1) Which of the following is the role you should assign to the user? a) A. The Global administrator role. b) B. The Security administrator role. c) C. The Password administrator role. d) D. The Compliance administrator role. 2) Does the solution meet the goal? a) A. Yes b) B. No 3) Does the solution meet the goal? a) A. Yes b) B. No 4) Does the solution meet the goal? a) A. Yes b) B. No 5) Which of the following actions should you take? a) A. You should make use of the Synchronization Rules Editor to create an attribute-based filtering rule. b) B. You should configure a DNAT rule on the Firewall. c) C. B. You should configure a network traffic filtering rule on the Firewall. 6) Which of the following is the risk level that should be configured for users that have leaked credentials? a) A. None b) B. Low c) C. Medium d) D. High 7) Which of the following is the risk level that should be configured for sign-ins that originate from IP addresses with dubious activity? a) A. None b) B. Low c) C. Medium d) D. High 8) Which of the following should you set Reviewers to? a) A. Selected users. b) B. Members (Self). c) C. Group Owners. d) D. Anyone. 9) Which of the following actions should you take FIRST? a) A. You should sign up for Azure Active Directory (Azure AD) Privileged Identity Management (PIM) for Azure AD roles. b) B. You should consent to Azure Active Directory (Azure AD) Privileged Identity Management (PIM). c) C. You should discover privileged roles. d) D. You should discover resources. 10) Select “No adjustment required” if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option. a) A. No adjustment is required b) B. Azure Blueprints c) C. Conditional access policies d) D. Azure DevOps 11) Which of the following is the role you should assign? a) A. Owner b) B. Contributor c) C. AcrPush 12) Which of the following is the role you should assign? a) A. Reader b) B. Contributor c) C. AcrDelete d) D. AcrPull 13) Does the solution meet the goal? a) A. Yes b) B. No 14) Does the solution meet the goal? a) A. Yes b) B. No 15) Does the solution meet the goal? a) A. Yes b) B. No 16) Which of the following actions should you take? a) A. You should make use of Azure DevOps. b) B. You should make use of Azure Automation State Configuration. c) C. You should make use of network security groups (NSG). d) D. You should make use of Azure Blueprints. 17) Which of the following is an effect that must be included in your code? a) A. Disabled b) B. Modify c) C. AuditIfNotExists d) D. DeployIfNotExists 18) Does the solution meet the goal? a) A. Yes b) B. No 19) Which of the following options should you use to achieve your goal? a) A. Azure Information Protection b) B. RBAC c) C. Azure AD Privileged Identity Management (PIM) d) D. Azure DevOps 20) Which of the following options should you use to achieve your goal? a) A. A key vault access policy b) B. Azure policy c) C. Azure AD Privileged Identity Management (PIM) d) D. Azure DevOps 21) Which of the following is TRUE with regards to Azure Disk Encryption for a Windows VM? a) A. It is supported for basic tier VMs. b) B. It is supported for standard tier VMs. c) C. It is supported for VMs configured with software-based RAID systems. d) D. It is supported for VMs configured with Storage Spaces Direct (S2D). 22) Which of the following is TRUE with regards to Azure Disk Encryption for a Linux VM? a) A. It is NOT supported for basic tier VMs. b) B. It is NOT supported for standard tier VMs. c) C. OS drive encryption for Linux virtual machine scale sets is supported. d) D. Custom image encryption is supported. 23) Select “No adjustment required” if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option. a) A. No adjustment required. b) B. a network security group c) C. an application security group d) D. an Azure Basic Load Balancer 24) Which of the following should be included in the template? (Choose all that apply.) a) A. WorkspaceID b) B. AzureADApplicationID c) C. WorkspaceKey d) D. StorageAccountKey 25) Does the solution meet the goal? a) A. Yes b) B. No 26) Does the solution meet the goal? a) A. Yes b) B. No 27) Which of the following should be included in your query? a) A. The EventID and CountIf() parameters. b) B. The ActivityID and CountIf() parameters. c) C. The EventID and Count() parameters. d) D. The ActivityID and Count() parameters. 28) Which of the following is the action you should take? a) A. You should make sure that Azure Active Directory (Azure AD) Identity Protection is removed. b) B. You should create a DLP policy. c) C. You should create an Azure Log Analytics workspace. d) D. You should make sure that Security Center has the necessary tier configured. 29) Which of the following is the option you should use? a) A. You should make use of the Activity log signal type. b) B. You should make use of the Application Log signal type. c) C. You should make use of the Metric signal type. d) D. You should make use of the Audit Log signal type. 30) Which of the following options should you use? a) A. Application Log b) B. Metrics c) C. Activity Log d) D. Logs 31) Which of the following options should you use? a) A. Application Log b) B. Metrics c) C. Activity Log d) D. Logs 32) Which of the following is the pricing tier required? a) A. Advanced b) B. Premium c) C. Standard d) D. Free 33) Does the solution meet the goal? a) A. Yes b) B. No 34) Does the solution meet the goal? a) A. Yes b) B. No 35) Select “No adjustment required” if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option. a) A. No adjustment is required b) B. a secret c) C. a login hint d) D. a client ID 36) Which of the following is the effect in question? a) A. AuditIfNotExist b) B. Disabled c) C. DeployIfNotExist d) D. EnforceOPAConstraint 37) Which two of the following parameters must be used in conjunction to meet the requirement? (Choose two.) a) A. EnabledForDeployment b) B. EnablePurgeProtection c) C. EnabledForTemplateDeployment d) D. EnableSoftDelete 38) Which of the following is the authentication method the developers should use? a) A. Azure AD token. b) B. Azure Multi-Factor authentication. c) C. Active Directory integrated authentication. d) D. Active Directory integrated authentication. 39) Which of the following will happen when a faulty SQL statement is generated in the database by an application? a) A. A Potential SQL injection alert is triggered. b) B. A Vulnerability to SQL injection alert is triggered. c) C. An Access from a potentially harmful application alert is triggered. d) D. A Brute force SQL credentials alert is triggered. 40) Which of the following is TRUE with regard to branch policies? (Choose all that apply.) a) A. It enforces your team's change management standards. b) B. It controls who can read and update the code in a branch. c) C. It enforces your team's code quality. d) D. It places a branch into a read-only state.

Papan mata

Gaya visual

Pilihan

Tukar templat

Pulihkan autosimpan: ?