You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -161,8 +161,8 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
161
161
| 108 | [Azure AD Connect can be used to implement hybrid identity.](#azure-ad-connect-can-be-used-to-implement-hybrid-identity)
162
162
| 109 | [Hybrid identity requires the implementation of two Microsoft 365 tenants.](#hybrid-identity-requires-the-implementation-of-two-microsoft-365-tenants)
163
163
| 110 | [Hybrid identity refers to the synchronization of Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD).](#hybrid-identity-refers-to-the-synchronization-of-active-directory-domain-services-ad-ds-and-azure-active-directory-azure-ad)
164
-
| 111 | [use encryption to protect data at rest.](#use-encryption-to-protect-data-at-rest)
165
-
| 112 | [actively monitor systems to identify irregularities that might represent risks.](#actively-monitor-systems-to-identify-irregularities-that-might-represent-risks)
164
+
| 111 | [Match the types of compliance score actions to the appropriate tasks. [...] Use encryption to protect data at rest.](#match-the-types-of-compliance-score-actions-to-the-appropriate-tasks--use-encryption-to-protect-data-at-rest)
165
+
| 112 | [Match the types of compliance score actions to the appropriate tasks. [...] Actively monitor systems to identify irregularities that might represent risks.](#match-the-types-of-compliance-score-actions-to-the-appropriate-tasks--actively-monitor-systems-to-identify-irregularities-that-might-represent-risks)
166
166
| 113 | [You can use the insider risk management solution to detect phishing scams.](#you-can-use-the-insider-risk-management-solution-to-detect-phishing-scams)
167
167
| 114 | [To which type of resource can Azure Bastion provide secure access?](#to-which-type-of-resource-can-azure-bastion-provide-secure-access)
168
168
| 115 | [Conditional access policies always enforce the use of multi-factor authentication (MFA).](#conditional-access-policies-always-enforce-the-use-of-multi-factor-authentication-mfa)
@@ -1118,15 +1118,15 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
1118
1118
1119
1119
**[⬆ Back to Top](#table-of-contents)**
1120
1120
1121
-
### use encryption to protect data at rest.
1121
+
### Match the types of compliance score actions to the appropriate tasks. [...] Use encryption to protect data at rest.
1122
1122
1123
1123
-[ ] Corrective.
1124
1124
-[ ] Detective.
1125
1125
-[x] Preventative.
1126
1126
1127
1127
**[⬆ Back to Top](#table-of-contents)**
1128
1128
1129
-
### Actively monitor systems to identify irregularities that might represent risks.
1129
+
### Match the types of compliance score actions to the appropriate tasks. [...]Actively monitor systems to identify irregularities that might represent risks.
0 commit comments