Question #26
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
You have been informed by your superiors of the companyג€™s intentions to automate server deployment to Azure. There is, however, some concern that administrative credentials could be uncovered during this process.
You are required to make sure that during the deployment, the administrative credentials are encrypted using a suitable Azure solution.
Solution: You recommend the use of Azure Information Protection.
Does the solution meet the goal?
- A. Yes
- B. No
Correct Answer: B
Question #27
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
You have been informed by your superiors of the companyג€™s intentions to automate server deployment to Azure. There is, however, some concern that administrative credentials could be uncovered during this process.
You are required to make sure that during the deployment, the administrative credentials are encrypted using a suitable Azure solution.
Solution: You recommend the use of Azure Key Vault.
Does the solution meet the goal?
- A. Yes
- B. No
Correct Answer: A
Question #28
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
You have been informed by your superiors of the company’s intentions to automate server deployment to Azure. There is, however, some concern that administrative credentials could be uncovered during this process.
You are required to make sure that during the deployment, the administrative credentials are encrypted using a suitable Azure solution.
Solution: You recommend the use of Azure Multi-Factor Authentication (MFA).
Does the solution meet the goal?
- A. Yes
- B. No
Correct Answer: B
Question #29
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
Your company has an Azure Active Directory (Azure AD) environment. Users occasionally connect to Azure AD via the Internet.
You have been tasked with making sure that users who connect to Azure AD via the internet from an unidentified IP address, are automatically encouraged to change passwords.
Solution: You configure the use of Azure Key Vault.
Does the solution meet the goal?
- A. Yes
- B. No
Correct Answer: B
References:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-sign-in-risk-policy
Question #30
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
Your company has an Azure Active Directory (Azure AD) environment. Users occasionally connect to Azure AD via the Internet.
You have been tasked with making sure that users who connect to Azure AD via the internet from an unidentified IP address, are automatically encouraged to change passwords.
Solution: You configure the use of Azure AD Identity Protection.
Does the solution meet the goal?
- A. Yes
- B. No
Correct Answer: A
References:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-sign-in-risk-policy
question 38, answer is B not A, these dumps are inaccurate…
Hi Jhon D,
Thanks for bringing this up, but let us highlight a few points here.
In Ques #38 Requirements are as below:
The web apps will use custom domains. [Supported by both Basic and Standard]
The web apps each require 10 GB of storage. [Supported by both Basic and Standard]
The web apps must each run in dedicated compute instances. [Basic can support only “Up to 3” and Standard can support “Up to 10“. Now in Question, It is clearly mentioned that “web apps must each run in dedicated compute instances” means one single dedicated instance is a must for 1 web app and since we have 10 web apps so we need at least 10 dedicated instances So you can’t go for Basic in this question]
Above facts can be checked at Azure official page here.
Feel free to use the comment section if we miss anything, we will try our best to provide the correct information 🙂
Thanks,
myTechMint
Simply saying that dumps are inaccurate without knowing the actual facts is not a good idea, @myTechMint explained so patiently and correctly. Thanks for providing these dumps for free, helped me to crack my exam easily without paying a cent.