لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
You need to design a strategy for securing the SharePoint Online and Exchange Online data. The solution must meet the application security requirements. Which two services should you leverage in the strategy? Each correct answer presents part of the solution. NOTE; Each correct selection is worth one point.
A. Azure AD Conditional Access
B. Microsoft Defender for Cloud Apps
C. Microsoft Defender for Cloud
D. Microsoft Defender for Endpoint
E. access reviews in Azure AD
عرض الإجابة
اجابة صحيحة: A
السؤال #2
You need to recommend a solution to secure the MedicalHistory data in the ClaimsDetail table. The solution must meet the Contoso developer requirements. What should you include in the recommendation?
A. Transparent Data Encryption (TDE)
B. Always Encrypted
C. row-level security (RLS)
D. dynamic data masking
E. data classification
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Your company is developing a modern application that will run as an Azure App Service web app. You plan to perform threat modeling to identify potential security issues by using the Microsoft Threat Modeling Tool. Which type of diagram should you create?
A. dataflow
B. system flow
C. process flow
D. network flow
عرض الإجابة
اجابة صحيحة: A
السؤال #4
You are evaluating an Azure environment for compliance. You need to design an Azure Policy implementation that can be used to evaluate compliance without changing any resources. Which effect should you use in Azure Policy?
A. Deny
B. Disabled
C. Modify
D. Append
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Your on-premises network contains an e-commerce web app that was developed in Angular and Nodejs. The web app uses a MongoDB database. You plan to migrate the web app to Azure. The solution architecture team proposes the following architecture as an Azure landing zone. You need to provide recommendations to secure the connection between the web app and the database. The solution must follow the Zero Trust model. Solution: You recommend creating private endpoints for the web app and the database layer. Does
A. Yes
B. No
عرض الإجابة
اجابة صحيحة: C
السؤال #6
You have Windows 11 devices and Microsoft 365 E5 licenses. You need to recommend a solution to prevent users from accessing websites that contain adult content such as gambling sites. What should you include in the recommendation?
A. Microsoft Endpoint Manager
B. Compliance Manager
C. Microsoft Defender for Cloud Apps
D. Microsoft Defender for Endpoint
عرض الإجابة
اجابة صحيحة: BDE
السؤال #7
Your company has a third-party security information and event management (SIEM) solution that uses Splunk and Microsoft Sentinel. You plan to integrate Microsoft Sentinel with Splunk. You need to recommend a solution to send security events from Microsoft Sentinel to Splunk. What should you include in the recommendation?
A. Azure Event Hubs
B. Azure Data Factor
C. a Microsoft Sentinel workbook
D. a Microsoft Sentinel data connector
عرض الإجابة
اجابة صحيحة: A
السؤال #8
Your company is migrating data to Azure. The data contains Personally Identifiable Information (Pll). The company plans to use Microsoft Information Protection for the Pll data store in Azure. You need to recommend a solution to discover Pll data at risk in the Azure resources. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: AB
السؤال #9
You are designing the security standards for containerized applications onboarded to Azure. You are evaluating the use of Microsoft Defender for Containers. In which two environments can you use Defender for Containers to scan for known vulnerabilities? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
A. Linux containers deployed to Azure Container Registry
B. Linux containers deployed to Azure Kubernetes Service (AKS)
C. Windows containers deployed to Azure Container Registry
D. Windows containers deployed to Azure Kubernetes Service (AKS)
E. Linux containers deployed to Azure Container Instances
عرض الإجابة
اجابة صحيحة: BE
السؤال #10
You need to recommend a solution to resolve the virtual machine issue. What should you include in the recommendation? (Choose Two)
A. Onboard the virtual machines to Microsoft Defender for Endpoint
B. Onboard the virtual machines to Azure Arc
C. Create a device compliance policy in Microsoft Endpoint Manager
D. Enable the Qualys scanner in Defender for Cloud
عرض الإجابة
اجابة صحيحة: AD
السؤال #11
You need to recommend a solution to resolve the virtual machine issue. What should you include in the recommendation?
A. Onboard the virtual machines to Microsoft Defender for Endpoint
B. Onboard the virtual machines to Azure Arc
C. Create a device compliance policy in Microsoft Endpoint Manager
D. Enable the Qualys scanner in Defender for Cloud
عرض الإجابة
اجابة صحيحة: A
السؤال #12
Your company is developing a serverless application in Azure that will have the architecture shown in the following exhibit. You need to recommend a solution to isolate the compute components on an Azure virtual network. What should you include in the recommendation?
A. Azure Active Directory (Azure AD) enterprise applications
B. an Azure App Service Environment (ASE)
C. Azure service endpoints
D. an Azure Active Directory (Azure AD) application proxy
عرض الإجابة
اجابة صحيحة: C
السؤال #13
Your company has a Microsoft 365 E5 subscription. The company plans to deploy 45 mobile self-service kiosks that will run Windows 10. You need to provide recommendations to secure the kiosks. The solution must meet the following requirements: ? Ensure that only authorized applications can run on the kiosks. ? Regularly harden the kiosks against new threats. Which two actions should you include in the recommendations? Each correct answer presents part of the solution. NOTE: Each correct selection is worth on
A. Onboard the kiosks to Azure Monitor
B. Implement Privileged Access Workstation (PAW) for the kiosks
C. Implement Automated Investigation and Remediation (AIR) in Microsoft Defender for Endpoint
D. Implement threat and vulnerability management in Microsoft Defender for Endpoint
E. Onboard the kiosks to Microsoft Intune and Microsoft Defender for Endpoint
عرض الإجابة
اجابة صحيحة: A
السؤال #14
What should you create in Azure AD to meet the Contoso developer requirements?
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Your company finalizes the adoption of Azure and is implementing Microsoft Defender for Cloud. You receive the following recommendations in Defender for Cloud ? Access to storage accounts with firewall and virtual network configurations should be restricted, ? Storage accounts should restrict network access using virtual network rules. ? Storage account should use a private link connection. ? Storage account public access should be disallowed. You need to recommend a service to mitigate identified risks tha
A. Azure Storage Analytics
B. Azure Network Watcher
C. Microsoft Sentinel
D. Azure Policy
عرض الإجابة
اجابة صحيحة: BD
السؤال #16
Your company has devices that run either Windows 10, Windows 11, or Windows Server. You are in the process of improving the security posture of the devices. You plan to use security baselines from the Microsoft Security Compliance Toolkit. What should you recommend using to compare the baselines to the current device configurations?
A. Microsoft Intune
B. Policy Analyzer
C. Local Group Policy Object (LGPO)
D. Windows Autopilot
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: