AZ-104 Study

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You have an Azure subscription named Subscription1 and an on-premises deployment of Microsoft System Center Service Manager.Subscription1 contains a virtual machine named VM1.You need to ensure that an alert is set in Service Manager when the amount of available memory on VM1 is below 10 percent.What should you do first?

Deploy the IT Service Management Connector (ITSM)

You sign up for Azure Active Directory (Azure AD) Premium.You need to add a user named [email protected] as an administrator on all the computers that will be joined to the Azure AD domain.What should you configure in Azure AD?

Device settings from the Devices blade

You have an Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com.The User administrator role is assigned to a user named Admin1.An external partner has a Microsoft account that uses the [email protected] sign in.Admin1 attempts to invite the external partner to sign in to the Azure AD tenant and receives the following error message: `Unable to invite user [email protected] `" Generic authorization exception.`You need to ensure that Admin1 can invite the external partner to sign in to the Azure AD tenant.What should you do?

From the Users blade, modify the External collaboration settings.

A company uses an Azure storage account for storing large numbers of video and audio files. Containers store each type of file and access should be limited to those files. Additionally, the files can only be accessed through shared access signatures. The company wants to be able to revoke access to the files and to change the period for which users can access the files. Which of the following is the easiest way to meet the requirement?

Implement stored access policies for each container to enable revocation of access or change of duration.

What is the main advantage of an availability set?

It allows virtual machines to be available across physical server failures. Availability sets allow virtual machines to remain available when a physical server fails.

Azure Private DNS allows which of the following?

Lets organizations manage and resolve domain names in a virtual network without adding a custom DNS solution. Azure Private DNS manages and resolves domain names in a virtual network without adding a custom DNS solution.

What does Azure DNS allow you to do?

Manage and host your registered domain and associated records. Azure DNS allows you to host your registered domains. You can control and configure the domain records, like A, CNAME, MX, and setup alias records.

Which of the following best summarizes the purpose of Azure DNS?

Manages and hosts the registered domain and associated records. Azure DNS hosts the registered domains. Administrators can control and configure the domain records, like A, CNAME, MX, and setup alias records.

Your company has an Azure subscription.You need to deploy a number of Azure virtual machines (VMs) using Azure Resource Manager (ARM) templates. You have been informed that the VMs will be included in a single availability set.You are required to make sure that the ARM template you configure allows for as many VMs as possible to remain accessible in the event of fabric failure or maintenance.Which of the following is the value that you should configure for the platformFaultDomainCount property?

Max Value

You have a Microsoft 365 tenant and an Azure Active Directory (Azure AD) tenant named contoso.com.You plan to grant three users named User1, User2, and User3 access to a temporary Microsoft SharePoint document library named Library1.You need to create groups for the users. The solution must ensure that the groups are deleted automatically after 180 days.Which two groups should you create? Each correct answer presents a complete solution.NOTE: Each correct selection is worth one point.

Microsoft 365 group that uses the Assigned membership type a Microsoft 365 group that uses the Dynamic User membership type

Your company has an azure subscription that includes a storage account, a resource group, a blob container and a file share.A colleague named Jon Ross makes use of a solitary Azure Resource Manager (ARM) template to deploy a virtual machine and an additional Azure Storage account.You want to review the ARM template that was used by Jon Ross.Solution: You access the Virtual Machine blade.Does the solution meet the goal?

No

Your company makes use of Multi-Factor Authentication for when users are not in the office. The Per Authentication option has been configured as the usage model.After the acquisition of a smaller business and the addition of the new staff to Azure Active Directory (Azure AD) obtains a different company and adding the new employees to Azure Active Directory (Azure AD), you are informed that these employees should also make use of Multi-Factor Authentication.To achieve this, the Per Enabled User setting must be set for the usage model. Solution: You reconfigure the existing usage model via the Azure portal. Does the solution meet the goal?

No

You have an Azure subscription.In the Azure portal, you plan to create a storage account named storage1 that will have the following settings:✑ Performance: Standard✑ Replication: Zone-redundant storage (ZRS)✑ Access tier (default): Cool✑ Hierarchical namespace: DisabledYou need to ensure that you can set Account kind for storage1 to BlockBlobStorage.Which setting should you modify first?

Performance

The infrastructure team has implemented firewall rules to deny traffic based on IP address ranges. Which of the following should be used to meet the requirement?

Statically assigned IP addresses. In this situation, use statically assigned IP addresses to avoid having to change the Firewall rules.

You create an Azure Storage account named contosostorage.You plan to create a file share named data.Users need to map a drive to the data file share from home computers that run Windows 10.Which outbound port should you open between the home computers and the data file share?

445

What is the final rule that is applied in every Network Security Group?

Deny All This is a safe choice. It will block all traffic that you don't specifically allow.

Which of these changes between access tiers will happen immediately?

Hot to Cool Changes between hot and cool, and to archive, happen immediately.

You have a registered DNS domain named contoso.com.You create a public Azure DNS zone named contoso.com.You need to ensure that records created in the contoso.com zone are resolvable from the internet.What should you do?

Modify the NS records in the DNS domain registrar.

The comptroller wants to simplify network security group rules by using service tags. Which of the following is a valid service tag?

VirtualNetwork VirtualNetwork is a valid service tag. Service tags represent a group of IP addresses. Other service tags are Internet, SQL, Storage, AzureLoadBalancer, and AzureTrafficManager.

You have an Azure policy as shown in the following exhibit:What is the effect of the policy?

You can create Azure SQL servers in ContosoRG1 only.

When cloning a configuration from another deployment slot, which configuration setting follows the content across the swap?

Connection strings Connections strings follow the content across the swap.

You have an Azure DNS zone named adatum.com.You need to delegate a subdomain named research.adatum.com to a different DNS server in Azure.What should you do?

Create an NS record named research in the adatum.com zone.

You have an Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com that contains 100 user accounts.You purchase 10 Azure AD Premium P2 licenses for the tenant.You need to ensure that 10 users can use all the Azure AD Premium features.What should you do?

From the Licenses blade of Azure AD, assign a license

What must a virtual machine have to communicate with the other resources in the same virtual network?

Network interface An IP address is assigned to a network interface, which is assigned to a virtual machine.

Which of the following best describes Azure blob storage access tiers?

The administrator can switch between hot and cool performance tiers at any time. The administrator can switch between hot and cool performance tiers at any time.

When configuring network access to an Azure Storage Account, what is the default network rule?

To allow all connections from all networks.

You have an Azure Storage account named storage1 that contains a blob container named container1.You need to prevent new content added to container1 from being modified for one year.What should you configure?

an access policy

Your company has an Azure Active Directory (Azure AD) subscription.You need to deploy five virtual machines (VMs) to your company's virtual network subnet.The VMs will each have both a public and private IP address. Inbound and outbound security rules for all of these virtual machines must be identical.Which of the following is the least amount of security groups needed for this configuration?

1

When assigning private IPv4 addresses in a subnet with the address range 10.3.0.0/16, which of the following addresses are available for assignment dynamically?

10.3.255.254 Any address in the range 10.3.0.4 through 10.3.255.254 is available for assignment.

What type of DNS record should be created to map one or more IP addresses against a single domain?

A or AAAA The A or AAAA record maps an IP address to a domain. Multiple IP addresses are known as a record set.

What type of DNS record should you create to map one or more IP addresses against a single domain?

A or AAAA The A or AAAA record maps an IP address to a domain. Multiple IP addresses are known as a record set.

Virtual machine scale sets deploy and manage which of the following?

A set of identical VM instances created from the same base OS image and configuration. This approach lets administrators easily manage hundreds of VMs without additional configuration tasks or network management.

Your company has an Azure subscription that includes a Recovery Services vault.You want to use Azure Backup to schedule a backup of your company's virtual machines (VMs) to the Recovery Services vault.Which of the following VMs can you back up? Choose all that apply.

A. VMs that run Windows 10. B. VMs that run Windows Server 2012 or higher. C. VMs that have NOT been shut down. D. VMs that run Debian 8.2+. E. VMs that have been shut down.

Your company has an Azure Active Directory (Azure AD) tenant that is configured for hybrid coexistence with the on-premises Active Directory domain.You plan to deploy several new virtual machines (VMs) in Azure. The VMs will have the same operating system and custom software requirements.You configure a reference VM in the on-premise virtual environment. You then generalize the VM to create an image.You need to upload the image to Azure to ensure that it is available for selection when you create the new Azure VMs.Which PowerShell cmdlets should you use?

Add-AzVhd

You have an Azure subscription.You have 100 Azure virtual machines.You need to quickly identify underutilized virtual machines that can have their service tier changed to a less expensive offering.Which blade should you use?

Advisor

The marketing team wants to know which web pages are most popular, at what times of day, and where the users are located. Which of the following should be recommended?

Application Insights Application Insights meets all the requirements. The product can also determine which pages perform best.

You have an Azure subscription named Subscription1.You have 5 TB of data that you need to transfer to Subscription1.You plan to use an Azure Import/Export job.What can you use as the destination of the imported data?

Azure Blob storage

You have an Azure subscription named Subscription1.You have 5 TB of data that you need to transfer to Subscription1.You plan to use an Azure Import/Export job.What can you use as the destination of the imported data?

Azure File Storage

DRAG DROP -You have downloaded an Azure Resource Manager (ARM) template to deploy numerous virtual machines (VMs). The ARM template is based on a current VM, but must be adapted to reference an administrative password.You need to make sure that the password cannot be stored in plain text.You are preparing to create the necessary components to achieve your goal.Which of the following should you create to achieve your goal? Answer by dragging the correct option from the list to the answer area.Select and Place:

Azure Key Vault An Access Policy

You administer a solution in Azure that is currently having performance issues.You need to find the cause of the performance issues pertaining to metrics on the Azure infrastructure.Which of the following is the tool you should use?

Azure Monitor

You have an Azure subscription that contains an Azure Storage account.You plan to create an Azure container instance named container1 that will use a Docker image named Image1. Image1 contains a Microsoft SQL Server instance that requires persistent storage.You need to configure a storage service for Container1.What should you use?

Azure Table storage

You have an Azure subscription named Subscription1 that contains an Azure Log Analytics workspace named Workspace1.You need to view the error events from a table named Event.Which query should you run in Workspace1?

Event | search "error"

You have an Azure subscription that contains an Azure Active Directory (Azure AD) tenant named contoso.com and an Azure Kubernetes Service (AKS) cluster named AKS1.An administrator reports that she is unable to grant access to AKS1 to the users in contoso.com.You need to ensure that access to AKS1 can be granted to the contoso.com users.What should you do first?

From contoso.com, create an OAuth 2.0 authorization endpoint.

DRAG DROP -Your company has an Azure subscription that includes a number of Azure virtual machines (VMs), which are all part of the same virtual network.Your company also has an on-premises Hyper-V server that hosts a VM, named VM1, which must be replicated to Azure.Which of the following objects that must be created to achieve this goal? Answer by dragging the correct option from the list to the answer area.Select and Place:

Hyper-V site Azure Recovery Services Vault Replication Policy

You have an Azure virtual machine named VM1 that runs Windows Server 2016.You need to create an alert in Azure when more than two error events are logged to the System event log on VM1 within an hour.Solution: You create an Azure storage account and configure shared access signatures (SASs). You install the Microsoft Monitoring Agent on VM1. You create an alert in Azure Monitor and specify the storage account as the source.Does that meet the goal?

No

Your company has a Microsoft SQL Server Always On availability group configured on their Azure virtual machines (VMs).You need to configure an Azure internal load balancer as a listener for the availability group.Solution: You create an HTTP health probe on port 1433.Does the solution meet the goal?

No

Your company has a Microsoft SQL Server Always On availability group configured on their Azure virtual machines (VMs).You need to configure an Azure internal load balancer as a listener for the availability group.Solution: You set Session persistence to Client IP.Does the solution meet the goal?

No

Your company's Azure subscription includes two Azure networks named VirtualNetworkA and VirtualNetworkB.VirtualNetworkA includes a VPN gateway that is configured to make use of static routing. Also, a site-to-site VPN connection exists between your company's on- premises network and VirtualNetworkA.You have configured a point-to-site VPN connection to VirtualNetworkA from a workstation running Windows 10. After configuring virtual network peering betweenVirtualNetworkA and VirtualNetworkB, you confirm that you are able to access VirtualNetworkB from the company's on-premises network. However, you find that you cannot establish a connection to VirtualNetworkB from the Windows 10 workstation.You have to make sure that a connection to VirtualNetworkB can be established from the Windows 10 workstation.Solution: You choose the Allow gateway transit setting on VirtualNetworkA.Does the solution meet the goal?

No

What security features does Azure DNS provide?

Role-based access control, activity logs, and resource locking Azure DNS is built on Azure Resource Manager, which provides security across all resources in Azure DNS.

Your company has two on-premises servers named SRV01 and SRV02. Developers have created an application that runs on SRV01. The application calls a service on SRV02 by IP address.You plan to migrate the application on Azure virtual machines (VMs). You have configured two VMs on a single subnet in an Azure virtual network.You need to configure the two VMs with static internal IP addresses.What should you do?

Run the Set-AzureStaticVNetIP PowerShell cmdlet.

Which of following provides more CPU, memory, or disk space without adding more virtual machines?

Scale up Scale up gives more CPU, memory, and disk space. Scale up by changing the pricing tier of the App Service plan.

Which of the following isn't a valid automated deployment source?

SharePoint Azure currently supports Azure DevOps, GitHub, Bitbucket, OneDrive, Dropbox, and external Git repositories.

You have an Azure subscription that contains a resource group named TestRG.You use TestRG to validate an Azure deployment.TestRG contains the following resources:You need to delete TestRG.What should you do first?

Turn off VM1 and remove the resource lock from VNET1

The company is planning a delegation model for the Azure storage. Apps in the production environment must have unrestricted access to storage resources. Which of the following is the best course of action?

Use access keys for the production apps.

You have an Azure subscription named AZPT1 that contains the resources shown in the following table:You create a new Azure subscription named AZPT2.You need to identify which resources can be moved to AZPT2.Which resources should you identify?

VM1, storage1, VNET1, VM1Managed, and RVAULT1

Which of the following resources could have a public IP address?

Virtual Machine Public IP addresses can be assigned to virtual machines.

You have an Azure subscription that contains a user named User1.You need to ensure that User1 can deploy virtual machines and manage virtual networks. The solution must use the principle of least privilege.Which role-based access control (RBAC) role should you assign to User1?

Virtual Machine Contributor

A company needs to extend their private address space in Azure by providing a direct connection to Azure resources. Which of the following should be implemented?

Virtual network endpoint Virtual network endpoints extend the private address space in Azure. Endpoints restrict the flow of traffic. As service endpoints are created, Azure creates routes in the route table to direct the traffic.

Which of the following statements best describes Azure routing?

When the next hop type is none, traffic is dropped. Traffic routed to the None next hop type is not routed outside the subnet, but is dropped.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have an Azure Directory (Azure AD) tenant named Adatum and an Azure Subscription named Subscription1. Adatum contains a group named Developers.Subscription1 contains a resource group named Dev.You need to provide the Developers group with the ability to create Azure logic apps in the Dev resource group.Solution: On Dev, you assign the Contributor role to the Developers group.Does this meet the goal?

Yes

You have an on-premises server that contains a folder named D:\Folder1.You need to copy the contents of D:\Folder1 to the public container in an Azure Storage account named contosodata.Which command should you run?

azcopy copy D:\folder1 https://contosodata.blob.core.windows.net/public --recursive

You have an Azure Storage account named storage1.You plan to use AzCopy to copy data to storage1.You need to identify the storage services in storage1 to which you can copy the data.Which storage services should you identify?

blob and file only

Which of the following is the Kubernetes agent that processes the orchestration requests and schedules running the requested containers?

kubelet The kubelet is the Kubernetes agent that processes the orchestration requests from the Azure-managed node.

You plan to move a distributed on-premises app named App1 to an Azure subscription.After the planned move, App1 will be hosted on several Azure virtual machines.You need to ensure that App1 always runs on at least eight virtual machines during planned Azure maintenance.What should you create?

one Availability Set that has 10 update domains and one fault domain

You have an Azure subscription named Subscription1 that contains an Azure Log Analytics workspace named Workspace1.You need to view the error events from a table named Event.Which query should you run in Workspace1?

search in (Event) "error"

Your company has an Azure subscription.You need to deploy a number of Azure virtual machines (VMs) using Azure Resource Manager (ARM) templates. You have been informed that the VMs will be included in a single availability set.You are required to make sure that the ARM template you configure allows for as many VMs as possible to remain accessible in the event of fabric failure or maintenance.Which of the following is the value that you should configure for the platformUpdateDomainCount property?

40

Your company has an Azure Active Directory (Azure AD) subscription.You need to deploy five virtual machines (VMs) to your company's virtual network subnet.The VMs will each have both a public and private IP address. Inbound and outbound security rules for all of these virtual machines must be identical.Which of the following is the least amount of network interfaces needed for this configuration?

5

What are some of the typical components involved in a network design?

A VM, subnet, firewall, and load balancer Typical components involved in a network design do include a VM, subnet, firewall, and load balancer.

Suppose a company wants to allow access to an Azure SQL Database instance. Which of the following network rule types should they use to configure Azure firewall?

Application An application rule can be used to filter traffic based on an FQDN such as server1.database.windows.net.

You have an Azure subscription named Subscription1 that contains a virtual network named VNet1. VNet1 is in a resource group named RG1.Subscription1 has a user named User1. User1 has the following roles:✑ Reader✑ Security Admin✑ Security ReaderYou need to ensure that User1 can assign the Reader role for VNet1 to other users.What should you do?

Assign User1 the User Access Administrator role for VNet1.

You have an Azure subscription linked to an Azure Active Directory tenant. The tenant includes a user account named User1.You need to ensure that User1 can assign a policy to the tenant root management group.What should you do?

Assign the Owner role for the Azure subscription to User1, and then instruct User1 to configure access management for Azure resources.

What Microsoft service helps to simplify a complex hub-and-spoke virtual network WAN deployment?

Azure Virtual WAN Azure Virtual WAN with Virtual WAN hubs simplifies a complex virtual network WAN.

Your company has virtual machines (VMs) hosted in Microsoft Azure. The VMs are located in a single Azure virtual network named VNet1.The company has users that work remotely. The remote workers require access to the VMs on VNet1.You need to provide access for the remote workers.What should you do?

Configure a Point-to-Site (P2S) VPN.

Your company has an Azure Active Directory (Azure AD) tenant that is configured for hybrid coexistence with the on-premises Active Directory domain.The on-premise virtual environment consists of virtual machines (VMs) running on Windows Server 2012 R2 Hyper-V host servers.You have created some PowerShell scripts to automate the configuration of newly created VMs. You plan to create several new VMs.You need a solution that ensures the scripts are run on the new VMs.Which of the following is the best solution?

Configure a SetupComplete.cmd batch file in the %windir%\setup\scripts directory.

Suppose a company wants to allow external users to access an Azure virtual server with a remote desktop connection. Which one of the following items would be implemented on the Azure firewall to allow these connections?

Destination network address translation Use DNAT to translate Azure firewall's public IP address to the private IP address of the virtual server.

Which load balancing strategy does the Application Gateway implement?

Distributes requests to each available server in a backend pool in turn, round-robin. The Application Gateway distributes requests using round-robin.

What is cloud tiering in Azure File Sync?

