no answers Flashcards
A customer has a hybrid cloud infrastructure that contains a Microsoft 365 E5 subscription and an Azure subscription.
All the on-premises servers in the perimeter network are prevented from connecting directly to the internet.
The customer recently recovered from a ransomware attack.
The customer plans to deploy Microsoft Sentinel.
You need to recommend configurations to meet the following requirements:
✑ Ensure that the security operations team can access the security logs and the operation logs.
✑ Ensure that the IT operations team can access only the operations logs, including the event logs of the servers in the perimeter network.
Which two solutions should you include in the recommendation? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
- the Azure Monitor agent
- resource-based role-based access control (RBAC)
You are a security analyst for an organization. Your company recently initiated a cloud adoption strategy and concerns related to threat detection in Azure Container Registry for their Linux images.
Which two Microsoft cloud native solutions can integrate with Azure Container Registry to automatically scan all Linux images pushed to a registry? (Select Two)
- Microsoft Defender for Cloud
- Log Analytics Workspace
You have an Azure subscription that is used as an Azure landing zone for an application. You need to evaluate the security posture of all the workloads in the landing zone. What should you do first?
- Add Microsoft Sentinel data connectors.
Your company has on-premises network in Seattle and an Azure subscription. The on-premises network contains a Remote Desktop server.
The company contracts a third-party development firm from France to develop and deploy resources to the virtual machines hosted in the Azure subscription.
Currently, the firm establishes an RDP connection to the Remote Desktop server. From the Remote Desktop connection, the firm can access the virtual machines hosted in Azure by using custom administrative tools installed on the Remote desktop server. All the traffic to the Remote Desktop server is captured by a firewall, and the firewall only allows specific connections from France to the server. You need to recommend a modern security solution based on the Zero Trust model. The solution must minimize latency for developers. Which three actions should you recommend? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
- Migrate from the Remote Desktop server to Azure Virtual Desktop.
- Implement Azure Firewall to restrict host pool outbound access.
- Configure Azure Active Directory (Azure AD) Conditional Access with multi-factor authentication (MFA) and named locations.
NOT:
- Configure network security groups (NSGs) to allow access from only specific logical groupings of IP address ranges.
- Deploy a Remote Desktop server to an Azure region located in France.
You have an Azure subscription that has Microsoft Defender for Cloud enabled.
You have an Amazon Web Services (AWS) implementation.
You plan to extend the Azure security strategy to the AWS implementation. The solution will NOT use Azure Arc.
Which three services can you use to provide security for the AWS resources? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
- Microsoft Defender for Containers
- Azure Active Directory (Azure AD) Conditional Access
- Azure Policy
Your company has on-premises network and an Azure subscription.
The company does NOT have a Site-to-Site VPN or an ExpressRoute connection to Azure. You are designing the security standards for Azure App Service web apps. The web apps will access Microsoft SQL Server databases on the network.
You need to recommend security standards that will allow the web apps to access the databases. The solution must minimize the number of open internet-accessible endpoints to the on-premises network.
What should you include in the recommendation?
- hybrid connections
HOTSPOT -
You are designing security for a runbook in an Azure Automation account. The runbook will copy data to Azure Data Lake Storage Gen2.
You need to recommend a solution to secure the components of the copy process.
What should you include in the recommendation for each component? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Data security: ??????????
Network access control: ??????????
Data security: - Access keys stored in Azure Key Vault
Network access control: - Azure Private Link with network service tags