What should you do?
You migrate WebApp1 to Azure. You need to configure the AKS cluster to enable WebApp1 to access KV1. The solution must meet the authentication and authorization requirements. What should you do?A . Configure Azure role-based access control (Azure R8AQ for Kubernetes Authorization.B . Configure a pod-managed identity.C . Implement pod...
What should you recommend?
DRAG DROP You are designing a solution to secure a company’s Azure resources. The environment hosts 10 teams. Each team manages a project and has a project manager, a virtual machine (VM) operator, developers, and contractors. Project managers must be able to manage everything except access and authentication for users....
What should you install first?
Topic 2, Litware inc. Case Study This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to...
What should you recommend?
You need to recommend an identify solution that meets the technical requirements. What should you recommend?A . federated single-on (SSO) and Active Directory Federation Services (AD FS)B . password hash synchronization and single sign-on (SSO)C . cloud-only user accountsD . Pass-through Authentication and single sign-on (SSO)View AnswerAnswer: D Explanation: Active...
From which blade can you view the template that was used for the deployment?
You have an Azure subscription named Subscription1 that is used by several departments at your company. Subscription1 contains the resources in the following table. Another administrator deploys a virtual machine named VM1 and an Azure Storage account named Storage2 by using a single Azure Resource Manager template. You need to...
Which additional resources should you provision?
You have an Azure virtual network that contains a subnet named Subnet1. Subnet1 contains 50 virtual machines. Twenty-five of the virtual machines are web servers and the other 25 are application servers. You need to filter traffic the web servers and the application servers by using application security groups. Which...
You need to identify the storage requirements for Contoso
HOTSPOT You need to identify the storage requirements for Contoso. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: Yes Contoso is moving the existing product blueprint files to Azure...
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
Does this meet the goal?
Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer...
Does this meet the goal?
Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer...