Which authentication method should you instruct the developers to use?

You have a hybrid configuration of Azure Active Directory (Azure AD). All users have computers that run Windows 10 and are hybrid Azure AD joined. You have an Azure SQL database that is configured to support Azure AD authentication. Database developers must connect to the SQL database by using Microsoft...

November 2, 2020 No Comments READ MORE +

Which three actions should you recommend be performed in sequence?

DRAG DROP You need to configure SQLDB1 to meet the data and application requirements. Which three actions should you recommend be performed in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. View AnswerAnswer: Explanation: From...

November 2, 2020 No Comments READ MORE +

Which authentication method should you include in the recommendation?

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. You plan to deploy Azure AD Connect and to integrate Active Directory and the Azure...

November 1, 2020 No Comments READ MORE +

You have an Azure subscription named Sub1. Sub1 contains a virtual network named VNet1 that contains one subnet named Subnet1.

You have an Azure subscription named Sub1. Sub1 contains a virtual network named VNet1 that contains one subnet named Subnet1. You create a service endpoint for Subnet1. Subnet1 contains an Azure virtual machine named VM1 that runs Ubuntu Server 18.04. You need to deploy Docker containers to VM1. The containers...

November 1, 2020 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

November 1, 2020 No Comments READ MORE +

You are evaluating the effect of the application security groups on the network communication between the virtual machines in Sub2

HOTSPOT You are evaluating the effect of the application security groups on the network communication between the virtual machines in Sub2. For each of the following statements, select Yes if the statement is true. Otherwise, select No . NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box...

October 31, 2020 No Comments READ MORE +

What should you do first?

You need to meet the technical requirements for VNetwork1. What should you do first?A . Create a new subnet on VNetwork1.B . Remove the NSGs from Subnet11 and Subnet13.C . Associate an NSG to Subnet12.D . Configure DDoS protection for VNetwork1.View AnswerAnswer: A Explanation: From scenario: Deploy Azure Firewall to...

October 31, 2020 No Comments READ MORE +

How should you complete the policy?

HOTSPOT You have an Azure subscription. The subscription contains Azure virtual machines that run Windows Server 2016. You need to implement a policy to ensure that each virtual machine has a custom antimalware virtual machine extension installed. How should you complete the policy? To answer, select the appropriate options in...

October 31, 2020 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

October 31, 2020 No Comments READ MORE +

Which three actions should you perform in sequence?

DRAG DROP You have an Azure subscription named Sub1 that contains an Azure Storage account named Contosostorage1 and an Azure key vault named Contosokeyvault1. You plan to create an Azure Automation runbook that will rotate the keys of Contosostorage1 and store them in Contosokeyvault1. You need to implement prerequisites to...

October 30, 2020 No Comments READ MORE +