Az 303
Az 303
Overview
Contoso, Ltd. is a manufacturing company that has offices worldwide. Contoso works with partner
organizations to bring products to market.
Contoso products are manufactured by using blueprint files that the company authors and
maintains.
Existing Environment
Currently, Contoso uses multiple types of severs for business operations, including the following:
File servers
Domain controllers
Microsoft SQL Server servers
Your network contains an Active Directory forest named [Link]. All servers and client
computers are joined to Active Directory.
You have a public-facing application named App1. App1 is comprised of the following three tiers:
A SQL database
A web front end
A processing middle tier
Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS
only.
Requirements
Planned Changes
Contoso plans to implement the following changes to the infrastructure:
Move all the tiers of App1 to Azure.
Move the existing product blueprint files to Azure Blob storage.
Create a hybrid directory to support an upcoming Microsoft Office 365 migration project.
Technical Requirements
Contoso must meet the following technical requirements:
Move all the virtual machines for App1 to Azure.
Minimize the number of open ports between the App1 tiers.
Ensure that all the virtual machines for App1 are protected by backups.
Copy the blueprint files to Azure over the Internet.
Ensure that the blueprint files are stored in the archive storage tier.
Prevent user passwords or hashes of passwords from being stored in Azure.
Use unmanaged standard storage for the hard disks of the virtual machines.
Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a
mobile phone to verify their identity.
Minimize administrative effort whenever possible.
User Requirements
Contoso identifies the following requirements for users:
Ensure that only users who are part of a group named Pilot can join devices to Azure AD.
Designate a new user named Admin1 as the service admin for the Azure subscription.
Admin1 must receive email alerts regarding service outages.
Ensure that a new user named User3 can create network objects for the Azure subscription.
2
You need to recommend an identity solution that meets the technical requirements.
Answer: C
Explanation:
With Pass-through Authentication the on-premises passwords are never stored in the cloud in
any form.
Scenario:
Prevent user passwords or hashes of passwords from being stored in Azure.
Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a mobile
phone to verify their identity.
Minimize administrative effort whenever possible.
Reference:
[Link]
QUESTION 2
Case Study 1 - Contoso, Ltd
Overview
Contoso, Ltd. is a manufacturing company that has offices worldwide. Contoso works with partner
organizations to bring products to market.
Contoso products are manufactured by using blueprint files that the company authors and
maintains.
Existing Environment
Currently, Contoso uses multiple types of severs for business operations, including the following:
File servers
Domain controllers
Microsoft SQL Server servers
Your network contains an Active Directory forest named [Link]. All servers and client
computers are joined to Active Directory.
You have a public-facing application named App1. App1 is comprised of the following three tiers:
A SQL database
A web front end
A processing middle tier
Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS
only.
Requirements
Planned Changes
Contoso plans to implement the following changes to the infrastructure:
Move all the tiers of App1 to Azure.
3
Move the existing product blueprint files to Azure Blob storage.
Create a hybrid directory to support an upcoming Microsoft Office 365 migration project.
Technical Requirements
Contoso must meet the following technical requirements:
Move all the virtual machines for App1 to Azure.
Minimize the number of open ports between the App1 tiers.
Ensure that all the virtual machines for App1 are protected by backups.
Copy the blueprint files to Azure over the Internet.
Ensure that the blueprint files are stored in the archive storage tier.
Prevent user passwords or hashes of passwords from being stored in Azure.
Use unmanaged standard storage for the hard disks of the virtual machines.
Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a
mobile phone to verify their identity.
Minimize administrative effort whenever possible.
User Requirements
Contoso identifies the following requirements for users:
Ensure that only users who are part of a group named Pilot can join devices to Azure AD.
Designate a new user named Admin1 as the service admin for the Azure subscription.
Admin1 must receive email alerts regarding service outages.
Ensure that a new user named User3 can create network objects for the Azure subscription.
Hotspot Question
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Answer:
Explanation:
4
Box 1: Yes
Scenario: Move the existing product blueprint files to Azure Blob storage.
Scenario: Use unmanaged standard storage for the hard disks of the virtual machines. Page
blobs are optimized for writes at random locations within a blob. They also support Unmanaged
Disks.
Scenario:
SQL Server Data Files in Microsoft Azure enables native support for SQL Server database files
stored as blobs. It allows you to create a database in SQL Server running in on-premises or in a
virtual machine in Microsoft Azure with a dedicated storage location for your data in Microsoft
Azure Blob storage.
Box 2: No
Box 3: No
Reference:
[Link]
microsoft-azure
QUESTION 3
Case Study 1 - Contoso, Ltd
Overview
Contoso, Ltd. is a manufacturing company that has offices worldwide. Contoso works with partner
organizations to bring products to market.
Contoso products are manufactured by using blueprint files that the company authors and
maintains.
Existing Environment
Currently, Contoso uses multiple types of severs for business operations, including the following:
File servers
Domain controllers
Microsoft SQL Server servers
Your network contains an Active Directory forest named [Link]. All servers and client
computers are joined to Active Directory.
You have a public-facing application named App1. App1 is comprised of the following three tiers:
A SQL database
A web front end
A processing middle tier
Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS
only.
Requirements
Planned Changes
Contoso plans to implement the following changes to the infrastructure:
Move all the tiers of App1 to Azure.
Move the existing product blueprint files to Azure Blob storage.
Create a hybrid directory to support an upcoming Microsoft Office 365 migration project.
Technical Requirements
Contoso must meet the following technical requirements:
5
Move all the virtual machines for App1 to Azure.
Minimize the number of open ports between the App1 tiers.
Ensure that all the virtual machines for App1 are protected by backups.
Copy the blueprint files to Azure over the Internet.
Ensure that the blueprint files are stored in the archive storage tier.
Prevent user passwords or hashes of passwords from being stored in Azure.
Use unmanaged standard storage for the hard disks of the virtual machines.
Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a
mobile phone to verify their identity.
Minimize administrative effort whenever possible.
User Requirements
Contoso identifies the following requirements for users:
Ensure that only users who are part of a group named Pilot can join devices to Azure AD.
Designate a new user named Admin1 as the service admin for the Azure subscription.
Admin1 must receive email alerts regarding service outages.
Ensure that a new user named User3 can create network objects for the Azure subscription.
Hotspot Question
You need to recommend a solution for App1. The solution must meet the technical requirements.
What should you include in the recommendation? To answer, select the appropriate options in
the answer area.
Answer:
6
Explanation:
Box 1: 3
One virtual network for every tier
Box 2: 1
Only one subnet for each tier, to minimize the number of open ports.
Scenario: You have a public-facing application named App1. App1 is comprised of the following
three tiers:
A SQL database
A web front end
A processing middle tier
Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS
only.
Technical requirements:
Move all the virtual machines for App1 to Azure.
Minimize the number of open ports between the App1 tiers.
QUESTION 4
Case Study 1 - Contoso, Ltd
Overview
Contoso, Ltd. is a manufacturing company that has offices worldwide. Contoso works with partner
organizations to bring products to market.
Contoso products are manufactured by using blueprint files that the company authors and
maintains.
Existing Environment
Currently, Contoso uses multiple types of severs for business operations, including the following:
File servers
Domain controllers
Microsoft SQL Server servers
7
Your network contains an Active Directory forest named [Link]. All servers and client
computers are joined to Active Directory.
You have a public-facing application named App1. App1 is comprised of the following three tiers:
A SQL database
A web front end
A processing middle tier
Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS
only.
Requirements
Planned Changes
Contoso plans to implement the following changes to the infrastructure:
Move all the tiers of App1 to Azure.
Move the existing product blueprint files to Azure Blob storage.
Create a hybrid directory to support an upcoming Microsoft Office 365 migration project.
Technical Requirements
Contoso must meet the following technical requirements:
Move all the virtual machines for App1 to Azure.
Minimize the number of open ports between the App1 tiers.
Ensure that all the virtual machines for App1 are protected by backups.
Copy the blueprint files to Azure over the Internet.
Ensure that the blueprint files are stored in the archive storage tier.
Prevent user passwords or hashes of passwords from being stored in Azure.
Use unmanaged standard storage for the hard disks of the virtual machines.
Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a
mobile phone to verify their identity.
Minimize administrative effort whenever possible.
User Requirements
Contoso identifies the following requirements for users:
Ensure that only users who are part of a group named Pilot can join devices to Azure AD.
Designate a new user named Admin1 as the service admin for the Azure subscription.
Admin1 must receive email alerts regarding service outages.
Ensure that a new user named User3 can create network objects for the Azure subscription.
You need to implement a backup solution for App1 after the application is moved.
Answer: B
Explanation:
Scenario: Ensure that all the virtual machines for App1 are protected by backups.
You can back up Azure VMs using a couple of methods:
Single Azure VM: You can back up an Azure VM directly from the VM settings.
8
Multiple Azure VMs: You can set up a Recovery Services vault and configure backup for multiple
Azure VMs.
References:
[Link]
QUESTION 5
Case Study 1 - Contoso, Ltd
Overview
Contoso, Ltd. is a manufacturing company that has offices worldwide. Contoso works with partner
organizations to bring products to market.
Contoso products are manufactured by using blueprint files that the company authors and
maintains.
Existing Environment
Currently, Contoso uses multiple types of severs for business operations, including the following:
File servers
Domain controllers
Microsoft SQL Server servers
Your network contains an Active Directory forest named [Link]. All servers and client
computers are joined to Active Directory.
You have a public-facing application named App1. App1 is comprised of the following three tiers:
A SQL database
A web front end
A processing middle tier
Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS
only.
Requirements
Planned Changes
Contoso plans to implement the following changes to the infrastructure:
Move all the tiers of App1 to Azure.
Move the existing product blueprint files to Azure Blob storage.
Create a hybrid directory to support an upcoming Microsoft Office 365 migration project.
Technical Requirements
Contoso must meet the following technical requirements:
Move all the virtual machines for App1 to Azure.
Minimize the number of open ports between the App1 tiers.
Ensure that all the virtual machines for App1 are protected by backups.
Copy the blueprint files to Azure over the Internet.
Ensure that the blueprint files are stored in the archive storage tier.
Prevent user passwords or hashes of passwords from being stored in Azure.
Use unmanaged standard storage for the hard disks of the virtual machines.
Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a
mobile phone to verify their identity.
Minimize administrative effort whenever possible.
User Requirements
9
Contoso identifies the following requirements for users:
Ensure that only users who are part of a group named Pilot can join devices to Azure AD.
Designate a new user named Admin1 as the service admin for the Azure subscription.
Admin1 must receive email alerts regarding service outages.
Ensure that a new user named User3 can create network objects for the Azure subscription.
Answer: D
Explanation:
Scenario: Copy the blueprint files to Azure over the Internet.
To mount an Azure file share, you will need the primary (or secondary) storage key. SAS keys
are not currently supported for mounting.
Incorrect Answers:
A: Azure Import/Export service is used to securely import large amounts of data to Azure Blob
storage and Azure Files by shipping disk drives to an Azure datacenter.
References:
[Link]
QUESTION 6
You have an Azure subscription that contains 10 virtual machines on a virtual network.
You need to create a graph visualization to display the traffic flow between the virtual machines.
Answer: C
Explanation:
Navigate to Azure Monitor and select Logs to begin querying the data
Reference:
[Link]
for-virtual-machines/
QUESTION 7
You have an Azure subscription that contains 100 virtual machines.
You have a set of Pester tests in PowerShell that validate the virtual machine environment.
You need to run the tests whenever there is an operating system update on the virtual machines.
10
The solution must minimize implementation time and recurring costs.
Which three resources should you use to implement the tests? Each correct answer presents part
of the solution.
Answer: ABE
Explanation:
AE: You can call Azure Automation runbooks by using action groups or by using classic alerts to
automate tasks based on alerts.
B: Alerts are one of the key features of Azure Monitor. They allow us to alert on actions within an
Azure subscription
Reference:
[Link]
[Link]
QUESTION 8
You have an Azure subscription that contains an Azure Log Analytics workspace.
You have a resource group that contains 100 virtual machines. The virtual machines run Linux.
You need to collect events from the virtual machines to the Log Analytics workspace.
A. Syslog
B. Linux performance counters
C. custom fields
Answer: A
Explanation:
Syslog is an event logging protocol that is common to Linux. Applications will send messages that
may be stored on the local machine or delivered to a Syslog collector. When the Log Analytics
agent for Linux is installed, it configures the local Syslog daemon to forward messages to the
agent. The agent then sends the message to Azure Monitor where a corresponding record is
created.
Reference:
[Link]
QUESTION 9
You have a virtual network named VNet1 as shown in the exhibit. (Click the Exhibit tab.)
11
No devices are connected to VNet1.
You plan to peer VNet1 to another virtual network named VNet2. VNet2 has an address space of
[Link]/16.
Answer: D
Explanation:
The virtual networks you peer must have non-overlapping IP address spaces. The exhibit
indicates that VNet1 has an address space of [Link]/16, which is the same as VNet2, and thus
overlaps. We need to change the address space for VNet1.
12
Reference:
[Link]
peering#requirements-and-constraints
QUESTION 10
You have an Azure subscription.
You need to quickly identify underutilized virtual machines that can have their service tier
changed to a less expensive offering.
A. Metrics
B. Customer sights
C. Monitor
D. Advisor
Answer: D
Explanation:
Advisor helps you optimize and reduce your overall Azure spend by identifying idle and
underutilized resources. You can get cost recommendations from the Cost tab on the Advisor
dashboard.
Reference:
[Link]
QUESTION 11
You have an Azure App Service app.
You need to implement tracing for the app. The tracing information must include the following:
- Usage trends
- AJAX call responses
- Page load speed by browser
- Server and browser exceptions
Answer: D
Explanation:
For web pages, Application Insights JavaScript SDK automatically collects AJAX calls as
dependencies.
Note: Some of the things you can track or collect are:
What are the most popular webpages in your application, at what time of day and where is that
traffic coming from?
13
Dependency rates or response times and failure rates to find out if there's an external service
that's causing performance issues on your app, maybe a user is using a portal to get through to
your application and there are response time issues going through there for instance.
Exceptions for both server and browser information, as well as page views and load performance
from the end users' side.
Reference:
[Link]
[Link]
QUESTION 12
You have an Azure subscription that contains the storage accounts shown in the following table.
You enable Storage Advanced Threat Protection (ATP) for all the storage accounts.
You need to identify which storage accounts will generate Storage ATP alerts.
Which two storage accounts should you identify? Each correct answer presents part of the
solution.
A. storagecontoso1
B. storagecontoso2
C. storagecontoso3
D. storagecontoso4
E. storagecontoso5
Answer: AB
Explanation:
Storage Threat Detection is available for the Blob Service.
14
Reference:
[Link]
public-preview/
QUESTION 13
You have an Azure virtual machine named VM1 and an Azure Active Directory (Azure AD) tenant
named [Link].
- IP address: [Link]
- System-assigned managed identity: On
You need to create a script that will run from within VM1 to retrieve the authentication token of
VM1.
A. [Link]
B. [Link]
C. [Link]
D. [Link]
Answer: B
Explanation:
Your code that's running on the VM can request a token from the Azure Instance Metadata
Service identity endpoint, accessible only from within the VM:
[Link]
Reference:
[Link]
resources/overview
15
QUESTION 14
You are designing an Azure solution.
Answer: A
Explanation:
If you require "SSL offloading", application layer treatment, or wish to delegate certificate
management to Azure, you should use Azure's layer 7 load balancer Application Gateway instead
of the Load Balanacer.
Incorrect Answers:
D: Because Load Balancer is agnostic to the TCP payload and TLS offload ("SSL") is not
provided.
Reference:
[Link]
QUESTION 15
You are implementing authentication for applications in your company. You plan to implement
self-service password reset (SSPR) and multifactor authentication (MFA) in Azure Active
Directory (Azure AD).
You need to select authentication mechanisms that can be used for both MFA and SSPR.
Which two authentication methods should you use? Each correct answer presents a complete
solution.
A. Authenticator app
B. Email addresses
C. App passwords
D. Short Message Service (SMS) messages
E. Security questions
Answer: AD
Explanation:
The following authentication mechanisms can be used for both MFA and SSPR:
Short Message Service (SMS) messages
16
Azure AD passwords
Microsoft Authenticator app
Voice call
Incorrect Answers:
B, E: The following authentication mechanisms are used for SSPR only:
Email addresses
Security questions
E: App passwords authentication mechanisms can be used for MFA only, but only in certain
cases.
Reference:
[Link]
methods
QUESTION 16
Your company has the groups shown in the following table.
The company has an Azure subscription that contains an Azure Active Directory (Azure AD)
tenant named [Link].
An administrator named Admin1 attempts to enable Enterprise State Roaming for all the users in
the Managers groups.
Admin1 reports that the options for Enterprise State Roaming are unavailable from Azure AD.
You need to ensure that Admin1 can enable Enterprise State Roaming.
Answer: D
Explanation:
Enterprise State Roaming is available to any organization with an Azure AD Premium or
Enterprise Mobility + Security (EMS) license.
Reference:
[Link]
enable
17
QUESTION 17
Your company has an Azure subscription.
The company's help desk reports an increase in calls from users who receive MFA requests while
they work from the company's main office.
You need to prevent the users from receiving MFA requests when they sign in from the main
office.
A. From Conditional access in Azure Active Directory (Azure AD), create a named location.
B. From the MFA service settings, create a trusted IP range.
C. From Conditional access in Azure Active Directory (Azure AD), create a custom control.
D. From Azure Active Directory (Azure AD), configure organizational relationships.
Answer: B
Explanation:
The first thing you may want to do, before enabling Multi-Factor Authentication for any users, is to
consider configuring some of the available settings. One of the most important features is a
trusted IPs list. This will allow you to whitelist a range of IPs for your network. This way, when
users are in the office, they will not get prompted with MFA, and when they take their devices
elsewhere, they will. Here's how to do it:
Log in to your Azure Portal.
Navigate to Azure AD > Conditional Access > Named locations.
From the top toolbar select Configure MFA trusted IPs.
Reference:
[Link]
QUESTION 18
You have an application named App1 that does not support Azure Active Directory (Azure AD)
authentication.
You need to ensure that App1 can send messages to an Azure Service Bus queue. The solution
must prevent App1 from listening to the queue.
Answer: B
Explanation:
There are two ways to authenticate and authorize access to Azure Service Bus resources: Azure
Activity Directory (Azure AD) and Shared Access Signatures (SAS).
Each Service Bus namespace and each Service Bus entity has a Shared Access Authorization
policy made up of rules.
Reference:
[Link]
18
authorization
[Link]
QUESTION 19
An administrator plans to create a function app in Azure that will have the following settings:
You need to ensure that you can back up the function app.
Which settings should you recommend changing before creating the function app?
A. Runtime stack
B. Enable Application Insights
C. Operating System
D. Plan type
Answer: D
Explanation:
The Backup and Restore feature requires the App Service plan to be in the Standard, Premium or
Isolated tier.
Reference:
[Link]
restrictions
QUESTION 20
You have 10 Azure virtual machines on a subnet named Subnet1. Subnet1 is on a virtual network
named VNet1.
You plan to deploy a public Azure Standard Load Balancer named LB1 to the same Azure region
as the 10 virtual machines.
You need to ensure that traffic from all the virtual machines to the internet flows through LB1. The
solution must prevent the virtual machines from being accessible on the internet.
Which three actions should you perform? Each correct answer presents part of the solution.
