Microsoft AZ-104 Full Practice Tests 12.pdf Flashcards
You have an Azure subscription that contains the virtual machines shown in the following table: (see image)
VM1 and VM2 use public IP addresses. From Windows Server 2019 on VM1 and VM2, you allow inbound Remote Desktop connections.
Subnet1 and Subnet2 are in a virtual network named VNET1. The subscription contains two network security groups (NSGs) named NSG1 and NSG2. NSG1 uses only the default rules.
NSG2 uses the default rules and the following custom incoming rule: – Priority: 100
– Name: Rule1
– Port: 3389
– Protocol: TCP
– Source: Any
– Destination: Any
– Action: Allow
NSG1 is associated to Subnet1. NSG2 is associated to the network interface of VM2. Please evaluate if the following statement is True or False.
From the Internet, you can connect to VM1 using Remote Desktop.
TRUE
FALSE
FALSE
VM1 is part of Subnet1 and NSG1 is applied at Subnet1 scope. NSG1 is using default inbound rules, which don’t allow RDP traffic. In order to allow RDP traffic, a custom inbound rule needs to be added. Reference:
https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview
Quick Preview:
You have an Azure subscription that contains the virtual machines shown in the following table: (see image)
VM1 and VM2 use public IP addresses. From Windows Server 2019 on VM1 and VM2, you allow inbound Remote Desktop connections.
Subnet1 and Subnet2 are in a virtual network named VNET1. The subscription contains two network security groups (NSGs) named NSG1 and NSG2. NSG1 uses only the default rules.
NSG2 uses the default rules and the following custom incoming rule: – Priority: 100
– Name: Rule1
– Port: 3389
– Protocol: TCP
– Source: Any
– Destination: Any
– Action: Allow
NSG1 is associated to Subnet1. NSG2 is associated to the network interface of VM2. Please evaluate if the following statement is True or False.
From the Internet, you can connect to VM2 using Remote Desktop.
TRUE
FALSE
TRUE
VM2 is part of Subnet2 and NSG2 is applied at Subnet2 scope. NSG2 is using default inbound rules and a custom inbound rule has been added as well. The custom inbound rule actually allows RDP traffic inbound, so you will be able to RDP to VM2.
NSG2 looks similar to the following network security group:
You have an Azure subscription that contains the virtual machines shown in the following table: (see image)
VM1 and VM2 use public IP addresses. From Windows Server 2019 on VM1 and VM2, you allow inbound Remote Desktop connections.
Subnet1 and Subnet2 are in a virtual network named VNET1. The subscription contains two network security groups (NSGs) named NSG1 and NSG2. NSG1 uses only the default rules.
NSG2 uses the default rules and the following custom incoming rule: – Priority: 100
– Name: Rule1
– Port: 3389
– Protocol: TCP
– Source: Any
– Destination: Any
– Action: Allow
NSG1 is associated to Subnet1. NSG2 is associated to the network interface of VM2. Please evaluate if the following statement is True or False.
From VM1, you can connect to VM2 by using Remote Desktop.
TRUE
FALSE
TRUE
VM1 and VM2 are deployed in the same VNET and traffic inside a VNET is permitted by the first rule declared in the default inbound port rules. This results in the statement being True.
Reference: https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview
Quick Preview:
You have a virtual network named VNET1 that contains the subnets shown in the following table: (see image1)
You have three Azure virtual machines that have the network configurations shown in the following table: (see image2)
For NSG1, you create the inbound security rule shown in the following table: (see image3)
For NSG2, you create the inbound security rule shown in the following table: (see image4)
Please evaluate if the following statement is True or False. VM2 can connect to TCP port 1433 services on VM1.
TRUE
FALSE
FALSE
TCP 1433 traffic originated from VM2 and going to VM1 is first evaluated by NSG1, applied at Subnet1 scope. NSG1 allows the traffic, so the traffic will next be evaluated by NSG2. NSG2 denies the traffic, so the statement is False.
