List of questions
Related questions
Question 117 - AZ-720 discussion
HOTSPOT
A company deploys just-in-time (JIT) virtual machine (VM) access.
A user reports that they are unable to request access to a JIT VM.
You need to determine the permission operations that are required for the user to request JIT access.
The solution should use the principle of least privilege.
Which permission operations are required? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
0 comments
Sorted by
Leave a comment first