![](https://assets.isu.pub/document-structure/230128113823-0ba6361d928c9cf6324a802c5e4b03b7/v1/242d90ec96ccb015e817a61f23a58253.jpeg)
![](https://assets.isu.pub/document-structure/230128113823-0ba6361d928c9cf6324a802c5e4b03b7/v1/242d90ec96ccb015e817a61f23a58253.jpeg)
How to Prepare for AZ-801
• Perform enough practice with Microsoft system with related Microsoft AZ-801 certification subjects
• Identify the key configuration, workflow and data flow
• Understand the all Syllabus Topics of Exam which are Given in Description.
• Identify your weak areas from practice test and do more practice with system
• Repeat practice exams and try to score 100% on www.edusum.com
Q 1) You have an Azure subscription that has Microsoft Defender for Cloud enabled. You have 50 Azure virtual machines that run Windows Server. You need to ensure that any security exploits detected on the virtual machines are forwarded to Defender for Cloud. Which extension should you enable on the virtual machines?
Option.
a) Vulnerability assessment for machines
b) Microsoft Dependency agent
c) Log Analytics agent for Azure VMs
d) Guest Configuration agent
ANSWER
Q 2) You have an Azure virtual machine named VM1 that runs Windows Server. You plan to deploy a new line-of-business (LOB) application to VM1. You need to ensure that the application can create child processes. What should you configure on VM1?
Option.
a) Microsoft Defender Credential Guard
b) Microsoft Defender Application Control
c) Microsoft Defender SmartScreen
d) Exploit protection
d) Exploit protection
Q 3) You are evaluating the technical requirements tor Cluster2. What is the minimum number of Azure Site Recovery Providers that you should install?
Option.
Q 4) You have an Azure virtual machine named VM1 that runs Windows Server. You need to encrypt the contents of the disks on VM1 by using Azure Disk Encryption. What is a prerequisite for implementing Azure Disk Encryption?
Option.
a) Customer Lockbox for Microsoft Azure
b) an Azure key vault
c) a BitLocker recovery key
d) data-link layer encryption in Azure
Enjoy success with Edusum.com
b) an Azure key vault
Q 5) You have a server that runs Windows Server. The server is configured to encrypt all incoming traffic by using a connection security rule. You need to ensure that Server1 can respond to the unencrypted tracert commands initiated from computers on the same network. What should you do from Windows Defender Firewall with Advanced Security?
Option.
a) From the IPsec Settings, configure IPsec defaults.
b) Create a new custom outbound rule that allows ICMPv4 protocol connections for all profiles.
c) Change the Firewall state of the Private profile to Off.
d) From the IPsec Settings, configure IPsec exemptions.
d) From the IPsec Settings, configure IPsec exemptions.
More Info on Microsoft Certification
• For more information on Microsoft Certification please refer to FAQs
• A Microsoft certification is increasingly becoming important for the career of employees
• The fees information are for the informative purposes and do not serve as an official offering and are subject to change
• Focus on the guide for online registration and you will very soon find it out
![](https://assets.isu.pub/document-structure/230128113823-0ba6361d928c9cf6324a802c5e4b03b7/v1/8204f80fcdcf5bd16ceca48d3d84e761.jpeg)
![](https://assets.isu.pub/document-structure/230128113823-0ba6361d928c9cf6324a802c5e4b03b7/v1/f614468cae33affd703b568058e91daa.jpeg)
![](https://assets.isu.pub/document-structure/230128113823-0ba6361d928c9cf6324a802c5e4b03b7/v1/5edf684e23633d03670c9f07140103a6.jpeg)
![](https://assets.isu.pub/document-structure/230128113823-0ba6361d928c9cf6324a802c5e4b03b7/v1/3e413eab8d69235a276033be67353831.jpeg)