Want to know Examcollection AZ-800 Exam practice test features? Want to lear more about Microsoft Administering Windows Server Hybrid Core Infrastructure certification experience? Study Vivid Microsoft AZ-800 answers to Update AZ-800 questions at Examcollection. Gat a success with an absolute guarantee to pass Microsoft AZ-800 (Administering Windows Server Hybrid Core Infrastructure) test on your first attempt.
Free AZ-800 Demo Online For Microsoft Certifitcation:
NEW QUESTION 1
DRAG DROP
You create an Azure virtual machine named Server1 that runs Windows Server. Server1 has the disk configuration shown in the following exhibit.
Solution:

Does this meet the goal?
- A. Yes
- B. Not Mastered
Answer: A
NEW QUESTION 2
You have an on-premises Active Directory Domain Services (AD DS) domain that syncs with an Azure Active Directory (Azure AD) tenant Group writeback is enabled in Azure AD Connect.
The AD DS domain contains a server named Server1 Server 1 contains a shared folder named share1.
You have an Azure Storage account named storage2 that uses Azure AD-based access control. The storage2 account contains a share named shared
You need to create a security group that meets the following requirements:
• Can contain users from the AD DS domain
• Can be used to authorize user access to share 1 and share2 What should you do?
- A. in the AD DS domain, create a universal security group
- B. in the Azure AD tenant create a security group that has assigned membership
- C. in the Azure AD Tenant create a security group that has dynamic membership.
- D. in the Azure AD tenant create a Microsoft 365 group
Answer: B
NEW QUESTION 3
HOTSPOTYou need to sync files from an on-premises server named Server1 to Azure by using Azure File Sync
You have a cloud tiering policy that is configured for 30 percent free space and 70 days. Volume f on Server1 is 500 GB.
A year ago. you configured E:\Oata on Server1 to sync by using Azure File Sync. The files that are visible in E:\Data are shown in the following table.
Volume E does NOT contain any other files.
Where are File1 and flle3 located? To answer, select the appropriate options In the answer area.
Solution:

Does this meet the goal?
- A. Yes
- B. Not Mastered
Answer: A
NEW QUESTION 4
You have an on-premises Active Directory Domain Services (AD DS) domain that syncs with an Azure Active Directory (Azure AD) tenant The on-premises network is connected to Azure by using a Site-to-Site VPN. You have the DNS zones shown in the following table.
You need to ensure that names from (aDiifcam.com can be resolved from the on-premises network Which two actions should you perform? Each correct answer presents part of the solution, NOTE: Each correct selection Is worth one point
- A. Create a conditional forwarder for fabrikam.com on DC1.
- B. Create a stub zone for fabrikam.com on DC1.
- C. Create a secondary zone for fabnlcam.com on DO.
- D. Deploy an Azure virtual machine that runs Windows Serve
- E. Modify the DNS Servers settings for the virtual network.
- F. Deploy an Azure virtual machine that runs Windows Serve
- G. Configure the virtual machine &s a DNS forwarder.
Answer: AE
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/private-link/private-endpoint-dns#on-premises-workloads-using-a-dns-forwarder
NEW QUESTION 5
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are planning the deployment of DNS to a new network.
You have three internal DNS servers as shown in the following table.
The contoso.local zone contains zone delegations for east.contoso.local and west.contoso.local. All the DNS servers use root hints.
You need to ensure that all the DNS servers can resolve the names of all the internal namespaces and internet hosts.
Solution: On Server2, you create a conditional forwarder for west.contoso.local. On Server3, you create a conditional forwarder for east.contoso.local.
Does this meet the goal?
- A. Yes
- B. No
Answer: B
NEW QUESTION 6
HOTSPOT
You have a Windows Server 2022 container host named Host1 and a container registry that contains the container images shown in the following table.
You need to run the containers on Host1
Which isolation mode can you use for each image? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.Answer:
Solution:
Does this meet the goal?
- A. Yes
- B. Not Mastered
Answer: A
NEW QUESTION 7
Your network contains an Active Directory forest. The forest contains two domains named contoso.com and east.contoso.com and the servers shown in the following table.
Contoso.com contains a user named User1.
You add User1 to the built-in Backup Operators group in contoso.com. Which servers can User1 back up?
- A. DC1 only
- B. Server1 only
- C. DC! and DC2 only
- D. DC1 and Server! only
- E. DC1. DCZ Serve1, and Server2
Answer: A
NEW QUESTION 8
You have an Active Directory Domain Services (AD DS) domain. The domain contains a member server named Server1 that runs Windows Server.
You need to ensure that you can manage password policies for the domain from Serve1. Which command should you run first on Server1?
- A. Install-Windows Feature RSAT-AO-PowerShell
- B. Install-Windows Feature 6PHC
- C. Install-Windows Feature RSAT-AD-Tool$
- D. Install-windows Feature RSAT-AWIMS
Answer: C
NEW QUESTION 9
SIMULATION
Task 7
You need to monitor the security configuration of DC1 by using Microsoft Defender for Cloud.
The required source files are located in a folder named \\dc1.contoso.com\install.
Solution:
One possible solution to monitor the security configuration of DC1 by using Microsoft Defender for Cloud is to use the Guest Configuration feature. Guest Configuration is a service that audits settings inside Linux and Windows virtual machines (VMs) to assess their compliance with your organization’s security policies. You can use Guest Configuration to monitor the security baseline settings for Windows Server in the Microsoft Defender for Cloud portal by following these steps:
✑ On DC1, open a web browser and go to the folder named \dc1.contoso.com\install.
Download the Guest Configuration extension file (GuestConfiguration.msi) and save it to a local folder, such as C:\Temp.
✑ Run the Guest Configuration extension file and follow the installation wizard. You

✑ After the installation is complete, sign in to the Microsoft Defender for Cloud portal (2).
✑ In the left pane, select Security Center and then Recommendations.
✑ In the recommendations list, find and select Vulnerabilities in security configuration on your Windows machines should be remediated (powered by Guest Configuration).
✑ In the Remediate Security Configurations page, you can see the compliance status of your Windows VMs, including DC1, based on the Azure Compute Benchmark.
The Azure Compute Benchmark is a set of rules that define the desired configuration state of your VMs. You can also see the number of failed, passed, and skipped rules for each VM. For more information on the Azure Compute Benchmark, see Microsoft cloud security benchmark: Azure compute benchmark is now available.
✑ To view the details of the security configuration of DC1, click on the VM name and then select View details. You can see the list of rules that apply to DC1 and their compliance status. You can also see the severity, description, and remediation steps for each rule. For example, you can see if DC1 has the latest security updates installed, if the firewall is enabled, if the password policy is enforced, and so on.
✑ To monitor the security configuration of DC1 over time, you can use the Compliance over time chart, which shows the trend of compliance status for DC1 in the past 30 days. You can also use the Compliance breakdown chart, which shows the distribution of compliance status for DC1 by rule severity.
By using Guest Configuration, you can monitor the security configuration of DC1 by using Microsoft Defender for Cloud and ensure that it meets your organization’s security standards. You can also use Guest Configuration to monitor the security configuration of other Windows and Linux VMs in your Azure environment.
Does this meet the goal?
- A. Yes
- B. Not Mastered
Answer: A
NEW QUESTION 10
HOTSPOT
You plan to deploy an Azure virtual machine that will run Windows Server.
You need to ensure that an Azure Active Directory (Azure AD) user nameduserl@contoso.com can connect 10 the virtual machine by using the Azure Serial Console.
What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Solution:

Does this meet the goal?
- A. Yes
- B. Not Mastered
Answer: A
NEW QUESTION 11
HOTSPOT
Your on-premises network contains an Active Directory domain named contoso.com and 500 servers that run Windows Server. All the servers are Azure Arc-enabled and joined to contoso.com.
You need to implement PowerShell Desired State Configuration (DSC) on all the servers. The solution must minimize administrative effort.
Where should you store the DSC scripts, and what should you use to apply DSC to the servers? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Solution:

Does this meet the goal?
- A. Yes
- B. Not Mastered
Answer: A
NEW QUESTION 12
You need to meet the technical requirements for Server1. Which users can currently perform the required tasks?
- A. Admin1 only
- B. Admin3 only
- C. Admin1 and Admin3 only
- D. Admin1 Admin2. and Admm3
Answer: C
NEW QUESTION 13
HOTSPOT
You need to configure network communication between the Seattle and New York offices. The solution must meet the networking requirements.
What should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Solution:

Does this meet the goal?
- A. Yes
- B. Not Mastered
Answer: A
NEW QUESTION 14
You have an Azure virtual machine named VM1 that runs Windows Server.
You need to ensure that administrators request access to VM1 before establishing a Remote Desktop connection.
What should you configure?
- A. Azure Front Door
- B. Microsoft Defender for Cloud
- C. Azure AD Privileged Identity Management (PIM)
- D. a network security group (NSG)
Answer: B
NEW QUESTION 15
HOTSPOTYou have on-premises servers that run Windows Server as shown in the following table.
You have an Azure file share named share1 that stores two files named File2.docx and File3.docx.
You create an Azure File Sync sync group that includes the following endpoints:
✑ share
✑ D:\Folder1 on Server1
✑ D:\Datal on Server2
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Solution:

Does this meet the goal?
- A. Yes
- B. Not Mastered
Answer: A
NEW QUESTION 16
......
P.S. Easily pass AZ-800 Exam with 140 Q&As Certshared Dumps & pdf Version, Welcome to Download the Newest Certshared AZ-800 Dumps: https://www.certshared.com/exam/AZ-800/ (140 New Questions)