing zones. <br \/>\r<br>Which two preventative controls can you implement to increase the secure score? Each NOTE: Each correct selection is worth one point.<\/div><input type='hidden' name='question_id[]' id='qID_31' value='336644' \/><input type='hidden' id='answerType336644' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336644[]' id='answer-id-1316912' class='answer   answerof-336644 ' value='1316912'   \/><label for='answer-id-1316912' id='answer-label-1316912' class=' answer'><span>Azure Firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336644[]' id='answer-id-1316913' class='answer   answerof-336644 ' value='1316913'   \/><label for='answer-id-1316913' id='answer-label-1316913' class=' answer'><span>Azure Web Application Firewall (WAF)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336644[]' id='answer-id-1316914' class='answer   answerof-336644 ' value='1316914'   \/><label for='answer-id-1316914' id='answer-label-1316914' class=' answer'><span>Microsoft Defender for Cloud alerts<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336644[]' id='answer-id-1316915' class='answer   answerof-336644 ' value='1316915'   \/><label for='answer-id-1316915' id='answer-label-1316915' class=' answer'><span>Azure Active Directory (Azure AD Privileged Identity Management (PIM)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336644[]' id='answer-id-1316916' class='answer   answerof-336644 ' value='1316916'   \/><label for='answer-id-1316916' id='answer-label-1316916' class=' answer'><span>Microsoft Sentinel<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-32' style=';'><div id='questionWrap-32'  class='   watupro-question-id-336645'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>32. <\/span>HOTSPOT <br \/>\r<br>You have a Microsoft 365 E5 subscription and an Azure subscripts. <br \/>\r<br>You need to evaluate the existing environment to increase the overall security posture for the following components: <br \/>\r<br>&#8226; Windows 11 devices managed by Microsoft Intune <br \/>\r<br>&#8226; Azure Storage accounts <br \/>\r<br>&#8226; Azure virtual machines <br \/>\r<br>What should you use to evaluate the components? To answer, select the appropriate options in the answer area. <br \/>\r<br><br><img decoding=\"async\" width=511 height=414 id=\"\u56fe\u7247 2847\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image029-1.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_32' value='336645' \/><input type='hidden' id='answerType336645' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336645[]' id='textarea_q_336645' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-33' style=';'><div id='questionWrap-33'  class='   watupro-question-id-336646'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>33. <\/span>You are designing security for an Azure landing zone. <br \/>\r<br>Your company identifies the following compliance and privacy requirements: <br \/>\r<br>&#8226; Encrypt cardholder data by using encryption keys managed by the company. <br \/>\r<br>&#8226; Encrypt insurance claim files by using encryption keys hosted on-premises. <br \/>\r<br>Which two configurations meet the compliance and privacy requirements? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.<\/div><input type='hidden' name='question_id[]' id='qID_33' value='336646' \/><input type='hidden' id='answerType336646' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336646[]' id='answer-id-1316918' class='answer   answerof-336646 ' value='1316918'   \/><label for='answer-id-1316918' id='answer-label-1316918' class=' answer'><span>Store the insurance claim data in Azure Blob storage encrypted by using customer-provided keys.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336646[]' id='answer-id-1316919' class='answer   answerof-336646 ' value='1316919'   \/><label for='answer-id-1316919' id='answer-label-1316919' class=' answer'><span>Store the cardholder data in an Azure SQL database that is encrypted by using keys stored in Azure Key Vault Managed HSM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336646[]' id='answer-id-1316920' class='answer   answerof-336646 ' value='1316920'   \/><label for='answer-id-1316920' id='answer-label-1316920' class=' answer'><span>Store the insurance claim data in Azure Files encrypted by using Azure Key Vault Managed HS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336646[]' id='answer-id-1316921' class='answer   answerof-336646 ' value='1316921'   \/><label for='answer-id-1316921' id='answer-label-1316921' class=' answer'><span>Store the cardholder data in an Azure SQL database that is encrypted by using Microsoft-managed Keys.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-34' style=';'><div id='questionWrap-34'  class='   watupro-question-id-336647'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>34. <\/span>Your company finalizes the adoption of Azure and is implementing Microsoft Defender for Cloud. <br \/>\r<br>You receive the following recommendations in Defender for Cloud <br \/>\r<br>&#8226; Access to storage accounts with firewall and virtual network configurations should be restricted, <br \/>\r<br>&#8226; Storage accounts should restrict network access using virtual network rules. <br \/>\r<br>&#8226; Storage account should use a private link connection. <br \/>\r<br>&#8226; Storage account public access should be disallowed. <br \/>\r<br>You need to recommend a service to mitigate identified risks that relate to the recommendations. <br \/>\r<br>What should you recommend?<\/div><input type='hidden' name='question_id[]' id='qID_34' value='336647' \/><input type='hidden' id='answerType336647' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336647[]' id='answer-id-1316922' class='answer   answerof-336647 ' value='1316922'   \/><label for='answer-id-1316922' id='answer-label-1316922' class=' answer'><span>Azure Storage Analytics<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336647[]' id='answer-id-1316923' class='answer   answerof-336647 ' value='1316923'   \/><label for='answer-id-1316923' id='answer-label-1316923' class=' answer'><span>Azure Network Watcher<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336647[]' id='answer-id-1316924' class='answer   answerof-336647 ' value='1316924'   \/><label for='answer-id-1316924' id='answer-label-1316924' class=' answer'><span>Microsoft Sentinel<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336647[]' id='answer-id-1316925' class='answer   answerof-336647 ' value='1316925'   \/><label for='answer-id-1316925' id='answer-label-1316925' class=' answer'><span>Azure Policy<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-35' style=';'><div id='questionWrap-35'  class='   watupro-question-id-336648'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>35. <\/span>You have 50 Azure subscriptions. <br \/>\r<br>You need to monitor resource in the subscriptions for compliance with the ISO 27001:2013 standards. <br \/>\r<br>The solution must minimize the effort required to modify the list of monitored policy definitions for the subscriptions. NOTE: Each correct selection is worth one point.<\/div><input type='hidden' name='question_id[]' id='qID_35' value='336648' \/><input type='hidden' id='answerType336648' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336648[]' id='answer-id-1316926' class='answer   answerof-336648 ' value='1316926'   \/><label for='answer-id-1316926' id='answer-label-1316926' class=' answer'><span>Assign an initiative to a management group.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336648[]' id='answer-id-1316927' class='answer   answerof-336648 ' value='1316927'   \/><label for='answer-id-1316927' id='answer-label-1316927' class=' answer'><span>Assign a policy to each subscription.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336648[]' id='answer-id-1316928' class='answer   answerof-336648 ' value='1316928'   \/><label for='answer-id-1316928' id='answer-label-1316928' class=' answer'><span>Assign a policy to a management group.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336648[]' id='answer-id-1316929' class='answer   answerof-336648 ' value='1316929'   \/><label for='answer-id-1316929' id='answer-label-1316929' class=' answer'><span>Assign an initiative to each subscription.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336648[]' id='answer-id-1316930' class='answer   answerof-336648 ' value='1316930'   \/><label for='answer-id-1316930' id='answer-label-1316930' class=' answer'><span>Assign a blueprint to each subscription.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336648[]' id='answer-id-1316931' class='answer   answerof-336648 ' value='1316931'   \/><label for='answer-id-1316931' id='answer-label-1316931' class=' answer'><span>Assign a blueprint to a management group.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-36' style=';'><div id='questionWrap-36'  class='   watupro-question-id-336649'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>36. <\/span>HOTSPOT <br \/>\r<br>Your company has an Azure App Service plan that is used to deploy containerized web apps. You are designing a secure DevOps strategy for deploying the web apps to the App Service plan. You need to recommend a strategy to integrate code scanning tools into a secure software development lifecycle. The code must be scanned during the following two phases: Uploading the code to repositories Building containers <br \/>\r<br>Where should you integrate code scanning for each phase? To answer, select the appropriate options in the answer area. <br \/>\r<br><br><img decoding=\"async\" width=649 height=186 id=\"\u56fe\u7247 25\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image031-1.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_36' value='336649' \/><input type='hidden' id='answerType336649' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336649[]' id='textarea_q_336649' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-37' style=';'><div id='questionWrap-37'  class='   watupro-question-id-336650'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>37. <\/span>Your company has a Microsoft 365 E5 subscription. The company wants to identify and classify data in Microsoft Teams, SharePoint Online, and Exchange Online. You need to recommend a solution to identify documents that contain sensitive information. <br \/>\r<br>What should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_37' value='336650' \/><input type='hidden' id='answerType336650' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336650[]' id='answer-id-1316933' class='answer   answerof-336650 ' value='1316933'   \/><label for='answer-id-1316933' id='answer-label-1316933' class=' answer'><span>data classification content explorer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336650[]' id='answer-id-1316934' class='answer   answerof-336650 ' value='1316934'   \/><label for='answer-id-1316934' id='answer-label-1316934' class=' answer'><span>data loss prevention (DLP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336650[]' id='answer-id-1316935' class='answer   answerof-336650 ' value='1316935'   \/><label for='answer-id-1316935' id='answer-label-1316935' class=' answer'><span>eDiscovery<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336650[]' id='answer-id-1316936' class='answer   answerof-336650 ' value='1316936'   \/><label for='answer-id-1316936' id='answer-label-1316936' class=' answer'><span>Information Governance<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-38' style=';'><div id='questionWrap-38'  class='   watupro-question-id-336651'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>38. <\/span>Your company is developing an invoicing application that will use Azure Active Directory (Azure AD) B2C. The application will be deployed as an App Service web app. You need to recommend a solution to the application development team to secure the application from identity related attacks. <br \/>\r<br>Which two configurations should you recommend? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.<\/div><input type='hidden' name='question_id[]' id='qID_38' value='336651' \/><input type='hidden' id='answerType336651' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336651[]' id='answer-id-1316937' class='answer   answerof-336651 ' value='1316937'   \/><label for='answer-id-1316937' id='answer-label-1316937' class=' answer'><span>Azure AD Conditional Access integration with user flows and custom policies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336651[]' id='answer-id-1316938' class='answer   answerof-336651 ' value='1316938'   \/><label for='answer-id-1316938' id='answer-label-1316938' class=' answer'><span>Azure AD workbooks to monitor risk detections<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336651[]' id='answer-id-1316939' class='answer   answerof-336651 ' value='1316939'   \/><label for='answer-id-1316939' id='answer-label-1316939' class=' answer'><span>custom resource owner password credentials (ROPC) flows in Azure AD B2C<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336651[]' id='answer-id-1316940' class='answer   answerof-336651 ' value='1316940'   \/><label for='answer-id-1316940' id='answer-label-1316940' class=' answer'><span>access packages in Identity Governance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336651[]' id='answer-id-1316941' class='answer   answerof-336651 ' value='1316941'   \/><label for='answer-id-1316941' id='answer-label-1316941' class=' answer'><span>smart account lockout in Azure AD B2C<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-39' style=';'><div id='questionWrap-39'  class='   watupro-question-id-336652'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>39. <\/span>Your company has a Microsoft 365 E5 subscription. <br \/>\r<br>Users use Microsoft Teams, Exchange Online, SharePoint Online, and OneDrive for sharing and collaborating. The company identifies protected health information (PHI) within stored documents and communications. <br \/>\r<br>What should you recommend using to prevent the PHI from being shared outside the company?<\/div><input type='hidden' name='question_id[]' id='qID_39' value='336652' \/><input type='hidden' id='answerType336652' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336652[]' id='answer-id-1316942' class='answer   answerof-336652 ' value='1316942'   \/><label for='answer-id-1316942' id='answer-label-1316942' class=' answer'><span>insider risk management policies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336652[]' id='answer-id-1316943' class='answer   answerof-336652 ' value='1316943'   \/><label for='answer-id-1316943' id='answer-label-1316943' class=' answer'><span>data loss prevention (DLP) policies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336652[]' id='answer-id-1316944' class='answer   answerof-336652 ' value='1316944'   \/><label for='answer-id-1316944' id='answer-label-1316944' class=' answer'><span>sensitivity label policies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336652[]' id='answer-id-1316945' class='answer   answerof-336652 ' value='1316945'   \/><label for='answer-id-1316945' id='answer-label-1316945' class=' answer'><span>retention policies<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-40' style=';'><div id='questionWrap-40'  class='   watupro-question-id-336653'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>40. <\/span>You are designing the security standards for containerized applications onboarded to Azure. You are evaluating the use of Microsoft Defender for Containers. <br \/>\r<br>In which two environments can you use Defender for Containers to scan for known vulnerabilities? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.<\/div><input type='hidden' name='question_id[]' id='qID_40' value='336653' \/><input type='hidden' id='answerType336653' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336653[]' id='answer-id-1316946' class='answer   answerof-336653 ' value='1316946'   \/><label for='answer-id-1316946' id='answer-label-1316946' class=' answer'><span>Linux containers deployed to Azure Container Registry<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336653[]' id='answer-id-1316947' class='answer   answerof-336653 ' value='1316947'   \/><label for='answer-id-1316947' id='answer-label-1316947' class=' answer'><span>Linux containers deployed to Azure Kubernetes Service (AKS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336653[]' id='answer-id-1316948' class='answer   answerof-336653 ' value='1316948'   \/><label for='answer-id-1316948' id='answer-label-1316948' class=' answer'><span>Windows containers deployed to Azure Container Registry<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336653[]' id='answer-id-1316949' class='answer   answerof-336653 ' value='1316949'   \/><label for='answer-id-1316949' id='answer-label-1316949' class=' answer'><span>Windows containers deployed to Azure Kubernetes Service (AKS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336653[]' id='answer-id-1316950' class='answer   answerof-336653 ' value='1316950'   \/><label for='answer-id-1316950' id='answer-label-1316950' class=' answer'><span>Linux containers deployed to Azure Container Instances<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-41' style=';'><div id='questionWrap-41'  class='   watupro-question-id-336654'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>41. <\/span>HOTSPOT <br \/>\r<br>You are creating the security recommendations for an Azure App Service web app named App1. <br \/>\r<br>App1 has the following specifications: <br \/>\r<br>&#8226; Users will request access to App1 through the My Apps portal. A human resources manager will approve the requests. <br \/>\r<br>&#8226; Users will authenticate by using Azure Active Directory (Azure AD) user accounts. <br \/>\r<br>You need to recommend an access security architecture for App1. <br \/>\r<br>What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. <br \/>\r<br><br><img decoding=\"async\" width=638 height=167 id=\"\u56fe\u7247 51\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image033-1.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_41' value='336654' \/><input type='hidden' id='answerType336654' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336654[]' id='textarea_q_336654' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-42' style=';'><div id='questionWrap-42'  class='   watupro-question-id-336655'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>42. <\/span>Your company has an on-premises network and an Azure subscription. <br \/>\r<br>The company does NOT have a Site-to-Site VPN or an ExpressRoute connection to Azure. <br \/>\r<br>You are designing the security standards for Azure App Service web apps. The web apps will access Microsoft SQL Server databases on the network. <br \/>\r<br>You need to recommend security standards that will allow the web apps to access the databases. The solution must minimize the number of open internet-accessible endpoints to the on-premises network. <br \/>\r<br>What should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_42' value='336655' \/><input type='hidden' id='answerType336655' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336655[]' id='answer-id-1316952' class='answer   answerof-336655 ' value='1316952'   \/><label for='answer-id-1316952' id='answer-label-1316952' class=' answer'><span>a private endpoint<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336655[]' id='answer-id-1316953' class='answer   answerof-336655 ' value='1316953'   \/><label for='answer-id-1316953' id='answer-label-1316953' class=' answer'><span>hybrid connections<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336655[]' id='answer-id-1316954' class='answer   answerof-336655 ' value='1316954'   \/><label for='answer-id-1316954' id='answer-label-1316954' class=' answer'><span>virtual network NAT gateway integration<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336655[]' id='answer-id-1316955' class='answer   answerof-336655 ' value='1316955'   \/><label for='answer-id-1316955' id='answer-label-1316955' class=' answer'><span>virtual network integration<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-43' style=';'><div id='questionWrap-43'  class='   watupro-question-id-336656'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>43. <\/span>Your company has a hybrid cloud infrastructure that contains an on-premises Active Directory Domain Services (AD DS) forest, a Microsoft B65 subscription, and an Azure subscription. <br \/>\r<br>The company's on-premises network contains internal web apps that use Kerberos authentication. <br \/>\r<br>Currently, the web apps are accessible only from the network. <br \/>\r<br>You have remote users who have personal devices that run Windows 11. <br \/>\r<br>You need to recommend a solution to provide the remote users with the ability to access the web apps. The solution must meet the following requirements: <br \/>\r<br>&#8226; Prevent the remote users from accessing any other resources on the network. <br \/>\r<br>&#8226; Support Azure Active Directory (Azure AD) Conditional Access. <br \/>\r<br>&#8226; Simplify the end-user experience. <br \/>\r<br>What should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_43' value='336656' \/><input type='hidden' id='answerType336656' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336656[]' id='answer-id-1316956' class='answer   answerof-336656 ' value='1316956'   \/><label for='answer-id-1316956' id='answer-label-1316956' class=' answer'><span>Azure AD Application Proxy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336656[]' id='answer-id-1316957' class='answer   answerof-336656 ' value='1316957'   \/><label for='answer-id-1316957' id='answer-label-1316957' class=' answer'><span>Azure Virtual WAN<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336656[]' id='answer-id-1316958' class='answer   answerof-336656 ' value='1316958'   \/><label for='answer-id-1316958' id='answer-label-1316958' class=' answer'><span>Microsoft Tunnel<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336656[]' id='answer-id-1316959' class='answer   answerof-336656 ' value='1316959'   \/><label for='answer-id-1316959' id='answer-label-1316959' class=' answer'><span>web content filtering in Microsoft Defender for Endpoint<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-44' style=';'><div id='questionWrap-44'  class='   watupro-question-id-336657'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>44. <\/span>DRAG DROP <br \/>\r<br>You have a Microsoft 365 subscription <br \/>\r<br>You need to recommend a security solution to monitor the following activities: <br \/>\r<br>&#8226; User accounts that were potentially compromised <br \/>\r<br>&#8226; Users performing bulk file downloads from Microsoft SharePoint Online <br \/>\r<br>What should you include in the recommendation for each activity? To answer, drag the appropriate components to the correct activities. Each component may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. NOTE: Each Correct selection is worth one Point. <br \/>\r<br><br><img decoding=\"async\" width=649 height=139 id=\"\u56fe\u7247 2913\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image035-1.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_44' value='336657' \/><input type='hidden' id='answerType336657' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336657[]' id='textarea_q_336657' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-45' style=';'><div id='questionWrap-45'  class='   watupro-question-id-336658'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>45. <\/span>HOTSPOT <br \/>\r<br>Your company uses Microsoft Defender for Cloud and Microsoft Sentinel. <br \/>\r<br>The company is designing an application that will have the architecture shown in the following exhibit. <br \/>\r<br><br><img decoding=\"async\" width=649 height=157 id=\"\u56fe\u7247 2831\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image037-1.jpg\"><br><br \/>\r<br>You are designing a logging and auditing solution for the proposed architecture. <br \/>\r<br>The solution must meet the following requirements: <br \/>\r<br>&#8226; Integrate Azure Web Application Firewall (WAF) logs with Microsoft Sentinel. <br \/>\r<br>&#8226; Use Defender for Cloud to review alerts from the virtual machines. <br \/>\r<br>What should you include in the solution? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. <br \/>\r<br><br><img decoding=\"async\" width=649 height=227 id=\"\u56fe\u7247 35\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image038-1.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_45' value='336658' \/><input type='hidden' id='answerType336658' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336658[]' id='textarea_q_336658' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-46' style=';'><div id='questionWrap-46'  class='   watupro-question-id-336659'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>46. <\/span>Your company has a third-party security information and event management (SIEM) solution that uses Splunk and Microsoft Sentinel. You plan to integrate Microsoft Sentinel with Splunk. <br \/>\r<br>You need to recommend a solution to send security events from Microsoft Sentinel to Splunk. <br \/>\r<br>What should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_46' value='336659' \/><input type='hidden' id='answerType336659' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336659[]' id='answer-id-1316962' class='answer   answerof-336659 ' value='1316962'   \/><label for='answer-id-1316962' id='answer-label-1316962' class=' answer'><span>Azure Event Hubs<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336659[]' id='answer-id-1316963' class='answer   answerof-336659 ' value='1316963'   \/><label for='answer-id-1316963' id='answer-label-1316963' class=' answer'><span>Azure Data Factor<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336659[]' id='answer-id-1316964' class='answer   answerof-336659 ' value='1316964'   \/><label for='answer-id-1316964' id='answer-label-1316964' class=' answer'><span>a Microsoft Sentinel workbook<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336659[]' id='answer-id-1316965' class='answer   answerof-336659 ' value='1316965'   \/><label for='answer-id-1316965' id='answer-label-1316965' class=' answer'><span>a Microsoft Sentinel data connector<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-47' style=';'><div id='questionWrap-47'  class='   watupro-question-id-336660'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>47. <\/span>You have an Azure subscription that has Microsoft Defender for Cloud enabled. You have an Amazon <br \/>\r<br>Web Services (AWS) implementation. <br \/>\r<br>You plan to extend the Azure security strategy to the AWS implementation. The solution will NOT use Azure Arc. <br \/>\r<br>Which three services can you use to provide security for the AWS resources? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.<\/div><input type='hidden' name='question_id[]' id='qID_47' value='336660' \/><input type='hidden' id='answerType336660' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336660[]' id='answer-id-1316966' class='answer   answerof-336660 ' value='1316966'   \/><label for='answer-id-1316966' id='answer-label-1316966' class=' answer'><span>Azure Active Directory (Azure AD) Privileged Identity Management (PIM)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336660[]' id='answer-id-1316967' class='answer   answerof-336660 ' value='1316967'   \/><label for='answer-id-1316967' id='answer-label-1316967' class=' answer'><span>Azure Active Directory (Azure AD) Conditional Access<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336660[]' id='answer-id-1316968' class='answer   answerof-336660 ' value='1316968'   \/><label for='answer-id-1316968' id='answer-label-1316968' class=' answer'><span>Microsoft Defender for servers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336660[]' id='answer-id-1316969' class='answer   answerof-336660 ' value='1316969'   \/><label for='answer-id-1316969' id='answer-label-1316969' class=' answer'><span>Azure Policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336660[]' id='answer-id-1316970' class='answer   answerof-336660 ' value='1316970'   \/><label for='answer-id-1316970' id='answer-label-1316970' class=' answer'><span>Microsoft Defender for Containers<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-48' style=';'><div id='questionWrap-48'  class='   watupro-question-id-336661'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>48. <\/span>You have an on-premises network that has several legacy applications. The applications perform LDAP queries against an existing directory service. You are migrating the on-premises infrastructure to a cloud-only infrastructure. <br \/>\r<br>You need to recommend an identity solution for the infrastructure that supports the legacy applications. The solution must minimize the administrative effort to maintain the infrastructure. <br \/>\r<br>Which identity service should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_48' value='336661' \/><input type='hidden' id='answerType336661' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336661[]' id='answer-id-1316971' class='answer   answerof-336661 ' value='1316971'   \/><label for='answer-id-1316971' id='answer-label-1316971' class=' answer'><span>Azure Active Directory Domain Services (Azure AD DS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336661[]' id='answer-id-1316972' class='answer   answerof-336661 ' value='1316972'   \/><label for='answer-id-1316972' id='answer-label-1316972' class=' answer'><span>Azure Active Directory (Azure AD) B2C<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336661[]' id='answer-id-1316973' class='answer   answerof-336661 ' value='1316973'   \/><label for='answer-id-1316973' id='answer-label-1316973' class=' answer'><span>Azure Active Directory (Azure AD)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336661[]' id='answer-id-1316974' class='answer   answerof-336661 ' value='1316974'   \/><label for='answer-id-1316974' id='answer-label-1316974' class=' answer'><span>Active Directory Domain Services (AD DS)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-49' style=';'><div id='questionWrap-49'  class='   watupro-question-id-336662'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>49. <\/span>HOTSPOT <br \/>\r<br>Your company has a Microsoft 365 E5 subscription, an Azure subscription, on-premises applications, and Active Directory Domain Services (AD DS). <br \/>\r<br>You need to recommend an identity security strategy that meets the following requirements: <br \/>\r<br>&#8226; Ensures that customers can use their Facebook credentials to authenticate to an Azure App Service website <br \/>\r<br>&#8226; Ensures that partner companies can access Microsoft SharePoint Online sites for the project to which they are assigned <br \/>\r<br>The solution must minimize the need to deploy additional infrastructure components. <br \/>\r<br>What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. <br \/>\r<br><br><img decoding=\"async\" width=644 height=204 id=\"\u56fe\u7247 47\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image040-1.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_49' value='336662' \/><input type='hidden' id='answerType336662' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336662[]' id='textarea_q_336662' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-50' style=';'><div id='questionWrap-50'  class='   watupro-question-id-336663'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>50. <\/span>You have an Azure subscription that has Microsoft Defender for Cloud enabled. You are evaluating the Azure Security Benchmark V3 report. <br \/>\r<br>In the Secure management ports controls, you discover that you have 0 out of a potential 8 points. You need to recommend configurations to increase the score of the Secure management ports controls. Solution: You recommend enabling adaptive network hardening. Does this meet the goal?<\/div><input type='hidden' name='question_id[]' id='qID_50' value='336663' \/><input type='hidden' id='answerType336663' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336663[]' id='answer-id-1316976' class='answer   answerof-336663 ' value='1316976'   \/><label for='answer-id-1316976' id='answer-label-1316976' class=' answer'><span>Yes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336663[]' id='answer-id-1316977' class='answer   answerof-336663 ' value='1316977'   \/><label for='answer-id-1316977' id='answer-label-1316977' class=' answer'><span>No<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-51' style=';'><div id='questionWrap-51'  class='   watupro-question-id-336664'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>51. <\/span>You have an Azure subscription that has Microsoft Defender for Cloud enabled. You are evaluating <br \/>\r<br>the Azure Security Benchmark V3 report. <br \/>\r<br>In the Secure management ports controls, you discover that you have 0 out of a potential 8 points. You need to recommend configurations to increase the score of the Secure management ports controls. <br \/>\r<br>Solution: You recommend onboarding all virtual machines to Microsoft Defender for Endpoint. <br \/>\r<br>Does this meet the goal?<\/div><input type='hidden' name='question_id[]' id='qID_51' value='336664' \/><input type='hidden' id='answerType336664' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336664[]' id='answer-id-1316978' class='answer   answerof-336664 ' value='1316978'   \/><label for='answer-id-1316978' id='answer-label-1316978' class=' answer'><span>Yes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336664[]' id='answer-id-1316979' class='answer   answerof-336664 ' value='1316979'   \/><label for='answer-id-1316979' id='answer-label-1316979' class=' answer'><span>No<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-52' style=';'><div id='questionWrap-52'  class='   watupro-question-id-336665'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>52. <\/span>You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance. <br \/>\r<br>You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance. <br \/>\r<br>Solution: You recommend configuring gateway-required virtual network integration. <br \/>\r<br>Does this meet the goal?<\/div><input type='hidden' name='question_id[]' id='qID_52' value='336665' \/><input type='hidden' id='answerType336665' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336665[]' id='answer-id-1316980' class='answer   answerof-336665 ' value='1316980'   \/><label for='answer-id-1316980' id='answer-label-1316980' class=' answer'><span>Yes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336665[]' id='answer-id-1316981' class='answer   answerof-336665 ' value='1316981'   \/><label for='answer-id-1316981' id='answer-label-1316981' class=' answer'><span>No<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-53' style=';'><div id='questionWrap-53'  class='   watupro-question-id-336666'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>53. <\/span>You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance. <br \/>\r<br>You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance. <br \/>\r<br>Solution: You recommend access restrictions to allow traffic from the backend IP address of the Front Door instance. <br \/>\r<br>Does this meet the goal?<\/div><input type='hidden' name='question_id[]' id='qID_53' value='336666' \/><input type='hidden' id='answerType336666' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336666[]' id='answer-id-1316982' class='answer   answerof-336666 ' value='1316982'   \/><label for='answer-id-1316982' id='answer-label-1316982' class=' answer'><span>Yes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336666[]' id='answer-id-1316983' class='answer   answerof-336666 ' value='1316983'   \/><label for='answer-id-1316983' id='answer-label-1316983' class=' answer'><span>No<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-54' style=';'><div id='questionWrap-54'  class='   watupro-question-id-336667'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>54. <\/span>You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance. <br \/>\r<br>You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance. <br \/>\r<br>Solution: You recommend access restrictions that allow traffic from the Front Door service tags. <br \/>\r<br>Does this meet the goal?<\/div><input type='hidden' name='question_id[]' id='qID_54' value='336667' \/><input type='hidden' id='answerType336667' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336667[]' id='answer-id-1316984' class='answer   answerof-336667 ' value='1316984'   \/><label for='answer-id-1316984' id='answer-label-1316984' class=' answer'><span>Yes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336667[]' id='answer-id-1316985' class='answer   answerof-336667 ' value='1316985'   \/><label for='answer-id-1316985' id='answer-label-1316985' class=' answer'><span>No<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-55' style=';'><div id='questionWrap-55'  class='   watupro-question-id-336668'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>55. <\/span>You are creating an application lifecycle management process based on the Microsoft Security Development Lifecycle (SDL). <br \/>\r<br>You need to recommend a security standard for onboarding applications to Azure. The standard will include recommendations for application design, development, and deployment. <br \/>\r<br>What should you include during the application design phase?<\/div><input type='hidden' name='question_id[]' id='qID_55' value='336668' \/><input type='hidden' id='answerType336668' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336668[]' id='answer-id-1316986' class='answer   answerof-336668 ' value='1316986'   \/><label for='answer-id-1316986' id='answer-label-1316986' class=' answer'><span>static application security testing (SAST) by using SonarQube<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336668[]' id='answer-id-1316987' class='answer   answerof-336668 ' value='1316987'   \/><label for='answer-id-1316987' id='answer-label-1316987' class=' answer'><span>dynamic application security testing (DAST) by using Veracode<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336668[]' id='answer-id-1316988' class='answer   answerof-336668 ' value='1316988'   \/><label for='answer-id-1316988' id='answer-label-1316988' class=' answer'><span>threat modeling by using the Microsoft Threat Modeling Tool<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336668[]' id='answer-id-1316989' class='answer   answerof-336668 ' value='1316989'   \/><label for='answer-id-1316989' id='answer-label-1316989' class=' answer'><span>software decomposition by using Microsoft Visual Studio Enterprise<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-56' style=';'><div id='questionWrap-56'  class='   watupro-question-id-336669'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>56. <\/span>Your company is developing a new Azure App Service web app. You are providing design assistance to verify the security of the web app. <br \/>\r<br>You need to recommend a solution to test the web app for vulnerabilities such as insecure server configurations, cross-site scripting (XSS), and SQL injection. <br \/>\r<br>What should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_56' value='336669' \/><input type='hidden' id='answerType336669' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336669[]' id='answer-id-1316990' class='answer   answerof-336669 ' value='1316990'   \/><label for='answer-id-1316990' id='answer-label-1316990' class=' answer'><span>interactive application security testing (IAST)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336669[]' id='answer-id-1316991' class='answer   answerof-336669 ' value='1316991'   \/><label for='answer-id-1316991' id='answer-label-1316991' class=' answer'><span>static application security testing (SAST)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336669[]' id='answer-id-1316992' class='answer   answerof-336669 ' value='1316992'   \/><label for='answer-id-1316992' id='answer-label-1316992' class=' answer'><span>runtime application se\/f-protection (RASP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336669[]' id='answer-id-1316993' class='answer   answerof-336669 ' value='1316993'   \/><label for='answer-id-1316993' id='answer-label-1316993' class=' answer'><span>dynamic application security testing (DAST)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-57' style=';'><div id='questionWrap-57'  class='   watupro-question-id-336670'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>57. <\/span>DRAG DROP <br \/>\r<br>Your company has Microsoft 365 E5 licenses and Azure subscriptions. <br \/>\r<br>The company plans to automatically label sensitive data stored in the following locations: <br \/>\r<br>&#8226; Microsoft SharePoint Online <br \/>\r<br>&#8226; Microsoft Exchange Online <br \/>\r<br>&#8226; Microsoft Teams <br \/>\r<br>You need to recommend a strategy to identify and protect sensitive data. <br \/>\r<br>Which scope should you recommend for the sensitivity label policies? To answer, drag the appropriate scopes to the correct locations. Each scope may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. NOTE: Each correct selection is worth one point. <br \/>\r<br><br><img decoding=\"async\" width=637 height=236 id=\"\u56fe\u7247 2892\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image042-1.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_57' value='336670' \/><input type='hidden' id='answerType336670' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336670[]' id='textarea_q_336670' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-58' style=';'><div id='questionWrap-58'  class='   watupro-question-id-336671'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>58. <\/span>Your company plans to deploy several Azure App Service web apps. The web apps will be deployed to the West Europe Azure region. The web apps will be accessed only by customers in Europe and the United States. <br \/>\r<br>You need to recommend a solution to prevent malicious bots from scanning the web apps for vulnerabilities. The solution must minimize the attach surface. <br \/>\r<br>What should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_58' value='336671' \/><input type='hidden' id='answerType336671' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336671[]' id='answer-id-1316995' class='answer   answerof-336671 ' value='1316995'   \/><label for='answer-id-1316995' id='answer-label-1316995' class=' answer'><span>Azure Firewall Premium<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336671[]' id='answer-id-1316996' class='answer   answerof-336671 ' value='1316996'   \/><label for='answer-id-1316996' id='answer-label-1316996' class=' answer'><span>Azure Application Gateway Web Application Firewall (WAF)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336671[]' id='answer-id-1316997' class='answer   answerof-336671 ' value='1316997'   \/><label for='answer-id-1316997' id='answer-label-1316997' class=' answer'><span>network security groups (NSGs)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336671[]' id='answer-id-1316998' class='answer   answerof-336671 ' value='1316998'   \/><label for='answer-id-1316998' id='answer-label-1316998' class=' answer'><span>Azure Traffic Manager and application security groups<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-59' style=';'><div id='questionWrap-59'  class='   watupro-question-id-336672'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>59. <\/span>HOTSPOT <br \/>\r<br>Your company is migrating data to Azure. The data contains Personally Identifiable Information (Pll). The company plans to use Microsoft Information Protection for the Pll data store in Azure. You need to recommend a solution to discover Pll data at risk in the Azure resources. <br \/>\r<br>What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. <br \/>\r<br><br><img decoding=\"async\" width=633 height=339 id=\"\u56fe\u7247 2871\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image044-1.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_59' value='336672' \/><input type='hidden' id='answerType336672' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336672[]' id='textarea_q_336672' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-60' style=';'><div id='questionWrap-60'  class='   watupro-question-id-336673'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>60. <\/span>You have a Microsoft 365 E5 subscription. <br \/>\r<br>You need to recommend a solution to add a watermark to email attachments that contain sensitive data. <br \/>\r<br>What should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_60' value='336673' \/><input type='hidden' id='answerType336673' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336673[]' id='answer-id-1317000' class='answer   answerof-336673 ' value='1317000'   \/><label for='answer-id-1317000' id='answer-label-1317000' class=' answer'><span>Microsoft Defender for Cloud Apps<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336673[]' id='answer-id-1317001' class='answer   answerof-336673 ' value='1317001'   \/><label for='answer-id-1317001' id='answer-label-1317001' class=' answer'><span>insider risk management<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336673[]' id='answer-id-1317002' class='answer   answerof-336673 ' value='1317002'   \/><label for='answer-id-1317002' id='answer-label-1317002' class=' answer'><span>Microsoft Information Protection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336673[]' id='answer-id-1317003' class='answer   answerof-336673 ' value='1317003'   \/><label for='answer-id-1317003' id='answer-label-1317003' class=' answer'><span>Azure Purview<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-61' style=';'><div id='questionWrap-61'  class='   watupro-question-id-336674'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>61. <\/span>Your company has a hybrid cloud infrastructure. <br \/>\r<br>The company plans to hire several temporary employees within a brief period. The temporary employees will need to access applications and data on the company' premises network. <br \/>\r<br>The company's security policy prevents the use of personal devices for accessing company data and applications. <br \/>\r<br>You need to recommend a solution to provide the temporary employee with access to company resources. The solution must be able to scale on demand. <br \/>\r<br>What should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_61' value='336674' \/><input type='hidden' id='answerType336674' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336674[]' id='answer-id-1317004' class='answer   answerof-336674 ' value='1317004'   \/><label for='answer-id-1317004' id='answer-label-1317004' class=' answer'><span>Migrate the on-premises applications to cloud-based applications.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336674[]' id='answer-id-1317005' class='answer   answerof-336674 ' value='1317005'   \/><label for='answer-id-1317005' id='answer-label-1317005' class=' answer'><span>Redesign the VPN infrastructure by adopting a split tunnel configuration.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336674[]' id='answer-id-1317006' class='answer   answerof-336674 ' value='1317006'   \/><label for='answer-id-1317006' id='answer-label-1317006' class=' answer'><span>Deploy Microsoft Endpoint Manager and Azure Active Directory (Azure AD) Conditional Access.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336674[]' id='answer-id-1317007' class='answer   answerof-336674 ' value='1317007'   \/><label for='answer-id-1317007' id='answer-label-1317007' class=' answer'><span>Deploy Azure Virtual Desktop, Azure Active Directory (Azure AD) Conditional Access, and Microsoft Defender for Cloud Apps.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-62' style=';'><div id='questionWrap-62'  class='   watupro-question-id-336675'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>62. <\/span>You have an Azure subscription that contains virtual machines, storage accounts, and Azure SQL databases. All resources are backed up multiple times a day by using Azure Backup. You are developing a strategy to protect against ransomware attacks. <br \/>\r<br>You need to recommend which controls must be enabled to ensure that Azure Backup can be used to restore the resources in the event of a successful ransomware attack. <br \/>\r<br>Which two controls should you include in the recommendation? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.<\/div><input type='hidden' name='question_id[]' id='qID_62' value='336675' \/><input type='hidden' id='answerType336675' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336675[]' id='answer-id-1317008' class='answer   answerof-336675 ' value='1317008'   \/><label for='answer-id-1317008' id='answer-label-1317008' class=' answer'><span>Use Azure Monitor notifications when backup configurations change.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336675[]' id='answer-id-1317009' class='answer   answerof-336675 ' value='1317009'   \/><label for='answer-id-1317009' id='answer-label-1317009' class=' answer'><span>Require PINs for critical operations.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336675[]' id='answer-id-1317010' class='answer   answerof-336675 ' value='1317010'   \/><label for='answer-id-1317010' id='answer-label-1317010' class=' answer'><span>Perform offline backups to Azure Data Box.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336675[]' id='answer-id-1317011' class='answer   answerof-336675 ' value='1317011'   \/><label for='answer-id-1317011' id='answer-label-1317011' class=' answer'><span>Encrypt backups by using customer-managed keys (CMKs).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336675[]' id='answer-id-1317012' class='answer   answerof-336675 ' value='1317012'   \/><label for='answer-id-1317012' id='answer-label-1317012' class=' answer'><span>Enable soft delete for backups.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-63' style=';'><div id='questionWrap-63'  class='   watupro-question-id-336676'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>63. <\/span>Your company develops several applications that are accessed as custom enterprise applications in Azure Active Directory (Azure AD). You need to recommend a solution to prevent users on a specific list of countries from connecting to the applications. <br \/>\r<br>What should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_63' value='336676' \/><input type='hidden' id='answerType336676' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336676[]' id='answer-id-1317013' class='answer   answerof-336676 ' value='1317013'   \/><label for='answer-id-1317013' id='answer-label-1317013' class=' answer'><span>activity policies in Microsoft Defender for Cloud Apps<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336676[]' id='answer-id-1317014' class='answer   answerof-336676 ' value='1317014'   \/><label for='answer-id-1317014' id='answer-label-1317014' class=' answer'><span>sign-in risk policies in Azure AD Identity Protection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336676[]' id='answer-id-1317015' class='answer   answerof-336676 ' value='1317015'   \/><label for='answer-id-1317015' id='answer-label-1317015' class=' answer'><span>device compliance policies in Microsoft Endpoint Manager<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336676[]' id='answer-id-1317016' class='answer   answerof-336676 ' value='1317016'   \/><label for='answer-id-1317016' id='answer-label-1317016' class=' answer'><span>Azure AD Conditional Access policies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336676[]' id='answer-id-1317017' class='answer   answerof-336676 ' value='1317017'   \/><label for='answer-id-1317017' id='answer-label-1317017' class=' answer'><span>user risk policies in Azure AD Identity Protection<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-64' style=';'><div id='questionWrap-64'  class='   watupro-question-id-336677'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>64. <\/span>Your company has a Microsoft 365 subscription and uses Microsoft Defender for Identity. You are informed about incidents that relate to compromised identities. <br \/>\r<br>You need to recommend a solution to expose several accounts for attackers to exploit. When the attackers attempt to exploit the accounts, an alert must be triggered. <br \/>\r<br>Which Defender for Identity feature should you include in the recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_64' value='336677' \/><input type='hidden' id='answerType336677' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336677[]' id='answer-id-1317018' class='answer   answerof-336677 ' value='1317018'   \/><label for='answer-id-1317018' id='answer-label-1317018' class=' answer'><span>standalone sensors<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336677[]' id='answer-id-1317019' class='answer   answerof-336677 ' value='1317019'   \/><label for='answer-id-1317019' id='answer-label-1317019' class=' answer'><span>honeytoken entity tags<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336677[]' id='answer-id-1317020' class='answer   answerof-336677 ' value='1317020'   \/><label for='answer-id-1317020' id='answer-label-1317020' class=' answer'><span>sensitivity labels<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336677[]' id='answer-id-1317021' class='answer   answerof-336677 ' value='1317021'   \/><label for='answer-id-1317021' id='answer-label-1317021' class=' answer'><span>custom user tags<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-65' style=';'><div id='questionWrap-65'  class='   watupro-question-id-336678'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>65. <\/span>You have a Microsoft 365 E5 subscription and an Azure subscription. You are designing a Microsoft Sentinel deployment. <br \/>\r<br>You need to recommend a solution for the security operations team. The solution must include custom views and a dashboard for analyzing security events. <br \/>\r<br>What should you recommend using in Microsoft Sentinel?<\/div><input type='hidden' name='question_id[]' id='qID_65' value='336678' \/><input type='hidden' id='answerType336678' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336678[]' id='answer-id-1317022' class='answer   answerof-336678 ' value='1317022'   \/><label for='answer-id-1317022' id='answer-label-1317022' class=' answer'><span>playbooks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336678[]' id='answer-id-1317023' class='answer   answerof-336678 ' value='1317023'   \/><label for='answer-id-1317023' id='answer-label-1317023' class=' answer'><span>workbooks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336678[]' id='answer-id-1317024' class='answer   answerof-336678 ' value='1317024'   \/><label for='answer-id-1317024' id='answer-label-1317024' class=' answer'><span>notebooks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336678[]' id='answer-id-1317025' class='answer   answerof-336678 ' value='1317025'   \/><label for='answer-id-1317025' id='answer-label-1317025' class=' answer'><span>threat intelligence<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-66' style=';'><div id='questionWrap-66'  class='   watupro-question-id-336679'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>66. <\/span>Your company has an on-premise network in Seattle and an Azure subscription. The on-premises network contains a Remote Desktop server. <br \/>\r<br>The company contracts a third-party development firm from France to develop and deploy resources to the virtual machines hosted in the Azure subscription. <br \/>\r<br>Currently, the firm establishes an RDP connection to the Remote Desktop server. From the Remote Desktop connection, the firm can access the virtual machines hosted in Azure by using custom administrative tools installed on the Remote Desktop server. All the traffic to the Remote Desktop server is captured by a firewall, and the firewall only allows specific connections from France to the server. <br \/>\r<br>You need to recommend a modern security solution based on the Zero Trust model. The solution must minimize latency tor developers. <br \/>\r<br>Which three actions should you recommend? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.<\/div><input type='hidden' name='question_id[]' id='qID_66' value='336679' \/><input type='hidden' id='answerType336679' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336679[]' id='answer-id-1317026' class='answer   answerof-336679 ' value='1317026'   \/><label for='answer-id-1317026' id='answer-label-1317026' class=' answer'><span>Configure network security groups (NSGs) to allow access from only specific logical groupings of IP address ranges.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336679[]' id='answer-id-1317027' class='answer   answerof-336679 ' value='1317027'   \/><label for='answer-id-1317027' id='answer-label-1317027' class=' answer'><span>Implement Azure Firewall to restrict host pool outbound access.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336679[]' id='answer-id-1317028' class='answer   answerof-336679 ' value='1317028'   \/><label for='answer-id-1317028' id='answer-label-1317028' class=' answer'><span>Configure Azure Active Directory (Azure AD) Conditional Access with multi-factor authentication (MFA) and named locations.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336679[]' id='answer-id-1317029' class='answer   answerof-336679 ' value='1317029'   \/><label for='answer-id-1317029' id='answer-label-1317029' class=' answer'><span>Migrate from the Remote Desktop server to Azure Virtual Desktop.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336679[]' id='answer-id-1317030' class='answer   answerof-336679 ' value='1317030'   \/><label for='answer-id-1317030' id='answer-label-1317030' class=' answer'><span>Deploy a Remote Desktop server to an Azure region located in France.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-67' style=';'><div id='questionWrap-67'  class='   watupro-question-id-336680'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>67. <\/span>HOTSPOT <br \/>\r<br>Your company has a multi-cloud environment that contains a Microsoft 365 subscription, an Azure subscription, and Amazon Web Services (AWS) implementation. <br \/>\r<br>You need to recommend a security posture management solution for the following components: <br \/>\r<br>&#8226; Azure loT Edge devices <br \/>\r<br>&#8226; AWS EC2 instances <br \/>\r<br>Which services should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. <br \/>\r<br><br><img decoding=\"async\" width=649 height=290 id=\"\u56fe\u7247 29\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/06\/image046-1.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_67' value='336680' \/><input type='hidden' id='answerType336680' value='textarea'><!-- end question-content--><\/div><div class='question-choices '><p><textarea name='answer-336680[]' id='textarea_q_336680' class='watupro-textarea-medium' rows='5' cols='80'><\/textarea>\n<\/p><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-68' style=';'><div id='questionWrap-68'  class='   watupro-question-id-336681'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>68. <\/span>Your company is moving all on-premises workloads to Azure and Microsoft 365. <br \/>\r<br>You need to design a security orchestration, automation, and response (SOAR) strategy in Microsoft Sentinel that meets the following requirements: <br \/>\r<br>&#8226; Minimizes manual intervention by security operation analysts <br \/>\r<br>&#8226; Supports Waging alerts within Microsoft Teams channels <br \/>\r<br>What should you include in the strategy?<\/div><input type='hidden' name='question_id[]' id='qID_68' value='336681' \/><input type='hidden' id='answerType336681' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336681[]' id='answer-id-1317032' class='answer   answerof-336681 ' value='1317032'   \/><label for='answer-id-1317032' id='answer-label-1317032' class=' answer'><span>data connectors<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336681[]' id='answer-id-1317033' class='answer   answerof-336681 ' value='1317033'   \/><label for='answer-id-1317033' id='answer-label-1317033' class=' answer'><span>playbooks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336681[]' id='answer-id-1317034' class='answer   answerof-336681 ' value='1317034'   \/><label for='answer-id-1317034' id='answer-label-1317034' class=' answer'><span>workbooks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336681[]' id='answer-id-1317035' class='answer   answerof-336681 ' value='1317035'   \/><label for='answer-id-1317035' id='answer-label-1317035' class=' answer'><span>KQL<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-69' style=';'><div id='questionWrap-69'  class='   watupro-question-id-336682'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>69. <\/span>Your company plans to provision blob storage by using an Azure Storage account The blob storage will be accessible from 20 application sewers on the internet. You need to recommend a solution to ensure that only the application servers can access the storage account. <br \/>\r<br>What should you recommend using to secure the blob storage?<\/div><input type='hidden' name='question_id[]' id='qID_69' value='336682' \/><input type='hidden' id='answerType336682' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336682[]' id='answer-id-1317036' class='answer   answerof-336682 ' value='1317036'   \/><label for='answer-id-1317036' id='answer-label-1317036' class=' answer'><span>service tags in network security groups (NSGs)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336682[]' id='answer-id-1317037' class='answer   answerof-336682 ' value='1317037'   \/><label for='answer-id-1317037' id='answer-label-1317037' class=' answer'><span>managed rule sets in Azure Web Application Firewall (WAF) policies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336682[]' id='answer-id-1317038' class='answer   answerof-336682 ' value='1317038'   \/><label for='answer-id-1317038' id='answer-label-1317038' class=' answer'><span>inbound rules in network security groups (NSGs)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336682[]' id='answer-id-1317039' class='answer   answerof-336682 ' value='1317039'   \/><label for='answer-id-1317039' id='answer-label-1317039' class=' answer'><span>firewall rules for the storage account<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-336682[]' id='answer-id-1317040' class='answer   answerof-336682 ' value='1317040'   \/><label for='answer-id-1317040' id='answer-label-1317040' class=' answer'><span>inbound rules in Azure Firewall<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-70' style=';'><div id='questionWrap-70'  class='   watupro-question-id-336683'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>70. <\/span>Your company has a Microsoft 365 E5 subscription. <br \/>\r<br>The company plans to deploy 45 mobile self-service kiosks that will run Windows 10. You need to provide recommendations to secure the kiosks. <br \/>\r<br>The solution must meet the following requirements: <br \/>\r<br>&#8226; Ensure that only authorized applications can run on the kiosks. <br \/>\r<br>&#8226; Regularly harden the kiosks against new threats. <br \/>\r<br>Which two actions should you include in the recommendations? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.<\/div><input type='hidden' name='question_id[]' id='qID_70' value='336683' \/><input type='hidden' id='answerType336683' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336683[]' id='answer-id-1317041' class='answer   answerof-336683 ' value='1317041'   \/><label for='answer-id-1317041' id='answer-label-1317041' class=' answer'><span>Onboard the kiosks to Azure Monitor.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336683[]' id='answer-id-1317042' class='answer   answerof-336683 ' value='1317042'   \/><label for='answer-id-1317042' id='answer-label-1317042' class=' answer'><span>Implement Privileged Access Workstation (PAW) for the kiosks.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336683[]' id='answer-id-1317043' class='answer   answerof-336683 ' value='1317043'   \/><label for='answer-id-1317043' id='answer-label-1317043' class=' answer'><span>Implement Automated Investigation and Remediation (AIR) in Microsoft Defender for Endpoint.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336683[]' id='answer-id-1317044' class='answer   answerof-336683 ' value='1317044'   \/><label for='answer-id-1317044' id='answer-label-1317044' class=' answer'><span>Implement threat and vulnerability management in Microsoft Defender for Endpoint.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-336683[]' id='answer-id-1317045' class='answer   answerof-336683 ' value='1317045'   \/><label for='answer-id-1317045' id='answer-label-1317045' class=' answer'><span>Onboard the kiosks to Microsoft Intune and Microsoft Defender for Endpoint.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-71'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons8680\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"Submit\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"8680\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-04-29 17:07:10\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1777482430\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"336614:1316823,1316824,1316825,1316826 | 336615:1316827,1316828,1316829,1316830 | 336616:1316831,1316832,1316833,1316834 | 336617:1316835 | 336618:1316836 | 336619:1316837,1316838,1316839,1316840,1316841 | 336620:1316842 | 336621:1316843,1316844,1316845,1316846 | 336622:1316847 | 336623:1316848 | 336624:1316849,1316850,1316851,1316852 | 336625:1316853,1316854,1316855,1316856 | 336626:1316857 | 336627:1316858 | 336628:1316859 | 336629:1316860 | 336630:1316861 | 336631:1316862 | 336632:1316863,1316864,1316865,1316866,1316867 | 336633:1316868,1316869,1316870,1316871 | 336634:1316872,1316873,1316874,1316875 | 336635:1316876,1316877,1316878,1316879 | 336636:1316880,1316881,1316882,1316883,1316884 | 336637:1316885,1316886,1316887,1316888,1316889 | 336638:1316890,1316891,1316892,1316893 | 336639:1316894,1316895,1316896,1316897 | 336640:1316898,1316899,1316900,1316901,1316902 | 336641:1316903 | 336642:1316904,1316905,1316906,1316907 | 336643:1316908,1316909,1316910,1316911 | 336644:1316912,1316913,1316914,1316915,1316916 | 336645:1316917 | 336646:1316918,1316919,1316920,1316921 | 336647:1316922,1316923,1316924,1316925 | 336648:1316926,1316927,1316928,1316929,1316930,1316931 | 336649:1316932 | 336650:1316933,1316934,1316935,1316936 | 336651:1316937,1316938,1316939,1316940,1316941 | 336652:1316942,1316943,1316944,1316945 | 336653:1316946,1316947,1316948,1316949,1316950 | 336654:1316951 | 336655:1316952,1316953,1316954,1316955 | 336656:1316956,1316957,1316958,1316959 | 336657:1316960 | 336658:1316961 | 336659:1316962,1316963,1316964,1316965 | 336660:1316966,1316967,1316968,1316969,1316970 | 336661:1316971,1316972,1316973,1316974 | 336662:1316975 | 336663:1316976,1316977 | 336664:1316978,1316979 | 336665:1316980,1316981 | 336666:1316982,1316983 | 336667:1316984,1316985 | 336668:1316986,1316987,1316988,1316989 | 336669:1316990,1316991,1316992,1316993 | 336670:1316994 | 336671:1316995,1316996,1316997,1316998 | 336672:1316999 | 336673:1317000,1317001,1317002,1317003 | 336674:1317004,1317005,1317006,1317007 | 336675:1317008,1317009,1317010,1317011,1317012 | 336676:1317013,1317014,1317015,1317016,1317017 | 336677:1317018,1317019,1317020,1317021 | 336678:1317022,1317023,1317024,1317025 | 336679:1317026,1317027,1317028,1317029,1317030 | 336680:1317031 | 336681:1317032,1317033,1317034,1317035 | 336682:1317036,1317037,1317038,1317039,1317040 | 336683:1317041,1317042,1317043,1317044,1317045\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"336614,336615,336616,336617,336618,336619,336620,336621,336622,336623,336624,336625,336626,336627,336628,336629,336630,336631,336632,336633,336634,336635,336636,336637,336638,336639,336640,336641,336642,336643,336644,336645,336646,336647,336648,336649,336650,336651,336652,336653,336654,336655,336656,336657,336658,336659,336660,336661,336662,336663,336664,336665,336666,336667,336668,336669,336670,336671,336672,336673,336674,336675,336676,336677,336678,336679,336680,336681,336682,336683\";\nWatuPROSettings[8680] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 8680;\t    \nWatuPRO.post_id = 82704;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.55802000 1777482430\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(8680);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[101,14129],"tags":[14309,14432],"class_list":["post-82704","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-microsoft-certified-cybersecurity-architect-expert","tag-sc-100-exam-dumps","tag-sc-100-free-dumps"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/82704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=82704"}],"version-history":[{"count":2,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/82704\/revisions"}],"predecessor-version":[{"id":82706,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/82704\/revisions\/82706"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=82704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=82704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=82704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}