You are designing an Azure resource deployment that will use Azure Resource Manager templates. The deployment will use Azure Key Vault to store secrets. You need to recommend a solution to meet the following requirements: Prevent the IT staff that will perform the deployment from retrieving the secrets directly from Key Vault. Use the principle of least privilege. Which two actions should you recommend? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
Correct Answer: B,D
B: To access a key vault during template deployment, set enabledForTemplateDeployment on the key vault to true. D: The user who deploys the template must have the Microsoft.KeyVault/vaults/deploy/action permission for the scope of the resource group and key vault. Incorrect Answers: E: To grant access to a user to manage key vaults, you assign a predefined key vault Contributor role to the user at a specific scope. If a user has Contributor permissions to a key vault management plane, the user can grant themselves access to the data plane by setting a Key Vault access policy. You should tightly control who has Contributor role access to your key vaults. Ensure that only authorized persons can access and manage your key vaults, keys, secrets, and certificates. Reference: https://docs.microsoft.com/en-us/azure/azure-resource-manager/templates/key-vault-parameter https://docs.microsoft.com/en-us/azure/key-vault/general/overview-security
Question 27
You have an Azure Active Directory (Azure AD) tenant. You plan to use Azure Monitor to monitor user sign-ins and generate alerts based on specific user sign-in events. You need to recommend a solution to trigger the alerts based on the events. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
You need to recommend a solution to meet the database retention requirement. What should you recommend?
Correct Answer: A
Topic 1, Fabrikam, Inc Overview Existing Environment Fabrikam, Inc. is an engineering company that has offices throughout Europe. The company has a main office in London and three branch offices in Amsterdam Berlin, and Rome. Active Directory Environment The network contains two Active Directory forests named corp.fabnkam.com and rd.fabrikam.com. There are no trust relationships between the forests. Corp.fabrikam.com is a production forest that contains identities used for internal user and computer authentication. Rd.fabrikam.com is used by the research and development (R&D) department only. Network Infrastructure Each office contains at least one domain controller from the corp.fabrikam.com domain. The main office contains all the domain controllers for the rd.fabrikam.com forest. All the offices have a high-speed connection to the Internet. An existing application named WebApp1 is hosted in the data center of the London office. WebApp1 is used by customers to place and track orders. WebApp1 has a web tier that uses Microsoft Internet Information Services (IIS) and a database tier that runs Microsoft SQL Server 2016. The web tier and the database tier are deployed to virtual machines that run on Hyper-V. The IT department currently uses a separate Hyper-V environment to test updates to WebApp1. Fabrikam purchases all Microsoft licenses through a Microsoft Enterprise Agreement that includes Software Assurance. Problem Statement The use of Web App1 is unpredictable. At peak times, users often report delays. Al other times, many resources for WebApp1 are underutilized. Requirements Planned Changes Fabrikam plans to move most of its production workloads to Azure during the next few years. As one of its first projects, the company plans to establish a hybrid identity model, facilitating an upcoming Microsoft Office 365 deployment All R&D operations will remain on-premises. Fabrikam plans to migrate the production and test instances of WebApp1 to Azure. Technical Requirements Fabrikam identifies the following technical requirements: * Web site content must be easily updated from a single point. * User input must be minimized when provisioning new app instances. * Whenever possible, existing on premises licenses must be used to reduce cost. * Users must always authenticate by using their corp.fabrikam.com UPN identity. * Any new deployments to Azure must be redundant in case an Azure region fails. * Whenever possible, solutions must be deployed to Azure by using platform as a service (PaaS). * An email distribution group named IT Support must be notified of any issues relating to the directory synchronization services. * Directory synchronization between Azure Active Directory (Azure AD) and corp.fabhkam.com must not be affected by a link failure between Azure and the on premises network. Database Requirements Fabrikam identifies the following database requirements: * Database metrics for the production instance of WebApp1 must be available for analysis so that database administrators can optimize the performance settings. * To avoid disrupting customer access, database downtime must be minimized when databases are migrated. * Database backups must be retained for a minimum of seven years to meet compliance requirement Security Requirements Fabrikam identifies the following security requirements: *Company information including policies, templates, and data must be inaccessible to anyone outside the company *Users on the on-premises network must be able to authenticate to corp.fabrikam.com if an Internet link fails. *Administrators must be able authenticate to the Azure portal by using their corp.fabrikam.com credentials. *All administrative access to the Azure portal must be secured by using multi-factor authentication. *The testing of WebApp1 updates must not be visible to anyone outside the company.
Question 29
You are designing a storage solution that will use Azure Blob storage. The data will be stored in a cool access tier or an archive access tier based on the access patterns of the data. You identify the following types of infrequently accessed data: Telemetry data: Deleted after two years D18912E1457D5D1DDCBD40AB3BF70D5D Promotional material: Deleted after 14 days Virtual machine audit data: Deleted after 200 days A colleague recommends using the archive access tier to store the data. Which statement accurately describes the recommendation?
Correct Answer: D
The following table shows a comparison of premium performance block blob storage, and the hot, cool, and archive access tiers. Reference: https://docs.microsoft.com/en-us/azure/storage/blobs/storage-blob-storage-tiers
Question 30
What should you include in the identity management strategy to support the planned changes?
Correct Answer: B
Directory synchronization between Azure Active Directory (Azure AD) and corp.fabrikam.com must not be affected by a link failure between Azure and the on-premises network. (This requires domain controllers in Azure) Users on the on-premises network must be able to authenticate to corp.fabrikam.com if an Internet link fails. (This requires domain controllers on-premises)