It's a feature that archives infrequently accessed files to free up space on the local file share

Which of the following best describes the Azure File Sync agent?

It's installed on a server to enable Azure File Sync replication between the local file share and an Azure file share.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have an Azure Directory (Azure AD) tenant named Adatum and an Azure Subscription named Subscription1. Adatum contains a group named Developers.Subscription1 contains a resource group named Dev.You need to provide the Developers group with the ability to create Azure logic apps in the Dev resource group.Solution: On Subscription1, you assign the DevTest Labs User role to the Developers group.Does this meet the goal?

No

You deploy an Azure Kubernetes Service (AKS) cluster named AKS1.You need to deploy a YAML file to AKS1.Solution: From Azure CLI, you run az aks.Does this meet the goal?

No

You have an Azure virtual machine named VM1 that runs Windows Server 2016.You need to create an alert in Azure when more than two error events are logged to the System event log on VM1 within an hour.Solution: You create an event subscription on VM1. You create an alert in Azure Monitor and specify VM1 as the sourceDoes this meet the goal?

No

You have an Azure subscription named Subscription1. Subscription1 contains the resource groups in the following table.RG1 has a web app named WebApp1. WebApp1 is located in West Europe.You move WebApp1 to RG2.What is the effect of the move?

The App Service plan for WebApp1 remains in West Europe. Policy2 applies to WebApp1.

HOTSPOT -You have an Azure subscription named Subscription1 that contains a resource group named RG1.In RG1, you create an internal load balancer named LB1 and a public load balancer named LB2.You need to ensure that an administrator named Admin1 can manage LB1 and LB2. The solution must follow the principle of least privilege.Which role should you assign to Admin1 for each task? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point.Hot Area:

The Network Contributor role lets you manage networks, but not access them.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have an Azure virtual machine named VM1 that runs Windows Server 2016.You need to create an alert in Azure when more than two error events are logged to the System event log on VM1 within an hour.Solution: You create an Azure Log Analytics workspace and configure the data settings. You install the Microsoft Monitoring Agent on VM1. You create an alert inAzure Monitor and specify the Log Analytics workspace as the source.Does this meet the goal?

Yes

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You need to ensure that an Azure Active Directory (Azure AD) user named Admin1 is assigned the required role to enable Traffic Analytics for an Azure subscription.Solution: You assign the Network Contributor role at the subscription level to Admin1.Does this meet the goal?

Yes

You deploy an Azure Kubernetes Service (AKS) cluster named AKS1.You need to deploy a YAML file to AKS1.Solution: From Azure CLI, you run the kubectl client.Does this meet the goal?

Yes

You plan to use the Azure Import/Export service to copy files to a storage account.Which two files should you create before you prepare the drives for the import job? Each correct answer presents part of the solution.NOTE: Each correct selection is worth one point.

a dataset CSV file a driveset CSV file

You download an Azure Resource Manager template based on an existing virtual machine. The template will be used to deploy 100 virtual machines.You need to modify the template to reference an administrative password. You must prevent the password from being stored in plain text.What should you create to store the password?

an Azure Key Vault and an access policy

You have an Azure subscription.Users access the resources in the subscription from either home or from customer sites. From home, users must establish a point-to-site VPN to access the Azure resources. The users on the customer sites access the Azure resources by using site-to-site VPNs.You have a line-of-business-app named App1 that runs on several Azure virtual machine. The virtual machines run Windows Server 2016.You need to ensure that the connections to App1 are spread across all the virtual machines.What are two possible Azure services that you can use? Each correct answer presents a complete solution.NOTE: Each correct selection is worth one point.

an internal load balancer an Azure Application Gateway

You have an app named App1 that runs on two Azure virtual machines named VM1 and VM2.You plan to implement an Azure Availability Set for App1. The solution must ensure that App1 is available during planned maintenance of the hardware hostingVM1 and VM2.What should you include in the Availability Set?

two update domains

A company provides customers a virtual network in the cloud. There are dozens of Linux virtual machines in another virtual network. Which Azure load balancer should be used to direct traffic between the virtual networks?

An internal load balancer. An internal load balancer directs traffic only to resources that are inside a virtual network or that use a VPN to access Azure infrastructure.

In a typical project, when would you create your storage account(s)?

At the beginning, during project setup. Storage accounts are stable for the lifetime of a project. It's common to create them at the start of a project.

The finance team needs to transfer a series of large files to blob storage. It may take several hours to upload each file. Everyone is concerned if the transfer fails, it will have to be restarted. Which tool is the most appropriate for this task?

AzCopy AzCopy is ideal for transferring large files as it can run in the background.

A manufacturing company's finance department wants to control how the data is being transferred to Azure Files. They want a graphical tool to manage the process, but they don't want to use the Azure portal. What tool would be best in this situation?

Azure Storage Explorer Azure Storage Explorer is the best choice of the finance department doesn't want to use the Azure portal.

The infrastructure team needs to install IIS on the localhost. They do not want to use a Custom Script Extension. Which of the following could be used instead?

Desired state configuration DSC is a good choice for installing virtual machine features.

What is the default distribution type for traffic through a load balancer?

Five-tuple hash Five-tuple hash is the default.

You recently created a new Azure subscription that contains a user named Admin1.Admin1 attempts to deploy an Azure Marketplace resource by using an Azure Resource Manager template. Admin1 deploys the template by using AzurePowerShell and receives the following error message: `User failed validation to purchase resources. Error message: `Legal terms have not been accepted for this item on this subscription. To accept legal terms, please go to the Azure portal (http://go.microsoft.com/fwlink/?LinkId=534873) and configure programmatic deployment for the Marketplace item or create it there for the first time.`You need to ensure that Admin1 can deploy the Marketplace resource successfully.What should you do?

From Azure PowerShell, run the Set-AzMarketplaceTerms cmdlet

You create an App Service plan named Plan1 and an Azure web app named webapp1.You discover that the option to create a staging slot is unavailable.You need to create a staging slot for Plan1.What should you do first?

From Plan1, scale up the App Service plan

You have an Azure subscription named Subscription1 that contains an Azure virtual machine named VM1. VM1 is in a resource group named RG1.VM1 runs services that will be used to deploy resources to RG1.You need to ensure that a service running on VM1 can manage the resources in RG1 by using the identity of VM1.What should you do first?

From the Azure portal, modify the Managed Identity settings of VM1

You have an Azure Active Directory (Azure AD) tenant that contains 5,000 user accounts.You create a new user account named AdminUser1.You need to assign the User administrator administrative role to AdminUser1.What should you do from the user account properties?

From the Directory role blade, modify the directory role

You have an Azure subscription that contains a storage account named account1.You plan to upload the disk files of a virtual machine to account1 from your on-premises network. The on-premises network uses a public IP address space of131.107.1.0/24.You plan to use the disk files to provision an Azure virtual machine named VM1. VM1 will be attached to a virtual network named VNet1. VNet1 uses an IP address space of 192.168.0.0/24.You need to configure account1 to meet the following requirements:✑ Ensure that you can upload the disk files to account1.✑ Ensure that you can attach the disks to VM1.✑ Prevent all other access to account1.Which two actions should you perform? Each correct answer presents part of the solution.NOTE: Each correct selection is worth one point.

From the Firewalls and virtual networks blade of account1, select Selected networks.

You have a Recovery Service vault that you use to test backups. The test backups contain two protected virtual machines.You need to delete the Recovery Services vault.What should you do first?

From the Recovery Service vault, stop the backup of each backup item.

You have two Azure virtual machines named VM1 and VM2. You have two Recovery Services vaults named RSV1 and RSV2.VM2 is backed up to RSV1.You need to back up VM2 to RSV2.What should you do first?

From the VM2 blade, click Disaster recovery, click Replication settings, and then select RSV2 as the Recovery Services vault

Which of the following is a valid automated deployment source?

GitHub Azure currently supports Azure DevOps, GitHub, Bitbucket, OneDrive, Dropbox, and external Git repositories.

When creating user-defined routes, which of the following is a valid next hop types?

Internet The valid next hop choices are virtual appliance. virtual network gateway, virtual network, internet, and none.

You have an Azure Active Directory (Azure AD) tenant named contosocloud.onmicrosoft.com.Your company has a public DNS zone for contoso.com.You add contoso.com as a custom domain name to Azure AD.You need to ensure that Azure can verify the domain name.Which type of DNS record should you create?

MX

You plan to automate the deployment of a virtual machine scale set that uses the Windows Server 2016 Datacenter image.You need to ensure that when the scale set virtual machines are provisioned, they have web server components installed.Which two actions should you perform? Each correct answer presents part of the solution.NOTE: Each correct selection is worth one point.

Modify the extensionProfile section of the Azure Resource Manager template Create a new virtual machine scale set in the Azure portal

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have an Azure Directory (Azure AD) tenant named Adatum and an Azure Subscription named Subscription1. Adatum contains a group named Developers.Subscription1 contains a resource group named Dev.You need to provide the Developers group with the ability to create Azure logic apps in the Dev resource group.Solution: On Subscription1, you assign the Logic App Operator role to the Developers group.Does this meet the goal?

No

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have an Azure subscription that contains the following users in an Azure Active Directory tenant named contoso.onmicrosoft.com:User1 creates a new Azure Active Directory tenant named external.contoso.onmicrosoft.com.You need to create new user accounts in external.contoso.onmicrosoft.com.Solution: You instruct User3 to create the user accounts.Does that meet the goal?

No

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have an Azure subscription that contains the following users in an Azure Active Directory tenant named contoso.onmicrosoft.com:User1 creates a new Azure Active Directory tenant named external.contoso.onmicrosoft.com.You need to create new user accounts in external.contoso.onmicrosoft.com.Solution: You instruct User4 to create the user accounts.Does that meet the goal?

No

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have an Azure virtual machine named VM1 that runs Windows Server 2016.You need to create an alert in Azure when more than two error events are logged to the System event log on VM1 within an hour.Solution: You create an Azure Log Analytics workspace and configure the data settings. You add the Microsoft Monitoring Agent VM extension to VM1. You create an alert in Azure Monitor and specify the Log Analytics workspace as the source.Does this meet the goal?

No

You deploy an Azure Kubernetes Service (AKS) cluster named AKS1.You need to deploy a YAML file to AKS1.Solution: From Azure CLI, you run azcopy.Does this meet the goal?

No

You have an Azure virtual machine named VM1. VM1 was deployed by using a custom Azure Resource Manager template named ARM1.json.You receive a notification that VM1 will be affected by maintenance.You need to move VM1 to a different host immediately.Solution: From the Overview blade, you move the virtual machine to a different subscription.Does this meet the goal?

No

Your company has an Azure Active Directory (Azure AD) tenant named weyland.com that is configured for hybrid coexistence with the on-premises ActiveDirectory domain.You have a server named DirSync1 that is configured as a DirSync server.You create a new user account in the on-premise Active Directory. You now need to replicate the user information to Azure AD immediately. Solution: You use Active Directory Sites and Services to force replication of the Global Catalog on a domain controller. Does the solution meet the goal?

No

Your company has an azure subscription that includes a storage account, a resource group, a blob container and a file share.A colleague named Jon Ross makes use of a solitary Azure Resource Manager (ARM) template to deploy a virtual machine and an additional Azure Storage account.You want to review the ARM template that was used by Jon Ross.Solution: You access the Container blade.Does the solution meet the goal?

No

Which of the following best describes blob object replication?

Object replication doesn't support blob snapshots. Any snapshots on a blob in the source account are not replicated to the destination account.

Why should you use pull mode instead of push mode for DSC?

Pull mode is best for complex environments that need redundancy and scale. The local configuration manager (LCM) on each node automatically polls the pull server at regular intervals to get the latest configuration details. In push mode, an administrator manually sends the configurations toward the nodes.

Your company has a Microsoft Azure subscription.The company has datacenters in Los Angeles and New York.You are configuring the two datacenters as geo-clustered sites for site resiliency.You need to recommend an Azure storage redundancy option.You have the following data storage requirements:✑ Data must be stored on multiple nodes.✑ Data must be stored on nodes in separate geographic locations.✑ Data can be read from the secondary location as well as from the primary location.Which of the following Azure stored redundancy options should you recommend?

Read-only geo-redundant storage

You have an Azure virtual machine (VM) that has a single data disk. You have been tasked with attaching this data disk to another Azure VM.You need to make sure that your strategy allows for the virtual machines to be offline for the least amount of time possible.Which of the following is the action you should take FIRST?

Stop the VM that includes the data disk.

You have an Azure subscription that contains a resource group named RG26.RG26 is set to the West Europe location and is used to create temporary resources for a project. RG26 contains the resources shown in the following table.SQLDB01 is backed up to RGV1.When the project is complete, you attempt to delete RG26 from the Azure portal. The deletion fails.You need to delete RG26.What should you do first?

Stop the backup of SQLDB01

You have a general-purpose v1 Azure Storage account named storage1 that uses locally-redundant storage (LRS).You need to ensure that the data in the storage account is protected if a zone fails. The solution must minimize costs and administrative effort.What should you do first?

Upgrade the account to general-purpose v2.

