DUMPS BASE EXAM DUMPS MICROSOFT AZ-303 28% OFF Automatically For You Microsoft Azure Architect Technologies 1.Topic 1, Contoso, Ltd Overview Contoso, Ltd. is a manufacturing company that has offices worldwide. Contoso works with partner organizations to bring products to market. Contoso products are manufactured by using blueprint files that the company authors and maintains. Existing Environment Currently, Contoso uses multiple types of servers for business operations, including the following: ✑ File servers 21 ✑ Domain controllers 20 e ✑ Microsoft SQL Server servers as B ps um Your network contains an Active Directory forest named contoso.com. All servers and |D client computers are joined to Active Directory. 2 .0 You have a public-facing application named App1. 14 V ns io App1 is comprised of the following three tiers: st ue ✑ A SQL database Q ✑ A web front end ps um ✑ A processing middle tier D 03 Each tier is comprised of five virtual machines. Users access the web front end by -3 using HTTPS only. Z A ft so ro Requirements ic M Planned Changes d se Contoso plans to implement the following changes to the infrastructure: ea el ✑ Move all the tiers of App1 to Azure. R ly ✑ Move the existing product blueprint files to Azure Blob storage. ew ✑ Create a hybrid directory to support an upcoming Microsoft Office 365 migration N project. Technical Requirements Contoso must meet the following technical requirements: ✑ Move all the virtual machines for App1 to Azure. ✑ Minimize the number of open ports between the App1 tiers. ✑ Ensure that all the virtual machines for App1 are protected by backups. ✑ Copy the blueprint files to Azure over the Internet. ✑ Ensure that the blueprint files are stored in the archive storage tier. ✑ Ensure that partner access to the blueprint files is secured and temporary. ✑ Prevent user passwords or hashes of passwords from being stored in Azure. ✑ Use unmanaged standard storage for the hard disks of the virtual machines. ✑ Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a mobile phone to verify their identity. Minimize administrative effort whenever possible. User Requirements Contoso identifies the following requirements for users: Ensure that only users who are part of a group named Pilot can join devices to Azure AD. Designate a new user named Admin1 as the service administrator of the Azure subscription. Ensure that a new user named User3 can create network objects for the Azure 21 subscription. 20 e as B You need to move the blueprint files to Azure. ps um What should you do? |D A. Generate a shared access signature (SAS). Map a drive, and then copy the files by 2 .0 using File Explorer. 14 V B. Use the Azure Import/Export service. ns io C. Generate an access key. Map a drive, and then copy the files by using File st ue Explorer. Q D. Use Azure Storage Explorer to copy the files. ps um Answer: D D 03 Explanation: -3 Azure Storage Explorer is a free tool from Microsoft that allows you to work with Z A ft Azure Storage data on Windows, macOS, and Linux. You can use it to upload and so ro download data from Azure blob storage. ic M Scenario: d se Planned Changes include: move the existing product blueprint files to Azure Blob ea el storage. R ly Technical Requirements include: Copy the blueprint files to Azure over the Internet. ew References: https://docs.microsoft.com/en-us/azure/machine-learning/team-data- N science-process/move-data-to-azure-blob-using-azure-storage-explorer 2.You need to implement a backup solution for App1 after the application is moved. What should you create first? A. a recovery plan B. an Azure Backup Server C. a backup policy D. a Recovery Services vault Answer: D Explanation: A Recovery Services vault is a logical container that stores the backup data for each protected resource, such as Azure VMs. When the backup job for a protected resource runs, it creates a recovery point inside the Recovery Services vault. Scenario: There are three application tiers, each with five virtual machines. Move all the virtual machines for App1 to Azure. Ensure that all the virtual machines for App1 are protected by backups. References: https://docs.microsoft.com/en-us/azure/backup/quick-backup-vm-portal 3.You are planning the move of App1 to Azure. You create a network security group (NSG). 21 You need to recommend a solution to provide users with access to App1. 20 e What should you recommend? as B A. Create an outgoing security rule for port 443 from the Internet. Associate the NSG ps um to all the subnets. |D B. Create an incoming security rule for port 443 from the Internet. Associate the NSG 2 .0 to all the subnets. 14 V C. Create an incoming security rule for port 443 from the Internet. Associate the NSG ns io to the subnet that contains the web servers. st ue D. Create an outgoing security rule for port 443 from the Internet. Associate the NSG Q to the subnet that contains the web servers. ps um Answer: C D 03 Explanation: -3 As App1 is public-facing we need an incoming security rule, related to the access of Z A ft the web servers. so ro Scenario: You have a public-facing application named App1. App1 is comprised of the ic M following three tiers: a SQL database, a web front end, and a processing middle tier. d se Each tier is comprised of five virtual machines. Users access the web front end by ea el using HTTPS only. R ly ew N 4.You need to meet the user requirement for Admin1. What should you do? A. From the Subscriptions blade, select the subscription, and then modify the Properties. B. From the Subscriptions blade, select the subscription, and then modify the Access control (IAM) settings. C. From the Azure Active Directory blade, modify the Properties. D. From the Azure Active Directory blade, modify the Groups. Answer: A Explanation: Change the Service administrator for an Azure subscription ✑ Sign in to Account Center as the Account administrator. ✑ Select a subscription. ✑ On the right side, select Edit subscription details. Scenario: Designate a new user named Admin1 as the service administrator of the Azure subscription. References: https://docs.microsoft.com/en-us/azure/billing/billing-add-change-azure- subscription-administrator 5.HOTSPOT You need to recommend a solution for App1. The solution must meet the technical requirements. 21 What should you include in the recommendation? To answer, select the appropriate 20 e options in the answer area. NOTE: Each correct selection is worth one point. as B ps um |D 2 .0 14 V ns io st ue Q ps um D 03 -3 Z A ft so ro ic M d se ea el R Answer: ly ew N 21 20 e as Explanation: B ps Box 1: 3 um One virtual network for every tier |D 2 Box 2: 1 .0 14 Only one subnet for each tier, to minimize the number of open ports. V ns Scenario: You have a public-facing application named App1. App1 is comprised of the io st following three tiers: ue Q ✑ A SQL database ps ✑ A web front end um D ✑ A processing middle tier 03 -3 Each tier is comprised of five virtual machines. Users access the web front end by Z A using HTTPS only. ft so Technical requirements: ro ic ✑ Move all the virtual machines for App1 to Azure. M d ✑ Minimize the number of open ports between the App1 tiers. se ea el R ly ew 6.HOTSPOT N You need to configure the Device settings to meet the technical requirements and the user requirements. Which two settings should you modify? To answer, select the appropriate settings in the answer area. Answer: N ew ly R el ea se d M ic ro so ft A Z -3 03 D um ps Q ue st io ns V 14 .0 2 |D um ps B as e 20 21 21 20 e as B ps um |D 2 .0 14 V ns io st ue Q ps um D 03 -3 Z A ft so ro ic M d se ea el R ly ew N Explanation: Box 1: Selected Only selected users should be able to join devices Box 2: Yes Require Multi-Factor Auth to join devices. From scenario: ✑ Ensure that only users who are part of a group named Pilot can join devices to Azure AD ✑ Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a mobile phone to verify their identity. 7.You need to recommend an identify solution that meets the technical requirements. What should you recommend? A. federated single-on (SSO) and Active Directory Federation Services (AD FS) B. password hash synchronization and single sign-on (SSO) C. cloud-only user accounts D. Pass-through Authentication and single sign-on (SSO) Answer: D Explanation: 21 Active Directory Federation Services is a feature and web service in the Windows 20 e Server Operating System that allows sharing of identity information outside a as B company’s network. ps um Scenario: Technical Requirements include: |D Prevent user passwords or hashes of passwords from being stored in Azure. 2 .0 References: https://www.sherweb.com/blog/active-directory-federation-services/ 14 V ns io st ue 8.HOTSPOT Q You need to identify the storage requirements for Contoso. ps um For each of the following statements, select Yes if the statement is true. Otherwise, D 03 select No. NOTE: Each correct selection is worth one point. -3 Z A ft so ro ic M d se ea el R ly ew N Answer: Explanation: Box 1: Yes Contoso is moving the existing product blueprint files to Azure Blob storage. 21 Use unmanaged standard storage for the hard disks of the virtual machines. We use 20 e Page Blobs for these. as B Box 2: No ps um Box 3: No |D 2 .0 14 V 9. Topic 2, Litware inc. ns io st ue Case Study Q This is a case study. Case studies are not timed separately. You can use as much ps um exam time as you would like to complete each case. However, there may be D 03 additional case studies and sections on this exam. You must manage your time to -3 Z ensure that you are able to complete all questions included on this exam in the time A ft provided. so ro ic M To answer the questions included in a case study, you will need to reference d se information that is provided in the case study. Case studies might contain exhibits and ea el other resources that provide more information about the scenario that is described in R ly the case study. Each question is independent of the other questions in this case ew study. N At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section. To start the case study To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. If the case study has an All Information tab, note that the information displayed is identical to the information displayed on the subsequent tabs. When you are ready to answer a question, click the Question button to return to the question. Overview. General Overview Litware, Inc. is a medium-sized finance company. Litware recently acquired a financial services company named Fabrikam, Ltd. Overview. Physical Locations Litware has a datacenter in Boston. Fabrikam has a datacenter in San Francisco. Existing Environment. Identity Environment The network of Litware contains an Active Directory forest named Litware.com that 21 syncs to an Azure Active Directory (Azure AD) tenant named Litware.com by using 20 e Azure AD Connect. as B Azure AD Seamless Single Sign-on (Azure AD Seamless SSO) is enabled for the ps um Litware.com tenant. |D Users at Litware have a UPN suffix of Litware.com 2 .0 Litware has an internal certification authority (CA) that is trusted by all devices. 14 V The network of Fabrikam contains an Active Directory forest named fabrikam.com. ns io Users at Fabrikam have a UPN suffix of fabrikam.com. st ue Q Existing Environment. Azure Environment ps um Litware has an Azure subscription named Sub1 that is linked to the Litware.com D 03 tenant. -3 Sub1 contains the resources shown in the following table. Z A ft so ro ic M d se ea el R ly ew N Litware has Azure Resource Manager (ARM) templates that deploy Azure Policy definitions and assignments to a management group. Fabrikam does NOT have an Azure environment. Existing Environment. On-Premises Environment The on-premises network of Litware contains the resources shown in the following table. The on-premises network of Fabrikam contains a domain member server named SERVER1 that runs Windows Server 2019. 21 20 e Existing Environment. Network Environment as B Litware has a site-to-site VPN connection to VNet1. ps um The Litware and Fabrikam datacenters are not connected. |D 2 .0 Requirements. Planned Changes 14 V Litware plans to implement the following changes: ns io ✑ Establish a trust relationship between the Litware and Fabrikam forests. st ue ✑ Migrate data from the on-premises NoSQL datastores to Azure Table storage. Q ✑ Containerize WebApp1 and deploy the app to an Azure Kubernetes Service (AKS) ps um cluster on VNet1. D 03 ✑ Create an Azure blueprint named BP1 and use the blueprint to provision a resource -3 group named RG1. Z A ft so ro Requirements. Deployment Requirements ic M Litware identifies the following deployment requirements: d se ✑ The existing ARM templates must be used for deployments to Sub1. ea el ✑ WebApp1 must be deployed to the AKS cluster without having to change the source R ly code. ew N Requirements. Authentication and Authorization Requirements Litware identifies the following authentication and authorization requirements: ✑ The Fabrikam users must be able to authenticate to the Litware.com tenant by using Azure AD Seamless SSO. ✑ The Fabrikam users and the Litware users must be able to manage the Azure resources in Sub1. ✑ Company policy must prohibit the creation of guest user accounts in the Litware.com tenant. ✑ You must be able to configure deny permissions for RG1 and for the resources in RG1. ✑ WebApp1 running on the AKS cluster must be able to retrieve secrets from KV1. Requirements. Security Requirements Litware identifies the following security requirements: ✑ On-premises Litware users must access KVI by using the private IP address of the key vault. ✑ Azure virtual machines must have all their disks encrypted, including the temporary disks. ✑ Azure Storage must encrypt all data by using keys issued by the internal CA of Litware. ✑ Inbound HTTPS traffic to WebApp1 must be inspected for SQL injection attacks. ✑ The principle of least privilege must be used. 21 You need to configure Azure AD Seamless SSO for Fabrikam. The solution must 20 e meet the authentication and authorization requirements. as B What should you install first? ps um A. the Azure AD Connect provisioning agent on SERVER1 |D B. the Azure AD Connect provisioning agent on DC1 2 .0 C. Azure AD Connect in staging mode on SERVER1 14 V D. an Azure AD Connect primary server on SERVER1 ns io Answer: A st ue Explanation: Q The Litware and Fabrikam datacenters are not connected. ps um Azure AD Connect Cloud Sync provides support for synchronizing to an Azure AD D 03 tenant from a multi-forest disconnected Active Directory forest environment. -3 Reference: https://docs.microsoft.com/en-us/azure/active-directory/cloud-sync/what-is- Z A ft cloud-sync so ro ic M d se 10.You migrate WebApp1 to Azure. ea el You need to configure the AKS cluster to enable WebApp1 to access KV1. The R ly solution must meet the authentication and authorization requirements. ew What should you do? N A. Configure Azure role-based access control (Azure R8AQ for Kubernetes Authorization. B. Configure a pod-managed identity. C. Implement pod security policies. D. Implement the Secrets Store CSl Driver. Answer: B 11.You need to ensure that the NoSQL data is encrypted. The solution must meet the security requirements. What should you do first? A. Upgrade storage2 to StorageV2 (general purpose v2). B. Create a new general-purpose v2 storage account. C. Create a new Azure Blob storage account. D. Modify the Encryption settings of storage2. Answer: B Explanation: Reference: https://docs.microsoft.com/en-us/azure/storage/common/account- encryption-key-create?toc=%2Fazure%2Fstorage%2Ftables%2Ftoc.json&tabs=portal 12.You need to ensure that you can implement Azure AD Seamless SSO for Fabrikam. The solution must meet the following requirements: 21 ✑ Support the planned changes. 20 e ✑ Meet the authentication and authorization requirements. as B What should you do? ps um A. Create a new Azure AD tenant named fabrikam.com |D B. From the Fabrikam forest, configure an additional UPN suffix of Litware.com. 2 .0 C. From the Fabrikam forest, configure all users to have a UPN suffix ofLitware.com. 14 V D. From the Litware.com tenant, add a custom domain named fabrikam com. ns io Answer: D st ue Q ps um 13.HOTSPOT D 03 You plan to migrate WebApp1 to Azure. -3 You need to implement the AKS cluster that will host WebApp1. The solution must Z A ft meet the deployment requirements. so ro What should you do? To answer, select the appropriate options in the answer area. ic M NOTE: Each correct selection is worth one point. d se ea el R ly ew N Answer: 21 Explanation: 20 e Graphical user interface, text, application as B Description automatically generated ps um |D 2 .0 14.DRAG DROP 14 V You need to ensure that the virtual machine disks are encrypted. The solution must ns io meet the security requirements. st ue Which three actions should you perform in Sub1 in sequence? To answer, move the Q ps appropriate actions from the list of actions to the answer area and arrange them in the um correct order. D 03 -3 Z A ft so ro ic M d se ea el R ly ew N Answer: Explanation: Text Description automatically generated 21 20 e as 15.You create and publish the BP1 blueprint. B ps You need to ensure that you can use BP1 to configure permissions for RG1. The um solution must meet the authentication and authorization requirements. |D 2 What should you do? .0 A. Add a read-only resource lock to Sub1. 14 V ns B. Assign an Azure role-based access control (Azure RBAC) role to Sub1. io st C. Assign an Azure role-based access control (Azure RBAC) role to BP1. ue Q D. Select the Read Only blueprint lock mode for the BP1 assignment. ps Answer: C um D Explanation: 03 -3 Reference: https://docs.microsoft.com/en-us/azure/governance/blueprints/overview Z A ft so ro ic 16.HOTSPOT M d You need to recommend a solution to provide KV1 with access to the on-premises se ea network of Litware. The solution must meet the security requirements. el R What should you include in the recommendation? To answer, select the appropriate ly ew options in the answer area. NOTE: Each correct selection is worth one point. N Answer: Explanation: Graphical user interface, text, application Description automatically generated 21 20 17.You migrate WebApp1 to Azure. e as You need to implement a traffic filtering solution for WebApp1. The solution must B ps um meet the security requirements. |D What should you do? 2 .0 A. Configure the Threat intelligence settings for FW1. 14 V B. Deploy an Azure Application Gateway to VNet1. ns C. Deploy Azure Bastion to VNet1 io st ue D. Configure an inbound rule on FW1. Q Answer: B ps um Explanation: D Reference: https://docs.microsoft.com/en-us/azure/web-application-firewall/overview 03 -3 Z A ft so ro 18. Topic 3, Misc. Questions ic M d se Note: This question is part of a series of questions that present the same scenario. ea Each question in the series contains a unique solution that might meet the stated el R goals. Some question sets might have more than one correct solution, while others ly ew might not have a correct solution. N After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have an app named App1 that uses data from two on-premises Microsoft SQL Server databases named DB1 and DB2. You plan to move DB1 and DB2 to Azure. You need to implement Azure services to host DB1 and DB2. The solution must support server-side transactions across DB1 and DB2. Solution: You deploy DB1 and DB2 as Azure SQL databases on the same Azure SQL Database server. Does this meet the goal? A. Yes B. No Answer: B Explanation: Instead deploy DB1 and DB2 to SQL Server on an Azure virtual machine. Note: Understanding distributed transactions. When both the database management system and client are under the same ownership (e.g. when SQL Server is deployed to a virtual machine), transactions are available and the lock duration can be controlled. Reference: https://docs.particular.net/nservicebus/azure/understanding- transactionality-in-azure 21 19.Note: This question is part of series of questions that present the same scenario. 20 e Each question in the series contains a unique solution that might meet the stated as B goals. Some question sets might have more than one correct solution, while others ps um might not have a correct solution. |D After you answer a question in this section, you will NOT be able to return to it. As a 2 .0 result, these questions will not appear in the review screen. 14 V You have a server named Server1 that runs Windows Server 2019. Server1 is a ns io container host. st ue You are creating a Dockerfile to build a container image. Q You need to add a file named File1.txt from Server1 to a folder named C:\Folder1 in ps um the container image. D 03 Solution: You add the following line to the Dockerfile. -3 ADD File1.txt C:/Folder1/ Z A ft You then build the container image. so ro Does this meet the goal? ic M A. Yes d se B. No ea el Answer: B R ly Explanation: ew Copy is the correct command to copy a file to the container image. The ADD N command can also be used. However, the root directory is specified as '/' and not as 'C:/'. Reference: https://docs.docker.com/develop/develop-images/dockerfile_best-practices/#add-or- copy https://docs.docker.com/engine/reference/builder/ 20.HOTSPOT You have several Azure virtual machines on a virtual network named VNet1. You configure an Azure Storage account as shown in the following exhibit. 21 20 e as B ps um |D 2 .0 14 V ns io st ue Use the drop-down menus to select the answer choice that completes each statement Q ps based on the information presented in the graphic. NOTE: Each correct selection is um D worth one point. 03 -3 Z A ft so ro ic M d se ea el R ly ew N Answer: Explanation: Box 1: Never Box 2: Never After you configure firewall and virtual network settings for your storage account, select Allow trusted Microsoft services to access this storage account as an exception to enable Azure Backup service to access the network restricted storage account. 