Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft AZ-700 Exam - Topic 13 Question 40 Discussion

Actual exam question for Microsoft's AZ-700 exam
Question #: 40
Topic #: 13
[All AZ-700 Questions]

You have an Azure subscription that contains the resources shown in the following table.

You need to ensure that VM1 and VM2 can connect only to storage1. The solution must meet the following requirements:

* Prevent VM1 and VM2 from accessing any other storage accounts.

* Ensure that storage1 is accessible from the internet.

What should you use?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Joseph
4 months ago
I’m leaning towards a private link for this scenario.
upvoted 0 times
...
Norah
5 months ago
A service endpoint policy sounds like a solid choice too!
upvoted 0 times
...
Bulah
5 months ago
Wait, can storage1 really be accessible from the internet with a private endpoint?
upvoted 0 times
...
Gerald
5 months ago
Definitely agree, NSGs won't restrict access to other storage accounts.
upvoted 0 times
...
Avery
5 months ago
I think a private endpoint is the way to go for secure access.
upvoted 0 times
...
Andra
5 months ago
I’m leaning towards a private link since it allows secure connections, but I’m unsure if it meets the requirement of being accessible from the internet.
upvoted 0 times
...
Adaline
5 months ago
I feel like a service endpoint policy could work here, but I’m not clear on how it would handle internet accessibility for storage1.
upvoted 0 times
...
Brandon
5 months ago
I remember practicing a question about private endpoints, and they seem like a good fit for ensuring secure access to specific resources.
upvoted 0 times
...
Kenneth
5 months ago
I think we might need a network security group for this, but I'm not entirely sure if it can restrict access to just one storage account.
upvoted 0 times
...
Celia
6 months ago
For a Rolling Update, the first thing you need to do is make a full backup of your environment. That's why I think D is the correct answer here. Trying to update without a proper backup could lead to some serious issues if something goes wrong.
upvoted 0 times
...
Adela
6 months ago
I think the answer is B. Custom Transaction Line fields seem like the most logical way to add a column to the Item sublist on a Sales Order.
upvoted 0 times
...
Brittani
6 months ago
Okay, let me think this through step-by-step. We're looking for a tool that provides information on which parts of the program code are run during a test. That sounds like it's describing a code coverage tool, so I'll go with option A.
upvoted 0 times
...
Joanna
6 months ago
I'm pretty confident I know the answer to this. Data masking is used to protect sensitive data, not for authentication or remote access.
upvoted 0 times
...
Eleonore
6 months ago
I'm confident I can nail this question. Objectives are all about setting specific, measurable targets, unlike the more broad and aspirational mission statement.
upvoted 0 times
...
Eliseo
6 months ago
I practiced a similar question about PPOs and HMOs; I think PPOs do have more risk because they rely more on networks.
upvoted 0 times
...

Save Cancel