HOTSPOT -You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table:User3 is the owner of Group1.Group2 is a member of Group1.You configure an access review named Review1 as shown in the following exhibit:

User3 can perform an access review of user1 - No User3 can perform an access review of userA- No user3 can perform an access review of userB- Yes

Which of the following is a small application that provides post-deployment configuration and automation tasks on Azure virtual machines?

Virtual machine extensions. Virtual machine extensions automate the tasks of creating, maintaining, and removing virtual machines

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You need to ensure that an Azure Active Directory (Azure AD) user named Admin1 is assigned the required role to enable Traffic Analytics for an Azure subscription.Solution: You assign the Owner role at the subscription level to Admin1.Does this meet the goal? A. Yes

Yes

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You need to ensure that an Azure Active Directory (Azure AD) user named Admin1 is assigned the required role to enable Traffic Analytics for an Azure subscription.Solution: You assign the Reader role at the subscription level to Admin1.Does this meet the goal?

Yes

You have an Azure subscription that contains the following users in an Azure Active Directory tenant named contoso.onmicrosoft.com:User1 creates a new Azure Active Directory tenant named external.contoso.onmicrosoft.com.You need to create new user accounts in external.contoso.onmicrosoft.com.Solution: You instruct User2 to create the user accounts.Does that meet the goal?

Yes

Your company has a Microsoft SQL Server Always On availability group configured on their Azure virtual machines (VMs).You need to configure an Azure internal load balancer as a listener for the availability group.Solution: You enable Floating IP.Does the solution meet the goal?

Yes

Your company has an azure subscription that includes a storage account, a resource group, a blob container and a file share.A colleague named Jon Ross makes use of a solitary Azure Resource Manager (ARM) template to deploy a virtual machine and an additional Azure Storage account.You want to review the ARM template that was used by Jon Ross.Solution: You access the Resource Group blade.Does the solution meet the goal?

Yes

Your company's Azure subscription includes two Azure networks named VirtualNetworkA and VirtualNetworkB.VirtualNetworkA includes a VPN gateway that is configured to make use of static routing. Also, a site-to-site VPN connection exists between your company's on- premises network and VirtualNetworkA.You have configured a point-to-site VPN connection to VirtualNetworkA from a workstation running Windows 10. After configuring virtual network peering betweenVirtualNetworkA and VirtualNetworkB, you confirm that you are able to access VirtualNetworkB from the company's on-premises network. However, you find that you cannot establish a connection to VirtualNetworkB from the Windows 10 workstation.You have to make sure that a connection to VirtualNetworkB can be established from the Windows 10 workstation.Solution: You download and re-install the VPN client configuration package on the Windows 10 workstation.Does the solution meet the goal?

Yes

Your company's Azure subscription includes Azure virtual machines (VMs) that run Windows Server 2016.One of the VMs is backed up every day using Azure Backup Instant Restore.When the VM becomes infected with data encrypting ransomware, you decide to recover the VM's files.Which of the following is TRUE in this scenario?

You can only recover the files to the infected VM.

Your company's Azure subscription includes Azure virtual machines (VMs) that run Windows Server 2016.One of the VMs is backed up every day using Azure Backup Instant Restore.When the VM becomes infected with data encrypting ransomware, you are required to restore the VM.Which of the following actions should you take?

You should restore the VM to any VM within the companyג€™s subscription.

Your company has three virtual machines (VMs) that are included in an availability set.You try to resize one of the VMs, which returns an allocation failure message.It is imperative that the VM is resized.Which of the following actions should you take?

You should stop all three VMs.

Which of the following IP address ranges is routable over the internet?

215.11.0.0 to 215.11.255.255 this address range is routable over the internet.

Which of the following describes the Azure firewall IP address?

The firewall has a statically assigned public IP address The Azure firewall uses a statically assigned public IP address.

The infrastructure team is connecting two virtual networks. Performance is a key concern. Which of the following will most influence performance?

Selecting an appropriate Gateway SKU Aggregate Throughput Benchmarks are provided for each Gateway SKU.

Custom script extensions time out after which of the following?

90 minutes Custom script extensions will time out and that should be considered when deciding on the scope of the script.

What is Azure Automation State Configuration?

A service used to write, manage, and compile PowerShell Desired State Configuration (DSC) configurations, import DSC resources, and assign configurations to target nodes. Azure Automation State Configuration enables you to ensure that all virtual machines in a collection are in the same consistent state.

Triggering a webhook at 8am on Saturday is an example of which of the following?

A time-based rule. Time-based rules allow scaling based on time patterns.

Suppose you have a script that creates several VMs with different images. When the script issues the command to create the first VM you do not want to block the script while the VM is created, instead you want the script to immediately move on to the next command. What is the best way to do this?

Add the '--no-wait' argument to your create command. Adding '--no-wait' will cause 'azure VM create' to return immediately without waiting for the VM to actually be created.

Which of the following is a default inbound security rule?

Allow inbound coming from any VM to any other VM within the virtual network. By default, inbound security rules allow traffic from any VM to any other VM within the virtual network.

Your company has serval departments. Each department has a number of virtual machines (VMs).The company has an Azure subscription that contains a resource group named RG1.All VMs are located in RG1.You want to associate each VM with its respective department. What should you do?

Assign tags to the virtual machines.

Suppose you have an application running on a Windows virtual machine in Azure. What is the best-practice guidance on where the app should store data files?

Attached data disk Dedicated data disks are generally considered the best place to store application data files. They can be larger than OS disks and you can optimize them for the cost and performance characteristics appropriate for your data.

The infrastructure team is responsible for managing a production web app. The app requires scaling to five instances, 40GB of storage, and a custom domain name. A least cost solution is desired. Which App Service Plan would meet the requirements?

Standard The Standard App Service plan meets the requirements at the least cost.

The infrastructure team is configuring networking for the Azure Kubernetes service. Which of the following services would be best for internal-only applications that support other workloads within the cluster?

ClusterIP ClusterIP creates an internal IP address for use within the AKS cluster. This is good for internal-only applications that support other workloads within the cluster.

Which workload option should be selected to run a network appliance on a virtual machine?

Compute optimizedCompute optimized virtual machines are designed to have a high CPU-to-memory ratio. Suitable for medium traffic web servers, network appliances, batch processes, and application servers.

An organization has a security policy that prohibits exposing SSH ports to the outside world. What is the best way to connect to the Azure Linux virtual machines and install software?

Configure the Bastion service. The Azure Bastion service is a new fully platform-managed PaaS service provisioned inside a virtual network. Bastion provides secure and seamless RDP and SSH connectivity to virtual machines. The access uses the Azure portal and SSL.