Answer: ABD
Explanation:
A: To allow the Load Balancer to monitor the status of your app, you use a health probe. The
19
health probe dynamically adds or removes VMs from the Load Balancer rotation based on their
response to health checks.
B: To distribute traffic to the VMs, a backend address pool contains the IP addresses of the virtual
(NICs) connected to the Load Balancer.
D: A Load Balancer rule is used to define how traffic is distributed to the VMs. Only outbound
traffic is allowed.
Reference:
[Link]
portal2
QUESTION 21
You have SQL Server on an Azure virtual machine named SQL1.
You need to automate the backup of the databases on SQL1 by using Automated Backup v2 for
the virtual machines. The backups must meet the following requirements:
Answer: C
Explanation:
An Azure storage account is used for storing Automated Backup files in blob storage. A container
is created at this location to store all backup files. The backup file naming convention includes the
date, time, and database GUID.
Reference:
[Link]
QUESTION 22
You have an Azure subscription that contains an Azure key vault named KeyVault1 and the
virtual machines shown in the following table.
KeyVault1 has an access policy that provides several users with Create Key permissions.
You need to ensure that the users can only register secrets in KeyVault1 from VM1.
20
A. Create a network security group (NSG) that is linked to Subnet1.
B. Configure the Firewall and virtual networks settings for KeyVault1.
C. Modify the access policy for KeyVault1.
D. Configure KeyVault1 to use a hardware security module (HSM).
Answer: C
Explanation:
You grant data plane access by setting Key Vault access policies for a key vault.
Note 1: Grant our VM's system-assigned managed identity access to the Key Vault.
1. Select Access policies and click Add new.
2. In Configure from template, select Secret Management.
3. Choose Select Principal, and in the search field enter the name of the VM you created earlier.
Select the VM in the result list and click Select.
4. Click OK to finishing adding the new access policy, and OK to finish access policy selection.
Note 2: Access to a key vault is controlled through two interfaces: the management plane and the
data plane. The management plane is where you manage Key Vault itself. Operations in this
plane include creating and deleting key vaults, retrieving Key Vault properties, and updating
access policies. The data plane is where you work with the data stored in a key vault. You can
add, delete, and modify keys, secrets, and certificates.
Reference:
[Link]
resources/tutorial-windows-vm-access-nonaad
[Link]
QUESTION 23
You have resources in three Azure regions. Each region contains two virtual machines. Each
virtual machine has a public IP address assigned to its network interface and a locally installed
application named App1.
You plan to implement Azure Front Door-based load balancing across all the virtual machines.
You need to ensure that App1 on the virtual machines will only accept traffic routed from Azure
Front Door.
Answer: C
Explanation:
Configure IP ACLing for your backends to accept traffic from Azure Front Door's backend IP
address space and Azure's infrastructure services only. Refer the IP details below for ACLing
your backend:
Refer [Link] section in Azure IP Ranges and Service Tags for Front Door's
IPv4 backend IP address range or you can also use the service tag [Link] in
your network security groups.
Reference:
[Link]
QUESTION 24
21
You have an Azure key vault named KV1.
You need to ensure that applications can use KV1 to provision certificates automatically from an
external certification authority (CA).
Which two actions should you perform? Each correct answer presents part of the solution.
Answer: CD
Explanation:
C: Obtain the root CA certificate (step 4 in the picture below)
D: From KV1, create a certificate signing request (CSR) (step 2 in the picture below) Note:
Creating a certificate with a CA not partnered with Key Vault This method allows working with
other CAs than Key Vault's partnered providers, meaning your organization can work with a CA of
its choice.
The following step descriptions correspond to the green lettered steps in the preceding diagram.
1. In the diagram above, your application is creating a certificate, which internally begins by
creating a key in your key vault.
2. Key Vault returns to your application a Certificate Signing Request (CSR).
3. Your application passes the CSR to your chosen CA.
4. Your chosen CA responds with an X509 Certificate.
5. Your application completes the new certificate creation with a merger of the X509 Certificate
from your CA.
Reference:
22
[Link]
QUESTION 25
You create the following Azure role definition.
Which two values should you modify before you create Role1? Each correct answer presents part
of the solution.
A. AssignableScopes
B. Description
C. DataActions
D. IsCustom
E. Id
Answer: AD
Explanation:
Part of example:
"IsCustom": true,
"AssignableScopes": [
"/subscriptions/{subscriptionId1}",
"/subscriptions/{subscriptionId2}",
"/subscriptions/{subscriptionId3}"
The following shows what a custom role looks like as displayed in JSON format. This custom role
can be used for monitoring and restarting virtual machines.
{
"Name": "Virtual Machine Operator",
"Id": "88888888-8888-8888-8888-888888888888",
"IsCustom": true,
"Description": "Can monitor and restart virtual machines.", "Actions": [
"[Link]/*/read",
23
"[Link]/*/read",
"[Link]/*/read",
"[Link]/virtualMachines/start/action",
"[Link]/virtualMachines/restart/action",
"[Link]/*/read",
"[Link]/availabilityStatuses/read",
"[Link]/subscriptions/resourceGroups/read", "[Link]/alertRules/*",
"[Link]/diagnosticSettings/*",
"[Link]/*"
],
"NotActions": [],
"DataActions": [],
"NotDataActions": [],
"AssignableScopes": [
"/subscriptions/{subscriptionId1}",
"/subscriptions/{subscriptionId2}",
"/subscriptions/{subscriptionId3}"
]
}
Reference:
[Link]
QUESTION 26
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have a server named Server1 that runs Windows Server 2019. Server1 is a container host.
You need to add a file named [Link] from Server1 to a folder named C:\Folder1 in the container
image.
A. Yes
B. No
Answer: A
Explanation:
Copy is the correct command to copy a file to the container image.
Reference:
[Link]
24
[Link]
QUESTION 27
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have a server named Server1 that runs Windows Server 2019. Server1 is a container host.
You need to add a file named [Link] from Server1 to a folder named C:\Folder1 in the container
image.
A. Yes
B. No
Answer: B
Explanation:
Copy is the correct command to copy a file to the container image. Furthermore, the root directory
is specified as '/' and not as 'C:/'.
Reference:
[Link]
[Link]
QUESTION 28
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have a server named Server1 that runs Windows Server 2019. Server1 is a container host.
You need to add a file named [Link] from Server1 to a folder named C:\Folder1 in the container
image.
25
Solution: You add the following line to the Dockerfile.
A. Yes
B. No
Answer: B
Explanation:
Copy is the correct command to copy a file to the container image. The ADD command can also
be used.
However, the root directory is specified as '/' and not as 'C:/'.
Reference:
[Link]
[Link]
QUESTION 29
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant named [Link].
A user named Admin1 attempts to create an access review from the Azure Active Directory
admin center and discovers that the Access reviews settings are unavailable. Admin1 discovers
that all the other identity Governance settings are available.
Admin1 is assigned the User administrator, Compliance administrator, and Security administrator
roles.
You need to ensure that Admin1 can create access reviews in [Link].
A. Yes
B. No
Answer: B
Explanation:
You do not use access packages for Identity Governance. Instead use Azure AD Privileged
Identity Management.
Note: PIM essentially helps you manage the who, what, when, where, and why for resources that
you care about. Key features of PIM include:
Conduct access reviews to ensure users still need roles
26
Reference:
[Link]
configure [Link]
management-overview
QUESTION 30
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant named [Link].
A user named Admin1 attempts to create an access review from the Azure Active Directory
admin center and discovers that the Access reviews settings are unavailable. Admin1 discovers
that all the other identity Governance settings are available.
Admin1 is assigned the User administrator, Compliance administrator, and Security administrator
roles.
You need to ensure that Admin1 can create access reviews in [Link].
A. Yes
B. No
Answer: B
Explanation:
Instead use Azure AD Privileged Identity Management.
Note: PIM essentially helps you manage the who, what, when, where, and why for resources that
you care about. Key features of PIM include:
Conduct access reviews to ensure users still need roles
Reference:
[Link]
configure
QUESTION 31
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant named [Link].
27
A user named Admin1 attempts to create an access review from the Azure Active Directory
admin center and discovers that the Access reviews settings are unavailable. Admin1 discovers
that all the other identity Governance settings are available.
Admin1 is assigned the User administrator, Compliance administrator, and Security administrator
roles.
You need to ensure that Admin1 can create access reviews in [Link].
A. Yes
B. No
Answer: B
Explanation:
Instead use Azure AD Privileged Identity Management.
Note: PIM essentially helps you manage the who, what, when, where, and why for resources that
you care about. Key features of PIM include:
Conduct access reviews to ensure users still need roles
Reference:
[Link]
configure
QUESTION 32
Your network contains an on-premises Active Directory domain named [Link] that contains
a member server named Server1.
You need to specify the account for Azure AD Connect synchronization. The solution must use
the principle of least privilege.
A. CONTOSO\User2
B. SERVER1\User4
28
C. CONTOSO\User1
D. CONTOSO\User3
Answer: A
Explanation:
The default Domain User permissions are sufficient
Reference:
[Link]
permissions
QUESTION 33
You have an Azure subscription that contains the web apps shown in the following table.
A. WebApp1
B. WebApp4
C. WebApp2
D. WebApp3
Answer: B
Explanation:
Publishing a .NET Core WebJob to App Service from Visual Studio uses the same tooling as
publishing an [Link] Core app.
Reference:
[Link]
QUESTION 34
The developers at your company request that you create databases in Azure Cosmos DB as
shown in the following table.
29
You need to create the Azure Cosmos DB databases to meet the developer request. The solution
must minimize costs.
What are two possible ways to achieve the goal? Each correct answer presents a complete
solution.
A. Create three Azure Cosmos DB accounts, one for the databases that use the Core (SQL) API,
one for CosmosDB2, and one for CosmosDB4.
B. Create two Azure Cosmos DB accounts, one for CosmosDB2 and CosmosDB4 and one for
CosmosDB1 and CosmosDB3.
C. Create one Azure Cosmos DB account for each database.
D. Create three Azure Cosmos DB accounts, one for the databases that use the MongoDB API, one
for CosmosDB1, and one for CosmosDB3.
Answer: BD
Explanation:
Note:
Microsoft recommends using the same API for all access to the data in a given account.
One throughput provisioned container per subscription for SQL, Gremlin API, and Table
accounts.
Up to three throughput provisioned collections per subscription for MongoDB accounts.
The throughput provisioned on an Azure Cosmos container is exclusively reserved for that
container. The container receives the provisioned throughput all the time.
Incorrect Answers:
A: DB2 and DB4 can use the same account.
C: The most costly alternative.
Reference:
[Link]
30
QUESTION 35
You have three Azure SQL Database servers shown in the following table.
Answer: A
Explanation:
You can use different resource groups using Power Shell ou CLI.
The secondary must be in a different region.
[Link]
overview?tabs=azure-powershell
QUESTION 36
You have two Azure SQL Database managed instances in different Azure regions.
What should you configure before you can add the managed instances to the instance failover
group?
A. an internal Azure Load Balancer instance that has managed instance endpoints in a backend
pool
B. Azure Private Link that has endpoints on two virtual networks
C. an Azure Application Gateway that has managed instance endpoints in a backend pool
D. a Site-to-Site VPN between the virtual networks that contain the instances
Answer: D
Explanation:
For two managed instances to participate in a failover group, there must be either ExpressRoute
or a gateway configured between the virtual networks of the two managed instances to allow
network communication.
You create the two VPN gateways and connect them.
31
1. Create the gateway for the virtual network of your primary managed instance using the Azure
portal.
2. Create the gateway for the virtual network of your secondary managed instance using the
Azure portal.
3. Create a bidirectional connection between the two gateways of the two virtual networks.
Reference:
[Link]
tutorial?tabs=azure-portal#4---create-a-primary-gateway
QUESTION 37
Hotspot Question
You plan to create an Azure Storage account in the Azure region of East US 2.
You need to create a storage account that meets the following requirements:
- Replicates synchronously
- Remains available if a single data center in the region fails
How should you configure the storage account? To answer, select the appropriate options in the
answer area.
Answer:
32
Explanation:
Box 1: Zone-redundant storage (ZRS)
Zone-redundant storage (ZRS) replicates your data synchronously across three storage clusters
in a single region.
LRS would not remain available if a data center in the region fails GRS and RA GRS use
asynchronous replication.
Reference:
[Link]
[Link]
QUESTION 38
Hotspot Question
You plan to deploy an Azure virtual machine named VM1 by using an Azure Resource Manager
template.
What should you include in the template? To answer, select the appropriate options in the answer
area.
33
Answer:
34
Explanation:
Within your template, the dependsOn element enables you to define one resource as a
dependent on one or more resources. Its value can be a comma-separated list of resource
names.
Box 1: '[Link]/networkInterfaces'
This resource is a virtual machine. It depends on two other resources:
[Link]/storageAccounts
[Link]/networkInterfaces
Box 2: '[Link]/virtualNetworks/'
The dependsOn element enables you to define one resource as a dependent on one or more
resources.
The resource depends on two other resources:
[Link]/publicIPAddresses
[Link]/virtualNetworks
35
Reference:
[Link]
create-templates-with-dependent-resources
QUESTION 39
Hotspot Question
Your network contains an Active Directory domain named [Link] and an Azure Active
Directory (Azure AD) tenant named [Link].
36
You need to implement Azure AD Connect. The solution must follow the principle of least
privilege.
Which user accounts should you use in [Link] and [Link] to implement
Azure AD Connect? To answer select the appropriate options in the answer area.
Answer:
37
Explanation:
Box 1: User5
In Express settings, the installation wizard asks for the following:
The AD DS Enterprise Admin account is used to configure your on-premises Active Directory.
These credentials are only used during the installation and are not used after the installation has
completed. The Enterprise Admin, not the Domain Admin should make sure the permissions in
Active Directory can be set in all domains.
Box 2: UserA
Azure AD Global Admin credentials are only used during the installation and are not used after
the installation has completed. It is used to create the Azure AD Connector account used for
synchronizing changes to Azure AD. The account also enables sync as a feature in Azure AD.
Reference:
[Link]
accounts-permissions
QUESTION 40
Hotspot Question
You have an Azure subscription that contains the resource groups shown in the following table.
38
You create an Azure Resource Manager template named Template1 as shown in the following
exhibit.
From the Azure portal, you deploy Template1 four times by using the settings shown in the
following table.
39
What is the result of the deployment? To answer, select the appropriate options in the answer
area.
Answer:
40
QUESTION 41
Hotspot Question
41
Use the drop-down menus to select the answer choice that completes each statement based on
the information presented in the graphic.
Answer:
Explanation:
Box 1: 6
Two out of three update domains would be available, each with at least 3 VMs. An update domain
is a group of VMs and underlying physical hardware that can be rebooted at the same time.
As you create VMs within an availability set, the Azure platform automatically distributes your
VMs across these update domains. This approach ensures that at least one instance of your
application always remains running as the Azure platform undergoes periodic maintenance.
Box 2: the West Europe region and the RG1 resource group
Reference:
[Link]
QUESTION 42
Hotspot Question
You have an Azure Resource Manager template for a virtual machine named Template1.
Template1 has the following parameters section.
42
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
43
Answer:
Explanation:
Box 1: Yes
The Resource group is not specified.
Box 2: No
The default value for the operating system is Windows 2016 Datacenter.
Box 3: Yes
Location is no default value.
Reference:
[Link]
QUESTION 43
Hotspot Question
You have an Azure Active Directory (Azure AD) tenant named [Link]. The tenant contains
the users shown in the following table.
The tenant contains computers that run Windows 10. The computers are configured as shown in
the following table.
44
You enable Enterprise State Roaming in [Link] for Group1 and GroupA.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Answer:
Explanation:
Enterprise State Roaming provides users with a unified experience across their Windows devices
and reduces the time needed for configuring a new device.
Box 1: Yes
Box 2: No
Box 3: Yes
Reference:
[Link]
overview
45
QUESTION 44
Hotspot Question
You have an Azure Resource Manager template named Template1 in the library as shown in the
following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on
the information presented in the graphic.
46
Answer:
Explanation:
[Link]
QUESTION 45
Hotspot Question
Your company hosts multiple websites by using Azure virtual machine scale sets (VMSS) that run
Internet Information Server (IIS).
All network communications must be secured by using end to end Secure Socket Layer (SSL)
encryption. User sessions must be routed to the same server by using cookie-based session
affinity.
The image shown depicts the network traffic flow for the websites to the VMSS.
47
Use the drop-down menus to select the answer choice that answers each question.
Answer:
Explanation:
48
Box 1: Azure Application Gateway
You can create an application gateway with URL path-based redirection using Azure PowerShell.
Reference:
[Link]
QUESTION 46
Drag and Drop Question
You have an Azure subscription that contains two virtual networks named VNet1 and VNet2.
Virtual machines connect to the virtual networks.
The virtual networks have the address spaces and the subnets configured as shown in the
following table.
You need to add the address space of [Link]/16 to VNet1. The solution must ensure that the
hosts on VNet1 and VNet2 can communicate.
Which three actions should you perform in sequence? To answer, move the appropriate actions
from the list of actions to the answer area and arrange them in the correct order.
Answer:
49
Explanation:
Step 1: Remove peering between Vnet1 and VNet2.
You can't add address ranges to, or delete address ranges from a virtual network's address
space once a virtual network is peered with another virtual network. To add or remove address
ranges, delete the peering, add or remove the address ranges, then re-create the peering.
Reference:
[Link]
QUESTION 47
Hotspot Question
You have an Azure subscription named Subscription1. Supscription1 contains the resources in
the following table.
VNet1 is in RG1. VNet2 is in RG2. There is no connectivity between VNet1 and VNet2.
An administrator named Admin1 creates an Azure virtual machine named VM1 in RG1. VM1 uses
a disk named Disk1 and connects to VNet1. Admin1 then installs a custom application in VM1.
50
You need to move the custom application to VNet2. The solution must minimize administrative
effort.
Which two actions should you perform? To answer, select the appropriate options in the answer
area.
Answer:
Explanation:
We cannot just move a virtual machine between networks. What we need to do is identify the disk
used by the VM, delete the VM itself while retaining the disk, and recreate the VM in the target
virtual network and then attach the original disk to it.
51
Reference:
[Link]
vnet-on-azure/
[Link]
azure-vm-between-vnets
QUESTION 48
Hotspot Question
You have an Azure virtual machine named Server1 that runs Windows Server 2019.
Which command should you run on Server1? To answer, select the appropriate options in the
answer area.
Answer:
Explanation:
An Azure container registry stores and manages private Docker container images, similar to the
way Docker Hub stores public Docker images. You can use the Docker command-line interface
(Docker CLI) for login, push, pull, and other operations on your container registry.
Reference:
[Link]
[Link]
52
QUESTION 49
Hotspot Question
You are developing an Azure Web App. You configure TLS mutual authentication for the web
app.
You need to validate the client certificate in the web app. To answer, select the appropriate
options in the answer area.
Answer:
53
QUESTION 50
Drag and Drop Question
You are designing a solution to secure a company's Azure resources. The environment hosts 10
teams. Each team manages a project and has a project manager, a virtual machine (VM)
operator, developers, and contractors.
Project managers must be able to manage everything except access and authentication for
users. VM operators must be able to manage VMs, but not the virtual network or storage account
to which they are connected. Developers and contractors must be able to manage storage
accounts.
What should you recommend? To answer, drag the appropriate roles to the correct employee
types. Each role may be used once, more than once, or not at all. You may need to drag the split
bar between panes or scroll to view content.
54
Answer:
QUESTION 51
Hotspot Question
Your company has a virtualization environment that contains the virtualization hosts shown in the
following table.
55
All the virtual machines use basic disks. VM1 is protected by using BitLocker Drive Encryption
(BitLocker).
You plan to migrate the virtual machines to Azure by using Azure Site Recovery.
Which virtual machines should you identify for each server? To answer, select the appropriate
options in the answer area.
Answer:
56
Explanation:
Incorrect Answers:
VM1 cannot be migrates as it has BitLocker enabled.
VM2 cannot be migrates as the OS disk on VM2 is larger than 2TB. VMC cannot be migrates as
the Data disk on VMC is larger than 4TB.
Reference:
[Link]
requirements
QUESTION 52
Hotspot Question
You need to create a conditional access policy that requires all users to use multi-factor
authentication when they access the Azure portal.
Which three settings should you configure? To answer, select the appropriate settings in the
answer area.
57
Answer:
58
Explanation:
You will use the Users and Groups section to choose the group. You would then choose the
Cloud Apps or actions section to ensure that the setting is enforced during the use of accessing
the Azure Portal. And then you would use the Grant section to enforce Multi-Factor
Authentication.
[Link]
QUESTION 53
Hotspot Question
You have an Azure Active Directory (Azure AD) tenant that contains the user groups shown in the
following table.
59
You enable self-service password reset (SSPR) for Group1.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Answer:
60
Explanation:
Box 1: Yes
Notify all admins when other admins reset their passwords: Yes.
Box 2: No
Notify users on password resets: No.
Box 3: No
If this option is set to Yes, then all administrators receive an email to their primary email address
on file in Azure AD. The email notifies them that another administrator has changed their
password by using SSPR.
Example: There are four administrators in an environment. Administrator A resets their password
by using SSPR. Administrators B, C, and D receive an email alerting them of the password reset.
Reference:
[Link]
[Link]
QUESTION 54
Hotspot Question
You have an Azure logic app named App1 and an Azure Service Bus queue named Queue1.
You need to ensure that App1 can read messages from Queue1. App1 must authenticate by
using Azure Active Directory (Azure AD).
What should you do? To answer, select the appropriate options in the answer area.
61
Answer:
Explanation:
On App1: Turn on the managed identity
To use Service Bus with managed identities, you need to assign the identity the role and the
appropriate scope. The procedure in this section uses a simple application that runs under a
managed identity and accesses Service Bus resources.
62
Azure Active Directory (Azure AD) authorizes access rights to secured resources through role-
based access control (RBAC). Azure Service Bus defines a set of built-in RBAC roles that
encompass common sets of permissions used to access Service Bus entities and you can also
define custom roles for accessing the data.
Reference:
[Link]
[Link]
identity
QUESTION 55
Hotspot Question
You plan to deploy an app that has a web front end and an application tier.
You need to recommend a load balancing solution that meets the following requirements:
Which load balancing solution should you recommend for each tier? To answer, select the
appropriate options in the answer area.
Answer:
63
Explanation:
Box 1: An Azure Application Gateway that has a web application firewall (WAF) Azure Application
Gateway offers a web application firewall (WAF) that provides centralized protection of your web
applications from common exploits and vulnerabilities. Web applications are increasingly targeted
by malicious attacks that exploit commonly known vulnerabilities. SQL injection and cross-site
scripting are among the most common attacks.
Note: When using load-balancing rules with Azure Load Balancer, you need to specify a health
probes to allow Load Balancer to detect the backend endpoint status.
Health probes support the TCP, HTTP, HTTPS protocols.
Reference:
[Link]
[Link]
QUESTION 56
Hotspot Question
You have an Azure subscription named Subscription1 that contains a virtual network named
VNet1.
Which user can perform each configuration? To answer, select the appropriate options in the
answer area.
64
NOTE: Each correct selection is worth one point.
Answer:
Explanation:
Box 1: User1 and User3 only
Owner have all privileges and Network Contributor can create and manage resources but not
access so creation is possible
Reference:
[Link]
QUESTION 57
Hotspot Question
The IT operations department wants to apply the same policies as they have for on-premises
VMs to the VMs running in Azure, including domain administrator permissions and schema
65
extensions.
You need to recommend a solution for the hybrid scenario that minimizes the amount of
maintenance required.
What should you recommend? To answer, select the appropriate options in the answer area.
Answer:
Explanation:
Box 1: Join the VMs to a new domain controller VM in Azure Azure provides two solutions for
implementing directory and identity services in Azure:
(Used in this scenario) Extend your existing on-premises Active Directory infrastructure to Azure,
by deploying a VM in Azure that runs AD DS as a Domain Controller. This architecture is more
common when the on-premises network and the Azure virtual network (VNet) are connected by a
VPN or ExpressRoute connection.
Use Azure AD to create an Active Directory domain in the cloud and connect it to your on-
premises Active Directory domain. Azure AD Connect integrates your on-premises directories
with Azure AD.
66
Reference:
[Link]
QUESTION 58
You have an Azure Kubernetes Service (AKS) cluster named Clus1 in a resource group named
RG1.
You need to ensure that the administrator can deploy the YAML application manifest file for a
container application.
Answer: B
Explanation:
To manage a Kubernetes cluster, you use kubectl, the Kubernetes command-line client. If you
use Azure Cloud Shell, kubectl is already installed. To install kubectl locally, use the az aks
install-cli command.
[Link]
QUESTION 59
Note: This question is part of series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
Your network contains an Active Directory forest named [Link]. The forest contains two
child domains named [Link] and [Link].
You have an Azure subscription that contains an Azure Active Directory (Azure AD) tenant
named [Link].
You install Azure AD Connect and sync all the on-premises user accounts to the Azure AD
tenant. You implement seamless single sign-on (SSO).
You plan to change the source of authority for all the user accounts in [Link] to
Azure AD.
Solution: You use Active Directory Domains and Trusts from a computer joined to [Link].
67
Does this meet the goal?
A. Yes
B. No
Answer: B
Explanation:
Instead you should customize the default synchronization rule.
Note:
To delete a custom domain name, you must first ensure that no resources in your directory rely
on the domain name. You can't delete a domain name from your directory if:
Any user has a user name, email address, or proxy address that includes the domain name.
Any group has an email address or proxy address that includes the domain name.
Any application in your Azure AD has an app ID URI that includes the domain name.
References:
[Link]
sync-rule
QUESTION 60
You have an Azure subscription named Subscription1.
You create several Azure virtual machines in Subscription1. All of the virtual machines belong to
the same virtual network.
You have an on-premises Hyper-V server named Server1. Server1 hosts a virtual machine
named VM1.
You need to create additional objects in Subscription1 to support the planned deployment.
Which three objects should you create? Each correct answer presents part of the solution.
A. Hyper-V site
B. Azure Recovery Services Vault
C. storage account
D. replication policy
E. Azure Traffic Manager instance
F. endpoint
Answer: ABD
QUESTION 61
Hotspot Question
You have an Azure Service Bus and a queue named Queue1. Queue1 is configured as shown in
the following exhibit.
68
Use the drop-down menus to select the answer choice that completes each statement based on
the information presented in the graphic.
69
Answer:
QUESTION 62
Hotspot Question
Your organization has developed and deployed several Azure App Service Web and API
applications. The applications use Azure SQL Database to store and retrieve data. Several
departments have the following requests to support the applications:
70
You need to recommend the appropriate Azure service for each department request.
What should you recommend? To answer, configure the appropriate options in the dialog box in
the answer area.
Answer:
71
Explanation:
[Link]
QUESTION 63
Note: This question is part of series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You are planning to create a virtual network that has a scale set that contains six virtual machines
(VMs).
A monitoring solution on a different network will need access to the VMs inside the scale set.
72
Solution: Use Remote Desktop Protocol (RDP) to connect to the VM in the scale set.
A. Yes
B. No
Answer: B
Explanation:
Instead, deploy a standalone VM that has a public IP address to the virtual network.
QUESTION 64
You have an Azure subscription that contains the virtual networks shown in the following table.
You need to recommend a connectivity solution that will enable the virtual machines on VNET1
and VNET2 to communicate through the Microsoft backbone infrastructure.
A. Azure ExpressRoute
B. peering
C. a site-to-site VPN
D. a point-to-site VPN
Answer: B
Explanation:
Virtual network peering enables you to seamlessly connect Azure virtual networks. Once peered,
the virtual networks appear as one, for connectivity purposes. The traffic between virtual
machines in the peered virtual networks is routed through the Microsoft backbone infrastructure,
much like traffic is routed between virtual machines in the same virtual network, through private
IP addresses only. Azure supports:
VNet peering - connecting VNets within the same Azure region
Global VNet peering - connecting VNets across Azure regions
References:
[Link]
QUESTION 65
You create an Azure virtual machine named VM1 in a resource group named RG1.
73
A. From Diagnostic settings for VM1, configure the performance counters to include network counters.
B. From the VM1 blade, configure Connection troubleshoot.
C. From the VM1 blade, install performance diagnostics and run advanced performance analysis
D. From Diagnostic settings for VM1, configure the log level of the diagnostic agent.
Answer: C
Explanation:
The performance diagnostics tool helps you troubleshoot performance issues that can affect a
Windows or Linux virtual machine (VM). Supported troubleshooting scenarios include quick
checks on known issues and best practices, and complex problems that involve slow VM
performance or high usage of CPU, disk space, or memory.
Advanced performance analysis, included in the performance diagnostics tool, includes all checks
in the performance analysis, and collects one or more of the traces, as listed in the following
sections. Use this scenario to troubleshoot complex issues that require additional traces. Running
this scenario for longer periods will increase the overall size of diagnostics output, depending on
the size of the VM and the trace options that are selected.
References:
[Link]
QUESTION 66
You have an Azure subscription that contains the resource groups shown in the following table.
The subscription contains the storage accounts shown in the following table.
You create a Recovery Services vault named Vault1 in RG1 in the West US location.
You need to identify which storage accounts can be used to archive the diagnostics logs of
Vault1.
A. Storage1 only
B. Storage2 only
C. Storage3 only
D. Storage1 or Storage2 only
E. Storage1 or Storage3 only
Answer: D
Explanation:
Vault must be in the same region as the logs to be archived from the storage account. Hence,
only storage accounts within West US can be used –> Answer D
74
QUESTION 67
You have an Azure subscription.
You create a custom role in Azure by using the following Azure Resource Manager template.
Answer: D
Explanation:
The "[Link]/*" operation will allow the user to create support tickets.
References:
[Link]
75
QUESTION 68
A company plans to use third-party application software to perform complex data analysis
processes. The software will use up to 500 identical virtual machines (VMs) based on an Azure
Marketplace VM image.
You need to design the infrastructure for the third-party application server. The solution must
meet the following requirements:
- The number of VMs that are running at any given point in time must
change when the user workload changes.
- When a new version of the application is available in Azure
Marketplace it must be deployed without causing application downtime.
- Use VM scale sets.
- Minimize the need for ongoing maintenance.
Which two technologies should you recommend? Each correct answer presents part of the
solution.
Answer: BD
QUESTION 69
You have an Azure subscription that contains the storage accounts shown in the following table.
You need to implement several lifecycle management rules for all storage accounts.
Answer: A
76
Explanation:
Microsoft recommends that you use a general-purpose v2 storage account for most scenarios.
You can easily upgrade a general-purpose v1 or an Azure Blob storage account to a general-
purpose v2 account with no downtime and without the need to copy data.
References:
[Link]
QUESTION 70
Note: This question is part of series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant named [Link].
A user named Admin1 attempts to create an access review from the Azure Active Directory
admin center and discovers that the Access reviews settings are unavailable. Admin1 discovers
that all the other Identity Governance settings are available.
Admin1 is assigned the User administrator, Compliance administrator, and Security administrator
roles.
You need to ensure that the Admin1 can create access reviews in [Link].
A. Yes
B. No
Answer: A
Explanation:
PIM essentially helps you manage the who, what, when, where, and why for resources that you
care about. Key features of PIM include:
Conduct access reviews to ensure users still need roles
Note: Azure Active Directory (Azure AD) Privileged Identity Management (PIM) is a service that
enables you to manage, control, and monitor access to important resources in your organization.
This includes access to resources in Azure AD, Azure resources, and other Microsoft Online
Services like Office 365 or Microsoft Intune.
References:
[Link]
configure
QUESTION 71
Note: This question is part of series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
77
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant named [Link].
A user named Admin1 attempts to create an access review from the Azure Active Directory
admin center and discovers that the Access reviews settings are unavailable. Admin1 discovers
that all the other Identity Governance settings are available.
Admin1 is assigned the User administrator, Compliance administrator, and Security administrator
roles.
You need to ensure that the Admin1 can create access reviews in [Link].
A. Yes
B. No
Answer: B
Explanation:
Instead use Azure AD Privileged Identity Management.
Note: PIM essentially helps you manage the who, what, when, where, and why for resources that
you care about. Key features of PIM include:
Conduct access reviews to ensure users still need roles
References:
[Link]
configure
QUESTION 72
Note: This question is part of series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant named [Link].
A user named Admin1 attempts to create an access review from the Azure Active Directory
admin center and discovers that the Access reviews settings are unavailable. Admin1 discovers
that all the other Identity Governance settings are available.
Admin1 is assigned the User administrator, Compliance administrator, and Security administrator
roles.
You need to ensure that the Admin1 can create access reviews in [Link].
78
A. Yes
B. No
Answer: B
Explanation:
Instead use Azure AD Privileged Identity Management.
Note: PIM essentially helps you manage the who, what, when, where, and why for resources that
you care about. Key features of PIM include:
Conduct access reviews to ensure users still need roles
References:
[Link]
configure
QUESTION 73
You have a resource group named RG1 that contains the following:
- A virtual network that contains two subnets named Subnet1 and Subnet2
- An Azure Storage account named contososa1
- An Azure firewall deployed to Subnet2
You need to ensure that contososa1 is accessible from Subnet1 over the Azure backbone
network.
Answer: C
Explanation:
Virtual Network (VNet) service endpoints extend your virtual network private address space and
the identity of your VNet to the Azure services, over a direct connection. Endpoints allow you to
secure your critical Azure service resources to only your virtual networks. Traffic from your VNet
to the Azure service always remains on the Microsoft Azure backbone network.
References:
[Link]
QUESTION 74
Your company has the groups shown in the following table.
The company has an Azure subscription that contains an Azure Active Directory (Azure AD)
tenant named [Link].
79
An administrator named Admin1 attempts to enable Enterprise State Roaming for all the users in
the Managers group.
Admin1 reports that the options for Enterprise State Roaming are unavailable from Azure AD.
You need to ensure that Admin1 can enable Enterprise State Roaming.
Answer: B
Explanation:
Enterprise State Roaming is available to any organization with an Azure AD Premium or
Enterprise Mobility + Security (EMS) license.
References:
[Link]
enable
QUESTION 75
You create a new Azure subscription. You create a resource group named RG1. In RG1, you
create the resources shown in the following table.
You need to configure an encrypted tunnel between your on-premises network and VNET1.
Which two additional resources should you create in Azure? Each correct answer presents part of
the solution.
A. a site-to-site connection
B. a VPN gateway
C. a VNet-to VNet connection
D. a local network gateway
E. a point-to-site configuration
Answer: BD
Explanation:
A Site-to-Site VPN gateway connection is used to connect your on-premises network to an Azure
virtual network over an IPsec/IKE (IKEv1 or IKEv2) VPN tunnel. This type of connection requires
80
a VPN device, a local network gateway, located on-premises that has an externally facing public
IP address assigned to it.
Finally, create a Site-to-Site VPN connection between your virtual network gateway and your on-
premises VPN device.
References:
[Link]
manager-portal
QUESTION 76
Note: This question is part of series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an on-premises file server named Server1 that runs Windows Server 2019.
You need to ensure that if Server1 fails, you can recover the data from Azure.
Solution: From the Azure portal, you create a Recovery Services vault. On VM1, you install the
Azure Backup agent and you schedule a backup.
A. Yes
B. No
Answer: B
Explanation:
Instead use Azure Storage Sync service and configure Azure File.
Use Azure File Sync to centralize your organization's file shares in Azure Files, while keeping the
flexibility, performance, and compatibility of an on-premises file server. Azure File Sync
transforms Windows Server into a quick cache of your Azure file share.
References:
[Link]
QUESTION 77
Note: This question is part of series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
81
You have an on-premises file server named Server1 that runs Windows Server 2019.
You need to ensure that if Server1 fails, you can recover the data from Azure.
Solution: You create a Recovery Services vault and configure a backup by using Windows Server
Backup.
A. Yes
B. No
Answer: B
Explanation:
Instead use Azure Storage Sync service and configure Azure File.
Use Azure File Sync to centralize your organization's file shares in Azure Files, while keeping the
flexibility, performance, and compatibility of an on-premises file server. Azure File Sync
transforms Windows Server into a quick cache of your Azure file share.
References:
[Link]
QUESTION 78
Note: This question is part of series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an on-premises file server named Server1 that runs Windows Server 2019.
You manage Server1 by using Windows Admin Center.
You need to ensure that if Server1 fails, you can recover the data from Azure.
Solution: You create an Azure Storage account and an Azure Storage Sync service. You
configure Azure File Sync for Server1.
A. Yes
B. No
Answer: A
Explanation:
Use Azure File Sync to centralize your organization's file shares in Azure Files, while keeping the
flexibility, performance, and compatibility of an on-premises file server. Azure File Sync
transforms Windows Server into a quick cache of your Azure file share.
Azure Files offers fully managed file shares in the cloud that are accessible via the industry
standard Server Message Block (SMB) protocol. Azure file shares can be mounted concurrently
82
by cloud or on- premises deployments of Windows, Linux, and macOS. Additionally, Azure file
shares can be cached on Windows Servers with Azure File Sync for fast access near where the
data is being used.
Azure file shares can be used to:
Replace or supplement on-premises file servers:
Azure Files can be used to completely replace or supplement traditional on-premises file servers
or NAS devices. Popular operating systems such as Windows, macOS, and Linux can directly
mount Azure file shares wherever they are in the world. Azure file shares can also be replicated
with Azure File Sync to Windows Servers, either on-premises or in the cloud, for performance and
distributed caching of the data where it's being used.
References:
[Link]
[Link]
guide?tabs=azure-portal
QUESTION 79
You have an Azure subscription that contains the Azure virtual machines shown in the following
table.
You create an Azure key vault named Vault1 in the East US location.
You need to identify which virtual machines can enable Azure Disk Encryption by using Vault1.
Which virtual machines should you identify?
Answer: B
Explanation:
Your key vault and VMs must reside in the same Azure region and subscription.
References:
[Link]
QUESTION 80
A company is migrating an existing on-premises third-party website to Azure. The website is
stateless.
The company does not have access to the source code for the website. They have the original
installer.
The number of visitors at the website varies throughout the year. The on-premises infrastructure
was resized to accommodate peaks but the extra capacity was not used.
83
You need to implement a virtual machine scale set instance.
Answer: C
Explanation:
In-guest VM metrics with the Azure diagnostics extension The Azure diagnostics extension is an
agent that runs inside a VM instance. The agent monitors and saves performance metrics to
Azure storage. These performance metrics contain more detailed information about the status of
the VM, such as AverageReadTime for disks or PercentIdleTime for CPU. You can create
autoscale rules based on a more detailed awareness of the VM performance, not just the
percentage of CPU usage or memory consumption.
