For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
For each of the following statements, select Yes if the statement is true Otherwise, select No.
NOTE Each correct selection is worth one point.
What can you use to provide threat detection for Azure SQL Managed Instance?
Select the answer that correctly completes the sentence.
What is a function of Conditional Access session controls?
Which statement represents a Microsoft privacy principle?
What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point
Select the answer that correctly completes the sentence.
Select the answer that correctly completes the sentence.
Which pillar of identity relates to tracking the resources accessed by a user?
Select the answer that correctly completes the sentence.
You need to connect to an Azure virtual machine by using Azure Bastion. What should you use?
Select the answer that correctly completes the sentence.
Select the answer that correctly completes the sentence.
Select the answer that correctly completes the sentence.
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
What can you specify in Microsoft 365 sensitivity labels?
What is a characteristic of a sensitivity label in Microsoft 365?
Which security feature is available in the free mode of Microsoft Defender for Cloud?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point
For each of the following statement, select Yes if the statement is true Otherwise, select No.
NOTE: Each connect selection a worth one point.
What is the purpose of Azure Active Directory (Azure AD) Password Protection?
Select the answer that correctly completes the sentence.
Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
What is an example of encryption at rest?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Which two cards are available in the Microsoft 365 Defender portal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
What do you use to provide real-time integration between Azure Sentinel and another security source?
Select the answer that correctly completes the sentence.
Select the answer that correctly completes the sentence.
Select the answer that correctly completes the sentence.
Select the answer that correctly completes the sentence.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Select the answer that correctly completes the sentence.
Select the answer that correctly completes the sentence.
Select the answer that correctly completes the sentence.
Select the answer that correctly completes the sentence.
Select the answer that correctly completes the sentence.
Select the answer that correctly completes the sentence.
Which Azure Active Directory (Azure AD) feature can you use to restrict Microsoft Intune-managed devices from accessing corporate resources?
You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.
Which security methodology does this represent?
What can you use to provision Azure resources across multiple subscriptions in a consistent manner?
What are customers responsible for when evaluating security in a software as a service (SaaS) cloud services model?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
You have an Azure subscription that contains a Log Analytics workspace.
You need to onboard Microsoft Sentinel.
What should you do first?
Which type of identity is created when you register an application with Active Directory (Azure AD)?
What can you protect by using the information protection solution in the Microsoft 365 compliance center?
What can you use to deploy Azure resources across multiple subscriptions in a consistent manner?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
In a hybrid identity model, what can you use to sync identities between Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD)?
What can you use to provision Azure resources across multiple subscriptions in a consistent manner?