👉Get Full PDF
| Question .31 You have a sneaking suspicion that there are users trying to sign in to resources which are inaccessible to them. You decide to create an Azure Log Analytics query to confirm your suspicions. The query will detect unsuccessful user sign-in attempts from the last few days. You want to make sure that the results only show users who had failed to sign-in more than five times. Which of the following should be included in your query? A. The EventID and CountIf() parameters. B. The ActivityID and CountIf() parameters. C. The EventID and Count() parameters. D. The ActivityID and Count() parameters. |
31. Click here to View Answer
Answer:
C
Explanation:
KUSTO Query
let timeframe = 1d;
SecurityEvent
| where TimeGenerated > ago(1d)
| where AccountType == ‘User’ and EventID == 4625 // 4625 – failed log in
| summarize failed_login_attempts=count(), latest_failed_login=arg_max(TimeGenerated, Account) by Account
| where failed_login_attempts > 5
| project-away Account1
Reference:
https://docs.microsoft.com/en-us/azure/azure-monitor/log-query/examples
| Question. 32 Your company uses Azure DevOps with branch policies configured. Which of the following is TRUE with regards to branch policies? (Choose all that apply.) A. It enforces your team’s change management standards. B. It controls who can read and update the code in a branch. C. It enforces your team’s code quality. D. It places a branch into a read-only state. |
32. Click here to View Answer
Answer:
AC
Explanation:
Branch policies help teams protect their important branches of development. Policies enforce your team’s code quality and change management standards.
| Question. 33 After creating a new Azure subscription, you are tasked with making sure that custom alert rules can be created in Azure Security Center. You have created an Azure Storage account. Which of the following is the action you should take? A. You should make sure that Azure Active Directory (Azure AD) Identity Protection is removed. B. You should create a DLP policy. C. You should create an Azure Log Analytics workspace. D. You should make sure that Security Center has the necessary tier configured. |
33. Click here to View Answer
Answer:
C
Explanation:
C: You need write permission in the workspace that you select to store your custom alert.
Reference:
https://docs.microsoft.com/en-us/azure/security-center/security-center-custom-alert
| Question. 34 Your company’s Azure subscription includes an Azure Log Analytics workspace. Your company has a hundred on-premises servers that run either Windows Server 2012 R2 or Windows Server 2016, and is linked to the Azure Log Analytics workspace. The Azure Log Analytics workspace is set up to gather performance counters associated with security from these linked servers. You have been tasked with configuring alerts according to the information gathered by the Azure Log Analytics workspace. You have to make sure that alert rules allow for dimensions, and that alert creation time should be kept to a minimum. Furthermore, a single alert notification must be created when the alert is created and when the alert is sorted out. You need to make use of the necessary signal type when creating the alert rules. Which of the following is the option you should use? A. You should make use of the Activity log signal type. B. You should make use of the Application Log signal type. C. You should make use of the Metric signal type. D. You should make use of the Audit Log signal type. |
34. Click here to View Answer
Answer:
C
Explanation:
Metric alerts in Azure Monitor provide a way to get notified when one of your metrics cross a threshold. Metric alerts work on a range of multi-dimensional platform metrics, custom metrics, Application Insights standard and custom metrics.
Note: Signals are emitted by the target resource and can be of several types. Metric, Activity log, Application Insights, and Log.
Reference:
https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-metric
| Question. 35 Your company’s Azure subscription includes a hundred virtual machines that have Azure Diagnostics enabled. You have been tasked with retrieving the identity of the user that removed a virtual machine fifteen days ago. You have already accessed Azure Monitor. Which of the following options should you use? A. Application Log B. Metrics C. Activity Log D. Logs |
35. Click here to View Answer
Answer:
C
Explanation:
Azure activity logs provide insight into the operations that were performed on resources in your subscription. Activity logs were previously known as audit logs or
operational logs, because they report control-plane events for your subscriptions.
Reference:
https://docs.microsoft.com/en-us/azure/security/azure-log-audit