Friday, May 13, 2022

SC-900 Microsoft Security Compliance and Identity Fundamentals Exam

 

The English language version of this exam was updated on April 25, 2022.
Following the current exam guide, we have included a table that compares the previous study guide to the new one by functional group, showing the changes that were made to the exam on that date. We have also included the previous study guide for reference purposes.

The table below shows the changes that were implemented on April 25, 2022 to the English language version of this exam. Following the comparison table, the previous study guide is included for reference

Old objective number Subtask changes and new location
1.1 Describe security and compliance concepts & methodologies Revised title and subtasks
1.2 Define identity concepts Revised subtasks
2.1 Describe the basic identity services and identity types of Azure AD Revised subtasks
2.2 Describe the authentication capabilities of Azure AD Revised subtasks
2.3 Describe access management capabilities of Azure AD Revised subtasks
2.4 Describe the identity protection & governance capabilities of Azure AD Revised subtasks
3.1 Describe basic security capabilities in Azure Revised subtasks
3.2 Describe security management capabilities of Azure Revised subtasks
3.3 Describe security capabilities of Azure Sentinel Revised subtasks
3.4 Describe threat protection with Microsoft 365 Defender Revised subtasks
3.5 Describe security management capabilities of Microsoft 365 Deleted; moved to 3.4
3.6 Describe endpoint security with Microsoft Intune Deleted
4.1 Describe the compliance management capabilities in Microsoft Revised title and subtasks, split into 4.1 and 4.2
4.2 Describe information protection and governance capabilities of Microsoft 365 Revised title and subtasks
4.3 Describe insider risk capabilities in Microsoft 365 Revised subtasks
4.4 Describe resource governance capabilities in Azure Revised title and subtasks


Audience Profile
This certification is targeted to those looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.
This is a broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions.

Candidates should be familiar with Microsoft Azure and Microsoft 365 and want to understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.

Skills Measured
NOTE: The bullets that follow each of the skills measured are intended to illustrate how we are assessing that skill. Related topics may be covered in the exam.
NOTE: Most questions cover features that are general availability (GA). The exam may contain questions on Preview features if those features are commonly used.

Describe the concepts of security, compliance, and identity (5-10%)
Describe security and compliance concepts & methodologies
• describe the Zero-Trust methodology
• describe the shared responsibility model
• define defense in depth
• describe common threats
• describe encryption and hashing
• describe cloud adoption framework

Define identity concepts
• define identity as the primary security perimeter
• define authentication
• define authorization
• describe what identity providers are
• describe what Active Directory is
• describe the concept of Federated services
• define common Identity Attacks

Describe the capabilities of Microsoft identity and access management solutions (25-30%)

Describe the basic identity services and identity types of Azure AD

• describe what Azure Active Directory is
• describe Azure AD identity types (users, devices, groups, service principals/applications)
• describe what hybrid identity is
• describe the different external identity types (Guest Users)

Describe the authentication capabilities of Azure AD
• describe the different authentication methods
• describe self-service password reset
• describe password protection and management capabilities
• describe Multi-factor Authentication
• describe Windows Hello for Business

Describe access management capabilities of Azure AD

• describe what conditional access is
• describe uses and benefits of conditional access
• describe the benefits of Azure AD roles

Describe the identity protection & governance capabilities of Azure AD
• describe what identity governance is
• describe what entitlement management and access reviews is
• describe the capabilities of PIM
• describe Azure AD Identity Protection

Describe the capabilities of Microsoft Security solutions (30-35%)

Describe basic security capabilities in Azure

• describe Azure Network Security groups
• describe Azure DDoS protection
• describe what Azure Firewall is
• describe what Azure Bastion is
• describe what Web Application Firewall is
• describe ways Azure encrypts data

Describe security management capabilities of Azure
• describe Cloud security posture management (CSPM)
• describe Microsoft Defender for Cloud
• describe secure score in Microsoft Defender Cloud
• describe enhanced security of Microsoft Defender for Cloud
• describe security baselines for Azure

Describe security capabilities of Microsoft Sentinel

• define the concepts of SIEM, SOAR, XDR
• describe how of Microsoft Sentinel provides integrated threat protection

