When you are implementing a software as a service (SaaS) solution, you are responsible for configuring high av
When you are implementing a software as a service (SaaS) solution, you are responsible for configuring high availability. Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice that makes the statement correct. A. No change is needed. B. defining […]
You have an Azure subscription named Sub1 that contains an Azure Log Analytics workspace named LAW1.
You have an Azure subscription named Sub1 that contains an Azure Log Analytics workspace named LAW1. You have 100 on-premises servers that run Windows Server 2012 R2 and Windows Server 2016. The servers connect to LAW1. LAW1 is configured to collect security-related performance counters from the connected servers. You need to configure alerts based on […]
Which two actions should you perform? Each correct answer presents part of the solution.
You create a new Azure subscription. You need to ensure that you can create custom alert rules in Azure Security Center. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. Onboard Azure Active Directory (Azure AD) Identity Protection. B. Create an […]
What should you use to modify Play1?
You have an Azure subscription named Sub1. In Azure Security Center, you have a security playbook named Play1. Play1 is configured to send an email message to a user named User1. You need to modify Play1 to send email messages to a distribution group named Alerts. What should you use to modify Play1? A. Azure […]
You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant na
You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. You are assigned the Global administrator role for the tenant. You are responsible for managing Azure Security Center settings. You need to create a custom sensitivity label. What should you do first? A. Create a […]
Litware must be able to customize the operating system security configurations in Azure Security Center.
Litware must be able to customize the operating system security configurations in Azure Security Center. You need to ensure that you can meet the security operations requirements. What should you do first? A. Turn on Auto Provisioning in Security Center. B. Integrate Security Center and Microsoft Cloud App Security. C. Upgrade the pricing tier of […]
You plan to deploy the cluster to production. You disable HTTP application routing.
You are testing an Azure Kubernetes Service (AKS) cluster. The cluster is configured as shown in the exhibit. (Click the Exhibit tab.) You plan to deploy the cluster to production. You disable HTTP application routing. You need to implement application routing that will provide reverse proxy and TLS termination for AKS services by using a […]
You have an Azure virtual machines shown in the following table
You create an Azure Log Analytics workspace named Analytics1 in RG1 in the East US region. Which virtual machines can be enrolled in Analytics1? A. VM1 only B. VM1, VM2, and VM3 only C. VM1, VM2, VM3, and VM4 D. VM1 and VM4 only Explanation: Note: Create a workspace 1. In the Azure portal, click […]
You are configuring an Azure Kubernetes Service (AKS) cluster that will connect to an Azure Container Registry
You are configuring an Azure Kubernetes Service (AKS) cluster that will connect to an Azure Container Registry. You need to use the auto-generated service principal to authenticate to the Azure Container Registry. What should you create? A. an Azure Active Directory (Azure AD) group B. an Azure Active Directory (Azure AD) role assignment C. an […]
You have Azure Resource Manager templates that you use to deploy Azure virtual machines.
You have Azure Resource Manager templates that you use to deploy Azure virtual machines. You need to disable unused Windows features automatically as instances of the virtual machines are provisioned. What should you use? A. device compliance policies in Microsoft Intune B. Azure Automation State Configuration C. application security groups D. Azure Advisor Explanation: You […]