Which virtual networks in Sub1 can User2 modify and delete in their current state?

HOTSPOT Which virtual networks in Sub1 can User2 modify and delete in their current state? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: VNET4 and VNET1 only RG1 has only Delete lock, while there are...

August 23, 2024No CommentsREAD MORE +

Your company has two offices in Seattle and New York. Each office connects to the Internet by using a NAT device

HOTSPOT Your company has two offices in Seattle and New York. Each office connects to the Internet by using a NAT device. The offices use the IP addresses shown in the following table. The company has an Azure Active Directory (Azure AD) tenant named contoso.com. The tenant contains the users...

August 23, 2024No CommentsREAD MORE +

You are evaluating the effect of the application security groups on the network communication between the virtual machines in Sub2

HOTSPOT You are evaluating the effect of the application security groups on the network communication between the virtual machines in Sub2. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1:...

August 23, 2024No CommentsREAD MORE +

What should you do?

You need to ensure that users can access VM0. The solution must meet the platform protection requirements. What should you do?A . Move VM0 to Subnet1.B . On Firewall, configure a network traffic filtering rule.C . Assign RT1 to AzureFirewallSubnet.D . On Firewall, configure a DNAT rule.View AnswerAnswer: D Explanation:...

August 23, 2024No CommentsREAD MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

August 22, 2024No CommentsREAD MORE +

In which NSGs can you use ASG1. and the network interfaces of which virtual machines can you assign to ASG2?

HOTSPOT You implement the planned changes for ASG1 and ASG2. In which NSGs can you use ASG1. and the network interfaces of which virtual machines can you assign to ASG2? View AnswerAnswer:

August 22, 2024No CommentsREAD MORE +

Which tools should you use?

Topic 3, Fabrikam inc This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that...

August 22, 2024No CommentsREAD MORE +

Which level should you identify for each risk event?

DRAG DROP You are implementing conditional access policies. You must evaluate the existing Azure Active Directory (Azure AD) risk events and risk levels to configure and implement the policies. You need to identify the risk level of the following risk events: - Users with leaked credentials - Impossible travel to...

August 20, 2024No CommentsREAD MORE +

To which subnet should you associate each route table?

DRAG DROP You have an Azure subscription that contains the virtual networks shown in the following table. The Azure virtual machines on SpokeVNetSubnet0 can communicate with the computers on the on-premises network. You plan to deploy an Azure firewall to HubVNet. You create the following two routing tables: ✑ RT1:...

August 19, 2024No CommentsREAD MORE +

Which users can perform each task?

HOTSPOT You need to delegate the creation of RG2 and the management of permissions for RG1. Which users can perform each task? To answer select the appropriate options in the answer area. NOTE: Each correct selection is worth one point View AnswerAnswer: Explanation: Box 1: Admin3 only The Contributor role...

August 18, 2024No CommentsREAD MORE +