Which type of security tool should you recommend for each stage of the development process?
DRAG DROP You need to increase the security of your team’s development process. Which type of security tool should you recommend for each stage of the development process? To answer, drag the appropriate security tools to the correct stages. Each security tool may be used once, more than once, or...
What should you do?
Your company uses Azure DevOps. Only users who have accounts in Azure Active Directory can access the Azure DevOps environment. You need to ensure that only devices that are connected to the on-premises network can access the Azure DevOps environment. What should you do?A . Assign the Stakeholder access level...
What should you recommend?
During a code review, you discover quality issues in a Java application. You need to recommend a solution to detect quality issues including unused variables and empty catch blocks. What should you recommend?A . In a Maven build task, select Run PMC . In an Xcode build task, select Use...
Which secret permissions should you use?
You create a Microsoft ASP.NET Core application. You plan to use Azure Key Vault to provide secrets to the application as configuration data. You need to create a Key Vault access policy to assign secret permissions to the application. The solution must use the principle of least privilege. Which secret...
What should you recommend?
Your company has a project in Azure DevOps for a new web application. The company identifies security as one of the highest priorities. You need to recommend a solution to minimize the likelihood that infrastructure credentials will be leaked. What should you recommend?A . Add a Run Inline Azure PowerShell...
You need to ensure that an Azure web app named az400-9940427-main can retrieve secrets from an Azure key vault named az400-9940427-kv1 by using a system managed identity. The solution must use the principle of least privilege
SIMULATION You need to ensure that an Azure web app named az400-9940427-main can retrieve secrets from an Azure key vault named az400-9940427-kv1 by using a system managed identity. The solution must use the principle of least privilege. To complete this task, sign in to the Microsoft Azure portal.View AnswerAnswer:
You need to ensure that an Azure web app named az400-9940427-main can retrieve secrets from an Azure key vault named az400-9940427-kv1 by using a system managed identity. The solution must use the principle of least privilege
SIMULATION You need to ensure that an Azure web app named az400-9940427-main can retrieve secrets from an Azure key vault named az400-9940427-kv1 by using a system managed identity. The solution must use the principle of least privilege. To complete this task, sign in to the Microsoft Azure portal.View AnswerAnswer:
What should you do?
Your company builds a multi-tier web application. You use Azure DevOps and host the production application on Azure virtual machines. Your team prepares an Azure Resource Manager template of the virtual machine that you will use to test new features. You need to create a staging environment in Azure that...
Which build agent pool should you use to compile each application type?
DRAG DROP You are configuring Azure DevOps build pipelines. You plan to use hosted build agents. Which build agent pool should you use to compile each application type? To answer, drag the appropriate build agent pools to the correct application types. Each build agent pool may be used once, more...
Which role memberships are required for the Azure DevOps organization and the project?
DRAG DROP You need to configure access to Azure DevOps agent pools to meet the following requirements: - Use a project agent pool when authoring build or release pipelines. - View the agent pool and agents of the organization. - Use the principle of least privilege. Which role memberships are...