{"id":87660,"date":"2023-03-16T03:31:11","date_gmt":"2023-03-16T09:01:11","guid":{"rendered":"https:\/\/www.whizlabs.com\/blog\/?p=87660"},"modified":"2023-03-20T06:19:16","modified_gmt":"2023-03-20T11:49:16","slug":"microsoft-az-801-exam-questions","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/","title":{"rendered":"25 Free Question on AZ-801:Configuring Windows Server Hybrid Advanced Services"},"content":{"rendered":"<p>Planning to take <a href=\"https:\/\/www.whizlabs.com\/az-801-configuring-windows-server-hybrid-advanced-services\/\" target=\"_blank\" rel=\"noopener\">AZ-801:Configuring Windows Server Hybrid Advanced Services Certification<\/a>? Then you must have pratical skills to gain confidence in passing the exam.<\/p>\n<div class=\"group w-full text-gray-800 dark:text-gray-100 border-b border-black\/10 dark:border-gray-900\/50 bg-gray-50 dark:bg-[#444654]\">\n<div class=\"text-base gap-4 md:gap-6 md:max-w-2xl lg:max-w-2xl xl:max-w-3xl p-4 md:py-6 flex lg:px-0 m-auto\">\n<div class=\"relative flex w-[calc(100%-50px)] flex-col gap-1 md:gap-3 lg:w-[calc(100%-115px)]\">\n<div class=\"flex flex-grow flex-col gap-3\">\n<div class=\"min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>We have compiled <strong>20+ free AZ-801 practice questions<\/strong> to provide you with complete knowledge on configuring Windows Server. These practice exam questions looks alike practice questions in the real exam format.<\/p>\n<p>Once you become familiar with the AZ-801 exam pattern and difficulty, you\u2019re in a perfect position to ace your exam at first time. AZ-801 practice exams help you to identify your strengths and weaknesses so that you know where to focus your study when preparing for your AZ-801\u00a0 certification exam.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 ez-toc-wrap-left counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ea7e02;color:#ea7e02\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ea7e02;color:#ea7e02\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#What_is_AZ-801_Configuring_Windows_Server_Hybrid_Advanced_Services_Certification\" >What is AZ-801:Configuring Windows Server Hybrid Advanced Services Certification?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Secure_Windows_Server_On-premises_and_Hybrid_Infrastructures\" >Domain: Secure Windows Server On-premises and Hybrid Infrastructures<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Secure_Windows_Server_On-premises_and_Hybrid_Infrastructures-2\" >Domain: Secure Windows Server On-premises and Hybrid Infrastructures<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Secure_Windows_Server_On-premises_and_Hybrid_Infrastructures-3\" >Domain: Secure Windows Server On-premises and Hybrid Infrastructures<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Implement_and_Manage_Windows_Server_High_Availability\" >Domain: Implement and Manage Windows Server High Availability<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Implement_Disaster_Recovery\" >Domain: Implement Disaster Recovery<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Implement_Disaster_Recovery-2\" >Domain: Implement Disaster Recovery<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Implement_Disaster_Recovery-3\" >Domain: Implement Disaster Recovery<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Migrate_Servers_and_Workloads\" >Domain: Migrate Servers and Workloads<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Migrate_Servers_and_Workloads-2\" >Domain: Migrate Servers and Workloads\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Migrate_Servers_and_Workloads-3\" >Domain: Migrate Servers and Workloads\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Migrate_Servers_and_Workloads-4\" >Domain: Migrate Servers and Workloads\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Monitor_and_Troubleshoot_Windows_Server_Environments\" >Domain: Monitor and Troubleshoot Windows Server Environments<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Monitor_and_Troubleshoot_Windows_Server_Environments-2\" >Domain: Monitor and Troubleshoot Windows Server Environments<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Monitor_and_Troubleshoot_Windows_Server_Environments-3\" >Domain: Monitor and Troubleshoot Windows Server Environments<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Implement_Disaster_Recovery-4\" >Domain: Implement Disaster Recovery<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Implement_Disaster_Recovery-5\" >Domain: Implement Disaster Recovery<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Implement_Disaster_Recovery-6\" >Domain: Implement Disaster Recovery<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Implement_Disaster_Recovery-7\" >Domain: Implement Disaster Recovery<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Domain_Migrate_Servers_and_Workloads-5\" >Domain: Migrate Servers and Workloads\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-questions\/#Summary\" >Summary<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"What_is_AZ-801_Configuring_Windows_Server_Hybrid_Advanced_Services_Certification\"><\/span>What is AZ-801:Configuring Windows Server Hybrid Advanced Services Certification?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/certifications\/exams\/az-801\" target=\"_blank\" rel=\"nofollow noopener\">AZ-801:Configuring Windows Server Hybrid Advanced Services certification<\/a> intends mainly for IT professionals who excel in managing and operating hybrid environments that integrate Windows Server and Azure. AZ-801 practice questions are designed to evaluate the candidate&#8217;s expertise in various aspects of Windows Server hybrid services, including configuring and managing Azure services, implementing robust Azure security, optimizing Azure solutions, and managing hybrid identities.<\/p>\n<p>By preparing diligently and mastering critical topics such as <strong>Azure virtual machines, Azure Active Directory, Azure networking<\/strong>, and more, candidates can position themselves for success and achieve their career goals.<\/p>\n<blockquote><p>Read More : Preparation Guide for <a href=\"https:\/\/www.whizlabs.com\/blog\/microsoft-az-801-exam-preparation-guide\/\" target=\"_blank\" rel=\"noopener\">AZ-801: Configuring Windows Server Hybrid Advanced Services<\/a> Certification exam<\/p><\/blockquote>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Secure_Windows_Server_On-premises_and_Hybrid_Infrastructures\"><\/span><b>Domain: Secure Windows Server On-premises and Hybrid Infrastructures<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><b>Question 1<\/b><strong> : You have an Azure VM named VM2 that runs Windows Server. You are planning the deployment of a new LOB (line-of-business) application to VM2. You must ensure that the application is not capable of creating the child processes. What would you configure on VM2?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Microsoft Defender SmartScreen<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Microsoft Defender Credential Guard<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Exploit Protection<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Microsoft Defender Application Control<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Exploit protection\u00a0helps in protecting against malware that utilizes exploits to infect devices and spread. It consists of several mitigations that you can apply to either the operating system (OS) or individual apps. Exploit Protection also allows users to block particular applications from creating the child processes or executing Win32k system calls.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. Microsoft Defender SmartScreen helps you in identifying reported phishing and malware websites and making informed and wise decisions about downloads.\u00a0<\/span><\/p>\n<p><b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> It utilizes virtualization-based security for isolating the secrets to allow only the privileged system software to access them.\u00a0<\/span><\/p>\n<p><b>Option C is correct.<\/b><span style=\"font-weight: 400;\"> Exploit Protection allows the users to block particular applications from creating the child processes.<\/span><\/p>\n<p><b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> It is designed for protecting PCs against malware and other untrusted software. It is not the right solution to make the apps not capable of creating the child processes.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about Exploit protection, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/enable-exploit-protection?WT.mc_id=ravikirans&amp;view=o365-worldwide\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/enable-exploit-protection<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Secure_Windows_Server_On-premises_and_Hybrid_Infrastructures-2\"><\/span><b>Domain: Secure Windows Server On-premises and Hybrid Infrastructures<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><b>Question 2 <\/b><strong>: Would you recommend someone to deploy a Windows Defender Application Control policy with\u00a0Enforcement Enabled and then later deploy a policy with\u00a0Audit-Only\u00a0to the same device?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Yes<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>No<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Windows Defender Application Control is built for protecting PCs against malware and other untrusted software. It is recommended not to deploy a policy with Enforcement Enabled, and then later deploy a policy with Audit-Only\u00a0to the same device. This type of configuration may result in untrusted software being allowed to run.<\/span><\/p>\n<p><b>Reference:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">To know more about Windows Defender Application Control, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/mem\/configmgr\/protect\/deploy-use\/use-device-guard-with-configuration-manager?WT.mc_id=ravikirans\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/mem\/configmgr\/protect\/deploy-use\/use-device-guard-with-configuration-manager<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Secure_Windows_Server_On-premises_and_Hybrid_Infrastructures-3\"><\/span><b>Domain: Secure Windows Server On-premises and Hybrid Infrastructures<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><b>Question 3 :<\/b> <strong>In which of the following attacks, automated tools are used by the hackers to enter lists of credentials against many different company login portals?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Brute force attack\u00a0<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Dictionary attack<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Password spraying attack<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Credential stuffing attack<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>Spidering<\/span><\/p>\n<p><b>Correct Answer: D<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Credential stuffing attack is one of the techniques used by hackers where the hackers utilize automated tools<\/span> <span style=\"font-weight: 400;\">to enter lists of credentials against many different company login portals.<\/span><\/p>\n<p><b>Option A is incorrect. <\/b><span style=\"font-weight: 400;\">In this type of attack, the hackers try many different potential password combinations until they hit upon the right one.<\/span><\/p>\n<p><b>Option B is incorrect. \u00a0<\/b><span style=\"font-weight: 400;\">A dictionary attack is a specific type of brute force attack that includes trying words found in the dictionary as possible passwords.<\/span><\/p>\n<p><b>Option C is incorrect<\/b><span style=\"font-weight: 400;\">. In this type of attack, a hacker enters a known username or other account identifier and tries several common passwords to know if they work.<\/span><\/p>\n<p><b>Option D is correct<\/b><span style=\"font-weight: 400;\">. In this type of attack, automated tools are used by the hackers to enter lists of credentials against many different company login portals.<\/span><\/p>\n<p><b>Option E is incorrect<\/b><span style=\"font-weight: 400;\">. In Spidering, the Malicious users gather as much information as possible about a hacking target and then try the various password combinations formed using that data.<\/span><\/p>\n<p><b>References:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">To know more about how to set and manage Active Directory Password Policy, please visit the below-given links: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/windows\/it-pro\/windows-server-2012-r2-and-2012\/hh994572(v=ws.11)\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/previous-versions\/windows\/it-pro\/windows-server-2012-r2-and-2012\/hh994572(v=ws.11)<\/span><\/a>, <a href=\"https:\/\/blog.netwrix.com\/2021\/07\/14\/active-directory-password-policy\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/blog.netwrix.com\/2021\/07\/14\/active-directory-password-policy\/<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><b>Domain: Secure Windows Server On-premises and Hybrid Infrastructures<\/b><\/p>\n<p><b>Question 4 : <\/b><strong>Application, network, and NAT are three different types of rule collections supported by the Azure Firewall. Out of these, which rule type defines the protocol, destination port, source IP address and destination IP address.<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Application Rules<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Network Rules<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>NAT Rules<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>None of these<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Network rules contain source addresses, protocols, destination ports, and destination addresses as a means to control the flow of network traffic.<\/span><\/p>\n<p><b>Option A is incorrect.<\/b> <span style=\"font-weight: 400;\">Application rules configure FQDNs that can be accessed from a subnet.<\/span><\/p>\n<p><b>Option B is correct. <\/b><span style=\"font-weight: 400;\">Network Rules define<\/span> <span style=\"font-weight: 400;\">the protocol, destination port, source IP address and destination IP address.<\/span><\/p>\n<p><b>Option C is incorrect<\/b><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">NAT rules are used to configure DNAT (Destination Network Address Translation) rules to allow incoming Internet connections.<\/span><\/p>\n<p><b>Option D is incorrect. <\/b><span style=\"font-weight: 400;\">Network rules defines the protocol, destination port, source IP address and destination IP address.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about Azure Firewall, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/firewall\/tutorial-firewall-deploy-portal\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/firewall\/tutorial-firewall-deploy-portal<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><b>Domain: Secure Windows Server On-premises and Hybrid Infrastructures<\/b><\/p>\n<p><b>Question 5 : <\/b><strong>When Azure Disk Encryption is enabled on a Linux VM, which of the following technologies is used by Azure Disk encryption to encrypt the file system volumes residing on VM disks?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>BitLocker Drive Encryption<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>DM-Crypt<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Key Vault<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>None of these<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\"> \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Azure Disk Encryption helps in protecting and safeguarding your data to accomplish your organizational security and compliance needs. It utilizes\u00a0DM-Crypt\u00a0feature of Linux to offer volume encryption to the operating system and Azure VM data disks and is connected to\u00a0Azure Key Vault for controlling and managing the encryption secrets and keys of disks easy.<\/span><\/p>\n<p><b>Option A is incorrect.<\/b><span style=\"font-weight: 400;\"> BitLocker Drive Encryption is used by Azure Disk Encryption for Windows.<\/span><\/p>\n<p><b>Option B is correct<\/b><span style=\"font-weight: 400;\">. For Linux VMs, Azure Disk Encryption uses DM-Crypt.<\/span><\/p>\n<p><b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> Key Vault is integrated with Azure Disk Encryption to manage the disk-encryption keys and secrets.<\/span><\/p>\n<p><b>Option D is incorrect<\/b><span style=\"font-weight: 400;\">. Azure Disk Encryption uses the DM-Crypt\u00a0feature of Linux to offer volume encryption for the OS and Azure VM data disks.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about Azure Disk Encryption for Linux VMs, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-machines\/linux\/disk-encryption-overview\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-machines\/linux\/disk-encryption-overview<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><b>Domain: Implement and Manage Windows Server High Availability<\/b><\/p>\n<p><b>Question 6 : <\/b><strong>The quorum configuration in a failover cluster determines the number of failures that the cluster can sustain. Which of the following cmdlet is used to configure the quorum options for a failover cluster?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Set-ClusterQuorum<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Set-ClusterFaultDomain<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Set-QuorumForFailoverCluster<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Set-ADClusterQuorum<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The\u00a0Set-ClusterQuorum\u00a0command configures quorum options for a failover cluster. This quorum configuration determines the number of failures that can be sustained by the cluster. In case of an additional failure, the cluster must stop running. The possible failures are failures of nodes or, in some conditions, of a disk witness (which consists of a copy of the cluster configuration) or even a file share witness.<\/span><\/p>\n<p><b>Option A is correct.<\/b><span style=\"font-weight: 400;\"> Set-ClusterQuorum is the right cmdlet used to configure the quorum options for a failover cluster.<\/span><\/p>\n<p><b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> Set-ClusterFaultDomain\u00a0cmdlet is used to update an existing\u00a0cluster fault domain.<\/span><\/p>\n<p><b>Option C is incorrect. <\/b><span style=\"font-weight: 400;\">Set-QuorumForFailoverCluster is not the right cmdlet.<\/span><\/p>\n<p><b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> Set-ADClusterQuorum isn&#8217;t the right cmdlet.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about Set-ClusterQuorum command, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/powershell\/module\/failoverclusters\/set-clusterquorum?view=windowsserver2022-ps\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/powershell\/module\/failoverclusters\/set-clusterquorum<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><b>Domain: Implement and Manage Windows Server High Availability<\/b><\/p>\n<p><b>Question 7 : <\/b><strong>Which of the following tasks do you need to perform as an administrator to use CAU (Cluster-Aware Updating) in remote-updating mode?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Install a clustered role<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Install the Failover Clustering Tools on a remote computer\u00a0<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Pause cluster nodes<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Configure Quorum<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To use CAU in remote-updating mode, you need to install the Failover Clustering Tools on a remote computer with direct connectivity to the cluster nodes.<\/span><\/p>\n<p><b>Option A is incorrect.<\/b><span style=\"font-weight: 400;\"> A clustered role is needed while using self-updating mode.<\/span><\/p>\n<p><b>Option B is correct<\/b><span style=\"font-weight: 400;\">.<\/span> <span style=\"font-weight: 400;\">To use CAU in remote-updating mode, you need to install the Failover Clustering Tools on a remote computer with direct connectivity to the cluster nodes.<\/span><\/p>\n<p><b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> You don\u2019t need to pause cluster nodes to use CAU.<\/span><\/p>\n<p><b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> Configuring quorum is not the right task.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about Cluster-Aware Updating, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/failover-clustering\/cluster-aware-updating\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/windows-server\/failover-clustering\/cluster-aware-updating<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><b>Domain: Implement and Manage Windows Server High Availability<\/b><\/p>\n<p><b>Question 8 : <\/b><strong>You are having a failover cluster known as Cluster2 with the following configuration:\u00a0<\/strong><br \/>\n<strong>Number of Nodes: 8<\/strong><br \/>\n<strong>Quorum: Dynamic quorum\u00a0<\/strong><br \/>\n<strong>Witness: File share, Dynamic witness\u00a0<\/strong><br \/>\n<strong>How many nodes can fail simultaneously (at maximum) while maintaining quorum?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>1<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>2<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>3<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>4<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>5<\/span><\/p>\n<p><b>Correct Answer: D<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The most important thing to note is that the question is asking about the number of nodes failing simultaneously not one after the other.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With 8 nodes and 1 witness, there are a total of 9 votes. For maintaining the quorum, it requires 5 votes to be available (5 votes is the majority of 9). It indicates that a minimum of 4 nodes plus the witness are required to remain online for the cluster to remain functional. So, the maximum number of nodes that can fail simultaneously is 4.\u00a0<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. 1 is not the right answer.<\/span><\/p>\n<p><b>Option B is incorrect. <\/b><span style=\"font-weight: 400;\">The question asks about the maximum simultaneous failure that is 4.<\/span><\/p>\n<p><b>Option C is incorrect<\/b><span style=\"font-weight: 400;\">. 3 is not the right answer.<\/span><\/p>\n<p><b>Option D is correct<\/b><span style=\"font-weight: 400;\">. The question asks about the maximum simultaneous failure which is 4.<\/span><\/p>\n<p><b>Option E is incorrect<\/b><span style=\"font-weight: 400;\">. The maximum number of nodes that can fail simultaneously is 4.<\/span><\/p>\n<p><b>Reference:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">To know more about cluster and pool quorum, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/storage\/storage-spaces\/understand-quorum\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/windows-server\/storage\/storage-spaces\/understand-quorum<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><b>Domain: Implement and Manage Windows Server High Availability<\/b><\/p>\n<p><b>Question 9 :<\/b> <strong>To use CAU (Cluster-Aware Updating), you need to install the Failover Clustering feature in Windows Server and create a failover cluster. Which of the following tools can you use to install the Failover Clustering feature?\u00a0<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Add Roles and Features Wizard in Server Manager<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Install-Windows Feature Windows PowerShell cmdlet<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>DISM (Deployment Image Servicing and Management) command-line tool<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>All the above<\/span><\/p>\n<p><b>Correct Answer: D<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To use Cluster-Aware Updating, install the Failover Clustering feature in Windows Server and create a failover cluster. Components supporting CAU functionality are installed automatically on each cluster node.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The following tools can be used to install the Failover Clustering feature:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Add Roles and Features Wizard in Server Manager<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Install-WindowsFeature Windows PowerShell cmdlet<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">DISM command-line tool<\/span><\/li>\n<\/ul>\n<p><b>Option A is incorrect.<\/b><span style=\"font-weight: 400;\"> All of the given tools can be used to install failover clustering features.<\/span><\/p>\n<p><b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> You can use any of the given tools to install the failover clustering feature.<\/span><\/p>\n<p><b>Option C is incorrect<\/b><span style=\"font-weight: 400;\">. DISM is not the only mandatory tool to be used.<\/span><\/p>\n<p><b>Option D is correct<\/b><span style=\"font-weight: 400;\">. All of the given tools can be used to install failover clustering features.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about Cluster-Aware Updating, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/failover-clustering\/cluster-aware-updating\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/windows-server\/failover-clustering\/cluster-aware-updating<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Implement_and_Manage_Windows_Server_High_Availability\"><\/span><b>Domain: Implement and Manage Windows Server High Availability<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Question 10 : You are having a Storage Spaces Direct configuration that has persistent memory and consists of the data volumes as demonstrated in the below table.<img decoding=\"async\" class=\"aligncenter size-full wp-image-87672\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/801-10.1.webp\" alt=\"\" width=\"204\" height=\"90\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/801-10.1.webp 204w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/801-10.1-150x66.webp 150w\" sizes=\"(max-width: 204px) 100vw, 204px\" \/> <\/strong><strong>Now, you are further planning to add the data volumes to Storage Spaces Direct as demonstrated in the below table.