Exam Topics Part 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

No, While uploading bulk invite file, it says 'Line x is missing a property required for user invite: Redirection url [inviteRedirectURL] Required'

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have an Azure Active Directory (Azure AD) tenant named contoso.com.You have a CSV file that contains the names and email addresses of 500 external users.You need to create a guest user account in contoso.com for each of the 500 external users.Solution: From Azure AD in the Azure portal, you use the Bulk invite users operation. Does this meet the goal? A. Yes B. No

remember

Azure Import/Export service supports the following storage types: ✑ Import supports Azure Blob storage and Azure File storage ✑ Export supports Azure Blob storage. Azure Files not supported.

Remember!

Built-in AD roles can't be cloned, but built-in subscription roles can be. Custom roles of either type can be cloned.

A subscription can only be assigned to one Management group, not to 2

No, No, No (#5 pg. 5)

remember

No, No, Yes (#4 page 5 https://www.examtopics.com/exams/microsoft/az-104/view/5/)

No, Port 1433 is used by SQL Server for SQL Server Database Engine connections, not HTTP connections. Therefore, creating an HTTP health probe on port 1433 will not work.

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.Your company has a Microsoft SQL Server Always On availability group configured on their Azure virtual machines (VMs).You need to configure an Azure internal load balancer as a listener for the availability group. Solution: You create an HTTP health probe on port 1433. Does the solution meet the goal?

No, Session persistence ensures that a client will remain connected to the same server throughout a session or period of time.

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.Your company has a Microsoft SQL Server Always On availability group configured on their Azure virtual machines (VMs).You need to configure an Azure internal load balancer as a listener for the availability group. Solution: You set Session persistence to Client IP. Does the solution meet the goal?

Yes, by enabling Floating IP, the load balancer will use a floating IP address as the source IP address for outbound flows from the backend pool.

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.Your company has a Microsoft SQL Server Always On availability group configured on their Azure virtual machines (VMs).You need to configure an Azure internal load balancer as a listener for the availability group. Solution: You enable Floating IP. Does the solution meet the goal?

No, you have to go to the deployments tab in the resource group

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.Your company has an azure subscription that includes a storage account, a resource group, a blob container and a file share. A colleague named Jon Ross makes use of a solitary Azure Resource Manager (ARM) template to deploy a virtual machine and an additional Azure Storage account.You want to review the ARM template that was used by Jon Ross. Solution: You access the Virtual Machine blade.Does the solution meet the goal?

No, you have to create a new one and reactivate your existing server with activation credentials from the new provider. You cannot change the usage model after creating the provider.

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.Your company makes use of Multi-Factor Authentication for when users are not in the office. The Per Authentication option has been configured as the usage model.After the acquisition of a smaller business and the addition of the new staff to Azure Active Directory (Azure AD) obtains a different company and adding the new employees to Azure Active Directory (Azure AD), you are informed that these employees should also make use of Multi-Factor Authentication.To achieve this, the Per Enabled User setting must be set for the usage model. Solution: You reconfigure the existing usage model via the Azure portal. Does the solution meet the goal?

No, you have to create a new one and reactivate your existing server with activation credentials from the new provider. You cannot change the usage model after creating the provider.

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.Your company's Azure solution makes use of Multi-Factor Authentication for when users are not in the office. The Per Authentication option has been configured as the usage model.After the acquisition of a smaller business and the addition of the new staff to Azure Active Directory (Azure AD) obtains a different company and adding the new employees to Azure Active Directory (Azure AD), you are informed that these employees should also make use of Multi-Factor Authentication.To achieve this, the Per Enabled User setting must be set for the usage model. Solution: You reconfigure the existing usage model via the Azure CLI. Does the solution meet the goal?

No, new auth providers may no longer be created. Existing auth providers may continue to be used and updated, but migration is no longer possible.