The manufacturing company has a number of sensors that record time-relative data. Only the most recent data is useful. The company wants the lowest cost storage for this data. What is the best kind of storage account for them?

LRS lowest cost, the data is being continuously created, and data loss isn't an issue.GRS

Suppose you have two video files stored as blobs. One of the videos is business-critical and requires a replication policy that creates multiple copies across geographically diverse datacenters. The other video is non-critical, and a local replication policy is sufficient. Which of the following options would satisfy both data diversity and cost sensitivity consideration.

Create two storage accounts. The first account makes use of Geo-redundant storage (GRS) and hosts the business-critical video content. The second account makes use of Local-redundant storage (LRS) and hosts the non-critical video content. In general, increased diversity means an increased number of storage accounts. A storage account by itself has no financial cost. However, the settings you choose for the account do influence the cost of services in the account. Use multiple storage accounts to reduce costs.

A PowerShell DSC script ______________.

Describes the desired state. A PowerShell DSC script is declarative. It describes the desired state but doesn't include the steps necessary to achieve that state.

The name of a storage account must be which of the following?

Globally unique. The storage account name is used as part of the URI for API access, so it must be globally unique.

The name of a storage account must be:

Globally unique. The storage account name is used as part of the URI for API access, so it must be globally unique.

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.Your company has an Azure Active Directory (Azure AD) subscription.You want to implement an Azure AD conditional access policy.The policy must be configured to require members of the Global Administrators group to use Multi-Factor Authentication and an Azure AD-joined device when they connect to Azure AD from untrusted locations. Solution: You access the Azure portal to alter the session control of the Azure AD conditional access policy. Does the solution meet the goal?

No

When creating a Windows virtual machine in Azure, which port would you open using the INBOUND PORT RULES in order to allow remote-desktop access?

RDP (3389) The Remote Desktop Protocol (RDP) uses port 3389 by default so this port is the standard port you would open if you wanted to use an RDP client to administer your Windows virtual machines.

Which of the following replicates data to a secondary region, maintain six copies of the data, and is the default replication option?

Read-access geo-redundant storage Read-access geo-redundant storage is the default replication option. Geo-redundant storage (GRS) copies the data synchronously three times within a single physical location in the primary region using LRS. It then copies the data asynchronously to a single physical location in the secondary region.

You are planning to deploy an Ubuntu Server virtual machine to your company's Azure subscription.You are required to implement a custom deployment that includes adding a particular trusted root certification authority (CA). Which of the following should you use to create the virtual machine?

The Create-AzVM cmdlet. Once Cloud-init.txt has been created, you can deploy the VM with az vm create cmdlet, using the --custom-data parameter to provide the full path to the cloud- init.txt file.

The infrastructure team has two NSG security rules for inbound traffic to the backend web servers. There is an allow rule with a priority of 200. And, there is a deny rule with a priority of 150. Which rule takes precedence?

The deny rule takes precedence. The deny rule takes precedence because it's processed first. The rule with priority 150 is processed before the rule with priority 200.

The infrastructure teams needs to configure a site-to-site VPN connection between the on-premises network and theAzure network. The on-premises network uses a Cisco ASA VPN device. Before starting the configuration, which of the following is required?

The shared key provided when the site-to-site VPN connection was created. The shared key is required.

Which of the following statement about external load balancers is correct?

They have a public IP address. External load balancers have public IP addresses.

What is the main benefit of using a network virtual appliance?

To control incoming traffic from the perimeter network and allow only traffic that meets security requirements to pass through. A network virtual appliance acts like a firewall. It checks all inbound and outbound traffic, and it secures your environment by allowing or denying the traffic.

True or false: Azure App service can automatically scale your web application to meet traffic demand?

True Azure App service has built-in auto scale support and will increase or decrease the resources allocated to run your app as needed, depending on the demand.

Suppose you're an administrator of several Azure virtual machines. You get a text message indicating some problems with your VMs. You are at a friend's house and only have your tablet with you. True or false: you'll still be able to access the Azure CLI using the tablet, even though you can't install the CLI on it.

True The Azure Cloud Shell is available in the browser and runs with the full Azure CLI. If you prefer Powershell, the Azure Cloud Shell has that as well.

Your organization has an internal system to share patient appointment information and notes. You can secure the access based on a user's membership in an Azure Active Directory (Azure AD) group. Which kind of authorization supports this scenario best, and why?

Use Azure Active Directory. By using Azure AD, you can create a service principal to authenticate the app. This option is the best because no code or configuration files need to store credentials. Access is controlled with Azure AD and can be extended or revoked without requiring any code changes.

A local manufacturing company runs dedicated software in their warehouse to keep track of stock. The software needs to run on machines in the warehouse, but the management team wants to access the output from the main office. The limited bandwidth available in the warehouse has caused problems in the past when they tried to use cloud-based solutions. What is the best way to sync these files with the cloud?

Use a machine in the warehouse to host a file share, install Azure File Sync, and share a drive with the rest of the warehouse.

You've been asked by a local manufacturing company that runs dedicated software in their warehouse to keep track of stock. The software needs to run on machines in the warehouse, but the management team wants to access the output from the head office. The limited bandwidth available in the warehouse caused them problems in the past when they tried to use cloud-based solutions. You recommend that they use Azure Files. Which is the best method to sync the files with the cloud? Use a machine in the warehouse to host a file share, install Azure File Sync, and share a drive with the rest of the warehouse.Azure File Sync will handle the updating and syncing of files efficiently over the low-bandwidth network.

Use a machine in the warehouse to host a file share, install Azure File Sync, and share a drive with the rest of the warehouse. Azure File Sync will handle the updating and syncing of files efficiently over the low-bandwidth network.

There is an existing storage account in Azure that stores unstructured data. The organization creates a new storage account. What is the best way to move the existing data to the new storage account?

Use the AzCopy command-line tool The key in this scenario is to move data between storage accounts. The AzCopy tool can work with two different storage accounts. The other tools do not copy data between storage accounts. Alternatively, although not one of the answer choices, Storage Explorer can be used to copy data between storage accounts.

Your company has an Azure Active Directory (Azure AD) tenant named weyland.com that is configured for hybrid coexistence with the on-premises ActiveDirectory domain.You have a server named DirSync1 that is configured as a DirSync server.You create a new user account in the on-premise Active Directory. You now need to replicate the user information to Azure AD immediately. Solution: You run the Start-ADSyncSyncCycle -PolicyType Initial PowerShell cmdlet. Does the solution meet the goal?

