In this scenario, which statement is true?
A storage administrator is reviewing NAS volume space allocation and is concerned that the Snapshot copies that are recently created to protect the volumes are not storing the data from the volumes. One volume contains over 20 GB of data, although the latest SnapShot copy contains only 198 KB of...
Which storage type should you use for each file type?
HOTSPOT You need to build a sentiment analysis solution that will use input data from JSON documents and PDF documents. The JSON documents must be processed in batches and aggregated. Which storage type should you use for each file type? To answer, select the appropriate options in the answer area....
Which of the following biometric devices is used to take impressions of the friction ridges of the skin on the underside of the tip of the fingers?
Which of the following biometric devices is used to take impressions of the friction ridges of the skin on the underside of the tip of the fingers?A . Facial recognition deviceB . Iris cameraC . Voice recognition voiceprintD . Fingerprint readerView AnswerAnswer: D Explanation: A fingerprint reader is used to...
In which cloud services model is the tenant responsible for virtual machine OS patching?
In which cloud services model is the tenant responsible for virtual machine OS patching?A . IaaSB . UCaaSC . PaaSD . SaaSView AnswerAnswer: A Explanation: Reference: https://www.cmswire.com/cms/information-management/cloud-service-models-iaas-saas-paasÂhow-microsoft-office-365-azure-fit-in-021672.php
Which two roles and groups should you identify?
Your network contains an Active Directory forest named contoso.com. You have an Azure Directory (Azure AD) tenant named contoso.com. You plan to configure synchronization by using the Express Settings installation option in Azure AD Connect. You need to identify which roles and groups are required to perform the planned configuration....
You are evaluating the effect of the application security groups on the network communication between the virtual machines in Sub2
HOTSPOT You are evaluating the effect of the application security groups on the network communication between the virtual machines in Sub2. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1:...
What should you use?
Your network contains an on-premises Active Directory domain named corp.contoso.com. You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. You sync all on-premises identities to Azure AD. You need to prevent users who have a givenName attribute that starts...
What should you use?
Your company has 1,000 AI developers who are responsible for provisioning environments in Azure. You need to control the type, size, and location of the resources that the developers can provision. What should you use?A . Azure Key VaultB . Azure service principalsC . Azure managed identitiesD . Azure Security...
Which solution meets these requirements?
An insurance company has raw data in JSON format that is sent without a predefined schedule through an Amazon Kinesis Data Firehose delivery stream to an Amazon S3 bucket. An AWS Glue crawler is scheduled to run every 8 hours to update the schema in the data catalog of the...
Which computers can you reset by using each action?
HOTSPOT Your network contains an Active Directory domain named constoso.com that is synced to Microsoft Azure Active Directory (Azure AD). All computers are enrolled in Microsoft Intune. The domain contains the computers shown in the following table. You are evaluating which Intune actions you can use to reset the computers...