The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.Your company's Azure solution makes use of Multi-Factor Authentication for when users are not in the office. The Per Authentication option has been configured as the usage model.After the acquisition of a smaller business and the addition of the new staff to Azure Active Directory (Azure AD) obtains a different company and adding the new employees to Azure Active Directory (Azure AD), you are informed that these employees should also make use of Multi-Factor Authentication.To achieve this, the Per Enabled User setting must be set for the usage model. Solution: You create a new Multi-Factor Authentication provider with a backup from the existing Multi-Factor Authentication provider data. Does the solution meet the goal?

remember

you alter the grant control, not the session control

remember

you can attach one NSG to multiple VMs

D. The az vm create command.

You are planning to deploy an Ubuntu Server virtual machine to your company's Azure subscription.You are required to implement a custom deployment that includes adding a particular trusted root certification authority (CA). Which of the following should you use to create the virtual machine? A. The New-AzureRmVm cmdlet. B. The New-AzVM cmdlet. C. The Create-AzVM cmdlet. D. The az vm create command.

D. From the Recovery Service vault, stop the backup of each backup item. You have to first stop the backup before you can delete the backup data

You have a Recovery Service vault that you use to test backups. The test backups contain two protected virtual machines.You need to delete the Recovery Services vault.What should you do first? A. From the Recovery Service vault, delete the backup data. B. Modify the disaster recovery properties of each virtual machine. C. Modify the locks of each virtual machine. D. From the Recovery Service vault, stop the backup of each backup item.

C. Upgrade the account to general-purpose v2.

You have a general-purpose v1 Azure Storage account named storage1 that uses locally-redundant storage (LRS).You need to ensure that the data in the storage account is protected if a zone fails. The solution must minimize costs and administrative effort.What should you do first? A. Create a new storage account. B. Configure object replication rules. C. Upgrade the account to general-purpose v2. D. Modify the Replication setting of storage1.

B. blob and file only

You have an Azure Storage account named storage1.You plan to use AzCopy to copy data to storage1.You need to identify the storage services in storage1 to which you can copy the data.Which storage services should you identify? A. blob, file, table, and queue B. blob and file only C. file and table only D. file only E. blob, table, and queue only

A. Select the custom role and add Sub1 and Sub2 to the assignable scopes. Remove RG1 from the assignable scopes.

You have two Azure subscriptions named Sub1 and Sub2.An administrator creates a custom role that has an assignable scope to a resource group named RG1 in Sub1.You need to ensure that you can apply the custom role to any resource group in Sub1 and Sub2. The solution must minimize administrative effort.What should you do? A. Select the custom role and add Sub1 and Sub2 to the assignable scopes. Remove RG1 from the assignable scopes. B. Create a new custom role for Sub1. Create a new custom role for Sub2. Remove the role from RG1. C. Create a new custom role for Sub1 and add Sub2 to the assignable scopes. Remove the role from RG1. D. Select the custom role and add Sub1 to the assignable scopes. Remove RG1 from the assignable scopes. Create a new custom role for Sub2.

A. From the RSV1 blade, click Backup items and stop the VM2 backup You need to first stop the backup

You have two Azure virtual machines named VM1 and VM2. You have two Recovery Services vaults named RSV1 and RSV2.VM2 is backed up to RSV1.You need to back up VM2 to RSV2. What should you do first? A. From the RSV1 blade, click Backup items and stop the VM2 backup B. From the RSV2 blade, click Backup. From the Backup blade, select the backup for the virtual machine, and then click Backup C. From the VM2 blade, click Disaster recovery, click Replication settings, and then select RSV2 as the Recovery Services vault D. From the RSV1 blade, click Backup Jobs and export the VM2 job

C. a Desired State Configuration (DSC) extension

You plan to deploy several Azure virtual machines that will run Windows Server 2019 in a virtual machine scale set by using an Azure Resource Manager template.You need to ensure that NGINX is available on all the virtual machines after they are deployed. What should you use? A. the Publish-AzVMDscConfiguration cmdlet B. Azure Application Insights C. a Desired State Configuration (DSC) extension D. Azure AD Application Proxy

C. From Azure PowerShell, run the Set-AzMarketplaceTerms cmdlet

You recently created a new Azure subscription that contains a user named Admin1.Admin1 attempts to deploy an Azure Marketplace resource by using an Azure Resource Manager template. Admin1 deploys the template by using AzurePowerShell and receives the following error message: `User failed validation to purchase resources. Error message: `Legal terms have not been accepted for this item on this subscription. To accept legal terms, please go to the Azure portal (http://go.microsoft.com/fwlink/?LinkId=534873) and configure programmatic deployment for the Marketplace item or create it there for the first time.` You need to ensure that Admin1 can deploy the Marketplace resource successfully.What should you do? A. From Azure PowerShell, run the Set-AzApiManagementSubscription cmdlet B. From the Azure portal, register the Microsoft.Marketplace resource provider C. From Azure PowerShell, run the Set-AzMarketplaceTerms cmdlet D. From the Azure portal, assign the Billing administrator role to Admin1

