test15 Flashcards

1
Q
  1. Topic 1, Litware, inc.

Overview

Litware, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.

The Montreal office has 2,000 employees. The Seattle office has 1,000 employees. The New York office has 200 employees.

All the resources used by Litware are hosted on-premises.

Litware creates a new Azure subscription. The Azure Active Directory (Azure AD) tenant uses a domain named Litware.onmicrosoft.com. The tenant uses the P1 pricing tier.

Existing Environment

The network contains an Active Directory forest named Litware.com. All domain controllers are configured as DNS servers and host the Litware.com DNS zone.

Litware has finance, human resources, sales, research, and information technology departments. Each department has an organizational unit (OU) that contains all the accounts of that respective department. All the user accounts have the department attribute set to their respective department. New users are added frequently.

Litware.com contains a user named User1.

All the offices connect by using private links.

Litware has data centers in the Montreal and Seattle offices. Each data center has a firewall that can be configured as a VPN device.

All infrastructure servers are virtualized.

The virtualization environment contains the servers in the following table.

Name Role Contains virtual machine
Server1 VMWare vCenter server VM1
Server2 Hyper-V-host VM2

Litware uses two web applications named App1 and App2. Each instance on each web
application requires 1GB of memory.

The Azure subscription contains the resources in the following table.
Name Type
VNet1 Virtual network
VM3 Virtual machine
VM4 Virtual machine
The network security team implements several network security groups (NSGs).

Planned Changes

Litware plans to implement the following changes:

  • Deploy Azure ExpressRoute to the Montreal office.
  • Migrate the virtual machines hosted on Server1 and Server2 to Azure.
  • Synchronize on-premises Active Directory to Azure Active Directory (Azure AD).
  • Migrate App1 and App2 to two Azure web apps named webApp1 and WebApp2.

Technical requirements

Litware must meet the following technical requirements:

  • Ensure that WebApp1 can adjust the number of instances automatically based on the load and can scale up to five instance*.
  • Ensure that VM3 can establish outbound connections over TCP port 8080 to the applications servers in the Montreal office.
  • Ensure that routing information is exchanged automatically between Azure and the routers in the Montreal office.
  • Enable Azure Multi-Factor Authentication (MFA) for the users in the finance department only.
  • Ensure that webapp2.azurewebsites.net can be accessed by using the name app2.Litware.com.
  • Connect the New Your office to VNet1 over the Internet by using an encrypted connection.
  • Create a workflow to send an email message when the settings of VM4 are modified.
  • Create a custom Azure role named Role1 that is based on the Reader role.
  • Minimize costs whenever possible.

HOTSPOT

You need to meet the connection requirements for the New York office.

What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
From the Azure portal:
Create an ExpressRoute circuit only.
Create a virtual network gateway only.
Create a virtual network gateway and a local network gateway.
Create an ExpressRoute circuit and an on-premises data gateway.
Create a virtual network gateway and an on-premises data gateway.
In the New York office:
Deploy ExpressRoute.
Deploy a DirectAccess server.
Implement a Web Application Proxy.
Configure a site-to-site VPN connection.

A

Let’s analyze the correct answers for this scenario:
Correct Configuration:
From the Azure portal: “Create a virtual network gateway and a local network gateway”
Why correct:
Virtual network gateway is needed to enable VPN connectivity
Local network gateway represents the on-premises network
This combination is required for site-to-site VPN
Most cost-effective solution for the requirement
In the New York office: “Configure a site-to-site VPN connection”
Why correct:
Meets the requirement “Connect the New York office to VNet1 over the Internet by using an encrypted connection”
Cost-effective solution for smaller offices
Provides secure encrypted connection
Works over existing internet connection
Why other options are incorrect:
Azure Portal options:
“ExpressRoute circuit” - Too expensive for small office, overkill
“Virtual network gateway only” - Incomplete solution, needs local network gateway
“On-premises data gateway” - Used for data services, not network connectivity
New York office options:
“Deploy ExpressRoute” - Too expensive, not necessary for small office
“DirectAccess server” - Client access solution, not for site-to-site
“Web Application Proxy” - Application access solution, not for network connectivity
Important notes for AZ-104 exam:
Site-to-Site VPN Requirements: [1]
Virtual network gateway in Azure
Local network gateway in Azure
VPN device/firewall on-premises
Public IP address for on-premises VPN device
Cost Considerations:
Site-to-Site VPN is more cost-effective than ExpressRoute
Appropriate for smaller offices/bandwidth needs
Uses existing internet connection
Network Gateway Types:
VPN Gateway for VPN connections
ExpressRoute Gateway for ExpressRoute connections
Different SKUs available based on performance needs
Connection Types:
Site-to-Site VPN: Office to Azure
Point-to-Site VPN: Individual clients to Azure
ExpressRoute: Private dedicated connection
VNet-to-VNet: Between Azure virtual networks
Best Practices:
Choose connection type based on:
Bandwidth requirements
Security needs
Budget constraints
Office size
Reliability requirements
Key Concepts:
Understanding different connectivity options
Network gateway requirements
Local network gateway purpose
Cost implications of different solutions
Scenario Evaluation:
Consider office size (200 employees)
Internet-based requirement
Encryption requirement
Cost minimization requirement
This question tests understanding of:
Azure connectivity options
Network gateway configurations
Cost-effective solutions
Appropriate technology selection
Hybrid networking concepts
Remember: The solution should match the scale and requirements of the specific scenario while considering cost constraints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You need to recommend a solution to automate the configuration for the finance department users. The solution must meet the technical requirements.

What should you include in the recommended?

Azure AP B2C
Azure AD Identity Protection
an Azure logic app and the Microsoft Identity Management (MIM) client
dynamic groups and conditional access policies

A

Correct Option:
dynamic groups and conditional access policies

Explanation:
Dynamic Groups: Dynamic groups in Azure AD allow you to automatically add and remove users based on their attributes, such as the department attribute. This ensures that users in the finance department are automatically included in the group without manual intervention.
Conditional Access Policies: Conditional access policies can be used to enforce specific security requirements, such as Azure Multi-Factor Authentication (MFA), for users in the dynamic group. By applying a conditional access policy to the dynamic group for the finance department, you can ensure that only these users are required to use MFA.
Important Note for Azure 104 Exam:
Understand the use of dynamic groups in Azure AD to automate user management based on user attributes.
Be familiar with configuring and applying conditional access policies to enforce security requirements such as MFA.
Know how to combine dynamic groups and conditional access policies to meet specific organizational requirements efficiently and securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Topic 1, Litware, inc.

Overview

Litware, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.

The Montreal office has 2,000 employees. The Seattle office has 1,000 employees. The New York office has 200 employees.

All the resources used by Litware are hosted on-premises.

Litware creates a new Azure subscription. The Azure Active Directory (Azure AD) tenant uses a domain named Litware.onmicrosoft.com. The tenant uses the P1 pricing tier.

Existing Environment

The network contains an Active Directory forest named Litware.com. All domain controllers are configured as DNS servers and host the Litware.com DNS zone.

Litware has finance, human resources, sales, research, and information technology departments. Each department has an organizational unit (OU) that contains all the accounts of that respective department. All the user accounts have the department attribute set to their respective department. New users are added frequently.

Litware.com contains a user named User1.

All the offices connect by using private links.

Litware has data centers in the Montreal and Seattle offices. Each data center has a firewall that can be configured as a VPN device.

All infrastructure servers are virtualized.

The virtualization environment contains the servers in the following table.

Name Role Contains virtual machine
Server1 VMWare vCenter server VM1
Server2 Hyper-V-host VM2

Litware uses two web applications named App1 and App2. Each instance on each web
application requires 1GB of memory.

The Azure subscription contains the resources in the following table.
Name Type
VNet1 Virtual network
VM3 Virtual machine
VM4 Virtual machine
The network security team implements several network security groups (NSGs).

Planned Changes

Litware plans to implement the following changes:

  • Deploy Azure ExpressRoute to the Montreal office.
  • Migrate the virtual machines hosted on Server1 and Server2 to Azure.
  • Synchronize on-premises Active Directory to Azure Active Directory (Azure AD).
  • Migrate App1 and App2 to two Azure web apps named webApp1 and WebApp2.

Technical requirements

Litware must meet the following technical requirements:

  • Ensure that WebApp1 can adjust the number of instances automatically based on the load and can scale up to five instance*.
  • Ensure that VM3 can establish outbound connections over TCP port 8080 to the applications servers in the Montreal office.
  • Ensure that routing information is exchanged automatically between Azure and the routers in the Montreal office.
  • Enable Azure Multi-Factor Authentication (MFA) for the users in the finance department only.
  • Ensure that webapp2.azurewebsites.net can be accessed by using the name app2.Litware.com.
  • Connect the New Your office to VNet1 over the Internet by using an encrypted connection.
  • Create a workflow to send an email message when the settings of VM4 are modified.
  • Create a custom Azure role named Role1 that is based on the Reader role.
  • Minimize costs whenever possible.

You need to ensure that VM1 can communicate with VM4. The solution must minimize administrative effort.

What should you do?

Create 2 user-defined route from VNET1 to VNET3.
Assign VM4 an IP address of 10.0.1.5/24.
Establish peering between VNET1 and VNET3.
Create an NSG and associate the NSG to VMI and VM4.

A

Based on the scenario, the correct solution is to “Establish peering between VNET1 and VNET3.”
Here’s why this is the correct answer:
Virtual Network (VNet) peering is the simplest and most efficient way to enable communication between VMs in different virtual networks. It: [1]
Provides low-latency, high-bandwidth connectivity
Requires minimal administrative effort
Allows resources to communicate across VNets as if they were in the same network
Doesn’t require any gateway or complex routing configuration
Why other options are incorrect:
“Create 2 user-defined route from VNET1 to VNET3”
More complex than necessary
Requires additional maintenance
UDRs are typically used when you need to override Azure’s default system routes
“Assign VM4 an IP address of 10.0.1.5/24”
Simply changing IP addresses doesn’t establish connectivity
Doesn’t solve the cross-VNet communication issue
“Create an NSG and associate the NSG to VM1 and VM4”
NSGs are for security rules and traffic filtering [2]
While NSGs are important for security, they alone don’t enable communication between VNets
Important notes for AZ-104 exam:
VNet Peering Characteristics:
Peering is non-transitive (if A is peered with B, and B with C, A cannot communicate with C)
Peering can be between VNets in:
Same region
Different regions (Global VNet peering)
Different subscriptions
Different Azure Active Directory tenants
Key Concepts:
Once peered, VNets appear as one for connectivity purposes
Network latency between VMs in peered VNets is the same as within a single VNet
No downtime is required to create peering
Requirements for Peering:
VNets cannot have overlapping IP address spaces
Peering must be configured on both VNets (bidirectional)
Network address spaces must be planned carefully before implementation
Exam Tips:
Focus on scenarios requiring minimal administrative effort
Understand the differences between connectivity solutions (peering vs VPN vs ExpressRoute)
Know when to use VNet peering versus other networking solutions
Remember peering’s non-transitive nature
Understand the relationship between NSGs, routing, and peering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Topic 1, Litware, inc.

Overview

Litware, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.

The Montreal office has 2,000 employees. The Seattle office has 1,000 employees. The New York office has 200 employees.

All the resources used by Litware are hosted on-premises.

Litware creates a new Azure subscription. The Azure Active Directory (Azure AD) tenant uses a domain named Litware.onmicrosoft.com. The tenant uses the P1 pricing tier.

Existing Environment

The network contains an Active Directory forest named Litware.com. All domain controllers are configured as DNS servers and host the Litware.com DNS zone.

Litware has finance, human resources, sales, research, and information technology departments. Each department has an organizational unit (OU) that contains all the accounts of that respective department. All the user accounts have the department attribute set to their respective department. New users are added frequently.

Litware.com contains a user named User1.

All the offices connect by using private links.

Litware has data centers in the Montreal and Seattle offices. Each data center has a firewall that can be configured as a VPN device.

All infrastructure servers are virtualized.

The virtualization environment contains the servers in the following table.

Name Role Contains virtual machine
Server1 VMWare vCenter server VM1
Server2 Hyper-V-host VM2

Litware uses two web applications named App1 and App2. Each instance on each web
application requires 1GB of memory.

The Azure subscription contains the resources in the following table.
Name Type
VNet1 Virtual network
VM3 Virtual machine
VM4 Virtual machine
The network security team implements several network security groups (NSGs).

Planned Changes

Litware plans to implement the following changes:

  • Deploy Azure ExpressRoute to the Montreal office.
  • Migrate the virtual machines hosted on Server1 and Server2 to Azure.
  • Synchronize on-premises Active Directory to Azure Active Directory (Azure AD).
  • Migrate App1 and App2 to two Azure web apps named webApp1 and WebApp2.

Technical requirements

Litware must meet the following technical requirements:

  • Ensure that WebApp1 can adjust the number of instances automatically based on the load and can scale up to five instance*.
  • Ensure that VM3 can establish outbound connections over TCP port 8080 to the applications servers in the Montreal office.
  • Ensure that routing information is exchanged automatically between Azure and the routers in the Montreal office.
  • Enable Azure Multi-Factor Authentication (MFA) for the users in the finance department only.
  • Ensure that webapp2.azurewebsites.net can be accessed by using the name app2.Litware.com.
  • Connect the New Your office to VNet1 over the Internet by using an encrypted connection.
  • Create a workflow to send an email message when the settings of VM4 are modified.
  • Create a custom Azure role named Role1 that is based on the Reader role.
  • Minimize costs whenever possible.

You discover that VM3 does NOT meet the technical requirements.

You need to verify whether the issue relates to the NSGs.

What should you use?

Diagram in VNet1
the security recommendations in Azure Advisor
Diagnostic settings in Azure Monitor
Diagnose and solve problems in Traffic Manager Profiles
IP flow verify in Azure Network Watcher

A

The correct answer is “IP flow verify in Azure Network Watcher.”
Here’s why this is the correct answer:
IP flow verify:
Specifically designed to troubleshoot NSG-related connectivity issues
Checks if a packet is allowed or denied for a specific VM
Verifies rules at both the NSG and security rules levels
Helps identify which NSG rule is blocking or allowing traffic
Why other options are incorrect:
“The security recommendations in Azure Advisor”
Too broad in scope
Focuses on best practices rather than specific connectivity issues
Doesn’t provide detailed NSG rule verification
“Diagnostic settings in Azure Monitor”
Used for collecting metrics and logs
Too general for NSG troubleshooting
Doesn’t provide real-time flow verification
“Diagnose and solve problems in Traffic Manager Profiles”
Related to DNS-based traffic routing
Not relevant for NSG troubleshooting
Focuses on global traffic distribution
Important notes for AZ-104 exam:
Network Watcher Tools:
IP flow verify
Next hop
Security group view
Packet capture
Connection troubleshoot
NSG flow logs
IP Flow Verify Specifics:
Verifies traffic between source and destination
Checks both inbound and outbound rules
Shows which rule is allowing/denying traffic
Requires:
Source IP
Destination IP
Source Port
Destination Port
Protocol
Network Watcher Features:
Must be enabled per region
Available for troubleshooting:
Connectivity issues
NSG rules
Routing problems
VPN connections
Exam Tips:
Know when to use specific Network Watcher tools
Understand the difference between:
IP flow verify (NSG rules)
Next hop (routing issues)
Connection troubleshoot (end-to-end connectivity)
NSG flow logs (traffic analytics)
Troubleshooting Methodology:
Start with IP flow verify for NSG issues
Use next hop for routing problems
Enable NSG flow logs for ongoing monitoring
Use packet capture for detailed traffic analysis
Best Practices:
Enable Network Watcher in all regions where you have resources
Use appropriate tool for specific networking issues
Understand the limitations of each troubleshooting tool
Know how to interpret results from different Network Watcher features
Remember for the exam:
Network Watcher is Azure’s network performance monitoring and diagnostics solution
IP flow verify is specifically designed for NSG troubleshooting
Different networking issues require different Network Watcher tools
Understanding which tool to use for specific scenarios is crucial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Topic 1, Litware, inc.

Overview

Litware, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.

The Montreal office has 2,000 employees. The Seattle office has 1,000 employees. The New York office has 200 employees.

All the resources used by Litware are hosted on-premises.

Litware creates a new Azure subscription. The Azure Active Directory (Azure AD) tenant uses a domain named Litware.onmicrosoft.com. The tenant uses the P1 pricing tier.

Existing Environment

The network contains an Active Directory forest named Litware.com. All domain controllers are configured as DNS servers and host the Litware.com DNS zone.

Litware has finance, human resources, sales, research, and information technology departments. Each department has an organizational unit (OU) that contains all the accounts of that respective department. All the user accounts have the department attribute set to their respective department. New users are added frequently.

Litware.com contains a user named User1.

All the offices connect by using private links.

Litware has data centers in the Montreal and Seattle offices. Each data center has a firewall that can be configured as a VPN device.

All infrastructure servers are virtualized.

The virtualization environment contains the servers in the following table.

Name Role Contains virtual machine
Server1 VMWare vCenter server VM1
Server2 Hyper-V-host VM2

Litware uses two web applications named App1 and App2. Each instance on each web
application requires 1GB of memory.

The Azure subscription contains the resources in the following table.
Name Type
VNet1 Virtual network
VM3 Virtual machine
VM4 Virtual machine
The network security team implements several network security groups (NSGs).

Planned Changes

Litware plans to implement the following changes:

  • Deploy Azure ExpressRoute to the Montreal office.
  • Migrate the virtual machines hosted on Server1 and Server2 to Azure.
  • Synchronize on-premises Active Directory to Azure Active Directory (Azure AD).
  • Migrate App1 and App2 to two Azure web apps named webApp1 and WebApp2.

Technical requirements

Litware must meet the following technical requirements:

  • Ensure that WebApp1 can adjust the number of instances automatically based on the load and can scale up to five instance*.
  • Ensure that VM3 can establish outbound connections over TCP port 8080 to the applications servers in the Montreal office.
  • Ensure that routing information is exchanged automatically between Azure and the routers in the Montreal office.
  • Enable Azure Multi-Factor Authentication (MFA) for the users in the finance department only.
  • Ensure that webapp2.azurewebsites.net can be accessed by using the name app2.Litware.com.
  • Connect the New Your office to VNet1 over the Internet by using an encrypted connection.
  • Create a workflow to send an email message when the settings of VM4 are modified.
  • Create a custom Azure role named Role1 that is based on the Reader role.
  • Minimize costs whenever possible.

You need to meet the technical requirement for VM4.

What should you create and configure?

an Azure Notification Hub
an Azure Event Hub
an Azure Logic App
an Azure services Bus

A

The correct answer is “an Azure Logic App.”
Here’s why this is the correct answer:
Azure Logic App:
Provides workflow automation capabilities
Can monitor Azure resource changes
Can send email notifications automatically [1]
Perfect for the requirement to “send an email message when the settings of VM4 are modified”
Can integrate with various email services
Why other options are incorrect:
“Azure Notification Hub”
Designed for push notifications to mobile applications
Not suitable for monitoring VM changes
Primarily for mobile apps and cross-platform notifications
“Azure Event Hub”
For big data streaming and event ingestion
Too complex for simple VM monitoring
Designed for millions of events per second
“Azure Service Bus”
Message queue and enterprise messaging service
For application-to-application communication
Overkill for simple VM monitoring and email alerts
Important notes for AZ-104 exam:
Azure Logic Apps Features:
No-code/low-code automation platform
Built-in connectors for various services
Can monitor Azure resources
Supports email notifications
Triggers and actions based workflow
Monitoring VM Changes:
Can monitor:
Configuration changes
State changes
Resource modifications
Tags updates
Size changes
Logic Apps Components:
Triggers (what starts the workflow)
Actions (what happens after trigger)
Connectors (integration with other services)
Conditions (workflow logic)
Best Practices:
Use managed identities for authentication
Implement error handling
Monitor Logic App runs
Consider costs of runs and connectors
Key Exam Concepts:
Understanding different Azure monitoring solutions
Knowing when to use:
Logic Apps (automation and workflows)
Event Grid (event routing)
Event Hubs (big data streaming)
Service Bus (enterprise messaging)
Cost Considerations:
Logic Apps charges per execution
Consider consumption vs standard plan
Monitor usage and optimize workflows
Security:
Use managed identities
Implement least privilege access
Secure connections to other services
Protect sensitive information
Integration Capabilities:
Office 365 integration
Azure services monitoring
Email services (SMTP, Office 365, Gmail)
Custom APIs and webhooks
Remember for the exam:
Logic Apps are ideal for automation workflows
They can easily monitor Azure resources
Perfect for email notifications
Cost-effective for simple automation
Built-in connectors reduce development effort
This scenario is common in the AZ-104 exam, testing your knowledge of:
Azure monitoring solutions
Automation options
Integration capabilities
Cost-effective solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Topic 1, Litware, inc.

Overview

Litware, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.

The Montreal office has 2,000 employees. The Seattle office has 1,000 employees. The New York office has 200 employees.

All the resources used by Litware are hosted on-premises.

Litware creates a new Azure subscription. The Azure Active Directory (Azure AD) tenant uses a domain named Litware.onmicrosoft.com. The tenant uses the P1 pricing tier.

Existing Environment

The network contains an Active Directory forest named Litware.com. All domain controllers are configured as DNS servers and host the Litware.com DNS zone.

Litware has finance, human resources, sales, research, and information technology departments. Each department has an organizational unit (OU) that contains all the accounts of that respective department. All the user accounts have the department attribute set to their respective department. New users are added frequently.

Litware.com contains a user named User1.

All the offices connect by using private links.

Litware has data centers in the Montreal and Seattle offices. Each data center has a firewall that can be configured as a VPN device.

All infrastructure servers are virtualized.

The virtualization environment contains the servers in the following table.

Name Role Contains virtual machine
Server1 VMWare vCenter server VM1
Server2 Hyper-V-host VM2

Litware uses two web applications named App1 and App2. Each instance on each web
application requires 1GB of memory.

The Azure subscription contains the resources in the following table.
Name Type
VNet1 Virtual network
VM3 Virtual machine
VM4 Virtual machine
The network security team implements several network security groups (NSGs).

Planned Changes

Litware plans to implement the following changes:

  • Deploy Azure ExpressRoute to the Montreal office.
  • Migrate the virtual machines hosted on Server1 and Server2 to Azure.
  • Synchronize on-premises Active Directory to Azure Active Directory (Azure AD).
  • Migrate App1 and App2 to two Azure web apps named webApp1 and WebApp2.

Technical requirements

Litware must meet the following technical requirements:

  • Ensure that WebApp1 can adjust the number of instances automatically based on the load and can scale up to five instance*.
  • Ensure that VM3 can establish outbound connections over TCP port 8080 to the applications servers in the Montreal office.
  • Ensure that routing information is exchanged automatically between Azure and the routers in the Montreal office.
  • Enable Azure Multi-Factor Authentication (MFA) for the users in the finance department only.
  • Ensure that webapp2.azurewebsites.net can be accessed by using the name app2.Litware.com.
  • Connect the New Your office to VNet1 over the Internet by using an encrypted connection.
  • Create a workflow to send an email message when the settings of VM4 are modified.
  • Create a custom Azure role named Role1 that is based on the Reader role.
  • Minimize costs whenever possible.

You need to the appropriate sizes for the Azure virtual for Server2.

What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

From the Azure portal:
Create an Azure Migrate project.
Create a Recovery Services vault.
Upload a management certificate.
Create an Azure Import/Export job.

On Server2:
Enable Hyper-V Replica.
Install the Azure File Sync agent.
Create a collector virtual machine.
Configure Hyper-V storage migration.
Install the Azure Site Recovery Provider.

