لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
You have a Azure subscription that contains an Azure Container Registry named Registry1. The subscription uses the Standard use tier of Azure Security Center.You upload several container images to Register1.You discover that vulnerability security scans were not performed You need to ensured that the images are scanned for vulnerabilities when they are uploaded to Registry1.
What should you do?
A. rom the Azure portal modify the Pricing tier settings
B. rom Azure CLI, lock the container images
C. pload the container images by using AzCopy
D. ush the container images to Registry1 by using Docker
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Your network contains an on-premises Active Directory domain named corp.contoso.com. You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. You sync all on-premises identities to Azure AD. You need to prevent users who have a givenName attribute that starts with TEST from being synced to Azure AD. The solution must minimize administrative effort.
What should you use?
A. ynchronization Rules Edito
B. eb Service Configuration Tool
C. he Azure AD Connect wizard
D. ctive Directory Users and Computers
عرض الإجابة
اجابة صحيحة: A
السؤال #3
You have an Azure subscription that contains several Azure SQL databases and an Azure Sentinel workspace. You need to create a saved query in the workspace to find events reported by Advanced Threat Protection for Azure SQL Database.
What should you do?
A. rom Azure CLI run the Get-AzOperationalInsightsworkspace cmdlet
B. rom the Azure SQL Database query editor, create a Transact-SQL query
C. rom the Azure Sentinel workspace, create a Kusto Query Language query
D. rom Microsoft SQL Server Management Studio (SSMS), create a Transact-SQL query
عرض الإجابة
اجابة صحيحة: C
السؤال #4
Your company has an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. The company develops an application named App1. App1 is registered in Azure AD. You need to ensure that App1 can access secrets in Azure Key Vault on behalf of the application users.
What should you configure?
A. n application permission without admin consent
B. delegated permission without admin consent
C. delegated permission that requires admin consent
D. n application permission that requires admin consent
عرض الإجابة
اجابة صحيحة: B
السؤال #5
You have an Azure SQL Database server named SQL1.You plan to turn on Advanced Threat Protection for SQL1 to detect all threat detection types.
Which action will Advanced Threat Protection detect as a threat?
A. user updates more than 50 percent of the records in a table
B. user attempts to sign as select * from table1
C. user is added to the db_owner database role
D. user deletes more than 100 records from the same table
عرض الإجابة
اجابة صحيحة: B
السؤال #6
You have an Azure subscription that contains a resource group named RG1 and a security group serverless RG1 contains 10 virtual machine, a virtual network VNET1, and a network security group (NSG) named NSG1. ServerAdmins can access the virtual machines by using RDP.
You need to ensure that NSG1 only RDP connections to the virtual for a maximum of 60 minutes when a member of ServerAdmins requests access.
What should you configure?
A. n Azure Active Directory (Azure AD) Privileged identity Management (PIM) role assignment
B. just in time (JIT) VM access policy in Azure Security Center
C. n azure policy assigned to RG1
D. n Azure Bastion host on VNET1
عرض الإجابة
اجابة صحيحة: A
السؤال #7
You have an Azure subscription named Subcription1 that contains an Azure Active Directory (Azure AD) tenant named contosos.com and a resource group named RG1.You create a custom role named Role1 for contoso.com.You need to identify where you can use Role1 for permission delegation.
What should you identify?
A. ontoso
B. ontoso
C. ontoso
D. ontoso
عرض الإجابة
اجابة صحيحة: D
السؤال #8
You need to meet the technical requirements for VNetwork1. What should you do first?
A. reate a new subnet on VNetwork1
B. emove the NSGs from Subnet11 and Subnet13
C. ssociate an NSG to Subnet12
D. onfigure DDoS protection for VNetwork1
عرض الإجابة
اجابة صحيحة: A
السؤال #9
You need to ensure that User2 can implement PIM. What should you do first?
A. ssign User2 the Global administrator role
B. onfigure authentication methods for contoso
C. onfigure the identity secure score for contoso
D. nable multi-factor authentication (MFA) for User2
عرض الإجابة
اجابة صحيحة: A
السؤال #10
You have an Azure subscription that contains a user named User1 and an Azure Container Registry named ConReg1. You enable content trust for ContReg1. You need to ensure that User1 can create trusted images in ContReg1. The solution must use the principle of least privilege.
Which two roles should you assign to User1? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A. crQuarantineReader
B. ontributor
C. crPush
D. crImageSigner
E. crQuarantineWriter
عرض الإجابة
اجابة صحيحة: CD

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: