You have an on-premises network and an Azure virtual network.You establish a Site-to-Site VPN connection from the on-premises network to the Azure virtual network, but the connection frequently disconnects.You need to debug the IPsec tunnel from Azure.Which Azure VPN Gateway diagnostic log should you review?
You have an Azure virtual machine named VM1 that has the Web Server (IIS) server role installed. VM1 hosts a critical line-of-business (LOB) application.After the security team at your company deploys a new security baseline to VM1, users begin reporting that the application is unresponsive.You suspect that the security baseline has caused networking issues.You need to perform a network trace on VM1.What should you do?
You have an Azure virtual machine named VM1. Crash dumps for a process named Process1 are enabled for VM1.When process1.exe on VM1 crashes, a technician must access the memory dump files on the virtual machine. The technician must be prevented from accessing the virtual machine.To what should you provide the technician access?
You have a server named Server1 that runs the Remote Desktop Session Host role service. Server1 has five custom applications installed.Users who sign in to Server1 report that the server is slow. Task Manager shows that the average CPU usage on Server1 is above 90 percent. You suspect that a custom application on Server1 is consuming excessive processor capacity.You plan to create a Data Collector Set in Performance Monitor to gather performance statistics from Server1.You need to view the resources used by each of the five applications.Which object should you add to the Data Collector Set?
You plan to deploy the Azure Monitor agent to 100 on-premises servers that run Windows Server.Which parameters should you provide when you install the agent?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a server named Server1 that runs Windows Server.You need to ensure that only specific applications can modify the data in protected folders on Server1.Solution: From Virus & threat protection, you configure Controlled folder access.Does this meet the goal?