A

The correct answer is:
From the Azure portal:
Create an Azure Migrate project
On Server2:
Create a collector virtual machine
Here’s why these are correct:
Azure Migrate Project:
Purpose-built for assessing and migrating on-premises workloads
Helps determine appropriate VM sizes in Azure
Provides sizing recommendations based on performance data
Offers cost estimates for Azure resources
Collector Virtual Machine:
Discovers and assesses on-premises Hyper-V environments
Gathers performance data from VMs
Analyzes configuration and performance requirements
Helps in right-sizing Azure VMs
Why other options are incorrect:
Recovery Services vault:
For backup and disaster recovery
Not for sizing assessment
Management certificate:
Legacy authentication method
Not required for migration assessment
Import/Export job:
For physical data transfer
Not related to VM sizing
Hyper-V Replica:
For disaster recovery
Not for migration assessment
Azure File Sync agent:
For file synchronization
Not related to VM sizing
Hyper-V storage migration:
For moving VM storage
Not for Azure sizing assessment
Azure Site Recovery Provider:
For disaster recovery
Different purpose than sizing assessment
Important notes for AZ-104 exam:
Azure Migrate Capabilities:
Discovery and assessment
Server migration
Database migration
Web app migration
Virtual desktop migration
Data box migration
Assessment Features:
Performance-based sizing
Cost estimation
Dependency mapping
Migration readiness
Azure compatibility checking
Key Components:
Azure Migrate project
Assessment tools
Discovery methods
Dependency analysis
Performance monitoring
Best Practices:
Gather performance data for at least 24 hours
Consider peak usage periods
Account for future growth
Review compatibility reports
Analyze dependencies
Migration Planning:
Assessment before migration
Right-sizing recommendations
Cost optimization
Performance requirements
Network dependencies
Remember:
Azure Migrate is free for assessment
Different tools for different workloads
Performance history affects recommendations
Consider both CPU and memory metrics
Assessment Process:
Create Azure Migrate project
Deploy collector
Discover resources
Create assessment
Review recommendations
Sizing Considerations:
Performance requirements
Cost optimization
Future growth
Azure region availability
Service level agreements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You need to implement Role1.
Which command should you run before you create Role1?
To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

Dropdown 1 options:

Find-RoleCapability
Get-AzureADDirectoryRole
Get-AzureRmRoleAssignment
Get-AzureRmRoleDefinition
Dropdown 2 options:

ConvertFrom-Json
ConvertFrom-String
ConvertTo-Json
ConvertTo-Xml

A

Answer Area
Get-AzureRmRoleDefinition
ConvertTo-Json
Explanation:
Get-AzureRmRoleDefinition: This command retrieves the definition of an existing Azure role. You need to get the definition of the Reader role to use it as a base for creating the custom role named Role1.

ConvertTo-Json: This command converts the role definition to a JSON format, which is required for creating a custom role in Azure.

Important Note for Azure 104 Exam:
Understand how to retrieve and manipulate role definitions in Azure using PowerShell.
Be familiar with the process of creating custom roles in Azure, including retrieving existing role definitions and converting them to the required format.
Know the PowerShell commands and their usage for managing Azure roles and role assignments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You need to prepare the environment to meet the authentication
requirements.

Which two actions should you perform? Each correct answer presents part
of the solution. NOTE: Each correct selection is worth one point.

☐ Allow inbound TCP port 8080 to the domain controllers in the Miami office.
☐ Add http://autogon.microsoftazuread-sso.com to the intranet zone of each
client computer in the Miami office.
☐ Join the client computers in the Miami office to Azure A
☐ Install the Active Directory Federation Services (AD FS) role on a domain
controller in the Miami office.
☐ Install Azure AD Connect on a server in the Miami office and enable Pass-
through Authentication.

A

The correct answers are:
“Add http://autologon.microsoftazuread-sso.com to the intranet zone of each client computer in the Miami office”
“Install Azure AD Connect on a server in the Miami office and enable Pass-through Authentication”
Here’s why these are correct:
Adding autologon.microsoftazuread-sso.com:
Enables seamless SSO
Required for integrated Windows authentication
Improves user sign-in experience
Part of Azure AD Connect configuration
Installing Azure AD Connect with Pass-through Authentication:
Enables directory synchronization
Provides secure authentication method
Allows password validation against on-premises AD
Meets hybrid identity requirements
Why other options are incorrect:
“Allow inbound TCP port 8080”
Not related to authentication requirements
Wrong port for authentication services
“Join client computers to Azure AD”
Not necessary for hybrid authentication
Machines are already domain-joined
“Install AD FS role”
More complex than necessary
Higher maintenance overhead
Not required when using Pass-through Authentication
Important notes for AZ-104 exam:
Azure AD Connect Features:
Directory synchronization
Password hash synchronization
Pass-through Authentication
Seamless SSO
Object filtering
Authentication Methods:
Password Hash Synchronization
Pass-through Authentication
Federation (AD FS)
Choose based on requirements
Pass-through Authentication:
Validates passwords on-premises
No password sync to cloud
Requires outbound connectivity
Highly available configuration
Seamless SSO:
Works with both PHS and PTA
Requires intranet zone configuration
Uses Kerberos tickets
Reduces prompt frequency
Implementation Requirements:
Enterprise Admin credentials
Global Admin credentials
Required ports and protocols
Network connectivity
Best Practices:
Install on non-DC server
Use staging mode for changes
Configure high availability
Regular maintenance
Monitor sync health
Security Considerations:
Least privilege accounts
Network security
Authentication agent security
Regular updates
Common Configuration Steps:
Install Azure AD Connect
Configure authentication method
Set up SSO
Configure filtering
Verify synchronization
Remember for the exam:
Different authentication methods
Implementation requirements
Configuration steps
Security considerations
High availability options
Key exam topics:
Hybrid identity solutions
Authentication methods
Directory synchronization
SSO configuration
Security requirements
This scenario tests understanding of:
Azure AD Connect
Authentication methods
SSO configuration
Implementation steps
Best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Topic 1, Litware, inc.

Overview

Litware, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.

The Montreal office has 2,000 employees. The Seattle office has 1,000 employees. The New York office has 200 employees.

All the resources used by Litware are hosted on-premises.

Litware creates a new Azure subscription. The Azure Active Directory (Azure AD) tenant uses a domain named Litware.onmicrosoft.com. The tenant uses the P1 pricing tier.

Existing Environment

The network contains an Active Directory forest named Litware.com. All domain controllers are configured as DNS servers and host the Litware.com DNS zone.

Litware has finance, human resources, sales, research, and information technology departments. Each department has an organizational unit (OU) that contains all the accounts of that respective department. All the user accounts have the department attribute set to their respective department. New users are added frequently.

Litware.com contains a user named User1.

All the offices connect by using private links.

Litware has data centers in the Montreal and Seattle offices. Each data center has a firewall that can be configured as a VPN device.

All infrastructure servers are virtualized.

The virtualization environment contains the servers in the following table.

Name Role Contains virtual machine
Server1 VMWare vCenter server VM1
Server2 Hyper-V-host VM2

Litware uses two web applications named App1 and App2. Each instance on each web
application requires 1GB of memory.

The Azure subscription contains the resources in the following table.
Name Type
VNet1 Virtual network
VM3 Virtual machine
VM4 Virtual machine
The network security team implements several network security groups (NSGs).

Planned Changes

Litware plans to implement the following changes:

  • Deploy Azure ExpressRoute to the Montreal office.
  • Migrate the virtual machines hosted on Server1 and Server2 to Azure.
  • Synchronize on-premises Active Directory to Azure Active Directory (Azure AD).
  • Migrate App1 and App2 to two Azure web apps named webApp1 and WebApp2.

Technical requirements

Litware must meet the following technical requirements:

  • Ensure that WebApp1 can adjust the number of instances automatically based on the load and can scale up to five instance*.
  • Ensure that VM3 can establish outbound connections over TCP port 8080 to the applications servers in the Montreal office.
  • Ensure that routing information is exchanged automatically between Azure and the routers in the Montreal office.
  • Enable Azure Multi-Factor Authentication (MFA) for the users in the finance department only.
  • Ensure that webapp2.azurewebsites.net can be accessed by using the name app2.Litware.com.
  • Connect the New Your office to VNet1 over the Internet by using an encrypted connection.
  • Create a workflow to send an email message when the settings of VM4 are modified.
  • Create a custom Azure role named Role1 that is based on the Reader role.
  • Minimize costs whenever possible.

Which blade should you instruct the finance department auditors to use?

Partner information
Overview
Payment methods
Invoices

A

The correct answer is “Invoices”
Here’s why this is correct:
Invoices blade:
Shows detailed billing information
Contains historical billing data
Provides downloadable invoices
Allows auditors to review financial records
Shows itemized costs and charges
Why other options are incorrect:
“Partner information”
Shows partner/reseller details
Not related to billing audits
Not relevant for internal finance auditing
“Overview”
Too general
Lacks detailed financial information
Not specific enough for auditing purposes
“Payment methods”
Shows payment configurations
Not useful for historical cost analysis
Doesn’t provide billing details
Important notes for AZ-104 exam:
Azure Cost Management Features:
Invoices
Cost analysis
Budgets
Cost alerts
Exports
Price sheets
Invoice Contents:
Detailed usage breakdown
Service costs
Credits applied
Tax information
Payment terms
Billing period details
Access Control:
RBAC roles for billing
Billing Reader role
Cost Management Reader
Billing Administrator
Owner permissions
Best Practices:
Regular review of costs
Download invoices monthly
Track spending patterns
Monitor budget alerts
Review cost optimizations
Key Billing Concepts:
Billing periods
Invoice sections
Cost allocation
Subscription billing
Enterprise agreements
Pay-as-you-go
Cost Management Tools:
Cost analysis
Budgets
Recommendations
Exports
Reports
Alerts
Important Features for Auditors:
Detailed cost breakdown
Historical data access
Export capabilities
Filtering options
Custom reports
Remember:
Invoice retention period
Download and archive options
Access requirements
Audit trail requirements
Compliance needs
This knowledge is crucial for the AZ-104 exam because:
Cost management is a key responsibility
Understanding billing access
Knowledge of available tools
Security and compliance requirements
Common exam scenarios test:
Billing access management
Cost analysis tools
Invoice management
Budget monitoring
Cost optimization
Additional exam tips:
Know billing roles
Understand access levels
Familiar with cost tools
Know reporting options
Understand billing cycles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Topic 1, Litware, inc.

Overview

Litware, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.

The Montreal office has 2,000 employees. The Seattle office has 1,000 employees. The New York office has 200 employees.

All the resources used by Litware are hosted on-premises.

Litware creates a new Azure subscription. The Azure Active Directory (Azure AD) tenant uses a domain named Litware.onmicrosoft.com. The tenant uses the P1 pricing tier.

Existing Environment

The network contains an Active Directory forest named Litware.com. All domain controllers are configured as DNS servers and host the Litware.com DNS zone.

Litware has finance, human resources, sales, research, and information technology departments. Each department has an organizational unit (OU) that contains all the accounts of that respective department. All the user accounts have the department attribute set to their respective department. New users are added frequently.

Litware.com contains a user named User1.

All the offices connect by using private links.

Litware has data centers in the Montreal and Seattle offices. Each data center has a firewall that can be configured as a VPN device.

All infrastructure servers are virtualized.

The virtualization environment contains the servers in the following table.

Name Role Contains virtual machine
Server1 VMWare vCenter server VM1
Server2 Hyper-V-host VM2

Litware uses two web applications named App1 and App2. Each instance on each web
application requires 1GB of memory.

The Azure subscription contains the resources in the following table.
Name Type
VNet1 Virtual network
VM3 Virtual machine
VM4 Virtual machine
The network security team implements several network security groups (NSGs).

Planned Changes

Litware plans to implement the following changes:

  • Deploy Azure ExpressRoute to the Montreal office.
  • Migrate the virtual machines hosted on Server1 and Server2 to Azure.
  • Synchronize on-premises Active Directory to Azure Active Directory (Azure AD).
  • Migrate App1 and App2 to two Azure web apps named webApp1 and WebApp2.

Technical requirements

Litware must meet the following technical requirements:

  • Ensure that WebApp1 can adjust the number of instances automatically based on the load and can scale up to five instance*.
  • Ensure that VM3 can establish outbound connections over TCP port 8080 to the applications servers in the Montreal office.
  • Ensure that routing information is exchanged automatically between Azure and the routers in the Montreal office.
  • Enable Azure Multi-Factor Authentication (MFA) for the users in the finance department only.
  • Ensure that webapp2.azurewebsites.net can be accessed by using the name app2.Litware.com.
  • Connect the New Your office to VNet1 over the Internet by using an encrypted connection.
  • Create a workflow to send an email message when the settings of VM4 are modified.
  • Create a custom Azure role named Role1 that is based on the Reader role.
  • Minimize costs whenever possible.

You need to resolve the Active Directory issue.

What should you do?

From Active Directory Users and Computers, select the user accounts, and then modify the User Principal Name value.
Run idfix.exe, and then use the Edit action.
From Active Directory Domains and Trusts, modify the list of UPN suffixes.
From Azure AD Connect, modify the outbound synchronization rule.

You are evaluating the connectivity between the virtual machines after the
planned implementation of the Azure networking infrastructure.
For each of the following statements, select Yes if the statement is true.
Otherwise, select No.
Statements
The virtual machines on Subnet1 will be able to connect to
the virtual machines on Subnet3.
The virtual machines on ClientSubnet will be able to connect
to the Internet.
The virtual machines on Subnet3 and Subnet4 will be able
to connect to the Internet.

A

For the Active Directory issue, the correct answer is:
“Run idfix.exe, and then use the Edit action”
Here’s why this is correct:
IdFix:
Specifically designed to identify and fix Azure AD sync issues
Detects and resolves directory issues before synchronization
Handles UPN conflicts, invalid characters, and duplicates
Microsoft’s recommended tool for pre-sync cleanup
Why other options are incorrect:
“Modify User Principal Name value manually”:
Time-consuming for multiple users
Prone to human error
Not scalable solution
“Modify UPN suffixes”:
Doesn’t address existing conflicts
Doesn’t fix individual user issues
Too broad of a solution
“Modify outbound synchronization rule”:
Doesn’t fix source directory issues
Could cause additional problems
Wrong approach for directory cleanup
For the connectivity evaluation:
The correct answers are:
“The virtual machines on Subnet1 will be able to connect to Subnet3” - Yes
“The virtual machines on ClientSubnet will be able to connect to the Internet” - Yes
“The virtual machines on Subnet3 and Subnet4 will be able to connect to the Internet” - No
Important notes for AZ-104 exam:
IdFix Tool Features:
Identifies sync blockers
Shows directory errors
Provides fix options
Generates reports
Batch processing capability
Common Directory Issues:
Invalid characters
UPN conflicts
Duplicate attributes
Missing required attributes
Character length violations
Network Connectivity:
VNet peering allows VM communication
NSGs control traffic flow
Route tables affect routing
Internet connectivity depends on configuration
Best Practices:
Run IdFix before sync
Document changes
Backup before fixes
Test in staging
Monitor sync health
Network Security:
NSG rules
Route tables
Network policies
Security baselines
Access controls
Remember:
Directory preparation is crucial
Use Microsoft tools
Test before production
Document changes
Monitor results
Networking Concepts:
VNet peering
Subnet communication
Internet connectivity
Routing
Security rules
Implementation Steps:
Run directory analysis
Fix identified issues
Test synchronization
Monitor results
Document changes
This knowledge is crucial for the AZ-104 exam because:
Directory synchronization is common
Network connectivity is fundamental
Security implementation is critical
Tool knowledge is required
Common exam scenarios test:
Directory sync preparation
Network connectivity
Security implementation
Tool usage
Best practices
Additional exam tips:
Understand IdFix usage
Know networking concepts
Understand security implications
Know troubleshooting steps
Understand connectivity requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are evaluating the name resolution for the virtual machines after the planned implementation of the Azure networking infrastructure.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Statements
The virtual machines on Subnet1 will be able to resolve the hosts in the humongousinsurance.local zone.
The virtual machines on ClientSubnet will be able to register the hostname records in the humongousinsurance.local zone.
The virtual machines on Subnet4 will be able to register the hostname records in the humongousinsurance.local zone.

A

The correct answers are:
“The virtual machines on Subnet1 will be able to resolve the hosts in the humongousinsurance.local zone” - Yes
“The virtual machines on ClientSubnet will be able to register the hostname records in the humongousinsurance.local zone” - No
“The virtual machines on Subnet4 will be able to register the hostname records in the humongousinsurance.local zone” - No
Here’s why:
Subnet1 resolution - Yes:
Connected to on-premises via ExpressRoute
Can access on-premises DNS servers
DNS forwarding is configured
Part of the connected network infrastructure
ClientSubnet registration - No:
Not directly connected to on-premises
No dynamic DNS registration rights
Separate from on-premises DNS infrastructure
Limited to Azure DNS capabilities
Subnet4 registration - No:
Isolated from on-premises network
No direct DNS registration access
Different DNS infrastructure
No dynamic registration capability
Important notes for AZ-104 exam:
DNS Configuration in Azure:
Custom DNS settings
Azure-provided DNS
DNS forwarding
Conditional forwarding
Private DNS zones
Name Resolution Types:
Azure-provided name resolution
Custom DNS servers
Hybrid DNS solutions
Private DNS zones
Public DNS zones
DNS Integration Scenarios:
On-premises integration
VNet-to-VNet resolution
Cross-premises resolution
Forward and reverse lookup
Conditional forwarding
Best Practices:
Use Azure Private DNS zones
Configure DNS forwarding
Plan DNS strategy
Test name resolution
Document DNS architecture
Key Concepts:
DNS servers
Name resolution
DNS forwarding
Zone delegation
Record registration
Network Planning:
DNS infrastructure
Name resolution strategy
Cross-premises connectivity
Network segmentation
Security considerations
Common Configurations:
Custom DNS servers
Azure Private DNS
Forwarding rules
Conditional forwarding
Zone delegation
Remember:
DNS propagation time
Registration requirements
Resolution paths
Security implications
Performance impact
This knowledge is crucial for the AZ-104 exam because:
DNS is fundamental to Azure networking
Hybrid connectivity is common
Name resolution is critical
Security implications exist
Key exam topics:
DNS configuration
Name resolution
Network connectivity
Hybrid scenarios
Security considerations
Additional exam tips:
Understand DNS concepts
Know resolution paths
Understand registration requirements
Know security implications
Understand hybrid scenarios
Common scenarios test:
DNS configuration
Name resolution
Network connectivity
Security implementation
Hybrid solutions
Best practices:
Plan DNS strategy
Document configurations
Test resolution
Monitor performance
Implement security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Topic 1, Litware, inc.

Overview

Litware, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.

The Montreal office has 2,000 employees. The Seattle office has 1,000 employees. The New York office has 200 employees.

All the resources used by Litware are hosted on-premises.

Litware creates a new Azure subscription. The Azure Active Directory (Azure AD) tenant uses a domain named Litware.onmicrosoft.com. The tenant uses the P1 pricing tier.

Existing Environment

The network contains an Active Directory forest named Litware.com. All domain controllers are configured as DNS servers and host the Litware.com DNS zone.

Litware has finance, human resources, sales, research, and information technology departments. Each department has an organizational unit (OU) that contains all the accounts of that respective department. All the user accounts have the department attribute set to their respective department. New users are added frequently.

Litware.com contains a user named User1.

All the offices connect by using private links.

Litware has data centers in the Montreal and Seattle offices. Each data center has a firewall that can be configured as a VPN device.

All infrastructure servers are virtualized.

The virtualization environment contains the servers in the following table.

Name Role Contains virtual machine
Server1 VMWare vCenter server VM1
Server2 Hyper-V-host VM2

Litware uses two web applications named App1 and App2. Each instance on each web
application requires 1GB of memory.

The Azure subscription contains the resources in the following table.
Name Type
VNet1 Virtual network
VM3 Virtual machine
VM4 Virtual machine
The network security team implements several network security groups (NSGs).

Planned Changes

Litware plans to implement the following changes:

  • Deploy Azure ExpressRoute to the Montreal office.
  • Migrate the virtual machines hosted on Server1 and Server2 to Azure.
  • Synchronize on-premises Active Directory to Azure Active Directory (Azure AD).
  • Migrate App1 and App2 to two Azure web apps named webApp1 and WebApp2.

Technical requirements

Litware must meet the following technical requirements:

  • Ensure that WebApp1 can adjust the number of instances automatically based on the load and can scale up to five instance*.
  • Ensure that VM3 can establish outbound connections over TCP port 8080 to the applications servers in the Montreal office.
  • Ensure that routing information is exchanged automatically between Azure and the routers in the Montreal office.
  • Enable Azure Multi-Factor Authentication (MFA) for the users in the finance department only.
  • Ensure that webapp2.azurewebsites.net can be accessed by using the name app2.Litware.com.
  • Connect the New Your office to VNet1 over the Internet by using an encrypted connection.
  • Create a workflow to send an email message when the settings of VM4 are modified.
  • Create a custom Azure role named Role1 that is based on the Reader role.
  • Minimize costs whenever possible.

You need to prepare the environment to meet the authentication requirements.

Which two actions should you perform? Each correct answer presents part of the solution. NOTE Each correct selection is worth one point.

Azure Active Directory (AD) Identity Protection and an Azure policy
a Recovery Services vault and a backup policy
an Azure Key Vault and an access policy
an Azure Storage account and an access policy

A

The correct answers are:
“Azure Active Directory (AD) Identity Protection”
“an Azure Key Vault and an access policy”
Here’s why these are correct:
Azure AD Identity Protection:
Required for MFA implementation
Provides risk-based conditional access
Helps secure finance department users
Part of Azure AD P1 licensing (mentioned in scenario)
Azure Key Vault and access policy:
Securely stores authentication credentials
Manages certificates and secrets
Controls access to sensitive information
Supports MFA implementation [1]
Why other options are incorrect:
“Recovery Services vault and backup policy”:
For backup and disaster recovery
Not related to authentication
Wrong service for MFA
“Azure Storage account and access policy”:
For data storage
Not related to authentication
Wrong service for MFA requirements
Important notes for AZ-104 exam:
Azure AD Identity Protection Features:
Risk-based conditional access
MFA enforcement
Risk detection
Automated responses
Security reporting
Key Vault Features:
Secret management
Key management
Certificate management
Access policies
RBAC integration
MFA Implementation:
Conditional Access policies
Per-user MFA
Risk-based authentication
Security defaults
Authentication methods
Best Practices:
Use conditional access
Implement least privilege
Regular access reviews
Monitor sign-in attempts
Document policies
Security Considerations:
Risk levels
Authentication strength
Access controls
Monitoring
Compliance requirements
Remember:
P1 licensing requirements
MFA configuration options
Policy implementation
Security monitoring
Access management
Implementation Steps:
Enable Identity Protection
Configure Key Vault
Set up access policies
Enable MFA
Test configuration
Key Concepts: [2]
Conditional Access
Risk policies
Authentication methods
Access policies
Security monitoring
This knowledge is crucial for the AZ-104 exam because:
Authentication is fundamental
Security implementation is critical
Service integration is important
Licensing knowledge required
Common exam scenarios test:
MFA implementation
Security configuration
Access management
Policy setup
Service integration
Additional exam tips:
Understand licensing requirements
Know security features
Understand policy types
Know implementation steps
Understand monitoring options
Best practices:
Plan security strategy
Document configurations
Test implementations
Monitor effectiveness
Regular reviews
Remember:
Azure AD P1 features
MFA capabilities
Key Vault usage
Policy types
Security monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which blade should you instruct the finance department auditors to use?

invoices
partner information
cost analysis
External services

A

Okay, let’s break down each of these Azure portal blades and determine which one finance department auditors would most likely use:
Invoices: This blade provides a detailed breakdown of Azure consumption charges. It includes information on services used, costs incurred, and billing periods.
Partner Information: This blade is primarily for managing partners who provide access to your Azure resources.
Cost Analysis: This blade offers tools for visualizing and analyzing Azure spending patterns. You can filter by various parameters, set budgets, and receive alerts.
External Services: This blade is usually used to manage third-party services used by your Azure resources.
The Best Choice for Auditors:
Finance department auditors are primarily concerned with ensuring accurate billing and understanding where money is being spent. Therefore, the most appropriate blades for them would be:
Invoices: This provides the raw data about what they are paying for.
Cost Analysis: This allows them to investigate spending trends and anomalies.
Therefore, based on the available options, the correct answer is:
Cost analysis
While the invoices blade is also related to auditing, in the given scenario Cost analysis is the most suitable for the finance department.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Topic 1, Litware, inc.

Overview

Litware, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.

The Montreal office has 2,000 employees. The Seattle office has 1,000 employees. The New York office has 200 employees.

All the resources used by Litware are hosted on-premises.

Litware creates a new Azure subscription. The Azure Active Directory (Azure AD) tenant uses a domain named Litware.onmicrosoft.com. The tenant uses the P1 pricing tier.

Existing Environment

The network contains an Active Directory forest named Litware.com. All domain controllers are configured as DNS servers and host the Litware.com DNS zone.

Litware has finance, human resources, sales, research, and information technology departments. Each department has an organizational unit (OU) that contains all the accounts of that respective department. All the user accounts have the department attribute set to their respective department. New users are added frequently.

Litware.com contains a user named User1.

All the offices connect by using private links.

Litware has data centers in the Montreal and Seattle offices. Each data center has a firewall that can be configured as a VPN device.

All infrastructure servers are virtualized.

The virtualization environment contains the servers in the following table.

Name Role Contains virtual machine
Server1 VMWare vCenter server VM1
Server2 Hyper-V-host VM2

Litware uses two web applications named App1 and App2. Each instance on each web
application requires 1GB of memory.

The Azure subscription contains the resources in the following table.
Name Type
VNet1 Virtual network
VM3 Virtual machine
VM4 Virtual machine
The network security team implements several network security groups (NSGs).

Planned Changes

Litware plans to implement the following changes:

  • Deploy Azure ExpressRoute to the Montreal office.
  • Migrate the virtual machines hosted on Server1 and Server2 to Azure.
  • Synchronize on-premises Active Directory to Azure Active Directory (Azure AD).
  • Migrate App1 and App2 to two Azure web apps named webApp1 and WebApp2.

Technical requirements

Litware must meet the following technical requirements:

  • Ensure that WebApp1 can adjust the number of instances automatically based on the load and can scale up to five instance*.
  • Ensure that VM3 can establish outbound connections over TCP port 8080 to the applications servers in the Montreal office.
  • Ensure that routing information is exchanged automatically between Azure and the routers in the Montreal office.
  • Enable Azure Multi-Factor Authentication (MFA) for the users in the finance department only.
  • Ensure that webapp2.azurewebsites.net can be accessed by using the name app2.Litware.com.
  • Connect the New Your office to VNet1 over the Internet by using an encrypted connection.
  • Create a workflow to send an email message when the settings of VM4 are modified.
  • Create a custom Azure role named Role1 that is based on the Reader role.
  • Minimize costs whenever possible.

You need to resolve the licensing issue before you attempt to assign the license again.

What should you do?

From the Groups blade, invite the user accounts to a new group.
From the Profile blade, modify the usage location.
From the Directory role blade, modify the directory role.

A

Okay, let’s analyze the situation and determine the correct step to resolve a licensing issue when assigning licenses to users.
Understanding the Problem
The scenario implies that there’s a licensing issue preventing you from assigning licenses to users. This is a common problem, and it often stems from one of these situations:
Incorrect Usage Location: Azure AD licenses are tied to a user’s usage location. If the user’s usage location is not set, or set to a region where the license is not valid, you’ll run into assignment issues.
Insufficient Licenses: You might simply not have enough licenses of the type you’re trying to assign. This seems less likely, as you are trying to resolve an issue, not trying to purchase licenses.
Licensing Conflict: There can be licensing conflicts between different types of licenses. This is not explicitly in this scenario.
User already has a license: The user may have an existing license which is causing a conflict. This is not explicitly in this scenario
Analyzing the Options
From the Groups blade, invite the user accounts to a new group: This is not the solution to licensing issues. Groups are often used for assigning licenses but not for directly solving a licensing issue. The problem is not the group membership, but the user profile.
From the Profile blade, modify the usage location: This is the correct action. If the user’s profile doesn’t have a valid usage location, it will cause license assignment problems. Specifying a usage location will ensure licensing is applicable to the specified user.
From the Directory role blade, modify the directory role: Directory roles are about the administrative permissions assigned to users. They have nothing to do with licensing. Changing directory roles will not fix a license assignment issue.
The Correct Action
The correct solution is to modify the usage location of the affected user(s) from the Profile blade. The usage location must be set for licenses to be assigned correctly.
Answer:
From the Profile blade, modify the usage location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Topic 1, Litware, inc.

Overview

Litware, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.

The Montreal office has 2,000 employees. The Seattle office has 1,000 employees. The New York office has 200 employees.

All the resources used by Litware are hosted on-premises.

Litware creates a new Azure subscription. The Azure Active Directory (Azure AD) tenant uses a domain named Litware.onmicrosoft.com. The tenant uses the P1 pricing tier.

Existing Environment

The network contains an Active Directory forest named Litware.com. All domain controllers are configured as DNS servers and host the Litware.com DNS zone.

Litware has finance, human resources, sales, research, and information technology departments. Each department has an organizational unit (OU) that contains all the accounts of that respective department. All the user accounts have the department attribute set to their respective department. New users are added frequently.

Litware.com contains a user named User1.

All the offices connect by using private links.

Litware has data centers in the Montreal and Seattle offices. Each data center has a firewall that can be configured as a VPN device.

All infrastructure servers are virtualized.

The virtualization environment contains the servers in the following table.

Name Role Contains virtual machine
Server1 VMWare vCenter server VM1
Server2 Hyper-V-host VM2

Litware uses two web applications named App1 and App2. Each instance on each web
application requires 1GB of memory.

The Azure subscription contains the resources in the following table.
Name Type
VNet1 Virtual network
VM3 Virtual machine
VM4 Virtual machine
The network security team implements several network security groups (NSGs).

Planned Changes

Litware plans to implement the following changes:

  • Deploy Azure ExpressRoute to the Montreal office.
  • Migrate the virtual machines hosted on Server1 and Server2 to Azure.
  • Synchronize on-premises Active Directory to Azure Active Directory (Azure AD).
  • Migrate App1 and App2 to two Azure web apps named webApp1 and WebApp2.

Technical requirements

Litware must meet the following technical requirements:

  • Ensure that WebApp1 can adjust the number of instances automatically based on the load and can scale up to five instance*.
  • Ensure that VM3 can establish outbound connections over TCP port 8080 to the applications servers in the Montreal office.
  • Ensure that routing information is exchanged automatically between Azure and the routers in the Montreal office.
  • Enable Azure Multi-Factor Authentication (MFA) for the users in the finance department only.
  • Ensure that webapp2.azurewebsites.net can be accessed by using the name app2.Litware.com.
  • Connect the New Your office to VNet1 over the Internet by using an encrypted connection.
  • Create a workflow to send an email message when the settings of VM4 are modified.
  • Create a custom Azure role named Role1 that is based on the Reader role.
  • Minimize costs whenever possible.

You need to prepare the environment to ensure that the web administrators
can deploy the web apps as quickly as possible.
Which three actions should you perform in sequence? To answer, move the
appropriate actions from the list of actions to the answer area and arrange
them in the correct order.
Actions
From the Automation script blade of the resource group,
click Deploy.
From the Templates service, select the template, and then
share the template to the web administrators.
From the Automation script blade of the resource group,
click Add to library.
From the Automation Accounts service, add an automation
account.
Create a resource group, and then deploy a web app to
the resource group.
From the Automation script blade of the resource group,
click the Parameters tab.
Answer Area

A

Here’s the correct sequence of actions to prepare the environment for web administrators to deploy web apps quickly:
“Create a resource group, and then deploy a web app to the resource group”
“From the Automation script blade of the resource group, click Add to library”
“From the Templates service, select the template, and then share the template to the web administrators”
Let’s analyze why this sequence is correct:
Step 1: Create a resource group and deploy a web app
# Create Resource Group
New-AzResourceGroup -Name “WebAppsRG” -Location “EastUS”
# Deploy Web App
New-AzWebApp -ResourceGroupName “WebAppsRG” `
-Name “WebApp1” `
-Location “EastUS” `
-AppServicePlan “AppPlan1”
Copy
Insert at cursor
powershell
Why first:
Establishes base infrastructure
Creates working example
Provides template source
Required for automation script
Step 2: Add to library from Automation script blade
# Export template
Export-AzResourceGroup -ResourceGroupName “WebAppsRG” `
-Path “./template.json”
Copy
Insert at cursor
powershell
Why second:
Captures working configuration
Creates reusable template
Saves proven deployment
Enables standardization
Step 3: Share template with web administrators
# Share template
New-AzTemplateSpec -Name “WebAppTemplate” `
-Version “1.0” `
-ResourceGroupName “WebAppsRG” `
-Location “EastUS” `
-TemplateFile “./template.json”
Copy
Insert at cursor
powershell
Why third:
Enables self-service deployment
Provides standardized template
Ensures consistency
Speeds up deployment
Why other options are incorrect:
“From the Automation script blade, click Deploy”:
Not needed if sharing template
Redundant step
Not part of preparation
“From the Automation Accounts service, add an automation account”:
Not required for template deployment
Different automation purpose
Unnecessary complexity
“From the Automation script blade, click the Parameters tab”:
Not a complete action
Part of template editing
Not required for sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Topic 3, Contoso Ltd

Overview

Contoso, Ltd. is a manufacturing company that has offices worldwide. Contoso works with partner organizations to bring products to market.

Contoso products are manufactured by using blueprint files that the company authors and maintains.

Existing Environment

Currently, Contoso uses multiple types of servers for business operations, including the following:

✑ File servers

✑ Domain controllers

✑ Microsoft SQL Server servers

Your network contains an Active Directory forest named contoso.com. All servers and client computers are joined to Active Directory.

You have a public-facing application named App1.

App1 is comprised of the following three tiers:

✑ A SQL database

✑ A web front end

✑ A processing middle tier

Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS only.

Requirements

Planned Changes

Contoso plans to implement the following changes to the infrastructure:

  • Move all the tiers of App1 to Azure.
  • Move the existing product blueprint files to Azure Blob storage.
  • Create a hybrid directory to support an upcoming Microsoft Office 365 migration project.

Technical Requirements

Contoso must meet the following technical requirements:

✑ Move all the virtual machines for App1 to Azure.

✑ Minimize the number of open ports between the App1 tiers.

✑ Ensure that all the virtual machines for App1 are protected by backups.

✑ Copy the blueprint files to Azure over the Internet.

✑ Ensure that the blueprint files are stored in the archive storage tier.

✑ Ensure that partner access to the blueprint files is secured and temporary.

✑ Prevent user passwords or hashes of passwords from being stored in Azure.

✑ Use unmanaged standard storage for the hard disks of the virtual machines.

✑ Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a mobile phone to verify their identity.

Minimize administrative effort whenever possible.

User Requirements

Contoso identifies the following requirements for users:

✑ Ensure that only users who are part of a group named Pilot can join devices to Azure AD.

✑ Designate a new user named Admin1 as the service administrator of the Azure subscription.

✑ Admin1 must receive email alerts regarding service outages.

✑ Ensure that a new user named User3 can create network objects for the Azure subscription.

HOTSPOT

You need to identify the storage requirements for Contoso.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Statements
Contoso requires a storage account that supports
Blob storage.
Contoso requires a storage account that supports
Azure Table storage.
Contoso requires a storage account that supports
Azure File Storage.

A

Understanding the Requirements

Blueprint Files: Contoso needs to move their product blueprint files to Azure. These files will be stored in the archive storage tier and require secure, temporary access for partners.

Virtual Machine Storage: The virtual machines for App1 will use unmanaged standard storage for their hard disks.

No Direct User Requirement for Table or File Storage: The requirements do not mention other user related storage requirements.

Analyzing Storage Options

Blob Storage: Blob storage is ideal for storing unstructured data like text or binary data. In this case, the blueprint files fall under unstructured data, making Blob storage a good fit. Additionally, the requirement to use the archive tier is something that only blob storage can provide.

Table Storage: Table storage is a NoSQL key-value datastore, suitable for structured data. There’s no indication that Contoso needs this for their blueprints or virtual machine disks.

File Storage: File storage provides fully managed file shares in the cloud. The requirements focus on moving blueprint files to Azure blob storage, no requirement for a managed file share.

Answering the Statements:

Contoso requires a storage account that supports Blob storage. - Yes. The blueprint files must be stored in Blob storage, making this requirement essential.

Contoso requires a storage account that supports Azure Table storage. - No. There is no indication in the requirements that they require Table storage.

Contoso requires a storage account that supports Azure File Storage. - No. They must move blueprints to blob storage and no requirements dictate the need for Azure File storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You are planning the move of App1 to Azure.

You create a network security group (NSG).

You need to recommend a solution to provide users with access to App1.

What should you recommend?

Create an outgoing security rule for port 443 from the Internet. Associate the NSG to all the subnets.
Create an incoming security rule for port 443 from the Internet. Associate the NSG to all the subnets.
Create an incoming security rule for port 443 from the Internet. Associate the NSG to the subnet that contains the web servers.
Create an outgoing security rule for port 443 from the Internet. Associate the NSG to the subnet that contains the web servers.

A

The correct answer is: Create an incoming security rule for port 443 from the Internet. Associate the NSG to the subnet that contains the web servers. [1]
Let’s analyze why this is the correct solution:
Why this is correct:
Port 443 is for HTTPS traffic
Requirements state “Users access the web front end by using HTTPS only”
Only web tier needs public access
Follows principle of least privilege
Example NSG rule configuration:
# Create NSG rule for HTTPS
$nsgRule = New-AzNetworkSecurityRuleConfig `
-Name “Allow-HTTPS-Inbound” `
-Description “Allow HTTPS inbound traffic” `
-Access Allow `
-Protocol Tcp `
-Direction Inbound `
-Priority 100 `
-SourceAddressPrefix Internet `
-SourcePortRange * `
-DestinationAddressPrefix * `
-DestinationPortRange 443
Copy
Insert at cursor
powershell
Why other options are incorrect:
A. “Create an outgoing security rule for port 443 from the Internet”:
Wrong direction (outbound vs. inbound)
Users initiate connections to web servers
Outbound rules not needed for incoming web traffic
B. “Associate the NSG to all the subnets”:
Violates least privilege principle
Unnecessarily exposes other tiers
Creates potential security risks
Middle and database tiers don’t need public access
Important Security Considerations:
Application Architecture:
Internet -> Web Tier (Port 443) -> Middle Tier -> Database Tier
Copy
Insert at cursor
text
Tier Isolation:
Web tier: Public access (Port 443)
Middle tier: Internal only
Database tier: Internal only
Best Practices:
Limit public access to web tier only
Use separate NSGs for different tiers
Follow least privilege principle
Document security rules
Regular security review
Implementation Steps:
# Create NSG
$nsg = New-AzNetworkSecurityGroup `
-ResourceGroupName “RG1” `
-Location “EastUS” `
-Name “WebTier-NSG”
# Add rule to NSG
Add-AzNetworkSecurityRuleConfig `
-NetworkSecurityGroup $nsg `
-Name “Allow-HTTPS-Inbound” `
-Access Allow `
-Protocol Tcp `
-Direction Inbound `
-Priority 100 `
-SourceAddressPrefix Internet `
-SourcePortRange * `
-DestinationAddressPrefix * `
-DestinationPortRange 443
# Associate NSG with web tier subnet
Set-AzVirtualNetworkSubnetConfig `
-VirtualNetwork $vnet `
-Name “WebTierSubnet” `
-AddressPrefix “10.0.1.0/24” `
-NetworkSecurityGroup $nsg
Copy
Insert at cursor
powershell
Key Points:
HTTPS requires port 443
Inbound direction for user access
Web tier only needs public access
Other tiers should be protected
Security Benefits:
Minimizes attack surface
Proper network segmentation
Clear security boundaries
Controlled access
Remember:
Only expose necessary ports
Only on required subnets
Document all rules
Regular security reviews
Monitor traffic patterns
This solution specifically:
Enables HTTPS access
Protects internal tiers
Follows security best practices
Supports application architecture
Minimizes security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You need to recommend an identify solution that meets the technical requirements.

What should you recommend?

federated single-on (SSO) and Active Directory Federation Services (AD FS)
password hash synchronization and single sign-on (SSO)
cloud-only user accounts
Pass-through Authentication and single sign-on (SSO)

A

Install Azure AD Connect

Understanding the Requirements
Hybrid Directory: Contoso needs to create a hybrid directory to support the Office 365 migration. This means integrating their on-premises Active Directory with Azure AD.
Prevent Password Hashes in Azure: A key requirement is to avoid storing user password hashes in Azure. This limits the available options.
User Authentication: Users should be able to access resources seamlessly (ideally with single sign-on).
Analyzing the Options
Federated single sign-on (SSO) and Active Directory Federation Services (AD FS): With this setup, the authentication process is handled by the on-premises AD FS servers, which is the correct approach to prevent password hashes being stored in Azure AD. Users would authenticate against their AD environment, and AD FS would create a token that can be used by Azure AD.
Password hash synchronization and single sign-on (SSO): This option involves synchronizing password hashes to Azure AD, which directly violates the requirement to prevent user passwords or hashes from being stored in Azure.
Cloud-only user accounts: While this is an option, it wouldn’t fit the requirement for a hybrid directory or single sign-on with their existing on-premises domain, it would also create a new user directory separate from on-premises which does not align with the requirements.
Pass-through Authentication and single sign-on (SSO): This approach keeps the authentication process on premises. When users attempt to authenticate to Azure AD, the request is passed to an agent on-premises, which validates the user against the on-premises active directory. While this approach does meet the requirements, the federated approach is better and more scalable.
The Correct Recommendation
The best solution is to implement federated single sign-on (SSO) with Active Directory Federation Services (AD FS).
Answer:
federated single sign-on (SSO) and Active Directory Federation Services (AD FS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You need to configure the Device settings to meet the technical requirements and the user requirements.

Which two settings should you modify? To answer, select the appropriate settings in the answer area.
To answer, select the appropriate settings in the answer area.

Answer Area:

Users may join devices to Azure AD:

Options: All, Selected, None
Selected: No member selected
Additional local administrators on Azure AD joined devices:

Options: Selected, None
Selected: No member selected
Users may register their devices with Azure AD:

Options: All, None
Require Multi-Factor Auth to join devices:

Options: Yes, No
Maximum number of devices per user:

Value: 50
Users may sync settings and app data across devices:

Options: All, Selected, None
Selected: No member selected

A

Based on the technical and user requirements, here are the two settings that need to be modified:
“Users may join devices to Azure AD”: Select “Selected” Why:
Requirement states “only users who are part of a group named Pilot can join devices to Azure AD”
Need to restrict device join capability
Select the “Pilot” group
“Require Multi-Factor Auth to join devices”: Select “Yes” Why:
Requirement states “users use a mobile phone to verify their identity when joining devices”
Enforces MFA during device join
Adds security layer
Configuration steps:
# Configure device settings
Set-AzureADDevice -DeviceJoinPolicy “Selected” `
-DeviceJoinGroupId “PilotGroupId”
# Enable MFA for device join
Set-AzureADDeviceConfiguration `
-RequireMFAForDeviceJoin $true
Copy
Insert at cursor
powershell
Other settings should remain default because:
“Additional local administrators”:
No requirements specified
Keep default setting
No need to modify
“Users may register devices”:
No specific requirements [1]
Keep default setting
Not mentioned in requirements
“Maximum number of devices”:
Default is sufficient
No requirements specified
No need to modify
“Users may sync settings”:
No requirements specified
Keep default setting
Not mentioned in requirements
Important notes for AZ-104 exam:
Device Join Settings:
Controls who can join devices
Group-based restrictions
Security enforcement
Access control
MFA Requirements:
Additional security
Identity verification
Mobile phone verification
Compliance requirement
Best Practices:
Limit device join rights
Enable MFA
Monitor device joins
Regular review
Document settings
Implementation Steps:
# Create Pilot group
New-AzureADGroup -DisplayName “Pilot” `
-MailEnabled $false `
-SecurityEnabled $true `
-MailNickName “NotSet”
# Add users to Pilot group
Add-AzureADGroupMember -ObjectId “PilotGroupId” `
-RefObjectId “UserId”
Copy
Insert at cursor
powershell
Key Points:
Restricted device join
MFA requirement
Group-based control
Security enhancement
User verification
Remember:
Only modify required settings
Document changes
Test configuration
Monitor compliance
Regular review
This configuration specifically:
Restricts device join to Pilot group
Enforces MFA requirement
Maintains security
Meets user requirements [2]
Follows best practices
Additional Considerations:
Regular group membership review
MFA method verification
Device monitoring
Access control
Security compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You need to implement a backup solution for App1 after the application is moved.

What should you create first?

a recovery plan
an Azure Backup Server
a backup policy
a Recovery Services vault

A

Correct Option:
a Recovery Services vault

Explanation:
a Recovery Services vault: To implement a backup solution for App1 after the application is moved to Azure, you need to create a Recovery Services vault first. The Recovery Services vault is a storage entity in Azure that houses data, including backup copies and recovery points. Once the vault is created, you can then configure backup policies and set up backups for the virtual machines and other resources associated with App1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You need to recommend a solution for App1. The solution must meet the technical requirements.
What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Number of virtual networks:
1
2
3
Number of subnets:
1
2
3

A

Let’s analyze the requirements and determine the correct number of virtual networks and subnets for App1:
Answer:
Number of virtual networks: 1
Number of subnets: 3
Let’s break down why:
Number of Virtual Networks: 1 Why:
App1 has three tiers that need to communicate
All components should be in same VNet for internal communication
Minimizes complexity and costs
Provides secure internal communication
Example VNet configuration:
# Create Virtual Network
New-AzVirtualNetwork `
-Name “App1-VNet” `
-ResourceGroupName “App1-RG” `
-Location “EastUS” `
-AddressPrefix “10.0.0.0/16”
Copy
Insert at cursor
powershell
Number of Subnets: 3 Why:
Three-tier application architecture:
Web front end tier
Processing middle tier
SQL database tier
Separate subnet for each tier
Supports network segmentation
Enables proper security controls
Subnet configuration:
# Create subnets
$webSubnet = New-AzVirtualNetworkSubnetConfig `
-Name “WebTier” `
-AddressPrefix “10.0.1.0/24”
$middleSubnet = New-AzVirtualNetworkSubnetConfig `
-Name “MiddleTier” `
-AddressPrefix “10.0.2.0/24”
$dbSubnet = New-AzVirtualNetworkSubnetConfig `
-Name “DatabaseTier” `
-AddressPrefix “10.0.3.0/24”
Copy
Insert at cursor
powershell
Architecture Benefits:
Network Security:
Internet -> Web Tier (Subnet 1)
Web Tier -> Middle Tier (Subnet 2)
Middle Tier -> Database Tier (Subnet 3)
Copy
Insert at cursor
text
NSG Implementation:
# Create NSGs for each tier
$webNSG = New-AzNetworkSecurityGroup `
-Name “WebTier-NSG” `
-ResourceGroupName “App1-RG”
$middleNSG = New-AzNetworkSecurityGroup `
-Name “MiddleTier-NSG” `
-ResourceGroupName “App1-RG”
$dbNSG = New-AzNetworkSecurityGroup `
-Name “DatabaseTier-NSG” `
-ResourceGroupName “App1-RG”
Copy
Insert at cursor
powershell
Key Benefits:
Proper network segmentation
Enhanced security
Clear traffic flow
Easy management
Cost-effective
Best Practices:
Use subnet naming convention
Implement proper NSGs
Plan IP addressing
Document configuration
Monitor traffic
Important Considerations:
Address space planning
Subnet sizing
Security requirements
Future growth
Network policies
Remember:
One VNet for simplicity
Three subnets for separation
NSGs for security
Proper planning
Documentation
This design specifically:
Supports three-tier architecture
Enables security controls
Minimizes complexity
Optimizes costs
Follows best practices
Additional Notes:
Plan IP ranges carefully
Consider future growth
Implement proper routing
Monitor performance
Regular security review
Network Design Tips:
Use meaningful names
Document IP ranges
Plan security rules
Consider connectivity
Enable monitoring
Security Considerations:
Tier isolation
Traffic control
Access restrictions
Monitoring
Compliance requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Topic 4, Contoso Ltd (Consulting Company)

Case study

This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.

To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study.

At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section.

To start the case study

To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. If the case study has an All Information tab, note that the information displayed is identical to the information displayed on the subsequent tabs. When you are ready to answer a question, click the Question button to return to the question.

Overview

General Overview

Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in Seattle and New York.

Environment

Existing Environment

Contoso has an Azure subscription named Sub1 that is linked to an Azure Active Directory (Azure AD) tenant. The network contains an on-premises Active Directory domain that syncs to the Azure AD tenant.

The Azure AD tenant contains the users shown in the following table.
Name Type Role
User1 Member None
User2 Guest None
User3 Member None
User4 Member None
Sub1 contains two resource groups named RG1 and RG2 and the virtual networks shown in the
following table.
Name Subnet Peered with
VNET1 Subnet1, Subnet2 VNET2
VNET2 Subnet1 VNET1, VNET3
VNET3 Subnet1 VNET2
VNET4 Subnet1 None
User1 manages the resources in RG1. User4 manages the resources in RG2.
Sub1 contains virtual machines that run Windows Server 2019 as shown in the following table
Name IP address Location Connected to
VM1 10.0.1.4 West US VNET1/Subnet1
VM2 10.0.2.4 West US VNET1/Subnet2
VM3 172.16.1.4 Central US VNET2/Subnet1
VM4 192.168.1.4 West US VNET3/Subnet1
VM5 10.0.22.4 East US VNET4/Subnet1
No network security groups (NSGs) are associated to the network interfaces or the subnets.
Sub1 contains the storage accounts shown in the following table.
Name Kind Location File share Identity-based
access for file share
storage1 Storage (general purpose v1) West US sharea Azure Active Directory Domain Services (Azure AD DS)
storage2 StorageV2 (general purpose v2) East US shareb, sharec Disabled
storage3 BlobStorage East US 2 Not applicable Not applicable
storage4 FileStorage Central US shared Azure Active Directory Domain Services (Azure AD DS)
Requirements

Planned Changes

Contoso plans to implement the following changes:

✑ Create a blob container named container1 and a file share named share1 that will use the Cool storage tier.

