Big Cyber Monday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

AZ-801 Questions and Answers

Question # 6

You are planning the data share migration to support the on-premises migration plan.

What should you use to perform the migration?

A.

Storage Migration Service

B.

Microsoft File Server Migration Toolkit

C.

File Server Resource Manager (FSRM)

D.

Windows Server Migration Tools

Full Access
Question # 7

You are planning the deployment of Microsoft Sentinel.

Which type of Microsoft Sentinel data connector should you use to meet the security requirements?

A.

Threat Intelligence - TAXII

B.

Azure Active Directory

C.

Microsoft Defender for Cloud

D.

Microsoft Defender for Identity

Full Access
Question # 8

You are planning the migration of Archive1 to support the on-premises migration plan.

What is the minimum number of IP addresses required for the node and cluster roles on Cluster3?

A.

2

B.

3

C.

4

D.

5

Full Access
Question # 9

You are planning the www.fabrikam.com website migration to support the Azure migration plan.

How should you configure WebApp1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 10

You are planning the DHCP1 migration to support the DHCP migration plan.

Which two PowerShell cmdlets should you run on DHCP1, and which two PowerShell cmdlets should you run on DHCP2? To answer, drag the appropriate cmdlets to the correct servers. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Full Access
Question # 11

Your network contains an on-premises Active Directory Domain Services (AD DS) domain. The domain contains two virtual machines named VM1 and VM2 that run Windows Server.

You plan to implement a failover cluster named Cluster1 that will use VM1 and VM2 as nodes.

You need to ensure that Cluster1 can use floating IP addresses.

Which two components should you deploy? Each correct answer presents part-of the solution.

NOTE: Each correct selection is worth one point.

A.

Network Load Balancing (NLB)

B.

the Multipoint Services role

C.

the Network Controller role

D.

the Host Guardian Service role

E.

Software Load Balancer (SLB)

Full Access
Question # 12

You have two servers named Host1 and Host2 that run Windows Server 2022 and are members of a workgroup named Contoso. Both servers have the Hyper-V server role installed and are identical in hardware and configuration.

Host1 contains three virtual machines. Each server is located in a separate site that connect by using a high-speed WAN link.

You need to replicate the virtual machines from Host1 to Host2 for a disaster recovery solution.

Which three actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

Use certificate-based authentication and enable TCP exceptions.

B.

Use Kerberos authentication and enable TCP exceptions.

C.

Enable Hyper-V replication for each virtual machine.

D.

Enable Host2 as a Replica server.

E.

Enable live migration for Host1 and Host2.

F.

Enable Host1 as a Replica server.

Full Access
Question # 13

You have a server that runs Windows Server.

You plan to back up the server to an Azure Recovery Services vault once per week starting on the next Saturday.

You need to schedule the weekly backup and perform the initial backup as soon as possible.

In which order should you perform the actions? To answer, move all actions from the list of actions to the answer are and arrange them in the correct order.

Full Access
Question # 14

Your network contains an Active Directory Domain Services (AD DS) domain that contains the servers shown in the following table.

Server1 and Server2 are authorized as DHCP servers in the domain. You need to migrate the DHCP Server role from Server1 to Server2. Which five actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Full Access
Question # 15

Your network contains an Active Director/ Domain Services {AD DS) domain named contoso.com. The domain contains two sites named Site1 and Site2 and servers that run Windows Server and are configured as shown in the following table.

The domain contains a group named Group1 that contains Server3.

RODC1 has the Password Replication Policy shown in the following exhibit.

Full Access
Question # 16

You have a server that runs Windows Server and hosts an app named Appl.

You need to prevent App1 from accessing external SMTP servers. The solution must meet the following requirements:

• Minimize the impact on AppVs access to external HTTP servers.

• Minimize the impact on other apps on (he server.

• Minimize administrative effort

What should you implement in Windows Defender Firewall?

A.

an outbound program rule

B.

an inbound custom rule

C.

an outbound custom rule

D.

an inbound program rule

E.

an outbound port rule

Full Access
Question # 17

You have 200 Azure virtual machines.

You create a recovery plan in Azure Site Recovery to fail over all the virtual machines to an Azure region. The plan has three manual actions.

You need to replace one of the manual actions with an automated process.

What should you use?

A.

an Azure Desired State Configuration (DSC) virtual machine extension

B.

an Azure Automation runbook

C.

an Azure PowerShell function

D.

a Custom Script Extension on the virtual machines

Full Access
Question # 18

You have a server that runs Windows Server 2025 Standard and has the Hyper-V role installed. You need to upgrade the server to Windows Server 2025 Datacenter. The solution must minimize downtime. What should you run?

A.

dism.exe

B.

setup.exe

C.

slagr.vbs

D.

conwert.exe

Full Access
Question # 19

Your network contains an on-premises Active Directory Domain Services (AD DS) domain.

The domain contains the servers shown in the following table.

Server1 has the connection security rule as shown in the Server1 exhibit. (Click the Server1 tab.)

Server2 has the connection security rule as shown in the Server2 exhibit. (Click the Server2 tab.)

Server1 has the inbound firewall rules as shown in the Server1 inbound rules exhibit. (Click the Server1 inbound rules tab.)

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

Full Access
Question # 20

You have a server named Server1 that runs Windows Server and contains two volumes named C and D.

You connect a disk to Server 1 that is encrypted by using BitLocker and contains a volume named E.

You need to ensure that after a restart, the data on volume E can be accessed without providing a password or a recovery key.

Which three actions should you perform on Server1 in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Full Access
Question # 21

You have an Azure virtual machine named VM1 that runs Windows Server.

You plan to deploy a new line-of-business (LOB) application to VM1.

You need to ensure that the application can create child processes.

What should you configure on VM1?

A.

Microsoft Defender Credential Guard

B.

Microsoft Defender Application Control

C.

Microsoft Defender SmartScreen

D.

Exploit protection

Full Access
Question # 22

You plan to deploy an Azure confidential virtual machine named VM1. You need to ensure that you can implement confidential disk encryption for VM1. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Full Access
Question # 23

The Default Domain Policy Group Policy Object (GPO) is shown in the GPO exhibit. (Click the GPO tab.)

The members of a group named Service Accounts are shown in the Group exhibit. (Click the Group tab.)

An organizational unit (OU) named ServiceAccounts is shown in the OU exhibit. (Click the OU tab.)

You create a Password Settings Object (PSO) as shown in the PSO exhibit. (Click the PSO tab.)

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 24

You need to meet technical requirements for Share1.

What should you use?

A.

Storage Migration Service

B.

File Server Resource Manager (FSRM)

C.

Server Manager

D.

Storage Replica

Full Access
Question # 25

You are evaluating the technical requirements tor Cluster2.

What is the minimum number of Azure Site Recovery Providers that you should install?

A.

1

B.

4

C.

12

D.

16

Full Access
Question # 26

With which servers can Server1 and Server3 communicate? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 27

Which domain controller should be online to meet the technical requirements for DC4?

A.

DC1

B.

DC2

C.

DC3

Full Access
Question # 28

You need to back up Server 4 to meet the technical requirements.

What should you do first?

A.

Deploy Microsoft Azure Backup Server (MABS).

B.

Configure Windows Server Backup.

C.

Install the Microsoft Azure Recovery Services (MARS) agent.

D.

Configure Storage Replica.

Full Access
Question # 29

Your on-premises datacenter contains physical servers and Hyper-V virtual machines.

You have an Azure subscription.

You plan to use Azure Migrate to perform the following tasks:

• Migrate the physical servers to Azure virtual machines.

• Migrate the Hyper-V virtual machines to Azure.

What should you use for each task? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Full Access
Question # 30

You need to meet the technical requirements for Cluster3.

What should you include in the solution?

A.

Enable integration services on all the virtual machines.

B.

Add a Windows Server server role.

C.

Configure a fault domain doe the cluster.

D.

Add a failover cluster role.

Full Access
Question # 31

You need to meet the technical requirements for Cluster2.

Which four actions should you perform in sequence before you can enable replication? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Full Access
Question # 32

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 33

You need to meet the technical requirements for User1.

To which group in contoso.com should you add User1?

A.

Domain Admins

B.

Account Operators

C.

Schema Admins

D.

Backup Operators

Full Access
Question # 34

You need to configure BitLocker on Server4.

On which volumes can you turn on BitLocker, and on which volumes can you turn on auto-unlock? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 35

What is the effective minimum password length for User1 and Admin1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 36

You need to implement alerts for the domain controllers. The solution must meet the technical requirements.

What should you do on the domain controllers, and what should you create on Azure? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access