Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

AZ-104 Exam Dumps - Microsoft Azure Administrator

Go to page:
Question # 33

You need to implement a backup solution for App1 after the application is moved.

What should you create first?

A.

a recovery plan

B.

an Azure Backup Server

C.

a backup policy

D.

a Recovery Services vault

Full Access
Question # 34

You need to recommend an identify solution that meets the technical requirements.

What should you recommend?

A.

federated single-on (SSO) and Active Directory Federation Services (AD FS)

B.

password hash synchronization and single sign-on (SSO)

C.

cloud-only user accounts

D.

Pass-through Authentication and single sign-on (SSO)

Full Access
Question # 35

You have an Azure Storage accounts as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

Full Access
Question # 36

You have an Azure subscription that contains the vaults shown in the following table.

You deploy the virtual machines shown in the following table.

Each of the following statements, select Yes if the statement is true. Otherwise, select No

NOTE: Each cored selection it worth one point.

Full Access
Question # 37

You have an Azure subscription that contains an Azure Stream Analytics job named Job1.

You need to monitor input events for Job1 to identify the number of events that were NOT processed.

Which metric should you use?

A.

Output Events

B.

Backlogged Input Events

C.

Out-of-Order Events

D.

Late Input Events

Full Access
Question # 38

You need to identify the storage requirements for Contoso.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 39

You have an Azure subscription that contains the resources in the following table.

VM1 and VM2 are deployed from the same template and host line-of-business applications accessed by using Remote Desktop. You configure the network security group (NSG) shown in the exhibit. (Click the Exhibit button.)

You need to prevent users of VM1 and VM2 from accessing websites on the Internet.

What should you do?

A.

Associate the NSG to Subnet1.

B.

Disassociate the NSG from a network interface.

C.

Change the DenyWebSites outbound security rule.

D.

Change the Port_80 inbound security rule

Full Access
Question # 40

You need to configure the Device settings to meet the technical requirements and the user requirements.

Which two settings should you modify? To answer, select the appropriate settings in the answer area.

Full Access
Go to page: