Which three actions should you perform in sequence to meet the security requirements for Webapp1?

DRAG DROP Which three actions should you perform in sequence to meet the security requirements for Webapp1? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. View AnswerAnswer: Explanation: Graphical user interface, text, application Description automatically generated

May 27, 2023 No Comments READ MORE +

Does this meet the goal?

Your network contains an Active Directory Domain Services (AD DS) forest. The forest contains three Active Directory sites named Site1, Site2, and Site3. Each site contains two domain controllers. The sites are connected by using DEFAULTIPSITELINK. You open a new branch office that contains only client computers. You need to...

May 27, 2023 No Comments READ MORE +

What should you use?

You need to configure remote administration to meet the security requirements. What should you use?A . just in time (JIT) VM access B. Azure AD Privileged Identity Management (PIM) C. the Remote Desktop extension for Azure Cloud Services D. an Azure Bastion hostView AnswerAnswer: A Explanation: Reference: https://docs.microsoft.com/en-us/azure/defender-for-cloud/just-in-time-access-usage?tabs=jit-config-asc%2Cjit-request-asc

May 27, 2023 No Comments READ MORE +

Which cmdlet should you run first?

HOTSPOT You need to meet the technical requirements for VM1. Which cmdlet should you run first? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Graphical user interface, text, application Description automatically generated

May 27, 2023 No Comments READ MORE +

What should you do?

HOTSPOT You need to configure Azure File Sync to meet the file sharing requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE Each correct selection is worth one point. View AnswerAnswer: Explanation: Graphical user interface, text, application, email Description automatically generated

May 27, 2023 No Comments READ MORE +

What should you do?

You need to meet the technical requirements for User1. The solution must use the principle of least privilege. What should you do?A . Add Users1 to the Server Operators group incontoso.com. B. Create a delegation oncontoso.com. C. Add Users1 to the Account Operators group incontoso.com. D. Create a delegation on...

May 26, 2023 No Comments READ MORE +

Which two actions should you perform?

You need to implement a name resolution solution that meets the networking requirements. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one pointA . Create an Azure private DNS zone named corp.fabhkam.com. B. Create a virtual network link...

May 26, 2023 No Comments READ MORE +

Which groups can you add to Group3 and Group5?

HOTSPOT Which groups can you add to Group3 and Group5? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Table Description automatically generated

May 25, 2023 No Comments READ MORE +

Which changes require downtime for VM1?

You have an Azure virtual machine named VM1 that runs Windows Server and has the following configurations: ✑ Size: D2s_v4 ✑ Operating system disk: 127-GiB standard SSD ✑ Data disk 128-GiB standard SSD ✑ Virtual machine generation: Gen 2 You plan to perform the following changes to VM1: ✑ Change...

May 25, 2023 No Comments READ MORE +

What should you do?

Your network contains an Active Directory Domain Services (AD DS) domain named contoso.com. The domain contains two servers named Server1 and Server2. Server1 contains a disk named Disk2. Disk2 contains a folder named UserData. UserData is shared to the Domain Users group. Disk2 is configured for deduplication. Server1 is protected...

May 25, 2023 No Comments READ MORE +