Your company uses line-of-business apps that contain Microsoft Office VBA macros. You plan to enable protection against downloading and running additional payloads from the Office VBA macros as additional child processes. You need to identify which Office VBA macros might…

You need to modify the anomaly detection policy settings to meet the Cloud App Security requirements. Which policy should you modify? A. Activity from suspicious IP addresses B. Activity from anonymous IP addresses C. Impossible travel D. Risky sign-in

You need to implement the Azure Information Protection requirements. What should you configure first? A. Device health and compliance reports settings in Microsoft Defender Security Center B. scanner clusters in Azure Information Protection from the Azure portal C. content scan…

Case study This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam.…

Case study This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam.…