<img decoding=\"async\" class=\"aligncenter size-full wp-image-87673\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/801-10.2.webp\" alt=\"\" width=\"198\" height=\"80\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/801-10.2.webp 198w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/801-10.2-150x61.webp 150w\" sizes=\"(max-width: 198px) 100vw, 198px\" \/><\/strong><strong>On which of the following volumes can you use direct access (DAX)?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Both Volume 1 and 3\u00a0<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Both Volume 2 and 4 only<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Either Volume 1 or Volume 3<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Either volume 2 or volume 4<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Direct access can be used only on a single volume and that volume must be NTFS. Here, in the given scenario, volume 1 and volume 3 are NTFS and DAX can be configured on any one of them. If you decide to go with volume 1 there would be a need to reformat the volume.\u00a0\u00a0<\/span><\/p>\n<p><b>Option A is incorrect.<\/b><span style=\"font-weight: 400;\"> Direct access can be used only on a single volume, not both Volume 1 and Volume 3.<\/span><\/p>\n<p><b>Option B is incorrect<\/b><span style=\"font-weight: 400;\">. To use DAX, the volume must be NTFS. DAX can&#8217;t be applied to ReFS.<\/span><\/p>\n<p><b>Option C is correct<\/b><span style=\"font-weight: 400;\">. You can use DAX on any one volume out of volume 1 and volume 3.<\/span><\/p>\n<p><b>Option D is incorrect<\/b><span style=\"font-weight: 400;\">. DAX can\u2019t be applied on a ReFS volume.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about Direct Access, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/storage\/storage-spaces\/persistent-memory-direct-access\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/windows-server\/storage\/storage-spaces\/persistent-memory-direct-access<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Implement_Disaster_Recovery\"><\/span><b>Domain: Implement Disaster Recovery<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Question 11 : From the below-given list, choose the type of computers on which you can&#8217;t install Azure Backup Server. (Select all that are applicable)<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>A computer that runs as a domain controller<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>A computer that has an Application Server role installed on it<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>A computer that runs Exchange Server on it<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>A computer that is a node of a cluster<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>All of these<\/span><\/p>\n<p><b>Correct Answer: E<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Azure Backup Server has been designed to run on a single-purpose, dedicated server. Azure Backup Server can\u2019t be installed on:<\/span><\/p>\n<p><b>Option A is incorrect.<\/b><span style=\"font-weight: 400;\"> Azure Backup Server can\u2019t be installed on all of the given computer types.<\/span><\/p>\n<p><b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> It&#8217;s true that you can&#8217;t install Azure Backup Server on a computer having an Application server role installed on it but all other options are also correct.<\/span><\/p>\n<p><b>Option C is incorrect<\/b><span style=\"font-weight: 400;\">. Azure Backup Server can\u2019t be installed on any of the given computer types.<\/span><\/p>\n<p><b>Option D is incorrect<\/b><span style=\"font-weight: 400;\">. You can\u2019t install Azure Backup Server not only on the computer that is a node of a cluster, but also all of the given computer types.<\/span><\/p>\n<p><b>Option E is correct<\/b><span style=\"font-weight: 400;\">. Azure Backup Server can\u2019t be installed on all of the given computer types.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about installing and upgrading Azure Backup Server, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/backup\/backup-azure-microsoft-azure-backup?WT.mc_id=ravikirans\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/backup\/backup-azure-microsoft-azure-backup<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Implement_Disaster_Recovery-2\"><\/span><b>Domain: Implement Disaster Recovery<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Question 12 : There are 3 Azure virtual machines (VMs) named VM1, VM2, and VM3 which host a multi tier app. You plan the implementation of Azure Site Recovery. You are required to make sure that all virtual machines fail over as a group. Which of the following would you configure?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Availability Zone<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Availability set<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>A recovery plan<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>None of these<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">R<\/span><span style=\"font-weight: 400;\">ecovery plans can be used and configured for customizing and sequencing the failover and recovery of multi-tier apps running on several VMs. Machines are grouped together in a recovery plan, and scripts and manual actions can be optionally added. You can integrate recovery plans with Azure automation runbooks.<\/span><\/p>\n<p><b>Option A is incorrect.<\/b> <span style=\"font-weight: 400;\">Azure availability zones<\/span><span style=\"font-weight: 400;\">\u00a0are physically separate locations within every\u00a0<\/span><span style=\"font-weight: 400;\">Azure<\/span><span style=\"font-weight: 400;\">\u00a0region that are tolerant to local failures. These are not configured for the given purpose.<\/span><\/p>\n<p><b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> You don\u2019t need to configure the availability set for the given purpose.<\/span><\/p>\n<p><b>Option C is correct<\/b><span style=\"font-weight: 400;\">.<\/span> <span style=\"font-weight: 400;\">R<\/span><span style=\"font-weight: 400;\">ecovery plans can be used and configured for customizing and sequencing the failover and recovery of multi-tier apps running on several VMs.<\/span><\/p>\n<p><b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> You need to configure a recovery plan <\/span><span style=\"font-weight: 400;\">to make sure that all virtual machines failover as a group.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about Azure Site Recovery, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/site-recovery\/site-recovery-overview\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/site-recovery\/site-recovery-overview<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Implement_Disaster_Recovery-3\"><\/span><b>Domain: Implement Disaster Recovery<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><b>Question 13 : <\/b><strong>There are 2 servers known as Server1 and Server2 both running Windows Server. Both of the servers have installed Hyper-V server role. Server1 hosts 3 VMS named VM1, VM2, and VM3. The VMs replicate to Server2 and Server1 faces a hardware failure. Now, You need to bring all 3 VMs &#8211; VM1, VM2, and VM3 back online at the earliest possible. From the Hyper-V Manager console on Server2, which of the following would you run for each VM?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Start<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Planned failover<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Unplanned failover<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Multifeed failover<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With unplanned failover, <\/span><span style=\"font-weight: 400;\">you can recover from the latest recovery point or from previous recovery points. It can be run by right-clicking on the replica virtual machine and selecting\u00a0Replication<\/span><b>\u00a0&gt;\u00a0<\/b><span style=\"font-weight: 400;\">Unplanned Failover\u00a0from Hyper-V Manager or Failover Clustering Manager.\u00a0<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. Running starts won\u2019t help in meeting the goal.<\/span><\/p>\n<p><b>Option B is incorrect<\/b><span style=\"font-weight: 400;\">. Planned failover makes prerequisite checks to make sure that there is no data loss. It checks that the primary VM is shut down before initiating the failover.<\/span><\/p>\n<p><b>Option C is correct.<\/b><span style=\"font-weight: 400;\"> In the given scenario, you need to run an unplanned failover <\/span><span style=\"font-weight: 400;\">to bring all 3 VMs back online at the earliest possible.<\/span><\/p>\n<p><b>Option D is incorrect<\/b><span style=\"font-weight: 400;\">. There is nothing like a multifeed failover.