Which authentication method should you include in the recommendation?

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. You plan to deploy Azure AD Connect and to integrate Active Directory and the Azure...

July 31, 2020 No Comments READ MORE +

You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following table

HOTSPOT You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following table. The tenant contains the named locations shown in the following table. You create the conditional access policies for a cloud app named App1 as shown in the following table. For each...

July 31, 2020 No Comments READ MORE +

Which two actions should you perform?

You have an Azure subscription. You create an Azure web app named Contoso1812 that uses an S1 App Service plan. You plan to create a CNAME DNS record for www.contoso.com that points to Contoso1812. You need to ensure that users can access Contoso1812 by using the https://www.contoso.com URL. Which two...

July 31, 2020 No Comments READ MORE +

You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table

HOTSPOT You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table. Azure AD Privileged Identity Management (PIM) is enabled for the tenant. In PIM, the Password Administrator role has the following settings: - Maximum activation duration (hours): 2 - Send...

July 31, 2020 No Comments READ MORE +

You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table

HOTSPOT You create and enforce an Azure AD Identity Protection user risk policy that has the following settings: - Assignment: Include Group1, Exclude Group2 - Conditions: Sign-in risk of Medium and above - Access: Allow access, Require password change You have an Azure Active Directory (Azure AD) tenant named contoso.com...

July 30, 2020 No Comments READ MORE +

What should you do?

You need to ensure that users can access VM0. The solution must meet the platform protection requirements. What should you do?A . Move VM0 to Subnet1.B . On Firewall, configure a network traffic filtering rule.C . Assign RT1 to AzureFirewallSubnet.D . On Firewall, configure a DNAT rule.View AnswerAnswer: A Explanation:...

July 30, 2020 No Comments READ MORE +

What should you do first?

Testlet 2 Case Study This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that...

July 30, 2020 No Comments READ MORE +

What should you do?

Testlet 1 This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are...

July 30, 2020 No Comments READ MORE +

What should you use to construct the resource ID?

You plan to use Azure Resource Manager templates to perform multiple deployments of identically configured Azure virtual machines. The password for the administrator account of each deployment is stored as a secret in different Azure key vaults. You need to identify a method to dynamically construct a resource ID that...

July 29, 2020 No Comments READ MORE +

Does this meet the goal?

Question Set 3 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct...

July 29, 2020 No Comments READ MORE +