References:
[Link]
autoscale-overview
QUESTION 81
Note: This question is part of series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an Azure Cosmos DB database that contains a container named Container1. The
partition key for Container1 is set to /day. Container1 contains the items shown in the following
table.
84
You need to programmatically query Azure Cosmos DB and retrieve item1 and item2 only.
A. Yes
B. No
Answer: B
QUESTION 82
Note: This question is part of series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an Azure Cosmos DB database that contains a container named Container1. The
partition key for Container1 is set to /day. Container1 contains the items shown in the following
table.
85
You need to programmatically query Azure Cosmos DB and retrieve item1 and item2 only.
A. Yes
B. No
Answer: B
Explanation:
86
QUESTION 83
Note: This question is part of series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an Azure Cosmos DB database that contains a container named Container1. The
partition key for Container1 is set to /day. Container1 contains the items shown in the following
table.
87
You need to programmatically query Azure Cosmos DB and retrieve item1 and item2 only.
A. Yes
B. No
Answer: B
Explanation:
For you to be able to retrieve Item1 and Item2 the correct query should be:
88
QUESTION 84
Your company is developing an e-commerce Azure App Service Web App to support hundreds of
restaurant locations around the world.
You are designing the messaging solution architecture to support the e-commerce transactions
and messages. The e-commerce application has the following features and requirements:
89
You need to choose the Azure messaging solution to support the Shopping Cart feature.
Answer: A
Explanation:
Microsoft Azure Service Bus is a fully managed enterprise integration message broker. Service
Bus is most commonly used to decouple applications and services from each other, and is a
reliable and secure platform for asynchronous data and state transfer.
One common messaging scenario is Messaging: transfer business data, such as sales or
purchase orders, journals, or inventory movements.
Incorrect Answers:
B: The Azure Relay service enables you to securely expose services that run in your corporate
network to the public cloud.
References:
[Link]
QUESTION 85
Your company is developing an e-commerce Azure App Service Web App to support hundreds of
restaurant locations around the world.
You are designing the messaging solution architecture to support the e-commerce transactions
and messages. The e-commerce application has the following features and requirements:
90
You need to choose the Azure messaging solution to support the Restaurant Telemetry feature.
A. Azure Relay
B. Azure Event Grid
C. Azure Event Hub
D. Azure Service Bus
Answer: C
Explanation:
Azure Event Hubs is a big data pipeline. It facilitates the capture, retention, and replay of
telemetry and event stream data. The data can come from many concurrent sources. Event Hubs
allows telemetry and event data to be made available to a variety of stream-processing
infrastructures and analytics services. It is available either as data streams or bundled event
batches. This service provides a single solution that enables rapid data retrieval for real-time
processing as well as repeated replay of stored raw data. It can capture the streaming data into a
file for processing and analysis.
It has the following characteristics:
low latency
capable of receiving and processing millions of events per second
at least once delivery
Note: Comparison of services
91
References:
[Link]
QUESTION 86
Hotspot Question
You plan to deploy two Azure web apps that have the requirements shown in the following table.
You need to select the App Service plans for the web apps. The solution must minimize costs.
Which App Service plan should you select for each web app? To answer, select the appropriate
options in the answer area.
92
Answer:
93
Explanation:
Reference:
[Link]
QUESTION 87
Hotspot Question
You have an Azure subscription that contains the storage account shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
94
Answer:
Explanation:
Box 1: No
Azure Files supports two storage tiers: premium and standard. Standard file shares are created in
general purpose (GPv1 or GPv2) storage accounts and premium file shares are created in
FileStorage storage accounts.
You cannot create Azure file shares from Blob storage accounts or premium general purpose
(GPv1 or GPv2) storage accounts. Standard Azure file shares must created in standard general
purpose accounts only and premium Azure file shares must be created in FileStorage storage
accounts only. Premium general purpose (GPv1 and GPv2) storage accounts are for premium
page blobs only.
Box 2: Yes
Geo-redundant storage (GRS) brings additional redundancy to the data storage over both LRS or
ZRS. Along with the three copies of your data stored within a single region, a further three copies
are stored in the twinned Azure region. So using GRS means you get all the features of the LRS
storage within your primary zone, but you also get a second LRS data storage in a neighbouring
Azure region. This data is updated asynchronously, so there is a small lag between the 2 data
sets, but for most cases this is acceptable.
95
Box 3: Yes
Blob Storage Standard can be used both LRS and GRS.
References:
[Link]
[Link]
[Link]
QUESTION 88
Hotspot Question
You create and save an Azure Resource Manager template named Template1 that includes the
following four sections.
Section1.
Section2.
Section3.
Section4.
96
You deploy Template1.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Answer:
QUESTION 89
Hotspot Question
You have an Azure subscription that contains the resource groups shown in the following table.
97
RG1 contains the virtual machines shown in the following table.
All the virtual machines are configured to use premium disks and are accessible from the Internet.
VM1 and VM2 are in an available set named AVSET1. VM3 and VM4 are in the same availability
zone and are in an availability set named AVSET2. VM5 and VM6 are in different availability
zones.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Answer:
98
Explanation:
Box 1: Yes
VM1 and VM2 are in an available set named AVSET1.
For all Virtual Machines that have two or more instances deployed in the same Availability Set,
we [Microsoft] guarantee you will have Virtual Machine Connectivity to at least one instance at
least 99.95% of the time.
Box 2: No
VM3 and VM4 are in the same availability zone and are in an availability set named AVSET2.
Box 3: Yes
VM5 and VM6 are in different availability zones.
For all Virtual Machines that have two or more instances deployed across two or more Availability
Zones in the same Azure region, we [Microsoft] guarantee you will have Virtual Machine
Connectivity to at least one instance at least 99.99% of the time.
References:
[Link]
QUESTION 90
Drag and Drop Question
You have an Azure virtual machine named VM1 that runs Windows Server 2016.
Which three actions should you perform in sequence? To answer, move the appropriate actions
from the list of actions to the answer area and arrange them in the correct order.
99
Answer:
Explanation:
Step 1: Run [Link] on VM1.
If a template, or system image is used, System administrators must run the Sysprep tool to clear
the SID information. The Sysprep tool is usually one of the last tasks performed by a system
administrator when building a server image/template, that way each clone of the template will
generalize a new unique SID for every server image copied from the template and will prepare
the server for a first time boot.
The end result is a System template that functions as a new unique build every time it is
deployed.
Step 2: From Azure CLI, deallocate VM1 and mark VM1 as generalized To create an image, the
VM needs to be deallocated. Deallocate the VM with Stop-AzVm. Then, set the state of the VM
as generalized with Set-AzVm so that the Azure platform knows the VM is ready for use a custom
image
References:
[Link]
[Link]
100
powershell
QUESTION 91
Hotspot Question
You play to deploy an Azure virtual machine named VM1 by using an Azure Resource Manager
template.
What should you include in the template? To answer, select the appropriate options in the answer
area.
Answer:
101
Explanation:
Within your template, the dependsOn element enables you to define one resource as a
dependent on one or more resources. Its value can be a comma-separated list of resource
names.
Box 1: '[Link]/networkInterfaces'
This resource is a virtual machine. It depends on two other resources:
[Link]/storageAccounts
[Link]/networkInterfaces
Box 2: '[Link]/virtualNetworks/'
The dependsOn element enables you to define one resource as a dependent on one or more
resources.
The resource depends on two other resources:
[Link]/publicIPAddresses
[Link]/virtualNetworks
102
References:
[Link]
create-templates-with-dependent-resources
QUESTION 92
Hotspot Question
103
Use the drop-down menus to select the answer choice that completes each statement based on
the information presented in the graphic.
104
Answer:
Explanation:
Box 1: is guaranteed to remain the same
OS disk type: Premium SSD
Premium SSD Managed Disks are high performance Solid State Drive (SSD) based Storage
designed to support I/O intensive workloads with significantly high throughput and low latency.
With Premium SSD Managed Disks, you can provision a persistent disk and configure its size
and performance characteristics.
Incorrect:
Not dm-crypt: Azure Disk Encryption helps protect and safeguard your data to meet your
organizational security and compliance commitments. It uses the BitLocker feature of Windows
and the DM-Crypt feature of Linux to provide volume encryption for the OS and data disks of
Azure virtual machines (VMs).
105
References:
[Link]
[Link]
QUESTION 93
Hotspot Question
You have an Azure Resource Manager template for a virtual machine named Template1.
Template1 has the following parameters section.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
106
Answer:
Explanation:
Box 1: Yes
The Resource group is not specified.
Box 2: No
The default value for the operating system is Windows 2016 Datacenter.
Box 3: Yes
Location is no default value.
References:
[Link]
QUESTION 94
Hotspot Question
You network contains an Active Directory domain that is synced to Azure Active Directory (Azure
AD) as shown in the following exhibit.
107
You have a user account configured as shown in the following exhibit. For each of the following
statements, select Yes if the statement is true. Otherwise, select No.
Answer:
108
Explanation:
Box 1: No
Password writeback is disabled.
Note: Having a cloud-based password reset utility is great but most companies still have an on-
premises directory where their users exist. How does Microsoft support keeping traditional on-
premises Active Directory (AD) in sync with password changes in the cloud? Password writeback
is a feature enabled with Azure AD Connect that allows password changes in the cloud to be
written back to an existing on- premises directory in real time.
Box 2: No
Box 3: Yes
Yes, there is an Edit link for Location Info.
References:
[Link]
QUESTION 95
Hotspot Question
You have an Azure Active Directory (Azure AD) tenant named [Link]. The tenant contains
the users shown in the following table.
The tenant contains computers that run Windows 10. The computers are configured as shown in
the following table.
109
You enable Enterprise State Roaming in [Link] for Group1 and GroupA.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Answer:
Explanation:
Enterprise State Roaming provides users with a unified experience across their Windows devices
and reduces the time needed for configuring a new device.
Box 1: Yes
Box 2: No
Box 3: Yes
References:
[Link]
overview
110
QUESTION 96
Drag and Drop Question
You need to ensure that the VMs never experience down time.
What should you recommend? To answer, drag the appropriate solutions to the correct
scenarios. Each solution may be used once, more than once, or not at all. You may need to drag
the split bar between panes or scroll to view content.
Answer:
Explanation:
Box 1: Scale set
A virtual machine scale set allows you to deploy and manage a set of identical, autoscaling virtual
machines.
111
This approach limits the impact of potential physical hardware failures, network outages, or power
interruptions.
Incorrect Answers:
An update domain is a group of VMs and underlying physical hardware that can be rebooted at
the same time.
References:
[Link]
[Link]
QUESTION 97
Hotspot Question
You have an Azure web app named App1 that has the following configurations:
- Decrease the instance count by one when the CPU percentage is less
than 30.
- Decrease the instance count by one when the memory percentage is less
than 50.
- Increase the instance count by one when the CPU percentage is greater
than 80.
- Increase the instance count by one when the memory percentage is
greater than 75.
You need to identify the maximum number of instances that will be used by App1 during the
expected periods of utilization.
What should you identify? To answer, select the appropriate options in the answer area.
112
Answer:
113
Explanation:
Reason: Scale out occur if ANY condition is met while scale in occur ONLY IF ALL condition are
met.
So on Monday morning start with 3 instance and scale-out to 4 instance at night. as CPU is 85%.
Then Tuesday morning 4 instance persist with NO Scale-in as CPU% is low BUT Memory% is
OK; again by Tuesday night 5 instance is SCALED-OUT as CPU% is high. By Wednesday, we
operate at 5 instance as we can neither scale-in or scale-out (due to hitting max-instance). Same
persist even on Weekend as we cannot scale-in. So we hit max instance by Wednesday and stay
there for perpetuity i.e. Box1-Box2-Box3 is 5-5-5.
QUESTION 98
Hotspot Question
From Azure Cosmos DB, you create the containers shown in the following table.
114
You add the following item to Container1.
You plan to add items to Azure Cosmos DB as shown in the following table.
You need to identify which items can be added successfully to Container1 and Container2.
What should you identify for each container? To answer, select the appropriate options in the
answer area.
115
Answer:
Explanation:
“id” is special property which must be unique. That’s why for container 1, item 1 cannot be
created again.
If “id” not exists, azure will generate a unique string automatically, so item 2 can be created
without “id”.
Unique key is bound to the partition, and it does not necessarily exists. Thus, all items can be
created in container 2.
116
QUESTION 99
Your company has an office in Seattle.
You have an Azure subscription that contains a virtual network named VNET1. You create a site-
to-site VPN between the Seattle office and VNET1.
You need to redirect all Internet-bound traffic from Subnet1 to the Seattle office.
A. a route for GatewaySubnet that uses the virtual network gateway as the next hop
B. a route for GatewaySubnet that uses the local network gateway as the next hop
C. a route for Subnet1 that uses the local network gateway as the next hop
D. a route for Subnet1 that uses the virtual network gateway as the next hop
Answer: D
Explanation:
A route with the [Link]/0 address prefix instructs Azure how to route traffic destined for an IP
address that is not within the address prefix of any other route in a subnet's route table. When a
subnet is created, Azure creates a default route to the [Link]/0 address prefix, with the Internet
next hop type. We need to create a custom route in Azure to use a virtual network gateway in the
Seattle office as the next hop.
References:
[Link]
QUESTION 100
You have an Azure subscription that contains the resources shown in the following table.
You need to prepare the environment for the planned virtual network gateway.
What are two ways to achieve this goal? Each correct answer presents a complete solution.
117
A. Modify the address space used by VNET1.
B. Modify the address space used by Subnet1.
C. Create a subnet named GatewaySubnet on VNET1.
D. Create a local network gateway.
E. Delete Subnet1.
Answer: AE
QUESTION 101
You have an Azure subscription that contains the resource groups shown in the following table.
You have the Azure SQL servers shown in the following table.
You create an Azure SQL database named DB1 on Sql1 in an elastic pool named Poo11. You
need to create an Azure SQL database named DB2 in Poo11.
A. Sql1
B. Sql2
C. Sql3
D. Sql4
Answer: A
Explanation:
The databases in an elastic pool are on a single Azure SQL Database server and share a set
number of resources at a set price.
Reference:
[Link]
QUESTION 102
Your company is developing an e-commerce Azure App Service Web App to support hundreds of
restaurant locations around the world.
118
You are designing the messaging solution architecture to support the e-commerce transactions
and messages. The e-commerce application has the following features and requirements:
You need to choose the Azure messaging solution to support the Shopping Cart feature.
Answer: A
Explanation:
Microsoft Azure Service Bus is a fully managed enterprise integration message broker. Service
Bus is most commonly used to decouple applications and services from each other, and is a
reliable and secure platform for asynchronous data and state transfer.
One common messaging scenario is Messaging: transfer business data, such as sales or
purchase orders, journals, or inventory movements.
Incorrect Answers:
B: The Azure Relay service enables you to securely expose services that run in your corporate
network to the public cloud.
References:
[Link]
QUESTION 103
Drag and Drop Question
You have an Azure virtual machine named VM1 that runs Windows Server 2016.
119
You need to create a scale set by using VM1 as a custom image.
Which three actions should you perform in sequence? To answer, move the appropriate actions
from the list of actions to the answer area and arrange them in the correct order.
Answer:
Explanation:
Step 1: Run [Link] on VM1.
The final step to prepare your VM for use as a custom image is to generalize the VM. Sysprep
removes all your personal account information and configurations, and resets the VM to a clean
state for future deployments.
Step 2: From Azure CLI, deallocate VM1 and mark VM1 as generalized, To create an image, the
VM needs to be deallocated. Deallocate the VM with Stop-AzVm. Then, set the state of the VM
as generalized with Set-AzVm so that the Azure platform knows the VM is ready for use a custom
image. You can only create an image from a generalized VM. It may take a few minutes to
deallocate and generalize the VM. Then create an image of the VM with New-AzImageConfig and
New-AzImage.
Step 3: Create a virtual machine scale set.
120
Create a scale set with New-AzVmss that uses the -ImageName parameter to define the custom
VM image created in the previous step.
References:
[Link]
powershell
QUESTION 104
Hotspot Question
You have an Azure virtual machine named Serverl that runs Windows Server 2019.
Which command should you run on Server1? To answer, select the appropriate options in the
answer area.
Answer:
Explanation:
An Azure container registry stores and manages private Docker container images, similar to the
way Docker Hub stores public Docker images. You can use the Docker command-line interface
(Docker CLI) for login, push, pull, and other operations on your container registry.
Reference:
[Link]
[Link]
121
QUESTION 105
Hotspot Question
You have an Azure subscription that contains the Azure SQL servers shown in the following
table.
The subscription contains the elastic pools shown in the following table.
The subscription contains the Azure SQL databases shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Answer:
122
Explanation:
Box 1: Yes
Since the databases are on the same sever and the elastic pools are also on the same server,
the databases can be removed from on pool and then added to another pool.
Box 2: No
Since the elastic pool is present on another server, we can't add the database to this pool.
Box 3: Yes
Since both the database and the elastic pool are on the same server , we can add the database
to the pool.
QUESTION 106
Hotspot Question
You have an Azure web app named App1 that contains the following autoscale conditions: The
default auto created scale condition has a scale mode that has Scale to a specific instance count
set to 2.
You need to identify the number of running App1 instances. What should you identify? To
123
answer, select the appropriate options in the answer area.
Answer:
Explanation:
Box 1: 5
Scale condition 1, Scale condition 2, and Scale condition 3 applies. Scale condition 3 takes
precedence as it the largest increase in the number of instances.
Box 2: 5
Scale condition 1 does not apply as its end date is exceeded.
Scale condition 2 and Scale condition 3 applies.
Scale condition 3 takes precedence as it the largest increase in the number of instances.
When you configure multiple policies and rules, they could conflict with each other. Autoscale
uses the following conflict resolution rules to ensure that there is always a sufficient number of
instances running:
Scale-out operations always take precedence over scale-in operations.
When scale-out operations conflict, the rule that initiates the largest increase in the number of
instances takes precedence.
When scale in operations conflict, the rule that initiates the smallest decrease in the number of
124
instances takes precedence.
References:
[Link]
QUESTION 107
Hotspot Question
You have an Azure web app named App1 that contains the following autoscale conditions:
Every autoscale condition rule is configured to have a duration of 20 minutes and a cool down
time of 10 minutes.
You need to identify how many instances are running on WebApp1 based on the percentage of
the CPU utilization.
How many instances should you identify? To answer, select the appropriate options in the answer
area.
125
Answer:
Explanation:
Box 1: 3
At 6:00 the default 4 instances are running. The CPU utilization averages 10% for 25 minutes.
The scale in rules states that 1 instance should be removed when CPU utilization averages 30%
126
or less over a 20 minute period.
Box 2: 6
At 6:00 the default 4 instances are running. The CPU utilization averages 70% for 25 minutes.
The scale out rules states that 3 instances should be added when CPU utilization averages 70%
or more over a 20 minute period. However, the maximum number of instances is set at 6.
References:
[Link]
[Link]
QUESTION 108
Note: This question is part of series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant named [Link].
A user named Admin1 attempts to create an access review from the Azure Active Directory
admin center and discovers that the Access reviews settings are unavailable. Admin1 discovers
that all the other Identity Governance settings are available.
Admin1 is assigned the User administrator, Compliance administrator, and Security administrator
roles.
You need to ensure that Admin1 can create access reviews in [Link].
A. Yes
B. No
Answer: B
Explanation:
You do not use access packages for Identity Governance. Instead use Azure AD Privileged
Identity Management.
Note: PIM essentially helps you manage the who, what, when, where, and why for resources that
you care about. Key features of PIM include:
Conduct access reviews to ensure users still need roles References:
[Link]
configure
[Link]
overview
QUESTION 109
Note: This question is part of series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
127
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant named [Link].
A user named Admin1 attempts to create an access review from the Azure Active Directory
admin center and discovers that the Access reviews settings are unavailable. Admin1 discovers
that all the other Identity Governance settings are available.
Admin1 is assigned the User administrator, Compliance administrator, and Security administrator
roles.
You need to ensure that Admin1 can create access reviews in [Link].
A. Yes
B. No
Answer: B
Explanation:
Instead use Azure AD Privileged Identity Management.
Note: PIM essentially helps you manage the who, what, when, where, and why for resources that
you care about. Key features of PIM include:
Conduct access reviews to ensure users still need roles
References:
[Link]
configure
QUESTION 110
Drag and Drop Question
You have an Azure subscription that contains the resources shown in the following table.
In RG2, you need to create a new virtual machine named VM2 that will connect to VNET1. VM2
will use a network interface named VM2_Interface.
In which region should you create VM2 and VM2_Interface? To answer, drag the appropriate
regions to the correct targets. Each region may be used once, more than once, or not at all. You
may need to drag the split bar between panes or scroll to view content.
128
Answer:
Explanation:
VM2: West US
In RG2, which is in West US, you need to create a new virtual machine named VM2.
VM2_interface: East US
VM2 will use a network interface named VM2_Interface to connect to VNET1, which is in East
US.
References:
[Link]
QUESTION 111
You have an Azure subscription that contains the web apps shown in the following table.
129
For which web app can you configure a WebJob?
A. WebApp4
B. WebApp3
C. WebApp1
D. WebApp2
Answer: A
Explanation:
Publishing a .NET Core WebJob to App Service from Visual Studio uses the same tooling as
publishing an [Link] Core app.
References:
[Link]
QUESTION 112
You create a container image named Image1 on a developer workstation.
You plan to create an Azure Web App for Containers named WebAppContainer that will use
Image1.
You need to upload Image1 to Azure. The solution must ensure that WebAppContainer can use
Image1.
Answer: A
Explanation:
Configure registry credentials in web app.
App Service needs information about your registry and image to pull the private image. In the
Azure portal, go to Container settings from the web app and update the Image source, Registry
and save.
References:
[Link]
QUESTION 113
A company's development team is currently developing a Docker/Go based application. The
application needs to be deployed to the Azure Web App service using containers on the Linux
130
platform.
Currently there are no resource groups in place in the company's Azure account that supports the
Linux platform.
You must advise on the necessary and minimum number of steps to provide the ability to host the
application in the company's Azure account.
Which of the following Azure CLI commands would you recommend implementing for this
requirement? (Choose three)
A. az group update
B. az webapp update
C. az group create
D. az appservice plan create
E. az webapp create
Answer: CDE
Explanation:
[Link]
QUESTION 114
A company has an on-premise setup and a setup defined in Azure. They have gone ahead and
created an Azure Logic App named lead2pass-app. They need this app to query an on-premise
SQL database server.
Which of the following steps need to be performed to fulfil this requirement? (Choose three)
Answer: CDE
Explanation:
[Link]
QUESTION 115
Your company needs to migrate a Virtual Machine, lead2pass-vm, hosted in Amazon Web
Services to Azure using Azure Site Recovery. The following resources have been created for the
implementation
Which of the following steps would you carry out for the migration? (Choose three)
131
Answer: ACE
Explanation:
[Link]
QUESTION 116
A company wants to sync their on-premise AD with Azure AD. They have setup Azure AD
connect and configured the setup for Password hash synchronization, Single Sign-On and
staging mode is also enabled. After an initial review it can be seen that the Synchronization
Service Manager is not displaying any sync jobs.
Which of the following step would need to be carried out to resolve this issue?
Answer: C
Explanation:
[Link]
server
QUESTION 117
A company has an on-premise network. They want to setup a site-to-site VPN connection with an
Azure Virtual Network named lead2pass-net. The Virtual Network has an address space of
[Link]/16. It also has a subnet with an address space [Link]/24.
Which of the following steps would you implement for the Site to Site VPN connection? (Choose
4)
Answer: ACEF
Explanation:
[Link]
manager-portal
QUESTION 118
A company has a number of VMWare Virtual Machines that need to be migrated onto Azure. You
first have to discover and assess the virtual machines for the migration.
Which of the following steps would you implement for this requirement? (Choose 4)
132
E. Create an assessment
F. Create a backup policy
Answer: ABDE
Explanation:
[Link]
QUESTION 119
A company is developing an ecommerce web application. One of the modules of the application
will be built using a messaging solution architecture. The modules will have the following features
Which of the following would you additionally incorporate for the module?
Answer: D
Explanation:
Option A is incorrect since this is normally used for event processing.
Option B is incorrect since this is a big data ingestion service.
Option C is incorrect since this is an analytics service.
[Link]
QUESTION 120
A company has a set of 10 Virtual Machines created in their Azure subscription.
There is a requirement to ensure that an IT administrator gets an email whenever the following
operations are performed on the Virtual Machine
You need to decide on the minimum number of rules and actions groups required in Azure
Monitor for this requirement. (Choose two)
A. Three rules
B. One rule
C. One action group
D. Three action groups
Answer: AC
Explanation:
[Link]
QUESTION 121
133
A company is preparing their Azure environment for the backup of their Azure Virtual Machines.
They need to ensure the following when it comes to the backup of the Virtual Machines:
Which of the following should you configure in Azure Recovery Services vault?
A. Backup Policy
B. Backup Schedule
C. Backup Logs
D. Backup Infrastructure
Answer: A
Explanation:
[Link]
QUESTION 122
A company has a web application named lead2pass-app deployed to Azure. The Web App is
deployed using the Azure App Service based on the D1 pricing tier. The application is now being
modified and needs to accept connections on HTTPS. Which of the following needs to be done to
ensure this requirement can be fulfilled? You have to ensure that the cost is minimized for any
changes made.
Answer: B
Explanation:
Option A is incorrect since this option is used for Autoscaling purpose.
Options C and D are incorrect since these are read-only features.
[Link]
QUESTION 123
A company is planning on deploying a storage account which will be used to host files shares.
These file shares will be used by a number of Virtual Machines hosted in Azure. There is a
requirement to ensure the highest possible redundancy for the files that would be stored in the
storage account. Which of the following replication technique would you "NOT" employ for the
storage account?
Answer: D
Explanation:
[Link]
134
QUESTION 124
A development team has been instructed to implement a simple solution in Azure. The primary
requirement is to ensure that an IT administrator team is notified whenever any infrastructure
level changes are made to a virtual machine defined in their Azure subscription.
Which of the following steps can be used to implement this solution? (Choose two)
Answer: AC
Explanation:
Option B is incorrect since workflows should be defined in the Azure Logic App service.
Option D is incorrect since the Event Hub service is NOT used to check for resource level
changes.
[Link]
logic-app
QUESTION 125
Drag and Drop Question
You are the IT administrator for an Azure subscription that contains 20 virtual machines (VMs).
You need to write a Log Analytics query to determine which VMs have not been responsive within
the past hour.
How should you complete the query? To answer, drag the appropriate query elements to their
correct locations in the answer area. A query element may be used once, more than once, or not
at all.
Answer:
135
Explanation:
You should use the following query:
Heartbeat | where TimeGenerated > ago(1h)
This query finds all computers that have had a heartbeat within the past hour. Computers send a
heartbeat to let Azure know that they are responsive. The ago(1h) means the timestamp is one
hour ago. If TimeGenerated is greater than that timestamp, the heartbeat occurred within the past
hour.
You should not use Perf as a source. This source looks at performance counters. In this scenario,
you need to search the Heartbeat source, not performance counters.
You should not use the following query:
Heartbeat | where TimeGenerated < ago(1h)
This query finds all computers that have sent a heartbeat before one hour ago.
QUESTION 126
Drag and Drop Question
An Azure key vault named measureup exists in your company's cloud subscription. You want to
store a password in the key vault. The password is S3449PT!@90Q.
The name of the entry should be ApplicationPassword. The password should not be stored as
plain text.
You need to use PowerShell to store the password in the key vault.
How should you complete the cm diets? To answer, drag the cm diets to the appropriate locations
in the answer area. A cmdlet may be used once, more than once, or not at all.
Answer:
136
Explanation:
You should use the following cmdlets:
$value = ConvertTo-SecureString 'S3449PT!@90Q’ -AsPlainText - Force
Set-AzureKeyVaultSecret -VaultName 'measureup' -Name 'ApplicationPassword' -Sec ret Value
$value
The ConvertTo-SecureString cmdlet converts a plain text value into a secure (encrypted) string.
This meets the requirement of the password not being stored as plain text. The first parameter to
this cmdlet is the string to convert. The -AsPlainText parameter indicates that the string to convert
it plain text. The -Force parameter must be used when -AsPlainText is used to verify that you
understand the implications of using - AsPlainText.
The Set-AzureKeyVaultSecret cmdlet stores the password in the key vault with the name
specified as the - Name parameter. The -SecretValue parameter specifies the secret. In this
scenario, the secret is the encrypted password.
You should not use Add-AzureKeyVaultKey. This cmdlet generates a software or hardware key
and saves it in a key vault. In this scenario, you need to store a known secret, not generate a key.
QUESTION 127
Drag and Drop Question
You are the cloud administrator for your company. You want to take advantage of Event Grid so
that Service Bus and blob storage events are captured.
You need to use Azure CLI to enable your Azure subscription to send events to Event Grid.
How should you write the command? To answer, drag the appropriate command segment to
each location. A command segment may be used once, more than once, or not at all.
Answer:
137
Explanation:
You should use the following command:
az provider register --namespace [Link]
This command registers the Event Grid resource provider. This allows your subscription to send
events to Event Grid.
You should not use the eventgrid or create command segments. These two segments allow you
to create an Event Grid subscription to either a custom topic or to a resource.
QUESTION 128
You pull a Dockerfile from an online repository. You build a container image from this file, and you
want to add it to an Azure Container Registry named mytestreg. The name of image is my-test-
app.
You need to deploy the image to the registry.
Which command should you run from your developer computer?
Answer: C
Explanation:
You should use the following command: docker push [Link]/my-test-app
This command pushes the image named my-test-app to an Azure login server named
[Link]. You should not use the following command: docker run -p mytestreg my-
test-app
This command runs a container locally. In this scenario, you need to deploy the container image.
You should not use the following command: az acr create --name mytestreg\my-test-app The az
acr create command creates an Azure Container Registry.
You should not use the following command:
az container create --name mytestreg --image my-test-app
The az container create command creates a container instance in Azure.
QUESTION 129
Case Study 1 - Contoso, Ltd
Overview
Contoso, Ltd. is a manufacturing company that has offices worldwide. Contoso works with partner
organizations to bring products to market.
Contoso products are manufactured by using blueprint files that the company authors and
maintains.
Existing Environment
138
Currently, Contoso uses multiple types of severs for business operations, including the following:
File servers
Domain controllers
Microsoft SQL Server servers
Your network contains an Active Directory forest named [Link]. All servers and client
computers are joined to Active Directory.
You have a public-facing application named App1. App1 is comprised of the following three tiers:
A SQL database
A web front end
A processing middle tier
Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS
only.
Requirements
Planned Changes
Contoso plans to implement the following changes to the infrastructure:
Move all the tiers of App1 to Azure.
Move the existing product blueprint files to Azure Blob storage.
Create a hybrid directory to support an upcoming Microsoft Office 365 migration project.
Technical Requirements
Contoso must meet the following technical requirements:
Move all the virtual machines for App1 to Azure.
Minimize the number of open ports between the App1 tiers.
Ensure that all the virtual machines for App1 are protected by backups.
Copy the blueprint files to Azure over the Internet.
Ensure that the blueprint files are stored in the archive storage tier.
Prevent user passwords or hashes of passwords from being stored in Azure.
Use unmanaged standard storage for the hard disks of the virtual machines.
Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a
mobile phone to verify their identity.
Minimize administrative effort whenever possible.
User Requirements
Contoso identifies the following requirements for users:
Ensure that only users who are part of a group named Pilot can join devices to Azure AD.
Designate a new user named Admin1 as the service admin for the Azure subscription.
Admin1 must receive email alerts regarding service outages.
Ensure that a new user named User3 can create network objects for the Azure subscription.
A. From the Subscriptions blade, select the subscription, and then modify the Properties.
B. From the Subscriptions blade, select the subscription, and then modify the Access control (IAM) settings.
C. From the Azure Active Directory blade, modify the Properties.
D. From the Azure Active Directory blade, modify the Groups.
Answer: A
139
Explanation:
Change the Service administrator for an Azure subscription
- Sign in to Account Center as the Account administrator.
- Select a subscription.
- On the right side, select Edit subscription details.
Scenario: Designate a new user named Admin1 as the service administrator of the Azure
subscription.
References:
[Link]
QUESTION 130
Case Study 1 - Contoso, Ltd
Overview
Contoso, Ltd. is a manufacturing company that has offices worldwide. Contoso works with partner
organizations to bring products to market.
Contoso products are manufactured by using blueprint files that the company authors and
maintains.
Existing Environment
Currently, Contoso uses multiple types of severs for business operations, including the following:
File servers
Domain controllers
Microsoft SQL Server servers
Your network contains an Active Directory forest named [Link]. All servers and client
computers are joined to Active Directory.
You have a public-facing application named App1. App1 is comprised of the following three tiers:
A SQL database
A web front end
A processing middle tier
Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS
only.
Requirements
Planned Changes
Contoso plans to implement the following changes to the infrastructure:
Move all the tiers of App1 to Azure.
Move the existing product blueprint files to Azure Blob storage.
Create a hybrid directory to support an upcoming Microsoft Office 365 migration project.
Technical Requirements
Contoso must meet the following technical requirements:
Move all the virtual machines for App1 to Azure.
Minimize the number of open ports between the App1 tiers.
Ensure that all the virtual machines for App1 are protected by backups.
Copy the blueprint files to Azure over the Internet.
Ensure that the blueprint files are stored in the archive storage tier.
Prevent user passwords or hashes of passwords from being stored in Azure.
Use unmanaged standard storage for the hard disks of the virtual machines.
140
Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a
mobile phone to verify their identity.
Minimize administrative effort whenever possible.
User Requirements
Contoso identifies the following requirements for users:
Ensure that only users who are part of a group named Pilot can join devices to Azure AD.
Designate a new user named Admin1 as the service admin for the Azure subscription.
Admin1 must receive email alerts regarding service outages.
Ensure that a new user named User3 can create network objects for the Azure subscription.
You need to recommend an identify solution that meets the technical requirements.
What should you recommend?
A. federated single-on (SSO) and Active Directory Federation Services (AD FS)
B. password hash synchronization and single sign-on (SSO)
C. cloud-only user accounts
D. Pass-through Authentication and single sign-on (SSO)
Answer: D
Explanation:
With Pass-through Authentication the on-premises passwords are never stored in the cloud in
any form.
Scenario:
Prevent user passwords or hashes of passwords from being stored in Azure.
Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a mobile
phone to verify their identity.
Minimize administrative effort whenever possible.
Reference:
[Link]
QUESTION 131
Case Study 1 - Contoso, Ltd
Overview
Contoso, Ltd. is a manufacturing company that has offices worldwide. Contoso works with partner
organizations to bring products to market.
Contoso products are manufactured by using blueprint files that the company authors and
maintains.
Existing Environment
Currently, Contoso uses multiple types of severs for business operations, including the following:
File servers
Domain controllers
Microsoft SQL Server servers
Your network contains an Active Directory forest named [Link]. All servers and client
computers are joined to Active Directory.
You have a public-facing application named App1. App1 is comprised of the following three tiers:
A SQL database
A web front end
141
A processing middle tier
Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS
only.
Requirements
Planned Changes
Contoso plans to implement the following changes to the infrastructure:
Move all the tiers of App1 to Azure.
Move the existing product blueprint files to Azure Blob storage.
Create a hybrid directory to support an upcoming Microsoft Office 365 migration project.
Technical Requirements
Contoso must meet the following technical requirements:
Move all the virtual machines for App1 to Azure.
Minimize the number of open ports between the App1 tiers.
Ensure that all the virtual machines for App1 are protected by backups.
Copy the blueprint files to Azure over the Internet.
Ensure that the blueprint files are stored in the archive storage tier.
Prevent user passwords or hashes of passwords from being stored in Azure.
Use unmanaged standard storage for the hard disks of the virtual machines.
Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a
mobile phone to verify their identity.
Minimize administrative effort whenever possible.
User Requirements
Contoso identifies the following requirements for users:
Ensure that only users who are part of a group named Pilot can join devices to Azure AD.
Designate a new user named Admin1 as the service admin for the Azure subscription.
Admin1 must receive email alerts regarding service outages.
Ensure that a new user named User3 can create network objects for the Azure subscription.
A. Create an outgoing security rule for port 443 from the Internet.
Associate the NSG to all the subnets.
B. Create an incoming security rule for port 443 from the Internet.
Associate the NSG to all the subnets.
C. Create an incoming security rule for port 443 from the Internet.
Associate the NSG to the subnet that contains the web servers.
D. Create an outgoing security rule for port 443 from the Internet.
Associate the NSG to the subnet that contains the web servers.
Answer: C
Explanation:
As App1 is public-facing we need an incoming security rule, related to the access of the web
servers.
Scenario: You have a public-facing application named App1. App1 is comprised of the following
three tiers: a SQL database, a web front end, and a processing middle tier. Each tier is comprised
142
of five virtual machines. Users access the web front end by using HTTPS only.
QUESTION 132
Case Study 1 - Contoso, Ltd
Overview
Contoso, Ltd. is a manufacturing company that has offices worldwide. Contoso works with partner
organizations to bring products to market.
Contoso products are manufactured by using blueprint files that the company authors and
maintains.
Existing Environment
Currently, Contoso uses multiple types of severs for business operations, including the following:
File servers
Domain controllers
Microsoft SQL Server servers
Your network contains an Active Directory forest named [Link]. All servers and client
computers are joined to Active Directory.
You have a public-facing application named App1. App1 is comprised of the following three tiers:
A SQL database
A web front end
A processing middle tier
Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS
only.
Requirements
Planned Changes
Contoso plans to implement the following changes to the infrastructure:
Move all the tiers of App1 to Azure.
Move the existing product blueprint files to Azure Blob storage.
Create a hybrid directory to support an upcoming Microsoft Office 365 migration project.
Technical Requirements
Contoso must meet the following technical requirements:
Move all the virtual machines for App1 to Azure.
Minimize the number of open ports between the App1 tiers.
Ensure that all the virtual machines for App1 are protected by backups.
Copy the blueprint files to Azure over the Internet.
Ensure that the blueprint files are stored in the archive storage tier.
Prevent user passwords or hashes of passwords from being stored in Azure.
Use unmanaged standard storage for the hard disks of the virtual machines.
Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a
mobile phone to verify their identity.
Minimize administrative effort whenever possible.
User Requirements
Contoso identifies the following requirements for users:
Ensure that only users who are part of a group named Pilot can join devices to Azure AD.
Designate a new user named Admin1 as the service admin for the Azure subscription.
143
Admin1 must receive email alerts regarding service outages.
Ensure that a new user named User3 can create network objects for the Azure subscription.
Hotspot Question
You need to configure the Device settings to meet the technical requirements and the user
requirements.
Which two settings should you modify? To answer, select the appropriate settings in the answer
area.
Answer:
144
Explanation:
Box 1: Selected
Only selected users should be able to join devices
Box 2: Yes
Require Multi-Factor Auth to join devices.
From scenario:
- Ensure that only users who are part of a group named Pilot can join devices to Azure AD
- Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a
mobile phone to verify their identity.
QUESTION 133
Note: This question is part of a series of questions that present the same scenario. Each
145
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
Your company is deploying an on-premises application named Appl. Users will access App1 by
using a URL of [Link]
You register App1 in Azure Active Directory (Azure AD) and publish Appl by using the Azure AD
Application Proxy.
You need to ensure that Appl appears in the My Apps portal for all the users.
Solution: You configure the delegated permission for Appl in Azure AD.
A. Yes
B. No
Answer: A
QUESTION 134
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
Your company is deploying an on-premises application named Appl. Users will access App1 by
using a URL of [Link]
You register App1 in Azure Active Directory (Azure AD) and publish Appl by using the Azure AD
Application Proxy.
You need to ensure that Appl appears in the My Apps portal for all the users.
Solution: You create an offer for App1 and publish the offer to Azure Marketplace.
A. Yes
B. No
Answer: A
QUESTION 135
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
146
these questions will not appear in the review screen.
Your company is deploying an on-premises application named Appl. Users will access App1 by
using a URL of [Link]
You register App1 in Azure Active Directory (Azure AD) and publish Appl by using the Azure AD
Application Proxy.
You need to ensure that Appl appears in the My Apps portal for all the users.
A. Yes
B. No
Answer: B
QUESTION 136
You have an Azure SQL database named Db1 that runs on an Azure SQL server named
SQLserver1. You need to ensure that you can use the query editor on the Azure portal to query
Db1.
What should you do?
Answer: B
Explanation:
[Link]
QUESTION 137
Your company plans to develop an application that will use a NoSQL database. The database will
be used to store transactions and customer information by using JSON documents.
Which two Azure Cosmos DB APIs can developers use for the application? Each correct answer
presents a complete solution. NOTE: Each correct selection is worth one point.
A. Cassandra
B. Gremlin (graph)
C. MongoDB
D. Azure Table
E. Core (SQL)
Answer: BE
Explanation:
The SQL API supports cross-document transactions expressed as JavaScript-stored procedures
and triggers. Transactions are scoped to a single partition within each container and executed
with ACID semantics as "all or nothing," isolated from other concurrently executing code and user
requests. If exceptions are thrown through the server-side execution of JavaScript application
code, the entire transaction is rolled back.
147
Azure Cosmos DB is Microsoft's globally distributed, multi-model database service. Where multi-
model means Azure Cosmos DB supports multiple APIs and multiple data models, different APIs
use different data formats for storage and wire protocol. For example, SQL uses JSON,
MongoDB uses BSON, Table uses EDM, Cassandra uses CQL, Gremlin uses JSON format. As a
result, we recommend using the same API for all access to the data in a given account.
Each API operates independently, except the Gremlin and SQL API, which are interoperable.
Reference:
[Link]
QUESTION 138
You have an Azure Cosmos DB account named Account1. Account1 includes a database named
DB1 that contains a container named Container 1. The partition key tor Container1 is set to /city.
You plan to change the partition key for Container1.
What should you do first?
A. Delete Container1
B. Create a new container in DB1
C. Regenerate the keys for Account1.
D. Implement the Azure [Link] SDK
Answer: B
Explanation:
The good news is that there are two features, the Change Feed Processor and Bulk Executor
Library, in Azure Cosmos DB that can be leveraged to achieve a live migration of your data from
one container to another. This allows you to re-distribute your data to match the desired new
partition key scheme, and make the relevant application changes afterwards, thus achieving the
effect of "updating your partition key".
Reference:
[Link]
QUESTION 139
You have the Azure virtual networks shown in the following table.
148
You deploy an Azure bastion named Bastion1 to VNET1.
A. VM1 only
B. VM1 and VM2 only
C. VM2 and VM3 only
D. VM1, VM2, and VM3
Answer: A
Explanation:
Connect to a VM through Azure Bastion.
When you click on Connect in an Azure VM, you have an additional option called Bastion. In
order to get this option, the Azure VM must belong to the same virtual network as the Azure
Bastion.
Reference:
[Link]
QUESTION 140
You have Azure virtual machines that have Update Management enabled. The virtual machines
are configured as shown in the following table.
You need to ensure that all critical and security updates are applied to each virtual machine every
month. What is the minimum number of update deployments you should create?
A. 4
B. 6
C. 1
D. 2
Answer: A
Explanation:
One for the Windows VMs, and for each type of Linux VM.
Reference:
[Link]
QUESTION 141
You have an Azure Active Directory (Azure AD) tenant linked to an Azure subscription. The
tenant contains a group named Admins.
149
You need to prevent users, except for the members of Admins, from using the Azure portal and
Azure PowerShell to access the subscription.
What should you do?
Answer: C
Explanation:
Typically, you use Conditional Access to control access to your cloud apps. You can also set up
policies to control access to Azure management.
The policy you create applies to all Azure management endpoints, including the following:
Azure portal
Azure Resource Manager provider
Classic Service Management APIs
Azure PowerShell
Visual Studio subscriptions administrator portal
Azure DevOps
Azure Data Factory portal
To create a policy for Azure management, you select Microsoft Azure Management under Cloud
apps when choosing the app to which to apply the policy.
150
Incorrect Answers:
A: From User Settings you can only restrict access to Azure Portal, not access to Azure
Powershell.
Note: Microsoft allows restricting standard user access to Azure Active Directory administration
portal.
151
Reference:
[Link]
management
[Link]
QUESTION 142
You have Azure virtual machines deployed to three Azure regions. Each region contains a single
virtual network that has four virtual machines on the same subnet. Each virtual machine runs an
application named App1. App1 is accessible by using HTTPS. Currently, the virtual machines are
inaccessible from the internet.
You need to use Azure Front Door to load balance requests for App1 across all the virtual
machines. Which additional Azure service should you provision?
Answer: C
Explanation:
Can we deploy Azure Load Balancer behind Front Door?
152
Azure Front Door needs a public VIP or a publicly available DNS name to route the traffic to.
Deploying an Azure Load Balancer behind Front Door is a common use case.
Reference:
[Link]
QUESTION 143
You create the Azure resources shown in the following table.
You attempt to add a role assignment to a resource group as shown in the following exhibit.
What should you do to ensure that you can assign VM2 the Reader role for the resource group?
153
C. Configure Access control (IAM) on VM2.
D. Assign a managed identity to VM2.
Answer: C
Explanation:
After you've configured an Azure resource with a managed identity, you can give the managed
identity access to another resource, just like any security principal.
Reference:
[Link]
resources/howto-assign-access-portal
QUESTION 144
You have an Azure Container Registry and an Azure container instance.
You pull an image from the registry, and then update the local copy of the image.
You need to ensure that the updated image can be deployed to the container instance.
The solution must ensure that you can deploy the updated image or the previous version of the
image.
What should you do?
A. Run the docker image push command and specify the tag parameter.
B. Run the az image copy command and specify the tag parameter.
C. Run the az aks update command and specify the attach-acr parameter.
D. Run the kubect1 apply command and specify the dry-run parameter.
Answer: B
QUESTION 145
You have an Azure Service Bus and two clients named Client1 and Client2.
You create a Service Bus queue named Queue1 as shown in the exhibit.
154
Client1 sends messages to Queue1 as shown in the following table.
A. Client2 will read four messages in the following order: M3, M2, M1, and then M3.
B. Client2 will read three messages in the following order: M3, M2, and then M1.
C. Client2 will read four messages in the following order; M3, M1, M2, and then M3.
D. Client2 will read three messages in the following order: M1, M2. and then M3
E. Client2 will read three messages in the following order: M3, M1, and then M2.
155
Answer: B
Explanation:
Duplicate is enabled, and the duplication detection window is set to 10 minutes. The second M3
message in the queue will be discarded.
Note 1: Duplicate detection enables the sender resend the same message, and the queue or
topic discards any duplicate copies.
Note 2: Queues offer First In, First Out (FIFO) message delivery to one or more competing
consumers. That is, receivers typically receive and process messages in the order in which they
were added to the queue, and only one message consumer receives and processes each
message.
References:
[Link]
subscriptions
[Link]
QUESTION 146
You have an on-premises virtual machine named VM1 configured as shown in the following
exhibit.
156
VM is started.
You need to create a new virtual machine image in Azure from VM1.
Which three actions should you perform before you create the new image? Each correct answer
presents part of the solution.
NOTE: Each correct selection is worth one point.
Answer: BCF
Explanation:
157
Sysprep removes all your personal account and security information, and then prepares the
machine to be used as an image.
The Add-AzureVhd cmdlet uploads on-premises virtual hard disks, in .vhd file format, to a blob
storage account as fixed virtual hard disks.
Reference:
[Link]
azurermvhd?view=azurermps-6.13.0
[Link]
QUESTION 147
You have an Azure subscription named Subscription1 that contains an Azure virtual network
named VNet1. VNet1 connects to your on-premises network by using Azure ExpressRoute.
You need to connect VNet1 to the on-premises network by using a site-to-site VPN.
The solution must minimize cost.
Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Answer: ABC
Explanation:
[Link]
vpn-gateway-between-azure-and-on-premise
QUESTION 148
You plan to create an Azure Storage account named storage! that will store blobs and be
accessed by Azure Databricks.
You need to ensure that you can set permissions for individual blobs by using Azure Active
Directory (Azure AD) authentication.
Which Advanced setting should you enable for storage1?
A. Hierarchical namespace
B. Large file shares
C. Blob soft delete
D. NFSv3
Answer: A
Explanation:
Question: Do I have to enable support for ACLs?
No. Access control via ACLs is enabled for a storage account as long as the Hierarchical
Namespace (HNS) feature is turned ON.
Note 1: We [Microsoft] are pleased to share the general availability of Azure Active Directory (AD)
based access control for Azure Storage Blobs and Queues. Enterprises can now grant specific
data access permissions to users and service identities from their Azure AD tenant using Azure’s
Role-based access control (RBAC).
158
Note 2: Azure Data Lake Storage Gen2 implements an access control model that supports both
Azure role-based access control (Azure RBAC) and POSIX-like access control lists (ACLs).
You can associate a security principal with an access level for files and directories. These
associations are captured in an access control list (ACL). Each file and directory in your storage
account has an access control list. When a security principal attempts an operation on a file or
directory, An ACL check determines whether that security principal (user, group, service principal,
or managed identity) has the correct permission level to perform the operation.
Incorrect Answers:
Blob soft delete protects your data from being accidentally or erroneously modified or deleted.
When blob soft delete is enabled for a storage account, blobs, blob versions, and snapshots in
that storage account may be recovered after they are deleted, within a retention period that you
specify.
Reference:
[Link]
control-lists-on-files-and-directories
[Link]
now-generally-available/
QUESTION 149
Your network contains an on-premises Active Directory domain named [Link]. The domain
contains the users shown in the following table.
A. User4
B. User1
C. User3
D. User2
Answer: B
Explanation:
You need to have domain administrator credentials for each Active Directory forest that:
You synchronize to Azure AD through Azure AD Connect.
Contains users you want to enable for Seamless SSO.
Note: The domain administrator credentials are not stored in Azure AD Connect or in Azure AD.
They're used only to enable Seamless SSO through Azure AD Connect.
Reference:
[Link]
159
QUESTION 150
You have an Azure subscription named Subscription1 that is used by several departments at your
company. Subscription1 contains the resources in the following table.
Another administrator deploys a virtual machine named VM1 and an Azure Storage account
named Storage2 by using a single Azure Resource Manager template.
You need to view the template used for the deployment.
From which blade can you view the template that was used for the deployment?
A. Container1
B. VM1
C. Storage2
D. RG1
Answer: D
Explanation:
You can verify the deployment by exploring the resource group from the Azure portal
Reference:
[Link]
tutorial
[Link]
create-first-template?tabs=azure-powershell
QUESTION 151
A company hosts virtual machines (VMs) in an on-premises datacenter and in Azure. The on-
premises and Azure-based VMs communicate using ExpressRoute. The company wants to be
able to continue regular operations if the ExpressRoute connection fails. Failover connections
must use the Internet and must not require Multiprotocol Label Switching (MPLS) support.
You need to recommend a solution that provides continued operations.
What should you recommend?
Answer: D
Explanation:
[Link]
networking/expressroutevpn-failover
160
QUESTION 152
You plan to automate the deployment of a virtual machine scale set that uses the Windows
Server 2016 Datacenter image.
You need to ensure that when the scale set virtual machines are provisioned, they have web
server components installed.
Which two actions should you perform? Each correct answer presents part of the solution. NOTE:
Each correct selection is worth one point.
Answer: AD
Explanation:
[Link]
QUESTION 153
You have an Azure subscription that contains a resource group named RG1.
RG1 contains multiple resources.
You need to trigger an alert when the resources in RG1 consume $1,000 USD.
What should you do?
Answer: C
Explanation:
Create budgets to manage costs and create alerts that automatically notify you are your
stakeholders of spending anomalies and overspending.
To set it up, go to the Azure Portal, select 'Cost Management + Billing' -> 'Cost Management' ->
'Go to Cost Management'.
161
Note: Cost alerts are automatically generated based when Azure resources are consumed. Alerts
show all active cost management and billing alerts together in one place. When your consumption
reaches a given threshold, alerts are generated by Cost Management. There are three types of
cost alerts: budget alerts, credit alerts, and department spending quota alerts.
Reference:
[Link]
QUESTION 154
You have an Azure subscription.
You have an on-premises virtual machine named VM1.
The settings for VM1 are shown in the exhibit.
162
You need to ensure that you can use the disks attached to VM1 as a template for Azure virtual
machines.
What should you modify on VM1?
Answer: A
Explanation:
From the exhibit we see that the disk is in the VHDX format. Before you upload a Windows virtual
machines (VM) from on-premises to Microsoft Azure, you must prepare the virtual hard disk (VHD
or VHDX). Azure supports only generation 1 VMs that are in the VHD file format and have a fixed
sized disk. The maximum size allowed for the VHD is 1,023 GB. You can convert a generation 1
VM from the VHDX file system to VHD and from a dynamically expanding disk to fixed-sized.
References:
[Link]
image?toc=azurevirtual-machines windows [Link]
QUESTION 155
You have an Azure subscription that contains the storage accounts shown in the following table.
163
You enable Azure Advanced Threat Protection (ATP) for all the storage accounts.
You need to identify which storage accounts will generate Azure ATP alerts.
Which two storage accounts should you identify? Each correct answer presents part of the
solution.
NOTE: Each correct selection is worth one point.
A. storagecontoso1
B. storagecontoso2
C. storagecontoso3
D. storagecontoso4
E. storaaecontoso5
Answer: AB
Explanation:
Advanced threat protection for Azure Storage is currently available only for Blob Storage.
[Link]
protection?tabs=azure-portal
QUESTION 156
Note: This question is part of series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant that contains a group named Group1.
You need to enable multi-factor authentication (MFA) for the users in Group1 only.
Solution: From the Azure portal, you configure an authentication method policy.
A. Yes
B. No
Answer: B
Explanation:
We should use a Conditional Access policy.
Note: There are two ways to secure user sign-in events by requiring multi-factor authentication in
Azure AD. The first, and preferred, option is to set up a Conditional Access policy that requires
multi- factor authentication under certain conditions. The second option is to enable each user for
164
Azure Multi-Factor Authentication. When users are enabled individually, they perform multi-factor
authentication each time they sign in (with some exceptions, such as when they sign in from
trusted IP addresses or when the remembered devices feature is turned on). Enabling Azure
Multi-Factor Authentication using Conditional Access policies is the recommended approach.
Changing user states is no longer recommended unless your licenses don't include Conditional
Access as it requires users to perform MFA every time they sign in.
Reference:
[Link]
QUESTION 157
Note: This question is part of series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant that contains a group named Group1.
You need to enable multi-factor authentication (MFA) for the users in Group1 only.
Solution: From Multi-Factor Authentication, you select Bulk update, and you provide a CSV file
that contains the members of Group1.
A. Yes
B. No
Answer: B
Explanation:
We should use a Conditional Access policy.
Note: There are two ways to secure user sign-in events by requiring multi-factor authentication in
Azure AD. The first, and preferred, option is to set up a Conditional Access policy that requires
multi- factor authentication under certain conditions. The second option is to enable each user for
Azure Multi-Factor Authentication. When users are enabled individually, they perform multi-factor
authentication each time they sign in (with some exceptions, such as when they sign in from
trusted IP addresses or when the remembered devices feature is turned on). Enabling Azure
Multi-Factor Authentication using Conditional Access policies is the recommended approach.
Changing user states is no longer recommended unless your licenses don't include Conditional
Access as it requires users to perform MFA every time they sign in.
Reference:
[Link]
QUESTION 158
Hotspot Question
You have the Azure SQL Database servers shown in the following table.
165
You have the Azure SQL databases shown in the following table.
You create a failover group named failover1 that has the following settings:
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE:
Each correct selection is worth one point
Answer:
Explanation:
Box 1: Yes
166
DB1 is on the primary server
Box 2: No
DB3 is on the secondary server.
You can put all or several databases within an elastic pool into the same failover group.
Box 3: No
A failover group is a named group of databases managed by a single server or within a managed
instance that can fail over as a unit to another region in case all or some primary databases
become unavailable due to an outage in the primary region.
The secondary cannot be in the same region as the primary.
Reference:
[Link]
QUESTION 159
Hotspot Question
You have a hierarchy of management groups and Azure subscriptions as shown in the following
table.
167
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE:
Each correct selection is worth one point
Answer:
Explanation:
Box 1: No
You cannot remove contributor access only from RG as it's inherited from above.
Box 2: Yes
Contributor role: Grants full access to manage all resources, but does not allow you to assign
roles in Azure RBAC.
Box 3: Yes
You can add user permission on RG1 as there is no separate deny applied from the above
hierarchy.
Reference:
[Link]
QUESTION 160
Hotspot Question
You have an Azure subscription that contains a resource group named RG1.
168
You have a group named Group1 that is assigned the Contributor role for RG1.
You need to enhance security for the virtual machines in RG1 to meet the following requirements:
What should you use to meet each requirement? To answer, select the appropriate options in the
answer area. NOTE: Each correct selection is worth one point.
Answer:
Explanation:
Box 1: Azure Policy
There is a built-in policy in the Azure Policy service that allows you to block public IPs on all NICs
of a VM.
Note: Azure Policy is a powerful tool in your Azure toolbox. It allows you to enforce specific
governance principals you want to see implemented in your environment. Some key examples of
what Azure Policy allows you to do is:
169
Azure Bastion is a fully managed PaaS service that provides secure and seamless RDP and SSH
access to your virtual machines directly through the Azure Portal.
Azure Bastion is provisioned directly in your Virtual Network (VNet) and supports all VMs in your
Virtual Network (VNet) using SSL without any exposure through public IP addresses.
Incorrect Answers:
Virtual Network (VNet) service endpoint provides secure and direct connectivity to Azure services
over an optimized route over the Azure backbone network. Endpoints allow you to secure your
critical Azure service resources to only your virtual networks. Service Endpoints enables private
IP addresses in the VNet to reach the endpoint of an Azure service without needing a public IP
address on the VNet.
