You have an Azure subscription that contains several storage accounts. The storage accounts are accessed by legacy applications that are authenticated by using access keys.You need to recommend a solution to prevent new applications from obtaining the access keys of the storage accounts. The solution must minimize the impact on the legacy applications.What should you include in the recommendation?
You are designing the security standards for containerized applications onboarded to Azure.You are evaluating the use of Microsoft Defender for Containers.In which two environments can you use Defender for Containers to scan for known vulnerabilities? Each correct answer presents a complete solution.NOTE: Each correct selection is worth one point.
HOTSPOT -Your company is migrating data to Azure. The data contains Personally Identifiable Information (PII).The company plans to use Microsoft Information Protection for the PII data store in Azure.You need to recommend a solution to discover PII data at risk in the Azure resources.What should you include in the recommendation? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point.Hot Area:
HOTSPOT -Your company has a Microsoft 365 ES subscription, an Azure subscription, on-premises applications, and Active Directory Domain Services (AD DS).You need to recommend an identity security strategy that meets the following requirements:✑ Ensures that customers can use their Facebook credentials to authenticate to an Azure App Service website✑ Ensures that partner companies can access Microsoft SharePoint Online sites for the project to which they are assignedThe solution must minimize the need to deploy additional infrastructure components.What should you include in the recommendation? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point.Hot Area:
You have an Azure subscription that contains virtual machines.Port 3389 and port 22 are disabled for outside access.You need to design a solution to provide administrators with secure remote access to the virtual machines. The solution must meet the following requirements:✑ Prevent the need to enable ports 3389 and 22 from the internet.✑ Only provide permission to connect the virtual machines when required.✑ Ensure that administrators use the Azure portal to connect to the virtual machines.Which two actions should you include in the solution? Each correct answer presents part of the solution.NOTE: Each correct selection is worth one point.
You have an Azure subscription that has Microsoft Defender for Cloud enabled.Suspicious authentication activity alerts have been appearing in the Workload protections dashboard.You need to recommend a solution to evaluate and remediate the alerts by using workflow automation. The solution must minimize development effort.What should you include in the recommendation?