What should you do?

You need to ensure that users can access VM0. The solution must meet the platform protection requirements. What should you do?A . Move VM0 to Subnet1.B . On Firewall, configure a network traffic filtering rule.C . Assign RT1 to AzureFirewallSubnet.D . On Firewall, configure a DNAT rule.View AnswerAnswer: A Explanation:...

October 28, 2020 No Comments READ MORE +

Which level should you identify for each risk event?

DRAG DROP You are implementing conditional access policies. You must evaluate the existing Azure Active Directory (Azure AD) risk events and risk levels to configure and implement the policies. You need to identify the risk level of the following risk events: • Users with leaked credentials • Impossible travel to...

October 28, 2020 No Comments READ MORE +

What should you use to assign access to each user?

HOTSPOT You have an Azure key vault. You need to delegate administrative access to the key vault to meet the following requirements: • Provide a user named User1 with the ability to set advanced access policies for the key vault. • Provide a user named User2 with the ability to...

October 27, 2020 No Comments READ MORE +

What should you use in Azure Monitor?

DRAG DROP You have an Azure subscription that contains 100 virtual machines. Azure Diagnostics is enabled on all the virtual machines. You are planning the monitoring of Azure services in the subscription. You need to retrieve the following details: • Identify the user who deleted a virtual machine three weeks...

October 27, 2020 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

October 27, 2020 No Comments READ MORE +

What should you modify on each virtual machine?

HOTSPOT You have two Azure virtual machines in the East US2 region as shown in the following table. You deploy and configure an Azure Key vault. You need to ensure that you can enable Azure Disk Encryption on VM1 and VM2. What should you modify on each virtual machine? To...

October 27, 2020 No Comments READ MORE +

Which two pieces of information should you provide to the developers?

You have an Azure SQL database. You implement Always Encrypted. You need to ensure that application developers can retrieve and decrypt data in the database. Which two pieces of information should you provide to the developers? Each correct answer presents part of the solution . NOTE: Each correct selection is...

October 26, 2020 No Comments READ MORE +

What is the membership of Group1 and Group2?

HOTSPOT What is the membership of Group1 and Group2? To answer, select the appropriate options in the answer area . NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: User1, User2, User3, User4 Contains "ON" is true for Montreal (User1), MONTREAL (User2), London (User 3), and...

October 26, 2020 No Comments READ MORE +

What should you identify?

HOTSPOT You have the Azure Information Protection conditions shown in the following table. You have the Azure Information Protection policies as shown in the following table. You need to identify how Azure Information Protection will label files. What should you identify? To answer, select the appropriate options in the answer...

October 26, 2020 No Comments READ MORE +

Which authentication method should you include in the recommendation?

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. You plan to deploy Azure AD Connect and to integrate Active Directory and the Azure...

October 26, 2020 No Comments READ MORE +