Questions 91-120 Flashcards
-CASE 1-
HOTSPOT -
You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements.
What should you include in the recommendation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
For Azure AD targeted threats:
* Azure AD Identity Protection
* Azure AD Password Protection
* Microsoft Defender for Cloud
For AD DS-targeted threats:
* An account lockout policy in AD DS
* Microsoft Defender for Endpoint
* Microsoft Defender for Identity
For Azure AD targeted threats: - Azure AD Identity Protection
For AD DS-targeted threats: - An account lockout policy in AD DS
-CASE1-
HOTSPOT -
You need to recommend a SIEM and SOAR strategy that meets the hybrid requirements, the Microsoft Sentinel requirements, and the regulatory compliance requirements.
What should you recommend? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
Segment Microsoft Sentinel workspaces by:
* Azure AD tenant
* Enterprise
* Region and Azure AD tenant
Integrate Azure subscriptions by:
* Self-service sign-up user flows for Azure AD B2B
* Self-service sign-up user flows for Azure AD B2C
* The Azure Lighthouse subscription onboarding process
Segment Microsoft Sentinel workspaces by: - Region and Azure AD tenant
Integrate Azure subscriptions by: - The Azure Lighthouse subscription onboarding process
-CASE1-
HOTSPOT -
You need to recommend a multi-tenant and hybrid security solution that meets the business requirements and the hybrid requirements.
What should you recommend? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
To centralize subscription management:
* Azure AD B2B
* Azure AD B2C
* Azure Lighthouse
To enable the management of on-premise resources:
* Azure Arc
* Azure Stack Edge
* Azure Stack Hub
To centralize subscription management: - Azure Lighthouse
To enable the management of on-premise resources: - Azure Arc
-CASE1-
You need to recommend a solution for securing the landing zones. The solution must meet the landing zone requirements and the business requirements.
What should you configure for each landing zone?
A. an ExpressRoute gateway B. Microsoft Defender for Cloud C. an Azure Private DNS zone D. Azure DDoS Protection Standard
C. an Azure Private DNS zone
-CASE1-
HOTSPOT -
You need to recommend a solution to evaluate regulatory compliance across the entire managed environment. The solution must meet the regulatory compliance requirements and the business requirements.
What should you recommend? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
Evaluate regulatory compliance of cloud resources by assigning:
* Azure Policy definitions to management groups
* Azure Policy initiatives to management groups
* Azure Policy initiatives to subscriptions
Evaluate regulatory compliance of on-premises resources by using:
* Azure Arc
* Group Policy
* PowerShell Desired State Configuration (DSC)
Evaluate regulatory compliance of cloud resources by assigning: - Azure Policy initiatives to management groups
Evaluate regulatory compliance of on-premises resources by using: - Azure Arc
-CASE1-
You need to recommend a strategy for routing internet-bound traffic from the landing zones. The solution must meet the landing zone requirements.
What should you recommend as part of the landing zone deployment?
A. local network gateways B. forced tunneling C. service chaining D. a VNet-to-VNet connection
C. service chaining
-CASE1-
HOTSPOT -
You need to recommend a strategy for App Service web app connectivity. The solution must meet the landing zone requirements.
What should you recommend? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
For connectivity from App Service web apps to virtual machines, use:
* Private endpoints
* Service endpoints
* Virtual network integration
For connectivity from virtual machines to App Service web apps, use:
* Private endpoints
* Service endpoints
* Virtual network integration
For connectivity from App Service web apps to virtual machines, use: - Virtual network integration
For connectivity from virtual machines to App Service web apps, use: - Private endpoints
-CASE1-
HOTSPOT -
You need to recommend an identity security solution for the Azure AD tenant of Litware. The solution must meet the identity requirements and the regulatory compliance requirements.
What should you recommend? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
For the delegated management of users and groups, use:
* AD DS organizational units
* Azure AD administrative units
* Custom Azure AD roles
To ensure that you can perform leaked credential detection:
* Enable password has synchronization in the Azure AD Connect deployment
* Enable Security defaults in the Azure AD tenant of Litware
* Replace pass-through authentication with Active Directory Federation Services
For the delegated management of users and groups, use: - Azure AD administrative units
To ensure that you can perform leaked credential detection: - Enable password has synchronization in the Azure AD Connect deployment
-CASE1-
You need to design a strategy for securing the SharePoint Online and Exchange Online data. The solution must meet the application security requirements.
Which two services should you leverage in the strategy? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A. Azure AD Conditional Access B. access reviews in Azure AD C. Microsoft Defender for Cloud D. Microsoft Defender for Cloud Apps E. Microsoft Defender for Endpoint
A. Azure AD Conditional Access
D. Microsoft Defender for Cloud Apps
-CASE1-
To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. Security Assertion Markup Language (SAML) B. NTLMv2 C. certificate-based authentication D. Kerberos
A. Security Assertion Markup Language (SAML)
D. Kerberos
You have an Azure subscription that contains several storage accounts. The storage accounts are accessed by legacy applications that are authenticated by using access keys.
You need to recommend a solution to prevent new applications from obtaining the access keys of the storage accounts. The solution must minimize the impact on the legacy applications.
What should you include in the recommendation?
A. Set the AllowSharedKeyAccess property to false. B. Apply read-only locks on the storage accounts. C. Set the AllowBlobPublicAccess property to false. D. Configure automated key rotation.
B. Apply read-only locks on the storage accounts.
Your company has the virtual machine infrastructure shown in the following table.
- Operation system; Location; Number of virtual machines; Hypervisor
- Linux; On-premises; 100; VMWare vSphere
- Windows Server; On-premises; 100; Hyper-V
The company plans to use Microsoft Azure Backup Server (MABS) to back up the virtual machines to Azure.
You need to provide recommendations to increase the resiliency of the backup strategy to mitigate attacks such as ransomware.
What should you include in the recommendation?
A. Use geo-redundant storage (GRS). B. Maintain multiple copies of the virtual machines. C. Encrypt the backups by using customer-managed keys (CMKS). D. Require PINs to disable backups.
D. Require PINs to disable backups.
You are a cloud security administrator and you have been tasked with providing a security solution for an Azure App Service, a web app named web-app0. Web-app0 has the following requirements:
✑ Users will request access to web-app0 through the organization portal and an internal stakeholder will approve.
✑ Authentication for users must be provided by Azure AD.
What would be your recommended approach to enable AD authentication to web-app0?
A. Azure AD application B. Azure AD application proxy C. Microsoft Defender 365 D. Application Gateway
A. Azure AD application
HOTSPOT -
You are creating the security recommendations for an Azure App Service web app named App1. App1 has the following specifications:
✑ Users will request access to App1 through the My Apps portal. A human resources manager will approve the requests.
✑ Users will authenticate by using Azure Active Directory (Azure AD) user accounts.
You need to recommend an access security architecture for App1.
What should you include in the recommendation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
To enable Azure AD authentication for App1, use:
* Azure AD application
* Azure AD Application Proxy
* Azure Application Gateway
* A managed identity in Azure AD
* Microsoft Defender for App
To implement access requests for App1, use:
* An access package in Identity Governance
* An access policy in Microsoft Defender for Cloud Apps
* An access review in Identity Governance
* Azure AD Conditional Access App Control
* An OAuth app policy in Microsoft Defender for Cloud Apps
To enable Azure AD authentication for App1, use: - Azure AD application
To implement access requests for App1, use: - An access package in Identity Governance
Your company has a hybrid cloud infrastructure that contains an on-premises Active Directory Domain Services (AD DS) forest, a Microsoft 365 subscription, and an Azure subscription.
The company’s on-premises network contains internal web apps that use Kerberos authentication. Currently, the web apps are accessible only from the network.
You have remote users who have personal devices that run Windows 11.
You need to recommend a solution to provide the remote users with the ability to access the web apps. The solution must meet the following requirements:
✑ Prevent the remote users from accessing any other resources on the network.
✑ Support Azure Active Directory (Azure AD) Conditional Access.
✑ Simplify the end-user experience.
What should you include in the recommendation?
A. Azure AD Application Proxy B. web content filtering in Microsoft Defender for Endpoint C. Microsoft Tunnel D. Azure Virtual WAN
A. Azure AD Application Proxy