Which two actions should you perform?
You plan to use Password Sync on your DirSync Server with Azure Active Directory (Azure AD) on your company network. You configure the DirSync server and complete an initial synchronization of the users. Several remote users are unable to log in to Office 365. You discover multiple event log entries...
Which log entry should you use to verify access?
You administer an Azure Storage account named contosostorage. The account has a blob container to store image files. A user reports being unable to access an image file. You need to ensure that anonymous users can successfully read image files from the container. Which log entry should you use to...
What should you use?
You plan implement shared storage policies. You need to apply a policy to the appropriate resource. What should you use?A . QueuesB . Resource groupC . Azure SQL DatabaseD . Recovery Services VaultView AnswerAnswer: B
What should you do?
You manage a cloud service that utilizes an Azure Service Bus queue. You need to ensure that messages that are never consumed are retained. What should you do?A . Check the MOVE TO THE DEAD-LETTER SUBQUEUE option for Expired Messages in the Azure Portal.B . From the Azure Management Portal,...
Which two actions should you perform?
Your company plans to migrate from On-Premises Exchange to Exchange Online in Office 365. You plan to integrate your existing Active Directory Domain Services (AD DS) infrastructure with Azure AD. You need to ensure that users can log in by using their existing AD DS accounts and passwords. You need...
What are two possible ways to achieve this goal?
You manage a cloud service that hosts a customer-facing application. The application allows users to upload images and create collages. The cloud service is running in two medium instances and utilizes Azure Queue storage for image processing. The storage account is configured to be locally redundant. The sales department plans...
Which of the following virtualization characteristics allows the use of different types of physical types or physical servers?
Which of the following virtualization characteristics allows the use of different types of physical types or physical servers?A . SecurityB . Hardware independenceC . ScalabilityD . Variable costsView AnswerAnswer: B Explanation: Virtualization is a conversion process that translates unique IT hardware into emulated and standardized software-based copies. Through hardware independence,...
Which URL should you use to access the list?
You administer an Azure Storage account named contosostorage. The account has queue containers with logging enabled. You need to view all log files generated during the month of July 2014. Which URL should you use to access the list?A . http://contosostorage.queue.core.windows.net/$logs? restype=container&comp=list&prefix=queue/2014/07B . http://contosostorage.queue.core.windows.net/$files? restype=container&comp=list&prefix=queue/2014/07C . http://contosostorage.blob.core.windows.net/$files? restype=container&comp=list&prefix=blob/2014/07D . http://contosostorage.blob.core.windows.net/$logs?...
What should you do?
You administer an Azure Active Directory (Azure AD) tenant that hosts a Software as a Service (SaaS) application named MyApp. You control access to MyApp by using the following two Azure AD groups: • a group named SaaSApp that contains 200 users • a group named AdminSaaS that contains 20...
Which permission type should you use for each app?
DRAG DROP You plan to integrate Azure Active Directory (Azure AD) with the following custom applications: You need to configure the web API permissions for the apps. Which permission type should you use for each app? View AnswerAnswer: Explanation: