Which authentication method should you include in the recommendation?

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. You plan to deploy Azure AD Connect and to integrate Active Directory and the Azure...

March 19, 2024 No Comments READ MORE +

Which four actions should you perform in sequence?

DRAG DROP You need to deploy AKS1 to meet the platform protection requirements. Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. NOTE: More than one order of answer...

March 19, 2024 No Comments READ MORE +

You have a hybrid configuration of Azure Active Directory (Azure AD).

You have a hybrid configuration of Azure Active Directory (Azure AD). All users have computers that run Windows 10 and are hybrid Azure AD joined. You have an Azure SQL database that is configured to support Azure AD authentication. Database developers must connect to the SQL database by using Microsoft...

March 19, 2024 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

March 19, 2024 No Comments READ MORE +

Which three actions should you perform in sequence?

DRAG DROP You need to configure an access review. The review will be assigned to a new collection of reviews and reviewed by resource owners. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange...

March 19, 2024 No Comments READ MORE +

You are evaluating the effect of the application security groups on the network communication between the virtual machines in Sub2

HOTSPOT You are evaluating the effect of the application security groups on the network communication between the virtual machines in Sub2. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1:...

March 19, 2024 No Comments READ MORE +

Which virtual machines will be supported?

You plan to implement JIT VM access. Which virtual machines will be supported?A . VM1 and VM3 onlyB . VM1. VM2. VM3, and VM4C . VM2, VM3, and VM4 onlyD . VM1 onlyView AnswerAnswer: A

March 18, 2024 No Comments READ MORE +

What should you do?

Topic 1, Litware, inc This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that...

March 18, 2024 No Comments READ MORE +

Solution: You create a policy initiative and assignments that are scoped to resource groups. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

March 18, 2024 No Comments READ MORE +

How should you complete the role definition of Role1?

HOTSPOT You need to create Role1 to meet the platform protection requirements. How should you complete the role definition of Role1? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: 1) Microsoft.Compute/ 2) disks 3) /subscrption/{subscriptionId}/resourceGroups/{Resource Group Id}...

March 17, 2024 No Comments READ MORE +