
DJoo
Authored by Leroy Bigums
Instructional Technology
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
1 subscription, 3 RG for 3 depts. Send a usage report of each dept to billing person (sequence).
Apply a tag to each Azure resource.
Navigate to cost analysis and select a scope.
Filter the items by tag.
Download the usage data.
Navigate to cost analysis and select a scope.
Apply a tag to each Azure resource.
Download the usage data.
Filter the items by tag.
Download the usage data.
Apply a tag to each Azure resource.
Navigate to cost analysis and select a scope.
Filter the items by tag.
Navigate to cost analysis and select a scope.
Filter the items by tag.
Apply a tag to each Azure resource.
Download the usage data.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you do first to delete this resource group?
Set the resource lock of TD-SA to Delete.
Stop TD-VM and delete the resource lock of TD-VNET.
Delete all the resource locks and delete the backup data in TD-RSV.
Change the resource lock type of TD-VNET and modify the backup configuration of TD-VM.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
G). _____ provides tools to monitor, diagnose, view metrics, and enable or disable logs for resources in an Azure virtual network.
IP flow verify
NSG flow logs
Traffic analytics
Azure Network Watcher
Next hop
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
G). _____ checks if a packet is allowed or denied to or from a virtual machine. The information consists of direction, protocol, local IP, remote IP, local port, and a remote port. If the packet is denied by a security group, the name of the rule that denied the packet is returned
IP flow verify
NSG flow logs
Traffic analytics
Azure Network Watcher
Next hop
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
G). _____ is a feature of Azure Network Watcher that allows you to log information about IP traffic flowing through an NSG. Flow data is sent to Azure Storage accounts from where you can access it as well as export it to any visualization tool, SIEM, or IDS of your choice. _____ are the source of truth for all network activity in your cloud environment. You can use it for optimizing network flows, monitoring throughput, verifying compliance, detecting intrusions, and more.
IP flow verify
NSG flow logs
Traffic analytics
Azure Network Watcher
Next hop
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
G). _____ allows you to process your NSG Flow Log data that enables you to visualize, query, analyze, and understand your network traffic.
IP flow verify
NSG flow logs
Traffic analytics
Azure Network Watcher
Next hop
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You need to recommend a solution that will allow you to monitor +100 network resources in one centralized console for network monitoring.
Azure Traffic Manager
Azure Monitor Network Insights
Azure Advisor
Azure Virtual Network
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?