Which authentication method should you include in the recommendation?

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. You plan to deploy Azure AD Connect and to integrate Active Directory and the Azure...

October 19, 2020 No Comments READ MORE +

Which two actions should you perform?

You create a new Azure subscription. You need to ensure that you can create custom alert rules in Azure Security Center. Which two actions should you perform? Each correct answer presents part of the solution . NOTE: Each correct selection is worth one point.A . Onboard Azure Active Directory (Azure...

October 19, 2020 No Comments READ MORE +

To which subnet should you associate each route table?

DRAG DROP You have an Azure subscription that contains the virtual networks shown in the following table. The Azure virtual machines on SpokeVNetSubnet0 can communicate with the computers on the on-premises network. You plan to deploy an Azure firewall to HubVNet. You create the following two routing tables: • RT1:...

October 19, 2020 No Comments READ MORE +

What should you use?

Your company plans to create separate subscriptions for each department. Each subscription will be associated to the same Azure Active Directory (Azure AD) tenant. You need to configure each subscription to have the same role assignments. What should you use?A . Azure Security CenterB . Azure BlueprintsC . Azure AD...

October 19, 2020 No Comments READ MORE +

How should you configure the query?

HOTSPOT You suspect that users are attempting to sign in to resources to which they have no access. You need to create an Azure Log Analytics query to identify failed user sign-in attempts from the last three days. The results must only show users who had more than five failed...

October 19, 2020 No Comments READ MORE +

What should you use?

You have Azure Resource Manager templates that you use to deploy Azure virtual machines. You need to disable unused Windows features automatically as instances of the virtual machines are provisioned. What should you use?A . device compliance policies in Microsoft IntuneB . Azure Automation State ConfigurationC . application security groupsD...

October 19, 2020 No Comments READ MORE +

Which three actions should you perform in sequence?

DRAG DROP You have an Azure subscription named Sub1 that contains an Azure Storage account named Contosostorage1 and an Azure key vault named Contosokeyvault1. You plan to create an Azure Automation runbook that will rotate the keys of Contosostorage1 and store them in Contosokeyvault1. You need to implement prerequisites to...

September 26, 2020 No Comments READ MORE +

Which two roles and groups should you identify?

Your network contains an Active Directory forest named contoso.com. You have an Azure Directory (Azure AD) tenant named contoso.com. You plan to configure synchronization by using the Express Settings installation option in Azure AD Connect. You need to identify which roles and groups are required to perform the planned configurations....

September 25, 2020 No Comments READ MORE +

Which authentication method should you instruct the developers to use?

You have a hybrid configuration of Azure Active Directory (Azure AD). All users have computers that run Windows 10 and are hybrid Azure AD joined. You have an Azure SQL database that is configured to support Azure AD authentication. Database developers must connect to the SQL database by using Microsoft...

September 25, 2020 No Comments READ MORE +

How should you complete the policy?

HOTSPOT You have an Azure subscription. The subscription contains Azure virtual machines that run Windows Server 2016. You need to implement a policy to ensure that each virtual machine has a custom antimalware virtual machine extension installed. How should you complete the policy? To answer, select the appropriate options in...

September 25, 2020 No Comments READ MORE +