Reference:
https://docs.microsoft.com/en-us/azure/virtual-network/network-security-group-how-it-works
Quick Preview:
You have a virtual network named VNET1 that contains the subnets shown in the following table: (see image1)
You have three Azure virtual machines that have the network configurations shown in the following table: (see image2)
For NSG1, you create the inbound security rule shown in the following table: (see image3)
For NSG2, you create the inbound security rule shown in the following table: (see image4)
Please evaluate if the following statement is True or False. VM1 can connect to the TCP port 1433 services on VM2.
TRUE
FALSE
TRUE
Traffic from VM1 going to VM2 would first be evaluated by an NSG applied at Subnet2 scope, because VM2 is attached to Subnet2. But these is no NSG applied at Subnet2, so traffic should then be evaluated by any NSG applied at VM2. No NSG is applied at VM2, so traffic can arrive at VM2.
Reference:
https://docs.microsoft.com/en-us/azure/virtual-network/network-security-group-how-it-works
Quick Preview:
You have a virtual network named VNET1 that contains the subnets shown in the following table: (see image1)
You have three Azure virtual machines that have the network configurations shown in the following table: (see image2)
For NSG1, you create the inbound security rule shown in the following table: (see image3)
For NSG2, you create the inbound security rule shown in the following table: (see image4)
Please evaluate if the following statement is True or False. VM2 can connect to the TCP port 1433 service on VM3.
TRUE
FALSE
TRUE
VM3 is attached to Subnet2.
No NSG is applied at either Subnet2 or VM3 scope, so traffic is allowed and the statement is true. Reference: https://docs.microsoft.com/en-us/azure/virtual-network/network-security-group-how-it-works Quick Preview:
You have the Azure virtual machines shown in the following table:
You have a Recovery Services vault that protects VM1 and VM2. You need to protect VM3 and VM4 by using Recovery Services.
What should you do first?
- Create a new Recovery Services vault
- Create a storage account
- Configure the extensions for VM3 and VM4
- Create a new backup policy
- Create a new Recovery Services vault
The Recovery Services vault must be deployed in the same region where the VM that you want to protect is deployed. For this example, a new Recovery Services vault must be created in North Europe region.
Reference:
https://docs.microsoft.com/en-us/azure/backup/backup-create-rs-vault
Quick Preview:
Case study
Overview
Contoso, Ltd. is a manufacturing company that has offices worldwide. Contoso works with partner organizations to bring products to market. Contoso products are manufactured by using blueprint files that the company authors and maintains.
Existing Environment
Currently, Contoso uses multiple types of servers for business operations, including the following:
– File servers
– Domain controllers
– Microsoft SQL Server servers
Your network contains an Active Directory forest named contoso.com. All servers and client computers are joined to Active Directory.
You have a public-facing application named App1. App1 is comprised of the following three tiers:
– A SQL database
– A web front end
– A processing middle tier
Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS only. Requirements
Planned Changes
Contoso plans to implement the following changes to the infrastructure:
– Move all the tiers of App1 to Azure.
– Move the existing product blueprint files to Azure Blob storage.
– Create a hybrid directory to support an upcoming Microsoft Office 365 migration project.
Technical Requirements
Contoso must meet the following technical requirements:
– Move all the virtual machines for App1 to Azure.
– Minimize the number of open ports between the App1 tiers.
– Ensure that all the virtual machines for App1 are protected by backups.
– Copy the blueprint files to Azure over the Internet.
– Ensure that the blueprint files are stored in the archive storage tier.
– Ensure that partner access to the blueprint files is secured and temporary.
– Prevent user passwords or hashes of passwords from being stored in Azure.
– Use unmanaged standard storage for the hard disks of the virtual machines.
– Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a mobile phone to verify their identity.
– Minimize administrative effort whenever possible.
User Requirements
Contoso identifies the following requirements for users:
– Ensure that only users who are part of a group named Pilot can join devices to Azure AD.
– Designate a new user named Admin1 as the service admin for the Azure subscription.
– Admin1 must receive email alerts regarding service outages.
– Ensure that a new user named User3 can create network objects for the Azure subscription.
QUESTION 1
You need to implement a backup solution for App1 after the application is moved. What should you create first?
1. a recovery plan
2. an Azure Backup Server
3. a backup policy
4. a Recovery Services vault
- a Recovery Services vault
A Recovery Services vault is a logical container that stores the backup data for each protected resource, such as Azure VMs. When the backup job for a protected resource runs, it creates a recovery point inside the Recovery Services vault.
From the Scenario:
Contoso must meet the following technical requirements:
– Move all the virtual machines for App1 to Azure.
– Minimize the number of open ports between the App1 tiers.
– Ensure that all the virtual machines for App1 are protected by backups
Case study
Overview
Contoso, Ltd. is a manufacturing company that has offices worldwide. Contoso works with partner organizations to bring products to market. Contoso products are manufactured by using blueprint files that the company authors and maintains.
Existing Environment
Currently, Contoso uses multiple types of servers for business operations, including the following:
– File servers
– Domain controllers
– Microsoft SQL Server servers
Your network contains an Active Directory forest named contoso.com. All servers and client computers are joined to Active Directory.
You have a public-facing application named App1. App1 is comprised of the following three tiers:
– A SQL database
– A web front end
– A processing middle tier
Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS only. Requirements
Planned Changes
Contoso plans to implement the following changes to the infrastructure:
– Move all the tiers of App1 to Azure.
– Move the existing product blueprint files to Azure Blob storage.
– Create a hybrid directory to support an upcoming Microsoft Office 365 migration project.
Technical Requirements
Contoso must meet the following technical requirements:
– Move all the virtual machines for App1 to Azure.
– Minimize the number of open ports between the App1 tiers.
– Ensure that all the virtual machines for App1 are protected by backups.
– Copy the blueprint files to Azure over the Internet.
– Ensure that the blueprint files are stored in the archive storage tier.
– Ensure that partner access to the blueprint files is secured and temporary.
– Prevent user passwords or hashes of passwords from being stored in Azure.
– Use unmanaged standard storage for the hard disks of the virtual machines.
– Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a mobile phone to verify their identity.
– Minimize administrative effort whenever possible.
User Requirements
Contoso identifies the following requirements for users:
– Ensure that only users who are part of a group named Pilot can join devices to Azure AD.
– Designate a new user named Admin1 as the service admin for the Azure subscription.
– Admin1 must receive email alerts regarding service outages.
– Ensure that a new user named User3 can create network objects for the Azure subscription.
QUESTION 2
You need to move the blueprint files to Azure. What should you do?
- Generate an access key. Map a drive, and then copy the files by using File Explorer.
- Use Azure Storage Explorer to copy the files.
- Use the Azure Import/Export service.
- Generate a shared access signature (SAS). Map a drive, and then copy the files by using File Explorer.
- Use Azure Storage Explorer to copy the files.
Azure Storage Explorer is a free tool from Microsoft that allows you to work with Azure Storage data on Windows, macOS, and Linux. You can use it to upload and download data from Azure blob storage. From the Scenario:
Planned Changes include: move the existing product blueprint files to Azure Blob storage.
Technical Requirements include: Copy the blueprint files to Azure over the Internet.
Case study
Overview
Contoso, Ltd. is a manufacturing company that has offices worldwide. Contoso works with partner organizations to bring products to market. Contoso products are manufactured by using blueprint files that the company authors and maintains.
Existing Environment
Currently, Contoso uses multiple types of servers for business operations, including the following:
– File servers
– Domain controllers
– Microsoft SQL Server servers
Your network contains an Active Directory forest named contoso.com. All servers and client computers are joined to Active Directory.
You have a public-facing application named App1. App1 is comprised of the following three tiers:
– A SQL database
– A web front end
– A processing middle tier
Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS only. Requirements
Planned Changes
Contoso plans to implement the following changes to the infrastructure:
– Move all the tiers of App1 to Azure.
