10.  Topic 2, Contoso 
This is a case study.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other question on this case study. 
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next sections of the exam. After you begin a new section, you cannot return to this section. 
To start the case study
Overview
Contoso has two Azure subscriptions named Sub1 and Sub2. Both subscriptions are associated to an Azure Active Directory (Azure AD) tenant named contoso.com. 
Technical requirements
Existing Environment
Contoso.com contains the security groups shown in the following table. 
Sub1
Sub1 contains the locks shown in the following table. 
Sub1 contains the Azure policies shown in the following table. 
Sub2 
Sub2 contains the virtual machines shown in the following table. 
All virtual machines have the public IP addresses and the Web Server (IIS) role installed.
Sub2 contains the network security groups (NSGs) shown in the following table. 
NSG1 has the inbound security rules shown in the following table. 
NSG2 has the inbound security rules shown in the following table. 
NSG3 has the inbound security rules shown in the following table. 
NSG4 has the inbound security rules shown in the following table. 
NSG1, NSG2, NSG3, and NSG4 have the outbound security rules shown in the following table. 
Technical requirements
You need to ensure that User2 can implement PIM.