Pre-Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Microsoft AZ-801 Practice Exam with Questions & Answers | Set: 2

Questions 11

You have two servers named Host1 and Host2 that run Windows Server 2022 and are members of a workgroup named Contoso. Both servers have the Hyper-V server role installed and are identical in hardware and configuration.

Host1 contains three virtual machines. Each server is located in a separate site that connect by using a high-speed WAN link.

You need to replicate the virtual machines from Host1 to Host2 for a disaster recovery solution.

Which three actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Options:
A.

Use certificate-based authentication and enable TCP exceptions.

B.

Use Kerberos authentication and enable TCP exceptions.

C.

Enable Hyper-V replication for each virtual machine.

D.

Enable Host2 as a Replica server.

E.

Enable live migration for Host1 and Host2.

F.

Enable Host1 as a Replica server.

Microsoft AZ-801 Premium Access
Questions 12

You are planning the europe.fabrikam.com migration to support the on-premises migration plan-Where should you install the Password Export Server (PES) service, where should you generate the encryption key? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

AZ-801 Question 12

Options:
Questions 13

You are remediating the firewall security risks to meet the security requirements.

What should you configure to reduce the risks?

Options:
A.

a Group Policy Object (GPO)

B.

adaptive network hardening in Microsoft Defender for Cloud

C.

a network security group (NSG) in Sub1

D.

an Azure Firewall policy

Questions 14

You are planning the deployment of Microsoft Sentinel.

Which type of Microsoft Sentinel data connector should you use to meet the security requirements?

Options:
A.

Threat Intelligence - TAXII

B.

Azure Active Directory

C.

Microsoft Defender for Cloud

D.

Microsoft Defender for Identity

Questions 15

You have a server named Server1 that runs Windows Server.

You need to ensure that only specific applications can modify the data in protected folders on Server1.

Solution: From App & browser control, you configure the Reputation-based protection.

Does this meet the goal?

Options:
A.

Yes

B.

No

Questions 16

Your on-premises datacenter contains a server named Server1 that runs Windows Server. You install the System Insights feature on Server1.

You discover that some of the System Insights capabilities are NOT installed.

Which two capabilities should be installed manually on Server1? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Options:
A.

Networking capacity forecasting

B.

CPU capacity forecasting

C.

Total storage consumption forecasting

D.

Physical disk anomaly detection (IOPS)

E.

Physical disk anomaly detection (Latency)

Questions 17

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have an on-premises server named Server1 that runs Windows Server.

You have a Microsoft Sentinel instance.

You add the Windows Firewall data connector in Microsoft Sentinel.

You need to ensure that Microsoft Sentinel can collect Windows Firewall logs from Server1.

Solution; You enable event subscription on Server1.

Does this meet the goal?

Options:
A.

Yes

B.

No

Questions 18

You have a server that runs Windows Server and hosts an app named Appl.

You need to prevent App1 from accessing external SMTP servers. The solution must meet the following requirements:

• Minimize the impact on AppVs access to external HTTP servers.

• Minimize the impact on other apps on (he server.

• Minimize administrative effort

What should you implement in Windows Defender Firewall?

Options:
A.

an outbound program rule

B.

an inbound custom rule

C.

an outbound custom rule

D.

an inbound program rule

E.

an outbound port rule

Questions 19

Your network contains an Active Directory Domain Services (AD DS) domain All domain members have Microsoft Defender Credential Guard with UEFI tock configured in the domain you deploy a server named Server1 that runs Windows Server. You disable Credential Guard on Server1. You need to ensure that Server1 is MOST subject to Credential Guard restrictions. What should you do next?

Options:
A.

Run the Device Guard and Credential Guard hardware readiness tool

B.

Disable the Turn on Virtual nation Based Security group policy setting

C.

Run dism and specify the /Disable-Feature and /FeatureName:IsolatedUserMode parameters

Questions 20

You have an on-premises server named Server1 that runs Windows Server. You need to perform an on-demand backup of the files on Server 1 by using Azure Backup.

Which five actions should you perform in sequence? To answer, move the appropriate actions actions from the list of actions to the answer are and arrange them in the correct order.

AZ-801 Question 20

Options: