After you answer a question in this section you will

This preview shows page 39 - 43 out of 339 pages.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the reviewscreen.You have a hybrid configuration of Azure Active Directory (Azure AD).
You have an Azure HDInsight cluster on a virtual network.You plan to allow users to authenticate to the cluster by using their on-premises Active Directory credentials.You need to configure the environment to support the planned authentication.Solution: You deploy an Azure AD Application Proxy.Does this meet the goal?BSection: (none)
ExplanationExplanation/Reference:Explanation:Instead, you connect HDInsight to your on-premises network by using Azure Virtual Networks and a VPN gateway.Note: To allow HDInsight and resources in the joined network to communicate by name, you must perform the following actions:Create Azure Virtual Network.Create a custom DNS server in the Azure Virtual Network.Configure the virtual network to use the custom DNS server instead of the default Azure Recursive Resolver.Configure forwarding between the custom DNS server and your on-premises DNS server.Reference:QUESTION 19Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solutionthat might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correctsolution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the reviewscreen.You have an Azure Subscription named Sub1.You have an Azure Storage account named Sa1 in a resource group named RG1.
Users and applications access the blob service and the file service in Sa1 by using several shared access signatures (SASs) and stored access policies.You discover that unauthorized users accessed both the file service and the blob service.You need to revoke all access to Sa1.Solution: You regenerate the access keys.Does this meet the goal?BSection: (none)
ExplanationExplanation/Reference:Explanation:Instead you should create a new stored access policy.To revoke a stored access policy, you can either delete it, or rename it by changing the signed identifier. Changing the signed identifier breaks theassociations between any existing signatures and the stored access policy. Deleting or renaming the stored access policy immediately affects all of theshared access signatures associated with it.Reference:QUESTION 20HOTSPOTYou have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table.
Azure AD Privileged Identity Management (PIM) is enabled for the tenant.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 339 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags
azure active directory

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture