AZ-801 Dumps AZ-801 Braindumps AZ-801 Real Questions AZ-801 Practice Test AZ-801 Actual Questions Microsoft AZ-801 Configuring Windows Server Hybrid Advanced Services https://killexams.com/pass4sure/exam-detail/AZ-801 Question: 24 You have 100 Azure virtual machines that run Windows Server. The virtual machines are onboarded to Microsoft Defender for Cloud. You need to shut down a virtual machine automatically if Microsoft Defender for Cloud generates the "Antimalware disabled in the virtual machine" alert for the virtual machine. What should you use in Microsoft Defender for Cloud? A. a logic app B. a workbook C. a security policy D. adaptive network hardening Answer: A Explanation: Reference: https://docs.microsoft.com/en-us/azure/defender-for-cloud/managing-and-responding-alerts Question: 25 You have a server that runs Windows Server. The server is configured to encrypt all incoming traffic by using a connection security rule. You need to ensure that Server1 can respond to the unencrypted tracert commands initiated from computers on the same network. What should you do from Windows Defender Firewall with Advanced Security? A. From the IPsec Settings, configure IPsec defaults. B. Create a new custom outbound rule that allows ICMPv4 protocol connections for all profiles. C. Change the Firewall state of the Private profile to Off. D. From the IPsec Settings, configure IPsec exemptions. Answer: D Question: 26 HOTSPOT The Default Domain Policy Group Policy Object (GPO) is shown in the GPO exhibit. (Click the GPO tab.) The members of a group named Service Accounts are shown in the Group exhibit. (Click the Group tab.) An organizational unit (OU) named Service Accounts is shown in the OU exhibit. (Click the OU tab.) You create a Password Settings Object (PSO) as shown in the PSO exhibit. (Click the PSO tab.) For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. Answer: Explanation: Reference: https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/get-started/adac/introduction-to- activedirectory-administrative-center-enhancements–level-100-#fine_grained_pswd_policy_mgmt Question: 27 HOTSPOT Your network contains an Active Directory Domain Services (AD DS) forest. The forest contains the domains shown in the following table. You are implementing Microsoft Defender for Identity sensors. You need to install the sensors on the minimum number of domain controllers. The solution must ensure that Defender for Identity will detect all the security risks in both the domains. What should you identify? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Answer: Explanation: Reference: https://docs.microsoft.com/en-us/defender-for-identity/technical-faq#deployment https://docs.microsoft.com/en-us/defender-for-identity/install-step4 Question: 28 You have an Azure virtual machine named VM1 that runs Windows Server. You plan to deploy a new line-of- business (LOB) application to VM1. You need to ensure that the application can create child processes. What should you configure on VM1? A. Microsoft Defender Credential Guard B. Microsoft Defender Application Control C. Microsoft Defender SmartScreen D. Exploit protection Answer: D Explanation: Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/customize-exploit-protection? view=o365-worldwide Question: 29 You have an Azure virtual machine named VM1 that runs Windows Server. You need to encrypt the contents of the disks on VM1 by using Azure Disk Encryption. What is a prerequisite for implementing Azure Disk Encryption? A. Customer Lockbox for Microsoft Azure B. an Azure key vault C. a BitLocker recovery key D. data-link layer encryption in Azure Answer: B Explanation: Reference: https://docs.microsoft.com/en-us/azure/virtual-machines/windows/disk-encryption-overview Question: 30 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a server named Server1 that runs Windows Server. You need to ensure that only specific applications can modify the data in protected folders on Server1. Solution: From Virus & threat protection, you configure Tamper Protection. Does this meet the goal? A. Yes B. No Answer: B Explanation: Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/customize-controlled-folders? view=o365-worldwide Question: 31 You are planning the migration of Archive1 to support the on-premises migration plan. What is the minimum number of IP addresses required for the node and cluster roles on Cluster3? A. 2 B. 3 C. 4 D. 5 Answer: B Explanation: One IP for each of the two nodes in the cluster and one IP for the cluster virtual IP (VIP). Implement and manage Windows Server high availability Question Set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