What should you do?

From Azure Security, you create a custom alert rule. You need to configure which users will receive an email message when the alert is triggered. What should you do?A . From Azure Monitor, create an action group. B. From Security Center, modify the Security policy settings of the Azure subscription....

April 18, 2023 No Comments READ MORE +

How should you configure the query?

HOTSPOT You suspect that users are attempting to sign in to resources to which they have no access. You need to create an Azure Log Analytics query to identify failed user sign-in attempts from the last three days. The results must only show users who had more than five failed...

April 18, 2023 No Comments READ MORE +

Which key vault settings should you configure?

You have an Azure subscription that contains a virtual machine named VM1. You create an Azure key vault that has the following configurations: - Name: Vault5 - Region: West US - Resource group: RG1 You need to use Vault5 to enable Azure Disk Encryption on VM1. The solution must support...

April 17, 2023 No Comments READ MORE +

Which virtual networks in Sub1 can User2 modify and delete in their current state?

HOTSPOT Which virtual networks in Sub1 can User2 modify and delete in their current state? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: VNET4 and VNET1 only RG1 has only Delete lock, while there are...

April 17, 2023 No Comments READ MORE +

How many NSGs and network security rules should you create?

HOTSPOT You have an Azure subscription named Sub1. You create a virtual network that contains one subnet. On the subnet, you provision the virtual machines shown in the following table. Currently, you have not provisioned any network security groups (NSGs). You need to implement network security to meet the following...

April 17, 2023 No Comments READ MORE +

What should you use?

You have Azure Resource Manager templates that you use to deploy Azure virtual machines. You need to disable unused Windows features automatically as instances of the virtual machines are provisioned. What should you use?A . security policies in Azure Security Center B. Azure Logic Apps C. an Azure Desired State...

April 17, 2023 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

April 17, 2023 No Comments READ MORE +

You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table

HOTSPOT You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table. You create and enforce an Azure AD Identity Protection user risk policy that has the following settings: - Assignment: Include Group1, Exclude Group2 - Conditions: Sign-in risk of Medium...

April 17, 2023 No Comments READ MORE +

What should you configure?

You are configuring and securing a network environment. You deploy an Azure virtual machine named VM1 that is configured to analyze network traffic. You need to ensure that all network traffic is routed through VM1. What should you configure?A . a system route B. a network security group (NSG) C....

April 17, 2023 No Comments READ MORE +

Which key vaults can you use?

Topic 3, Fabrikam inc This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that...

April 16, 2023 No Comments READ MORE +