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about Hyper-V Replica, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/virtualization\/hyper-v\/manage\/set-up-hyper-v-replica\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/windows-server\/virtualization\/hyper-v\/manage\/set-up-hyper-v-replica<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Migrate_Servers_and_Workloads\"><\/span><b>Domain: Migrate Servers and Workloads<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><b>Question 14 <\/b><strong>: There are two file servers known as Server1 and Server2 and both run Windows Server. There is a shared folder named Data in Server1. Data has 10 TB of data. You are looking towards decommissioning Server1. Therefore, you want to migrate the files from the shared folder Data on Server1 to a new shared folder on Server2.\u00a0<\/strong><br \/>\n<strong>The solution is required to meet the below-given requirements:\u00a0<\/strong><\/p>\n<ul>\n<li><strong>You need to ensure that file, share, and folder permissions are copied. <\/strong><\/li>\n<li><strong>After the initial copy happens, ensure that modifications in \\\\Server1\\Data can be synced to the destination without initiating a full copy.\u00a0<\/strong><\/li>\n<li><strong>Administrative effort should be minimized.\u00a0<\/strong><\/li>\n<\/ul>\n<p><strong>What would you use to achieve the given requirement?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Azcopy<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Storage Migration service<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Storage Replica<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Xcopy<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation<\/b><span style=\"font-weight: 400;\">:\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With <\/span><span style=\"font-weight: 400;\">Storage Migration Service, it becomes easy to migrate the storage to Azure or Windows Server. It offers a graphical tool that stores data on Linux, Windows, and NetApp CIFS servers. After that it moves data to Azure VMs and other new servers. It also gives the option to pass on the server identity to the destination server to allow users and apps access their data without modifying paths or links.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. AzCopy is a command-line utility that is used to copy files or blobs to or from a storage acco<\/span><span style=\"font-weight: 400;\">unt.<\/span><\/p>\n<p><b>Option B is correct. <\/b><span style=\"font-weight: 400;\">Using Storage Migration Service will ensure that all the given requirements are met.<\/span><\/p>\n<p><b>Option C is incorrect. <\/b><span style=\"font-weight: 400;\">Storage Replica\u00a0is not the best solution to meet the given requirements.<\/span><\/p>\n<p><b>Option D is incorrect. <\/b><span style=\"font-weight: 400;\">In the given scenario, Xcopy doesn\u2019t suit best.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about Storage Migration Service, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/storage\/storage-migration-service\/overview?WT.mc_id=ravikirans\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/windows-server\/storage\/storage-migration-service\/overview<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Migrate_Servers_and_Workloads-2\"><\/span><b>Domain: Migrate Servers and Workloads\u00a0<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><b>Question 15 : <\/b><strong>Complete the statement below:<\/strong><br \/>\n<strong>You have been asked to assign the Virtual Machine Contributor role to an Azure account. Assigning the VM contributor role to an Azure account will provide the permission to \u2026\u2026\u2026\u2026..<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Create a VM in the selected resource group<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Create a VM in the selected virtual network.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Write to an Azure managed disk<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>All of the above<\/span><\/p>\n<p><b>Correct Answer: D<\/b><\/p>\n<p><b>Explanation:\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Assigning the VM Contributor role to the Azure account will provide the permission of:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">creating a VM in the selected resource group\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">creating a VM in the selected virtual network.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Writing to an Azure managed disk.<\/span><\/li>\n<\/ul>\n<p><b>Option A is incorrect.<\/b><span style=\"font-weight: 400;\"> Assigning the VM Contributor role to the Azure account will provide all the given permissions, not just one.<\/span><\/p>\n<p><b>Option B is incorrect<\/b><span style=\"font-weight: 400;\">. Assigning the VM Contributor role to the Azure account will provide all the given permissions.<\/span><\/p>\n<p><b>Option C is incorrect<\/b><span style=\"font-weight: 400;\">. Assigning the VM Contributor role to the Azure account will provide all the given permissions.<\/span><\/p>\n<p><b>Option D is correct.<\/b><span style=\"font-weight: 400;\"> All the given permissions will be provided.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about migrating machines as physical servers to Azure, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/migrate\/tutorial-migrate-physical-virtual-machines?WT.mc_id=ravikirans\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/migrate\/tutorial-migrate-physical-virtual-machines<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Migrate_Servers_and_Workloads-3\"><\/span><b>Domain: Migrate Servers and Workloads\u00a0<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><b>Question 16 : <\/b><strong>There are 2 servers having the Web Server (IIS) server role installed. The configuration for the servers is as in the below table:<img decoding=\"async\" class=\"aligncenter size-full wp-image-87674\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/801-16.webp\" alt=\"\" width=\"463\" height=\"111\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/801-16.webp 463w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/801-16-300x72.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/801-16-150x36.webp 150w\" sizes=\"(max-width: 463px) 100vw, 463px\" \/><\/strong><strong>Both of the servers have been configured for enabling website deployment with the help of the Web Deployment Tool. Server1 is hosting a website titled Site1 with Web Deploy Publishing configured. As an administrator, you plan the migration of Site1 to Server2. To achieve this, you need to execute a pull synchronization of Site1 by utilizing the Web Deployment Agent Service.<\/strong><br \/>\n<strong>Complete the following command.<\/strong><br \/>\n<strong>msdeploy -verb:sync -source:\u00a0 \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.. &#8211; dest: \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>apphostconfig=&#8221;Site1&#8243;,computername=Server2 and apphostconfig=&#8221;Site1\u201d<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>apphostconfig=&#8221;Site1&#8243; and apphostconfig=&#8221;Site1\u201d,computername=Server2<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>apphostconfig=&#8221;Site1&#8243; and apphostconfig=&#8221;Site1\u201d,computername=Server1<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>apphostconfig=&#8221;Site1&#8243;,computername=Server1 and apphostconfig=&#8221;Site1\u201d<\/span><\/p>\n<p><b>Correct Answer: D<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The command to be used to pull synchronization of Site 1 in the given scenario is:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">msdeploy -verb:sync -source:\u00a0 apphostconfig=&#8221;Site1&#8243;,computername=Server1 &#8211; dest: apphostconfig=&#8221;Site1\u201d<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. In the command, the computername would be Server1, not Server2.<\/span><\/p>\n<p><b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> The given command is not correct.<\/span><\/p>\n<p><b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> Using the given option won&#8217;t result in the right command.<\/span><\/p>\n<p><b>Option D is correct.<\/b><span style=\"font-weight: 400;\"> The right command is msdeploy -verb:sync -source:\u00a0 apphostconfig=&#8221;Site1&#8243;,computername=Server1 &#8211; dest: apphostconfig=&#8221;Site1\u201d.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about synchronizing IIS, please visit the below given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/iis\/publish\/using-web-deploy\/synchronize-iis\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/iis\/publish\/using-web-deploy\/synchronize-iis<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Migrate_Servers_and_Workloads-4\"><\/span><b>Domain: Migrate Servers and Workloads\u00a0<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><b>Question 17 : <\/b><strong>After you raise the domain functional level to a higher level, you realize that there is a domain controller of an earlier version and therefore the domain functional level should be changed back to an older level.