What should you use in Azure Monitor?
DRAG DROP You have an Azure subscription that contains 100 virtual machines. Azure Diagnostics is enabled on all the virtual machines. You are planning the monitoring of Azure services in the subscription. You need to retrieve the following details: - Identify the user who deleted a virtual machine three weeks...
What should you use?
You have Azure Resource Manager templates that you use to deploy Azure virtual machines. You need to disable unused Windows features automatically as instances of the virtual machines are provisioned. What should you use?A . device compliance policies in Microsoft IntuneB . Azure Automation State ConfigurationC . application security groupsD...
Which effect requires a managed identity for the assignment?
From the Azure portal, you are configuring an Azure policy. You plan to assign policies that use the DeployIfNotExist, AuditIfNotExist, Append, and Deny effects. Which effect requires a managed identity for the assignment?A . AuditIfNotExistB . AppendC . DeployIfNotExistD . DenyView AnswerAnswer: C Explanation: When Azure Policy runs the template...
How should you configure the query?
HOTSPOT You suspect that users are attempting to sign in to resources to which they have no access. You need to create an Azure Log Analytics query to identify failed user sign-in attempts from the last three days. The results must only show users who had more than five failed...
In which resource groups can User8 create virtual networks and NSGs?
HOTSPOT You assign User8 the Owner role for RG4, RG5, and RG6. In which resource groups can User8 create virtual networks and NSGs? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Box1: RG6 only as there is not...
What should you do?
You need to ensure that users can access VM0. The solution must meet the platform protection requirements. What should you do?A . Move VM0 to Subnet1.B . On Firewall, configure a network traffic filtering rule.C . Assign RT1 to AzureFirewallSubnet.D . On Firewall, configure a DNAT rule.View AnswerAnswer: D Explanation:...
What should you use to assign access to each user?
HOTSPOT You have an Azure key vault. You need to delegate administrative access to the key vault to meet the following requirements: - Provide a user named User1 with the ability to set advanced access policies for the key vault. - Provide a user named User2 with the ability to...
In which NSGs can you use ASG1. and the network interfaces of which virtual machines can you assign to ASG2?
HOTSPOT You implement the planned changes for ASG1 and ASG2. In which NSGs can you use ASG1. and the network interfaces of which virtual machines can you assign to ASG2? View AnswerAnswer:
What should you do?
HOTSPOT You need to deploy Microsoft Antimalware to meet the platform protection requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation:
What should you do first?
Topic 2, Contoso This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you...