You administer an Azure Virtual Machine (VM) named CON-CL1. CON-CL1 is in a cloud service named ContosoService1. You discover unauthorized traffic to CON-CL1. You need to:
– Create a rule to limit access to CON-CL1.
– Ensure that the new rule has the highest precedence.
Which Azure Power Shell cmdlets and values should you use? Continue reading “Which Azure Power Shell cmdlets and values should you use?”
– You manage an Azure virtual machine (VM) named AppVM. The application hosted on AppVM continuously writes small files to disk.
– You disable caching for all disks that are attached to AppVM. Recently the usage of applications on AppVM has increased greatly.
– You need to improve disk performance on AppVM.
Which Microsoft Azure Power Shell cmdlet should you use with each Power Shell command line?
Continue reading “Which Microsoft Azure Power Shell cmdlet should you use…”
– You create a virtual machine (VM) in Azure. The VM runs an important line of business application.
– Users report that the application is slow and unstable.
– You need to enable diagnostics for the VM.
In which order should you perform the actions? Continue reading “which order should you perform the actions?”
You have a virtual network and virtual machines that use the Resource Manager Deployment model.
You plan to create a Network Security Group (NSG). You must apply rules to both inbound and outbound traffic.
You need to create the NSG.
In which order will the rules be applied to the virtual network? Continue reading “In which order will the rules be applied to the virtual network?”
You plan to deploy an application by using three Azure virtual machines (VMs). The application has a web based component that uses TCP port 443 and a custom component that uses UDP port 2020.The application must be available during planned and unplanned Azure maintenance events. Incoming client requests must be distributed across the three VMs. Clients must be connected to a VM only if both application components are running. You need to configure the VM environment. For each requirement,
what should you implement? Continue reading “You may need to drag the split bar between panes or scroll to view content. …”
You plan to deploy Ubuntu Linux virtual machines (VMs) in Azure. You need to ensure that you are not prompted for a password when you create or connect to the Vms.
How should you configure the environment? Continue reading “How should you configure the environment?..”
You manage an Azure environment that has 12 virtual machines (VMs). A set of VMs run a Web App that uses ASP.NET. The developer of the application must have access to ASP.NET metrics and Internet Information Services (IIS) logs from the VMs. You need to ensure that the metrics and logs are saved and provide the developer access to the data. For each requirement,
which option should you use? Continue reading “You need to ensure that the metrics and logs are saved and provide…”
You have a virtual machine (VM) named fabVM running in the fabProd service. You need to modify fabVM to be deployed into Subnet-3. You want to achieve this goal by using the least amount of time and while causing the least amount of disruption to the existing deployment. What should you do? To answer, drag the appropriate Power Shell cmdlet to the correct location in the PowerShell command. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and Place: Continue reading “You may need to drag the split bar between panes or scroll to view content”