You have an Azure virtual machine named VM1 that runs Windows Server.You plan to deploy a new line-of-business (LOB) application to VM1.You need to prevent the application from creating child processes.What should you configure on VM1?
Your network contains an Active Directory Domain Services (AD DS) domain. All domain members have Microsoft Defender Credential Guard with UEFI lock configured.In the domain, you deploy a server named Server1 that runs Windows Server. You disable Credential Guard on Server1.You need to ensure that Server1 is NOT subject to Credential Guard restrictions.What should you do next?
You have three servers named Server1, Server2, and Server3 that run Windows Server. The servers have the Hyper-V server role installed and are configured in a Storage Spaces Direct cluster named Cluster1.Cluster1 hosts a virtual machine named VM1 that has Windows Admin Center installed.You manage all servers and clusters by using Windows Admin Center.You purchase an Azure subscription.You need to configure email alerts in Azure Monitor for the following:✑ Disk Capacity Utilization Over 80 % for 10 Minutes✑ Any critical alert in the cluster system event log✑ Memory Utilization over 95 % for 10 Minutes✑ Heartbeat fewer than 5 beats for 5 Minutes✑ CPU Utilization over 85 % for 10 Minutes✑ Any health service faults for the clusterThe solution must use the minimum amount of administrative effort.What should you do?
You have three servers named Server1, Server2, and Server3 that run Windows Server and have the Hyper-V server role installed. Server1 hosts an AzureMigrate appliance named Migrate1.You plan to migrate virtual machines to Azure.You need to ensure that any new virtual machines created on Server1, Server2, and Server3 are available in Azure Migrate.What should you do?
DRAG DROP -You are planning the implementation of Cluster2 to support the on-premises migration plan.You need to ensure that the disks on Cluster2 meet the security requirements.In which order should you perform the actions? To answer, move all actions from the list of actions to the answer area and arrange them in the correct order.Select and Place:
HOTSPOT -You need to implement a security policy solution to authorize the applications. The solution must meet the security requirements.Which service should you use to enforce the security policy, and what should you use to manage the policy settings? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point.Hot Area: