What should you do?
From Azure Security, you create a custom alert rule. You need to configure which users will receive an email message when the alert is triggered. What should you do?A . From Azure Monitor, create an action group. B. From Security Center, modify the Security policy settings of the Azure subscription....
How should you configure the query?
HOTSPOT You suspect that users are attempting to sign in to resources to which they have no access. You need to create an Azure Log Analytics query to identify failed user sign-in attempts from the last three days. The results must only show users who had more than five failed...
Which key vault settings should you configure?
You have an Azure subscription that contains a virtual machine named VM1. You create an Azure key vault that has the following configurations: - Name: Vault5 - Region: West US - Resource group: RG1 You need to use Vault5 to enable Azure Disk Encryption on VM1. The solution must support...
Which virtual networks in Sub1 can User2 modify and delete in their current state?
HOTSPOT Which virtual networks in Sub1 can User2 modify and delete in their current state? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: VNET4 and VNET1 only RG1 has only Delete lock, while there are...
How many NSGs and network security rules should you create?
HOTSPOT You have an Azure subscription named Sub1. You create a virtual network that contains one subnet. On the subnet, you provision the virtual machines shown in the following table. Currently, you have not provisioned any network security groups (NSGs). You need to implement network security to meet the following...
What should you use?
You have Azure Resource Manager templates that you use to deploy Azure virtual machines. You need to disable unused Windows features automatically as instances of the virtual machines are provisioned. What should you use?A . security policies in Azure Security Center B. Azure Logic Apps C. an Azure Desired State...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table
HOTSPOT You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table. You create and enforce an Azure AD Identity Protection user risk policy that has the following settings: - Assignment: Include Group1, Exclude Group2 - Conditions: Sign-in risk of Medium...
What should you configure?
You are configuring and securing a network environment. You deploy an Azure virtual machine named VM1 that is configured to analyze network traffic. You need to ensure that all network traffic is routed through VM1. What should you configure?A . a system route B. a network security group (NSG) C....
Which key vaults can you use?
Topic 3, Fabrikam inc This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that...