Pertanyaan
Contoh Soal Microsoft SC900 Which of the following best describes the concept of data sovereignty? There are regulations that govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally. Data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed. Trust no one, verify everything. Correct answer Data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed. 2. Which of the following measures might an organization implement as part of the defense in-depth security methodology? Locating all its servers in a single physical location. Multifactor authentication for all users. Ensuring there's no segmentation of your corporate network. 3. A developer wants an application to connect to Azure resources that support Microsoft Entra authentication, without having to manage any credentials and without incurring any extra cost. Which option best describes the identity type of the application? Service principal Managed identity Hybrid identity 4. Which of the following additional forms of verification can be used with Microsoft Entra multifactor authentication? Microsoft Authenticator app, SMS, Voice call, FIDO2, and Windows Hello for Business Security questions, SMS, Voice call, FIDO2, and Windows Hello for Business Password spray, SMS, Voice call, FIDO2, and Windows Hello for Business 5. Your IT organization is looking for a solution that provides comprehensive visibility and control over permissions for any identity and any resource in their multi-vendor cloud environment. Which Microsoft solution is best suited to address these needs? Identity Protection. Privileged Identity Management. Permissions Management. 6. The security admin wants to protect Azure resources from DDoS attacks and needs logging, alerting, and telemetry capabilities. which Azure service can provide these capabilities? Default DDoS infrastructure protection. DDoS Network Protection. Azure Bastion. 7. An organization wants to add vulnerability scanning for its Azure resources to view, investigate, and remediate the findings directly within Microsoft Defender for Cloud. What functionality of Microsoft Defender for Cloud would they need to consider? Secure score and recommendations functionality that are part of the CSPM pillar of Microsoft Defender for Cloud. The enhanced functionality that is provided through the Microsoft Defender plans and is part of the CWP pillar of Microsoft Defender for Cloud. Security Benchmarks Correct answer The enhanced functionality that is provided through the Microsoft Defender plans and is part of the CWP pillar of Microsoft Defender for Cloud. 8. Which framework does Microsoft Defender for Cloud apply as a default initiative for security and compliance and provides best practices and recommendations to help improve the security of workloads, data, and services on Azure and your multicloud environment? Microsoft Cloud security benchmark The Center for Internet Security (CIS) framework The National Institute of Standards and Technology (NIST) framework 9. A customer has requested a presentation on how the Microsoft Purview compliance portal can help improve their organization's compliance posture. The presentation will need to cover Compliance Manager and compliance score. What is the difference between Compliance Manager and compliance score? * Compliance Manager is an end-to-end solution, in the Microsoft Purview compliance portal, to enable admins to manage and track compliance activities. Compliance score is a calculation of the overall compliance posture across the organization. Compliance Manager is an end-to-end solution, in the Microsoft Purview compliance portal, to enable admins to manage and track compliance activities. Compliance score is a score the organization receives from regulators for successful compliance. Compliance Manager is the regulator who will manage your compliance activities. Compliance score is a calculation of the overall compliance posture across the organization. Correct answer Compliance Manager is an end-to-end solution, in the Microsoft Purview compliance portal, to enable admins to manage and track compliance activities. Compliance score is a calculation of the overall compliance posture across the organization. 10. To comply with corporate policies, the compliance admin needs to be able to identify and scan for offensive language across the organization. What solution can the admin implement to address this need? Use Policy Compliance in Microsoft Purview. Use Microsoft Purview Communication Compliance.
Jawaban
Soal Number 1 : Data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed.
Soal Number 2 : Multifactor authentication for all users.
Soal Number 3 : Managed identity
Soal Number 4 : Microsoft Authenticator app, SMS, Voice call, FIDO2, and Windows Hello for Business
Soal Number 5 : Privileged Identity Management.
Soal Number 6 : DDoS Network Protection.
Soal Number 7 : The enhanced functionality that is provided through the Microsoft Defender plans and is part of the CWP pillar of Microsoft Defender for Cloud.
Soal Number 8 : The Center for Internet Security (CIS) framework
Soal Number 9 : Compliance Manager is an end-to-end solution, in the Microsoft Purview compliance portal, to enable admins to manage and track compliance activities. Compliance score is a calculation of the overall compliance posture across the organization.
Soal Number 10 : Use Microsoft Purview Communication Compliance.
Penjelasan
1. Konsep kedaulatan data mengacu pada aturan dan peraturan yang mengatur pengumpulan, tempat penyimpanan, pemrosesan, serta transfer data, utamanya data personal, dalam batas yurisdiksi di mana data tersebut diproses.
2. Dalam metode keamanan "defense in depth", implementasi mengharuskan sejumlah lapisan pertahanan dalam jaringan. Salah satu metode dapat berupa multifaktor autentikasi untuk semua pengguna.