\u00a0<\/strong><br \/>\n<strong>Is it possible to change back the domain functional level to an older level?\u00a0<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Yes<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>No<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After the domain functional level is increased to a higher level, it is possible to change it back to an older level with the help of forest recovery. This restriction occurs because the features often modify the communication among the domain controllers, or the features modify the storage of the Active Directory (AD) data in the database.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about raising AD domain and forest functional levels, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/identity\/ad-ds\/active-directory-functional-levels\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/windows-server\/identity\/ad-ds\/active-directory-functional-levels<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Monitor_and_Troubleshoot_Windows_Server_Environments\"><\/span><b>Domain: Monitor and Troubleshoot Windows Server Environments<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><b>Question 18 : <\/b><strong>There are 4 Azure VMs. You need to gather the performance data and Windows Event logs from these VMs and send the collected data to an Azure Storage account. Which of the following would you install on VMs?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Azure Monitor agent\u00a0<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Azure Diagnostics extension<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Dependency agent<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Telegraf agent\u00a0<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Azure Diagnostics extension is one of the agents<\/span><span style=\"font-weight: 400;\"> in Azure Monitor<\/span><span style=\"font-weight: 400;\">\u00a0that collects the performance and monitoring data from the guest OS of Azure compute resources including VMs.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The main scenarios that diagnostics extension addresses are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Collecting guest metrics into AZ Monitor Metrics.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sending guest metrics and logs to AZ storage for archiving.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sending guest metrics and logs to Azure event hubs to deliver outside of Azure.<\/span><\/li>\n<\/ul>\n<p><b>Option A is incorrect. <\/b><span style=\"font-weight: 400;\">Azure Monitor agent is not the right agent to install.<\/span><\/p>\n<p><b>Option B is correct. <\/b><span style=\"font-weight: 400;\">The azure diagnostic extension should be installed on VMs <\/span><span style=\"font-weight: 400;\">to gather the performance data and Windows Event logs from these VMs and send the collected data to an Azure Storage account.<\/span><\/p>\n<p><b>Option C is incorrect. <\/b><span style=\"font-weight: 400;\">The Dependency agent collects exposed data about processes that run on the machine and external process dependencies.<\/span><\/p>\n<p><b>Option D is incorrect<\/b><span style=\"font-weight: 400;\">. Telegraf agent is a Linux agent.<\/span><\/p>\n<p><b>Reference:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">To know more about Azure Monitor agents, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/azure-monitor\/agents\/agents-overview\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/azure-monitor\/agents\/agents-overview<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Monitor_and_Troubleshoot_Windows_Server_Environments-2\"><\/span><b>Domain: Monitor and Troubleshoot Windows Server Environments<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><b>Question 19 : <\/b><strong>There is an Azure VM named VM2 running Windows Server. VM2 has boot diagnostics configured to utilize a managed storage account. You have been asked to troubleshoot the connectivity issue on VM2. You are required to run a PowerShell command on VM2 with the use of the Azure Serial Console.\u00a0<\/strong><br \/>\n<strong>From the below-given list of actions, choose the action that is not required for the given purpose.<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>From the Azure portal, open the Run command blade<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>From the Azure portal, configure the Boot diagnostics settings for VM2 to use a custom storage account<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>From the serial console, run cmd<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>From the serial console, run ch-si 1and sign in by using a local account<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>From the Azure portal, open the serial console blade of VM2<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To achieve the given task, you need to follow the following 4 tasks in the below sequence:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">From the Azure portal, configure the Boot diagnostics settings for VM2 to use a custom storage account<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">From the Azure portal, open the serial console blade of VM2.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">From the serial console, run cmd.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">From the serial console, run ch-si 1and sign in by using a local account<\/span><\/li>\n<\/ol>\n<p><b>Option A is correct.<\/b><span style=\"font-weight: 400;\"> You don\u2019t need to open the Run command blade from the Azure portal.<\/span><\/p>\n<p><b>Option B is incorrect<\/b><span style=\"font-weight: 400;\">. The given one is the required task to perform.<\/span><\/p>\n<p><b>Option C is incorrect<\/b><span style=\"font-weight: 400;\">. You need to perform this action.<\/span><\/p>\n<p><b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> This is a required action.<\/span><\/p>\n<p><b>Option E is incorrect.<\/b><span style=\"font-weight: 400;\"> The given task is required.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about Azure serial console for Windows, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/troubleshoot\/azure\/virtual-machines\/serial-console-windows\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/troubleshoot\/azure\/virtual-machines\/serial-console-windows<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Monitor_and_Troubleshoot_Windows_Server_Environments-3\"><\/span><b>Domain: Monitor and Troubleshoot Windows Server Environments<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><b>Question 20 :<\/b> <strong>repadmin \/showrepl is the command that is run to identify Active Directory replication problems. When you run this command, you receive the \u201cLDAP Error 49\u201d as output.<\/strong><br \/>\n<strong>What might be the possible root cause of this error?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>The administration tool couldn\u2019t contact AD DS<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>The domain controller (DC) computer account may not be synchronized with the KDC (Key Distribution Center)<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>A replication link occurs between two domain controllers, but replication can\u2019t be performed appropriately due to an authentication failure<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D.<\/strong> None if these<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Replication issues are reported in event messages and in several error messages that happen when a service or application tries an operation. Most replication issues are recognized in the event messages which are logged in the Directory Service event log. Replication issues might also be recognized in terms of error messages as the output of the\u00a0<\/span><span style=\"font-weight: 400;\">repadmin \/showrepl<\/span><span style=\"font-weight: 400;\">\u00a0command.<\/span><\/p>\n<p><b>Option A is incorrect.<\/b><span style=\"font-weight: 400;\"> The given one is the root cause of the Repadmin error &#8220;Cannot open LDAP connection to localhost&#8221;.<\/span><\/p>\n<p><b>Option B is correct.<\/b><span style=\"font-weight: 400;\"> The given one is the possible root cause of the LDAP Error 49.<\/span><\/p>\n<p><b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> It would have resulted in the error \u201cAccess is denied\u201d.