Which two technologies should you recommend?
A company plans to use third-party application software to perform complex data analysis processes. The software will use up to 500 identical virtual machines (VMs) based on an Azure Marketplace VM image. You need to design the infrastructure for the third-party application server. The solution must meet the following requirements:...
Which policies should you recommend?
HOTSPOT You are working for a global company that has offices in many regions of the world. The company has strict policies that govern how and where applications may be deployed. You have an application that must be deployed to one specific region. The application requires premium storage. You need...
What should you do?
Your network environment includes remote employees. You need to create a secure connection for the remote employees who require access to your Azure virtual network. What should you do?A . Deploy Windows Server 2012 RRASB . Configure a point-to-site VPNC . Configure an ExpressRouteD . Configure a site-to-site VPNView AnswerAnswer:...
Which permission type should you use for each app?
DRAG DROP You plan to integrate Azure Active Directory (Azure AD) with the following custom applications: You need to configure the web API permissions for the apps. Which permission type should you use for each app? View AnswerAnswer: Explanation:
What should you recommend?
You are designing an Azure application. The application includes services hosted in different geographic locations. The service locations may change. You must minimize the cost of communication between services. You need to recommend an approach for data transmission between your application and Azure services. The solution must minimize administrative effort....
What should you recommend?
DRAG DROP You are designing an automated process. The process must automatically copy twitter messages to an Azure SQL Database. You need to design the solution. What should you recommend? To answer, drag the appropriate resources to the correct flowchart shapes. Each resources may be used once, more than once,...
Which log entry should you use to verify access?
You administer an Azure Storage account named contosostorage. The account has a blob container to store image files. A user reports being unable to access an image file. You need to verify that anonymous users can successfully read Image files from the container. Which log entry should you use to...
You have an Azure SQL Database named Contosodb. Contosodb is running in the Standard/S2 tier and has a service level objective of 99 percent
HOTSPOT You have an Azure SQL Database named Contosodb. Contosodb is running in the Standard/S2 tier and has a service level objective of 99 percent. You review the service tiers in Microsoft Azure SQL Database as well as the results of running performance queries for the usage of the database...
What should you do?
You are building an Azure Web App that uses Azure Active Directory B2C for identity. The app will use social providers such as Facebook, Microsoft Account, and LinkedIn. The Web App has a customized home page that is based on the user’s name. The Web App does not function if...
What should you recommend?
DRAG DROP You are designing a solution to secure a company's Azure resources. The environment hosts 10 teams. Each team manages a project and has a project manager, a virtual machine (VM) operator, developers, and contractors. Project managers must be able to manage everything except access and authentication for users....