✑ Create a storage account named storage5 and configure storage replication for the Blob service.

✑ Create an NSG named NSG1 that will have the custom inbound security rules shown in the following table.
|—|—|—|—|—|—|
| 200 | 3389 | TCP | 10.0.0.0/16 | Virtual Network | Deny |
| 400 | Any | ICMP | 10.0.2.0/24 | 10.0.1.0/24 | Allow |

Associate NSG2 to VNET1/Subnet2.

Technical Requirements

Contoso must meet the following technical requirements:

✑ Create container1 and share1.

✑ Use the principle of least privilege.

✑ Create an Azure AD security group named Group4.

✑ Back up the Azure file shares and virtual machines by using Azure Backup.

✑ Trigger an alert if VM1 or VM2 has less than 20 GB of free space on volume C.

✑ Enable User1 to create Azure policy definitions and User2 to assign Azure policies to RG1.

✑ Create an internal Basic Azure Load Balancer named LB1 and connect the load balancer to VNET1/Subnet1

✑ Enable flow logging for IP traffic from VM5 and retain the flow logs for a period of eight months.

✑ Whenever possible, grant Group4 Azure role-based access control (Azure RBAC) read-only permissions to the Azure file shares.

HOTSPOT

You need to create container1 and share1.

Which storage accounts should you use for each resource? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
container1:
storage2 only
storage2 and storage3 only
storage1, storage2, and storage3 only
storage2, storage3, and storage4 only
storage1, storage2, storage3, and storage4
share1:
storage2 only
storage4 only
storage2 and storage4 only
storage1, storage2, and storage4 only
storage1, storage2, storage3, and storage4

Priority | Port | Protocol | Source | Destination | Action |

A

Let me help you determine the appropriate storage accounts for container1 and share1, considering the requirements and storage account types provided.
For container1:
The correct answer is “storage2 and storage3 only”
Reasoning:
container1 needs to use the Cool storage tier
Looking at the storage accounts:
storage1 is General Purpose v1 which doesn’t support Cool tier
storage2 (StorageV2) supports Cool tier for blobs
storage3 (BlobStorage) supports Cool tier for blobs
storage4 is FileStorage which doesn’t support blob containers
For share1:
The correct answer is “storage2 and storage4 only”
Reasoning:
share1 needs to be a file share with Cool tier support
Looking at the storage accounts:
storage1 is GPv1 which doesn’t support Cool tier for file shares
storage2 (StorageV2) supports Cool tier for file shares
storage3 is BlobStorage which doesn’t support file shares
storage4 (FileStorage) supports file shares and all tiers
Therefore:
For container1: Use either storage2 or storage3
For share1: Use either storage2 or storage4
The selection is based on the storage account types and their capabilities regarding blob containers, file shares, and support for the Cool storage tier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You have the Azure virtual machines shown in the following table.

Name IP Address Connected to
VM1 10.1.0.4 VNET1/Subnet1
VM2 10.1.0.5 VNET1/SubnetA
VM3 172.16.0.4 VNET2/SubnetA
VM4 10.2.0.8 VNET3/SubnetB
A DNS service is installed on VM1.

You configure the DNS server settings for each virtual network as shown in the following exhibit.

(There is a screenshot showing the DNS server settings configuration with the following details:

DNS servers: Custom
Custom DNS server address: 10.1.0.4)
You need to ensure that all the virtual machines can resolve DNS names by using the DNS service on VM1.

What should you do?

Add service endpoints on VNET2 and VNET3.
Configure peering between VNET1, VNET2, and VNET3.
Configure a conditional forwarder on VM1.
Add service endpoints on VNET1.

A

The correct answer is: Configure peering between VNET1, VNET2, and VNET3.
Here’s why:
Current Situation:
VM1 (10.1.0.4) is running a DNS service
All VNets are configured to use VM1 as their custom DNS server [1]
The VMs are in different virtual networks (VNET1, VNET2, and VNET3)
Currently, VMs in VNET2 and VNET3 cannot reach VM1 because they are in isolated networks
Why VNet Peering is the Solution:
VNet peering enables you to seamlessly connect Azure virtual networks
It creates a direct connection between virtual networks
Allows resources in different VNets to communicate with each other
Provides low-latency, high-bandwidth connectivity
Traffic between peered networks is private and goes through the Microsoft backbone network
Why other options are incorrect:
Service endpoints:
Service endpoints are used to secure Azure service resources to virtual networks
They don’t help with VM-to-VM communication across VNets
Would not solve the DNS resolution issue
Conditional forwarder:
This would only be useful if we needed to forward DNS queries to different DNS servers
The problem here is network connectivity, not DNS forwarding
Implementation steps would involve:
Create peering from VNET1 to VNET2
Create peering from VNET1 to VNET3
Ensure the peering settings allow forwarded traffic if needed
After implementing VNet peering, all VMs will be able to reach VM1’s DNS service (10.1.0.4) and resolve DNS names successfully.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

You have two Azure virtual machines named VM1 and VM2. You have two Recovery Services vaults named RSV1 and RSV2.

VM2 is protected by RSV1.

You need to use RSV2 to protect VM2.

What should you do first?

From the RSV1 blade, click Backup items and stop the VM2 backup.
From the RSV1 blade, click Backup Jobs and export the VM2 backup.
From the RSV1 blade, click Backup. From the Backup blade, select the backup for the virtual machine, and then click Backup.
From the VM2 blade, click Disaster recovery, click Replication settings, and then select RSV2 as the Recovery Services vault.

A

The correct answer is: From the RSV1 blade, click Backup items and stop the VM2 backup.
Here’s why:
Process to change Recovery Services vaults:
Before you can protect a VM with a new Recovery Services vault, you must first stop protection in the current vault
You cannot protect a VM using multiple Recovery Services vaults simultaneously
The process must be done in sequence
Correct steps in order: a. First: Stop backup protection in RSV1
Navigate to RSV1
Go to Backup items
Stop the backup for VM2
Choose whether to retain or delete the existing backup data
b. Then: Configure new protection in RSV2
After stopping protection in RSV1
Configure new backup protection for VM2 in RSV2
Why other options are incorrect:
“Export the VM2 backup”:
Exporting backup jobs is for reporting purposes
Does not help in changing protection vaults
“Click Backup and select the backup”: [1]
This would create a new backup
Would not help in changing vaults
“Click Disaster recovery”:
Disaster recovery settings are different from backup settings
Azure Site Recovery (ASR) is for disaster recovery
Recovery Services vaults can be used for both backup and ASR, but they are separate features
Important considerations:
When stopping protection, you can choose to:
Retain the backup data (can be useful for future recovery)
Delete the backup data (frees up space in the vault)
Only after stopping protection in RSV1 can you configure protection in RSV2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have an Azure subscription named Subscription1 that contains the resources shown in the following table.

Name Type Location Resource Group
RG1 Resource group East US Not applicable
RG2 Resource group West Europe Not applicable
RG3 Resource group North Europe Not applicable
VNET1 Virtual network Central US RG1
VM1 Virtual machine West US RG2

VM1 connects to a virtual network named VNET2 by using a network interface named NIC1.

You need to create a new network interface named NIC2 for VM1.

Solution: You create NIC2 in RG1 and West US.

Does this meet the goal?

Yes
NO

A

Understanding the Requirements
New NIC for VM1: We need to create a new network interface (NIC2) that will be associated with the existing virtual machine VM1.
VM1 Location: VM1 is located in West US.
VNET1 Location: VNET1 is located in Central US.
RG1 Location: RG1 is located in East US.
Resource Group location: The NIC does not need to be in the same resource group as the VM, however it should be in the same location as the VM.
Analyzing the Solution
The solution proposes creating NIC2 in:
RG1: This is located in East US.
West US: This is the same region as VM1.
Determining if the Solution Meets the Goal
A network interface must be created in the same location as the virtual machine it will be connected to.
A network interface cannot be connected to virtual network located in a different location than the NIC.
Given these considerations, the proposed solution does NOT meet the goal. The NIC can’t be in East US, and be connected to a virtual machine in West US. The resource group’s location is irrelevant, the location of the NIC is the key factor.
Answer:
No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You have an Azure subscription that contains an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant contains 500 user accounts.

You deploy Microsoft Office 365. You configure Office 365 to use the user accounts in adatum.com.

You configure 60 users to connect to mailboxes in Microsoft Exchange Online.

You need to ensure that the 60 users use Azure Multi-Factor Authentication (MFA) to connect to the Exchange Online mailboxes. The solution must only affect connections to the Exchange Online mailboxes.

What should you do?

From the multi-factor authentication page, configure the Multi-Factor Auth status for each user
From Azure Active Directory admin center, create a conditional access policy
From the multi-factor authentication page, modify the verification options
From the Azure Active Directory admin center, configure an authentication method

A

Understanding the Requirements
Targeted MFA: Only 60 specific users who connect to Exchange Online should be required to use MFA.
No MFA for Others: The other 440 users in the adatum.com tenant should not be affected.
Exchange Online Only: MFA should only apply when connecting to Exchange Online mailboxes.
Least effort: The chosen method should be easy and scalable.
Analyzing the Options
From the multi-factor authentication page, configure the Multi-Factor Auth status for each user: This is not the correct solution as this would require enabling/enforcing MFA per user. This also does not allow to target Exchange Online users specifically. This would be a very manual process and not scalable.
From Azure Active Directory admin center, create a conditional access policy: This is the correct approach. Conditional Access policies allow us to define conditions under which MFA is required. We can target a specific group of users, specify the Exchange Online application, and enforce MFA only for that specific scenario. This is scalable and highly customizable.
From the multi-factor authentication page, modify the verification options: This would modify the verification options for the whole tenant, not just the targeted users. This option is incorrect.
From the Azure Active Directory admin center, configure an authentication method: Configuring an authentication method is not the correct solution. This does not allow to target specific users, or applications.
The Correct Approach
The most efficient and targeted solution is to create a Conditional Access policy in the Azure AD admin center.
Answer:
From Azure Active Directory admin center, create a conditional access policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

You have an Azure subscription that contains the storage accounts shown in the following table.

Name Kind Performance Replication Access tier
Storage1 Storage (general purpose v1) Premium Geo-redundant storage (GRS) None
Storage2 StorageV2 (general purpose v2) Standard Locally-redundant storage (LRS) Cool
Storage3 StorageV2 (general purpose v2) Premium Read-access geo-redundant storage (RA-GRS) Hot
Storage4 BlobStorage Standard Locally-redundant storage (LRS) Hot

You need to identify which storage account can be converted to zone-redundant storage (ZRS) replication by requesting a live migration from Azure support.

What should you identify?

Storage1
Storage2
Storage3
Storage4

A

Understanding Zone-Redundant Storage (ZRS)
ZRS Replication: ZRS replicates your data synchronously across three availability zones in the primary region. It provides high availability within a single region.
Live Migration Requirement: Some storage accounts can be converted to ZRS through a live migration process initiated by Azure support.
Account Limitations: Not all types of storage accounts support ZRS, especially for live migrations.
Analyzing the Storage Accounts
Let’s look at each storage account and determine its compatibility with ZRS live migration:
Storage1:
Kind: Storage (general purpose v1)
Performance: Premium
Replication: Geo-redundant storage (GRS)
Access tier: None
Analysis: General purpose v1 accounts do not support ZRS, especially not through live migration. Also, ZRS is not available for Premium performance tiers.
Storage2:
Kind: StorageV2 (general purpose v2)
Performance: Standard
Replication: Locally-redundant storage (LRS)
Access tier: Cool
Analysis: General purpose v2 accounts with standard performance can be migrated to ZRS via live migration when they are using LRS.
Storage3:
Kind: StorageV2 (general purpose v2)
Performance: Premium
Replication: Read-access geo-redundant storage (RA-GRS)
Access tier: Hot
Analysis: Premium performance tiers are not available for live migration to ZRS.
Storage4:
Kind: BlobStorage
Performance: Standard
Replication: Locally-redundant storage (LRS)
Access tier: Hot
Analysis: Blob storage accounts cannot be converted to ZRS. This is an account type limitation.
Determining the Correct Storage Account
Based on our analysis, only Storage2 meets the criteria for being converted to ZRS via live migration from Azure Support. It’s a general purpose v2 account with standard performance and LRS replication.
Answer:
Storage2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

HOTSPOT
You have an Azure Migrate project that has the following assessment properties:
✑ Target location: East US
✑ Storage redundancy: Locally redundant
✑ Comfort factor: 2.0
✑ Performance history: 1 month
✑ Percentile utilization: 95th
✑ Pricing tier: Standard
✑ Offer: Pay as you go
You discover the following two virtual machines:
✑ A virtual machine named VM1 that runs Windows Server 2016 and has 10 CPU cores at 20 percent utilization
✑ A virtual machine named VM2 that runs Windows Server 2012 and has four CPU cores at 50 percent utilization
How many CPU cores will Azure Migrate recommend for each virtual machine? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
VM1:
2
4
10
20
VM2:
1
2
4
8

A

Key factors to consider:
Comfort factor: 2.0 (doubles the calculated requirement)
Percentile utilization: 95th
Performance history: 1 month
For VM1:
Current cores: 10
Utilization: 20%
Calculation:
Actual cores needed = 10 cores × 20% = 2 cores
With comfort factor of 2.0: 2 cores × 2 = 4 cores Answer for VM1: 4 cores
For VM2:
Current cores: 4
Utilization: 50%
Calculation:
Actual cores needed = 4 cores × 50% = 2 cores
With comfort factor of 2.0: 2 cores × 2 = 4 cores Answer for VM2: 4 cores
Therefore:
VM1: 4 cores
VM2: 4 cores
The calculations take into account:
The actual utilization of the current cores
The comfort factor of 2.0 which doubles the requirement
The 95th percentile utilization over the 1-month performance history
This sizing ensures adequate performance while maintaining efficiency in the Azure environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

HOTSPOT
You have an Azure subscription that contains the virtual machines shown in the following table.
Name Operating system Connects to
VM1 Windows Server 2019 Subnet1
VM2 Windows Server 2019 Subnet2
VM1 and VM2 use public IP addresses. From Windows Server 2019 on VM1 and VM2, you allow inbound Remote Desktop connections.
Subnet1 and Subnet2 are in a virtual network named VNET1.
The subscription contains two network security groups (NSGs) named NSG1 and NSG2.
NSG1 uses only the default rules.
NSG2 uses the default and the following custom incoming rule:
✑ Priority: 100
✑ Name: Rule1
✑ Port: 3389
✑ Protocol: TCP
✑ Source: Any
✑ Destination: Any
✑ Action: Allow
NSG1 connects to Subnet1. NSG2 connects to the network interface of VM2.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Answer Area
Statements Yes No
From the Internet, you can connect to VM1 by using
Remote Desktop.
From the Internet, you can connect to VM2 by using
Remote Desktop.
From VM1, you can connect to VM2 by using Remote
Desktop

A

Let me analyze each statement based on the NSG configurations and network setup:
“From the Internet, you can connect to VM1 by using Remote Desktop” Answer: NO Reasoning:
VM1 is connected to Subnet1
Subnet1 is protected by NSG1
NSG1 only has default rules
Default rules block inbound RDP (port 3389) from the Internet
“From the Internet, you can connect to VM2 by using Remote Desktop” Answer: YES Reasoning:
VM2 has NSG2 applied to its network interface
NSG2 has a custom rule (Rule1) that:
Allows port 3389 (RDP)
Has priority 100 (overrides default deny rule)
Allows from any source to any destination
“From VM1, you can connect to VM2 by using Remote Desktop” Answer: YES Reasoning:
VM1 and VM2 are in the same VNet (VNET1)
VNet internal communication is allowed by default
NSG2 on VM2 allows RDP connections from any source
VNet internal traffic is allowed by default rules
Therefore:
Statement 1: No
Statement 2: Yes
Statement 3: Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Name Type Location Resource group
RG1 Resource group West US Not applicable
RG2 Resource group West US Not applicable
Vault1 Recovery Services vault Central US RG1
Vault2 Recovery Services vault West US RG2
VM1 Virtual machine Central US RG2
storage1 Storage account West US RG1
SQL1 Azure SQL database East US RG2
In storage1, you create a blob container named blob1 and a file share named share1.
Which resources can be backed up to Vault1 and Vault2? To answer, select the appropriate
options in the answer area. NOTE: Each correct selection is worth one point.
Can use Vault1 for backups:
VM1 only
VM1 and share1 only
VM1 and SQL1 only
VM1, storage1, and SQL1 only
VM1, blob1, share1, and SQL1
Can use Vault2 for backups:
storage1 only
share1 only
VM1 and share1 only
blob1 and share1 only
storage1 and SQL1 only

A

Understanding Backup Constraints
Resource Location: Azure resources can only be backed up to a Recovery Services vault within the same region.
Vault Capabilities: Recovery services vaults can back up a wide range of resources.
Storage Account Types: General-purpose storage accounts (like storage1) do not back up the storage account itself but can back up their internal resources (blob containers and file shares).
SQL: Azure SQL Database backups have some restrictions regarding the backup vaults that can be used.
Analyzing the Resources
Here’s a breakdown of the resources and their compatibility with the vaults:
RG1: Resource Group, West US
RG2: Resource Group, West US
Vault1: Recovery Services vault, Central US, in RG1
Vault2: Recovery Services vault, West US, in RG2
VM1: Virtual machine, Central US, in RG2
storage1: Storage account, West US, in RG1
SQL1: Azure SQL database, East US, in RG2
blob1: Blob container in storage1
share1: File share in storage1
Determining Backup Options
Let’s analyze what can be backed up to each vault:
Vault1 (Central US):
VM1: Located in Central US, so it can be backed up.
blob1: Located in storage1 (West US), cannot be backed up to the vault directly.
share1: Located in storage1 (West US), cannot be backed up to the vault directly.
storage1: This is a storage account, and cannot be backed up directly, it is the resources within the storage account that are backed up.
SQL1: Located in East US, so it cannot be backed up to this vault.
Therefore, only VM1 can be backed up to this vault.
Vault2 (West US):
VM1: Located in Central US, so it cannot be backed up.
blob1: Located in storage1 (West US), can be backed up.
share1: Located in storage1 (West US), can be backed up.
storage1: This is a storage account, and cannot be backed up directly, it is the resources within the storage account that are backed up.
SQL1: Located in East US, so it cannot be backed up to this vault.
Therefore, only share1 and blob1 which are located in storage1 can be backed up to this vault. As blob1 is not an option, only share1 is available.
Answer Area:
Can use Vault1 for backups:
VM1 only
Can use Vault2 for backups:
share1 only

31
Q

You have an Azure Active Directory (Azure AD) tenant named contoso.com that is synced to an Active Directory domain.

The tenant contains the users shown in the following table.

|——–|———|————————|
| User1 | Member | Azure AD |
| User2 | Member | Windows Server Active Directory |
| User3 | Guest | Microsoft account |
| User4 | Member | Windows Server Active Directory |

The users have the attributes shown in the following table.

You need to ensure that you can enable Azure Multi-Factor Authentication (MFA) for all four users.

Solution: You add an office phone number for User2.

Does this meet the goal?

Yes
No

| Name | Type | Source |

Name | Office phone | Mobile phone |
|——–|—————-|—————-|
| User1 | 222-555-1234 | 222-555-2345 |
| User2 | null | null |
| User3 | 222-555-1234 | 222-555-2346 |
| User4 | 222-555-1234 | null |

A

Understanding the Requirements
Enable MFA for All: We need to be able to enable MFA for all four users: User1, User2, User3, and User4.
MFA Verification Methods: MFA typically uses methods like phone calls, text messages, or mobile app notifications to verify user identity.
User Attributes: We have information about each user’s phone numbers.
Analyzing the Users
User1:
Member, Azure AD.
Office phone, Mobile phone.
Analysis: User1 has both office and mobile phone numbers, suitable for various MFA methods.
User2:
Member, synced from on-premises AD.
No phone numbers.
Analysis: Currently, User2 is missing both phone numbers and cannot be directly enrolled in MFA.
User3:
Guest, Microsoft account.
Office phone, Mobile phone.
Analysis: User3 has both office and mobile phone numbers, suitable for various MFA methods.
User4:
Member, synced from on-premises AD.
Office phone, but no mobile phone.
Analysis: User4 has office phone, so he can use MFA with the verification via phone call method.
Analyzing the Solution
The solution suggests adding an office phone number for User2.
Determining if the Solution Meets the Goal
Adding an office phone number for User2 would now allow them to be enrolled in MFA using a phone call for the verification process. Although User2 could be configured to use a verification code sent via an app, User2 has neither an office phone or a mobile phone number, so a phone number is required for some form of MFA. All other users have at least a phone number that can be used.
With the proposed change, it will be possible to enroll all four users with MFA.
Answer:
Yes

32
Q

You have an Azure subscription named Subscription1 that contains the resources shown in
the following table.

|—|—|—|—|
| RG1 | Resource group | West Europe | Not applicable |
| RG2 | Resource group | North Europe | Not applicable |
| Vault1 | Recovery Services vault | West Europe | RG1 |

You create virtual machines in Subscription1 as shown in the following table.

You plan to use Vault1 for the backup of as many virtual machines as possible.

Which virtual machines can be backed up to Vault1?

VM1, VM3, VMA, and VMC only
VM1 and VM3 only
VM1, VM2, VM3, VMA, VMB, and VMC
VM1 only
VM3 and VMC only

| Name | Type | Region | Resource group |

Name | Resource group | Region | Operating system |
|—|—|—|—|
| VM1 | RG1 | West Europe | Windows Server 2016 |
| VM2 | RG1 | North Europe | Windows Server 2016 |
| VM3 | RG2 | West Europe | Windows Server 2016 |
| VMA | RG1 | West Europe | Ubuntu Server 18.04 |
| VMB | RG1 | North Europe | Ubuntu Server 18.04 |
| VMC | RG2 | West Europe | Ubuntu Server 18.04 |

A

The correct answer is: VM1, VM3, VMA, and VMC only
Here’s why:
Recovery Services Vault Requirements:
Virtual machines must be in the same region as the Recovery Services vault
Can back up VMs from different resource groups
Can back up both Windows and Linux VMs
Operating system type doesn’t matter
Analyzing Vault1:
Located in West Europe
In resource group RG1
Can back up VMs from any resource group in the subscription
Analyzing each VM:
VM1:
Region: West Europe (✓)
Can be backed up to Vault1
VM2:
Region: North Europe (✗)
Cannot be backed up to Vault1 (different region)
VM3:
Region: West Europe (✓)
Can be backed up to Vault1
VMA:
Region: West Europe (✓)
Can be backed up to Vault1
VMB:
Region: North Europe (✗)
Cannot be backed up to Vault1 (different region)
VMC:
Region: West Europe (✓)
Can be backed up to Vault1
Key Points:
Only VMs in West Europe can be backed up to Vault1
Resource group location doesn’t matter
Operating system type doesn’t matter
Resource group membership doesn’t matter
Therefore, only VM1, VM3, VMA, and VMC can be backed up to Vault1 because they are all located in West Europe.

33
Q

DRAG DROP

You have an Azure subscription that contains an Azure file share.

You have an on-premises server named Server1 that runs Windows Server 2016.

You plan to set up Azure File Sync between Server1 and the Azure file share.

You need to prepare the subscription for the planned Azure File Sync.

Which two actions should you perform in the Azure subscription? To answer, drag the appropriate actions to the correct targets. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
You have an Azure subscription that contains an Azure file share.

Actions

Create a Storage Sync Service
Create a sync group
Install the Azure File Sync agent
Run Server Registration

Answer Area
First action:
Second action:

A

Understanding Azure File Sync
Azure File Sync is a service that centralizes your organization’s file shares in Azure Files while keeping the accessibility and performance of an on-premises file server. It uses a sync agent installed on the on-premises server to synchronize data with Azure.
Steps Required in Azure Subscription
The first steps to be performed in the Azure subscription are:
Create a Storage Sync Service: This is the central resource for managing Azure File Sync. The first step in setting up Azure File Sync is to create a Storage Sync Service in Azure.
Create a sync group: A sync group defines the sync topology. Once created, you would connect the on premises server with the Azure file share.
Analyzing the Actions
Create a Storage Sync Service: This is a necessary first step in the subscription.
Create a sync group: This is a required step in configuring the solution.
Install the Azure File Sync agent: This is an action that is performed on the on-premises server, not in Azure.
Run Server Registration: This is also an action performed on the on-premises server after the agent has been installed.
Correct Actions in Order:
First action: Create a Storage Sync Service
Second action: Create a sync group
Answer Area:
First action: Create a Storage Sync Service
Second action: Create a sync group

34
Q

DRAG DROP

You have an Azure subscription. The subscription includes a virtual network named VNet1.