<\/span><\/p>\n<p><b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> The possible root cause is \u201cThe DC computer account may not be synchronized with the KDC.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about troubleshooting Active Directory Replication Problems, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/identity\/ad-ds\/manage\/troubleshoot\/troubleshooting-active-directory-replication-problems?WT.mc_id=ravikirans\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/windows-server\/identity\/ad-ds\/manage\/troubleshoot\/troubleshooting-active-directory-replication-problems<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Implement_Disaster_Recovery-4\"><\/span><b>Domain: Implement Disaster Recovery<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><b>Question 21 :<\/b> <strong>You have just deleted some backup data from Azure Backup. Now, one of the administrative staff informs you that the deleted data was required to restore some damaged files. What are the possible options available to you?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Once the backup data is deleted, it is unrecoverable. You can do nothing<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>You can recover the deleted backup data with no loss for up to 7 days after deletion<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>You can recover the deleted backup data with no loss for up to 14 days after deletion<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>You can recover the deleted backup data, whenever required<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some s<\/span><span style=\"font-weight: 400;\">ecurity features are provided by Azure backup intended towards protecting the backup data even after deletion. With soft delete, if you delete the backup of a virtual machine, the backup data is retained for an additional 14 days, making it possible to recover that backup item with no data loss.\u00a0<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. The backup data can be recovered up to 14 days after deletion.<\/span><\/p>\n<p><b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> You can recover the deleted backup data with no loss for up to 14 days, not only 7 days after deletion.<\/span><\/p>\n<p><b>Option C is correct.<\/b><span style=\"font-weight: 400;\"> With soft delete, if you delete the backup of a virtual machine, the backup data is retained for an additional 14 days, making it possible to recover that backup item with no data loss.\u00a0<\/span><\/p>\n<p><b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> The deleted backup data can be recovered only for up to 14 days. After that, it can\u2019t be recovered.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about various security features available in Azure Backup, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/backup\/security-overview\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/backup\/security-overview<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Implement_Disaster_Recovery-5\"><\/span><b>Domain: Implement Disaster Recovery<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><b>Question 22 : <\/b><strong>One of your friends needs an Azure subscription containing an Azure Recovery Services vault. He has an on-premises physical server running Windows Server. He needs to back up the server daily to Azure.\u00a0<\/strong><br \/>\n<strong>He is confused about the procedure he should follow and therefore he consults you. You need to suggest to him the steps that he should follow to meet the goal. From the below-given list of steps, choose the steps that would be part of the procedure. [ Choose all that are applicable]<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>On Server, install and register the Azure connected Machine Agent<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Download the vault credentials file<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Install and register the Microsoft Azure Recovery Services (MARS) agent<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Create a recovery plan<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>On Server, install and register the Azure Site Recovery Mobility Service Agent<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>F. <\/strong>Schedule a backup<\/span><\/p>\n<p><b>Correct Answers: B, C and F<\/b><\/p>\n<p><b>Explanation:\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The three steps that are needed to be followed in the right sequence are:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Download the vault credentials file<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Install and register the Microsoft Azure Recovery Services (MARS) agent<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Schedule a backup<\/span><\/li>\n<\/ol>\n<p><b>Option A is incorrect.<\/b><span style=\"font-weight: 400;\"> There is no need to install and register the Azure-connected Machine Agent.<\/span><\/p>\n<p><b>Option B is correct.<\/b><span style=\"font-weight: 400;\"> Downloading the vault credentials file is the foremost step in the process.<\/span><\/p>\n<p><b>Option C is correct<\/b><span style=\"font-weight: 400;\">. After downloading the vault credentials file, there is a need to install and register a MARS agent.<\/span><\/p>\n<p><b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> There is no need to create a recovery plan.<\/span><\/p>\n<p><b>Option E is incorrect.<\/b><span style=\"font-weight: 400;\"> There is no need to install and register the Azure Site Recovery Mobility Service Agent.<\/span><\/p>\n<p><b>Option F is correct.<\/b><span style=\"font-weight: 400;\"> Scheduling the backup is the necessary step in the procedure.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about how to back up Windows Server to Azure, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/backup\/tutorial-backup-windows-server-to-azure\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/backup\/tutorial-backup-windows-server-to-azure<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Implement_Disaster_Recovery-6\"><\/span><b>Domain: Implement Disaster Recovery<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><b>Question 23 : <\/b><strong>You are the network administrator. You need to create a recovery plan in Azure Site Recovery to fail over all the virtual machines (around 250) to an Azure region.\u00a0<\/strong><br \/>\n<strong>The plan has four manual actions. You want to replace one of these four manual actions with an automated process. Which of the following would you use?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>An Azure PowerShell function<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>An Azure Desired State Configuration (DSC) virtual machine extension<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>An Azure Automation Runbook<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Custom Script Extension on VMs<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It might be a complex task to recover large applications. The processes with manual steps are prone to error. A recovery plan can be used to impose order, and automate the steps or actions required at each step, utilizing Azure Automation runbooks for failover to Azure or scripts.\u00a0<\/span><\/p>\n<p><b>Option A is incorrect.<\/b><span style=\"font-weight: 400;\"> You need to use an Azure Automation Runbook to replace the manual action with an automated process.<\/span><\/p>\n<p><b>Option B is incorrect<\/b><span style=\"font-weight: 400;\">. Azure Desired State Configuration (DSC) extension is primarily used\u00a0to bootstrap a VM to the Azure Automation State Configuration (DSC) service.<\/span><\/p>\n<p><b>Option C is correct<\/b><span style=\"font-weight: 400;\">. Azure Automation Runbook is used to replace the manual action with an automated process.<\/span><\/p>\n<p><b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> Custom Script Extension won\u2019t work in the given scenario.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about the recovery plan, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/site-recovery\/recovery-plan-overview\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/site-recovery\/recovery-plan-overview<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Implement_Disaster_Recovery-7\"><\/span><b>Domain: Implement Disaster Recovery<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><b>Question 24 :<\/b> <strong>Complete the statement below:<\/strong><br \/>\n<strong>In the Live migration, when a VM failover is started by an administrator, the source Hyper-V server creates a \u2026\u2026\u2026\u2026\u2026\u2026.. connection to the target Hyper-V server.