Will each protection method meet the requirement?
DRAG DROP You must ensure that the external party cannot access the data in the SSN column of the Person table. Will each protection method meet the requirement? To answer, drag the appropriate responses to the correct protection methods. Each response may be used once, more than once, or not...
Does the solution meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you use?
You need to ensure that all messages from Azure Event Grid are processed. What should you use?A . Azure Event Grid topicB . Azure Service Bus topicC . Azure Service Bus queueD . Azure Storage queueE . Azure Logic App custom connectorView AnswerAnswer: C Explanation: As a solution architect/developer, you...
How should you configure the app?
HOTSPOT You need to secure the Shipping Function app. How should you configure the app? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Scenario: Shipping Function app: Implement secure function endpoints by using app-level security and include...
Which two actions should you perform?
You need to configure the ContentUploadService deployment. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.A . Add the following markup to line CS23: types: PrivateB . Add the following markup to line CS24: osType: WindowsC ....
Which two actions should you perform?
You need to resolve a notification latency issue. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.A . Set Always On to true.B . Ensure that the Azure Function is using an App Service plan.C . Set...
What code do you add at line CS07 of ConfigureSSE.ps1?
You need to ensure the security policies are met. What code do you add at line CS07 of ConfigureSSE.ps1?A . CPermissionsToKeys create, encrypt, decryptB . CPermissionsToCertificates create, encrypt, decryptC . CPermissionsToCertificates wrapkey, unwrapkey, getD . CPermissionsToKeys wrapkey, unwrapkey, getView AnswerAnswer: B Explanation: Scenario: All certificates and secrets used to secure...
Will each protection method meet the requirement?
DRAG DROP You must ensure that the external party cannot access the data in the SSN column of the Person table. Will each protection method meet the requirement? To answer, drag the appropriate responses to the correct protection methods. Each response may be used once, more than once, or not...
What should you do?
You develop an app that allows users to upload photos and videos to Azure storage. The app uses a storage REST API call to upload the media to a blob storage account named Account1. You have blob storage containers named Container1 and Container2. Uploading of videos occurs on an irregular...
Which four commands should you use to develop the solution?
DRAG DROP You plan to create a Docker image that runs as ASP.NET Core application named ContosoApp. You have a setup script named setupScript.ps1 and a series of application files including ContosoApp.dll. You need to create a Dockerfile document that meets the following requirements: • Call setupScript.ps1 when the container...