– Move the existing product blueprint files to Azure Blob storage.
– Create a hybrid directory to support an upcoming Microsoft Office 365 migration project.
Technical Requirements
Contoso must meet the following technical requirements:
– Move all the virtual machines for App1 to Azure.
– Minimize the number of open ports between the App1 tiers.
– Ensure that all the virtual machines for App1 are protected by backups.
– Copy the blueprint files to Azure over the Internet.
– Ensure that the blueprint files are stored in the archive storage tier.
– Ensure that partner access to the blueprint files is secured and temporary.
– Prevent user passwords or hashes of passwords from being stored in Azure.
– Use unmanaged standard storage for the hard disks of the virtual machines.
– Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a mobile phone to verify their identity.
– Minimize administrative effort whenever possible.
User Requirements
Contoso identifies the following requirements for users:
– Ensure that only users who are part of a group named Pilot can join devices to Azure AD.
– Designate a new user named Admin1 as the service admin for the Azure subscription.
– Admin1 must receive email alerts regarding service outages.
– Ensure that a new user named User3 can create network objects for the Azure subscription.
QUESTION 3 – True or False
Contose requires a storage account that supports blob storage.
TRUE
FALSE
TRUE
From the Scenario:
Contoso is moving the existing product blueprint files to Azure Blob storage.
Use unmanaged standard storage for the hard disks of the virtual machines. We use Page Blobs for these.
Case study
Overview
Contoso, Ltd. is a manufacturing company that has offices worldwide. Contoso works with partner organizations to bring products to market. Contoso products are manufactured by using blueprint files that the company authors and maintains.
Existing Environment
Currently, Contoso uses multiple types of servers for business operations, including the following:
– File servers
– Domain controllers
– Microsoft SQL Server servers
Your network contains an Active Directory forest named contoso.com. All servers and client computers are joined to Active Directory.
You have a public-facing application named App1. App1 is comprised of the following three tiers:
– A SQL database
– A web front end
– A processing middle tier
Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS only. Requirements
Planned Changes
Contoso plans to implement the following changes to the infrastructure:
– Move all the tiers of App1 to Azure.
– Move the existing product blueprint files to Azure Blob storage.
– Create a hybrid directory to support an upcoming Microsoft Office 365 migration project.
Technical Requirements
Contoso must meet the following technical requirements:
– Move all the virtual machines for App1 to Azure.
– Minimize the number of open ports between the App1 tiers.
– Ensure that all the virtual machines for App1 are protected by backups.
– Copy the blueprint files to Azure over the Internet.
– Ensure that the blueprint files are stored in the archive storage tier.
– Ensure that partner access to the blueprint files is secured and temporary.
– Prevent user passwords or hashes of passwords from being stored in Azure.
– Use unmanaged standard storage for the hard disks of the virtual machines.
– Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a mobile phone to verify their identity.
– Minimize administrative effort whenever possible.
User Requirements
Contoso identifies the following requirements for users:
– Ensure that only users who are part of a group named Pilot can join devices to Azure AD.
– Designate a new user named Admin1 as the service admin for the Azure subscription.
– Admin1 must receive email alerts regarding service outages.
– Ensure that a new user named User3 can create network objects for the Azure subscription.
QUESTION 4 – True or False
Contose requires a storage account that supports Azure table storage.
TRUE
FALSE
FALSE
From the Scenario:
Contoso is moving the existing product blueprint files to Azure Blob storage.
Ensure that the blueprint files are stored in the archive storage tier.
Use unmanaged standard storage for the hard disks of the virtual machines. We use Page Blobs for these.
You have an Azure DNS zone named adatum.com. You need to delegate a subdomain named research.adatum.com to a different DNS server in Azure.
What should you do?
- Create an NS record named research in the adatum.com zone
- Create an PTR record named research in the adatum.com zone
- Modify the SOA record of adatum.com
- Create an A record named *.research in the adatum.com zone
- Create an NS record named research in the adatum.com zone
You can use the Azure portal to delegate a DNS subdomain. For example, if you own
the adatum.com domain, you can delegate a subdomain called research to another, separate zone that you can administer separately from the adatum.com zone.
To delegate an Azure DNS subdomain, you must first delegate your public domain to Azure DNS, so this the adatum.com domain. Once your domain is delegated to your Azure DNS zone, you can delegate your subdomain, research.adatum.com.
You would first need to create a zone for your subdomain, then note the name servers, and last to create an NS record for the new research.adatum.com subdomain (research zone).
Reference:
https://docs.microsoft.com/en-us/azure/dns/delegate-subdomain
Quick Preview:
You have an Azure subscription that contains the storage accounts shown in the following exhibit: (see image)
Please select the answer choice that completes below statements, based on the information presented in the above exhibit (Select two).
You can create a premium file share in ………. .
You can use the Archive access tier in ………. .
- You can create a premium file share in - az104storage101 only
- You can create a premium file share in - az104storage104 only
- You can create a premium file share in - az104storage101 and az104storage104 only
- You can create a premium file share in - az104storage101, az104storage102 and az104storage104 only
- You can create a premium file share in - az104storage101, az104storage102, az104storage103 and az104storage104.
- You can use the Archive access tier in - az104storage101 or az104storage103 only
-2. You can create a premium file share in - az104storage104 only
-6. You can use the Archive access tier in - az104storage101 or az104storage103 only
Azure Files offers standard file shares which are hosted on hard disk-based (HDD-based) hardware, and premium file shares, which are hosted on solid-state disk-based (SSD-based) hardware.
Azure file shares are deployed into storage accounts, and depending on which type of storage account you create, you can deploy Azure file shares on standard HDD hardware or premium SSD hardware. Premium Azure file shares are available only on FileStorage Azure storage account types, so the only correct option for the first statement is az104storage104 only.
Object storage data tiering between hot, cool, and archive is supported in Blob Storage and General Purpose v2 (GPv2) accounts. General Purpose v1 (GPv1) accounts don’t support tiering, nor does FileStorage storage account type.
For example, if you try to change the current tier to Archive tier for a GPv1 storage account, Azure will display the following information:
Reference:
https://docs.microsoft.com/en-us/azure/storage/files/storage-how-to-create-file-share?tabs=azure-portal https://docs.microsoft.com/en-us/azure/storage/blobs/storage-blob-storage-tiers
Quick Preview:
Case study
Overview
Contoso, Ltd. is a manufacturing company that has offices worldwide. Contoso works with partner organizations to bring products to market. Contoso products are manufactured by using blueprint files that the company authors and maintains.
Existing Environment
Currently, Contoso uses multiple types of servers for business operations, including the following:
– File servers
– Domain controllers
– Microsoft SQL Server servers
Your network contains an Active Directory forest named contoso.com. All servers and client computers are joined to Active Directory.
You have a public-facing application named App1. App1 is comprised of the following three tiers:
– A SQL database
– A web front end
– A processing middle tier
Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS only. Requirements
Planned Changes
Contoso plans to implement the following changes to the infrastructure:
– Move all the tiers of App1 to Azure.
– Move the existing product blueprint files to Azure Blob storage.
– Create a hybrid directory to support an upcoming Microsoft Office 365 migration project.
Technical Requirements
Contoso must meet the following technical requirements:
– Move all the virtual machines for App1 to Azure.
– Minimize the number of open ports between the App1 tiers.
– Ensure that all the virtual machines for App1 are protected by backups.
– Copy the blueprint files to Azure over the Internet.
– Ensure that the blueprint files are stored in the archive storage tier.
– Ensure that partner access to the blueprint files is secured and temporary.
– Prevent user passwords or hashes of passwords from being stored in Azure.
– Use unmanaged standard storage for the hard disks of the virtual machines.
– Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a mobile phone to verify their identity.
– Minimize administrative effort whenever possible.
User Requirements
Contoso identifies the following requirements for users:
– Ensure that only users who are part of a group named Pilot can join devices to Azure AD.
– Designate a new user named Admin1 as the service admin for the Azure subscription.
– Admin1 must receive email alerts regarding service outages.
– Ensure that a new user named User3 can create network objects for the Azure subscription.
QUESTION 3 – Please evaluate if the following statement is True or False :
Contoso requires a storage account that supports Azure File storage.
TRUE
FALSE
FALSE
From the Scenario:
Contoso is moving the existing product blueprint files to Azure Blob storage.
Ensure that the blueprint files are stored in the archive storage tier.
Use unmanaged standard storage for the hard disks of the virtual machines. We use Page Blobs for these.
You have an Azure Active Directory (Azure AD) tenant that contains 5,000 user accounts. You create a new user account named AdminUser1.
You need to assign the User Administrator administrative role to AdminUser1. What should you do from the user account properties?
- From the Licenses blade, assign a new license
- From the Directory role blade, modify the directory role
- From the Groups blade, invite the user account to a new group
- From the Directory role blade, modify the directory role
Assign a role to a user
1. Sign in to the Azure portal with an account that’s a global admin or privileged role admin for the directory.
2. Select Azure Active Directory, select Users, and then select a specific user from the list.
You have an Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com that contains 100 user accounts.
You purchase 10 Azure AD Premium P2 licenses for the tenant.You need to ensure that 10 users can use all the Azure AD Premium features.
What should you do?
- From the Licenses blade of Azure AD, assign a license
- From the Groups blade of each user, invite the users to a group
- From the Azure AD domain, add an enterprise application
- From the Directory role blade of each user, modify the directory role
- From the Licenses blade of Azure AD, assign a license
Azure AD Premium licenses need to be assigned to users (or groups of users).
You have an Azure subscription named Subscription1 and an on-premises deployment of Microsoft System Center Service Manager.
Subscription1 contains a virtual machine named VM1. You need to ensure that an alert is set in Service Manager when the amount of available memory on VM1 is below 10 percent.
What should you do first?
- Create an automation runbook
- Deploy a function app
- Deploy the IT Service Management Connector (ITSM)
- Create a notification
- Deploy the IT Service Management Connector (ITSM)
The IT Service Management Connector (ITSMC) allows you to connect Azure and a supported IT Service Management (ITSM) product/service, such as the Microsoft System Center Service Manager.
With ITSMC, you can create work items in ITSM tool, based on your Azure alerts (metric alerts, Activity Log alerts and Log Analytics alerts).
Reference:
https://docs.microsoft.com/en-us/azure/azure-monitor/platform/itsmc-overview
Quick Preview:
You sign up for Azure Active Directory (Azure AD) Premium. You need to add a user named admin1@az104exam.com as an administrator on all the computers that will be joined to the Azure AD domain.
What should you configure in Azure AD?
- Device settings from the Devices blade
- Providers from the MFA Server blade
- User settings from the Users blade
- General settings from the Groups blade
- Device settings from the Devices blade
When you connect a Windows device with Azure AD using an Azure AD join, Azure AD adds the following security principles to the local administrators group on the device:
– The Azure AD global administrator role
– The Azure AD device administrator role
– The user performing the Azure AD join
In the Azure portal, you can manage the device administrator role on the Devices page. To open the Devices page:
1. Sign in to your Azure portal as a global administrator or device administrator.
2. On the left navbar, click Azure Active Directory.
3. In the Manage section, click Devices.
4. On the Devices page, click Device settings.
5. To modify the device administrator role, configure Additional local administrators on Azure AD joined devices.
You have Azure Active Directory tenant named az104exam.com that includes following users: (see image1)
az104exam.com includes following Windows 10 devices: (see image2)
You create following security groups in az104exam.com: (see image3)
True or False.
User1 can add Device2 to Group1.
TRUE
FALSE
FALSE
User1 has Cloud Device Administrator role attached, User 1 is not owner on Group1, so can’t add devices.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference
Quick Preview:
az104exam.com that includes following users: (see image1)
az104exam.com includes following Windows 10 devices: (see image2)
You create following security groups in az104exam.com: (see image3)
True or False.
User2 can add Device1 to Group1.
TRUE
FALSE
TRUE
User2 is the owner of the “assigned group” Group1, and additionally User2 has User Administrator Role, so User2 has the appropriate role and assigned groups can be manually modified.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference
az104exam.com that includes following users: (see image1)
az104exam.com includes following Windows 10 devices: (see image2)
You create following security groups in az104exam.com: (see image3)
True or False.
User2 can add Device2 to Group2.
TRUE
FALSE
FALSE
It is “not” possible to “manually” add users/devices to a “Dynamic group”.
Reference: https://docs.microsoft.com/en-us/azure/active-directory/enterprise-users/groups-create-rule Quick Preview:
You have an Azure subscription that contains a resource group named RG26. RG26 is set to the West Europe location and is used to create temporary resources for a project. RG26 contains the resources shown in the following table: (see image)
SQLD01 is backed up to RGV1. When the project is complete, you attempt to delete RG26 from the Azure portal. The deletion fails. You need to delete RG26.
What should you do first?
1, Delete VM1
2. Stop VM1
3. Stop the backup of SQLD01
4. Delete sa001
- Stop the backup of SQLD01
RG26 delete will fail because of the Recovery Services vault, which will not get deleted. In order to have RGV1 deleted, you would need to first disable soft delete, stop backup and then initiate delete action. Reference:
https://docs.microsoft.com/en-us/azure/backup/backup-azure-delete-vault
Quick Preview:
You have an Azure subscription named Subscription1 that contains a virtual network named VNet1. VNet1 is in a resource group named RG1.
Subscription1 has a user named User1. User1 has the following roles:
– Reader
– Security Admin
– Security Reader
You need to ensure that User1 can assign the Reader role for VNet1 to other users. What should you do?
- Remove User1 from the Security Reader role for Subscription1. Assign User1 the Contributor role for RG1.
- Assign User1 the Owner role for VNet1.
- Remove User1 from the Security Reader and Reader roles for Subscription1.
- Assign User1 the Network Contributor role for RG1.
- Assign User1 the Owner role for VNet1.
Contributor role does not allow you to assign roles in Azure RBAC, you need to assign the Owner role. Reference:
https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles
Quick Preview:
You have an Azure Active Directory (Azure AD) tenant named az104exam.onmicrosoft.com. Your company has a public DNS zone for x-a-a-s.com.
You add x-a-a-s.com as a custom domain name to Azure AD. You need to ensure that Azure can verify the domain name.
Which type of DNS record should you create?
- MX
- NSEC
- PTR
- RRSIG
- MX
Both TXT and MX record types can be used for domain validation.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
You have an Azure Directory (Azure AD) tenant named Adatum and an Azure Subscription named Subscription1. Adatum contains a group named Developers. Subscription1 contains a resource group named Dev. You need to provide the Developers group with the ability to create Azure logic apps in the Dev resource group.
Solution: On Subscription1, you assign the DevTest Labs User role to the Developers group. Does this meet the goal?
Yes
No
No
DevTest Labs User role only lets you connect, start, restart, and shutdown virtual machines in your Azure DevTest Labs.
The Logic App Contributor role lets you manage logic app, but not access to them. It provides access to view, edit, and update a logic app.
Reference:
https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles
Quick Preview:
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
You have an Azure Directory (Azure AD) tenant named Adatum and an Azure Subscription named Subscription1. Adatum contains a group named Developers. Subscription1 contains a resource group named Dev. You need to provide the Developers group with the ability to create Azure logic apps in the Dev resource group.
Solution: On Subscription1, you assign the Logic App Operator role to the Developers group. Does this meet the goal?
YES
NO
NO
Logic App Operator role doesn’t include the necessary permissions to create Azure Logic Apps, you would need the Logic App Contributor role.
Reference:
https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles
Quick Preview: