You have an Azure Machine Learning model that is deployed to a web service. You plan to publish the web service by using the name ml.contoso.com. You need to recommend a solution to ensure that access to the web service is encrypted. Which three actions should you recommend? Each correct answer presents part of...Continue reading
What is the purpose of the Request Rationalization functional component?A . Presenting service offers to consumers and facilitating consumption and paymentB . Aggregating catalog from various suppliers into consumable Offers that users can orderC . Breaking down and routing requests, and keeping Subscription information up do dateD . Orchestrating the delivery of various requests...Continue reading
Refer to the statement. How to correct it?A . change the source IP of tunnel0B . change the destination IP of tunnel0C . add tunnel keyD . add static route to tunnel0 destination View Answer Answer: D Explanation: The %TUN-5-RECURDOWN: Tunnel0 temporarily disabled due to recursive routing error message means that the generic routing...Continue reading
Decrypted packets from the website https://www.microsoft.com will appear as which application and service within the Traffic log?A . web-browsing and 443B . SSL and 80C . SSL and 443D . web-browsing and 80 View Answer Answer: A...
On which data store you configure TDE to meet the technical requirements?A . Cosmos DBB . SQL Data WarehouseC . SQL Database View Answer Answer: B Explanation: Scenario: Transparent data encryption (TDE) must be enabled on all data stores, whenever possible. The datacentre for Mechanical Workflow must be moved to Azure SQL data Warehouse....Continue reading
DRAG DROP You are developing a solution to visualize multiple terabytes of geospatial data. The solution has the following requirements: – Data must be encrypted. – Data must be accessible by multiple resources on Microsoft Azure. You need to provision storage for the solution. Which four actions should you perform in sequence? To answer,...Continue reading
An administrator needs to upgrade a Palo Alto Networks NGFW to the most current version of PAN-OS® software. The firewall has internet connectivity through an Ethernet interface, but no internet connectivity from the management interface. The Security policy has the default security rules and a rule that allows all web-browsing traffic from any to...Continue reading
Question Set 3 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer...Continue reading
Each day, company plans to store hundreds of files in Azure Blob Storage and Azure Data Lake Storage. The company uses the parquet format. You must develop a pipeline that meets the following requirements: Process data every six hours Offer interactive data analysis capabilities Offer the ability to process data using solid-state drive (SSD)...Continue reading
Which protection feature is available only in a Zone Protection Profile?A . SYN Flood Protection using SYN Flood CookiesB . ICMP Flood ProtectionC . Port Scan ProtectionD . UDP Flood Protections View Answer Answer: A...