3. Identitas yang dikelola (Managed Identity) adalah identitas yang dikelola oleh Azure dan otomatis dikendalikan dan memberikan saran otentikasi kepada sumber daya dukungan berdasarkan hukum edukasi dan teritorialnya.
4. Otentikasi prosew Multifaktor di Microsoft memungkinkan untuk melakukan verifikasi lanjutan dalam berbagai bentuk verifikasi lainnya seperti penggunaan aplikasi otentikasi Microsoft, SMS, FIDO2, Panggilan suara, dan juga Windows Hello untuk Bisnis.
5. Pada lingkungan multi-cloud, pengelolaan identitas dan akses yang terbaik dari Microsoft adalah Privileged Identity Management yang memfasilitasi visibilitas dan kendali sepanjang kemampuan hak perizinan identitas.
6. Azure menyediakan DDoS Protection, yaitu layanan yang memberi perlindungan dari serangan DDoS sekaligus menyediakan informasi log, kemampuan memberi peringatan dan telemetry.
7. Pemindaian kerentanan bagi sumber Azure melibatkan fungsi Defender for Cloud yang memberikan solusi dan rekomendasi guna meningkatkan keamanan kerja, data, dan layanan di Azure.
8. Defender for Cloud berpegang pada kerangka pengaturan dan implementasi keamanan "Center for Internet Security (CIS) Framework".
9. Compliance Manager dan Compliance score adalah dua entitas berbeda pada Purview Compliance Portal oleh Microsoft. Compliance Manager merujuk pada sebuah aplikasi yang menyediakan panduan seputar kepatuhan standar hukum dan kerangka kerja kerentanan perlindungan yang direkomendasikan. Compliance Score melakukan kalkulasi dan mencetak bagaimana organisasi mesuatu berpijak berdasarkan patuh atau tidaknya terhadap peraturan.
10. Untuk memastikan kepatuhan terhadap kebijakan perusahaan terdat panggunaan bahasa ofensif disekitar sumber daya komunikasi dalam organisasi, layak menambahkan Purview Communication Compliance buatan Microsoft.
Pertanyaan Panas lebih
Gatekna wacan iki! Bapak Pengawas sekolah ingkang satuhu kinurmatan, ketua komite sekolah ingkang kinurmatan, saha para siswa ingkang sutresna. Mangga
Teknik menendang dalam permainan sepak bola ada beberapa macam, antara lain teknik menendang bola dengan menggunakan kaki bagian dalam. Berikut ini ad
Perhatikan gambar sasaran serangan pencak silat berikut! Pencak silat kategori tanding mempertemukan dua orang pesilat untuk bertanding sesuai dengan
Perhatikan gambar berikut ini! Pada gambar diatas, Calibri adalah .... A. Thema B. Huruf C. Warna D. Username A. B. C. D.
Markosik berjalan di lorong sekolah, pada saat di tengah perjalanan dia menemukan secarik kertas tertempel pada dinding. Terdapat sebuah simbol aplik
Biasanya berbentuk tulisan ilmiah dan ilmiah populer, laporan, artikel, feature, skripsi, tesis, disertasi, makalah, dan sebagainya. Karangan nonfiksi
Lab maya Concord 5 points menyediakan banyak aktivitas STEM interaktif yang selaras dengan ... . Next Generation Standard Science Generation Next Scie
Read the following text. Living in a city is a well-known risk factor for developing mental disorders, whereas living near nature is thought to be goo
39 dari 138 Tandal Compass heading in a liquid compass is indicated by: Lubber's line Needle Card Flinder's bar Saya Tidak Tahu
Pernyataan mana yang benar mengenai revisi kurikulum? (1 Poin)* Harus dilakukan setiap tahun Hanya perlu dilakukan jika ada keluhan Harus dilakukan be
Berikut ini termasuk ke dalam kerangka dasar kurikulum yang telah ditetapkan oleh pemerintah, kecuali... A Struktur Kurikulum B Capaian Pembelajaran C
Level taksonomi Marzano yang tertinggi adalah A Pemahaman B Analisis C Sistem diri D Metakognisi
Langkah membuat daftar isi yang sudah dibuat dan ingin di ubah adalah... Refences - caption Refences - Create Refences -kolom update table Insert - he
Apa yang dimaksud dengan "Pergelangan Tangan" dalam pencak silat? A. Bagian tubuh yang harus dihindari saat bertarung B. Bagian tubuh yang sering digu
Elakan, hindaran, tangkisan dan tangkapan merupakan strategi yangdibutuhkan pencak silat pada saat... A. Penyerangan B. Pertahanan C. Pertandingan D.