更新时间: 试题数量: 购买人数: 提供作者:

有效期: 个月

章节介绍: 共有个章节

收藏
搜索
题库预览
Introductory Info Case Study - This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, There may be additional case studies and sections on this exam. You must manage your Time to ensure that you are able to complete all questions included on this exam in the time provided. To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might Contain exhibits and other resources that provide more information about the scenario That is described in the case study. Each question is independent of the other question in this case study. At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to The next section of the exam. After you begin a new section, you cannot return to this section. To start the case study - To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study Before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem Statements. If the case study has an All Information tab, note that the information displayed is identical to the information displayed on the Subsequent tabs. When you are ready to answer a question, click the Question button to return to the question. Overview - Fabrikam, Inc. is an insurance company that has a main office in New York and a branch office in Paris. Existing Environment. On-premises Environment The on-premises network contains a single Active Directory Domain Services (AD DS) domain named corp.fabrikam.com. Existing Environment. Azure Environment Fabrikam has the following Azure resources: An Azure Active Directory (Azure AD) tenant named fabrikam.onmicrosoft.com that syncs with corp.fabrikam.com -A single Azure subscription named Sub1 -A virtual network named Vnet1 in the East US Azure region -A virtual network named Vnet2 in the West Europe Azure region An instance of Azure Front Door named FD1 that has Azure Web Application Firewall (WAF) enabled -A Microsoft Sentinel workspace An Azure SQL database named ClaimsDB that contains a table named ClaimDetails 20 virtual machines that are configured as application servers and are NOT onboarded to Microsoft Defender for Cloud -A resource group named TestRG that is used for testing purposes only An Azure Virtual Desktop host pool that contains personal assigned session hosts All the resources in Sub1 are in either the East US or the West Europe region. Existing Environment. Partners - Fabrikam has contracted a company named Contoso, Ltd. to develop applications. Contoso has the following infrastructure: An Azure AD tenant named contoso.onmicrosoft.com An Amazon Web Services (AWS) implementation named ContosoAWS1 that contains AWS EC2 instances used to host test workloads for the Applications of Fabrikam - Developers at Contoso will connect to the resources of Fabrikam to test or update applications. The developers will be added to a security group Named ContosoDevelopers in fabrikam.onmicrosoft.com that will be assigned to roles in Sub1. The ContosoDevelopers group is assigned the db_owner role for the ClaimsDB database. Existing Environment. Compliance Environment Fabrikam deploys the following compliance environment: Defender for Cloud is configured to assess all the resources in Sub1 for compliance to the HIPA-A HITRUST standard. Currently, resources that are noncompliant with the HIPA-A HITRUST standard are remediated manually. Qualys is used as the standard vulnerability assessment tool for servers. Existing Environment. Problem Statements The secure score in Defender for Cloud shows that all the virtual machines generate the Following recommendation: Machines should have a vulnerability assessment solution. All the virtual machines must be compliant in Defender for Cloud. Requirements. ClaimsApp Deployment Fabrikam plans to implement an internet-accessible application named ClaimsApp that will have the following specifications: ClaimsApp will be deployed to Azure App Service instances that connect to Vnet1 and Vnet2. Users will connect to ClaimsApp by using a URL of https://claims.fabrikam.com. ClaimsApp will access data in ClaimsDB. ClaimsDB must be accessible only from Azure virtual networks. The app services permission for ClaimsApp must be assigned to ClaimsDB. Requirements. Application Development Requirements Fabrikam identifies the following requirements for application development: Azure DevTest labs will be used by developers for testing. All the application code must be storedin GitHub Enterprise. Azure Pipelines will be used to manage application deployments. All application code changes must be scanned for security vulnerabilities, including Application code or configuration files that contain secrets in clear text. Scanning must be done at the time the code is pushed to a repository. Requirements. Security Requirements Fabrikam identifies the following security requirements: Internet-accessible applications must prevent connections that originate in North Korea. Only members of a group named InfraSec must be allowed to configure network Security groups (NSGs) and instances of Azure Firewall, WAF, and Front Door in Sub1. Administrators must connect to a secure host to perform any remote administration of the virtual machines. The secure host must be provisioned From a custom operating system image. Requirements. AWS Requirements - Fabrikam identifies the following security requirements for the data hosted in ContosoAWS1: Notify security administrators at Fabrikam if any AWS EC2 instances are noncompliant with secure score recommendations. Ensure that the security administrators can query AWS service logs directly from the Azure environment. Requirements. Contoso Developers Requirements Fabrikam identifies the following requirements for the Contoso developers: Every month, the membership of the ContosoDevelopers group must be verified. The Contoso developers must use their existing contoso.onmicrosoft.com credentials to access the resources in Sub1. The Contoso developers must be prevented from viewing the data in a column named MedicalHistory in the ClaimDetails table. Requirements. Compliance Requirements Fabrikam wants to automatically remediate the virtual machines in Sub1 to be compliant with the HIPA-A HITRUST standard. The virtual machines In TestRG must be excluded from the compliance assessment. Question You are evaluating the security of ClaimsApp. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. 