21 20 e as B ps um |D 2 .0 14 V ns io st ue Q ps um D 03 -3 Z A ft so ro ic M d se ea el R ly ew N 21. You create an Azure Kubernetes Service (AKS) duster and an Azure Container Registry. You need to perform continuous deployments of a containerized application to the AKS cluster as soon as the image updates in the registry. What should you use to perform the deployments? A. an Azure Pipelines release pipeline B. an Azure Automation runbook C. an Azure Resource Manager template D. a kubectl script from a CRON job Answer: A Explanation: You can implement a Continuous Deployment pipeline. Example: 21 20 e as B ps um |D 2 .0 14 V ns io st ue What the pipeline accomplishes: Q ps Stage 1: The code gets pushed in the Github. The Jenkins job gets triggered um automatically. D 03 The Dockerfile is checked out from Github. -3 Z Stage 2: Docker builds an image from the Dockerfile and then the image is tagged A ft with the build number. Additionally, the latest tag is also attached to the image for the so ro containers to use. ic M Stage 3: We have default deployment and service YAML files stored on the Jenkins d se server. Jenkins makes a copy of the default YAML files, make the necessary changes ea el according to the build and put them in a separate folder. R ly Stage 4: kubectl was initially configured at the time of setting up AKS on the Jenkins ew N server. The YAML files are fed to the kubectl util which in turn creates pods and services. Reference: https://medium.com/velotio-perspectives/continuous-deployment-with- azure-kubernetes-service-azure-container-registry-jenkins-ca337940151b 22. You have an Azure virtual network that contains a subnet named Subnet1. Subnet1 contains 50 virtual machines. Twenty-five of the virtual machines are web servers and the other 25 are application servers. You need to filter traffic the web servers and the application servers by using application security groups. Which additional resources should you provision? A. Azure Private Link B. a network security group (NSG) C. a user-defined route D. Azure-firewall Answer: B Explanation: Application security groups enable you to configure network security as a natural extension of an application's structure, allowing you to group virtual machines and define network security policies based on those groups. You can filter network traffic inbound to and outbound from a virtual network subnet with a network security group. Reference: https://docs.microsoft.com/en-us/azure/virtual-network/tutorial-filter- 21 network-traffic 20 e as B ps um 23.Note: This question is part of series of questions that present the same scenario. |D Each question in the series contains a unique solution that might meet the stated 2 .0 goals. Some question sets might have more than one correct solution, while others 14 V might not have a correct solution. ns io After you answer a question in this section, you will NOT be able to return to it. As a st ue result, these questions will not appear in the review screen. Q You have an Azure Cosmos DB database that contains a container named ps um Container1. The partition key for Container1 is set to /day. D 03 Container1 contains the items shown in the following table. -3 Z A ft so ro ic M d se ea el R ly ew N 21 20 e as B ps um |D 2 .0 14 V ns io st ue You need to programmatically query Azure Cosmos DB and retrieve item1 and item2 Q ps only. um Solution: You run the following query. D 03 -3 Z A ft so ro ic M d se You set the EnableCrossPartitionQuery property to True. ea Does this meet the goal? el R A. Yes ly ew B. No N Answer: A Explanation: Returns Item1 and Item2 only. Reference: https://docs.microsoft.com/en-us/azure/cosmos-db/sql-query-where https://docs.microsoft.com/en-us/dotnet/api/microsoft.azure.documents.client.feedopti ons.enablecrosspartitionquery?view=azure-dotnet 24.DRAG DROP You are designing a solution to secure a company’s Azure resources. The environment hosts 10 teams. Each team manages a project and has a project manager, a virtual machine (VM) operator, developers, and contractors. Project managers must be able to manage everything except access and authentication for users. VM operators must be able to manage VMs, but not the virtual network or storage account to which they are connected. Developers and contractors must be able to manage storage accounts. You need to recommend roles for each member. What should you recommend? To answer, drag the appropriate roles to the correct employee types. Each role may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. NOTE: Each correct selection is worth one point. 21 20 e as B ps um |D 2 .0 14 V ns io st ue Q ps um D 03 -3 Z A ft so ro ic M d se Answer: ea el R ly ew N 21 20 e as B ps um |D 2 .0 25. You have an Azure subscription named Subscription1 that is used by several 14 V departments at your company. ns Subscription1 contains the resources in the following table. io st ue Q ps um D 03 -3 Z A ft so ro ic M d se ea el R ly ew Another administrator deploys a virtual machine named VM1 and an Azure Storage N account named Storage2 by using a single Azure Resource Manager template. You need to view the template used for the deployment. From which blade can you view the template that was used for the deployment? A. Container1 B. VM1 C. Storage2 D. RG1 Answer: D Explanation: You can verify the deployment by exploring the resource group from the Azure portal Reference: https://docs.microsoft.com/en-us/azure/azure-resource- manager/templates/deployment-manager-tutorial https://docs.microsoft.com/en-us/azure/azure-resource-manager/templates/template- tutorial-create-first-template?tabs=azure-powershell 26.You have an Azure subscription that contains the storage accounts shown in the following table. 21 20 e as B ps um |D 2 .0 14 V ns io st ue Q ps You enable Azure Advanced Threat Protection (ATP) for all the storage accounts. um D You need to identify which storage accounts will generate Azure ATP alerts. 03 Which two storage accounts should you identify? Each correct answer presents part -3 Z A of the solution. NOTE: Each correct selection is worth one point. ft so A. storagecontoso1 ro ic B. storagecontoso2 M d C. storagecontoso3 se ea D. storagecontoso4 el R E. storaaecontoso5 ly ew Answer: A,B N Explanation: Advanced threat protection for Azure Storage is currently available only for Blob Storage. https://docs.microsoft.com/en-us/azure/storage/common/storage-advanced-threat- protection?tabs=azure-portal 27.You have an Azure subscription that contains a resource group named RG1. RG1 contains multiple resources. You need to trigger an alert when the resources in RG1 consume $1,000 USD. What should you do? A. From Cost Management + Billing, add a cloud connector. B. From the subscription, create an event subscription. C. From Cost Management + Billing create a budget. D. From RG1, create an event subscription. Answer: C Explanation: Create budgets to manage costs and create alerts that automatically notify you are your stakeholders of spending anomalies and overspending. To set it up, go to the Azure Portal, select 'Cost Management + Billing' -'Cost> Management' ->'Go to Cost Management'. 21 20 e as B ps um |D 2 .0 14 V ns io st ue Q ps um D 03 -3 Z A ft so ro ic M d se ea el R ly ew N Note: Cost alerts are automatically generated based when Azure resources are consumed. Alerts show all active cost management and billing alerts together in one place. When your consumption reaches a given threshold, alerts are generated by Cost Management. There are three types of cost alerts: budget alerts, credit alerts, and department spending quota alerts. Reference: https://docs.microsoft.com/en-us/azure/cost-management- billing/manage/getting-started 28.Your company has the groups shown in the following table. The company has an Azure subscription that contains an Azure Active Directory (Azure AD) tenant named contoso.com. An administrator named Admin1 attempts to enable Enterprise State Roaming for all the users in the Managers group. Admin1 reports that the options for Enterprise State Roaming are unavailable from 21 Azure AD. 20 You verify that Admin1 is assigned the Global administrator role. e as You need to ensure that Admin1 can enable Enterprise State Roaming. B ps What should you do? um |D A. Enforce Azure Multi-Factor Authentication (MFA) for Admin1. 2 .0 B. Purchase an Azure AD Premium P1 license for each user in the Managers group. 14 C. Assign an Azure AD Privileged Identity Management (PIM) role to Admin1. V ns D. Purchase an Azure Rights Management (Azure RMS) license for each user in the io st Managers group. ue Q Answer: B ps um Explanation: D Enterprise State Roaming is available to any organization with an Azure AD Premium 03 -3 or Enterprise Mobility + Security (EMS) license. Z A References: https://docs.microsoft.com/bs-latn-ba/azure/active- ft so directory/devices/enterprise-state-roaming-enable ro ic M d se ea 29.Note: This question is part of a series of questions that present the same scenario. el R Each question in the series contains a unique solution that might meet the stated ly ew goals. Some question sets might have more than one correct solution, while others N might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have an app named App1 that uses data from two on-premises Microsoft SQL Server databases named DB1 and DB2. You plan to move DB1 and DB2 to Azure. You need to implement Azure services to host DB1 and DB2. The solution must support erver-side transactions across DB1 and DB2. Solution: You deploy DB1 and DB2 as Azure SQL databases each on a different Azure SQL Database server. Does this meet the goal? A. Yes B. No Answer: B Explanation: Instead deploy DB1 and DB2 to SQL Server on an Azure virtual machine. Note: Understanding distributed transactions. When both the database management system and client are under the same ownership (e.g. when SQL Server is deployed to a virtual machine), transactions are available and the lock duration can be controlled. Reference: https://docs.particular.net/nservicebus/azure/understanding- transactionality-in-azure 21 20 e 30.HOTSPOT as B You have an Azure subscription that contains the resource groups shown in the ps um following table. |D 2 .0 14 V ns io st ue Q ps um D 03 -3 Z A ft so You create an Azure Resource Manager template named Template1 as shown in the ro ic following exhibit. M d se ea el R ly ew N 21 20 e as B ps um |D 2 .0 14 V ns io st ue Q ps um D 03 -3 Z A ft so ro ic M d se ea el R ly ew N From the Azure portal, you deploy Template1 four times by using the settings shown in the following table. What is the result of the deployment? To answer, select the appropriate options in the 21 20 answer area. NOTE: Each correct selection is worth one point. e as B ps um |D 2 .0 14 V ns io st ue Q ps um D 03 -3 Z A ft so ro ic M d se ea el R Answer: ly ew N 21 20 e as B ps um |D 31. Note: This question is part of series of questions that present the same scenario. 2 .0 14 Each question in the series contains a unique solution that might meet the stated V goals. Some question sets might have more than one correct solution, while others ns io might not have a correct solution. st ue After you answer a question in this section, you will NOT be able to return to it. As a Q ps result, these questions will not appear in the review screen. um You have a server named Server1 that runs Windows Server 2019. Server1 is a D 03 container host. -3 Z You are creating a Dockerfile to build a container image. A ft so You need to add a file named File1.txt from Server1 to a folder named C:\Folder1 in ro the container image. ic M Solution: You add the following line to the Dockerfile. d se XCOPY File1.txt C:\Folder1\ ea el You then build the container image. R ly Does this meet the goal? ew N A. Yes B. No Answer: B Explanation: Copy is the correct command to copy a file to the container image. Furthermore, the root directory is specified as '/' and not as 'C:/'. References: https://docs.docker.com/develop/develop-images/dockerfile_best-practices/#add-or- copy https://docs.docker.com/engine/reference/builder/ 32.Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have an Azure Active Directory (Azure AD) tenant that contains a group named Group1. You need to enable multi-factor authentication (MFA) for the users in Group1 only. Solution: From the Azure portal, you configure an authentication method policy. Does this meet the goal? 21 A. Yes 20 e B. No as B Answer: B ps um Explanation: |D We should use a Conditional Access policy. 2 .0 Note: There are two ways to secure user sign-in events by requiring multi-factor 14 V authentication in Azure AD. The first, and preferred, option is to set up a Conditional ns io Access policy that requires multi-factor authentication under certain conditions. The st ue second option is to enable each user for Azure Multi-Factor Authentication. When Q users are enabled individually, they perform multi-factor authentication each time they ps um sign in (with some exceptions, such as when they sign in from trusted IP addresses or D 03 when the remembered devices feature is turned on). -3 Enabling Azure Multi-Factor Authentication using Conditional Access policies is the Z A ft recommended approach. Changing user states is no longer recommended unless so ro your licenses don't include Conditional Access as it requires users to perform MFA ic M every time they sign in. d se Reference: https://docs.microsoft.com/en-us/azure/active- ea el directory/authentication/howto-mfa-userstates R ly ew N 33.HOTSPOT Your network contains an on-premises Active Directory domain named contoso.com that contains a user named User1. The domain syncs to Azure Active Directory (Azure AD). You have the Windows 10 devices shown in the following table. The User Sign-In settings are configured as shown in the following exhibit. 21 20 e as B ps um |D 2 .0 14 V ns io st ue Q ps um D 03 -3 Z A ft so ro ic M d se ea el R ly ew N For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point Answer: 21 20 e as B ps um |D 2 .0 14 V ns Explanation: io Box 1: Yes st ue Seamless SSO needs the user's device to be domain-joined only, but it is not used on Q ps Azure AD Joined or Hybrid Azure AD joined devices. SSO on Azure AD joined, Hybrid um Azure AD joined, and Azure AD registered devices works based on the primary D 03 refresh -3 Z A token. ft so Box 2: No ro Box 3: No ic M d se ea el 34.You are implementing authentication for applications in your company. You plan to R ly ew implement self-service password reset (SSPR) and multifactor authentication (MFA) N in Azure Active Directory (Azure AD). You need to select authentication mechanisms that can be used for both MFA and SSPR. Which two authentication methods should you use? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Short Message Service (SMS) messages B. Authentication app C. Email addresses D. Security questions E. App passwords Answer: A,B Explanation: References: https://docs.microsoft.com/en-us/azure/active- directory/authentication/concept-authentication-methods SMS-based sign-in is great for front-line workers. With SMS-based sign-in, users don't need to know a username and password to access applications and services. The user instead enters their registered mobile phone number, receives a text message with a verification code, and enters that in the sign-in interface. Users can also verify themselves using a mobile phone or office phone as secondary form of authentication used during Azure Multi-Factor Authentication or self-service password reset (SSPR). The Authenticator app provides an additional level of security to your Azure AD work or school account or your Microsoft account and is available for Android, iOS, and 21 Windows Phone. With the Microsoft Authenticator app, users can authenticate in a 20 e password less way during sign-in, or as an additional verification option during self- as B service password reset (SSPR) or Azure Multi-Factor Authentication events. ps um https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept- |D authentication-methods 2 .0 14 V ns io 35.You plan to automate the deployment of a virtual machine scale set that uses the st ue Windows Server 2016 Datacenter image. You need to ensure that when the scale set Q virtual machines are provisioned, they have web server components installed. ps um Which two actions should you perform? Each correct answer presents part of the D 03 solution. NOTE: Each correct selection is worth one point. -3 A. Create a new virtual machine scale set in the Azure portal. Z A ft B. Create an automation account. so ro C. Upload a configuration script. ic M D. Modify the extensionProfile section of the Azure Resource Manager template. d se E. Create an Azure policy. ea el Answer: A,D R ly Explanation: ew References: https://docs.microsoft.com/en-us/azure/virtual-machine-scale-sets/tutorial- N install-apps- template 36.You have an Azure Cosmos DB account named Account1. Account1 includes a database named DB1 that contains a container named Container1. The partition key for Container1 is set to /city. You plan to change the partition key for Container1. What should you do first? A. Delete Container1. B. Create a new Azure Cosmos DB account. C. Implement the Azure Cosmos DB.NET.SDK. D. Regenerate the keys for Account1. Answer: B Explanation: The Change Feed Processor and Bulk Executor Library, in Azure Cosmos DB can be leveraged to achieve a live migration of your data from one container to another. This allows you to re-distribute your data to match the desired new partition key scheme, and make the relevant application changes afterwards, thus achieving the effect of “updating your partition key”. Reference: https://devblogs.microsoft.com/cosmosdb/how-to-change-your-partition- key/ 21 20 e 37.HOTSPOT as B You have an Azure subscription named Subscription1. ps um In Subscription1, you create an alert rule named Alert1. |D The Alert1 action group is configured as shown in the following exhibit. 2 .0 14 V ns io st ue Q ps um D 03 -3 Z A ft so ro ic M d se ea el R ly ew N Alert1 alert criteria is triggered every minute. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point. 21 20 e as B ps Answer: um |D 2 .0 14 V ns io st ue Q ps um D 03 -3 Z A ft so ro ic M d se ea el R ly ew N Explanation: Box 1: 60 One alert per minute will trigger one email per minute. Box 2: 12 No more than 1 SMS every 5 minutes can be send, which equals 12 per hour. Note: Rate limiting is a suspension of notifications that occurs when too many are sent to a particular phone number, email address or device. Rate limiting ensures that alerts are manageable and actionable. The rate limit thresholds are: ✑ SMS: No more than 1 SMS every 5 minutes. ✑ Voice: No more than 1 Voice call every 5 minutes. ✑ Email: No more than 100 emails in an hour. ✑ Other actions are not rate limited. References: https://github.com/MicrosoftDocs/azure- docs/blob/master/articles/monitoring-and-diagnostics/monitoring-overview-alerts.md 38.You have an Azure subscription. You have 100 Azure virtual machines. You need to quickly identify underutilized virtual machines that can have their changed to a less expensive offering. Which Wade should you use? A. Metrics 21 B. Monitor 20 e C. Customer insights as B D. Advisor ps um Answer: D |D Explanation: 2 .0 References: https://docs.microsoft.com/en-us/azure/advisor/advisor-cost- 14 V recommendations ns io st ue Q 39.You have an Azure subscription that contains an Azure key vault named ps um KeyVault1 and the virtual machines shown in the following table. D 03 -3 Z A ft so ro ic M d se ea el R ly ew N KeyVault1 has an access policy that provides several users with Create Key permissions. You need to ensure that the users can only register secrets in KeyVault1 from VM1. What should you do? A. Create a network security group (NSG) that is linked to Subnet1. B. Configure the Firewall and virtual networks settings for KeyVault1. C. Modify the access policy for KeyVault1. D. Configure KeyVault1 to use a hardware security module (HSM). Answer: C Explanation: You grant data plane access by setting Key Vault access policies for a key vault. Note 1: Grant our VM’s system-assigned managed identity access to the Key Vault. ✑ Select Access policies and click Add new. ✑ In Configure from template, select Secret Management. ✑ Choose Select Principal, and in the search field enter the name of the VM you created earlier. Select the VM in the result list and click Select. ✑ Click OK to finishing adding the new access policy, and OK to finish access policy selection. Note 2: Access to a key vault is controlled through two interfaces: the management plane and the data plane. The management plane is where you manage Key Vault itself. Operations in this plane include creating and deleting key vaults, retrieving Key Vault properties, and updating access policies. The data plane is where you work with 21 the data stored in a key vault. You can add, delete, and modify keys, secrets, and 20 e certificates. as B Reference: ps um https://docs.microsoft.com/en-us/azure/active-directory/managed-identities-azure- |D resources/tutorial-windows-vm-access-nonaad 2 .0 https://docs.microsoft.com/en-us/azure/key-vault/general/secure-your-key-vault2 14 V ns io st ue 40. HOTSPOT Q You have a web server app named App1 that is hosted in three Azure regions. ps um You plan to use Azure Traffic Manager to distribute traffic optimally for App1. D 03 You need to enable Real User Measurements to monitor the network latency data for -3 App1. Z A ft What should you do? To answer, select the appropriate options in the answer area. so ro NOTE: Each correct selection is worth one point. ic M d se ea el R ly ew N Answer:
Enter the password to open this PDF file:
-
-
-
-
-
-
-
-
-
-
-
-