What should you recommend?

You are planning the move of App1 to Azure. You create a network security group (NSG). You need to recommend a solution to provide users with access to App1.

What should you recommend?

Case Study Title (Case Study):

Topic 3 -Contoso Ltd

Overview

Contoso, Ltd. is a manufacturing company that has offices worldwide. Contoso works with partner organizations to bring products to market.

Contoso products are manufactured by using blueprint files that the company authors and maintains.

Existing Environment

Currently, Contoso uses multiple types of servers for business operations, including the following:

* File servers

* Domain controllers

* Microsoft SQL Server servers

Your network contains an Active Directory forest named contoso.com. All servers and client computers are joined to Active Directory.

You have a public-facing application named App1.

App1 is comprised of the following three tiers:

* A SQL database

* A web front end

* A processing middle tier Each tier is comprised of five virtual machines.

Users access the web front end by using HTTPS only.

Requirements

Planned Changes

Contoso plans to implement the following changes to the infrastructure:

Move all the tiers of App1 to Azure.

Move the existing product blueprint files to Azure Blob storage. Create a hybrid directory to support an upcoming Microsoft Office 365 migration project.

Technical Requirements

Contoso must meet the following technical requirements:

– Move all the virtual machines for App1 to Azure.

– Minimize the number of open ports between the App1 tiers.

– Ensure that all the virtual machines for App1 are protected by backups.

– Copy the blueprint files to Azure over the Internet.

– Ensure that the blueprint files are stored in the archive storage tier.

– Ensure that partner access to the blueprint files is secured and temporary.

– Prevent user passwords or hashes of passwords from being stored in Azure.

– Use unmanaged standard storage for the hard disks of the virtual machines.

– Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a mobile phone to verify their identity.

Minimize administrative effort whenever possible.

User Requirements

Contoso identifies the following requirements for users:

Ensure that only users who are part of a group named Pilot can join devices to Azure AD. Designate a new user named Admin1 as the service administrator of the Azure subscription. Ensure that a new user named User3 can create network objects for the Azure subscription.
A . Create an outgoing security rule for port 443 from the Internet. Associate the NSG to all the subnets.
B . Create an incoming security rule for port 443 from the Internet. Associate the NSG to all the subnets.
C . Create an incoming security rule for port 443 from the Internet. Associate the NSG to the subnet that contains the web servers.
D . Create an outgoing security rule for port 443 from the Internet. Associate the NSG to the subnet that contains the web servers.

Answer: C

Explanation:

As App1 is public-facing we need an incoming security rule, related to the access of the web servers. Scenario: You have a public-facing application named App1.

App1 is comprised of the following three tiers: a SQL database, a web front end, and a processing middle tier. Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS only.

Latest AZ-104 Dumps Valid Version with 416 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments