Ultimate access to all questions.
For a Microsoft cloud environment, you have been tasked with designing a security architecture based on the Microsoft Cybersecurity Reference Architectures (MCRA). In this context, you need to address protection measures for the following external threats within an attack chain:
• An attacker attempting to exfiltrate data to external websites. • An attacker attempting lateral movement across domain-joined computers.
What should be included in your recommendations to mitigate each of these threats? To answer, select the appropriate options in the answer area.
Explanation:
For protection against data exfiltration to external websites, Microsoft recommends using Microsoft Defender for Cloud Apps. It can monitor and control the data flow in cloud applications, helping to detect and prevent data exfiltration attempts. For protection against lateral movement across domain-joined computers, Microsoft Defender for Identity is recommended. It provides continuous monitoring of user activities, behavior analytics, and machine learning-based detection capabilities to identify and block suspicious activities across domain-joined environments. These recommendations align with the Microsoft Cybersecurity Reference Architectures (MCRA).