What should you do?

Topic 1, Litware, inc This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that...

April 11, 2023 No Comments READ MORE +

Which key vault can you use to store the encryption key?

You plan to configure Azure Disk Encryption for VM4. Which key vault can you use to store the encryption key?A . KeyVault1 B. KeyVault3 C. KeyVault2View AnswerAnswer: A Explanation: The key vault needs to be in the same subscription and same region as the VM. VM4 is in West US....

April 11, 2023 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

April 11, 2023 No Comments READ MORE +

Which key vaults can you use?

You need to encrypt storage1 to meet the technical requirements. Which key vaults can you use?A . KeyVault1 only B. KeyVault2 and KeyVault3 only C. KeyVault1 and KeyVault3 only D. KeyVault1 KeyVault2 and KeyVault3View AnswerAnswer: B Explanation: The storage account and the key vault must be in the same region...

April 11, 2023 No Comments READ MORE +

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Note: Each correct selection is worth one point

HOTSPOT You create an alert rule that has the following settings: ✑ Resource: RG1 ✑ Condition: All Administrative operations ✑ Actions: Action groups configured for this alert rule: ActionGroup1 ✑ Alert rule name: Alert1 You create an action rule that has the following settings: ✑ Scope: VM1 ✑ Filter criteria:...

April 11, 2023 No Comments READ MORE +

You are evaluating the effect of the application security groups on the network communication between the virtual machines in Sub2

HOTSPOT You are evaluating the effect of the application security groups on the network communication between the virtual machines in Sub2. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1:...

April 10, 2023 No Comments READ MORE +

What should you create first?

You have an Azure web app named webapp1. You need to configure continuous deployment for webapp1 by using an Azure Repo. What should you create first?A . an Azure Application Insights service B. an Azure DevOps organization C. an Azure Storage account D. an Azure DevTest Labs labView AnswerAnswer: B...

April 10, 2023 No Comments READ MORE +

What should you create?

You are configuring an Azure Kubernetes Service (AKS) cluster that will connect to an Azure Container Registry. You need to use the auto-generated service principal to authenticate to the Azure Container Registry. What should you create?A . an Azure Active Directory (Azure AD) group B. an Azure Active Directory (Azure...

April 10, 2023 No Comments READ MORE +

What should you do?

You need to ensure that users can access VM0. The solution must meet the platform protection requirements. What should you do?A . Move VM0 to Subnet1. B. On Firewall, configure a network traffic filtering rule. C. Assign RT1 to AzureFirewallSubnet. D. On Firewall, configure a DNAT rule.View AnswerAnswer: D Explanation:...

April 10, 2023 No Comments READ MORE +

Which three actions should you perform in sequence?

DRAG DROP You create an Azure subscription with Azure AD Premium P2. You need to ensure that you can use Azure Active Directory (Azure AD) Privileged Identity Management (PIM) to secure Azure roles. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list...

April 10, 2023 No Comments READ MORE +