ExamGecko
Home Home / Microsoft / AZ-801

Microsoft AZ-801 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











You have an Azure subscription. The subscription contains a virtual machine named VM1 that runs Windows Server and uses Azure Disk Encryption.

You need to identify which Azure key vault stores the encryption keys for VM1. The solution must minimize administrative effort.

Which PowerShell cmdlet should you run?

A.

Get-AzKeyVaultKey

A.

Get-AzKeyVaultKey

Answers
B.

Get-AiKeyVault

B.

Get-AiKeyVault

Answers
C.

Get-AzVMDiskEncryptionStatus

C.

Get-AzVMDiskEncryptionStatus

Answers
D.

Get-AzDiskEncryptionSet

D.

Get-AzDiskEncryptionSet

Answers
Suggested answer: C

You deploy Azure Migrate to an on-premises network.

You have an on-premises physical server named Server! that runs Windows Server and has the following configurations:

* Operating system disk; 600 GB

* Data disk: 3 TB

* NIC Teaming: Enabled

* Mobility service: Installed

* Windows Defender Firewall: Enabled

* Microsoft Defender Antivirus: Enabled

You need to ensure that you can use Azure Migrate to migrate Server1.

Solution: You disable Windows Defender Firewall on Server 1.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a server named Server1 that runs Windows Server.

You need to ensure that only specific applications can modify the data in protected folders on Server1. Solution: From Virus & threat protection, you configure Controlled folder access.

Does this meet the goal?

A.
Yes
A.
Yes
Answers
B.
No
B.
No
Answers
Suggested answer: A

Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/customize-controlledfolders?view=o365-worldwide

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a server named Server1 that runs Windows Server.

You need to ensure that only specific applications can modify the data in protected folders on Server1. Solution: From Virus & threat protection, you configure Tamper Protection.

Does this meet the goal?

A.
Yes
A.
Yes
Answers
B.
No
B.
No
Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/customize-controlledfolders?view=o365-worldwide

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a server named Server1 that runs Windows Server.

You need to ensure that only specific applications can modify the data in protected folders on Server1. Solution: From App & browser control, you configure the Exploit protection settings.

Does this meet the goal?

A.
Yes
A.
Yes
Answers
B.
No
B.
No
Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/customize-controlledfolders?view=o365-worldwide

You have an Azure virtual machine named VM1 that runs Windows Server.

You plan to deploy a new line-of-business (LOB) application to VM1.

You need to ensure that the application can create child processes.

What should you configure on VM1?

A.
Microsoft Defender Credential Guard
A.
Microsoft Defender Credential Guard
Answers
B.
Microsoft Defender Application Control
B.
Microsoft Defender Application Control
Answers
C.
Microsoft Defender SmartScreen
C.
Microsoft Defender SmartScreen
Answers
D.
Exploit protection
D.
Exploit protection
Answers
Suggested answer: A

Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/customize-exploitprotection?view=o365-worldwide

You have 100 Azure virtual machines that run Windows Server. The virtual machines are onboarded to Microsoft Defender for Cloud. You need to shut down a virtual machine automatically if Microsoft Defender for Cloud generates the "Antimalware disabled in the virtual machine" alert for the virtual machine. What should you use in Microsoft Defender for Cloud?

A.
a logic app
A.
a logic app
Answers
B.
a workbook
B.
a workbook
Answers
C.
a security policy
C.
a security policy
Answers
D.
adaptive network hardening
D.
adaptive network hardening
Answers
Suggested answer: A

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/managing-and-responding-alerts

You have a Microsoft Sentinel deployment and 100 Azure Arc-enabled on-premises servers. All the Azure Arc-enabled resources are in the same resource group. You need to onboard the servers to Microsoft Sentinel. The solution must minimize administrative effort. What should you use to onboard the servers to Microsoft Sentinel?

A.
Azure Automation
A.
Azure Automation
Answers
B.
Azure Policy
B.
Azure Policy
Answers
C.
Azure virtual machine extensions
C.
Azure virtual machine extensions
Answers
D.
Microsoft Defender for Cloud
D.
Microsoft Defender for Cloud
Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/manage/hybrid/server/bestpractices/arc-policies-mma

You have an on-premises Active Directory Domain Services (AD DS) domain that syncs with an Azure Active Directory (Azure AD) tenant by using password hash synchronization. You have a Microsoft 365 subscription.

All devices are hybrid Azure AD-joined.

Users report that they must enter their password manually when accessing Microsoft 365 applications. You need to reduce the number of times the users are prompted for their password when they access Microsoft 365 and Azure services. What should you do?

A.
In Azure AD. configure a Conditional Access policy for the Microsoft Office 365 applications.
A.
In Azure AD. configure a Conditional Access policy for the Microsoft Office 365 applications.
Answers
B.
In the DNS zone of the AD DS domain, create an autodiscover record.
B.
In the DNS zone of the AD DS domain, create an autodiscover record.
Answers
C.
From Azure AD Connect, enable single sign-on (SSO).
C.
From Azure AD Connect, enable single sign-on (SSO).
Answers
D.
From Azure AD Connect, configure pass-through authentication.
D.
From Azure AD Connect, configure pass-through authentication.
Answers
Suggested answer: C

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-sso-quick-start

You have an Azure subscription that has Microsoft Defender for Cloud enabled.

You have 50 Azure virtual machines that run Windows Server.

You need to ensure that any security exploits detected on the virtual machines are forwarded to Defender for Cloud. Which extension should you enable on the virtual machines?

A.
Vulnerability assessment for machines
A.
Vulnerability assessment for machines
Answers
B.
Microsoft Dependency agent
B.
Microsoft Dependency agent
Answers
C.
Log Analytics agent for Azure VMs
C.
Log Analytics agent for Azure VMs
Answers
D.
Guest Configuration agent
D.
Guest Configuration agent
Answers
Suggested answer: A

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/deploy-vulnerability-assessment-vm

Total 157 questions
Go to page: of 16