Describe threat protection with Microsoft 365 Defender
• describe Microsoft 365 Defender services
• describe Microsoft Defender for Identity (formerly Azure ATP)
• describe Microsoft Defender for Office 365 (formerly Office 365 ATP)
• describe Microsoft Defender for Endpoint (formerly Microsoft Defender ATP)
• describe Microsoft Defender for Cloud Apps

Describe security management capabilities of Microsoft 365
• describe the Microsoft 365 Defender portal
• describe how to use Microsoft Secure Score
• describe security reports and dashboards
• describe incidents and incident management capabilities

Describe endpoint security with Microsoft Intune

• describe what Intune is
• describe endpoint security with Intune
• describe the endpoint security with the Microsoft Endpoint Manager admin center

Describe the capabilities of Microsoft compliance solutions (25-30%)
Describe the compliance management capabilities in Microsoft
• describe the offerings of the Service Trust portal
• describe Microsoft’s privacy principles
• describe the compliance center
• describe compliance manager
• describe use and benefits of compliance score

Describe information protection and governance capabilities of Microsoft 365
• describe data classification capabilities
• describe the value of content and activity explorer
• describe sensitivity labels
• describe Retention Polices and Retention Labels
• describe Records Management
• describe Data Loss Prevention

Describe insider risk capabilities in Microsoft 365

• describe Insider risk management solution
• describe communication compliance
• describe information barriers
• describe privileged access management
• describe customer lockbox

Describe the eDiscovery and audit capabilities of Microsoft 365
• describe the purpose of eDiscovery
• describe the capabilities of the content search tool
• describe the core eDiscovery workflow
• describe the advanced eDiscovery workflow
• describe the core audit capabilities of M365
• describe purpose and value of Advanced Auditing

Describe resource governance capabilities in Azure
• describe the use of Azure Resource locks
• describe what Azure Blueprints is
• define Azure Policy and describe its use cases
 

Examkingdom Microsoft SC-900 Exam Brain dump pdf , Certkingdom Microsoft SC-900 Brain Dumps PDF

MCTS Training, MCITP Trainnig

Best Microsoft SC-900 Certification, Microsoft SC-900 Brain Dumps Training at certkingdom.com


QUESTION 1
Which score measures an organization's progress in completing actions that help reduce risks associated to
data protection and regulatory standards?

A. Microsoft Secure Score
B. Productivity Score
C. Secure score in Azure Security Center
D. Compliance score

Answer: D


QUESTION 2
What do you use to provide real-time integration between Azure Sentinel and another security source?

A. Azure AD Connect
B. a Log Analytics workspace
C. Azure Information Protection
D. a connector

Answer: D


QUESTION 3
Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard,
such as International Organization for Standardization (ISO)?

A. the Microsoft Endpoint Manager admin center
B. Azure Cost Management + Billing
C. Microsoft Service Trust Portal
D. the Azure Active Directory admin center

Answer: C


QUESTION 4
In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?

A. the management of mobile devices
B. the permissions for the user data stored in Azure
C. the creation and management of user accounts
D. the management of the physical hardware

Answer: D


QUESTION 5
In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase?
Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

A. Plan
B. Manage
C. Adopt
D. Govern
E. Define Strategy

Answer: A,E
 

Wednesday, May 11, 2022

C1000-026 IBM Security QRadar SIEM V7.3.2 Fundamental Administration Exam

 

Certification Overview
This entry level certification is intended for administrators who can demonstrate basic support and technical knowledge of IBM Security QRadar SIEM V7.3.2, including implementation and management of an IBM Security QRadar SIEM V7.3.2 solution.
Overall, these administrators are familiar with product functionality and the security policies. They plan, install, configure, implement, deploy, migrate, upgrade, monitor and troubleshoot the IBM Security QRadar SIEM V7.3.2 software.

Note: The function of specific apps, apart from the two bundled with the product, is out of scope, but the concept of extending the capability of using apps is in scope.
Recommended Skills

Basic knowledge in:
RedHat
Networking
Basic Query Language
Regular Expressions
System architecture design
Security platforms

Requirements
Exam C1000-026: IBM Security QRadar SIEM V7.3.2 Fundamental Administration

The test: contains questions requiring single and multiple answers. For multiple-answer questions, you need to choose all required options to get the answer correct. You will be advised how many options make up the correct answer.

is designed to provide diagnostic feedback on the Examination Score Report, correlating back to the test objectives, informing the test taker how he or she did on each section of the test. As a result, to maintain the integrity of each test, questions and answers are not distributed.

