Free Microsoft AZ-801 Exam Braindumps (page: 12)

97.5% Passing Rate DOWNLOAD PDF EXAM
178 Questions & Answers
Page 2 of 24
View Related Case Study

DRAG DROP (Drag and Drop is not supported)
You are planning the implementation of Cluster2 to support the on-premises migration plan. You need to ensure that the disks on Cluster2 meet the security requirements.
In which order should you perform the actions? To answer, move all actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:

  1. See Explanation section for answer.

Answer(s): A

Explanation:


Reference:

https://docs.microsoft.com/en-us/windows-server/failover-clustering/bitlocker-on-csv-in-ws-2022



View Related Case Study

HOTSPOT (Drag and Drop is not supported)
You need to implement a security policy solution to authorize the applications. The solution must meet the security requirements.
Which service should you use to enforce the security policy, and what should you use to manage the policy settings? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:


Reference:

https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/ wdac-and-applocker-overview



View Related Case Study

You are remediating the firewall security risks to meet the security requirements. What should you configure to reduce the risks?

  1. a Group Policy Object (GPO)
  2. adaptive network hardening in Microsoft Defender for Cloud
  3. a network security group (NSG) in Sub1
  4. an Azure Firewall policy

Answer(s): A

Explanation:

Firewall rules configured in a Group Policy Object cannot be modified by local server administrators.


Reference:

https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-firewall/create-an-inbound-port- rule



View Related Case Study

You are planning the deployment of Microsoft Sentinel.
Which type of Microsoft Sentinel data connector should you use to meet the security requirements?

  1. Threat Intelligence - TAXII
  2. Azure Active Directory
  3. Microsoft Defender for Cloud
  4. Microsoft Defender for Identity

Answer(s): D


Reference:

https://docs.microsoft.com/en-us/defender-for-identity/cas-isp-legacy-protocols



View Related Case Study

HOTSPOT (Drag and Drop is not supported)
You need to configure BitLocker on Server4.
On which volumes can you turn on BitLocker, and on which volumes can you turn on auto-unlock? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:


Reference:

https://docs.microsoft.com/en-us/windows-server/storage/refs/refs-overview
https://docs.microsoft.com/en-us/powershell/module/bitlocker/enable-bitlockerautounlock? view=windowsserver2022-ps



View Related Case Study

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a server named Server1 that runs Windows Server.
You need to ensure that only specific applications can modify the data in protected folders on Server1. Solution: From Virus & threat protection, you configure Controlled folder access.
Does this meet the goal?

  1. Yes
  2. No

Answer(s): A


Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/customize-controlled-folders? view=o365-worldwide



View Related Case Study

HOTSPOT (Drag and Drop is not supported)
What is the effective minimum password length for User1 and Admin1? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:




Box 1: 9
When multiple PSOs apply to a user, the PSO with the highest precedence (lowest precedence number) applies which in this case is PSO1.
Box 2: 8
There are no PSOs applied to Admin1 so the password policy from the Default Domain GPO applies.
The Minimum password length setting in GPO1 would only apply to local user accounts on computers in OU1. It does not apply to domain user accounts.



View Related Case Study

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a server named Server1 that runs Windows Server.
You need to ensure that only specific applications can modify the data in protected folders on Server1. Solution: From Virus & threat protection, you configure Tamper Protection.
Does this meet the goal?

  1. Yes
  2. No

Answer(s): B


Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/customize-controlled-folders? view=o365-worldwide






Post your Comments and Discuss Microsoft AZ-801 exam prep with other Community members:

AZ-801 Exam Discussions & Posts