ExamGecko
Home / Microsoft / AZ-801 / List of questions
Ask Question

Microsoft AZ-801 Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

You have an Azure subscription. The subscription contains a virtual machine named VM1 that runs Windows Server and uses Azure Disk Encryption.

You need to identify which Azure key vault stores the encryption keys for VM1. The solution must minimize administrative effort.

Which PowerShell cmdlet should you run?

Get-AzKeyVaultKey

Get-AzKeyVaultKey

Get-AiKeyVault

Get-AiKeyVault

Get-AzVMDiskEncryptionStatus

Get-AzVMDiskEncryptionStatus

Get-AzDiskEncryptionSet

Get-AzDiskEncryptionSet

Suggested answer: C
asked 16/10/2024
Allen J Tyson
36 questions

Question 32

Report Export Collapse

You deploy Azure Migrate to an on-premises network.

You have an on-premises physical server named Server! that runs Windows Server and has the following configurations:

* Operating system disk; 600 GB

* Data disk: 3 TB

* NIC Teaming: Enabled

* Mobility service: Installed

* Windows Defender Firewall: Enabled

* Microsoft Defender Antivirus: Enabled

You need to ensure that you can use Azure Migrate to migrate Server1.

Solution: You disable Windows Defender Firewall on Server 1.

Does this meet the goal?

Yes

Yes

No

No

Suggested answer: B
asked 16/10/2024
Ricardo Andres
35 questions

Question 33

Report Export Collapse

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a server named Server1 that runs Windows Server.

You need to ensure that only specific applications can modify the data in protected folders on Server1. Solution: From Virus & threat protection, you configure Controlled folder access.

Does this meet the goal?

Yes
Yes
No
No
Suggested answer: A
Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/customize-controlledfolders?view=o365-worldwide

asked 02/10/2024
Victor Ogbonna
39 questions

Question 34

Report Export Collapse

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a server named Server1 that runs Windows Server.

You need to ensure that only specific applications can modify the data in protected folders on Server1. Solution: From Virus & threat protection, you configure Tamper Protection.

Does this meet the goal?

Yes
Yes
No
No
Suggested answer: B
Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/customize-controlledfolders?view=o365-worldwide

asked 02/10/2024
Elizaveta Kutuzova
58 questions

Question 35

Report Export Collapse

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a server named Server1 that runs Windows Server.

You need to ensure that only specific applications can modify the data in protected folders on Server1. Solution: From App & browser control, you configure the Exploit protection settings.

Does this meet the goal?

Yes
Yes
No
No
Suggested answer: B
Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/customize-controlledfolders?view=o365-worldwide

asked 02/10/2024
Sari Bukhari
37 questions

Question 36

Report Export Collapse

You have an Azure virtual machine named VM1 that runs Windows Server.

You plan to deploy a new line-of-business (LOB) application to VM1.

You need to ensure that the application can create child processes.

What should you configure on VM1?

Microsoft Defender Credential Guard
Microsoft Defender Credential Guard
Microsoft Defender Application Control
Microsoft Defender Application Control
Microsoft Defender SmartScreen
Microsoft Defender SmartScreen
Exploit protection
Exploit protection
Suggested answer: A
Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/customize-exploitprotection?view=o365-worldwide

asked 02/10/2024
Mike van den Berg
41 questions

Question 37

Report Export Collapse

You have 100 Azure virtual machines that run Windows Server. The virtual machines are onboarded to Microsoft Defender for Cloud. You need to shut down a virtual machine automatically if Microsoft Defender for Cloud generates the "Antimalware disabled in the virtual machine" alert for the virtual machine. What should you use in Microsoft Defender for Cloud?

a logic app
a logic app
a workbook
a workbook
a security policy
a security policy
adaptive network hardening
adaptive network hardening
Suggested answer: A
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/managing-and-responding-alerts

asked 02/10/2024
Rakesh Sharma
44 questions

Question 38

Report Export Collapse

You have a Microsoft Sentinel deployment and 100 Azure Arc-enabled on-premises servers. All the Azure Arc-enabled resources are in the same resource group. You need to onboard the servers to Microsoft Sentinel. The solution must minimize administrative effort. What should you use to onboard the servers to Microsoft Sentinel?

Azure Automation
Azure Automation
Azure Policy
Azure Policy
Azure virtual machine extensions
Azure virtual machine extensions
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Suggested answer: B
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/manage/hybrid/server/bestpractices/arc-policies-mma

asked 02/10/2024
jonathan siu
46 questions

Question 39

Report Export Collapse

You have an on-premises Active Directory Domain Services (AD DS) domain that syncs with an Azure Active Directory (Azure AD) tenant by using password hash synchronization. You have a Microsoft 365 subscription.

All devices are hybrid Azure AD-joined.

Users report that they must enter their password manually when accessing Microsoft 365 applications. You need to reduce the number of times the users are prompted for their password when they access Microsoft 365 and Azure services. What should you do?

In Azure AD. configure a Conditional Access policy for the Microsoft Office 365 applications.
In Azure AD. configure a Conditional Access policy for the Microsoft Office 365 applications.
In the DNS zone of the AD DS domain, create an autodiscover record.
In the DNS zone of the AD DS domain, create an autodiscover record.
From Azure AD Connect, enable single sign-on (SSO).
From Azure AD Connect, enable single sign-on (SSO).
From Azure AD Connect, configure pass-through authentication.
From Azure AD Connect, configure pass-through authentication.
Suggested answer: C
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-sso-quick-start

asked 02/10/2024
Rodolfo Ponce
43 questions

Question 40

Report Export Collapse

You have an Azure subscription that has Microsoft Defender for Cloud enabled.

You have 50 Azure virtual machines that run Windows Server.

You need to ensure that any security exploits detected on the virtual machines are forwarded to Defender for Cloud. Which extension should you enable on the virtual machines?

Vulnerability assessment for machines
Vulnerability assessment for machines
Microsoft Dependency agent
Microsoft Dependency agent
Log Analytics agent for Azure VMs
Log Analytics agent for Azure VMs
Guest Configuration agent
Guest Configuration agent
Suggested answer: A
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/deploy-vulnerability-assessment-vm

asked 02/10/2024
Aviv Beck
46 questions
Total 157 questions
Go to page: of 16
Search

Related questions