Exam Objectives
The test consists of 5 sections containing a total of approximately 60 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.

Number of questions: 60
Number of questions to pass: 40
Time allowed: 90 minutes
Status: Withdrawn

Section 1: Implementing
Plan and design QRadar deployment.
Implement and install QRadar.
Add Managed Hosts.

Section2: Migrating and upgrading
Plan QRadar upgrade and migration.
Review documentation and release notes.
Perform QRadar updates, patches and upgrades.
Perform migration (e.g., backup and restore, import and export content).

Section3: Configuring and Administering task
Configure event flow sources and custom properties.
Maintain configuration and data backups.
Create and administer users, user roles, and security profiles.
Manage the license per allocation.
Create, review and modify rules, building blocks and reference sets.
Configure and manage retention policies (i.e., data and assets).
Create and manage saved searches, index, global views, dashboards and reports.
Deploy and manage applications and content packages.
Configure global system notifications.
Configure and apply network hierarchy.
Configure and manage domain and tenants.
Use the asset database.
Schedule and run a VA scan.

Section4: Monitoring
Monitor QRadar Notifications and error messages.
Review and interpret system monitoring dashboards.
Verify QRadar processes and services.
Monitor QRadar performance.
Use apps and tools for monitoring (e.g., QDI, assistant app, incident overview, DrQ).
Check system maintenance and health of appliances.
Monitor offenses and detect anomalies.

Section5: Troubleshooting

Exam Resources
To prepare for the test, take the first self-study course listed below. It is free-of-charge and covers all the knowledge and skills measured on the test. The second course listed (BQ103), alone will not adequately help you prepare for the test. BQ103 can, however, be used as a supplement to the first self-study course. To register for the second course, click here to contact one of IBM's Global Training Providers.

(*) Notes:

These learning sources are recommended, but not required before taking this test.
Every effort has been made to make the recommended learning sources as complete and as accurate as possible, but no warranty of fitness is implied. The learning sources provided are on an 'as is' basis. IBM shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from course or publication content.

You must be logged in to the Security Learning Academy for the link to the self-study course to work properly. If you see an error message after clicking a link, log in and retry the link.

Examkingdom IBM C1000-026 Exam Brain dump pdf , Certkingdom IBM C1000-026 Brain Dumps PDF

MCTS Training, MCITP Trainnig

Best IBM C1000-026 Certification, IBM C1000-026 Brain Dumps Training at certkingdom.com

QUESTION 1
An administrator needs to import data into QRadar for a specific use case.
The data that has been provided to the administrator is stored in records that map a key to a value.
Which type of data collection must the administrator create?

A. Reference set
B. Reference map of sets
C. Reference map
D. Reference map of maps

Answer: B

QUESTION 2
An administrator needs to know if a custom rule is being correlated correctly.
Which QRadar component is responsible for this process?

A. QRadar Event Collector
B. QRadar Console
C. Magistrate
D. QRadar Event Processor

Answer: D

QUESTION 3
An administrator needs to collect logs from the Command Line Interface (CLI).
Which command should the administrator use?

A. /opt/bin/qradar/support/get_logs.sh
B. /opt/support/get_logs.sh
C. /opt/support/qradar/get_logs.sh
D. /opt/qradar/support/get_logs.sh

Answer: D

QUESTION 4
To comply with specific regulations, an administrator has been requested to increase asset retention to 365 days.
In which QRadar section can the administrator find the asset retention settings?

A. Admin Tab / Asset Retention
B. Assets Tab / Retention settings
C. Admin Tab / System settings
D. Assets Tab / Asset Retention

Answer: C

QUESTION 5
A QRadar administrator added High Availability (HA) to the Event Processor and needs to verify the crossover
link status between the primary and secondary hosts.
Which commands can be used to verify the crossover status? (Choose two.)

A. /opt/qradar/ha/bin/ha_getstate.sh
B. /opt/qradar/ha/bin/getStatus crossover
C. /opt/qradar/ha/bin/qradar_nettune.pl crossover status
D. /opt/qradar/ha/bin/qradar_nettune.pl linkaggr <interface> status
E. /opt/qradar/ha/bin/ha cstate
F. cat /proc/drbd

Answer: C,F