A. 5 A VM can have multiple different NICs attached to it, but one NIC can't be attached to multiple VMs

Your company has an Azure Active Directory (Azure AD) subscription.You need to deploy five virtual machines (VMs) to your company's virtual network subnet.The VMs will each have both a public and private IP address. Inbound and outbound security rules for all of these virtual machines must be identical.Which of the following is the least amount of network interfaces needed for this configuration? A. 5 B. 10 C. 20 D. 40

A. Configure a SetupComplete.cmd batch file in the %windir%\setup\scripts directory. After Windows is installed but before the logon screen appears, Windows Setup searches for the SetupComplete.cmd file in the %WINDIR%\Setup\Scripts\ directory

Your company has an Azure Active Directory (Azure AD) tenant that is configured for hybrid coexistence with the on-premises Active Directory domain.The on-premise virtual environment consists of virtual machines (VMs) running on Windows Server 2012 R2 Hyper-V host servers.You have created some PowerShell scripts to automate the configuration of newly created VMs. You plan to create several new VMs.You need a solution that ensures the scripts are run on the new VMs. Which of the following is the best solution? A. Configure a SetupComplete.cmd batch file in the %windir%\setup\scripts directory. B. Configure a Group Policy Object (GPO) to run the scripts as logon scripts. C. Configure a Group Policy Object (GPO) to run the scripts as startup scripts. D. Place the scripts in a new virtual hard disk (VHD).

B. Add-AzVhd Add-AzVhd Uploads a virtual hard disk from an on-premises machine to Azure

Your company has an Azure Active Directory (Azure AD) tenant that is configured for hybrid coexistence with the on-premises Active Directory domain.You plan to deploy several new virtual machines (VMs) in Azure. The VMs will have the same operating system and custom software requirements.You configure a reference VM in the on-premise virtual environment. You then generalize the VM to create an image.You need to upload the image to Azure to ensure that it is available for selection when you create the new Azure VMs.Which PowerShell cmdlets should you use? A. Add-AzVM B. Add-AzVhd C. Add-AzImage D. Add-AzImageDataDisk

All the answers are correct Azure Backup supports backup of 64-bit Windows server operating system from Windows Server 2008.Azure Backup supports backup of 64-bit Windows 10 operating system.Azure Backup supports backup of 64-bit Debian operating system from Debian 7.9+.Azure Backup supports backup of VM that are shutdown or offline.

Your company has an Azure subscription that includes a Recovery Services vault.You want to use Azure Backup to schedule a backup of your company's virtual machines (VMs) to the Recovery Services vault.Which of the following VMs can you back up? Choose all that apply. A. VMs that run Windows 10. Most Voted B. VMs that run Windows Server 2012 or higher. Most Voted C. VMs that have NOT been shut down. Most Voted D. VMs that run Debian 8.2+. Most Voted E. VMs that have been shut down.

D. Max Value The max fault domains you have have is 3 and 3 isn't an option, so answer is "Max Value"

Your company has an Azure subscription.You need to deploy a number of Azure virtual machines (VMs) using Azure Resource Manager (ARM) templates. You have been informed that the VMs will be included in a single availability set.You are required to make sure that the ARM template you configure allows for as many VMs as possible to remain accessible in the event of fabric failure or maintenance.Which of the following is the value that you should configure for the platformFaultDomainCount property? A. 10 B. 30 C. Min Value D. Max Value

C. You should stop all three VMs. You have to stop all vm's before you can resize them when they are in an availability set

Your company has three virtual machines (VMs) that are included in an availability set.You try to resize one of the VMs, which returns an allocation failure message.It is imperative that the VM is resized.Which of the following actions should you take? A. You should only stop one of the VMs. B. You should stop two of the VMs. C. You should stop all three VMs. D. You should remove the necessary VM from the availability set.

E. Run the Set-AzureStaticVNetIP PowerShell cmdlet.

Your company has two on-premises servers named SRV01 and SRV02. Developers have created an application that runs on SRV01. The application calls a service on SRV02 by IP address.You plan to migrate the application on Azure virtual machines (VMs). You have configured two VMs on a single subnet in an Azure virtual network.You need to configure the two VMs with static internal IP addresses.What should you do? A. Run the New-AzureRMVMConfig PowerShell cmdlet. B. Run the Set-AzureSubnet PowerShell cmdlet. C. Modify the VM properties in the Azure Management Portal. D. Modify the IP properties in Windows Network and Sharing Center. E. Run the Set-AzureStaticVNetIP PowerShell cmdlet.

C. You should restore the VM to a new Azure VM. In the event of a ransomware infection on an Azure VM that is backed up using Azure Backup Instant Restore, it's generally recommended to restore the VM to a new Azure VM.

Your company's Azure subscription includes Azure virtual machines (VMs) that run Windows Server 2016.One of the VMs is backed up every day using Azure Backup Instant Restore.When the VM becomes infected with data encrypting ransomware, you are required to restore the VM.Which of the following actions should you take? A. You should restore the VM after deleting the infected VM. B. You should restore the VM to any VM within the company's subscription. C. You should restore the VM to a new Azure VM. D. You should restore the VM to an on-premise Windows device.

B) You can recover the files to any VM within the company's subscription.

Your company's Azure subscription includes Azure virtual machines (VMs) that run Windows Server 2016.One of the VMs is backed up every day using Azure Backup Instant Restore.When the VM becomes infected with data encrypting ransomware, you decide to recover the VM's files.Which of the following is TRUE in this scenario? A. You can only recover the files to the infected VM. B. You can recover the files to any VM within the company's subscription. C. You can only recover the files to a new VM. D. You will not be able to recover the files.

Data Actions Assignable scope

https://www.examtopics.com/exams/microsoft/az-104/view/10/ Dont flip card till u try to answer the question first

No, Yes, Yes N: Litwareinc is not a connected organization. Y: "When a user's access package assignment expires, they're removed from the group or team, unless they currently have an assignment to another access package that includes that same group or team." https://learn.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-access-package-resources#add-a-group-or-team-resource-role Y: Lifecycle rule - 30 days past after package expiration

https://www.examtopics.com/exams/microsoft/az-104/view/11/ View the question before flipping the card

No, No, Yes

https://www.examtopics.com/exams/microsoft/az-104/view/14/ #95, view question before flipping

No No No

https://www.examtopics.com/exams/microsoft/az-104/view/15/ #7

Yes, Yes, No

https://www.examtopics.com/exams/microsoft/az-104/view/18/ #39

IAM and Geo-replication.

https://www.examtopics.com/exams/microsoft/az-104/view/20/ #56

Using key1: Table1, folder1, and container1 Using SAS1: Table1 only

https://www.examtopics.com/exams/microsoft/az-104/view/20/ #58

No, Yes, Yes

https://www.examtopics.com/exams/microsoft/az-104/view/21/ #69

immutable

means unchanging or unable to be changed

B) No Instead use the New-AzureADMSInvitation cmdlet which is used to invite a new external user to your directory

You have an Azure Active Directory (Azure AD) tenant named contoso.com.You have a CSV file that contains the names and email addresses of 500 external users.You need to create a guest user account in contoso.com for each of the 500 external users.Solution: You create a PowerShell script that runs the New-AzureADUser cmdlet for each user.Does this meet the goal? A. Yes B. No

No

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.Your company has an Azure Active Directory (Azure AD) subscription.You want to implement an Azure AD conditional access policy.The policy must be configured to require members of the Global Administrators group to use Multi-Factor Authentication and an Azure AD-joined device when they connect to Azure AD from untrusted locations Solution: You access the multi-factor authentication page to alter the user settings. Does the solution meet the goal?

No, Initial will perform a full sync and add the user account created but it will take time and not be "immediate"

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.Your company has an Azure Active Directory (Azure AD) tenant named weyland.com that is configured for hybrid coexistence with the on-premises ActiveDirectory domain.You have a server named DirSync1 that is configured as a DirSync server.You create a new user account in the on-premise Active Directory. You now need to replicate the user information to Azure AD immediately. Solution: You run the Start-ADSyncSyncCycle -PolicyType Initial PowerShell cmdlet. Does the solution meet the goal?

No, this AD Site and Services will force replication on the Domain Controllers, not to Azure AD.

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.Your company has an Azure Active Directory (Azure AD) tenant named weyland.com that is configured for hybrid coexistence with the on-premises ActiveDirectory domain.You have a server named DirSync1 that is configured as a DirSync server.You create a new user account in the on-premise Active Directory. You now need to replicate the user information to Azure AD immediately. Solution: You use Active Directory Sites and Services to force replication of the Global Catalog on a domain controller.Does the solution meet the goal?

Yes

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.Your company's Azure subscription includes two Azure networks named VirtualNetworkA and VirtualNetworkB.VirtualNetworkA includes a VPN gateway that is configured to make use of static routing. Also, a site-to-site VPN connection exists between your company's on- premises network and VirtualNetworkA.You have configured a point-to-site VPN connection to VirtualNetworkA from a workstation running Windows 10. After configuring virtual network peering betweenVirtualNetworkA and VirtualNetworkB, you confirm that you are able to access VirtualNetworkB from the company's on-premises network. However, you find that you cannot establish a connection to VirtualNetworkB from the Windows 10 workstation.You have to make sure that a connection to VirtualNetworkB can be established from the Windows 10 workstation. Solution: You download and re-install the VPN client configuration package on the Windows 10 workstation.Does the solution meet the goal?

No, Instead use the New-AzureADMSInvitation cmdlet which is used to invite a new external user to your directory

You have an Azure Active Directory (Azure AD) tenant named contoso.com.You have a CSV file that contains the names and email addresses of 500 external users.You need to create a guest user account in contoso.com for each of the 500 external users. Solution: From Azure AD in the Azure portal, you use the Bulk create user operation.Does this meet the goal? A. Yes B. No

B. From the Directory role blade, modify the directory role

You have an Azure Active Directory (Azure AD) tenant that contains 5,000 user accounts.You create a new user account named AdminUser1.You need to assign the User administrator administrative role to AdminUser1.What should you do from the user account properties? A. From the Licenses blade, assign a new license B. From the Directory role blade, modify the directory role C. From the Groups blade, invite the user account to a new group

C. Assign the Website Contributor role to the developers To allow the developers of App1 to use their Azure AD credentials to deploy content to App1 using Web Deploy, you should assign the Website Contributor role to the developers.

You have an Azure App Services web app named App1.You plan to deploy App1 by using Web Deploy.You need to ensure that the developers of App1 can use their Azure AD credentials to deploy content to App1. The solution must use the principle of least privilege.What should you do? A. Assign the Owner role to the developers B. Configure app-level credentials for FTPS C. Assign the Website Contributor role to the developers Most Voted D. Configure user-level credentials for FTPS

C. Deploy the IT Service Management Connector (ITSM) The IT Service Management Connector (ITSMC) allows you to connect Azure and a supported IT Service Management (ITSM) product/service, such as theMicrosoft System Center Service Manager.

You have an Azure subscription named Subscription1 and an on-premises deployment of Microsoft System Center Service Manager.Subscription1 contains a virtual machine named VM1.You need to ensure that an alert is set in Service Manager when the amount of available memory on VM1 is below 10 percent.What should you do first? A. Create an automation runbook B. Deploy a function app C. Deploy the IT Service Management Connector (ITSM) D. Create a notification

B. Assign User1 the Owner role for VNet1. Owner = Grants full access to manage all resources, including the ability to assign roles in Azure RBAC. Contributor = Grants full access to manage all resources, but does NOT allow you to assign roles in Azure RBAC. (you cannot add users or changes their rights) User Access Administrator = Lets you manage user access to Azure resources. Reader = View all resources, but does not allow you to make any changes. Security Admin = View and update permissions for Security Center. Same permissions as the Security Reader role and can also update the security policy and dismiss alerts and recommendations. Network Contributor = Lets you manage networks, but not access to them. (so you can add VNET, subnet, etc)

You have an Azure subscription named Subscription1 that contains a virtual network named VNet1. VNet1 is in a resource group named RG1.Subscription1 has a user named User1. User1 has the following roles:✑ Reader✑ Security Admin✑ Security ReaderYou need to ensure that User1 can assign the Reader role for VNet1 to other users.What should you do? A. Remove User1 from the Security Reader role for Subscription1. Assign User1 the Contributor role for RG1. B. Assign User1 the Owner role for VNet1. C. Assign User1 the Contributor role for VNet1. D. Assign User1 the Network Contributor role for VNet1.

B. Event | search "error"

You have an Azure subscription named Subscription1 that contains an Azure Log Analytics workspace named Workspace1.You need to view the error events from a table named Event.Which query should you run in Workspace1? A. Get-Event Event | where {$_.EventType == "error"} B. Event | search "error" C. select * from Event where EventType == "error" D. search in (Event) * | where EventType ג€"eq ג€errorג€

B. Event | search "error"

You have an Azure subscription named Subscription1 that contains an Azure Log Analytics workspace named Workspace1.You need to view the error events from a table named Event.Which query should you run in Workspace1? A. select * from Event where EventType == "error" B. Event | search "error" C. Event | where EventType is "error" D. Get-Event Event | where {$_.EventType == "error"}

C. Azure File Storage

You have an Azure subscription named Subscription1.You have 5 TB of data that you need to transfer to Subscription1.You plan to use an Azure Import/Export job.What can you use as the destination of the imported data? A. a virtual machine B. an Azure Cosmos DB database C. Azure File Storage D. the Azure File Sync Storage Sync Service

B. a service tag

You have an Azure subscription that contains 10 virtual machines, a key vault named Vault1, and a network security group (NSG) named NSG1. All the resources are deployed to the East US Azure region.The virtual machines are protected by using NSG1. NSG1 is configured to block all outbound traffic to the internet.You need to ensure that the virtual machines can access Vault1. The solution must use the principle of least privilege and minimize administrative effort What should you configure as the destination of the outbound security rule for NSG1? A. an application security group B. a service tag C. an IP address range

Enable Active Directory Domain Service (AD DS) authentication for storage1. To grant the Group1 the Storage File Data SMB Share Elevated Contributor role for share1, you need to enable Active Directory Domain Service (AD DS) authentication for the storage account.

You have an Azure subscription that contains a storage account named storage1. The storage1 account contains a file share named share1.The subscription is linked to a hybrid Azure Active Directory (Azure AD) tenant that contains a security group named Group1.You need to grant Group1 the Storage File Data SMB Share Elevated Contributor role for share1.What should you do first? A. Enable Active Directory Domain Service (AD DS) authentication for storage1. B. Grant share-level permissions by using File Explorer. C. Mount share1 by using File Explorer. D. Create a private endpoint.

B. From contoso.com, create an OAuth 2.0 authorization endpoint. To grant access to Azure Kubernetes Service to users in your Azure Active Directory tenant, you need to create an OAuth 2.0 authorization endpoint in your tenant.

You have an Azure subscription that contains an Azure Active Directory (Azure AD) tenant named contoso.com and an Azure Kubernetes Service (AKS) cluster named AKS1.An administrator reports that she is unable to grant access to AKS1 to the users in contoso.com.You need to ensure that access to AKS1 can be granted to the contoso.com users.What should you do first? A. From contoso.com, modify the Organization relationships settings. B. From contoso.com, create an OAuth 2.0 authorization endpoint. C. Recreate AKS1. D. From AKS1, create a namespace.

C. Detach the data disk. You can simply detach a data disk from one VM and attach it to the other VM without stopping either of the VMs.

You have an Azure virtual machine (VM) that has a single data disk. You have been tasked with attaching this data disk to another Azure VM.You need to make sure that your strategy allows for the virtual machines to be offline for the least amount of time possible.Which of the following is the action you should take FIRST? A. Stop the VM that includes the data disk. B. Stop the VM that the data disk must be attached to. C. Detach the data disk. D. Delete the VM that includes the data disk.

B. 20 Each availability set can be configured with up to three fault domains and twenty update domains

Your company has an Azure subscription.You need to deploy a number of Azure virtual machines (VMs) using Azure Resource Manager (ARM) templates. You have been informed that the VMs will be included in a single availability set.You are required to make sure that the ARM template you configure allows for as many VMs as possible to remain accessible in the event of fabric failure or maintenance. Which of the following is the value that you should configure for the platformUpdateDomainCount property? A. 10 B. 20 C. 30 D. 40


Conjuntos de estudio relacionados

Chapter exam-intro to health insurance

View Set

Criminal Investigation-A method for reconstructing the past

View Set