Which level should you identify for each risk event?

DRAG DROP You are implementing conditional access policies. You must evaluate the existing Azure Active Directory (Azure AD) risk events and risk levels to configure and implement the policies. You need to identify the risk level of the following risk events: - Users with leaked credentials - Impossible travel to...

October 13, 2019 No Comments READ MORE +

What should you do?

HOTSPOT You need to deploy Microsoft Antimalware to meet the platform protection requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Scenario: Microsoft Antimalware must be installed on the virtual machines in RG1....

October 13, 2019 No Comments READ MORE +

You are evaluating the effect of the application security groups on the network communication between the virtual machines in Sub2

HOTSPOT You are evaluating the effect of the application security groups on the network communication between the virtual machines in Sub2. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1:...

October 12, 2019 No Comments READ MORE +

What should you use?

Your company plans to create separate subscriptions for each department. Each subscription will be associated to the same Azure Active Directory (Azure AD) tenant. You need to configure each subscription to have the same role assignments. What should you use?A . Azure Security CenterB . Azure BlueprintsC . Azure AD...

October 12, 2019 No Comments READ MORE +

What should you do?

Testlet 1 This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are...

October 11, 2019 No Comments READ MORE +

Which four actions should you perform in sequence?

DRAG DROP You need to deploy AKS1 to meet the platform protection requirements. Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. NOTE: More than one order of answer...

October 10, 2019 No Comments READ MORE +

You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table

HOTSPOT You create and enforce an Azure AD Identity Protection user risk policy that has the following settings: - Assignment: Include Group1, Exclude Group2 - Conditions: Sign-in risk of Medium and above - Access: Allow access, Require password change You have an Azure Active Directory (Azure AD) tenant named contoso.com...

October 10, 2019 No Comments READ MORE +

Which users can upload images to Registry1 and download images from Registry1?

HOTSPOT You have an Azure Container Registry named Registry1. You add role assignment for Registry1 as shown in the following table. Which users can upload images to Registry1 and download images from Registry1? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one...

October 9, 2019 No Comments READ MORE +

You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table

HOTSPOT You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table. Azure AD Privileged Identity Management (PIM) is enabled for the tenant. In PIM, the Password Administrator role has the following settings: Maximum activation duration (hours): 2 Send email notifying...

October 8, 2019 No Comments READ MORE +

Which authentication method should you recommend?

You have a hybrid configuration of Azure Active Directory (Azure AD). You have an Azure SQL Database instance that is configured to support Azure AD authentication. Database developers must connect to the database instance and authenticate by using their on-premises Active Directory account. You need to ensure that developers can...

October 6, 2019 No Comments READ MORE +