Stay ahead with 100% Free Microsoft Cybersecurity Architect SC-100 Dumps Practice Questions
Your company is developing a modern application that will run as an Azure App Service web app. You plan to perform threat modeling to identify potential security issues by using the Microsoft Threat Modeling Tool. Which type of diagram should you create?
Your company is developing a modern application that will run as an Azure App Service web app. You plan to perform threat modeling to identify potential security issues by using the Microsoft Threat Modeling Tool. Which type of diagram should you create?
Your on-premises network contains an Active Directory Domain Services (AD DS) domain namedcorpxontoso.com and an AD DS-integrated application named App1.Your perimeter network contains a server named Server1 that runs Windows Server.You have a Microsoft Entra tenant named contoso.com that syncs with corp.contoso.com.You plan to implement a security solution that will include the following configurations:Manage access to App1 by using Microsoft Entra Private Access.Deploy a Microsoft Entra application proxy connector to Server1.Implement single sign-on (SSO) for App1 by using Kerberos constrained delegation. For Server1, configure the following rules in Windows Defender Firewall with Advanced Security:o Rule1: Allow TCP 443 inbound from a designated set of Azure URLs.o Rule2: Allow TCP 443 outbound to a designated set of Azure URLs.o Rule3: Allow TCP 80 outbound to a designated set of Azure URLs.o Rule4: Allow TCP 389 outbound to the domain controllers on corp.contoso.com.You need to maximize security for the planned implementation. The solution must minimize theimpact on the connector.Which rule should you remove?
A customer has a hybrid cloud infrastructure that contains a Microsoft 365 E5 subscription and anAzure subscription.All the on-premises servers in the perimeter network are prevented from connecting directly to theinternet.The customer recently recovered from a ransomware attack.The customer plans to deploy Microsoft Sentinel.You need to recommend configurations to meet the following requirements:Ensure that the security operations team can access the security logs and the operation logs.Ensure that the IT operations team can access only the operations logs, including the event logs ofthe servers in the perimeter network.Which two configurations can you include in the recommendation? Each correct answer presents acomplete solution. NOTE: Each correct selection is worth one point.
Your on-premises network contains an Active Directory Domain Services (AD DS) domain namedcorpxontoso.com and an AD DS-integrated application named App1.Your perimeter network contains a server named Server1 that runs Windows Server.You have a Microsoft Entra tenant named contoso.com that syncs with corp.contoso.com.You plan to implement a security solution that will include the following configurations:Manage access to App1 by using Microsoft Entra Private Access.Deploy a Microsoft Entra application proxy connector to Server1.Implement single sign-on (SSO) for App1 by using Kerberos constrained delegation. For Server1, configure the following rules in Windows Defender Firewall with Advanced Security:o Rule1: Allow TCP 443 inbound from a designated set of Azure URLs.o Rule2: Allow TCP 443 outbound to a designated set of Azure URLs.o Rule3: Allow TCP 80 outbound to a designated set of Azure URLs.o Rule4: Allow TCP 389 outbound to the domain controllers on corp.contoso.com.You need to maximize security for the planned implementation. The solution must minimize theimpact on the connector.Which rule should you remove?
© Copyrights TheExamsLab 2025. All Rights Reserved
We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the TheExamsLab.