Exam Question

300-435


Refer to the exhibit. An engineer creates a Python script using RESTCONF to display hostname information. The code must be completed so that it can be tested.
Which string completes the highlighted areas in the exhibit?

A.
yang-data+json
B.
yang +json
C.
yang.data+json
D.
json

400-007

A large enterprise customer has a single router that uses two active/active 10-Mbps internet links in one of its offices. Each link currently handles approximately 7 Mbps of traffic, which is close to the full link capacity. When a link fails, the failure leads to significantly degraded performance of all applications. Static routing is used. The current ISP cannot deliver additional bandwidth capacity on the existing links. The customer needs a network design that is resistant to failure, but does not increase CAPEX. Which solution should be proposed to the customer?

A.
Implement quality of service on the current links.
B.
Add a third link to the current router.
C.
Add an additional edge router connected to a second ISP.
D.
Use dynamic routing for equal-cost multipath.

300-430

An engineer is ensuring that, on the IEEE 802.1X wireless network, clients authenticate using a central repository and local credentials on the Cisco WLC. Which two configuration elements must be completed on the WLAN? (Choose two.)

A.
TACACS+
B.
MAC authentication
C.
local EAP enabled
D.
web authentication
E.
LDAP server

200-301

Which interface or port on the WLC is the default for in-band device administration and communications between the controller and access points?

A.
console port
B.
management interface
C.
virtual interface
D.
service port

300-410

Which two label distribution methods are used by routers in MPLS? (Choose two.)

A.
LDP discovery hello message
B.
LDP session protection message
C.
downstream unsolicited
D.
downstream on demand
E.
targeted hello message

DP-600

You have a Fabric workspace named Workspace1 that contains a dataflow named Dataflow1. Dataflow1 has a query that returns 2,000 rows.
You view the query in Power Query as shown in the following exhibit.

What can you identify about the pickupLongitude column?

A.
The column has duplicate values.
B.
All the table rows are profiled.
C.
The column has missing values.
D.
There are 935 values that occur only once.

PL-600

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

A company uses a Microsoft Power Platform application.

Employees report that they are unable to open the application.

You need to ensure that the employees can access the application.

Solution: Add the employees to a security group and associate a security role with the security group.

Does the solution meet the goal?

A.
Yes
B.
No

AZ-104

HOTSPOT -
You have an Azure subscription that contains the virtual networks shown in the following table.

The subscription contains the private DNS zones shown in the following table.

You add virtual network links to the private DNS zones as shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

AI-102

You have an Azure subscription that contains a multi-service Azure Cognitive Services Translator resource named Translator1.

You are building an app that will translate text and documents by using Translator1.

You need to create the REST API request for the app.

Which headers should you include in the request?

A.
the access control request, the content type, and the content length
B.
the subscription key and the client trace ID
C.
the resource ID and the content language
D.
the subscription key, the subscription region, and the content type

DP-300

Case study -

This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.

To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study.

At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section.


To start the case study -

To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. If the case study has an All Information tab, note that the information displayed is identical to the information displayed on the subsequent tabs. When you are ready to answer a question, click the Question button to return to the question.


Overview -

ADatum Corporation is a financial services company that has a main office in New York City.

Existing Environment. Licensing Agreement

ADatum has a Microsoft Volume Licensing agreement that includes Software Assurance.

Existing Environment. Network Infrastructure

ADatum has an on-premises datacenter and an Azure subscription named Sub1.

Sub1 contains a virtual network named Network1 in the East US Azure region.

The datacenter is connected to Network1 by using a Site-to-Site (S2S) VPN.

Existing Environment. Identity Environment

The on-premises network contains an Active Directory Domain Services (AD DS) forest.

The forest contains a single domain named corp.adatum.com.

The corp.adatum.com domain syncs with a Microsoft Entra tenant named adatum.com.

Existing Environment. Database Environment

The datacenter contains the servers shown in the following table.



DB1 and DB2 are used for transactional and analytical workloads by an application named App1.

App1 runs on Microsoft Entra hybrid joined servers that run Windows Server 2022. App1 uses Kerberos authentication.

DB3 stores compliance data used by two applications named App2 and App3.

DB3 performance is monitored by using Extended Events sessions, with the event_file target set to a file share on a local disk of SVR3.

Resource allocation for DB3 is managed by using Resource Governor.


Requirements. Planned Changes -

ADatum plans to implement the following changes:

• Deploy an Azure SQL managed instance named Instance1 to Network1.
• Migrate DB1 and DB2 to Instance1.
• Migrate DB3 to Azure SQL Database.
• Following the migration of DB1 and DB2, hand over database development to remote developers who use Microsoft Entra joined Windows 11 devices.
• Following the migration of DB3, configure the database to be part of an auto-failover group.

Requirements. Availability Requirements

ADatum identifies the following post-migration availability requirements:

• For DB1 and DB2, offload analytical workloads to a read-only database replica in the same Azure region.
• Ensure that if a regional disaster occurs, DB1 and DB2 can be recovered from backups.
• After the migration, App1 must maintain access to DB1 and DB2.
• For DB3, manage potential performance issues caused by resource demand changes by App2 and App3.
• Ensure that DB3 will still be accessible following a planned failover.
• Ensure that DB3 can be restored if the logical server is deleted.
• Minimize downtime during the migration of DB1 and DB2.

Requirements. Security Requirements

ADatum identifies the following security requirements for after the migration:

• Ensure that only designated developers who use Microsoft Entra joined Windows 11 devices can access DB1 and DB2 remotely.
• Ensure that all changes to DB3, including ones within individual transactions, are audited and recorded.

Requirements. Management Requirements

ADatum identifies the following post-migration management requirements:

• Continue using Extended Events to monitor DB3.
• In Azure SQL Database, automate the management of DB3 by using elastic jobs that have database-scoped credentials.

Requirements. Business Requirements

ADatum identifies the following business requirements:

• Minimize costs whenever possible, without affecting other requirements.
• Minimize administrative effort.


You need to recommend a solution to meet the security requirements and the business requirements for DB3.

What should you recommend as the first step of the solution?

A.
Run the sp_addarticle stored procedure.
B.
Run the ALTER TABLE statement and specify the ENABLE CHANGE_TRACKING Clause.
C.
Run the ALTER DATABASE statement and specify the SET CHANGE_TRACKING = ON Clause.
D.
Run the sys.sp_cdc_enable_db stored procedure.

Disclaimer:
The content on this webpage is collected from various internet sources. While we strive for accuracy, we cannot guarantee its completeness or correctness. Please use it with caution and conduct further research if needed. We do not claim ownership or copyright over any content. If you find any copyrighted material or content that violates laws, please contact us for removal. By accessing this webpage, you agree to these terms. Thank you for your understanding.