What information should you obtain from the developer to register the application?

Your company has an Azure subscription named Sub1 that is associated to an Azure Active Directory Azure (Azure AD) tenant named contoso.com. The company develops a mobile application named App1. App1 uses the OAuth 2 implicit grant type to acquire Azure AD access tokens. You need to register App1 in...

June 13, 2022 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

June 13, 2022 No Comments READ MORE +

Which authentication method should you instruct the developers to use?

You have a hybrid configuration of Azure Active Directory (Azure AD). All users have computers that run Windows 10 and are hybrid Azure AD joined. You have an Azure SQL database that is configured to support Azure AD authentication. Database developers must connect to the SQL database by using Microsoft...

June 12, 2022 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

June 12, 2022 No Comments READ MORE +

Which key vaults can you use?

Topic 3, Fabrikam inc This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that...

June 12, 2022 No Comments READ MORE +

Which three actions should you perform in sequence?

DRAG DROP Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution....

June 12, 2022 No Comments READ MORE +

What should you do first?

You need to ensure that User2 can implement PIM. What should you do first?A . Assign User2 the Global administrator role.B . Configure authentication methods for contoso.com.C . Configure the identity secure score for contoso.com.D . Enable multi-factor authentication (MFA) for User2.View AnswerAnswer: D Explanation: To start using PIM in...

June 12, 2022 No Comments READ MORE +

What should you do?

You have 15 Azure virtual machines in a resource group named RG1. All virtual machines run identical applications. You need to prevent unauthorized applications and malware from running on the virtual machines. What should you do?A . Apply an Azure policy to RG1.B . From Azure Security Center, configure adaptive...

June 12, 2022 No Comments READ MORE +

What should you do first?

You have an Azure subscription name Sub1 that contains an Azure Policy definition named Policy1. Policy1 has the following settings: ✑ Definition location: Tenant Root Group ✑ Category: Monitoring You need to ensure that resources that are noncompliant with Policy1 are listed in the Azure Security Center dashboard. What should...

June 11, 2022 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT Use the following login credentials as needed: To enter your username, place your cursor in the Sign in box and click on the username below. To enter your password, place your cursor in the Enter password box and click on the password below. Azure Username: [email protected] Azure Password:...

June 11, 2022 No Comments READ MORE +