Note: This question is part of a series of questions that present the same scenario. Each question on the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution,…

Note: This question is part of a series of questions that present the same scenario. Each question on the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution,…

Note: This question is part of a series of questions that present the same scenario. Each question on the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution,…

You need to ensure that the logging, monitoring, and alerting requirements are met. What should you recommend? A. Azure Storage Queue B. Azure Cosmos DB C. Azure Table storage D. Azure Event Hub

HOTSPOT You need to ensure that source code and deployment artifact security requirements are met. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Hot Area:

DRAG DROP You need to design the application architecture for each region. What should you recommend? To answer, drag the appropriate technologies or protocols to the correct locations. Each technology or protocol may be used once, more than once, or…

You need to design the multi-tenant model for storing application and customer data. Which pattern should you recommend? A. Shared database-single B. Database-per-tenant with elastic pools C. Database-per-tenant without elastic pools D. Shared database-sharded

You are developing the application security review document. You need to ensure that application data security requirements are met. What should you verify? A. Azure SQL connections use an account that does have administrative access. B. Connection strings use encryption…

You need to ensure that authentication requirements are met. What should you do? A. Enable multi-factor authentication. B. Enable Azure AD Identity Protection. C. Require users to authenticate by using Windows Hello for Business. D. Require users to authenticate by…