What should you use?
Your network contains an on-premises Active Directory domain named corp.contoso.com. You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. You sync all on-premises identities to Azure AD. You need to prevent users who have a givenName attribute that starts...
Which four actions should you perform in sequence?
DRAG DROP You need to deploy AKS1 to meet the platform protection requirements. Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. NOTE: More than one order of answer...
Which users can perform each task?
HOTSPOT You need to delegate the creation of RG2 and the management of permissions for RG1. Which users can perform each task? To answer select the appropriate options in the answer area. NOTE: Each correct selection is worth one point View AnswerAnswer: Explanation: Box 1: Admin3 only The Contributor role...
What should you use in Azure Monitor?
DRAG DROP You have an Azure subscription that contains 100 virtual machines. Azure Diagnostics is enabled on all the virtual machines. You are planning the monitoring of Azure services in the subscription. You need to retrieve the following details: - Identify the user who deleted a virtual machine three weeks...
What should you use?
You have Azure Resource Manager templates that you use to deploy Azure virtual machines. You need to disable unused Windows features automatically as instances of the virtual machines are provisioned. What should you use?A . device compliance policies in Microsoft IntuneB . Azure Automation State ConfigurationC . application security groupsD...
Which effect requires a managed identity for the assignment?
From the Azure portal, you are configuring an Azure policy. You plan to assign policies that use the DeployIfNotExist, AuditIfNotExist, Append, and Deny effects. Which effect requires a managed identity for the assignment?A . AuditIfNotExistB . AppendC . DeployIfNotExistD . DenyView AnswerAnswer: C Explanation: When Azure Policy runs the template...
How should you configure the query?
HOTSPOT You suspect that users are attempting to sign in to resources to which they have no access. You need to create an Azure Log Analytics query to identify failed user sign-in attempts from the last three days. The results must only show users who had more than five failed...
In which resource groups can User8 create virtual networks and NSGs?
HOTSPOT You assign User8 the Owner role for RG4, RG5, and RG6. In which resource groups can User8 create virtual networks and NSGs? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Box1: RG6 only as there is not...
What should you do?
You need to ensure that users can access VM0. The solution must meet the platform protection requirements. What should you do?A . Move VM0 to Subnet1.B . On Firewall, configure a network traffic filtering rule.C . Assign RT1 to AzureFirewallSubnet.D . On Firewall, configure a DNAT rule.View AnswerAnswer: D Explanation:...
What should you use to assign access to each user?
HOTSPOT You have an Azure key vault. You need to delegate administrative access to the key vault to meet the following requirements: - Provide a user named User1 with the ability to set advanced access policies for the key vault. - Provide a user named User2 with the ability to...