Updated AZ-801 Dumps (V15.02) Are Available with Guaranteed Success: Read AZ-801 Free Dumps (Part 1, Q1-Q40)

Keep checking the dumps from DumpsBase and make sure that you have downloaded the most current materials. We ensure your study materials stay aligned with the latest exam syllabus. For example, we have updated the AZ-801 dumps to V15.02 with 214 practice exam questions. We promise that if the AZ-801 exam content changes during your preparation, you will receive free updates for one year after purchase. So come to DumpsBase and download the Microsoft AZ-801 dumps (V15.02). Then you can study with confidence, knowing you are working with the most up-to-date AZ-801 exam questions. DumpsBase is committed to your success in the Configuring Windows Server Hybrid Advanced Services AZ-801 exam. If you are not sure if the AZ-801 updated materials are right for you, you can explore a free demo online. The AZ-801 free dumps from DumpsBase showcase the quality and structure of the exam questions, giving you confidence in your investment.

Read our Microsoft AZ-801 free dumps (Part 1, Q1-Q40) of V15.02 below:

1. You have an on-premises server named Server1 that runs Windows Server and has the Hyper-V server role installed.

You have an Azure subscription.

You plan to back up Server1 to Azure by using Azure Backup.

Which two Azure Backup options require you to deploy Microsoft Azure Backup Server (MABS)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

2. DRAG DROP

You manage 200 physical servers that run Windows Server.

You plan to migrate the servers to Azure.

You need to prepare for discovery of the servers by using Azure Migrate.

Which three actions should you perform in sequence on a physical server? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

3. You have 100 Azure virtual machines that run Windows Server. The virtual machines are onboarded to Microsoft Defender for Cloud.

You need to shut down a virtual machine automatically if Microsoft Defender for Cloud generates the "Antimalware disabled in the virtual machine" alert for the virtual machine.

What should you use in Microsoft Defender for Cloud?

4. You are planning the deployment of Microsoft Sentinel.

Which type of Microsoft Sentinel data connector should you use to meet the security requirements?

5. You have 200 Azure virtual machines.

You create a recovery plan in Azure Site Recovery to fail over all the virtual machines to an Azure region. The plan has three manual actions.

You need to replace one of the manual actions with an automated process.

What should you use?

6. Which domain controller should be online to meet the technical requirements for DC4?

7. DRAG DROP

Your network contains an Active Directory Domain Services (AD DS) domain. The domain contains a print server named Server1. All printers are deployed to users by using a Group Policy Object (GPO) named GPO1.

You deploy a new server named Server2.

You need to decommission Server1.

The solution must meet the following requirements:

✑ Migrate the shared printers to Server2 by using the Printer Migration Wizard.

✑ Ensure that the users use the printers on Server2.

✑ Minimize downtime for the users.

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

8. You have an on-premises server that runs Windows Server and has the Web Server (IIS) server role installed. The server hosts a web app that connects to an on-premises Microsoft SQL Server database.

You plan to migrate the web app to an Azure App Services web app. The database will remain on-premises.

You need to ensure that the migrated web app can access the database.

What should you configure in Azure?

9. HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

10. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a failover cluster named Cluster1 that hosts an application named App1.

The General tab in App1 Properties is shown in the General exhibit. (Click the General tab.)

The Failover tab in App1 Properties is shown in the Failover exhibit. (Click the Failover tab.)

Server1 shuts down unexpectedly.

You need to ensure that when you start Server1, App1 continues to run on Server2.

Solution: From the Failover settings, you select Prevent failback.

Does this meet the goal?

11. You have an Azure virtual machine named VM1 that has the Web Server (IIS) server role installed.

VM1 hosts a critical line-of-business (LOB) application.

After the security team at your company deploys a new security baseline to VM1, users begin reporting that the application is unresponsive.

You suspect that the security baseline has caused networking issues.

You need to perform a network trace on VM1.

What should you do?

12. You have a Microsoft Sentinel deployment and 100 Azure Arc-enabled on-premises servers. All the

Azure Arc-enabled resources are in the same resource group.

You need to onboard the servers to Microsoft Sentinel. The solution must minimize administrative effort.

What should you use to onboard the servers to Microsoft Sentinel?

13. You are planning the data share migration to support the on-premises migration plan.

What should you use to perform the migration?

14. Topic 2, Contoso, Ltd

Case study

This is a case study. Case studies are not timed separately. You can use as much exam time as you

would like to complete each case. However, there may be additional case studies and sections on this

exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.

To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study.

At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section.

To start the case study

To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. If the case study has an All Information tab, note that the information displayed is identical to the information displayed on the subsequent tabs. When you are ready to answer a question, click the Question button to return to the question.

Overview

Contoso, Ltd. is a manufacturing company that has a main office in Seattle and branch offices in Los Angeles and Montreal.

Existing Environment

Active Directory Environment

Contoso has an on-premises Active Directory Domain Services (AD DS) domain named contoso.com that syncs with an Azure Active Directory (Azure AD) tenant.

The AD DS domain contains the domain controllers shown in the following table.

Contoso recently purchased an Azure subscription.

The functional level of the forest is Windows Server 2012 R2. The functional level of the domain is Windows Server 2012. The forest has the Active Directory Recycle Bin enabled.

The contoso.com domain contains the users shown in the following table.

The contoso.com domain has the Group Policy Objects (GPOs) shown in the following table.

The contoso.com domain has the Password Settings Objects (PSOs) shown in the following table.

Server Infrastructure

The contoso.com domain contains servers that run Windows Server 2022 as shown in the following table.

By using Windows Firewall with Advanced Security, the servers have isolation connection security rules configured as shown in the following table.

Server4 has no connection security rules.

Server4 Configurations

Server4 has the effective Group Policy settings for user rights as shown in the following table.

Server4 has the disk configurations shown in the following exhibit.

Virtualization Infrastructure

The contoso.com domain has the Hyper-V failover clusters shown in the following table.

Technical Requirements

Contoso identifies the following technical requirements:

Promote a new server named DC4 that runs to Windows Server 2022 to a domain controller.

Replicate the virtual machines from Cluster2 to an Azure Recovery Services vault.

Centrally manage performance alerts in Azure for all the domain controllers.

Ensure that User1 can recover objects from the Active Directory Recycle Bin.

Migrate Share1 to Server2, including all the share and folder permissions.

Back up Server4 and all data to an Azure Recovery Services vault.

Use Hyper-V Replica to protect the virtual machines in Cluster3.

Implement BitLocker Drive Encryption (BitLocker) on Server4.

Whenever possible, use the principle of least privilege.

HOTSPOT

You need to configure BitLocker on Server4.

On which volumes can you turn on BitLocker, and on which volumes can you turn on auto-unlock? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

15. You are remediating the firewall security risks to meet the security requirements.

What should you configure to reduce the risks?

16. You have an Azure subscription that has Microsoft Defender for Cloud enabled.

You have 50 Azure virtual machines that run Windows Server.

You need to ensure that any security exploits detected on the virtual machines are forwarded to Defender for Cloud.

Which extension should you enable on the virtual machines?

17. HOTSPOT

The Default Domain Policy Group Policy Object (GPO) is shown in the GPO exhibit. (Click the GPO tab.)

The members of a group named Service Accounts are shown in the Group exhibit. (Click the Group tab.)

An organizational unit (OU) named ServiceAccounts is shown in the OU exhibit. (Click the OU tab.)

You create a Password Settings Object (PSO) as shown in the PSO exhibit. (Click the PSO tab.)

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

18. You have a server that runs Windows Server. The server is configured to encrypt all incoming traffic by using a connection security rule.

You need to ensure that Server1 can respond to the unencrypted tracert commands initiated from computers on the same network.

What should you do from Windows Defender Firewall with Advanced Security?

19. HOTSPOT

You have a failover cluster named FC1 that contains two nodes named Server1 and Server2. FC1 is configured to use a file share witness.

You plan to configure FC1 to use a cloud witness.

You need to configure Azure Storage accounts for the cloud witness.

Which storage account type and authorization method should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

20. HOTSPOT

You are planning the migration of APP3 and APP4 to support the Azure migration plan.

What should you do on Cluster1 and in Azure before you perform the migration? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

21. DRAG DROP

You have three servers named Server1, Server2, Server3 that run Windows Server and have the Hyper-V server role installed.

You plan to create a hyper-converged cluster to host Hyper-V virtual machines.

You need to ensure that you can store virtual machines in Storage Spaces Direct.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

22. HOTSPOT

Your network contains an Active Directory Domain Services (AD DS) domain named contoso.com.

The domain contains the organizational units (OUs) shown in the following table.

In the domain, you create the Group Policy Objects (GPOs) shown in the following table.

You need to implement IPsec authentication to ensure that only authenticated computer accounts can connect to the members in the domain. The solution must minimize administrative effort.

Which GPOs should you apply to the Domain Controllers OU and the Domain Servers OU? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

23. You need to meet the technical requirements for User1.

To which group in contoso.com should you add User1?

24. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains a single-domain Active Directory Domain Services (AD DS) forest named contoso.com. The functional level of the forest is Windows Server 2012 R2. All domain controllers run Windows Server 2012 R2.

Sysvol replicates by using the File Replication Service (FRS).

You plan to replace the existing domain controllers with new domain controllers that will run Windows Server 2022.

You need to ensure that you can add the first domain controller that runs Windows Server 2022.

Solution: You run the Active Directory Migration Tool (ADMT).

Does this meet the goal?

25. You are planning the migration of Archive1 to support the on-premises migration plan.

What is the minimum number of IP addresses required for the node and cluster roles on Cluster3?

26. Your company uses Storage Spaces Direct.

You need to view the available storage in a Storage Space Direct storage pool.

What should you use?

27. HOTSPOT

Your network contains an Active Directory Domain Services (AD DS) domain.

The domain contains the servers shown in the following table.

Server3 contains a share named Share1.

On Server1, DHCP has the following configurations:

Conflict detection attempts: 3

An IPv4 scope named Scope1 that has the following settings:

1. Address Pool: 172.16.10.100 - 172.16.10.130

2. Address Leases:

- 172.16.10.100 computer1.contoso.com

- 172.16.10.101 computer2.contoso.com

Reservations: 172.16.10.101 computer2.contoso.com

Policies: Policy1

You perform the following actions:

✑ On Server1, you run

Export-DhcpServer -File \Server3Share1File1.xml.

✑ On Server2, you run

Import-DhcpServer -File \Server3Share1File1.xml

-BackupPath \Server3Share1.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

28. Topic 3, Misc. Questions

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a server named Server1 that runs Windows Server.

You need to ensure that only specific applications can modify the data in protected folders on Server1.

Solution: From Virus & threat protection, you configure Controlled folder access.

Does this meet the goal?

29. DRAG DROP

You have a server named Server1 that runs Windows Server and has the Web Server (IIS) server role installed. Server1 hosts an ASP.NET Core web app named WebApp1 and the app’s source files.

You install Docker on Server1.

You need to ensure that you can deploy WebApp1 to an Azure App Service web app from the Azure Container Registry.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

30. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a failover cluster named Cluster1 that hosts an application named App1.

The General tab in App1 Properties is shown in the General exhibit. (Click the General tab.)

The Failover tab in App1 Properties is shown in the Failover exhibit. (Click the Failover tab.)

Server1 shuts down unexpectedly.

You need to ensure that when you start Server1, App1 continues to run on Server2.

Solution: From the General settings, you move Server2 up.

Does this meet the goal?

31. HOTSPOT

You have a failover cluster named Cluster1 that contains three nodes.

You plan to add two file server cluster roles named File1 and File2 to Cluster1. File1 will use the File Server for general use role. File2 will use the Scale-Out File Server for application data role.

What is the maximum number of nodes for File1 and File2 that can concurrently serve client connections? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

32. You have an on-premises network and an Azure virtual network.

You establish a Site-to-Site VPN connection from the on-premises network to the Azure virtual network, but the connection frequently disconnects.

You need to debug the IPsec tunnel from Azure.

Which Azure VPN Gateway diagnostic log should you review?

33. HOTSPOT

You are planning the europe.fabrikam.com migration to support the on-premises migration plan.

Where should you install the Password Export Server (PES) service, where should you generate the encryption key? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

34. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a server named Server1 that runs Windows Server.

You need to ensure that only specific applications can modify the data in protected folders on Server1.

Solution: From App & browser control, you configure the Exploit protection settings.

Does this meet the goal?

35. You have a server named Server1 that runs Windows Server and has the Hyper-V server role installed.

You import the Azure Migrate appliance as VM1.

You need to register VM1 with Azure Migrate.

What should you do in Azure Migrate? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

36. DRAG DROP

Your network contains an Active Directory Domain Services (AD DS) domain named contoso.com. The functional level of the forest and the domain is Windows Server 2012 R2.

The domain contains the domain controllers shown in the following table.

You need to raise the forest functional level to Windows Server 2016.

The solution must meet the following requirements:

✑ Ensure that there are three domain controllers after you raises the level.

✑ Minimize how long the FSMO roles are unavailable.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

37. You have an Azure virtual machine named VM1 that runs Windows Server.

You need to encrypt the contents of the disks on VM1 by using Azure Disk Encryption.

What is a prerequisite for implementing Azure Disk Encryption?

38. You need to meet technical requirements for Share1.

What should you use?

39. DRAG DROP

You need to meet the technical requirements for Cluster2.

Which four actions should you perform in sequence before you can enable replication? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

40. HOTSPOT

You have a server that runs Windows Server and has the Web Server (IIS) server role installed.

Server1 hosts a single website that has the following configurations:

✑ Is accessible by using a URL of https://www.contoso.com:8443 and has an SSL certificate that was issued by a third-party certification authority (CA) in the Microsoft Trusted Root Program

✑ Uses anonymous authentication

✑ Was developed by using PHP

You plan to use APP Service Migration Assistant to migrate the website to Azure App Service.

You need to migrate the website. The solution must minimize the number of changes made to the existing website.

What should you do manually to ensure that the website migration is successful? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.


 

Continue to Read the MS-700 Free Dumps (Part 2, Q41-Q80): Grab Your MS-700 Dumps (V20.02) Today and Start Your Journey to Success

Add a Comment

Your email address will not be published. Required fields are marked *