HOTSPOT You have a Microsoft 365 £5 subscription. You plan to implement Microsoft Priva Subject Rights Requests for Microsoft 365 data. You need to streamline the creation and processing of subject rights requests. The solution must minimize development effort. What should you include in the solution? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
HOTSPOT Your company plans to follow DevSecOps best practices of the Microsoft Cloud Adoption Framework for Azure to integrate DevSecOps processes into continuous integration and continuous deployment (Cl/CD) DevOps pipelines You need to recommend which security-related tasks to integrate into each stage of the DevOps pipelines. What should recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
HOTSPOT Your company is migrating data to Azure. The data contains Personally Identifiable Information (Pll). The company plans to use Microsoft Information Protection for the Pll data store in Azure. You need to recommend a solution to discover Pll data at risk in the Azure resources. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
1st: Azure Purview, 2nd: Microsoft Defender for Cloud. Purview finds and classifies PII, then Defender for Cloud helps monitor and protect those resources. Seen this combo in a few practice sets, pretty sure it's right.
HOTSPOT You have a hybrid cloud infrastructure. You plan to deploy the Azure applications shown in the following table. 
HOTSPOT You are creating the security recommendations for an Azure App Service web app named App1. App1 has the following specifications: • Users will request access to App1 through the My Apps portal. A human resources manager will approve the requests. • Users will authenticate by using Azure Active Directory (Azure AD) user accounts. You need to recommend an access security architecture for App1. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Isn’t the main trap here thinking you’d use something like conditional access for access requests? For the approval flow, pretty sure it has to be an access package in Identity Governance. And for auth, you’d register App1 as an Azure AD app. Anyone see a scenario where another combo fits better?
HOTSPOT Your company has a multi-cloud environment that contains a Microsoft 365 subscription, an Azure subscription, and Amazon Web Services (AWS) implementation. You need to recommend a security posture management solution for the following components: • Azure loT Edge devices • AWS EC2 instances Which services should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Microsoft Defender for IoT is the right fit for IoT Edge devices, while AWS EC2 needs both Microsoft Defender for Cloud and Azure Arc. If the question only asked about monitoring and not remediation, would that change which services are best?
HOTSPOT You have a Microsoft 365 E5 subscription and an Azure subscripts You need to evaluate the existing environment to increase the overall security posture for the following components: • Windows 11 devices managed by Microsoft Intune • Azure Storage accounts • Azure virtual machines What should you use to evaluate the components? To answer, select the appropriate options in the answer area.
HOTSPOT Your network contains an on-premises Active Directory Domain Services (AO DS) domain. The domain contains a server that runs Windows Server and hosts shared folders The domain syncs with Azure AD by using Azure AD Connect Azure AD Connect has group writeback enabled. You have a Microsoft 365 subscription that uses Microsoft SharePoint Online. You have multiple project teams. Each team has an AD DS group that syncs with Azure AD Each group has permissions to a unique SharePoint Online site and a Windows Server shared folder for its project. Users routinely move between project teams. You need to recommend an Azure AD identity Governance solution that meets the following requirements: • Project managers must verify that their project group contains only the current members of their project team • The members of each project team must only have access to the resources of the project to which they are assigned • Users must be removed from a project group automatically if the project manager has MOT verified the group s membership for 30 days. • Administrative effort must be minimized. What should you include in the recommendation? To answer select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
HOTSPOT For a Microsoft cloud environment, you are designing a security architecture based on the Microsoft Cybersecurity Reference Architectures (MCRA). You need to protect against the following external threats of an attack chain: • An attacker attempts to exfiltrate data to external websites. • An attacker attempts lateral movement across domain-joined computers. What should you include in the recommendation for each threat? To answer, select the appropriate options in the answer area.

HOTSPOT You need to recommend a security methodology for a DevOps development process based on the Microsoft Cloud Adoption Framework for Azure. During which stage of a continuous integration and continuous deployment (CI/CD) DevOps process should each security-related task be performed? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point
Threat modeling fits in plan and develop, DAST should happen in build and test, actionable intelligence lines up with operate. That's how the CAF for Azure maps it. Pretty sure this is how MS expects it to be sequenced.