<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>SMTP<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>HTTP<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>P2P<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>TCP<\/span><\/p>\n<p><b>Correct Answer: D<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When an administrator begins a VM failover, the source Hyper-V server makes a TCP connection with the target Hyper-V server. This TCP connection is used for transferring the VM configuration data between the two hosts.\u00a0<\/span><\/p>\n<p><b>Option A is incorrect.<\/b><span style=\"font-weight: 400;\"> Rather than SMTP, a TCP connection is created.<\/span><\/p>\n<p><b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> The connection type is TCP, not HTTP.<\/span><\/p>\n<p><b>Option C is incorrect<\/b><span style=\"font-weight: 400;\">. P2P is not the right option.<\/span><\/p>\n<p><b>Option D is correct<\/b><span style=\"font-weight: 400;\">. When an administrator begins a VM failover, the source Hyper-V server makes a TCP connection with the target Hyper-V server<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about Hyper-V VM live migration, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/implement-high-availability-of-windows-server-vms\/4-implement-hyper-v-vm-live-migration\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/implement-high-availability-of-windows-server-vms\/4-implement-hyper-v-vm-live-migration<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Migrate_Servers_and_Workloads-5\"><\/span><b>Domain: Migrate Servers and Workloads\u00a0<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Question 25 : After a long discussion, your Whizlabs team decides to use Azure Migrate: Server Migration tool.\u00a0 From the below-given list, choose the source server configurations that are supported by Azure Migrate: Server Migration.<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Azure VMs<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>VMware VMs<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Physical Unix Server<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Physical Windows Server.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>Physical Sun Solaris<\/span><\/p>\n<p><b>Correct Answers: A, B and D<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The following table lists some of the different migration tools that can be used depending upon the migration scenario:<img decoding=\"async\" class=\"aligncenter size-full wp-image-87670\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/801-25.webp\" alt=\"\" width=\"1058\" height=\"590\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/801-25.webp 1058w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/801-25-300x167.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/801-25-1024x571.webp 1024w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/801-25-768x428.webp 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/801-25-150x84.webp 150w\" sizes=\"(max-width: 1058px) 100vw, 1058px\" \/><\/span><\/p>\n<p><b>Option A is correct. <\/b><span style=\"font-weight: 400;\">Azure Migrate: Server Migration supports Azure VMs.<\/span><\/p>\n<p><b>Option B is correct. <\/b><span style=\"font-weight: 400;\">Azure Migrate: Server Migration supports VMware VMs.<\/span><\/p>\n<p><b>Option C is incorrect. <\/b><span style=\"font-weight: 400;\">Azure Migrate: Server Migration doesn&#8217;t support the migration of physical Unix hosts or Sun Solaris hosts.\u00a0<\/span><\/p>\n<p><b>Option D is correct. <\/b><span style=\"font-weight: 400;\">Azure Migrate: Server Migration supports Physical Windows Server.<\/span><\/p>\n<p><b>Option E is incorrect<\/b><span style=\"font-weight: 400;\">. Azure Migrate: Server Migration doesn&#8217;t support the migration of physical Unix hosts or Sun Solaris hosts.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To know more about migration tools and strategy, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/migrate\/migrate-services-overview\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/migrate\/migrate-services-overview<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Summary\"><\/span>Summary<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I hope the above free questions cover all the domains of the AZ-801 exam. By using AZ-801 practice questions, you can test your knowledge and identify areas that require more attention. These questions remain a valuable resource for anyone seeking to achieve the Microsoft Azure AZ-801 certification and advance their career in cloud computing and digital transformation.<\/p>\n<p>To enhance your practical skills further, you can take up hands-on labs and <a href=\"https:\/\/www.whizlabs.com\/labs\/azure-sandbox\" target=\"_blank\" rel=\"noopener\">Azure sandboxes<\/a> and gain confidence in clearing the exam.<\/p>\n<p>If you have any doubts about this blog, please feel free to comment us!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Planning to take AZ-801:Configuring Windows Server Hybrid Advanced Services Certification? Then you must have pratical skills to gain confidence in passing the exam. We have compiled 20+ free AZ-801 practice questions to provide you with complete knowledge on configuring Windows Server. These practice exam questions looks alike practice questions in the real exam format. Once you become familiar with the AZ-801 exam pattern and difficulty, you\u2019re in a perfect position to ace your exam at first time. AZ-801 practice exams help you to identify your strengths and weaknesses so that you know where to focus your study when preparing for [&hellip;]<\/p>\n","protected":false},"author":363,"featured_media":87996,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4828],"tags":[],"class_list":["post-87660","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-365"],"uagb_featured_image_src":{"full":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/AZ-801-Free-Questions-1.webp",1280,720,false],"thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/AZ-801-Free-Questions-1-150x150.webp",150,150,true],"medium":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/AZ-801-Free-Questions-1-300x169.webp",300,169,true],"medium_large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/AZ-801-Free-Questions-1-768x432.webp",768,432,true],"large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/AZ-801-Free-Questions-1-1024x576.webp",1024,576,true],"1536x1536":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/AZ-801-Free-Questions-1.webp",1280,720,false],"2048x2048":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/AZ-801-Free-Questions-1.webp",1280,720,false],"profile_24":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/AZ-801-Free-Questions-1.webp",24,14,false],"profile_48":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/AZ-801-Free-Questions-1.webp",48,27,false],"profile_96":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/AZ-801-Free-Questions-1.webp",96,54,false],"profile_150":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/AZ-801-Free-Questions-1.webp",150,84,false],"profile_300":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/AZ-801-Free-Questions-1.webp",300,169,false],"tptn_thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/AZ-801-Free-Questions-1-250x250.webp",250,250,true],"web-stories-poster-portrait":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/AZ-801-Free-Questions-1-640x720.webp",640,720,true],"web-stories-publisher-logo":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/AZ-801-Free-Questions-1-96x96.webp",96,96,true],"web-stories-thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/03\/AZ-801-Free-Questions-1-150x84.webp",150,84,true]},"uagb_author_info":{"display_name":"Senthil","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/senthilwhizlabs-com\/"},"uagb_comment_info":5,"uagb_excerpt":"Planning to take AZ-801:Configuring Windows Server Hybrid Advanced Services Certification? Then you must have pratical skills to gain confidence in passing the exam. We have compiled 20+ free AZ-801 practice questions to provide you with complete knowledge on configuring Windows Server. These practice exam questions looks alike practice questions in the real exam format. Once&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/87660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/363"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=87660"}],"version-history":[{"count":9,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/87660\/revisions"}],"predecessor-version":[{"id":88061,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/87660\/revisions\/88061"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media\/87996"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=87660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=87660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=87660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}