The developers at your company plan to create a web app named App10598168 and to publish the app to https://www.contoso.com

SIMULATION The developers at your company plan to create a web app named App10598168 and to publish the app to https://www.contoso.com. You need to perform the following tasks: - Ensure that App10598168 is registered to Azure Active Directory (Azure AD). - Generate a password for App10598168. To complete this task,...

September 13, 2020 No Comments READ MORE +

Which is included in the purpose of the ‘design and transition’ value chain activity?

Which is included in the purpose of the ‘design and transition’ value chain activity?A . Ensuring that service components are available when neededB . Providing transparency and good stakeholder relationshipsC . Supporting services according to specificationsD . Continually meeting stakeholder expectations for costsView AnswerAnswer: D

September 13, 2020 No Comments READ MORE +

Which one of the following would NOT be defined as part of every process?

Which one of the following would NOT be defined as part of every process?A . RolesB . Inputs and outputsC . FunctionsD . MetricsView AnswerAnswer: C

September 13, 2020 No Comments READ MORE +

What is warranty?

What is warranty?A . Assurance that a product or service will meet agreed requirementsB . The amount of money spent on a specific activity or resourceC . The functionality offered by a product or service to meet a particular needD . The perceived benefits, usefulness and importance of somethingView AnswerAnswer:...

September 13, 2020 No Comments READ MORE +

Which solution will improve the performance of Amazon ES?

A company uses Amazon Elasticsearch Service (Amazon ES) to store and analyze its website clickstream data. The company ingests 1 TB of data daily using Amazon Kinesis Data Firehose and stores one day’s worth of data in an Amazon ES cluster. The company has very slow query performance on the...

September 13, 2020 No Comments READ MORE +

How many NSGs and network security rules should you create?

HOTSPOT You have an Azure subscription named Sub1. You create a virtual network that contains one subnet. On the subnet, you provision the virtual machines shown in the following table. Currently, you have not provisioned any network security groups (NSGs). You need to implement network security to meet the following...

September 13, 2020 No Comments READ MORE +

Which statement about the authentication protocol used in the configuration is true?

Refer to the exhibit. Which statement about the authentication protocol used in the configuration is true?A . The authentication request contains only a passwordB . The authentication request contains only a usernameC . The authentication and authorization requests are grouped in a single packet.D . There are separate authentication and...

September 13, 2020 No Comments READ MORE +

What is a benefit of using a Cisco Wireless LAN Controller?

What is a benefit of using a Cisco Wireless LAN Controller?A . It eliminates the need to configure each access point individually.B . Central AP management requires more complex configurations.C . Unique SSIDs cannot use the same authentication method.D . It supports autonomous and lightweight APs.View AnswerAnswer: A

September 13, 2020 No Comments READ MORE +

What should you do first?

You need to meet the technical requirements for VNetwork1. What should you do first?A . Create a new subnet on VNetwork1.B . Remove the NSGs from Subnet11 and Subnet13.C . Associate an NSG to Subnet12.D . Configure DDoS protection for VNetwork1.View AnswerAnswer: A Explanation: From scenario: Deploy Azure Firewall to...

September 13, 2020 No Comments READ MORE +

Which of the following types of VPN uses the Internet as its main backbone, allowing users, customers, and branch offices to access corporate network resources across various network architectures?

Which of the following types of VPN uses the Internet as its main backbone, allowing users, customers, and branch offices to access corporate network resources across various network architectures?A . PPTP VPNB . Remote access VPNC . Extranet-based VPND . Intranet-based VPNView AnswerAnswer: C Explanation: An extranet-based VPN uses the...

September 13, 2020 No Comments READ MORE +