Does the solution meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
How should you complete the code segment?
DRAG DROP You need to ensure that PolicyLib requirements are met. How should you complete the code segment? To answer, drag the appropriate code segments to the correct locations. Each code segment may be used once, more than once, or not at all. You may need to drag the split...
How should you complete the code segment?
HOTSPOT You are developing an ASP.NET Core app that includes feature flags which are managed by Azure App Configuration. You create an Azure App Configuration store named AppFeatureFlagStore that contains a feature flag named Export. You need to update the app to meet the following requirements: ✑ Use the Export...
How should you configure network security?
Topic 2, Contoso, Ltd Case study This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to...
How should you complete the code segment?
HOTSPOT You need to ensure that validation testing is triggered per the requirements. How should you complete the code segment? To answer, select the appropriate values in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: RepositoryUpdated When a new version of the...
How should you complete the code?
HOTSPOT A company is developing a gaming platform. Users can join teams to play online and see leaderboards that include player statistics. The solution includes an entity named Team. You plan to implement an Azure Redis Cache instance to improve the efficiency of data operations for entities that rarely change....
Which three items must you identify when configuring dynamic data masking?
You develop a solution that uses an Azure SQL Database to store user information for a mobile app. The app stores sensitive information about users. You need to hide sensitive information from developers that query the data for the mobile app. Which three items must you identify when configuring dynamic...
Which two values should you use?
You need to authenticate the user to the corporate website as indicated by the architectural diagram. Which two values should you use? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.A . ID token signatureB . ID token claimsC . HTTP response codeD...
Where should you store the agreement after it is completed?
You need to store the user agreements. Where should you store the agreement after it is completed?A . Azure Storage queueB . Azure Event HubC . Azure Service Bus topicD . Azure Event Grid topicView AnswerAnswer: B Explanation: Azure Event Hub is used for telemetry and distributed data streaming. This...
Will each protection method meet the requirement?
DRAG DROP You must ensure that the external party cannot access the data in the SSN column of the Person table. Will each protection method meet the requirement? To answer, drag the appropriate responses to the correct protection methods. Each response may be used once, more than once, or not...