What should you use?

You have Azure Resource Manager templates that you use to deploy Azure virtual machines. You need to disable unused Windows features automatically as instances of the virtual machines are provisioned. What should you use?A . device compliance policies in Microsoft IntuneB . Azure Automation State ConfigurationC . application security groupsD...

November 18, 2023 No Comments READ MORE +

Which three actions should you perform in sequence?

DRAG DROP You need to configure an access review. The review will be assigned to a new collection of reviews and reviewed by resource owners. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange...

November 18, 2023 No Comments READ MORE +

In which key vaults can you store the encryption key for VM1?

You have an Azure subscription named Sub1 that contains the Azure key vaults shown in the following table. In Sub1, you create a virtual machine that has the following configurations: • Name:VM1 • Size: DS2v2 • Resource group: RG1 • Region: West Europe • Operating system: Windows Server 2016 You...

November 18, 2023 No Comments READ MORE +

You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table

HOTSPOT You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table. Azure AD Privileged Identity Management (PIM) is enabled for the tenant. In PIM, the Password Administrator role has the following settings: ✑ Maximum activation duration (hours): 2 ✑ Send...

November 18, 2023 No Comments READ MORE +

What should you do first?

From Azure Security Center, you need to deploy SecPol1. What should you do first?A . Enable Azure Defender.B . Create an Azure Management group.C . Create an initiative.D . Configure continuous export.View AnswerAnswer: C Explanation: Reference: https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/security-center/custom-security-policies.md https://zimmergren.net/create-custom-security-center-recommendation-with-azure-policy/

November 17, 2023 No Comments READ MORE +

Which virtual machines will be supported?

You plan to implement JIT VM access. Which virtual machines will be supported?A . VM1 and VM3 onlyB . VM1. VM2. VM3, and VM4C . VM2, VM3, and VM4 onlyD . VM1 onlyView AnswerAnswer: A

November 17, 2023 No Comments READ MORE +

You have an Azure Active Directory (Azure AD) tenant named contoso.com

HOTSPOT You have an Azure Active Directory (Azure AD) tenant named contoso.com. The tenant contains the users shown in the following table. You configure an access review named Review1 as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on...

November 17, 2023 No Comments READ MORE +

Your company has two offices in Seattle and New York. Each office connects to the Internet by using a NAT device

HOTSPOT Your company has two offices in Seattle and New York. Each office connects to the Internet by using a NAT device. The offices use the IP addresses shown in the following table. The company has an Azure Active Directory (Azure AD) tenant named contoso.com. The tenant contains the users...

November 17, 2023 No Comments READ MORE +

What should you do?

You have an Azure subscription that contains an Azure key vault named Vault1. In Vault1, you create a secret named Secret1. An application developer registers an application in Azure Active Directory (Azure AD). You need to ensure that the application can use Secret1. What should you do?A . In Azure...

November 17, 2023 No Comments READ MORE +

What should you do first?

Topic 2, Contoso This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you...

November 17, 2023 No Comments READ MORE +