Currently, VNet1 does not contain any subnets.

You plan to create subnets on VNet1 and to use application security groups to restrict the traffic between the subnets. You need to create the application security groups and to assign them to the subnets.

Which four cmdlets should you run in sequence? To answer, move the appropriate cmdlets from the list of cmdlets to the answer area and arrange them in the correct order.
Cmdlets
New-AzureRmVirtualNetwork
New-AzureRmNetworkSecurityGroup
New-AzureRmApplicationSecurityGroup
New-AzureRmNetworkSecurityRuleConfig
Add-AzureRmVirtualNetworkSubnetConfig
Answer Area

A

Understanding the Requirements
Virtual Network: We have an existing virtual network (VNet1).
Subnets: We need to create new subnets within VNet1.
Application Security Groups (ASGs): We need to create ASGs to restrict traffic between the subnets.
Cmdlet Sequence: We need to use the correct cmdlets in the proper order.
Logical Order and Cmdlets
Here’s the logical sequence of actions and the corresponding cmdlets:
Create Subnets: Before we can create ASGs or add them to subnets, we must first create the subnets.
Cmdlet: Add-AzureRmVirtualNetworkSubnetConfig. This cmdlet adds the subnet to the virtual network, however it does not create the virtual network.
Create Application Security Groups: We need to create application security groups first.
Cmdlet: New-AzureRmApplicationSecurityGroup. This cmdlet creates the application security group, without associating it to any subnet.
Create Network Security Group rules (optional): This step is not necessary, but if network security group rules are necessary to limit traffic, this would be the appropriate stage.
Cmdlet: New-AzureRmNetworkSecurityRuleConfig
Associate ASG to the Subnet: Finally, add the ASG to the subnet in the virtual network. To add the ASG to a subnet, you must add or modify the subnet configuration of the virtual network. There is not a specific cmdlet to add an ASG to a subnet, the subnet itself must be modified.
Cmdlet: Add-AzureRmVirtualNetworkSubnetConfig
Analyzing the Cmdlets
New-AzureRmVirtualNetwork: This cmdlet creates a new virtual network. This is not needed as VNet1 is already created.
New-AzureRmNetworkSecurityGroup: This cmdlet creates network security groups, and is not necessary in this scenario. This is not needed as we are only using application security groups.
New-AzureRmApplicationSecurityGroup: This cmdlet creates new application security groups. This is a required step.
New-AzureRmNetworkSecurityRuleConfig: This cmdlet configures network security group rules, and is not required for the given scenario.
Add-AzureRmVirtualNetworkSubnetConfig: This cmdlet adds a subnet configuration to an existing virtual network. This is needed to create subnets.
Correct Sequence of Cmdlets:
Add-AzureRmVirtualNetworkSubnetConfig
New-AzureRmApplicationSecurityGroup
New-AzureRmNetworkSecurityRuleConfig (Optional)
Add-AzureRmVirtualNetworkSubnetConfig
Answer Area:
Add-AzureRmVirtualNetworkSubnetConfig
New-AzureRmApplicationSecurityGroup
New-AzureRmNetworkSecurityRuleConfig (Optional)
Add-AzureRmVirtualNetworkSubnetConfig

35
Q

DRAG DROP

You have an Azure Linux virtual machine that is protected by Azure Backup.

One week ago, two files were deleted from the virtual machine.

You need to reses clients connect n on-premises computer as quickly as possible.

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Actions
Mount a VHD.
Copy the files by using File Explorer.
Download and run a script.
Select a restore point.
Copy the files by using AzCopy.
From the Azure portal, click Restore VM from the vault.
From the Azure portal, click File Recovery from the vault.
Answer Area

A

Understanding the Requirements
Azure Backup: The VM is protected by Azure Backup.
File Recovery: We need to restore specific files, not the entire VM.
Timeline: The files were deleted one week ago.
Speed: We need to restore the files as quickly as possible.
Logical Sequence of Steps
Here’s the breakdown of the necessary actions and their correct sequence:
Select a restore point: Since the files were deleted one week ago, you will have to select a restore point from that period.
Action: This sets the appropriate recovery point to access the data.
From the Azure portal, click File Recovery from the vault: The file recovery method is the appropriate tool to restore the individual files.
Action: This begins the process of file recovery.
Download and run a script: Azure Backup provides a script that is downloaded to the machine that will be restoring the files to mount the disk backup.
Action: This prepares the restore for the next steps.
Copy the files by using File Explorer or AzCopy: Once the disk has been mounted, the files can be copied over to their original location by using either explorer or AzCopy. As per the requirements, the files need to be restored quickly, and using AzCopy is much faster.
Action: This restores the files.
Analyzing the Actions
Mount a VHD: This action is part of the process, but not the first step.
Copy the files by using File Explorer: This can be used to restore files, but not the fastest method.
Copy the files by using AzCopy: This is a faster method of copying files.
Download and run a script: This action is a key step in mounting the VHD.
Select a restore point: This action must be completed to identify the backup from which to restore files.
From the Azure portal, click Restore VM from the vault: This is used to restore the entire VM, not specific files. This is not the appropriate tool.
From the Azure portal, click File Recovery from the vault: This action must be taken to initiate the file recovery.
Correct Sequence of Actions:
Select a restore point.
From the Azure portal, click File Recovery from the vault.
Download and run a script.
Copy the files by using AzCopy.
Answer Area:
Select a restore point.
From the Azure portal, click File Recovery from the vault.
Download and run a script.
Copy the files by using AzCopy.

36
Q

You have an Azure virtual machine that runs Windows Server 2019 and has the following configurations:

✑ Name: VM1

✑ Location: West US

✑ Connected to: VNET1

✑ Private IP address: 10.1.0.4

✑ Public IP addresses: 52.186.85.63

✑ DNS suffix in Windows Server: Adatum.com

You create the Azure DNS zones shown in the following table.

Name Type Location
Adatum.pri Private West Europe
Contoso.pri Private Central US
Adatum.com Public West Europe
Contoso.com Public North Europe

You need to identify which DNS zones you can link to VNET1 and the DNS zones to which VM1 can automatically register.

Which zones should you identify? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

DNS zones that you can link to VNET1:
Adatum.com only
Adatum.pri and adatum.com only
The private zones only
The public zones only
DNS zones to which VM1 can automatically register:
Adatum.com only
Adatum.pri and adatum.com only
The private zones only
The public zones only

A

Understanding Azure DNS Concepts
Private DNS Zones: These zones are only resolvable within linked virtual networks.
Public DNS Zones: These zones are resolvable from the internet and can host records for public IP addresses.
Virtual Network Links: Private DNS zones can be linked to virtual networks to enable DNS resolution within those networks.
Automatic Registration: VMs can automatically register their private IP addresses in a private DNS zone linked to their virtual network.
Location Mismatch: Private zones must be in the same region as the virtual network to allow for linking.
Analyzing the Resources
Let’s break down the resources:
VM1: Virtual machine, location: West US, connected to VNET1, Private IP address: 10.1.0.4, Public IP addresses: 52.186.85.63, DNS suffix: Adatum.com
VNET1: Virtual network, implicitly located in West US since it’s hosting VM1 which is in West US
Adatum.pri: Private DNS zone, location: West Europe
Contoso.pri: Private DNS zone, location: Central US
Adatum.com: Public DNS zone, location: West Europe
Contoso.com: Public DNS zone, location: North Europe
Determining DNS Zone Linking and Registration
Let’s see what applies to VNET1:
DNS zones that you can link to VNET1:
Adatum.pri: This is a private zone, however, it is located in West Europe and the virtual network is located in West US. Private zones must be located in the same location as the virtual networks for them to be linked.
Contoso.pri: This is a private zone located in Central US, not the same location as VNET1.
Adatum.com: This is a public zone, so it cannot be linked to the virtual network.
Contoso.com: This is a public zone, so it cannot be linked to the virtual network.
Therefore, none of the zones can be linked to the virtual network, the correct option is none of the above, which matches The private zones only which would be correct if we had a private zone in the same location as VNET1.
DNS zones to which VM1 can automatically register:
Adatum.pri: This is a private zone, and as mentioned above cannot be linked to VNET1 due to the location mismatch. Automatic registration happens on the private zone, and not on the public zone.
Contoso.pri: This is a private zone, and it is not in the same location as VM1.
Adatum.com: This is a public zone, and VMs cannot automatically register to public zones.
Contoso.com: This is a public zone, and VMs cannot automatically register to public zones.
Therefore, VM1 will not be able to automatically register to any of the zones, so none of the above applies. If we had a private zone in the same location, the option The private zones only would be correct.
Answer Area:
DNS zones that you can link to VNET1:
The private zones only

DNS zones to which VM1 can automatically register:
The private zones only

37
Q

HOTSPOT

You need to ensure that User1 can create initiative definitions, and User4 can assign initiatives to RG2. The solution must meet the technical requirements.

Which role should you assign to each user? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
User1:
Contributor for RG1
Contributor for Sub1
Security Admin for RG1
Resource Policy Contributor for Sub1
User4:
Contributor for RG2
Contributor for Sub1
Security Admin for Sub1
Resource Policy Contributor for RG2

A

Understanding Azure Roles and Policy
Initiative Definitions: These are used to group policy definitions into a single manageable item.
Initiative Assignments: Assigning an initiative applies a group of policy definitions to a specific resource scope (like a resource group).
Resource Policy Contributor Role: This role has the necessary permissions to create and manage policies and initiatives.
Scope: User1 needs permissions to create initiative definitions on the subscription level, while User4 needs permissions to assign initiatives to a specific resource group.
Analyzing the Users and Required Actions
User1: Needs to create initiative definitions. This is a subscription wide operation and needs the Resource Policy Contributor role at the subscription level.
User4: Needs to assign initiatives to RG2. This needs the resource policy contributor role applied at the RG2 level.
Determining Correct Roles
Let’s examine the roles and select the correct ones:
User1:
Contributor for RG1: This role is not correct as it is limited to the resource group level.
Contributor for Sub1: This role is not correct as it does not contain the appropriate permissions.
Security Admin for RG1: This role is not correct as it does not have the correct permissions.
Resource Policy Contributor for Sub1: This role is correct. This role has the correct permissions to create initiative definitions at a subscription level.
User4:
Contributor for RG2: This role is not correct as it does not have the permissions necessary to assign policies.
Contributor for Sub1: This role is not correct as it does not have the permissions necessary to assign policies and it should be at the RG level.
Security Admin for Sub1: This role is not correct as it does not have the correct permissions.
Resource Policy Contributor for RG2: This role is correct. This role has the correct permissions to assign initiatives at a resource group level.
Answer Area:
Resource Policy Contributor for Sub1
User4:
Resource Policy Contributor for RG2

38
Q

You need to ensure that you can grant Group4 Azure RBAC read-only permissions to all the A2ure file shares.

What should you do?

On storagel and storage4, change the Account kind type to StorageV2 (general purpose v2).
Recreate storage2 and set Hierarchical namespace to Enabled.
On storage2, enable identity-based access for the file shares.
Create a shared access signature (SAS) for storagel, storage2, and storage4.

A

Understanding Azure File Shares and RBAC
Azure File Shares: Managed file shares hosted in Azure storage accounts.
Azure RBAC: Azure role-based access control provides fine-grained access management for Azure resources.
Identity-Based Access: RBAC on file shares requires identity-based access, where permissions are granted to Azure AD identities (users, groups).
Shared Access Signature (SAS): SAS provides temporary, delegated access to storage resources. While useful for certain scenarios, it is not an RBAC method.
Analyzing the Options
“On storage1 and storage4, change the Account kind type to StorageV2 (general purpose v2).”
Analysis: Changing to StorageV2 is not required to enable RBAC on storage accounts, though Storage v2 is the recommended storage account type. This is not the correct option to apply RBAC to file shares.
“Recreate storage2 and set Hierarchical namespace to Enabled.”
Analysis: Hierarchical namespace is a feature of Azure Data Lake Storage Gen2, and is not required to apply RBAC to Azure file shares. Recreating the storage account is not the right action.
“On storage2, enable identity-based access for the file shares.”
Analysis: This is the correct approach. Enabling identity-based access is required to use RBAC to grant permissions to groups. Once enabled, you can use RBAC to grant permissions to Group4.
“Create a shared access signature (SAS) for storage1, storage2, and storage4.”
Analysis: SAS provides temporary, delegated access. It does not allow granting permissions using Azure RBAC for a group. This option is incorrect.
The Correct Solution
To grant Group4 read-only permissions to Azure file shares using RBAC, we must enable identity-based access for the file shares. We can then grant the appropriate RBAC permissions to Group4.
Answer:
On storage2, enable identity-based access for the file shares.

39
Q

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some

question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have an Azure subscription that contains the following resources:

✑ A virtual network that has a subnet named Subnet1

✑ Two network security groups (NSGs) named NSG-VM1 and NSG-Subnet1

✑ A virtual machine named VM1 that has the required Windows Server configurations to allow Remote Desktop connections

NSG-Subnet1 has the default inbound security rules only.

NSG-VM1 has the default inbound security rules and the following custom inbound security rule:

✑ Priority: 100

✑ Source: Any

✑ Source port range: *

✑ Destination: *

✑ Destination port range: 3389

✑ Protocol: UDP

✑ Action: Allow

VM1 connects to Subnet1. NSG1-VM1 is associated to the network interface of VM1. NSG-Subnet1 is associated to Subnet1.

You need to be able to establish Remote Desktop connections from the internet to VM1.

Solution: You add an inbound security rule to NSG-Subnet1 that allows connections from the Internet source to the VirtualNetwork destination for port range 3389 and uses the UDP protocol.

Does this meet the goal?

Yes
No

A

Understanding the Requirements
Remote Desktop Access: We need to allow RDP connections from the internet to VM1.
VM1 Configuration: The Windows Server OS is configured to accept RDP connections.
Network Setup:
VM1 is connected to Subnet1.
NSG-VM1 is applied to VM1’s network interface.
NSG-Subnet1 is applied to Subnet1.
NSG Rules:
NSG-Subnet1: Default rules only.
NSG-VM1: Default rules + custom rule allowing UDP on port 3389 from any source.
Analyzing the Solution
The solution proposes adding an inbound security rule to NSG-Subnet1 that:
Allows connections from the Internet source.
To the VirtualNetwork destination
For port range 3389.
Uses the UDP protocol.
Determining if the Solution Meets the Goal
RDP Protocol: Remote Desktop Protocol (RDP) uses TCP on port 3389, not UDP. The custom rule on NSG-VM1 allows traffic on the wrong protocol.
NSG-Subnet1: The proposed rule on NSG-Subnet1 would also allow the incorrect UDP protocol.
Traffic Flow: Inbound traffic from the internet must pass through the subnet NSG and the VM NSG.
NSG processing order: When processing inbound traffic, the rule in NSG-Subnet1 is processed first, and only if that rule allows access will the NSG-VM1 rule be evaluated.
Because of the rule configuration of the proposed solution, RDP connections will not be allowed through either of the NSGs.
Therefore, the proposed solution does NOT meet the goal.
Answer:
No

40
Q

This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have an Azure subscription named Subscription1 that contains the resources shown in the following table.

Name Type Location Resource group
RG1 Resource group East US Not applicable
RG2 Resource group West Europe Not applicable
RG3 Resource group North Europe Not applicable
VNET1 Virtual network Central US RG1
VM1 Virtual machine West US RG2

VM1 connects to a virtual network named VNET2 by using a network interface named NIC1.

You need to create a new network interface named NIC2 for VM1.

Solution: You create NIC2 in RG1 and Central US.

Does this meet the goal?

Yes
No

A

Understanding the Requirements
New NIC for VM1: We need to create a new network interface (NIC2) that will be associated with the existing virtual machine VM1.
VM1 Location: VM1 is located in West US.
NIC Location: The NIC must be in the same location as the VM that it is connected to.
RG1 Location: RG1 is located in East US
VNET1 Location: VNET1 is located in Central US.
Analyzing the Solution
The solution proposes creating NIC2 in:
RG1: This is located in East US
Central US: This is not the same region as VM1.
Determining if the Solution Meets the Goal
A network interface must be created in the same location as the virtual machine it will be connected to.
A NIC must be in the same region as the VNET that it is connected to.
Given these considerations, the proposed solution does NOT meet the goal. The NIC needs to be located in West US and not in Central US or East US. The NIC needs to be located in the same location as the VM.
Answer:
No

41
Q

You have an Azure subscription that contains the following users in an Azure Active Directory tenant named contoso.onmicrosoft.com:

Name Role Scope
User1 Global administrator Azure Active Directory
User2 Global administrator Azure Active Directory
User3 User administrator Azure Active Directory
User4 Owner Azure Subscription

User1 creates a new Azure Active Directory tenant named

external.contoso.onmicrosoft.com.

You need to create new user accounts in external.contoso.com.onmicrosoft.com.

Solution: You instruct User1 to create the user accounts.

Yes
No

A

Understanding the Requirements
New Tenant: A new Azure AD tenant named external.contoso.onmicrosoft.com has been created.
User Creation: We need to create new user accounts in this new tenant.
User Permissions: We need to evaluate the existing user roles and permissions to determine who can create these user accounts.
Analyzing User Roles
User1:
Role: Global administrator
Scope: contoso.onmicrosoft.com tenant
Analysis: User1 has Global Administrator rights in the contoso.onmicrosoft.com tenant, not in the external.contoso.onmicrosoft.com tenant.
User2:
Role: Global administrator
Scope: contoso.onmicrosoft.com tenant
Analysis: User2 has Global Administrator rights in the contoso.onmicrosoft.com tenant, not in the external.contoso.onmicrosoft.com tenant.
User3:
Role: User administrator
Scope: contoso.onmicrosoft.com tenant
Analysis: User3 has User Administrator rights in the contoso.onmicrosoft.com tenant, not in the external.contoso.onmicrosoft.com tenant.
User4:
Role: Owner
Scope: Azure Subscription
Analysis: User4 has owner access to the azure subscription, not the Azure Active directory tenant.
Analyzing the Solution
The solution proposes instructing User1 to create the user accounts.
Determining if the Solution Meets the Goal
User1 is a global administrator for contoso.onmicrosoft.com. This does not grant User1 the permission to create users in the new external.contoso.onmicrosoft.com tenant. User1 would not have any administrative roles in the new tenant. To add users, you must have an appropriate administrator role within the external.contoso.onmicrosoft.com tenant.
Therefore, the proposed solution does NOT meet the goal.
Answer:
No

42
Q

You have an Azure Active Directory (Azure AD) tenant named adatum.com that contains the users shown in the following table.
|—|—|
| User1 | None |
| User2 | Global administrator |
| User3 | Cloud device administrator |
| User4 | Intune administrator |

Adatum.com has the following configurations:

Users may join devices to Azure AD is set to User1.

Additional local administrators on Azure AD joined devices is set to None.

You deploy Windows 10 to a computer named Computer. User1 joins Computer1 to adatum.com.

You need to identify which users are added to the local Administrators group on Computer1.

User1 only
User1, User2, and User3 only
User1 and User2 only
User1, User2, User3, and User4
User2 only

Name | Role |

A

The answer is: User1 and User2 only
Let’s analyze why:
Default Behavior for Azure AD Join:
The user who joins the device (User1) automatically becomes a local administrator
Global administrators (User2) are automatically added as local administrators [1]
This is default Azure AD behavior regardless of additional settings
User Analysis:
User1: Local admin because they joined the device
User2: Local admin because they are a Global administrator
User3: Not added despite being Cloud device administrator
User4: Not added as Intune administrator role doesn’t grant local admin rights
Configuration Settings Impact:
“Users may join devices to Azure AD” setting allows User1 to join devices [2]
“Additional local administrators” set to None means no additional users beyond defaults
Cloud device administrator role (User3) doesn’t automatically grant local admin rights
Why other users are excluded:
User3 (Cloud device administrator):
Can manage devices in Azure AD
Cannot automatically become local admin
User4 (Intune administrator):
Can manage Intune devices
No local admin rights by default
Key Points:
Two types of users automatically get local admin rights:
User who joins the device
Global administrators
Other administrative roles don’t automatically get local admin rights
“Additional local administrators” setting being None doesn’t affect default behavior
Therefore, only User1 (as the joining user) and User2 (as Global administrator) are added to the local Administrators group on Computer1.

43
Q

HOTSPOT

You have an Azure subscription named Subscription1 that contains the resources in the following table.

Name Type
VM1 Virtual machine
VM2 Virtual machine
LB1 Load balancer
You install the Web Server server role (IIS) on VM1 and VM2, and then add VM1 and VM2 to LB1.

LB1 is configured as shown in the LB1 exhibit:

Resource group: VMRG
Location: West Europe
Subscription name: Azure Pass
Subscription ID: e66d2b22-fde8-4af2-9233-d435166feb4e
SKU: Basic
Public IP address: 104.40.178.194 (LB1)
Backend pool: Backend1 (2 virtual machines)
Health probe: Probe1 (HTTP:80/Probe1.htm)
Load balancing rule: Rule1 (TCP/80)
NAT rules: None
Rule1 is configured as shown in the Rule1 exhibit:

Name: Rule1
IP Version: IPv4
Frontend IP address: 104.40.178.194 (LoadBalancerFrontEnd)
Protocol: TCP
Port: 80
Backend port: 80
Backend pool: Backend1 (2 virtual machines)
Health probe: Probe1 (HTTP:80/Probe1.htm)
Session persistence: None
Idle timeout (minutes): 4
Floating IP (direct server return): Disabled

For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Statements
VM1 is in the same availability set as VM2.
If Probe1.htm is present on VM1 and VM2, LB1 will balance TCP
port 80 between VM1 and VM2.
If you delete Rule1, LB1 will balance all the requests between VM1
and VM2 for all the ports.

A

Understanding Azure Load Balancer
Load Balancer (LB1): A basic load balancer used to distribute incoming traffic across multiple backend VMs.
Backend Pool (Backend1): A group of virtual machines that receive traffic from the load balancer.
Health Probe (Probe1): A check to determine the health and availability of the backend VMs. If the health probe does not return 200 OK, the load balancer will not send traffic to that VM.
Load Balancing Rule (Rule1): Defines the traffic distribution rules (protocol, port, etc.).
Availability set: Availability sets allow to place multiple VMs across different fault domains in the Azure data centers to ensure high availability of the services.
Analyzing the Statements
Let’s go through each statement:
“VM1 is in the same availability set as VM2.”
Analysis: The provided information does not mention whether VM1 and VM2 are part of the same availability set. The load balancer is also a basic SKU which doesn’t require an availability set. The provided information does not state if the virtual machines are in an availability set.
Answer: No
“If Probe1.htm is present on VM1 and VM2, LB1 will balance TCP port 80 between VM1 and VM2.”
Analysis: The load balancing rule (Rule1) is configured to balance TCP traffic on port 80. The health probe (Probe1) is configured to check HTTP on port 80 at /Probe1.htm. If the health probe returns a success for both VM1 and VM2 (by having the file present), the load balancer will distribute traffic between them.
Answer: Yes
“If you delete Rule1, LB1 will balance all the requests between VM1 and VM2 for all the ports.”
Analysis: Load balancers require at least one rule to direct traffic. If you delete Rule1, the load balancer will not balance the traffic. A load balancer cannot balance traffic without a rule.
Answer: No
Therefore:
Statement 1: No
Statement 2: Yes
Statement 3: No

44
Q

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these

questions will not appear in the review screen.

You have a computer named Computer1 that has a point-to-site VPN connection to an Azure virtual network named VNet1. The point-to-site connection uses a self-signed certificate.

From Azure, you download and install the VPN client configuration package on a computer named Computer2.

You need to ensure that you can establish a point-to-site VPN connection to VNet1 from Computer2.

Solution: You export the client certificate from Computer1 and install the certificate on Computer2.

Does this meet this goal?

Yes
No

A

Understanding Point-to-Site VPNs
Point-to-Site (P2S) VPN: Allows individual client computers to connect to an Azure virtual network over a secure tunnel.
Certificates: P2S VPNs typically rely on certificates for authentication.
Root Certificate: A root certificate is generated for the point-to-site configuration, and a child client certificate is generated for each client.
Client Certificate: Each client computer needs a client certificate derived from the root certificate. The client certificate must be installed on the computer establishing the connection.
Configuration package: A configuration package is generated which contains configuration details, and does not contain any certificates.
Analyzing the Setup
Computer1: Has an existing P2S VPN connection with a self-signed certificate.
Computer2: New client where we’re trying to establish a connection.
VPN Client Configuration Package: Downloaded from Azure to Computer2, however this does not contain the certificates.
Self-Signed Certificate: As a self-signed certificate was used to configure the VPN connection, there is not an authority that can provide the necessary client certificate for computer 2.
Analyzing the Solution
The solution proposes exporting the client certificate from Computer1 and importing it to Computer2.
Determining if the Solution Meets the Goal
In the provided scenario, a self-signed certificate was used. The client certificate must match the root certificate, if this is not the case, the connection will not be accepted by the virtual network gateway.
A new client certificate must be generated from the root certificate. Exporting the existing certificate from computer1 will not work in this scenario.
Therefore, the proposed solution does NOT meet the goal.
Answer:
No

45
Q

You have an Azure subscription that includes data in following locations:

Name Type
container1 Blob container
share1 Azure files share
DB1 SQL database
Table1 Azure Table

You plan to export data by using Azure import/export job named Export1.

You need to identify the data that can be exported by using Export1.

Which data should you identify?

DB1
Table1
container1
Share1

A

The answer is: container1
Let me explain why only container1 (Blob container) can be exported using Azure Import/Export jobs: [1]
Azure Import/Export Service Capabilities: [2]
Can only export data from Azure Blob Storage
Exports data to physical hard drives
Cannot directly export from other Azure storage types
Used for large-scale data transfer
Analysis of each option:
a) container1 (Blob container):
✓ CAN be exported
Directly supported by Import/Export service
Blob storage is the primary use case
Can export block blobs and page blobs
b) share1 (Azure Files share):
✗ CANNOT be exported directly
Not supported by Import/Export service
Would need to be copied to blob storage first
c) DB1 (SQL database):
✗ CANNOT be exported via Import/Export
Requires different export methods like:
SQL database export
Data Migration tools
Bacpac files
d) Table1 (Azure Table):
✗ CANNOT be exported via Import/Export
Requires different export methods like:
AzCopy
Custom applications
Storage Explorer
Key Points:
Import/Export jobs are specifically for:
Importing data to Azure Blob Storage
Exporting data from Azure Blob Storage
Other data types require different export methods
Data must be in blob storage to use Import/Export service
Therefore, only container1 (Blob container) can be exported using the Azure Import/Export job Export1.

46
Q

You have a virtual network named VNet1 that has the configuration shown in the following
exhibit.
PS C:> Get-AzureRVirtualNetwork Name Vnet1 ResourceGroupName Production
Name : VNet1
ResourceGroupName : Production
Location : westus
Id : /subscriptions/14d26092-8e42-4ea7-b770-9dcef70fblea/resourceGroups/Production/providers/Microsoft.Network/virtualNetworks/VNet1
Etag : W/”76f7edd6-d022-455b-aeae-376059318e5d”
ResourceGuid : 562696cc-b2ba-4cc5-9619-0a715d6c34c7
ProvisioningState: Succeeded
Tags : {}
AddressSpace : {
“AddressPrefixes”: [
“10.2.0.0/16”
]
}
DhcpOptions : {}
Subnets : {
“Name”: “default”,
“Etag”: “W/"76f7edd6-d022-455b-aeae-376059318e5d"”,
“Id”: “/subscriptions/14d26092-8e42-4ea7-b770-9dcef70fblea/resourceGroups/Production/providers/Microsoft.Network/virtualNetworks/VNet1/subnets/default”,
“AddressPrefix”: “10.2.0.0/24”,
“IpConfigurations”: [],
“ResourceNavigationLinks”: [],
“ServiceEndpoints”: [],
“ProvisioningState”: “Succeeded”
}
VirtualNetworkPeerings: []
EnableDDoSProtection : False
EnableVpnProtection : False
Use the drop-down menus to select the answer choice that completes each statement based on
the information presented in the graphic. NOTE: Each correct selection is worth one point.
Answer Area
Before a virtual machine on VNet1 can receive an IP address from
192.168.1.0/24, you must first [answer choice].

add a network interface
add a subnet
add an address space
delete a subnet
delete an address space

Before a virtual machine on VNet1 can receive an IP address from
10.2.1.0/24, you must first [answer choice].
add a network interface
add a subnet
add an address space
delete a subnet
delete an address space

A

Understanding Virtual Network Configuration
Address Space: The address space defines the range of IP addresses available for a virtual network.
Subnets: Subnets are subdivisions within a virtual network’s address space, allowing you to logically organize and manage network resources.
IP Address Assignment: Virtual machines receive IP addresses from a subnet within their virtual network.
Address Space and Subnet Relationship: A subnet must fall within the virtual network’s address space and a subnet cannot overlap with the address space of a different virtual network.
Get-AzureRVirtualNetwork cmdlet allows to retrieve information about the virtual network.
Analyzing the VNet1 Configuration
The output from Get-AzureRVirtualNetwork shows:
Address Space: 10.2.0.0/16
Subnet: A default subnet named “default” with an address prefix of 10.2.0.0/24.
Analyzing the Requirements
IP Address from 192.168.1.0/24:
This IP address range (192.168.1.0/24) is outside the current address space (10.2.0.0/16) of VNet1. Therefore, you must add an address space to the virtual network. The subnet is not necessary as it can be part of a larger address space.
IP Address from 10.2.1.0/24:
This IP address range (10.2.1.0/24) is within the current address space (10.2.0.0/16) of VNet1 but is outside the subnet. To allow an IP address from that range, a new subnet must be created.
Answer Area:
Before a virtual machine on VNet1 can receive an IP address from
192.168.1.0/24, you must first add an address space.
Before a virtual machine on VNet1 can receive an IP address from
10.2.1.0/24, you must first add a subnet.

47
Q

You have an Azure subscription named Subscription1.

You have 5 TB of data that you need to transfer to Subscription1.

You plan to use an Azure Import/Export job.

What can you use as the destination of the imported data?

Azure Data Lake Store
a virtual machine
the Azure File Sync Storage Sync Service
Azure Blob storage

A

Understanding Azure Import/Export
Purpose: Azure Import/Export service is designed to transfer large amounts of data to or from Azure storage using physical hard drives. It’s efficient when network bandwidth is a limitation.
Destination: When importing data, the destination is where the data from your shipped hard drives is stored.
Supported Destinations: Azure Import/Export primarily supports these destinations:
Azure Blob Storage (including block blobs, page blobs, and append blobs)
Azure Files (file shares)
Analyzing the Options
Let’s go through each option:
Azure Data Lake Store: Azure Import/Export does not directly support Data Lake Store as a destination. You would need to copy the data to Data Lake Store after it’s been imported into Blob storage. This option is incorrect.
A virtual machine: Azure Import/Export does not directly support virtual machines as a destination. You would need to import the data into storage and then copy the data to the VM’s drives. This option is incorrect.
The Azure File Sync Storage Sync Service: Azure File Sync does not store the data directly, it synchronizes file shares with Azure. It’s not a valid import/export destination. This option is incorrect.
Azure Blob storage: Azure Blob Storage is a valid and supported destination for Azure Import/Export jobs. You can import data to blob containers for various use cases. This option is correct.
The Correct Destination
The correct destination for data imported using an Azure Import/Export job is Azure Blob storage.
Answer:
Azure Blob storage

48
Q

You have an azure subscription named Subscription that contains the resource groups shown in the following table.

|—|—|
| RG1 | East Asia |
| RG2 | East US |

In RG1, you create a virtual machine named VM1 in the East Asia location.

You plan to create a virtual network named VNET1.

You need to create VNET, and then connect VM1 to VNET1.

What are two possible ways to achieve this goal? Each correct answer presents a complete a solution. NOTE: Each correct selection is worth one point.

Create VNET1 in RG2, and then set East Asia as the location.
Create VNET1 in a new resource group in the West US location, and then set West US as the location.
Create VNET1 in RG1, and then set East Asia as the location
Create VNET1 in RG1, and then set East US as the location.
Create VNET1 in RG2, and then set East US as the location.

Name | Region |

A

Understanding Azure Networking
Virtual Network Location: A virtual network’s location determines the Azure region where its resources reside.
Resource Group Location: A resource group’s location is primarily for organizational purposes, and is not related to the location of the resources it hosts.
Virtual Machine and VNet Location: A virtual machine must be in the same Azure region as the virtual network to which it’s connected.
Resource Group Location Irrelevant: The resource group does not have to be in the same location as the resource within it.
Analyzing the Resources
RG1: Resource group, location: East Asia.
RG2: Resource group, location: East US.
VM1: Virtual machine, location: East Asia.
Analyzing the Requirements
We need to:
Create VNET1: The virtual network must be located in a region that is compatible with VM1.
Connect VM1 to VNET1: This requires the virtual network to be in the same location as VM1.
Determining the Correct Solutions
Let’s evaluate the options:
“Create VNET1 in RG2, and then set East Asia as the location.”
Analysis: This is a correct solution. VNET1 is being created in resource group RG2, which is not relevant. The virtual network can be created with the correct location, and VM1 will be able to connect.
“Create VNET1 in a new resource group in the West US location, and then set West US as the location.”
Analysis: This is incorrect. VM1 is in East Asia, and this solution will place the virtual network in West US.
“Create VNET1 in RG1, and then set East Asia as the location”
Analysis: This is a correct solution. It creates VNET1 within RG1 (though this is not relevant), and also correctly sets the location to East Asia, so VM1 can connect.
“Create VNET1 in RG1, and then set East US as the location.”
Analysis: This is incorrect. VM1 is in East Asia, and the virtual network would be in East US, therefore they are not compatible.
“Create VNET1 in RG2, and then set East US as the location.”
Analysis: This is incorrect. VM1 is in East Asia, and the virtual network would be in East US, therefore they are not compatible.
The Two Correct Solutions
The two solutions that will allow VM1 to connect to VNET1 are:
Create VNET1 in RG2, and then set East Asia as the location.
Create VNET1 in RG1, and then set East Asia as the location.
Answer:
Create VNET1 in RG2, and then set East Asia as the location.
Create VNET1 in RG1, and then set East Asia as the location

49
Q

You have an Azure subscription that contains an Azure Availability Set named WEBPROD-AS-USE2 as shown in the following exhibit.
PS Azure:> az vm availability-set list -g RG1
```json
[
{
“id”: “/subscriptions/8372f433-2dcd-4361-b5ef-5b188fed87d0/resourceGroups/
RG1/providers/Microsoft.Compute/availabilitySets/WEBPROD-AS-USE2”,
“location”: “eastus2”,
“name”: “WEBPROD-AS-USE2”,
“platformFaultDomainCount”: 2,
“platformUpdateDomainCount”: 10,
“proximityPlacementGroup”: null,
“resourceGroup”: “RG1”,
“sku”: {
“capacity”: null,
“name”: “Aligned”,
“tier”: null
},
“statuses”: null,
“tags”: {},
“type”: “Microsoft.Compute/availabilitySets”,
“virtualMachines”: []
}
]
~~~
Azure:/
You add 14 virtual machines to WEBPROD-AS-USE2.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point.

Answer Area
When Microsoft performs planned maintenance in East US
2, the maximum number of unavailable virtual machines will
be [answer choice].
2
7
10
14

If the server rack in the Azure datacenter that hosts
WEBPROD-AS-USE2 experiences a power failure, the
maximum number of unavailable virtual machines will be
[answer choice].
2
7
10
14

A

Understanding Azure Availability Sets
Purpose: Availability sets protect your applications from planned and unplanned downtime by distributing VMs across multiple fault and update domains in a datacenter.
Fault Domains (FDs): Fault domains provide physical separation within a data center to provide redundancy of power and networking. VMs within different fault domains will not be affected by a power or hardware failure in one of the domains.
Update Domains (UDs): Update domains indicate groups of VMs that can be rebooted at the same time during planned Azure maintenance.
Platform fault domain count: The availability set distributes virtual machines across fault domains.
Platform update domain count: The availability set distributes virtual machines across update domains.
Analyzing the Availability Set Configuration
Based on the provided JSON output:
Name: WEBPROD-AS-USE2
Location: eastus2
Fault Domains: platformFaultDomainCount: 2 - There are two fault domains available.
Update Domains: platformUpdateDomainCount: 10 - There are ten update domains available.
VM Count: 14 virtual machines are added to the set.
Determining Impact of Maintenance and Hardware Failure
Let’s analyze the statements:
Planned Maintenance:
Analysis: During planned maintenance, Azure reboots virtual machines one update domain at a time. Since there are 10 UDs, a maximum of 14 / 10, which means a maximum of 2 virtual machines could be unavailable at any given time. If there are no more virtual machines to place in another update domain, the remaining virtual machines will be distributed across the available domains.
Answer: 2
Hardware Failure:
Analysis: During a server rack failure (fault domain), the maximum number of unavailable VMs will be based on the fault domain count. With 14 VMs distributed across 2 FDs, a maximum of half of the machines will be unavailable at any given time. 14 / 2 = 7.
Answer: 7
Answer Area:
When Microsoft performs planned maintenance in East US
2, the maximum number of unavailable virtual machines will
be 2.
If the server rack in the Azure datacenter that hosts
WEBPROD-AS-USE2 experiences a power failure, the
maximum number of unavailable virtual machines will be
7.

50
Q

Your on-premises network contains an Active Directory domain named adatum.com that is synced to Azure Active Directory (Azure AD). Password writeback is disabled.

In adatum.com, you create the users shown in the following table.
Name Account option
User1 User must change password at next logon.
User2 Store password by using reversible encryption.
User3 A smart card is required for interactive logon.

Which users must sign in from a computer joined to adatum.com?

User2 only
User1 and User3 only
User1, User2, and User3
User2 and User3 only
User1 only

A

Understanding Active Directory User Options
User must change password at next logon: This option forces the user to change their password the first time they sign in. This option has no impact on the location where the user must sign in from.
Store password using reversible encryption: This is a security risk, and this option will prevent the user from authenticating with azure resources. This will not stop the user from authenticating from Azure AD, but will require the user to change their password.
A smart card is required for interactive logon: This option enforces smart card authentication when a user signs in to the domain. This means the user must authenticate from an environment where their smart card is valid, so this user must sign in from a computer joined to the adatum.com domain.
Analyzing the Users
User1:
Account option: User must change password at next logon.
Analysis: This user will be forced to change password on the first login, but can authenticate from any location.
User2:
Account option: Store password by using reversible encryption.
Analysis: This user will be forced to change their password before authenticating with cloud resources. This option does not enforce authentication from an on-premises computer, but the user must login from an on-premises environment first.
User3:
Account option: A smart card is required for interactive logon.
Analysis: This user must sign in from a computer joined to adatum.com because it requires a smart card for authentication.
Determining Required Sign-In Location
Based on the user account options:
User1: Can sign in from any location, since password change is done on first log on.
User2: Will be forced to change their password on first logon to the on-premises environment, and can then authenticate from other locations.
User3: Must sign in from a computer joined to adatum.com because of the smart card requirement.
Therefore, both User2 and User3 will need to login from a computer connected to the domain.
Answer:
User2 and User3 only

51
Q

You have an Azure subscription that contains the following resources:

✑ 100 Azure virtual machines

✑ 20 Azure SQL databases

✑ 50 Azure file shares

You need to create a daily backup of all the resources by using Azure Backup.

What is the minimum number of backup policies that you must create?

1
2
3
150
170

A

Understanding Azure Backup Policies
Backup Policies: Define the backup schedule, retention policy, and other backup settings for Azure resources.
Resource Types: Azure Backup handles different resource types using different backup engines, and you cannot back up different resource types in the same policy.
Resource Limits: One backup policy can be used for multiple resources of the same type.
Backup Types: Azure backup policies can be configured for virtual machines, SQL databases and file shares separately.
Analyzing the Resources
Here are the resources that need to be backed up:
100 Azure virtual machines
20 Azure SQL databases
50 Azure file shares
Determining the Minimum Number of Policies
Virtual Machines: A single backup policy can be used for all 100 virtual machines. You do not need different policies for each machine, the policy can be applied at scale.
SQL Databases: A single backup policy can be used for all 20 SQL databases. You do not need different policies for each SQL database, the policy can be applied at scale.
Azure File Shares: A single backup policy can be used for all 50 Azure file shares. You do not need different policies for each file share, the policy can be applied at scale.
Therefore, you need a minimum of one policy for each type of resource.
Minimum Number of Policies:
You need one policy for all the VMs, one policy for all the SQL databases and one policy for all the file shares.
1 (VM) + 1 (SQL) + 1(File Shares) = 3
Answer:
3

52
Q

You have an Active Directory domain named contoso.com that contains the objects shown in the following table.

Name Type In organizational unit (OU)
User1 User OU1
User2 User OU1
User3 User OU1
Group1 Security Group – Global OU1
User4 User OU2
Group2 Security Group – Global OU2
The groups have the memberships shown in the following table.
Group Member
Group1 User1
Group2 User2, Group1

OU1 and OU2 are synced to Azure Active Directory (Azure AD).

You modify the synchronization settings and remove OU1 from synchronization. You sync Active Directory and Azure AD.

Which objects are in Azure AD?

User4 and Group2 only
User2, Group1, User4, and Group2 only
User1, User2, Group1, User4, and Group2 only
User1, User2, User3, User4, Group1, and Group2

A

Understanding Azure AD Connect Synchronization
Synchronization Scope: Azure AD Connect determines which objects from your on-premises Active Directory are synchronized to Azure AD.
Organizational Unit (OU) Sync: You can configure sync to include or exclude specific OUs.
Object Deletion: When an OU is removed from the sync scope, objects in that OU are typically deleted from Azure AD.
Group Membership: When groups are added, the groups and all group members will be synchronized. If a group has members from an out of scope OU, those members will still be synchronized.
Sync order: The order that objects are synced is relevant. If objects are added or removed, the changes will only be synced after an initial object has been synced, which may not immediately propagate across all objects in a given environment.
Scoping: The sync scope determines the objects to be synced.
Analyzing the Objects
OU1: Contains User1, User2, User3, and Group1.
OU2: Contains User4 and Group2.
Group1: Member of User1.
Group2: Members of User2 and Group1.
Determining Objects in Azure AD
Initial Sync: Initially, all objects in both OUs were synced to Azure AD.
OU1 Removal: You remove OU1 from synchronization. This will remove any direct objects within that OU from being synchronized to Azure AD. However, any objects in scope (e.g. User2), will remain.
Group Membership: Group2 is in OU2, which is still being synced. Group2 includes User2 and Group1 as members. Even though Group1 is in OU1 and has been removed from the sync scope, User2 was still synced with an earlier sync.
Synchronization Results:
User1: In OU1, will be removed from Azure AD.
User2: In OU1, but is also a member of Group2. Group2 is still in scope, so User2 will remain.
User3: In OU1, will be removed from Azure AD.
Group1: In OU1, will be removed from Azure AD, but is a member of Group2, and will therefore remain.
User4: In OU2, will remain in Azure AD.
Group2: In OU2, will remain in Azure AD.
Objects Remaining in Azure AD
After the changes, the objects in Azure AD will be: User2, Group1, User4, and Group2.
Answer:
User2, Group1, User4, and Group2 only

53
Q

You have a Microsoft 365 tenant and an Azure Active Directory (Azure AD) tenant named contoso.com.

You plan to grant three users named User1, User2, and User3 access to a temporary Microsoft SharePoint document library named Library1.

You need to create groups for the users. The solution must ensure that the groups are deleted automatically after 180 days.

Which two groups should you create? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

a Security group that uses the Assigned membership type
an Office 365 group that uses the Assigned membership type
an Office 365 group that uses the Dynamic User membership type
a Security group that uses the Dynamic User membership type
a Security group that uses the Dynamic Device membership type

A

Understanding Azure AD Groups and Expiration
Security Groups: Used for granting permissions to Azure resources and applications. These do not have an expiration setting.
Microsoft 365 Groups: (formerly Office 365 groups). Used for collaboration and includes resources like SharePoint sites, Planner, Teams, and mailboxes. These do have an expiration setting.
Assigned Membership: Members are explicitly added and removed.
Dynamic User Membership: Membership is based on user attributes and criteria.
Dynamic Device Membership: Membership is based on device attributes and criteria.
Expiration: Microsoft 365 Groups can be configured to expire and be automatically deleted.
Analyzing the Requirements
Temporary Access: The users need access for a limited time (180 days).
Automatic Deletion: The groups must be automatically deleted after 180 days.
SharePoint Access: The groups should be usable for granting permissions to SharePoint document libraries.
Determining the Correct Group Types
Let’s evaluate the group type options based on the requirements:
“a Security group that uses the Assigned membership type”
Analysis: Security groups are used to manage permissions and provide access to different resources, including SharePoint, however, they do not support expiration settings. This option is incorrect.
“an Office 365 group that uses the Assigned membership type”
Analysis: Office 365 groups can be used to manage permissions and resources, and they do support expiration settings. With Assigned membership type, you can directly add the three users as members. This is a correct option.
“an Office 365 group that uses the Dynamic User membership type”
Analysis: Office 365 groups support expiration settings, but the membership is dynamic, which is not necessary in this case. This would be an unnecessary layer of complexity for such a small number of users. This is a correct option, although it is not the most suitable option.
“a Security group that uses the Dynamic User membership type”
Analysis: Security groups do not support expiration settings. This option is incorrect.
“a Security group that uses the Dynamic Device membership type”
Analysis: Security groups do not support expiration settings, and this membership type is for devices not users. This option is incorrect.
The Two Correct Group Types
The two group types that meet the requirements are:
An Office 365 group that uses the Assigned membership type
An Office 365 group that uses the Dynamic User membership type
Answer:
an Office 365 group that uses the Assigned membership type
an Office 365 group that uses the Dynamic User membership type

54
Q

You download an Azure Resource Manager template based on an existing virtual machine.

The template will be used to deploy 100 virtual machines.

You need to modify the template to reference an administrative password. You must prevent the password from being stored in plain text.

What should you create to store the password?

Azure Active Directory (AD) Identity Protection and an Azure policy
a Recovery Services vault and a backup policy
an Azure Key Vault and an access policy
an Azure Storage account and an access policy

A

Understanding Secure Storage of Secrets
Plain Text Passwords: Storing passwords in plain text is a major security risk.
Azure Resource Manager (ARM) Templates: Templates should not contain sensitive information like passwords.
Secure Secret Storage: We need a secure way to manage secrets (passwords, keys, etc.) for automated deployments.
Password retrieval: The chosen solution must allow to retrieve the password securely within the Azure deployment process.
Analyzing the Options
“Azure Active Directory (AD) Identity Protection and an Azure policy”
Analysis: Identity Protection is used to detect and mitigate risks related to user identities. It is not suitable for storing and managing secrets. This option is incorrect.
“a Recovery Services vault and a backup policy”
Analysis: Recovery Services vaults are used for backups. They are not intended for secure secret management. This option is incorrect.
“an Azure Key Vault and an access policy”
Analysis: This is the correct approach. Azure Key Vault is a dedicated service for securely storing and managing secrets, keys, and certificates. Key Vault Access Policies determine who/what can access the stored secrets, making it a secure and ideal solution. The ARM template will retrieve the password from Key Vault at deployment time.
“an Azure Storage account and an access policy”
Analysis: Storage accounts are for storing files and data. Although secure, they are not designed to securely store and access sensitive credentials and keys. This option is incorrect.
The Correct Solution
The correct solution is to create an Azure Key Vault and an access policy. This allows to store the password securely, retrieve it in the ARM template at deployment time, and control who has access to the password.
Answer:
an Azure Key Vault and an access policy

55
Q

You create a virtual machine scale set named Scale1.
Scale1 is configured as shown in the following exhibit.
INSTANCES
*Instance count 4
* Instance size (View full pricing details) DS1_v2 (1 vCPU, 3.5 GB)
Deploy as low priority No Yes
Use managed disks No Yes
+ Show advanced settings
AUTOSCALE
Autoscale Disabled Enabled
* Minimum number of VMs 2
* Maximum number of VMs 20
Scale out
* CPU threshold (%) 80
* Number of VMs to increase by 2
Scale in
* CPU threshold (%) 30
* Number of VMs to decrease by 4
Use the drop-down menus to select the answer choice that completes each statement based on
the information presented in the graphic.
If Scalel is utilized at 85 percent for six minutes, Scalel will be
running [answer choice].
2 virtual machines
4 virtual machines
6 virtual machines
10 virtual machines
20 virtual machines
If Scalel is first utilized at 25 percent for six minutes, and then
utilized at 50 percent for six minutes, Scalel will be running
[answer choice].
2 virtual machines
4 virtual machines
6 virtual machines
10 virtual machines
20 virtual machines

A

Let me analyze each scenario:
“If Scale1 is utilized at 85 percent for six minutes, Scale1 will be running…” Answer: 6 virtual machines
Reasoning:
Initial instance count = 4 VMs [1]
CPU threshold for scale out = 80%
85% > 80%, so scale out triggers
Scale out adds 2 VMs
4 + 2 = 6 VMs total
“If Scale1 is first utilized at 25 percent for six minutes, and then utilized at 50 percent for six minutes, Scale1 will be running…” Answer: 2 virtual machines
Reasoning:
Initial instance count = 4 VMs
CPU threshold for scale in = 30%
25% < 30%, so scale in triggers
Scale in removes 4 VMs
4 - 4 = 0, but minimum is 2 VMs
50% utilization is above scale in threshold (30%)
But below scale out threshold (80%)
So stays at minimum 2 VMs
Key Points:
Scale Out Rules:
Triggers above 80% CPU
Adds 2 VMs
Maximum 20 VMs
Scale In Rules:
Triggers below 30% CPU
Removes 4 VMs
Minimum 2 VMs
Therefore:
First scenario: 6 VMs
Second scenario: 2 VMs

56
Q

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have an Azure subscription that contains the following resources:

✑ A virtual network that has a subnet named Subnet1

✑ Two network security groups (NSGs) named NSG-VM1 and NSG-Subnet1

✑ A virtual machine named VM1 that has the required Windows Server

configurations to allow Remote Desktop connections

NSG-Subnet1 has the default inbound security rules only.

NSG-VM1 has the default inbound security rules and the following custom inbound security rule:

✑ Priority: 100

✑ Source: Any

✑ Source port range: *

✑ Destination: *

✑ Destination port range: 3389

✑ Protocol: UDP

✑ Action: Allow

VM1 connects to Subnet1. NSG1-VM1 is associated to the network interface of VM1. NSG-Subnet1 is associated to Subnet1.

You need to be able to establish Remote Desktop connections from the internet to VM1.

Solution: You add an inbound security rule to NSG-Subnet1 and NSG-VM1 that allows connections from the internet source to the VirtualNetwork destination for port range 3389 and uses the TCP protocol.

Does this meet the goal?

Yes
No

A

The answer is: Yes
Let’s analyze why this solution meets the goal of enabling Remote Desktop (RDP) connections from the internet to VM1:
Current Configuration Issues:
NSG-VM1 only allows UDP 3389 (incorrect protocol)
NSG-Subnet1 has only default rules [1]
RDP requires TCP port 3389
Both NSGs must allow the traffic [2]
The Solution Adds:
New rule to NSG-VM1:
Protocol: TCP
Port: 3389
Source: Internet
Destination: VirtualNetwork
Action: Allow
Same rule to NSG-Subnet1:
Protocol: TCP
Port: 3389
Source: Internet
Destination: VirtualNetwork
Action: Allow
Why This Works:
RDP requires TCP port 3389
Traffic must pass both NSGs
Rules allow internet source
Both network layers are addressed
Proper protocol (TCP) is specified
Security Considerations:
Both NSG levels are configured
Network interface NSG (NSG-VM1)
Subnet NSG (NSG-Subnet1)
Correct protocol and port
Traffic Flow: Internet → NSG-Subnet1 → Subnet1 → NSG-VM1 → VM1
Therefore, this solution meets the goal because:
Uses correct protocol (TCP)
Opens correct port (3389)
Configures both NSGs
Allows internet source
Enables complete RDP path

57
Q

You have Azure subscriptions named Subscription1 and Subscription2.
Subscription1 has following resource groups:
|—|—|—|
| RG1 | West Europe | None |
| RG2 | West Europe | Read Only |
RG1 includes a web app named App1 in the West Europe location.
Subscription2 contains the following resource groups:
| Name | Region | Lock type |
|—|—|—|
| RG3 | East Europe | Delete |
| RG4 | Central US | none |
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Statements
App1 can be moved to RG2
App1 can be moved to RG3
App1 can be moved to RG4

Name | Region | Lock type |

A

Let me analyze each scenario for moving App1:
“App1 can be moved to RG2” Answer: No
Reasoning:
RG2 has a Read-Only lock
Read-Only locks prevent:
Adding new resources
Modifying existing resources
Moving resources into a read-only locked resource group is not allowed
“App1 can be moved to RG3” Answer: No
Reasoning:
RG3 is in a different subscription (Subscription2)
RG3 is in a different region (East Europe)
Web apps cannot be moved across regions
Delete lock doesn’t affect moving resources in
Cross-region moves for web apps are not supported
“App1 can be moved to RG4” Answer: No
Reasoning:
RG4 is in a different subscription (Subscription2)
RG4 is in a different region (Central US)
Web apps cannot be moved across regions
Even though RG4 has no locks
Cross-region moves for web apps are not supported
Key Points:
Web App Move Limitations:
Cannot move across regions
Region must remain the same
Some resources can move across subscriptions, but must stay in same region
Lock Considerations:
Read-Only prevents resource moves into the RG
Delete lock doesn’t prevent moves
No lock allows moves (if other conditions met)
Region Requirements:
Web apps must stay in same region
Cross-region moves not supported
Region change requires new deployment
Therefore:
Moving to RG2: No (Read-Only lock)
Moving to RG3: No (Different region)
Moving to RG4: No (Different region)

58
Q

You have an Azure virtual machine named VM1.

The network interface for VM1 is configured as shown in the exhibit. (Click the Exhibit tab.)
APPLICATION SECURITY GROUPS

Configure the application security groups
INBOUND PORT RULES
Network security group: VM1-nsg (attached to network interface: vm1175)
Impacts 0 subnets, 1 network interface

PRIORITY NAME PORT PROTOCOL SOURCE DESTINATION ACTION
300 RDP 3389 TCP Any Any Allow
400 Rule1 80 TCP Any Any Deny
500 Rule2 80,443 TCP Any Any Deny
1000 Rule4 50-100,400-500 UDP Any Any Allow
2000 Rule5 50-5000 Any Any VirtualNetwork Deny
3000 Rule6 150-300 Any Any Any Allow
4000 Rule3 60-500 Any Any VirtualNetwork Allow
65000 AllowVnetInBound Any Any VirtualNetwork VirtualNetwork Allow
65001 AllowAzureLoadBalancerInBound Any Any AzureLoadBalancer Any Allow
65500 DenyAllInbound Any Any Any Any Deny

You deploy a web server on VM1, and then create a secure website that is accessible by using the HTTPS protocol VM1 is used as a web server only.

You need to ensure that users can connect to the website from the Internet.

What should you do?
A. Modify the protocol of Rule4
B. Delete Rule1
C. For Rule5, change the Action to Allow and change the priority to 401 Most Voted
D. Create a new inbound rule that allows TCP protocol 443 and configure the rule to have a priority of 501.

A

C. For Rule5, change the Action to Allow and change the priority to 401 Most Voted

59
Q

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have an Azure subscription that contains the following resources:
✑ A virtual network that has a subnet named Subnet1
✑ Two network security groups (NSGs) named NSG-VM1 and NSG-Subnet1
✑ A virtual machine named VM1 that has the required Windows Server configurations to allow Remote Desktop connections
NSG-Subnet1 has the default inbound security rules only.
NSG-VM1 has the default inbound security rules and the following custom inbound security rule:
✑ Priority: 100
✑ Source: Any
✑ Source port range: *
✑ Destination: *
✑ Destination port range: 3389
✑ Protocol: UDP
✑ Action: Allow
VM1 has a public IP address and is connected to Subnet1. NSG-VM1 is associated to the network interface of VM1. NSG-Subnet1 is associated to Subnet1.
You need to be able to establish Remote Desktop connections from the internet to VM1.
Solution: You add an inbound security rule to NSG-Subnet1 that allows connections from the Any source to the *destination for port range 3389 and uses the TCP protocol. You remove NSG-VM1 from the network interface of VM1.
Does this meet the goal?

A. Yes
B. No

A

Understanding the Requirements
Remote Desktop Access: We need to allow RDP connections from the internet to VM1.
VM1 Configuration: The Windows Server OS is configured to accept RDP connections.
Network Setup:
VM1 is connected to Subnet1.
NSG-VM1 is applied to VM1’s network interface.
NSG-Subnet1 is applied to Subnet1.
NSG Rules:
NSG-Subnet1: Default rules only.
NSG-VM1: Default rules + custom rule allowing UDP on port 3389 from any source.
Analyzing the Solution
The solution proposes the following:
Add a TCP rule to NSG-Subnet1: This rule allows connections from the Any source to the destination for port 3389 using the TCP protocol. Note, the destination was not defined and has been marked as *.
Remove NSG-VM1: NSG-VM1 is removed from the network interface of VM1.
Determining if the Solution Meets the Goal
RDP Protocol: Remote Desktop Protocol (RDP) uses TCP on port 3389.
NSG-Subnet1: The new rule on NSG-Subnet1 allows the correct protocol (TCP) from any source to any destination for port 3389.
NSG-VM1 Removal: By removing NSG-VM1 the incorrect rule for port 3389 is removed, and the default rules are no longer applied.
How Traffic Flows
Inbound traffic now only has to pass through the subnet NSG. As the default rule of allowing traffic from the virtual network is in place, and the new rule allows traffic on the correct port, this configuration will allow RDP traffic to reach VM1.
Therefore, the proposed solution does meet the goal.
Answer:
A. Yes

60
Q

You have Azure virtual machines that run Windows Server 2019 and are configured as shown in the following table.

Name Virtual network name DNS suffix configured in Windows Server
VM1 VNET1 Contoso.com
VM2 VNET2 Contoso.com

You create a public Azure DNS zone named adatum.com and a private Azure DNS zone named contoso.com.

For contoso.com, you create a virtual network link named link1 as shown in the exhibit. (Click the Exhibit tab.)

You discover that VM1 can resolve names in contoso.com but cannot resolve names in adatum.com. VM1 can resolve other hosts on the internet.

You need to ensure that VM1 can resolve host names in adatum.com.

What should you do?

Update the DNS suffix on VM1 to be adatum.com.
Create an SRV record in the contoso.com zone.
Configure the name servers for adatum.com at the domain registrar.
Modify the Access control (IAM) settings for link1.

A

The correct answer is: Configure the name servers for adatum.com at the domain registrar.
Here’s why:
The scenario involves two DNS zones:
A public DNS zone (adatum.com)
A private DNS zone (contoso.com)
Current situation:
VM1 can resolve names in contoso.com (private zone) because:
The private zone is linked to VNET1
VM1 is in VNET1
VM1 can resolve internet hostnames
VM1 cannot resolve names in adatum.com (public zone)
Why this is the correct solution:
For a public DNS zone to work, the domain’s name servers must be configured at the domain registrar
Azure assigns name servers to the public DNS zone
These name servers need to be configured as the authoritative name servers for the domain at the registrar
Without this configuration, DNS queries for adatum.com won’t be directed to Azure’s name servers
Why other options are incorrect:
“Update the DNS suffix on VM1 to be adatum.com”:
The DNS suffix is for unqualified names
This wouldn’t help resolve names in the public DNS zone
Would actually break resolution for contoso.com
“Create an SRV record in the contoso.com zone”:
SRV records are for service location
Won’t help with general name resolution between zones
“Modify the Access control (IAM) settings for link1”:
Link1 is for the private DNS zone (contoso.com)
IAM settings don’t affect DNS resolution
This wouldn’t impact resolution of the public zone
To fix this:
Get the name servers assigned to the adatum.com zone in Azure
Configure these name servers at your domain registrar
This will ensure DNS queries for adatum.com are directed to Azure’s name servers

61
Q

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer named Computer1 that has a point-to-site VPN connection to an Azure virtual network named VNet1. The point-to-site connection uses a self-signed certificate.

From Azure, you download and install the VPN client configuration package on a computer named Computer2.

You need to ensure that you can establish a point-to-site VPN connection to VNet1 from Computer2.

Solution: You modify the Azure Active Directory (Azure AD) authentication policies.

Does this meet this goal?

Yes
No

A

Understanding Point-to-Site VPNs
Point-to-Site (P2S) VPN: Allows individual client computers to connect to an Azure virtual network over a secure tunnel.
Authentication: P2S VPNs can use various authentication methods.
Certificates: Certificate-based authentication relies on certificates installed on the client and server for trust.
Configuration Package: The configuration package contains the client vpn configuration and is downloaded from azure.
Azure AD Authentication Policies: Control how users authenticate to Azure AD.
Analyzing the Setup
Computer1: Has an existing P2S VPN connection with a self-signed certificate.
Computer2: New client where we’re trying to establish a connection.
VPN Client Configuration Package: Downloaded from Azure to Computer2.
Self-Signed Certificate: A self-signed certificate was used to configure the VPN connection.
Analyzing the Solution
The solution proposes modifying Azure AD authentication policies.
Determining if the Solution Meets the Goal
P2S and Azure AD: Modifying Azure AD authentication policies is relevant when you are using Azure AD for authentication in a point-to-site VPN configuration. However, in this case, a self-signed certificate is being used to authenticate with the VPN gateway, therefore authentication with Azure AD is not required.
Authentication Mechanism: The authentication is performed using the client certificate. Azure AD authentication policies are not relevant for this.
Self-signed certificate: If a self-signed certificate is used, then a child certificate must be generated to connect the device. Azure AD configuration is not relevant to this scenario.
Modifying Azure AD authentication policies will not enable a point-to-site VPN connection in this scenario.
Therefore, the proposed solution does NOT meet the goal.
Answer:
No

62
Q

You have an Azure virtual machine named VM1 that runs Windows Server 2019.

You sign in to VM1 as a user named User 1 and perform the following actions:

  • Create files on drive C.
  • Create files on drive D.
  • Modify the screen saver timeout.
  • Change the desktop background. You plan to redeploy VM1.

Which changes will be lost after you redeploy VM1?

the modified screen saver timeout
the new desktop background
the new files on drive D
The new files on drive C

A

Understanding Azure VM Redeployment
Redeployment: Redeployment moves the VM to a new host within the Azure infrastructure. This process is done through the Azure Fabric.
Temporary Storage: Data on the temporary storage drive (typically drive D) is not persisted during redeployment.
OS Disk: The operating system disk (typically drive C) is persisted.
OS Settings: Operating system settings are part of the operating system drive and are persisted through a redeployment.
Data Disks: Data disks are persisted through a redeployment.
Analyzing the Actions Performed on VM1
Create files on drive C: Drive C is typically the OS disk, meaning changes made to it will persist across redeployments.
Create files on drive D: Drive D is typically the temporary storage drive, which will be deleted on redeployment.
Modify the screen saver timeout: This is an OS setting and is stored on drive C. These settings will persist through a redeployment.
Change the desktop background: This is an OS setting and is stored on drive C. These settings will persist through a redeployment.
Determining Lost Changes
Based on the analysis:
The new files on drive D will be lost, as this is a temporary drive that will be deleted.
The other changes will be persisted through the redeployment.
Answer:
The new files on drive D

63
Q
  1. Topic 1, Litware, inc.

Overview

Litware, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.

The Montreal office has 2,000 employees. The Seattle office has 1,000 employees. The New York office has 200 employees.

All the resources used by Litware are hosted on-premises.

Litware creates a new Azure subscription. The Azure Active Directory (Azure AD) tenant uses a domain named Litware.onmicrosoft.com. The tenant uses the P1 pricing tier.

Existing Environment

The network contains an Active Directory forest named Litware.com. All domain controllers are configured as DNS servers and host the Litware.com DNS zone.

Litware has finance, human resources, sales, research, and information technology departments. Each department has an organizational unit (OU) that contains all the accounts of that respective department. All the user accounts have the department attribute set to their respective department. New users are added frequently.

Litware.com contains a user named User1.

All the offices connect by using private links.

Litware has data centers in the Montreal and Seattle offices. Each data center has a firewall that can be configured as a VPN device.

All infrastructure servers are virtualized.

The virtualization environment contains the servers in the following table.

Name Role Contains virtual machine
Server1 VMWare vCenter server VM1
Server2 Hyper-V-host VM2

Litware uses two web applications named App1 and App2. Each instance on each web
application requires 1GB of memory.

The Azure subscription contains the resources in the following table.
Name Type
VNet1 Virtual network
VM3 Virtual machine
VM4 Virtual machine
The network security team implements several network security groups (NSGs).

Planned Changes

Litware plans to implement the following changes:

  • Deploy Azure ExpressRoute to the Montreal office.
  • Migrate the virtual machines hosted on Server1 and Server2 to Azure.
  • Synchronize on-premises Active Directory to Azure Active Directory (Azure AD).
  • Migrate App1 and App2 to two Azure web apps named webApp1 and WebApp2.

Technical requirements

Litware must meet the following technical requirements:

  • Ensure that WebApp1 can adjust the number of instances automatically based on the load and can scale up to five instance*.
  • Ensure that VM3 can establish outbound connections over TCP port 8080 to the applications servers in the Montreal office.
  • Ensure that routing information is exchanged automatically between Azure and the routers in the Montreal office.
  • Enable Azure Multi-Factor Authentication (MFA) for the users in the finance department only.
  • Ensure that webapp2.azurewebsites.net can be accessed by using the name app2.Litware.com.
  • Connect the New Your office to VNet1 over the Internet by using an encrypted connection.
  • Create a workflow to send an email message when the settings of VM4 are modified.
  • Create a custom Azure role named Role1 that is based on the Reader role.
  • Minimize costs whenever possible.

You implement the planned changes for NSG1 and NSG2.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Statements Yes No
From VM1, you can establish a Remote Desktop session to VM2.
From VM2, you can ping VM3.
From VM2, you can establish a Remote Desktop session to VM3.

A
64
Q

Overview

Existing Environment

Humongous Insurance is an insurance company that has three offices in Miami, Tokoyo, and Bankok.

Each has 5000 users.

Active Directory Environment

Humongous Insurance has a single-domain Active Directory forest named humongousinsurance.com.

The functional level of the forest is Windows Server 2012.

You recently provisioned an Azure Active Directory (Azure AD) tenant.

Network Infrastructure

Each office has a local data center that contains all the servers for that office. Each office has a dedicated connection to the Internet.

Each office has several link load balancers that provide access to the servers.

Active Directory Issue

Several users in humongousinsurance.com have UPNs that contain special characters.

You suspect that some of the characters are unsupported in Azure AD.

Licensing Issue

You attempt to assign a license in Azure to several users and receive the following error message: “Licenses not assigned. License agreement failed for one user.” You verify that the Azure subscription has the available licenses.

Requirements

Planned Changes

Humongous Insurance plans to open a new office in Paris. The Paris office will contain 1,000 users who will be hired during the next 12 months. All the resources used by the Paris office users will be hosted in Azure.

Planned Azure AD Infrastructure

The on-premises Active Directory domain will be synchronized to Azure AD.

All client computers in the Paris office will be joined to an Azure AD domain.

Planned Azure Networking Infrastructure

You plan to create the following networking resources in a resource group named All_Resources:

✑ Default Azure system routes that will be the only routes used to route traffic

✑ A virtual network named Paris-VNet that will contain two subnets named Subnet1 and Subnet2

✑ A virtual network named ClientResources-VNet that will contain one subnet named ClientSubnet

✑ A virtual network named AllOffices-VNet that will contain two subnets named Subnet3 and Subnet4

You plan to enable peering between Paris-VNet and AllOffices-VNet. You will enable the Use remote gateways setting for the Paris-VNet peerings.

You plan to create a private DNS zone named humongousinsurance.local and set the registration network to the ClientResources-VNet virtual network.

Planned Azure Computer Infrastructure

Each subnet will contain several virtual machines that will run either Windows Server 2012 R2, Windows Server 2016, or Red Hat Linux.

Department Requirements

Humongous Insurance identifies the following requirements for the company’s departments:

✑ Web administrators will deploy Azure web apps for the marketing department. Each web app will be added to a separate resource group. The initial configuration of the web apps will be identical. The web administrators have permission to deploy web apps to resource groups.

✑ During the testing phase, auditors in the finance department must be able to review all Azure costs from the past week.

Authentication Requirements

Users in the Miami office must use Azure Active Directory Seamless Single Sign-on (Azure AD Seamless SSO) when accessing resources in Azure.

DRAG DROP

You need to prepare the environment to ensure that the web administrators can deploy the web apps as quickly as possible.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Actions
From the Automation script blade of the resource group,
click Deploy.
From the Templates service, select the template, and then
share the template to the web administrators.
From the Automation script blade of the resource group,
click Add to library.
From the Automation Accounts service, add an automation
account.
Create a resource group, and then deploy a web app to
the resource group.
From the Automation script blade of the resource group,
click the Parameters tab.
Answer Area

A
65
Q

Overview

Existing Environment

Humongous Insurance is an insurance company that has three offices in Miami, Tokoyo, and Bankok.

Each has 5000 users.

Active Directory Environment

Humongous Insurance has a single-domain Active Directory forest named humongousinsurance.com.

The functional level of the forest is Windows Server 2012.

You recently provisioned an Azure Active Directory (Azure AD) tenant.

Network Infrastructure

Each office has a local data center that contains all the servers for that office. Each office has a dedicated connection to the Internet.

Each office has several link load balancers that provide access to the servers.

Active Directory Issue

Several users in humongousinsurance.com have UPNs that contain special characters.

You suspect that some of the characters are unsupported in Azure AD.

Licensing Issue

You attempt to assign a license in Azure to several users and receive the following error message: “Licenses not assigned. License agreement failed for one user.” You verify that the Azure subscription has the available licenses.

Requirements

Planned Changes

Humongous Insurance plans to open a new office in Paris. The Paris office will contain 1,000 users who will be hired during the next 12 months. All the resources used by the Paris office users will be hosted in Azure.

Planned Azure AD Infrastructure

The on-premises Active Directory domain will be synchronized to Azure AD.

All client computers in the Paris office will be joined to an Azure AD domain.

Planned Azure Networking Infrastructure

You plan to create the following networking resources in a resource group named All_Resources:

✑ Default Azure system routes that will be the only routes used to route traffic

✑ A virtual network named Paris-VNet that will contain two subnets named Subnet1 and Subnet2

✑ A virtual network named ClientResources-VNet that will contain one subnet named ClientSubnet

✑ A virtual network named AllOffices-VNet that will contain two subnets named Subnet3 and Subnet4

You plan to enable peering between Paris-VNet and AllOffices-VNet. You will enable the Use remote gateways setting for the Paris-VNet peerings.

You plan to create a private DNS zone named humongousinsurance.local and set the registration network to the ClientResources-VNet virtual network.

Planned Azure Computer Infrastructure

Each subnet will contain several virtual machines that will run either Windows Server 2012 R2, Windows Server 2016, or Red Hat Linux.

Department Requirements

Humongous Insurance identifies the following requirements for the company’s departments:

✑ Web administrators will deploy Azure web apps for the marketing department. Each web app will be added to a separate resource group. The initial configuration of the web apps will be identical. The web administrators have permission to deploy web apps to resource groups.

✑ During the testing phase, auditors in the finance department must be able to review all Azure costs from the past week.

Authentication Requirements

Users in the Miami office must use Azure Active Directory Seamless Single Sign-on (Azure AD Seamless SSO) when accessing resources in Azure.

Which blade should you instruct the finance department auditors to use?

Partner information
Overview
Payment methods
Invoices

A
66
Q

Overview

Existing Environment

Humongous Insurance is an insurance company that has three offices in Miami, Tokoyo, and Bankok.

Each has 5000 users.

Active Directory Environment

Humongous Insurance has a single-domain Active Directory forest named humongousinsurance.com.

The functional level of the forest is Windows Server 2012.

You recently provisioned an Azure Active Directory (Azure AD) tenant.

Network Infrastructure

Each office has a local data center that contains all the servers for that office. Each office has a dedicated connection to the Internet.

Each office has several link load balancers that provide access to the servers.

Active Directory Issue

Several users in humongousinsurance.com have UPNs that contain special characters.

You suspect that some of the characters are unsupported in Azure AD.

Licensing Issue

You attempt to assign a license in Azure to several users and receive the following error message: “Licenses not assigned. License agreement failed for one user.” You verify that the Azure subscription has the available licenses.

Requirements

Planned Changes

Humongous Insurance plans to open a new office in Paris. The Paris office will contain 1,000 users who will be hired during the next 12 months. All the resources used by the Paris office users will be hosted in Azure.

Planned Azure AD Infrastructure

The on-premises Active Directory domain will be synchronized to Azure AD.

All client computers in the Paris office will be joined to an Azure AD domain.

Planned Azure Networking Infrastructure

You plan to create the following networking resources in a resource group named All_Resources:

✑ Default Azure system routes that will be the only routes used to route traffic

✑ A virtual network named Paris-VNet that will contain two subnets named Subnet1 and Subnet2

✑ A virtual network named ClientResources-VNet that will contain one subnet named ClientSubnet

✑ A virtual network named AllOffices-VNet that will contain two subnets named Subnet3 and Subnet4

You plan to enable peering between Paris-VNet and AllOffices-VNet. You will enable the Use remote gateways setting for the Paris-VNet peerings.

You plan to create a private DNS zone named humongousinsurance.local and set the registration network to the ClientResources-VNet virtual network.

Planned Azure Computer Infrastructure

Each subnet will contain several virtual machines that will run either Windows Server 2012 R2, Windows Server 2016, or Red Hat Linux.

Department Requirements

Humongous Insurance identifies the following requirements for the company’s departments:

✑ Web administrators will deploy Azure web apps for the marketing department. Each web app will be added to a separate resource group. The initial configuration of the web apps will be identical. The web administrators have permission to deploy web apps to resource groups.

✑ During the testing phase, auditors in the finance department must be able to review all Azure costs from the past week.

Authentication Requirements

Users in the Miami office must use Azure Active Directory Seamless Single Sign-on (Azure AD Seamless SSO) when accessing resources in Azure.

You need to prepare the environment to meet the authentication requirements.

Which two actions should you perform? Each correct answer presents part of the solution. NOTE Each correct selection is worth one point.

Azure Active Directory (AD) Identity Protection and an Azure policy
a Recovery Services vault and a backup policy
an Azure Key Vault and an access policy
an Azure Storage account and an access policy

A
67
Q

Overview

Existing Environment

Humongous Insurance is an insurance company that has three offices in Miami, Tokoyo, and Bankok.

Each has 5000 users.

Active Directory Environment

Humongous Insurance has a single-domain Active Directory forest named humongousinsurance.com.

The functional level of the forest is Windows Server 2012.

You recently provisioned an Azure Active Directory (Azure AD) tenant.

Network Infrastructure

Each office has a local data center that contains all the servers for that office. Each office has a dedicated connection to the Internet.

Each office has several link load balancers that provide access to the servers.

Active Directory Issue

Several users in humongousinsurance.com have UPNs that contain special characters.

You suspect that some of the characters are unsupported in Azure AD.

Licensing Issue

You attempt to assign a license in Azure to several users and receive the following error message: “Licenses not assigned. License agreement failed for one user.” You verify that the Azure subscription has the available licenses.

Requirements

Planned Changes

Humongous Insurance plans to open a new office in Paris. The Paris office will contain 1,000 users who will be hired during the next 12 months. All the resources used by the Paris office users will be hosted in Azure.

Planned Azure AD Infrastructure

The on-premises Active Directory domain will be synchronized to Azure AD.

All client computers in the Paris office will be joined to an Azure AD domain.

Planned Azure Networking Infrastructure

You plan to create the following networking resources in a resource group named All_Resources:

✑ Default Azure system routes that will be the only routes used to route traffic

✑ A virtual network named Paris-VNet that will contain two subnets named Subnet1 and Subnet2

✑ A virtual network named ClientResources-VNet that will contain one subnet named ClientSubnet

✑ A virtual network named AllOffices-VNet that will contain two subnets named Subnet3 and Subnet4

You plan to enable peering between Paris-VNet and AllOffices-VNet. You will enable the Use remote gateways setting for the Paris-VNet peerings.

You plan to create a private DNS zone named humongousinsurance.local and set the registration network to the ClientResources-VNet virtual network.

Planned Azure Computer Infrastructure

Each subnet will contain several virtual machines that will run either Windows Server 2012 R2, Windows Server 2016, or Red Hat Linux.

Department Requirements

Humongous Insurance identifies the following requirements for the company’s departments:

✑ Web administrators will deploy Azure web apps for the marketing department. Each web app will be added to a separate resource group. The initial configuration of the web apps will be identical. The web administrators have permission to deploy web apps to resource groups.

✑ During the testing phase, auditors in the finance department must be able to review all Azure costs from the past week.

Authentication Requirements

Users in the Miami office must use Azure Active Directory Seamless Single Sign-on (Azure AD Seamless SSO) when accessing resources in Azure.

You need to define a custom domain name for Azure AD to support the planned infrastructure.

Which domain name should you use?

Join the client computers in the Miami office to Azure A
Add http://autologon.microsoftazuread-sso.com to the intranet zone of each client computer in the Miami office.
Allow inbound TCP port 8080 to the domain controllers in the Miami office.
Install Azure AD Connect on a server in the Miami office and enable Pass-through Authentication
Install the Active Directory Federation Services (AD FS) role on a domain controller in the Miami office.

A
68
Q

Overview

Existing Environment

Humongous Insurance is an insurance company that has three offices in Miami, Tokoyo, and Bankok.

Each has 5000 users.

Active Directory Environment

Humongous Insurance has a single-domain Active Directory forest named humongousinsurance.com.

The functional level of the forest is Windows Server 2012.

You recently provisioned an Azure Active Directory (Azure AD) tenant.

Network Infrastructure

Each office has a local data center that contains all the servers for that office. Each office has a dedicated connection to the Internet.

Each office has several link load balancers that provide access to the servers.

Active Directory Issue

Several users in humongousinsurance.com have UPNs that contain special characters.

You suspect that some of the characters are unsupported in Azure AD.

Licensing Issue

You attempt to assign a license in Azure to several users and receive the following error message: “Licenses not assigned. License agreement failed for one user.” You verify that the Azure subscription has the available licenses.

Requirements

Planned Changes

Humongous Insurance plans to open a new office in Paris. The Paris office will contain 1,000 users who will be hired during the next 12 months. All the resources used by the Paris office users will be hosted in Azure.

Planned Azure AD Infrastructure

The on-premises Active Directory domain will be synchronized to Azure AD.

All client computers in the Paris office will be joined to an Azure AD domain.

Planned Azure Networking Infrastructure

You plan to create the following networking resources in a resource group named All_Resources:

✑ Default Azure system routes that will be the only routes used to route traffic

✑ A virtual network named Paris-VNet that will contain two subnets named Subnet1 and Subnet2

✑ A virtual network named ClientResources-VNet that will contain one subnet named ClientSubnet

✑ A virtual network named AllOffices-VNet that will contain two subnets named Subnet3 and Subnet4

You plan to enable peering between Paris-VNet and AllOffices-VNet. You will enable the Use remote gateways setting for the Paris-VNet peerings.

You plan to create a private DNS zone named humongousinsurance.local and set the registration network to the ClientResources-VNet virtual network.

Planned Azure Computer Infrastructure

Each subnet will contain several virtual machines that will run either Windows Server 2012 R2, Windows Server 2016, or Red Hat Linux.

Department Requirements

Humongous Insurance identifies the following requirements for the company’s departments:

✑ Web administrators will deploy Azure web apps for the marketing department. Each web app will be added to a separate resource group. The initial configuration of the web apps will be identical. The web administrators have permission to deploy web apps to resource groups.

✑ During the testing phase, auditors in the finance department must be able to review all Azure costs from the past week.

Authentication Requirements

Users in the Miami office must use Azure Active Directory Seamless Single Sign-on (Azure AD Seamless SSO) when accessing resources in Azure.

You need to resolve the Active Directory issue.

What should you do?

From Active Directory Users and Computers, select the user accounts, and then modify the User Principal Name value.
Run idfix.exe, and then use the Edit action.
From Active Directory Domains and Trusts, modify the list of UPN suffixes.
From Azure AD Connect, modify the outbound synchronization rule.

A
69
Q

Overview

Existing Environment

Humongous Insurance is an insurance company that has three offices in Miami, Tokoyo, and Bankok.

Each has 5000 users.

Active Directory Environment

Humongous Insurance has a single-domain Active Directory forest named humongousinsurance.com.

The functional level of the forest is Windows Server 2012.

You recently provisioned an Azure Active Directory (Azure AD) tenant.

Network Infrastructure

Each office has a local data center that contains all the servers for that office. Each office has a dedicated connection to the Internet.

Each office has several link load balancers that provide access to the servers.

Active Directory Issue

Several users in humongousinsurance.com have UPNs that contain special characters.

You suspect that some of the characters are unsupported in Azure AD.

Licensing Issue

You attempt to assign a license in Azure to several users and receive the following error message: “Licenses not assigned. License agreement failed for one user.” You verify that the Azure subscription has the available licenses.

Requirements

Planned Changes

Humongous Insurance plans to open a new office in Paris. The Paris office will contain 1,000 users who will be hired during the next 12 months. All the resources used by the Paris office users will be hosted in Azure.

Planned Azure AD Infrastructure

The on-premises Active Directory domain will be synchronized to Azure AD.

All client computers in the Paris office will be joined to an Azure AD domain.

Planned Azure Networking Infrastructure

You plan to create the following networking resources in a resource group named All_Resources:

✑ Default Azure system routes that will be the only routes used to route traffic

✑ A virtual network named Paris-VNet that will contain two subnets named Subnet1 and Subnet2

✑ A virtual network named ClientResources-VNet that will contain one subnet named ClientSubnet

✑ A virtual network named AllOffices-VNet that will contain two subnets named Subnet3 and Subnet4

You plan to enable peering between Paris-VNet and AllOffices-VNet. You will enable the Use remote gateways setting for the Paris-VNet peerings.

You plan to create a private DNS zone named humongousinsurance.local and set the registration network to the ClientResources-VNet virtual network.

Planned Azure Computer Infrastructure

Each subnet will contain several virtual machines that will run either Windows Server 2012 R2, Windows Server 2016, or Red Hat Linux.

Department Requirements

Humongous Insurance identifies the following requirements for the company’s departments:

✑ Web administrators will deploy Azure web apps for the marketing department. Each web app will be added to a separate resource group. The initial configuration of the web apps will be identical. The web administrators have permission to deploy web apps to resource groups.

✑ During the testing phase, auditors in the finance department must be able to review all Azure costs from the past week.

Authentication Requirements

Users in the Miami office must use Azure Active Directory Seamless Single Sign-on (Azure AD Seamless SSO) when accessing resources in Azure.

Which blade should you instruct the finance department auditors to use?

invoices
partner information
cost analysis
External services

A
70
Q

Overview

Existing Environment

Humongous Insurance is an insurance company that has three offices in Miami, Tokoyo, and Bankok.

Each has 5000 users.

Active Directory Environment

Humongous Insurance has a single-domain Active Directory forest named humongousinsurance.com.

The functional level of the forest is Windows Server 2012.

You recently provisioned an Azure Active Directory (Azure AD) tenant.

Network Infrastructure

Each office has a local data center that contains all the servers for that office. Each office has a dedicated connection to the Internet.

Each office has several link load balancers that provide access to the servers.

Active Directory Issue

Several users in humongousinsurance.com have UPNs that contain special characters.

You suspect that some of the characters are unsupported in Azure AD.

Licensing Issue

You attempt to assign a license in Azure to several users and receive the following error message: “Licenses not assigned. License agreement failed for one user.” You verify that the Azure subscription has the available licenses.

Requirements

Planned Changes

Humongous Insurance plans to open a new office in Paris. The Paris office will contain 1,000 users who will be hired during the next 12 months. All the resources used by the Paris office users will be hosted in Azure.

Planned Azure AD Infrastructure

The on-premises Active Directory domain will be synchronized to Azure AD.

All client computers in the Paris office will be joined to an Azure AD domain.

Planned Azure Networking Infrastructure

You plan to create the following networking resources in a resource group named All_Resources:

✑ Default Azure system routes that will be the only routes used to route traffic

✑ A virtual network named Paris-VNet that will contain two subnets named Subnet1 and Subnet2

✑ A virtual network named ClientResources-VNet that will contain one subnet named ClientSubnet

✑ A virtual network named AllOffices-VNet that will contain two subnets named Subnet3 and Subnet4

You plan to enable peering between Paris-VNet and AllOffices-VNet. You will enable the Use remote gateways setting for the Paris-VNet peerings.

You plan to create a private DNS zone named humongousinsurance.local and set the registration network to the ClientResources-VNet virtual network.

Planned Azure Computer Infrastructure

Each subnet will contain several virtual machines that will run either Windows Server 2012 R2, Windows Server 2016, or Red Hat Linux.

Department Requirements

Humongous Insurance identifies the following requirements for the company’s departments:

✑ Web administrators will deploy Azure web apps for the marketing department. Each web app will be added to a separate resource group. The initial configuration of the web apps will be identical. The web administrators have permission to deploy web apps to resource groups.

✑ During the testing phase, auditors in the finance department must be able to review all Azure costs from the past week.

Authentication Requirements

Users in the Miami office must use Azure Active Directory Seamless Single Sign-on (Azure AD Seamless SSO) when accessing resources in Azure.

You need to define a custom domain name for Azure AD to support the planned infrastructure.

Which domain name should you use?

ad.humongousinsurance.com
humongousinsurance.onmicrosoft.com
humongousinsurance.local
humongousinsurance.com

A
71
Q

Overview

Existing Environment

Humongous Insurance is an insurance company that has three offices in Miami, Tokoyo, and Bankok.

Each has 5000 users.

Active Directory Environment

Humongous Insurance has a single-domain Active Directory forest named humongousinsurance.com.

The functional level of the forest is Windows Server 2012.

You recently provisioned an Azure Active Directory (Azure AD) tenant.

Network Infrastructure

Each office has a local data center that contains all the servers for that office. Each office has a dedicated connection to the Internet.

Each office has several link load balancers that provide access to the servers.

Active Directory Issue

Several users in humongousinsurance.com have UPNs that contain special characters.

You suspect that some of the characters are unsupported in Azure AD.

Licensing Issue

You attempt to assign a license in Azure to several users and receive the following error message: “Licenses not assigned. License agreement failed for one user.” You verify that the Azure subscription has the available licenses.

Requirements

Planned Changes

Humongous Insurance plans to open a new office in Paris. The Paris office will contain 1,000 users who will be hired during the next 12 months. All the resources used by the Paris office users will be hosted in Azure.

Planned Azure AD Infrastructure

The on-premises Active Directory domain will be synchronized to Azure AD.

All client computers in the Paris office will be joined to an Azure AD domain.

Planned Azure Networking Infrastructure

You plan to create the following networking resources in a resource group named All_Resources:

✑ Default Azure system routes that will be the only routes used to route traffic

✑ A virtual network named Paris-VNet that will contain two subnets named Subnet1 and Subnet2

✑ A virtual network named ClientResources-VNet that will contain one subnet named ClientSubnet

✑ A virtual network named AllOffices-VNet that will contain two subnets named Subnet3 and Subnet4

You plan to enable peering between Paris-VNet and AllOffices-VNet. You will enable the Use remote gateways setting for the Paris-VNet peerings.

You plan to create a private DNS zone named humongousinsurance.local and set the registration network to the ClientResources-VNet virtual network.

Planned Azure Computer Infrastructure

Each subnet will contain several virtual machines that will run either Windows Server 2012 R2, Windows Server 2016, or Red Hat Linux.

Department Requirements

Humongous Insurance identifies the following requirements for the company’s departments:

✑ Web administrators will deploy Azure web apps for the marketing department. Each web app will be added to a separate resource group. The initial configuration of the web apps will be identical. The web administrators have permission to deploy web apps to resource groups.

✑ During the testing phase, auditors in the finance department must be able to review all Azure costs from the past week.

Authentication Requirements

Users in the Miami office must use Azure Active Directory Seamless Single Sign-on (Azure AD Seamless SSO) when accessing resources in Azure.

You need to prepare the environment to meet the authentication requirements.

Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Allow inbound TCP port 8080 to the domain controllers in the Miami office.
Add http://autogon.microsoftazuread-sso.com to the intranet zone of each client computer in the Miami office.
Join the client computers in the Miami office to Azure A
Install the Active Directory Federation Services (AD FS) role on a domain controller in the Miami office.
Install Azure AD Connect on a server in the Miami office and enable Pass-through Authentication.

A
72
Q

Overview

Existing Environment

Humongous Insurance is an insurance company that has three offices in Miami, Tokoyo, and Bankok.

Each has 5000 users.

Active Directory Environment

Humongous Insurance has a single-domain Active Directory forest named humongousinsurance.com.

The functional level of the forest is Windows Server 2012.

You recently provisioned an Azure Active Directory (Azure AD) tenant.

Network Infrastructure

Each office has a local data center that contains all the servers for that office. Each office has a dedicated connection to the Internet.

Each office has several link load balancers that provide access to the servers.

Active Directory Issue

Several users in humongousinsurance.com have UPNs that contain special characters.

You suspect that some of the characters are unsupported in Azure AD.

Licensing Issue

You attempt to assign a license in Azure to several users and receive the following error message: “Licenses not assigned. License agreement failed for one user.” You verify that the Azure subscription has the available licenses.

Requirements

Planned Changes

Humongous Insurance plans to open a new office in Paris. The Paris office will contain 1,000 users who will be hired during the next 12 months. All the resources used by the Paris office users will be hosted in Azure.

Planned Azure AD Infrastructure

The on-premises Active Directory domain will be synchronized to Azure AD.

All client computers in the Paris office will be joined to an Azure AD domain.

Planned Azure Networking Infrastructure

You plan to create the following networking resources in a resource group named All_Resources:

✑ Default Azure system routes that will be the only routes used to route traffic

✑ A virtual network named Paris-VNet that will contain two subnets named Subnet1 and Subnet2

✑ A virtual network named ClientResources-VNet that will contain one subnet named ClientSubnet

✑ A virtual network named AllOffices-VNet that will contain two subnets named Subnet3 and Subnet4

You plan to enable peering between Paris-VNet and AllOffices-VNet. You will enable the Use remote gateways setting for the Paris-VNet peerings.

You plan to create a private DNS zone named humongousinsurance.local and set the registration network to the ClientResources-VNet virtual network.

Planned Azure Computer Infrastructure

Each subnet will contain several virtual machines that will run either Windows Server 2012 R2, Windows Server 2016, or Red Hat Linux.

Department Requirements

Humongous Insurance identifies the following requirements for the company’s departments:

✑ Web administrators will deploy Azure web apps for the marketing department. Each web app will be added to a separate resource group. The initial configuration of the web apps will be identical. The web administrators have permission to deploy web apps to resource groups.

✑ During the testing phase, auditors in the finance department must be able to review all Azure costs from the past week.

Authentication Requirements

Users in the Miami office must use Azure Active Directory Seamless Single Sign-on (Azure AD Seamless SSO) when accessing resources in Azure.

You need to resolve the licensing issue before you attempt to assign the license again.

What should you do?

From the Groups blade, invite the user accounts to a new group.
From the Profile blade, modify the usage location.
From the Directory role blade, modify the directory role.

A
73
Q

Overview

Existing Environment

Humongous Insurance is an insurance company that has three offices in Miami, Tokoyo, and Bankok.

Each has 5000 users.

Active Directory Environment

Humongous Insurance has a single-domain Active Directory forest named humongousinsurance.com.

The functional level of the forest is Windows Server 2012.

You recently provisioned an Azure Active Directory (Azure AD) tenant.

Network Infrastructure

Each office has a local data center that contains all the servers for that office. Each office has a dedicated connection to the Internet.

Each office has several link load balancers that provide access to the servers.

Active Directory Issue

Several users in humongousinsurance.com have UPNs that contain special characters.

You suspect that some of the characters are unsupported in Azure AD.

Licensing Issue

You attempt to assign a license in Azure to several users and receive the following error message: “Licenses not assigned. License agreement failed for one user.” You verify that the Azure subscription has the available licenses.

Requirements

Planned Changes

Humongous Insurance plans to open a new office in Paris. The Paris office will contain 1,000 users who will be hired during the next 12 months. All the resources used by the Paris office users will be hosted in Azure.

Planned Azure AD Infrastructure

The on-premises Active Directory domain will be synchronized to Azure AD.

All client computers in the Paris office will be joined to an Azure AD domain.

Planned Azure Networking Infrastructure

You plan to create the following networking resources in a resource group named All_Resources:

✑ Default Azure system routes that will be the only routes used to route traffic

✑ A virtual network named Paris-VNet that will contain two subnets named Subnet1 and Subnet2

✑ A virtual network named ClientResources-VNet that will contain one subnet named ClientSubnet

✑ A virtual network named AllOffices-VNet that will contain two subnets named Subnet3 and Subnet4

You plan to enable peering between Paris-VNet and AllOffices-VNet. You will enable the Use remote gateways setting for the Paris-VNet peerings.

You plan to create a private DNS zone named humongousinsurance.local and set the registration network to the ClientResources-VNet virtual network.

Planned Azure Computer Infrastructure

Each subnet will contain several virtual machines that will run either Windows Server 2012 R2, Windows Server 2016, or Red Hat Linux.

Department Requirements

Humongous Insurance identifies the following requirements for the company’s departments:

✑ Web administrators will deploy Azure web apps for the marketing department. Each web app will be added to a separate resource group. The initial configuration of the web apps will be identical. The web administrators have permission to deploy web apps to resource groups.

✑ During the testing phase, auditors in the finance department must be able to review all Azure costs from the past week.

Authentication Requirements

Users in the Miami office must use Azure Active Directory Seamless Single Sign-on (Azure AD Seamless SSO) when accessing resources in Azure.

HOTSPOT

You are evaluating the name resolution for the virtual machines after the planned implementation of the Azure networking infrastructure.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.
— —
Statements
The virtual machines on Subnet1 will be able to resolve the hosts
in the humongousinsurance.local zone.
The virtual machines on ClientSubnet will be able to register the hostname records
in the humongousinsurance.local zone.
The virtual machines on Subnet4 will be able to register the hostname records
in the humongousinsurance.local zone.
— —

A
74
Q

Overview

Existing Environment

Humongous Insurance is an insurance company that has three offices in Miami, Tokoyo, and Bankok.

Each has 5000 users.

Active Directory Environment

Humongous Insurance has a single-domain Active Directory forest named humongousinsurance.com.

The functional level of the forest is Windows Server 2012.

You recently provisioned an Azure Active Directory (Azure AD) tenant.

Network Infrastructure

Each office has a local data center that contains all the servers for that office. Each office has a dedicated connection to the Internet.

Each office has several link load balancers that provide access to the servers.

Active Directory Issue

Several users in humongousinsurance.com have UPNs that contain special characters.

You suspect that some of the characters are unsupported in Azure AD.

Licensing Issue

You attempt to assign a license in Azure to several users and receive the following error message: “Licenses not assigned. License agreement failed for one user.” You verify that the Azure subscription has the available licenses.

Requirements

Planned Changes

Humongous Insurance plans to open a new office in Paris. The Paris office will contain 1,000 users who will be hired during the next 12 months. All the resources used by the Paris office users will be hosted in Azure.

Planned Azure AD Infrastructure

The on-premises Active Directory domain will be synchronized to Azure AD.

All client computers in the Paris office will be joined to an Azure AD domain.

Planned Azure Networking Infrastructure

You plan to create the following networking resources in a resource group named All_Resources:

✑ Default Azure system routes that will be the only routes used to route traffic

✑ A virtual network named Paris-VNet that will contain two subnets named Subnet1 and Subnet2

✑ A virtual network named ClientResources-VNet that will contain one subnet named ClientSubnet

✑ A virtual network named AllOffices-VNet that will contain two subnets named Subnet3 and Subnet4

You plan to enable peering between Paris-VNet and AllOffices-VNet. You will enable the Use remote gateways setting for the Paris-VNet peerings.

You plan to create a private DNS zone named humongousinsurance.local and set the registration network to the ClientResources-VNet virtual network.

Planned Azure Computer Infrastructure

Each subnet will contain several virtual machines that will run either Windows Server 2012 R2, Windows Server 2016, or Red Hat Linux.

Department Requirements

Humongous Insurance identifies the following requirements for the company’s departments:

✑ Web administrators will deploy Azure web apps for the marketing department. Each web app will be added to a separate resource group. The initial configuration of the web apps will be identical. The web administrators have permission to deploy web apps to resource groups.

✑ During the testing phase, auditors in the finance department must be able to review all Azure costs from the past week.

Authentication Requirements

Users in the Miami office must use Azure Active Directory Seamless Single Sign-on (Azure AD Seamless SSO) when accessing resources in Azure.

HOTSPOT

You are evaluating the connectivity between the virtual machines after the planned implementation of the Azure networking infrastructure.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.
— —
Statements
The virtual machines on Subnet1 will be able to connect to
the virtual machines on Subnet3.
The virtual machines on ClientSubnet will be able to connect
to the Internet.
The virtual machines on Subnet3 and Subnet4 will be able
to connect to the Internet.
— —

A