Which three steps should you perform in sequence?
DRAG DROP
You have a solution deployed into a virtual network in Azure named fabVNet. The fabVNet virtual network
has three subnets named Apps, Web, and DB that are configured as shown in the exhibit. (Click the
Exhibits button.)
You want to deploy two new VMs to the DB subnet.You need to modify the virtual network to expand the size of the DB subnet to allow more IP addresses.
Which three steps should you perform in sequence? To answer, move the appropriate actions from the list
of actions to the answer area and arrange them in the correct order.
What are two possible ways to achieve this goal?
Your company has recently signed up for Azure.
You plan to register a Data Protection Manager (DPM) server with the Azure Backup service.
You need to recommend a method for registering the DPM server with the Azure Backup vault.
What are two possible ways to achieve this goal? Each correct answer presents a complete solution.
Which log entry should you use to verify access?
You administer an Azure Storage account named contosostorage. The account has a blob container to
store image files.
A user reports being unable to access an image file.
You need to ensure that anonymous users can successfully read image files from the container.
Which log entry should you use to verify access?
identify the storage redundancy type that must be used.
HOTSPOT
You manage an Azure subscription.
You develop a storage plan with the following requirements:
Database backup files that are generated once per year are retained for ten years.
High performance system telemetry logs are created constantly and processed
for analysis every month.In the table below, identify the storage redundancy type that must be used. Make only one selection in
each column.
You need to reduce the costs associated with storing the logs
You administer an Azure Storage account with a blob container. You enable Storage account logging for
read, write and delete requests.
You need to reduce the costs associated with storing the logs.
What should you do?
You need to give anonymous users read access to all of the video files in the storage container
Your company is launching a public website that allows users to stream videos.
You upload multiple video files to an Azure storage container.
You need to give anonymous users read access to all of the video files in the storage container.
What should you do?
identify the access method that should be used for the anonymous and authenticated…
HOTSPOT
You manage a public-facing web application which allows authenticated users to upload and download
large files. On the initial public page there is a promotional video.
You plan to give users access to the site content and promotional video.In the table below, identify the access method that should be used for the anonymous and authenticated
parts of the application. Make only one selection in each column.
You have an Azure SQL Database named Contosodb.
HOTSPOT
You have an Azure SQL Database named Contosodb. Contosodb is running in the Standard/S2 tier and has
a service level objective of 99 percent.
You review the service tiers in Microsoft Azure SQL Database as well as the results of running performance
queries for the usage of the database for the past week as shown in the exhibits. (Click the Exhibits
button.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Which two actions should you perform?
Your company plans to migrate from On-Premises Exchange to Exchange Online in Office 365.
You plan to integrate your existing Active Directory Domain Services (AD DS) infrastructure with Azure AD.
You need to ensure that users can log in by using their existing AD DS accounts and passwords. You need
to achieve this goal by using minimal additional systems.
Which two actions should you perform? Each answer presents part of the solution.
identify the permission that must be granted to the application.
HOTSPOT
You administer an Azure Active Directory (Azure AD) tenant.
You add a custom application to the tenant.
The application must be able to:
Read data from the tenant directly.
Write data to the tenant on behalf of a user.
In the table below, identify the permission that must be granted to the application. Make only one
selection in each column.











