Topic 3: Misc. Questions
You have a server that runs Windows Server.
You plan to back up the server to an Azure Recovery Services vault once per week starting
on the next Saturday.
You need to schedule the weekly backup and perform the initial backup as soon as
possible.
In which order should you perform the actions? To answer, move all actions from the list of
actions to the answer are and arrange them in the correct order.
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an on-premises server named Server1 that runs Windows Server.
You have a Microsoft Sentinel instance.
You add the Windows Firewall data connector in Microsoft Sentinel.
You need to ensure that Microsoft Sentinel can collect Windows Firewall logs from Server1.
Solution: You onboard Server1 to Microsoft Defender for Endpoint.
Does this meet the goal?
A. Yes
B. No
You have an Azure subscription. The subscription contains a virtual machine named VM1
that runs Windows Server and uses Azure Disk Encryption.
You need to identify which Azure key vault stores the encryption keys for VM1. The
solution must minimize administrative effort.
Which PowerShell cmdlet should you run?
A. Get-AzKeyVaultKey
B. Get-AiKeyVault
C. Get-AzVMDiskEncryptionStatus
D. Get-AzDiskEncryptionSet
You have an on-premises server that runs Windows Server and contains a folder named
Folder1. Folder1 contains 50 GB of files.
You have an Azure subscription that contains an Azure Files share named share1.
You need to migrate the data in Folder1 to share1.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You have an Azure virtual machine named VM1 that runs Windows Server.
You plan to deploy a new line-of-business (LOB) application to VM1.
You need to ensure that the application can create child processes.
What should you configure on VM1?
A. Microsoft Defender Credential Guard
B. Microsoft Defender Application Control
C. Microsoft Defender SmartScreen
D. Exploit protection
You have a Hyper-V failover cluster named Cluster1 at a main datacenter. Cluster1
contains two nodes that have the Hyper-V server role installed. Cluster1 hosts 10 highly
available virtual machines.
You have a cluster named Cluster2 in a disaster recovery site. Cluster2 contains two nodes
that have the Hyper-V server role installed.
You plan to use Hyper-V Replica to replicate the virtual machines from Cluster1 to
Cluster2.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You have an Azure virtual machine named VM1 that runs Windows Server.
When you attempt to install the Azure Performance Diagnostics extension on VM I, the
installation fails.
You need to identify the cause of the installation failure.
What are two possible ways to achieve the goal? Each correct answer presents a complete
solution.
NOTE: Each correct selection is worth one point.
A. Sign in to VM1 and verify the WaAppAgentlog file.
B. From the Azure portal, view the alerts for VM1.
C. From the Azure portal, view the activity log for VM1.
D. Sign into VM1 and verify the MonitoringAgentlog file.
You have three Azure virtual machines named VM1, VM2, and VM3 that host a multitier
application.
You plan to implement Azure Site Recovery.
You need to ensure that VM1, VM2, and VM3 fail over as a group.
What should you configure?
A. an availability zone
B. a recovery plan
C. an availability set
You have 10 servers that run Windows Server in a workgroup.
You need to configure the servers to encrypt all the network traffic between the servers.
The solution must be as secure as possible.
Which authentication method should you configure in a connection security rule?
A. NTLMv2
B. pre-shared key
C. KerberosV5
D. computer certificate
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an on-premises server named Server1 that runs Windows Server.
You have a Microsoft Sentinel instance.
You add the Windows Firewall data connector in Microsoft Sentinel.
You need to ensure that Microsoft Sentinel can collect Windows Firewall logs from Server1.
Solution; You enable event subscription on Server1.
Does this meet the goal?
A. Yes
B. No
You have two servers named Server1 and Server2 that run Windows Server. Both servers
have the Hyper-V server role installed.
Server1 hosts three virtual machines named VM1, VM2, and VM3. The virtual machines
replicate to Server2.
Server1 experiences a hardware failure.
You need to bring VM1, VM2, and VM3 back online as soon as possible.
From the Hyper-V Manager console on Server2, what should you run for each virtual
machine?
A. Start
B. Move
C. Unplanned Failover
D. Planned Failover
Your network contains an Active Directory Domain Services (AD DS) forest. The forest
functional level is Windows Server 2012 R2. The forest contains the domains shown in the
following table.
You create a user named Admin1.
You need to ensure that Admin1 can add a new domain controller that runs Windows
Server 2022 to the east.contoso.com domain. The solution must follow the principle of least
privilege.
To which groups should you add Admin1?
A. EAST\Domain Admins only
B. CONTOSO\Enterprise Admins only
C. CONTOSO/Schema Admins and EAST\Domain Admins
D. CONTOSO\Enterprise Admins and CONTOSO/Schema Admins
Page 2 out of 13 Pages |
Previous |