Yes

Your company's Azure solution makes use of Multi-Factor Authentication for when users are not in the office. The Per Authentication option has been configured as the usage model.After the acquisition of a smaller business and the addition of the new staff to Azure Active Directory (Azure AD) obtains a different company and adding the new employees to Azure Active Directory (Azure AD), you are informed that these employees should also make use of Multi-Factor Authentication.To achieve this, the Per Enabled User setting must be set for the usage model.Solution: You create a new Multi-Factor Authentication provider with a backup from the existing Multi-Factor Authentication provider data.Does the solution meet the goal?

Yes

How might you deploy a network virtual appliance?

You can configure a Windows virtual machine and enable IP forwarding after routing tables, user-defined routes, and subnets have been updated. Or you can use a partner image from Azure Marketplace. Customers often create network virtual appliances. And you can download many appliances from Azure Marketplace.

Another administrator creates an Azure virtual machine scale set with five virtual machines. Later, alerts show the VMs are all running at max capacity with the CPU being fully consumed. However, more VMs are not deploying in the scale set. What should be done to ensure that additional VMs are deployed when the CPU is 75% consumed?

Enable the autoscale option. When autoscale is enabled the parameters for when to scale are configured. To meet the requirements of this scenario, enable the autoscale option so that more VMs are created when the CPU is 75% consumed.

What is the default distribution type for traffic through a load balancer?

Five-tuple hash The load balancer uses a five-tuple (source IP, source port, destination IP, destination port, and protocol type) hash to map traffic to available servers.

When should Azure ExpressRoute be used instead of Azure site-to-site connectivity?

For handling enterprise-class and mission-critical workloads. ExpressRoute is best for handling enterprise-class and mission-critical workloads.

Most Azure commands return JSON by default. Sometimes this data set can be very large which makes it difficult to read and tricky to use the result of one command as input to another command. What can you use with Azure CLI to filter the results to get only the data that you need?

You can use the '--query' argument. All Azure commands support the '--query' argument which lets you select the useful data in any Azure command response.

Which configuration is required for an internal load balancer?

Virtual machines should be in the same virtual network. The virtual machines that use a load balancer to distribute a load to must be in the same virtual network.

Your public-facing static website stores all its public UI images in blob storage. The website needs to display the graphics without any kind of authorization. Which is the best option?

Public access This option requires the least effort to implement. There are no credentials that need to be stored or managed. For this website, it's the best option.

The company's VPN gateway must work with ExpressRoute. Which VPN type should be used?

Route-based Typical route-based gateway scenarios include point-to-site, inter-virtual network, or multiple site-to-site connections. Route-based is also selected to coexist with an ExpressRoute gateway or when the IKEv2 protocol is used.

The DevOps team for a large food delivery company is configuring a virtual machine scale set. Friday night is typically the busiest time. Conversely, 7 AM on Wednesday is generally the quietest time. Which of the following virtual machine scale set features should be configured to add more machines during that time?

Schedule-based rules With schedule-based rules administrators proactively schedule the scale set to deploy one or any number of additional instances. This will accommodate a spike in demand and then scale back down when the spike ends.

Which of the following resources can you assign a public IP address to?

A virtual machine You can assign public IP addresses to virtual machines.

What is the Azure ExpressRoute service?

Azure ExpressRoute is a service that provides a direct connection from the on-premises datacenter to the Microsoft cloud.

The manufacturing company's finance department wants to control how the data is being transferred to Azure Files. They want a graphical tool to manage the process, but they don't want to use the Azure portal. What tool do you recommend they use?

Azure Storage Explorer the finance department doesn't want to use the Azure portal.

The web team is installing an Application Gateway. They want to ensure incoming requests are checked for common security threats like cross-site scripting and crawlers. To address the concerns what should be done?

Install the Web Application Firewall The Web Application Firewall is an optional component that handles incoming requests before they reach a listener. The Web Application Firewall checks each request for many common threats, based on the Open Web Application Security Project.

A manufacturing company has sensors that record time-relative data. Only the most recent data is useful. The company wants the lowest cost storage for this data. What is the best storage account for the company?

Locally redundant storage This option is the best because it's the lowest cost, the data is being continuously created, and data loss isn't an issue.

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.Your company has an Azure Active Directory (Azure AD) subscription.You want to implement an Azure AD conditional access policy.The policy must be configured to require members of the Global Administrators group to use Multi-Factor Authentication and an Azure AD-joined device when they connect to Azure AD from untrusted locations. Solution: You access the multi-factor authentication page to alter the user settings. Does the solution meet the goal?

No

Your company's Azure solution makes use of Multi-Factor Authentication for when users are not in the office. The Per Authentication option has been configured as the usage model.After the acquisition of a smaller business and the addition of the new staff to Azure Active Directory (Azure AD) obtains a different company and adding the new employees to Azure Active Directory (Azure AD), you are informed that these employees should also make use of Multi-Factor Authentication.To achieve this, the Per Enabled User setting must be set for the usage model. Solution: You reconfigure the existing usage model via the Azure CLI. Does the solution meet the goal?

No

What is the effect of the default network security settings for a new virtual machine?

Outbound request is allowed. Inbound traffic is only allowed from within the virtual network. Outbound requests are considered low risk, so they are allowed by default. Inbound traffic from within the virtual network is allowed. By placing a VM in a virtual network, the VM owner is implicitly opting-in to communication among the resources in the virtual network.

The leadership team has decided to move all services to Azure Kubernetes service. Which of the following components contributes to the monthly Azure charge?

Per node VM With Kubernetes organizations only pay for the virtual machine instances, storage, and networking resources consumed by the cluster.

Which configuration is required to configure an internal load balancer?

Virtual machines should be in the same virtual network. The virtual machines that you use a load balancer to distribute a load to must be in the same virtual network.

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements. Your company has an Azure Active Directory (Azure AD) subscription.You want to implement an Azure AD conditional access policy.The policy must be configured to require members of the Global Administrators group to use Multi-Factor Authentication and an Azure AD-joined device when they connect to Azure AD from untrusted locations. Solution: You access the Azure portal to alter the grant control of the Azure AD conditional access policy. Does the solution meet the goal?

Yes


Set pelajaran terkait

"Hope" is the thing with feathers -

View Set

ap biology - chapter 7 mastering biology

View Set

Ex#2 PN3 (study if you want to pass)

View Set

AS Biology OCR - The Immune System

View Set

chapter 6 Data and communications

View Set

P6 EJAAN MINGGU 5 & 6 ( 5/2/20 & 12/2/20)

View Set

Ch 21/22: Lymphatic System and Immunity Practice Questions

View Set

Chapter 3 - Content and Structure of Health Record

View Set

Review Chapter 10: Photosynthesis

View Set