web analytics

You need to ensure the cost for Application Insights does not exceed a preset budget. What should you do?

You develop an Azure web app. You monitor performance of the web app by using Application Insights. You need to ensure the cost for Application Insights does not exceed a

What should you do? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

You need to troubleshoot the order workflow. What should you do? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. Review the

You need to ensure receipt processing occurs correctly. What should you do?

You need to ensure receipt processing occurs correctly. What should you do? A. Use blob metadata to prevent concurrency problems. B. Use blob SnapshotTime to prevent concurrency problems. C. Use

You need to resolve the capacity issue. What should you do?

You need to resolve the capacity issue. What should you do? A. Move the Azure Function to a dedicated App Service Plan. B. Convery the trigger on the Azure Function

You need to resolve the log capacity issue. What should you do?

You need to resolve the log capacity issue. What should you do? A. Set a LogCategoryFilter during startup. B. Create an Application Insights Telemetry Filter. C. Change the minimum log

You need to ensure that the solution can meet the scaling requirements for Policy Service. Which Azure Application Insights data model should you use?

You need to ensure that the solution can meet the scaling requirements for Policy Service. Which Azure Application Insights data model should you use? A. an Application Insights metric B.

You need to meet the scaling requirements for Policy Service. What should you store in Azure Redis Cache?

You need to meet the scaling requirements for Policy Service. What should you store in Azure Redis Cache? A. TempData B. HttpContext.Items C. ViewState D. Session state Answer: D

Which two policies can you use? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

You provide an Azure API Management managed web service to clients. The back-end web service implements HTTP Strict Transport Security (HSTS). Every request to the backend service must include a

Which two commands can you use? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

You have an Azure App Services Web App Azure SQL Database instance Azure Storage Account, and an Azure Redis Cache instance in a resource group. A developer must be able

What should you do? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

You are developing an internal website for employees to view sensitive data. The website uses Azure Active Directory (AAD) for authentication. You need to implement multifactor authentication for the website.

You need to ensure that authentication events are triggered and processed according to the policy. Solution: Create a new Azure Event Grid subscription for all authentication that delivers messages to an Azure Event Hub. Use the subscription to process signout events. Does the solution meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Solution: Configure the web application to connect to the database using the WebAppIdentity security prinicipal. Using the Azure Portal, add Data Masking to the SecurityPin column and exclude the WebAppIdentity service principal. Does the solution meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

You need to ensure the security policies are met. What code do you add at line CS07?

You need to ensure the security policies are met. What code do you add at line CS07? A. -PermissionsToCertificates create, encrypt, decrypt B. -PermissionsToKeys wrapkey, unwrapkey, get C. -PermissionsToCertificates wrapkey,

Solution: Enable Always Encrypted for the SecurityPin column using a certificate contained in Azure Key Vault and grant the WebAppIdentity service principal access to the certificate. Does the solution meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Solution: Using the Azure Portal, add Data Masking to the SecurityPin column, and exclude the dbo user. Add a SQL security policy with a filter predicate based on the user identity. Does the solution meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Solution: Enable Always Encrypted for the SecurityPin column using a certificate based on a trusted certificate authority. Update the Getting Started document with instructions to ensure that the certificate is installed on user machines. Does the solution meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

You need to meet the LabelMaker application security requirement. What should you do?

You need to meet the LabelMaker application security requirement. What should you do? A. Create a conditional access policy and assign it to the Azure Kubernetes Service cluster. B. Place

You need to access user claims in the e-commerce web app. What should you do first?

You need to access user claims in the e-commerce web app. What should you do first? A. Using the Azure CLI, enable Cross-origin resource sharing (CORS) from the e-commerce checkout

Which two steps should you take? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

You need to meet the security requirements for the E-Commerce Web App. Which two steps should you take? Each correct answer presents part of the solution. NOTE: Each correct selection

Solution: Provision an Azure Event Grid. Configure event filtering to evaluate the device identifier. Does the solution meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Solution: Provision an Azure Event Hub. Configure the machine identifier as the partition key and enable capture. Does the solution meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

You need to store the information. Proposed Solution: Deploy and configure Azure Cache for Redis. Update the web applications. Does the solution meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the

You need to store the information. Proposed Solution: Deploy and configure an Azure Database for PostgreSQL. Update the web applications. Does the solution meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the

You need to copy specific blobs from Container1 to Container2 in real time when specific requirements are met, excluding backup blob copies. What should you do?

You develop an app that allows users to upload photos and videos to Azure storage. The app uses a storage REST API call to upload the media to a blob

Which three items must you identify when configuring dynamic data masking? Each correct answer presents a part of the solution. NOTE: Each correct selection is worth one point.

You develop a solution that uses an Azure SQL Database to store user information for a mobile app. The app stores sensitive information about users. You need to hide sensitive

Which three data values should you capture? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

You must implement Application Insights instrumentation capabilities utilizing the Azure Mobile Apps SDK to provide meaningful analysis of user interactions with a molbile app. You need to capture the data

You need to create a query that returns all customers with the last name Smith. Which code segment should you use?

You use Azure Table storage to store customer information for an application. The data contains customer details and is partitioned by last name. You need to create a query that

You need to construct the link to the summary report for the email that is sent to users. What should you do?

You need to construct the link to the summary report for the email that is sent to users. What should you do? A. Create a SharedAccessBlobPolicy and add it to

You must ensure that the website remains available and responsive while minimizing cost. You need to deploy the website. What should you do?

You develop a website. You plan to host the website in Azure. You expect the website to experience high traffic volumes after it is published. You must ensure that the

A recent security audit found that several web services can be called without any authentication. Which API Management policy should you implement?

You are a developer for a SaaS company that offers many web services. All web services for the company must meet the following requirements: Use API Management to access the

What are two ways to achieve the goal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

You are implementing an Azure API app that uses built-in authentication and authorization functionality. All app actions must be associated with information about the current user. You need to retrieve

Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

You are developing a mobile instant messaging app for a company. The mobile app must meet the following requirements: Support offline data sync. Update the latest messages during normal sync

You need to change configuration settings in the host.json file. Which tool should you use?

You develop a serverless application using several Azure Functions. These functions connect to data from within the code. You want to configure tracing for an Azure Function App project. You

Which three components should you include? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

You need to provision and deploy the order workflow. Which three components should you include? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one

Which three actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

You need to implement the e-commerce checkout API. Which three actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

You need to create compute nodes for the solution on Azure Batch. What should you do?

You are developing a software solution for an autonomous transportation system. The solution uses large data sets and Azure Batch processing to simulate navigation sets for entire fleets of vehicles.

You need to choose the right class and its method to submit a batch job to the Batch service. Which method should you use?

You are writing code to create and run an Azure Batch job. You have created a pool of compute nodes. You need to choose the right class and its method