You have a Microsoft 365 subscription that uses Azure Defender.
You have a Microsoft 365 subscription that uses Azure Defender. You have 100 virtual machines in a resource group named RG1. You assign the Security Admin roles to a new user named SecAdmin1. You need to ensure that SecAdmin1 can apply quick fixes to the virtual machines by using Azure Defender. The solution must use […]
You receive an alert from Azure Defender for Key Vault.
You receive an alert from Azure Defender for Key Vault. You discover that the alert is generated from multiple suspicious IP addresses. You need to reduce the potential of Key Vault secrets being leaked while you investigate the issue. The solution must be implemented as soon as possible and must minimize the impact on legitimate […]
You are investigating a potential attack that deploys a new ransomware strain.
You are investigating a potential attack that deploys a new ransomware strain. You plan to perform automated actions on a group of highly valuable machines that contain sensitive information. You have three custom device groups. You need to be able to temporarily group the machines to perform actions on the devices. Which three actions should […]
You have the following advanced hunting query in Microsoft 365 Defender.
You have the following advanced hunting query in Microsoft 365 Defender. You need to receive an alert when any process disables System Restore on a device managed by Microsoft Defender during the last 24 hours. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth […]
Your company uses Microsoft Defender for Endpoint.
Your company uses Microsoft Defender for Endpoint. The company has Microsoft Word documents that contain macros. The documents are used frequently on the devices of the company’s accounting team. You need to hide false positive in the Alerts queue, while maintaining the existing security posture. Which three actions should you perform? Each correct answer presents […]
Your company uses line-of-business apps that contain Microsoft Office VBA macros.
Your company uses line-of-business apps that contain Microsoft Office VBA macros. You plan to enable protection against downloading and running additional payloads from the Office VBA macros as additional child processes. You need to identify which Office VBA macros might be affected. Which two commands can you run to achieve the goal? Each correct answer […]
You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365.
You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365. You have Microsoft SharePoint Online sites that contain sensitive documents. The documents contain customer account numbers that each consists of 32 alphanumeric characters. You need to create a data loss prevention (DLP) policy to protect the sensitive documents. What should you use […]
You need to receive a security alert when a user attempts to sign in from a location that was never used by th
You need to receive a security alert when a user attempts to sign in from a location that was never used by the other users in your organization to sign in. Which anomaly detection policy should you use? A. Impossible travel B. Activity from anonymous IP addresses C. Activity from infrequent country D. Malware detection […]
A company has a list of contacts in a Microsoft Excel file.
A company has a list of contacts in a Microsoft Excel file. The company wants to load the contact information into a Power Platform solution. You need to recommend a data-loading solution. What should you recommend? A. Use the Excel Template feature. B. Add the contacts to a static worksheet. C. Use the Import from […]
You are designing a Power Platform solution.
You are designing a Power Platform solution. You need to identify the non-functional requirements for the organization. Which three non-functional requirements should you identify? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. business rules to identify top customers B. customer maintenance procedures C. usability of business process […]