Reference:
[Link]
vnets/
[Link]
QUESTION 161
Hotspot Question
Your network contains an on-premises Active Directory domain named [Link] that contains
a user named User1. The domain syncs to Azure Active Directory (Azure AD). You have the
Windows 10 devices shown in the following table.
The User Sign-In settings are configured as shown in the following exhibit.
170
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE:
Each correct selection is worth one point
Answer:
QUESTION 162
Hotspot Question
You create a virtual machine scale set named Scale1. Scale1 is configured as shown in the
following exhibit.
171
The subscription contains the Azure SQL databases shown in the following table.
Use the drop-down menus to select the answer choice that completes each statement based on
the information presented in the graphic.
NOTE: Each correct selection is worth one point.
172
Answer:
Explanation:
Box 1:
The Autoscale scale out rule increases the number of VMs by 2 if the CPU threshold is 80% or
higher. The initial instance count is 4 and rises to 6 when the 2 extra instances of VMs are added.
Box 2:
The Autoscale scale in rule decreases the number of VMs by 4 if the CPU threshold is 30% or
lower. The initial instance count is 4 and thus cannot be reduced to 0 as the minimum instances
is set to 2. Instances are only added when the CPU threshold reaches 80%.
References:
[Link]
[Link]
[Link]
QUESTION 163
173
Hotspot Question
Use the drop-down menus to select the answer choice that completes each statement based on
the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Answer:
Explanation:
Note: The three different storage account options are: General-purpose v2 (GPv2) accounts,
General-purpose v1 (GPv1) accounts, and Blob storage accounts.
General-purpose v2 (GPv2) accounts are storage accounts that support all of the latest features
174
for blobs, files, queues, and tables.
- Blob storage accounts support all the same block blob features as GPv2, but are limited to
supporting only block blobs.
- General-purpose v1 (GPv1) accounts provide access to all Azure Storage services, but may not
have the latest features or the lowest per gigabyte pricing.
References:
[Link]
QUESTION 164
Hotspot Question
You have several Azure virtual machines on a virtual network named VNet1. You configure an
Azure Storage account as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on
the information presented in the graphic.
NOTE: Each correct selection is worth one point.
175
Answer:
Explanation:
Box 1: always
Endpoint status is enabled.
Box 2: Never
After you configure firewall and virtual network settings for your storage account, select Allow
trusted Microsoft services to access this storage account as an exception to enable Azure
Backup service to access the network restricted storage account.
176
Reference:
[Link]
[Link]
with-azure-storage-firewalls-and-virtual-networks/
QUESTION 165
Hotspot Question
You have an Azure subscription that includes an Azure key vault named Vault1.
You create the Azure virtual machines shown in the following table.
You enable Azure Disk Encryption for all the virtual machines and use the -VolumeType All
parameter.
You add data disks to the virtual machines as shown in the following table.
177
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Answer:
Explanation:
Premium and standard, but not basic, account types support disk encryption.
Disk encryption requires managed disks.
References:
[Link]
QUESTION 166
Hotspot Question
You have an Azure subscription named Subscription1. Subscription1 contains the resources in
the following table:
178
VNet1 is in RG1. VNet2 is in RG2. There is no connectivity between VNet1 and VNet2. An
administrator named Admin1 creates an Azure virtual machine VM1 in RG1. VM1 uses a disk
named Disk1 and connects to VNet1. Admin1 then installs a custom application in VM1.
You need to move the custom application to VNet2. The solution must minimize administrative
effort.
Which two actions should you perform? To answer, select the appropriate options in the answer
area.
NOTE: Each correct selection is worth one point.
Answer:
179
Explanation:
We cannot just move a virtual machine between networks. What we need to do is identify the disk
used by the VM, delete the VM itself while retaining the disk, and recreate the VM in the target
virtual network and then attach the original disk to it.
Reference:
[Link]
vnet-on-azure/
[Link]
azure-vm-between-vnets
QUESTION 167
Hotspot Question
You have a web server app named App1 that is hosted in three Azure regions.
You plan to use Azure Traffic Manager to distribute traffic optimally for App1.
You need to enable Real User Measurements to monitor the network latency data for App1.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
180
Answer:
Explanation:
Box 1: Select Generate key
You can configure your web pages to send Real User Measurements to Traffic Manager by
obtaining a Real User Measurements (RUM) key and embedding the generated code to web
page.
Obtain a Real User Measurements key
The measurements you take and send to Traffic Manager from your client application are
identified by the service using a unique string, called the Real User Measurements (RUM) Key.
You can get a RUM key using the Azure portal, a REST API, or by using the PowerShell or Azure
CLI.
To obtain the RUM Key using Azure portal:
- From a browser, sign in to the Azure portal. If you don't already have an account, you can sign
up for a free one-month trial.
- In the portal's search bar, search for the Traffic Manager profile name that you want to modify,
and then click the Traffic Manager profile in the results that the displayed. ?In the Traffic Manager
profile blade, click Real User Measurements under Settings.
- Click Generate Key to create a new RUM Key.
Box 2: Embed the Traffic Manager JavaScript code snippet.
Embed the code to an HTML web page
After you have obtained the RUM key, the next step is to embed this copied JavaScript into an
HTML page that your end users visit.
This example shows how to update an HTML page to add this script. You can use this guidance
to adapt it to your HTML source management workflow.
181
- Open the HTML page in a text editor
- Paste the JavaScript code you had copied in the earlier step to the BODY section of the HTML
(the copied code is on line 8 & 9, see figure 3).
Reference:
[Link]
QUESTION 168
You have an Active Directory forest named [Link].
You install and configure Azure AD Connect to use password hash synchronization as the single
sign-on (SSO) method. Staging mode is enabled.
You review the synchronization results and discover that the Synchronization Service Manager
does not display any sync jobs.
Answer: A
Explanation:
In staging mode, the server is active for import and synchronization, but it does not run any
exports. A server in staging mode is not running password sync or password writeback, even if
you selected these features during installation. When you disable staging mode, the server starts
exporting, enables password sync, and enables password writeback.
Reference:
[Link]
server
[Link]
182
QUESTION 169
Your on-premises network contains 100 virtual machines that run Windows Server 2019.
You have an Azure subscription that contains an Azure Log Analytics workspace named
Workspace1.
You need to collect errors from the Windows event logs on the virtual machines.
Which two actions should you perform? Each correct answer presents part of the solution.
Answer: BE
Explanation:
The Azure Log Analytics agent collects telemetry from Windows and Linux virtual machines in
any cloud, on-premises machines, and those monitored by System Center Operations Manager
and sends it collected
data to your Log Analytics workspace in Azure Monitor.
Note: You may also see the Log Analytics agent referred to as the Microsoft Monitoring Agent
(MMA) or OMS Linux agent.
Data is collected using the Log Analytics agent, which reads various security-related
configurations and event logs from the machine and copies the data to your workspace for
analysis.
Reference:
[Link]
[Link]
QUESTION 170
You have an Azure subscription named Subscription1.
A. Azure HDInsight
B. Azure Analysis Services
C. Linux Diagnostic Extension (LAD) 3.0
D. the AzurePerformanceDiagnostics extension
Answer: D
Explanation:
You can use extensions to configure diagnostics on your VMs to collect additional metric data.
The basic host metrics are available, but to see more granular and VM-specific metrics, you need
to install the Azure diagnostics extension on the VM. The Azure diagnostics extension allows
additional monitoring and diagnostics data to be retrieved from the VM.
183
Reference:
[Link]
QUESTION 171
You manage an Active Directory domain named [Link].
You install Azure AD Connect and connect to an Azure Active Directory (Azure AD) tenant named
[Link] without syncing any accounts.
You need to ensure that only users who have a UPN suffix of [Link] in the [Link]
domain sync to Azure AD.
A. Use the Synchronization Service Manager to modify the Metaverse Designer tab.
B. Use Azure AD Connect to customize the synchronization options.
C. Use the Synchronization Rules Editor to create a synchronization rule.
D. Use Synchronization Service Manager to modify the Active Directory Domain Services (AD DS)
Connector.
Answer: C
Explanation:
Filtering what objects are synced to Azure AD is a common request and there are many
instances where filtering by OU just doesn't cut it. One option is to filter users by their UPN suffix
so that only users with the public FQDN as their UPN suffix are synced to Azure AD (e.g.,
[Link]@[Link] would be synced while [Link]@[Link] would not).
1. Open the Synchronization Rules Editor on the server where Azure AD Connect is installed.
2. Click the Add new rule button on the View and manage your synchronization rules window.
3. Fill out the appropriate fields on the Description tab and click Next >.
4. On the Scoping filter tab, click Add group, then Add clause, add a userPrincipalName attribute
filter, and click Next >.
Attribute: userPrincipalName
Operator: ENDSWITH
184
Value: Your internal UPN suffix prefixed with @ (e.g., @[Link]). Users with this UPN
suffix will NOT be synced with Office 365.
Reference:
[Link]
QUESTION 172
You have an Azure SQL database named DB1.
You plan to create the following four tables in DB1 by using the following code.
Table1.
Table2.
185
Table3.
Table4.
A. Table1
B. Table2
C. Table3
D. Table4
Answer: B
Explanation:
Table1 references Table4. Therefore Table4 must be created before Table1.
Table2 references Table1 and Table3. Therefore Table1 and Table3 must be created before
Table2.
Note: FOREIGN KEY REFERENCES is a constraint that provides referential integrity for the data
in the column or columns. FOREIGN KEY constraints require that each value in the column exists
in the corresponding referenced column or columns in the referenced table. FOREIGN KEY
constraints can reference only columns that are PRIMARY KEY or UNIQUE constraints in the
referenced table or columns referenced in a UNIQUE INDEX on the referenced table.
186
Incorrect Answers:
A: Table1 is referenced by Table2 and should be crated before Table2.
C: Table3 is referenced by Table2 and should be crated before Table2.
D: Table4 is referenced by Table1 and should be crated before Table1.
Reference:
[Link]
ver15
QUESTION 173
You have an Azure Cosmos DB account named Account1. Account1 includes a database named
DB1 that contains a container named Container1. The partition key for Container1 is set to /city.
A. Delete Container1.
B. Create a new Azure Cosmos DB account.
C. Implement the Azure Cosmos [Link].
D. Regenerate the keys for Account1.
Answer: B
Explanation:
The Change Feed Processor and Bulk Executor Library, in Azure Cosmos DB can be leveraged
to achieve a live migration of your data from one container to another. This allows you to re-
distribute your data to match the desired new partition key scheme, and make the relevant
application changes afterwards, thus achieving the effect of "updating your partition key".
Incorrect Answers:
A: It is not possible to "update" your partition key in an existing container.
Reference:
[Link]
QUESTION 174
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an app named App1 that uses data from two on-premises Microsoft SQL Server
databases named DB1 and DB2.
You need to implement Azure services to host DB1 and DB2. The solution must support server-
side transactions across DB1 and DB2.
Solution: You deploy DB1 and DB2 as Azure SQL databases each on a different Azure SQL
Database server.
187
A. Yes
B. No
Answer: B
Explanation:
Instead deploy DB1 and DB2 to SQL Server on an Azure virtual machine.
Note: Understanding distributed transactions.
When both the database management system and client are under the same ownership (e.g.
when SQL Server is deployed to a virtual machine), transactions are available and the lock
duration can be controlled.
Reference:
[Link]
QUESTION 175
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an app named App1 that uses data from two on-premises Microsoft SQL Server
databases named DB1 and DB2.
You need to implement Azure services to host DB1 and DB2. The solution must support server-
side transactions across DB1 and DB2.
Solution: You deploy DB1 and DB2 as Azure SQL databases on the same Azure SQL Database
server.
A. Yes
B. No
Answer: B
Explanation:
Instead deploy DB1 and DB2 to SQL Server on an Azure virtual machine.
Note: Understanding distributed transactions.
When both the database management system and client are under the same ownership (e.g.
when SQL Server is deployed to a virtual machine), transactions are available and the lock
duration can be controlled.
Reference:
[Link]
QUESTION 176
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
188
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have a server named Server1 that runs Windows Server 2019. Server1 is a container host.
You need to add a file named [Link] from Server1 to a folder named C:\Folder1 in the container
image.
A. Yes
B. No
Answer: B
Explanation:
Copy is the correct command to copy a file to the container image.
Reference:
[Link]
[Link]
QUESTION 177
You create an Azure Kubernetes Service (AKS) cluster configured as shown in the exhibit. (Click
the Exhibit tab.)
189
You deploy a containerized application named App1 to the agentPool node pool.
You need to create a containerized application named App2 that runs on four nodes of size DS3
v2.
190
A. Upgrade the AKS cluster.
B. Create a new node pool.
C. Modify the autoscaling settings for the agentPool node.
D. Enable virtual nodes for the AKS cluster.
Answer: B
Explanation:
Changing the agent size is not allowed. In the future Microsft plans to support multiple node pools
wherein you can create different pools with different VM sizes.
Reference:
[Link]
QUESTION 178
You create an Azure Kubernetes Service (AKS) cluster and an Azure Container Registry.
You need to perform continuous deployments of a containerized application to the AKS cluster as
soon as the image updates in the registry.
Answer: D
Explanation:
You can implement a Continuous Deployment pipeline.
Example:
191
Dockerfile is checked out from Github.
Stage 2: Docker builds an image from the Dockerfile and then the image is tagged with the build
number.
Additionally, the latest tag is also attached to the image for the containers to use.
Stage 3: We have default deployment and service YAML files stored on the Jenkins server.
Jenkins makes a copy of the default YAML files, make the necessary changes according to the
build and put them in a separate folder.
Stage 4: kubectl was initially configured at the time of setting up AKS on the Jenkins server. The
YAML files are fed to the kubectl util which in turn creates pods and services.
Reference:
[Link]
azure-container-registry-jenkins-ca337940151b
QUESTION 179
You have an Azure web app that runs in a Premium App Service plan.
You need to ensure that the app can be switched from the current version to the new version.
The solution must meet the following requirements:
- Provide the developers with the ability to test the app in Azure
prior to switching versions.
- Testing must use the same app instance.
- Ensure that the app version can be rolled back.
- Minimize downtime.
Answer: A
Explanation:
Azure Functions deployment slots allow your function app to run different instances called "slots".
Slots are different environments exposed via a publicly available endpoint. One app instance is
always mapped to the production slot, and you can swap instances assigned to a slot on
demand.
There are a number of advantages to using deployment slots. The following scenarios describe
common uses for slots:
Different environments for different purposes: Using different slots gives you the opportunity to
differentiate app instances before swapping to production or a staging slot.
Easy fallbacks: After a swap with production, the slot with a previously staged app now has the
previous production app. If the changes swapped into the production slot aren't as you expect,
you can immediately reverse the swap to get your "last known good instance" back.
Prewarming
Reference:
[Link]
QUESTION 180
Note: This question is part of a series of questions that present the same scenario. Each
192
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You install Azure AD Connect and connect to an Azure Active Directory (Azure AD) tenant named
[Link] without syncing any accounts.
You need to ensure that only users who have a UPN suffix of [Link] in the [Link]
domain sync to Azure AD.
A. Yes
B. No
Answer: B
Explanation:
Instead use Synchronization Rules Editor to create a synchronization rule.
Note: Filtering what objects are synced to Azure AD is a common request and there are many
instances where filtering by OU just doesn't cut it. One option is to filter users by their UPN suffix
so that only users with the public FQDN as their UPN suffix are synced to Azure AD (e.g.,
[Link]@[Link] would be synced while [Link]@[Link] would not).
Filtering can be configured using either the GUI (Synchronization Rules Editor) or PowerShell.
Reference:
[Link]
QUESTION 181
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You install Azure AD Connect and connect to an Azure Active Directory (Azure AD) tenant named
[Link] without syncing any accounts.
You need to ensure that only users who have a UPN suffix of [Link] in the [Link]
domain sync to Azure AD.
193
A. Yes
B. No
Answer: A
Explanation:
Filtering what objects are synced to Azure AD is a common request and there are many
instances where filtering by OU just doesn't cut it. One option is to filter users by their UPN suffix
so that only users with the public FQDN as their UPN suffix are synced to Azure AD (e.g.,
[Link]@[Link] would be synced while [Link]@[Link] would not).
1. Open the Synchronization Rules Editor on the server where Azure AD Connect is installed.
2. Click the Add new rule button on the View and manage your synchronization rules window.
3. Fill out the appropriate fields on the Description tab and click Next >.
4. On the Scoping filter tab, click Add group, then Add clause, add a userPrincipalName attribute
filter, and click Next >.
Attribute: userPrincipalName
Operator: ENDSWITH
Value: Your internal UPN suffix prefixed with @ (e.g., @[Link]). Users with this UPN
suffix will NOT be synced with Office 365.
194
Reference:
[Link]
QUESTION 182
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You install Azure AD Connect and connect to an Azure Active Directory (Azure AD) tenant named
[Link] without syncing any accounts.
You need to ensure that only users who have a UPN suffix of [Link] in the [Link]
domain sync to Azure AD.
Solution: You use the Synchronization Service Manager to modify the Active Directory Domain
Services (AD DS) Connector.
A. Yes
B. No
Answer: B
Explanation:
195
Instead use Synchronization Rules Editor to create a synchronization rule.
Note: Filtering what objects are synced to Azure AD is a common request and there are many
instances where filtering by OU just doesn't cut it. One option is to filter users by their UPN suffix
so that only users with the public FQDN as their UPN suffix are synced to Azure AD (e.g.,
[Link]@[Link] would be synced while [Link]@[Link] would not).
Filtering can be configured using either the GUI (Synchronization Rules Editor) or PowerShell.
Reference:
[Link]
QUESTION 183
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an app named App1 that uses data from two on-premises Microsoft SQL Server
databases named DB1 and DB2.
You need to implement Azure services to host DB1 and DB2. The solution must support server-
side transactions across DB1 and DB2.
Solution: You deploy DB1 and DB2 to SQL Server on an Azure virtual machine.
A. Yes
B. No
Answer: A
Explanation:
Understanding distributed transactions.
When both the database management system and client are under the same ownership (e.g.
when SQL Server is deployed to a virtual machine), transactions are available and the lock
duration can be controlled.
Reference:
[Link]
QUESTION 184
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an Azure Cosmos DB database that contains a container named Container1. The
196
partition key for Container1 is set to /day. Container1 contains the items shown in the following
table.
You need to programmatically query Azure Cosmos DB and retrieve Item1 and Item2 only.
SELECT id FROM c
WHERE [Link] = "Mon" OR [Link] = "Tue"
A. Yes
B. No
Answer: B
Explanation:
Returns Item1 only as EnableCrossPartitionQuery property to False. If
EnableCrossPartitionQuery property is set to true, it will return Item1, Item2, and Item3.
Reference:
[Link]
[Link]
us/dotnet/api/[Link]?view=azur
197
e-dotnet
QUESTION 185
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You install Azure AD Connect and connect to an Azure Active Directory (Azure AD) tenant named
[Link] without syncing any accounts.
You need to ensure that only users who have a UPN suffix of [Link] in the [Link]
domain sync to Azure AD.
Solution: You use the Synchronization Service Manager to modify the Metaverse Designer tab.
A. Yes
B. No
Answer: B
Explanation:
Instead use Synchronization Rules Editor to create a synchronization rule.