(含图)

Introductory Info Case Study - This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, There may be additional case studies and sections on this exam. You must manage your Time to ensure that you are able to complete all questions included on this exam in the time provided. To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might Contain exhibits and other resources that provide more information about the scenario That is described in the case study. Each question is independent of the other question in this case study. At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to The next section of the exam. After you begin a new section, you cannot return to this Section. To start the case study - To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study Before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem Statements. If the case study has an All Information tab, note that the information displayed is identical to the information displayed on the Subsequent tabs. When you are ready to answer a question, click the Question button to return to the question. Overview - Litware, Inc. is a financial services company that has main offices in New York and San Francisco. Litware has 30 branch offices and remote Employees across the United States. The remote employees connect to the main offices by using a VPN. Litware has grown significantly during the last two years due to mergers and Acquisitions. The acquisitions include several companies based in France. Existing Environment - Litware has an Azure Active Directory (Azure AD) tenant that syncs with an Active Directory Domain Services (AD DS) forest named litware.com And is linked to 20 Azure subscriptions. Azure AD Connect is used to implement pass-through authentication. Password hash synchronization is disabled, and Password writeback is enabled. All Litware users have Microsoft 365 E5 licenses. The environment also includes several AD DS forests, Azure AD tenants, and hundreds Of Azure subscriptions that belong to the subsidiaries of Litware. Requirements. Planned Changes - Litware plans to implement the following changes: Create a management group hierarchy for each Azure AD tenant. Design a landing zone strategy to refactor the existing Azure environment of Litware and deploy all future Azure workloads. Implement Azure AD Application Proxy to provide secure access to internal applications that are currently accessed by using the VPN. Requirements. Business Requirements Litware identifies the following business requirements: Minimize any additional on-premises infrastructure. Minimize the operational costs associated with administrative overhead. Requirements. Hybrid Requirements Litware identifies the following hybrid cloud requirements: Enable the management of on-premises resources from Azure, including the following: - Use Azure Policy for enforcement and compliance evaluation. - Provide change tracking and asset inventory. - Implement patch management. Provide centralized, cross-tenant subscription management without the overhead of maintaining guest accounts. Requirements. Microsoft Sentinel Requirements Litware plans to leverage the security information and event management (SIEM) and security orchestration automated response (SOAR) Capabilities of Microsoft Sentinel. The company wants to centralize Security Operations Center (SOC) by using Microsoft Sentinel. Requirements. Identity Requirements Litware identifies the following identity requirements: Detect brute force attacks that directly target AD DS user accounts. Implement leaked credential detection in the Azure AD tenant of Litware. Prevent AD DS user accounts from being locked out by brute force attacks that target Azure AD user accounts. Implement delegated management of users and groups in the Azure AD tenant of Litware, including support for: - The management of group properties, membership, and licensing - The management of user properties, passwords, and licensing - The delegation of user management based on business units Requirements. Regulatory Compliance Requirements Litware identifies the following regulatory compliance requirements: Ensure data residency compliance when collecting logs, telemetry, and data owned by each United States - and France-based subsidiary. Leverage built-in Azure Policy definitions to evaluate regulatory compliance across the entire managed environment. Use the principle of least privilege. Requirements. Azure Landing Zone Requirements Litware identifies the following landing zone requirements: Route all internet-bound traffic from landing zones through Azure Firewall in a dedicated Azure subscription. Provide a secure score scoped to the landing zone. Ensure that the Azure virtual machines in each landing zone communicate with Azure App Service web apps in the same zone over the Microsoft backbone network, rather than over public endpoints. Minimize the possibility of data exfiltration. Maximize network bandwidth. The landing zone architecture will include the dedicated subscription, which will serve as the hub for internet and hybrid connectivity. Each landing Zone will have the following characteristics: Be created in a dedicated subscription. Use a DNS namespace of litware.com. Requirements. Application Security Requirements Litware identifies the following application security requirements: Identify internal applications that will support single sign-on (SSO) by using Azure AD Application Proxy. Monitor and control access to Microsoft SharePoint Online and Exchange Online data in real time. Question You need to recommend a strategy for routing internet-bound traffic from the landing Zones. The solution must meet the landing zone requirements. What should you recommend as part of the landing zone deployment?