Ultimate access to all questions.
As a Microsoft Cybersecurity Architect, you are designing a solution for a manufacturing organization that processes sensitive data related to national security and must comply with the International Traffic in Arms Regulations (ITAR). The solution must enforce security controls in the Azure environment to ensure ITAR compliance, with considerations for real-time monitoring, alerting, and remediation of security issues. Which of the following approaches BEST meets these requirements? (Choose one)