Note: Filtering what objects are synced to Azure AD is a common request and there are many
instances where filtering by OU just doesn't cut it. One option is to filter users by their UPN suffix
so that only users with the public FQDN as their UPN suffix are synced to Azure AD (e.g.,
[Link]@[Link] would be synced while [Link]@[Link] would not).
Filtering can be configured using either the GUI (Synchronization Rules Editor) or PowerShell.
Reference:
[Link]
QUESTION 186
Your network contains an on-premises Active Directory and an Azure Active Directory (Azure AD)
tenant.
Your Azure subscription contains several web apps that are accessed from the Internet.
You plan to use Azure Multi-Factor Authentication (MFA) with the Azure Active Directory tenant.
You need to recommend a solution to prevent users from being prompted for Azure MFA when
they access the web apps from the on-premises network.
A. an Azure policy
198
B. trusted IPs
C. a site-to-site VPN between the on-premises network and Azure
D. an Azure ExpressRoute circuit
Answer: B
Explanation:
The Trusted IPs feature of Azure Multi-Factor Authentication is used by administrators of a
managed or federated tenant. The feature bypasses two-step verification for users who sign in
from the company intranet. The feature is available with the full version of Azure Multi-Factor
Authentication, and not the free version for administrators.
Reference:
[Link]
mfasettings#trusted-ips
QUESTION 187
You have the following Azure Active Directory (Azure AD) tenants:
You need to ensure that you can assign the users in [Link] access to the resources in
Subscription1.
Answer: C
Explanation:
Azure AD Connect allows you to quickly onboard to Azure AD and Office 365.
Note: The most common topology is a single on-premises forest, with one or multiple domains,
and a single Azure AD tenant. For Azure AD authentication, password hash synchronization is
used. The express installation of Azure AD Connect supports only this topology.
Reference:
[Link]
QUESTION 188
You have several Azure web apps that use access keys to access databases.
You plan to migrate the access keys to Azure Key Vault. Each app must authenticate by using
Azure Active Directory (Azure AD) to gain access to the access keys.
What should you create in Azure to ensure that the apps can access the access keys?
A. managed identities
B. managed applications
199
C. Azure policies
D. an App Service plan
Answer: A
Explanation:
Azure Key Vault provides a way to securely store credentials and other secrets, but your code
needs to authenticate to Key Vault to retrieve them. Managed identities for Azure resources
overview helps to solve this problem by giving Azure services an automatically managed identity
in Azure AD. You can use this identity to authenticate to any service that supports Azure AD
authentication, including Key Vault, without having to display credentials in your code.
Reference:
[Link]
QUESTION 189
You have an Azure key vault named KV1.
You need to implement a process that will digitally sign the blobs stored in Azure Storage.
A. a key
B. a secret
C. a certificate
Answer: B
Explanation:
Use an Azure key vault secret to key of your blob storage account container.
Reference:
[Link]
QUESTION 190
You set the multi-factor authentication status for a user named admin1@[Link] to Enabled.
Which additional security verifications can Admin1 use when accessing the Azure portal?
A. a phone call, an email message that contains a verification code, and a text message that
contains an app password.
B. an app password, a text message that contains a verification code, and a verification code sent
from the Microsoft Authenticator app.
C. an app password, a text message that contains a verification code, and a notification sent from
the Microsoft Authenticator app.
D. a phone call, a text message that contains a verification code, and a notification or a verification
code sent from the Microsoft Authenticator app.
Answer: D
Explanation:
The Microsoft Authenticator app can help prevent unauthorized access to accounts and stop
fraudulent transactions by pushing a notification to your smartphone or tablet. Users view the
notification, and if it's legitimate, select Verify. Otherwise, they can select Deny.
Reference:
200
[Link]
methods
QUESTION 191
You have an Azure Cosmos DB account named Account1. Account1 includes a database named
DB1 that contains a container named Container1. The partition key for Container1 is set to /city.
A. Delete Container1.
B. Create a new container in DB1.
C. Implement the Azure Cosmos [Link].
D. Regenerate the keys for Account1.
Answer: B
Explanation:
The Change Feed Processor and Bulk Executor Library, in Azure Cosmos DB can be leveraged
to achieve a live migration of your data from one container to another. This allows you to re-
distribute your data to match the desired new partition key scheme, and make the relevant
application changes afterwards, thus achieving the effect of "updating your partition key".
Incorrect Answers:
A: It is not possible to "update" your partition key in an existing container.
Reference:
[Link]
QUESTION 192
You plan to automate the deployment of a virtual machine scale set that uses the Windows
Server 2016 Datacenter image.
You need to ensure that when the scale set virtual machines are provisioned, they have web
server components installed.
Which two actions should you perform? Each correct answer presents part of the solution.
Answer: CD
Explanation:
[Link]
QUESTION 193
Hotspot Question
201
You plan to deploy five virtual machines to a virtual network subnet.
Each virtual machine will have a public IP address and a private IP address.
Each virtual machine requires the same inbound and outbound security rules.
What is the minimum number of network interfaces and network security groups that you require?
To answer, select the appropriate options in the answer area.
Answer:
202
Explanation:
Box 1: 5
We have five virtual machines. Each virtual machine will have a public IP address and a private
IP address. Each will require a network interface. A public and a private IP address can be
assigned to a single network interface.
Box 2: 1
Each virtual machine requires the same inbound and outbound security rules. We can add tem to
one group.
Reference:
[Link]
practices-and-lessons-learned/
[Link]
[Link]
portal
QUESTION 194
Hotspot Question
You deploy an Azure virtual machine scale set named VSSI that contains 30 virtual machine
instances across three zones in the same Azure region. The instances host an application named
App1 that must be accessible by using HTTP and HTTPS traffic. Currently, VSS1 is inaccessible
from the internet.
You need to use Azure Load Balancer to provide access to App1 across all the instances from
the internet by using a single IP address.
What should you configure? To answer, select the appropriate options in the answer area.
203
NOTE: Each correct selection is worth one point.
Answer:
204
Explanation:
Box 1: 1
Box 3: 2
On for the HTTP traffic, and one for the HTTPs traffic.
Reference:
[Link]
QUESTION 195
Hotspot Question
You have an Azure subscription that contains the resources shown in the following table.
You need to deploy a load-balancing solution for two Azure web apps named App1 and App2 to
meet the following requirements:
Which resource should you use as the load-balancing solution for each app? To answer, select
the appropriate options in the answer area.
205
Answer:
Explanation:
Box 1: AGW1
Azure Application Gateway offers a web application firewall (WAF) that provides centralized
protection of your web applications from common exploits and vulnerabilities. Web applications
are increasingly targeted by malicious attacks that exploit commonly known vulnerabilities. SQL
injection and cross-site scripting are among the most common attacks.
206
Box 2: ELB1
Public IP addresses allow Internet resources to communicate inbound to Azure resources. Public
IP addresses also enable Azure resources to communicate outbound to Internet and public-facing
Azure services with an IP address assigned to the resource.
Note: In Azure Resource Manager, a public IP address is a resource that has its own properties.
Some of the resources you can associate a public IP address resource with are:
Virtual machine network interfaces
Internet-facing load balancers
VPN gateways
Application gateways
Reference:
[Link]
[Link]
QUESTION 196
Hotspot Question
Which two sections of the access review should you modify to meet the requirements? To
answer, select the appropriate sections in the answer area.
207
Answer:
208
Explanation:
Area 1: Start date..End Date
The access review must be enforced until otherwise configured. We set End: Never
The access review must be completed within two weeks. We set Duration (in days) to 14
209
A lack of response must not cause changes in the operational environment. We set 'If reviewers
don't respond: No change (which leave user's access unchanged)
Reference:
[Link]
QUESTION 197
You have an Azure virtual network that contains a subnet named Subnet1. Subnet1 contains 50
virtual machines. Twenty-five of the virtual machines are web servers and the other 25 are
application servers.
You need to filter traffic the web servers and the application servers by using application security
groups.
Which additional resources should you provision?
Answer: B
QUESTION 198
Your on-premises network contains several Hyper-V hosts. You have an hybrid deployment of
Azure Active Directory (Azure AD).
You create an Azure Migrate project.
You need to ensure that you can evaluate virtual machines by using Azure Migrate.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Answer: BC
QUESTION 199
You have an Azure subscription that contains the Azure SQL Database servers shown in the
following table.
The SQL Database servers have the elastic pools shown in the following table.
210
SQL1 has the SQL databases shown in the following table.
Answer: D
QUESTION 200
You have an Azure Storage account named storage! that is accessed by several applications. An
administrator manually rotates me access keys for storage1. After the rotation the applications fail
to access the storage account A developer manually modifies the applications to resolve the
issue. You need to implement a solution to rotate the access keys automatically. The solution
must minimize the need to update the applications once the solution is implemented.
What should you include in the solution?
Answer: B
QUESTION 201
You download an Azure Resource Manager templ te based on an existing virtual machine. The
template will be used to deploy 100 virtual machine
You need to modify the template to reference an administrative password.
You must prevent the password from being stored in plain text.
What should you create to store the password?
Answer: B
211
QUESTION 202
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an app named App1 that uses data from two on-premises Microsoft SQL Server
databases named DB1 and DB2.
You plan to move DB1 and DB2 to Azure.
You need to implement Azure services to host DB1 and DB2. The solution must support server-
side transactions across DB1 and D&2.
Solution: You deploy DB1 and DB2 to an Azure SQL Database managed instance.
A. Yes
B. No
Answer: B
QUESTION 203
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an app named App1 that uses data from two on-premises Microsoft SQL Server
databases named DB1 and DB2.
You plan to move DB1 and DB2 to Azure.
You need to implement Azure services to host DB1 and DB2. The solution must support server-
side transactions across DB1 and DB2.
Solution: You deploy DB1 and DB2 as Azure SQL databases on the some Azure SQL Database
server.
A. Yes
B. NO
Answer: B
QUESTION 204
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
212
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an Azure Cosmos DB database that contains a container named Container1. The
partition key for Container1 is set to/day. Container1 contains the items shown in the following
table.
You need to programmatically query Azure Cosmos DB and retrieve Item1 and Item2 only.
SELECT day
WHERE value = "10"
A. Yes
B. No
Answer: B
213
Explanation:
Returns Item1 only as EnableCrossPartitionQuery property to False. If
EnableCrossPartitionQuery property is set to true, it will return Item1 and Item3.
Reference:
[Link]
QUESTION 205
You have an Azure subscription that contains an Azure Sentinel workspace. Sentinel is
configured to monitor several Azure resources.
You need to send notification emails to resource owners when alerts or recommendations are
generated for a resource.
Answer: A
Explanation:
Currently there is no built-in functionality that notifies you via email if there is an incident that is
generated in Azure Sentinel. However, you can set up an Azure Logic App playbook to send
incident information to your email.
Reference:
[Link]
automatically/
QUESTION 206
Hotspot Question
Subscription1 contains a virtual network named VNet1 that has the subnets in the following table.
214
VM3 has multiple network adapters, including a network adapter named NIC3. IP forwarding is
enabled on NIC3. Routing is enabled on VM3.
You create a route table named RT1 that contains the routers in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Answer:
215
Explanation:
IP forwarding enables the virtual machine a network interface is attached to:
Receive network traffic not destined for one of the IP addresses assigned to any of the IP
configurations assigned to the network interface.
Send network traffic with a different source IP address than the one assigned to one of a
network interface's IP configurations.
The setting must be enabled for every network interface that is attached to the virtual machine
that receives traffic that the virtual machine needs to forward. A virtual machine can forward traffic
whether it has multiple network interfaces or a single network interface attached to it.
Box 1: Yes
The routing table allows connections from VM3 to VM1 and VM2. And as IP forwarding is enabled
on VM3, VM3 can connect to VM1.
Box 2: No
VM3, which has IP forwarding, must be turned on, in order for VM2 to connect to VM1.
Box 3: Yes
The routing table allows connections from VM1 and VM2 to VM3. IP forwarding on VM3 allows
VM1 to connect to VM2 via VM3.
References:
[Link]
[Link]
QUESTION 207
Hotspot Question
Your network contains an on-premises Active Directory domain. The domain contains the Hyper-
V failover clusters shown in the following table.
You plan to assess and migrate the virtual machines by using Azure Migate.
What is the minimum number of Azure Migrate appliances and Microsoft Azure Recovery
Services (MARS) agents required?
NOTE: Each correct select is worth one point.
216
Answer:
QUESTION 208
Hotspot Question
You have an Azure subscription that contains the virtual networks shown in the following table.
Answer:
QUESTION 209
Hotspot Question
217
Alert1 alert criteria is triggered every minute.
Use the drop-down menus to select the answer choice that completes each statement based on
the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Answer:
Explanation:
218
Box 1: 60
One alert per minute will trigger one email per minute.
Box 2: 12
No more than 1 SMS every 5 minutes can be send, which equals 12 per hour. Note: Rate limiting
is a suspension of notifications that occurs when too many are sent to a particular phone number,
email address or device. Rate limiting ensures that alerts are manageable and actionable.
The rate limit thresholds are:
SMS: No more than 1 SMS every 5 minutes.
Voice: No more than 1 Voice call every 5 minutes.
Email: No more than 100 emails in an hour.
Other actions are not rate limited.
References:
[Link]
diagnostics/[Link]
QUESTION 210
Hotspot Question
You have an on-premises data center and an Azure subscription. The data center contains two
VPN devices. The subscription contains an Azure virtual network named VNet1. VNet1 contains a
gateway subnet.
You need to create a site-to-site VPN. The solution must ensure that if a single instance of an
Azure VPN gateway fails, or a single on-premises VPN device fails, the failure will not cause an
interruption that is longer than two minutes.
What is the minimum number of public IP addresses, virtual network gateways, and local network
gateways required in Azure? To answer, select the appropriate options in the answer area.
219
Answer:
Explanation:
Box 1: 4
Two public IP addresses in the on-premises data center, and two public IP addresses in the
VNET.
The most reliable option is to combine the active-active gateways on both your network and
Azure, as shown in the diagram below.
Box 2: 2
Every Azure VPN gateway consists of two instances in an active-standby configuration. For any
planned maintenance or unplanned disruption that happens to the active instance, the standby
instance would take over (failover) automatically, and resume the S2S VPN or VNet-to-VNet
connections.
Box 3: 2
Dual-redundancy: active-active VPN gateways for both Azure and on-premises networks
Reference:
[Link]
220
QUESTION 211
You are creating an app that will transcribe speech-to-text in Chinese.
The app will use the Speech service in Azure and will authenticate by using a service principal.
You configure the app to use the Application ID of the service principal and the client secret.
Which other value should you add to the app to authenticate to the Speech service?
A. Subscription ID
B. Tenant ID
C. Application Name
D. Resource Group ID
Answer: D
QUESTION 212
You have an Azure subscription that contains the resources shown in the following table.
Answer: C
QUESTION 213
You manage a solution in Azure that consists of a single application which runs on a virtual
machine (VM).
Traffic to the application has increased dramatically.
The application must not experience any downtime and scaling must be dynamically defined.
You need to define an auto-scale strategy to ensure that the VM can handle the workload.
Which three options should you recommend? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
221
A. Deploy application automatic vertical scaling.
B. Create a VM availability set.
C. Create a VM scale set.
D. Deploy application automatic horizontal scaling.
E. Deploy a custom auto-scale implementation.
Answer: CDE
QUESTION 214
Note: This question is part of series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant named [Link]. A user named
Admin1 attempts to create an access review from the Azure Active Directory admin center and
discovers that the Access reviews settings are unavailable. Admin1 discovers that all the other
Identity Governance settings are available,
Admin1 is assigned the User administrator. Compliance administrator, and Security administrator
roles.
You need to ensure that Admin1 can create access reviews in [Link].
Solution: You purchase an Azure Active Directory Premium P2 license for [Link].
A. Yes
B. No
Answer: B
QUESTION 215
You monitor Azure virtual machines by using Azure Monitor.
You plan to restart the virtual machines when CPU usage exceeds 95 percent for more than 30
minutes.
You need to create an alert in Azure Monitor to res art the virtual machines.
The solution must minimize administrative effort.
Which type of action should you use in the alert?
A. Automation Runbook
B. Logic App
C. Webhook
D. ITSM
Answer: A
Explanation:
Automation runbooks allows you to automatically perform standard remediations in response to
VM alerts, like r starting or stopping the VM.
Previously, during VM alert rule creation you were able to specify an Automation webhook to a
222
runbook in order to run the runbook whenever the alert triggered. However, this required you to
do the work of creating the runbook, creating the webhook for the runbook, and then copying and
pasting the webhook during alert rule creation. With this new release, the process is much easier
because you can directly choose a runbook from a list during alert rule creation, and you can
choose an Automation account which will run the runbook or easily create an account.
Reference:
[Link]
runbooks/
QUESTION 216
You have an Azure subscription that contains a policy-based virtual network gateway named
GW1 and a virtual network named Vnet1.
You need to ensure that you can configure a point to-site connection from an on-premises
computer to VNet1.
Which two actions should you perform? Each correct answer presents part of the solution. NOTE:
Each correct selection is worth one point
A. Delete GW1.
B. Reset GW1.
C. Add a service endpoint to VNet1.
D. Add a connection to GW1.
E. Add a public IP address space to VNet1.
F. Create a route-based virtual network gateway.
Answer: AF
QUESTION 217
You have a server named Server1 that runs Windows Server 2019.
Server1 is a container host.
You plan to create a container image.
You create the following instructions in a text editor.
You need 10 be able to automate the container image creation by using the instructions.
To which file should you save the instructions?
A. Dockerfile
B. [Link]
C. [Link]
D. [Link]
Answer: A
QUESTION 218
You plan to create an Azure logic app that will access secrets stored in an Azure key vault.
223
You need to ensure that the logic app can authenticate to the key vault by using Azure Active
Directory (Azure AD).
What should you do?
Answer: B
QUESTION 219
You have a resource group named RG5. The access controls for RG5 are configured as shown in
the following exhibit.
224
Answer: D
Explanation:
User1, the Network Contributor, can create and manage networks, but not access to them. Prvi,
the Owner, can create and manage resources of all types.
References:
[Link]
QUESTION 220
You create the user-assigned identities shown in the following table.
- Name:VM1
- Location: West US
- Resource group: RG1
Answer: B
QUESTION 221
Hotspot Question
You have an Azure subscription that contains a virtual network named VNet1. VNet1 uses an IP
address space of [Link]/16 and contains the subnets in the following table.
How should you configure RT1? To answer, select the appropriate options in the answer area.
225
Answer:
Explanation:
Box 1: [Link]/24
Address space of sbbnet 1 as routing should be made through vm1.
References:
[Link]
QUESTION 222
Hotspot Question
- Secure all communications by using Secured Socket layer (SSL) SSL encryption and decryption
must be processed efficiently to support high traffic load on the web application
- Protect the web application from web vulnerabilities and attacks without modification to backend
226
code
- Optimize web application responsiveness and reliability by routing HTTP request and responses
to the endpoint with the lowest network latency for the client.
Answer:
227
Explanation:
Box 1: Azure application Gateway
Azure Application Gateway supports end-to-end encryption of traffic. Application Gateway
terminates the SSL connection at the application gateway. The gateway then applies the routing
rules to the traffic, re-encrypts the packet and forwards the packet to the appropriate back-end
server based on the routing rules defined. Any response from the web server goes through the
same process back to the end user.
References:
[Link]
powershell
[Link]
[Link]
228