Topic 3: Mix Questions

Your on-premises network contains an e-commerce web app that was developed in Angular and Nodejs. The web app uses a MongoDB database. You plan to migrate the web app to Azure. The solution architecture team proposes the following architecture as an Azure landing zone.

A. Yes

B. No

B.   No

Explanation: When using Azure-provided PaaS services (e.g., Azure Storage, Azure Cosmos DB, or Azure Web App, use the PrivateLink connectivity option to ensure all data exchanges are over the private IP space and the traffic never leaves the Microsoft network.

Your company has an on-premises network and an Azure subscription.
The company does NOT have a Site-to-Site VPN or an ExpressRoute connection to Azure.
You are designing the security standards for Azure App Service web apps. The web apps will access Microsoft SQL Server databases on the network.
You need to recommend security standards that will allow the web apps to access the databases. The solution must minimize the number of open internet-accessible endpoints to the on-premises network.
What should you include in the recommendation?

A. a private endpoint

B. hybrid connections

C. virtual network NAT gateway integration

D. virtual network integration

B.   hybrid connections

Explanation: https://docs.microsoft.com/en-us/azure/app-service/app-service-hybridconnections

You have an on-premises network that has several legacy applications. The applications perform LDAP queries against an existing directory service. You are migrating the onpremises infrastructure to a cloud-only infrastructure.
You need to recommend an identity solution for the infrastructure that supports the legacy applications. The solution must minimize the administrative effort to maintain the infrastructure.
Which identity service should you include in the recommendation?

A. Azure Active Directory Domain Services (Azure AD DS)

B. Azure Active Directory (Azure AD) B2C

C. Azure Active Directory (Azure AD)

D. Active Directory Domain Services (AD DS)

A.   Azure Active Directory Domain Services (Azure AD DS)

Explanation: https://docs.microsoft.com/en-us/azure/active-directory-domainservices/ overview

A customer follows the Zero Trust model and explicitly verifies each attempt to access its corporate applications.
The customer discovers that several endpoints are infected with malware.
The customer suspends access attempts from the infected endpoints.
The malware is removed from the end point.
Which two conditions must be met before endpoint users can access the corporate applications again? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. Microsoft Defender for Endpoint reports the endpoints as compliant.

B. Microsoft Intune reports the endpoints as compliant.

C. A new Azure Active Directory (Azure AD) Conditional Access policy is enforced.

D. The client access tokens are refreshed.

C.   A new Azure Active Directory (Azure AD) Conditional Access policy is enforced.
D.   The client access tokens are refreshed.

Explanation:
https://www.microsoft.com/security/blog/2022/02/17/4-best-practices-toimplement- a-comprehensive-zero-trust-security-approach/
https://docs.microsoft.com/en-us/azure/active-directory/develop/refresh-tokens

Your company is developing an invoicing application that will use Azure Active Directory (Azure AD) B2C. The application will be deployed as an App Service web app. You need to recommend a solution to the application development team to secure the application from identity related attacks. Which two configurations should you recommend? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

A. Azure AD Conditional Access integration with user flows and custom policies

B. Azure AD workbooks to monitor risk detections

C. custom resource owner password credentials (ROPC) flows in Azure AD B2C

D. access packages in Identity Governance

E. smart account lockout in Azure AD B2C

A.   Azure AD Conditional Access integration with user flows and custom policies
E.   smart account lockout in Azure AD B2C

Explanation:
https://docs.microsoft.com/en-us/azure/active-directory-b2c/threatmanagement
https://docs.microsoft.com/en-us/azure/active-directory-b2c/conditional-access-userflow? pivots=b2c-user-flow

You use Azure Pipelines with Azure Repos to implement continuous integration and continuous deployment (O/CD) workflows for the deployment of applications to Azure. You need to recommend what to include in dynamic application security testing (DAST) based on the principles of the Microsoft Cloud Adoption Framework for Azure. What should you recommend?

A. unit testing

B. penetration testing

C. dependency testing

D. threat modeling

C.   dependency testing

You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance. You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance.
Solution: You recommend access restrictions based on HTTP headers that have the Front Door ID.
Does this meet the goal?

A. Yes

B. No

A.   Yes

Explanation: https://docs.microsoft.com/en-us/azure/frontdoor/front-door-faq#how-do-ilock- down-the-access-to-my-backend-to-only-azure-front-door-

You have an Azure subscription that contains a Microsoft Sentinel workspace.
Your on-premises network contains firewalls that support forwarding event logs m the Common Event Format (CEF). There is no built-in Microsoft Sentinel connector for the firewalls.
You need to recommend a solution to ingest events from the firewalls into Microsoft Sentinel.
What should you include m the recommendation?

A. an Azure logic app

B. an on-premises Syslog server

C. an on-premises data gateway

D. Azure Data Factory

B.   an on-premises Syslog server

Azure subscription that uses Azure Storage.
The company plans to share specific blobs with vendors. You need to recommend a solution to provide the vendors with secure access to specific blobs without exposing the blobs publicly. The access must be t\me-Vim\ted. What should you include in the recommendation?

A. Create shared access signatures (SAS).

B. Share the connection string of the access key.

C. Configure private link connections.

D. Configure encryption by using customer-managed keys (CMKs)

D.   Configure encryption by using customer-managed keys (CMKs)

You have a Microsoft 365 subscription and an Azure subscription. Microsoft 365 Defender and Microsoft Defender for Cloud are enabled. The Azure subscription contains 50 virtual machines. Each virtual machine runs different applications on Windows Server2019. You need to recommend a solution to ensure that only authorized applications can run on the virtual machines. If an unauthorized application attempts to run or be installed, the application must be blocked automatically until an administrator authorizes the application. Which security control should you recommend?

A. app discovery anomaly detection policies in Microsoft Defender for Cloud Apps

B. adaptive application controls in Defender for Cloud

C. Azure Security Benchmark compliance controls m Defender for Cloud

D. app protection policies in Microsoft Endpoint Manager

B.   adaptive application controls in Defender for Cloud

Explanation: https://docs.microsoft.com/en-us/azure/defender-forcloud/ recommendations-reference#compute-recommendations

Page 5 out of 18 Pages