May/2022 Latest Braindump2go AZ-104 Exam Dumps with PDF and VCE Free Updated Today! Following are some new AZ-104 Real Exam Questions!
QUESTION 543 You are configuring Azure Active Directory (Azure AD) authentication for an Azure Storage account named storage1. You need to ensure that the members of a group named Group1 can upload files by using the Azure portal. The solution must use the principle of least privilege. Which two roles should you configure for storage!? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point
A. Reader B. Storage Blob Data Contributor C. Storage Account Contributor D. Storage Blob Data Reader E. Contributor
November/2021 Latest Braindump2go AZ-104 Exam Dumps with PDF and VCE Free Updated Today! Following are some new AZ-104 Real Exam Questions!
QUESTION 513 You create the following resources in an subscription: – An Azure Container Registry instance named Registry1 – An Azure Kubernetes Service (AKS) cluster named Cluster1 You create a container image named App1 on your administrative workstation. You need to deploy App1 to cluster1. What should you do first?
A. Run the aa aks create command. B. Create a host pool on Cluster1 C. Upload App1 to Registry1. D. Run the kubect1 apply command.
December/2020 Latest Braindump2go AZ-104 Exam Dumps with PDF and VCE Free Updated Today! Following are some new AZ-104 Real Exam Questions!
QUESTION 179 You have a resource group named RG1. RG1 contains an Azure Storage account named storageaccount1 and a virtual machine named VM1 that runs Windows Server 2016. Storageaccount1 contains the disk files for VM1. You apply a ReadOnly lock to RG1. What can you do from the Azure portal?
A. Generate an automation script for RG1. B. View the keys of storageaccount1. C. Upload a blob to storageaccount1. D. Start VM1.
Answer: A Explanation: https://docs.microsoft.com/en-us/azure/azure-resource-manager/management/lock-resources Applying ReadOnly can lead to unexpected results because some operations that don’t seem to modify the resource actually require actions that are blocked by the lock. The ReadOnly lock can be applied to the resource or to the resource group containing the resource. Some common examples of the operations that are blocked by a ReadOnly lock are: A ReadOnly lock on a storage account prevents all users from listing the keys. The list keys operation is handled through a POST request because the returned keys are available for write operations.
November/2020 Latest Braindump2go AZ-104 Exam Dumps with PDF and VCE Free Updated Today! Following are some new AZ-104 Real Exam Questions!
QUESTION 311 You have an Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com. The User administrator role is assigned to a user named Admin1. An external partner has a Microsoft account that uses the [email protected] sign in. Admin1 attempts to invite the external partner to sign in to the Azure AD tenant and receives the following error message: “Unable to invite user [email protected] – Generic authorization exception.” You need to ensure that Admin1 can invite the external partner to sign in to the Azure AD tenant. What should you do?
A. From the Users blade, modify the External collaboration settings. B. From the Custom domain names blade, add a custom domain. C. From the Organizational relationships blade, add an identity provider. D. From the Roles and administrators blade, assign the Security administrator role to Admin1.
2020/November Latest Braindump2go AZ-104 Exam Dumps with PDF and VCE Free Updated Today! Following are some new AZ-104 Real ExamQuestions!
QUESTION 265 Case Study 2 – Contoso, Ltd Overview Contoso, Ltd. is a manufacturing company that has offices worldwide. Contoso works with partner organizations to bring products to market.
Contoso products are manufactured by using blueprint files that the company authors and maintains. Existing Environment Currently, Contoso uses multiple types of servers for business operations, including the following: – File servers – Domain controllers – Microsoft SQL Server servers Your network contains an Active Directory forest named contoso.com. All servers and client computers are joined to Active Directory. You have a public-facing application named App1. App1 is comprised of the following three tiers: – A SQL database – A web front end – A processing middle tier Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS only. Requirements Planned Changes Contoso plans to implement the following changes to the infrastructure: – Move all the tiers of App1 to Azure. – Move the existing product blueprint files to Azure Blob storage. – Create a hybrid directory to support an upcoming Microsoft Office 365 migration project. Technical Requirements Contoso must meet the following technical requirements: – Move all the virtual machines for App1 to Azure. – Minimize the number of open ports between the App1 tiers. – Ensure that all the virtual machines for App1 are protected by backups. – Copy the blueprint files to Azure over the Internet. – Ensure that the blueprint files are stored in the archive storage tier. – Ensure that partner access to the blueprint files is secured and temporary. – Prevent user passwords or hashes of passwords from being stored in Azure. – Use unmanaged standard storage for the hard disks of the virtualmachines. – Ensure that when users join devices to Azure Active Directory (Azure AD), the users use a mobile phone to verify their identity. – Minimize administrative effort whenever possible. User Requirements Contoso identifies the following requirements for users: – Ensure that only users who are part of a group named Pilot can join devices to Azure AD. – Designate a new user named Admin1 as the service administrator of the Azure subscription. – Ensure that a new user named User3 can create network objects for the Azure subscription. Hotspot Question You need to recommend a solution for App1. The solution must meet the technical requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Explanation: This reference architecture shows how to deploy VMs and a virtual network configured for an N-tier application, using SQL Server on Windows for the data tier.
Scenario: You have a public-facing application named App1. App1 is comprised of the following three tiers: A SQL database A web front end A processing middle tier Each tier is comprised of five virtual machines. Users access the web front end by using HTTPS only. Technical requirements include: Move all the virtual machines for App1 to Azure. Minimize the number of open ports between the App1 tiers. Reference: https://docs.microsoft.com/en-us/azure/architecture/reference-architectures/n-tier/n-tier-sql-server
August/2020 Latest Braindump2go AZ-104 Exam Dumps with PDF and VCE Free Updated Today! Following are some new AZ-104 Real Exam Questions!
QUESTION 232 You have an Azure subscription that contains a resource group named RG26. RG26 is set to the West Europe location and is used to create temporary resources for a project. RG26 contains the resources shown in the following table.
SQLDB01 is backed up to RGV1. When the project is complete, you attempt to delete RG26 from the Azure portal. The deletion fails. You need to delete RG26. What should you do first?
A. Delete VM1 B. Stop VM1 C. Stop the backup of SQLDB01 D. Delete sa001