What should you do first?
You have an Azure Active Directory (Azure AD) tenant named Contoso.com and an Azure Service (AKS) cluster AKS1. You discover that AKS1 cannot be accessed by using accounts from Contoso.com You need to ensure AKS1 can be accessed by using accounts from Contoso.com The solution must minimize administrative effort. What...
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Note: Each correct selection is worth one point
HOTSPOT You create an alert rule that has the following settings: ✑ Resource: RG1 ✑ Condition: All Administrative operations ✑ Actions: Action groups configured for this alert rule: ActionGroup1 ✑ Alert rule name: Alert1 You create an action rule that has the following settings: ✑ Scope: VM1 ✑ Filter criteria:...
What information should you obtain from the developer to register the application?
Your company has an Azure subscription named Sub1 that is associated to an Azure Active Directory Azure (Azure AD) tenant named contoso.com. The company develops a mobile application named App1. App1 uses the OAuth 2 implicit grant type to acquire Azure AD access tokens. You need to register App1 in...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
Which authentication method should you instruct the developers to use?
You have a hybrid configuration of Azure Active Directory (Azure AD). All users have computers that run Windows 10 and are hybrid Azure AD joined. You have an Azure SQL database that is configured to support Azure AD authentication. Database developers must connect to the SQL database by using Microsoft...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
Which key vaults can you use?
Topic 3, Fabrikam inc This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that...
Which three actions should you perform in sequence?
DRAG DROP Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution....
What should you do first?
You need to ensure that User2 can implement PIM. What should you do first?A . Assign User2 the Global administrator role.B . Configure authentication methods for contoso.com.C . Configure the identity secure score for contoso.com.D . Enable multi-factor authentication (MFA) for User2.View AnswerAnswer: D Explanation: To start using PIM in...
What should you do?
You have 15 Azure virtual machines in a resource group named RG1. All virtual machines run identical applications. You need to prevent unauthorized applications and malware from running on the virtual machines. What should you do?A . Apply an Azure policy to RG1.B . From Azure Security Center, configure adaptive...