You are evaluating the effect of the application security groups on the network communication between the virtual machines in Sub2
HOTSPOT You are evaluating the effect of the application security groups on the network communication between the virtual machines in Sub2. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1:...
Which virtual machines will be supported?
You plan to implement JIT VM access. Which virtual machines will be supported?A . VM1 and VM3 onlyB . VM1. VM2. VM3, and VM4C . VM2, VM3, and VM4 onlyD . VM1 onlyView AnswerAnswer: A
What should you do?
Topic 1, Litware, inc This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that...
Solution: You create a policy initiative and assignments that are scoped to resource groups. Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
How should you complete the role definition of Role1?
HOTSPOT You need to create Role1 to meet the platform protection requirements. How should you complete the role definition of Role1? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: 1) Microsoft.Compute/ 2) disks 3) /subscrption/{subscriptionId}/resourceGroups/{Resource Group Id}...
What should you do?
You are testing an Azure Kubernetes Service (AKS) cluster. The cluster is configured as shown in the exhibit. (Click the Exhibit tab.) You plan to deploy the cluster to production. You disable HTTP application routing. You need to implement application routing that will provide reverse proxy and TLS termination for...
What should you configure?
Your company has an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. The company develops an application named App1. App1 is registered in Azure AD. You need to ensure that App1 can access secrets in Azure Key Vault on behalf of...
Which CAPolicy1 settings should you modify?
You need to meet the technical requirements for the finance department users. Which CAPolicy1 settings should you modify?A . Cloud apps or actionsB . ConditionsC . GrantD . SessionView AnswerAnswer: D Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-conditional-access-session-lifetime
Which key vaults can you use?
You need to encrypt storage1 to meet the technical requirements. Which key vaults can you use?A . KeyVault1 onlyB . KeyVault2 and KeyVault3 onlyC . KeyVault1 and KeyVault3 onlyD . KeyVault1 KeyVault2 and KeyVault3View AnswerAnswer: B Explanation: The storage account and the key vault must be in the same region...
Which three actions should you perform in sequence?
DRAG DROP You have an Azure subscription named Sub1 that contains an Azure Log Analytics workspace named LAW1. You have 500 Azure virtual machines that run Windows Server 2016 and are enrolled in LAW1. You plan to add the System Update Assessment solution to LAW1. You need to ensure that...