DummyExams LogoDummyExams
Azure logo

Free Practice · No Signup Required

30 Free Azure AZ-800 Practice Questions

Real practice questions for the Azure Azure Hybrid Administrator (AZ-800) exam, with answers and detailed explanations. Updated 2026.

Free questions

30

Passing score

700 out of 1000

Exam time

120 minutes

Question pool

150+ Questions

Below are 30 real practice questions for the Azure Azure Hybrid Administrator (AZ-800) exam. Each question shows the correct answer and a detailed explanation when you reveal it. Use these to benchmark your readiness — if you score below 70% on these 30 questions, plan for at least 4 more weeks of study before booking.

AZ-800 Practice Questions

  1. Question 1.You have a server named Server1 that runs Windows Server. Server1 has the storage pools shown in the following table. You plan to create a virtual disk named VDisk1 that will use storage tiers. ![Question 1](images/question1.jpg)

    • A.Pool2 and Pool3 only.(correct answer)
    • B.Pool2 only.
    • C.Pool1 only.
    • D.Pool1, Pool2, and Pool3.
    • E.Pool1 and Pool2 only.
    • F.Pool1 and Pool3 only.
    • G.Pool3 only.
    Show answer & explanation

    Correct answer: A

    Pool2 and Pool3 only.

    Explanation

    Storage tiers in Windows Server allow you to combine different types of storage (e.g., SSDs and HDDs) into a single virtual disk, using the faster tier for frequently accessed data. Pools must contain both types of media to support tiers.

  2. Question 2.Your network contains an Active Directory Domain Services (AD DS) domain named adatum.com. The domain contains a ‘He server named Server1 and three users named User1. User2 and User), Server1 contains a shared folder named Share1 that has the following configurations. The share permissions for Share1 are configured as shown in the Share Permissions exhibit. Share! contains a file named Filel.txt. The advanced security settings for Filel.txt are configured as shown in the File Permissions exhibit. When User1 connects to \\Server1.adatum.com\Share1\, the user can take ownership of File1.txt. ![Question 2 part 1](images/question2_3_4_1.jpg) ![Question 2 part 2](images/question2_3_4_2.jpg) ![Question 2 part 3](images/question2_3_4_3.jpg)

    • A.Yes.
    • B.No.(correct answer)
    Show answer & explanation

    Correct answer: B

    No.

    Explanation

    To take ownership of a file in Windows, a user usually needs the 'Take ownership' permission in the NTFS ACL or the 'Restore files and directories' user right. If the share permissions or NTFS permissions explicitly deny sufficient access, the action will fail.

  3. Question 3.Your network contains an Active Directory Domain Services (AD DS) domain named adatum.com. The domain contains a ‘He server named Server1 and three users named User1. User2 and User), Server1 contains a shared folder named Share1 that has the following configurations. The share permissions for Share1 are configured as shown in the Share Permissions exhibit. Share! contains a file named Filel.txt. The advanced security settings for Filel.txt are configured as shown in the File Permissions exhibit. When User2 connects to \\Server1.adatum.com\Share1\, File1.txt is visible. ![Question 3 part 1](images/question2_3_4_1.jpg) ![Question 3 part 2](images/question2_3_4_2.jpg) ![Question 3 part 3](images/question2_3_4_3.jpg)

    • A.Yes.(correct answer)
    • B.No.
    Show answer & explanation

    Correct answer: A

    Yes.

    Explanation

    Visibility of a file in a shared folder is governed by both Share and NTFS permissions. If the user has at least 'Read' access at both levels, the file will be visible.

  4. Question 4.Your network contains an Active Directory Domain Services (AD DS) domain named adatum.com. The domain contains a ‘He server named Server1 and three users named User1. User2 and User), Server1 contains a shared folder named Share1 that has the following configurations. The share permissions for Share1 are configured as shown in the Share Permissions exhibit. Share! contains a file named Filel.txt. The advanced security settings for Filel.txt are configured as shown in the File Permissions exhibit. When User3 connects to \\Server1.adatum.com\Share1\, File1.txt is visible. ![Question 4 part 1](images/question2_3_4_1.jpg) ![Question 4 part 2](images/question2_3_4_2.jpg) ![Question 4 part 3](images/question2_3_4_3.jpg)

    • A.Yes.(correct answer)
    • B.No.
    Show answer & explanation

    Correct answer: A

    Yes.

    Explanation

    Similar to User2, User3's ability to see the file depends on having sufficient permissions defined in the ACLs. If 'Everyone' or a group User3 belongs to has Read access, the file is visible.

  5. Question 5.Contoso, Ltd. is a company that has a main office in Seattle and two branch offices in Los Angeles and Montreal. The network contains an on premises Active Directory Domain Services (AD DS) forest named contoso.com. The forest contains two domains named contoso.com and canada.contoso.com. The forest contains the domain controllers shown in the following table. All the domain controllers are global catalog servers. The network contains the servers shown in the following table. A server named Server4 runs Windows Server and is in a workgroup. Windows Firewall on Server4 uses the private profile. Server2 hosts three virtual machines named VM1, VM2, and VM3. VM3 is a file server that stores data in the volumes shown in the following table. The contoso.com domain has the Group Policies Objects (GPOs) shown in the following table. The forest contains the users shown in the following table. The forest contains the groups shown in the following table. When an administrator signs in to the console of VM2 by using Virtual Machine Connection, and then disconnects from the session without signing out, another administrator can connect to the console session as the currently signed in user. Contoso identifies the following technical requirements: Change the replication schedule for all site links to 30 minutes. Promote Server1 to a domain controller in canada.contoso.com. Install and authorize Server3 as a DHCP server. Ensure that User1 can manage the membership of all the groups in Contoso\OU3. Ensure that you can manage Server4 from Server1 by using PowerShell remoting. Ensure that you can run virtual machines on VM1. Force users to provide credentials when they connect to VM2. On VM3, ensure that Data Deduplication on all volumes is possible. You need to meet the technical requirements for the site links. Which users can perform the required tasks? ![Question 5 part 1](images/question5_8_9_20_33_38_39_43_1.jpg) ![Question 5 part 2](images/question5_8_9_20_33_38_39_43_2.jpg) ![Question 5 part 3](images/question5_8_9_20_33_38_39_43_3.jpg) ![Question 5 part 4](images/question5_8_9_20_33_38_39_43_4.jpg) ![Question 5 part 5](images/question5_8_9_20_33_38_39_43_5.jpg) ![Question 5 part 6](images/question5_8_9_20_33_38_39_43_6.jpg)

    • A.Admin1 only.(correct answer)
    • B.Admin1 and Admin3 only.
    • C.Admin1 and Admin2 only.
    • D.Admin3 only.
    • E.Admin1, Adrrun2. and Admin3.
    Show answer & explanation

    Correct answer: A

    Admin1 only.

    Explanation

    Changing site link replication schedules in Active Directory requires Enterprise Admin or Domain Admin privileges in the forest root domain, as site links are configuration-level objects shared across the forest.

  6. Question 6.You have a server named Server1 that hosts Windows containers. You plan to deploy an application that will have multiple containers. Each container will be You need to create a Docker network that supports the deployment of the application. Which type of network should you create?

    • A.transparent.(correct answer)
    • B.I2bridge.
    • C.NAT.
    • D.I2tunnel.
    Show answer & explanation

    Correct answer: A

    transparent.

    Explanation

    Transparent networking in Windows containers allows each container to have an IP address from the physical network, as if it were a physical machine or a VM on the network.

  7. Question 7.Fabrikam, Inc is a manufacturing company that has a main office in New York and a branch office in Seattle. The on-premises network contains servers that run Windows Server as shown in the following table. DC1 hosts all the operation master roles. VM1 and VM2 are connected to the internet. WEB1 and WEB2 run an Internet Information Services (IIS) web app named Webapp1. The New York and Seattle offices are connected by using redundant WAN links. The client computers in each office get IP addresses from their local DHCP server. DHCP1 contains a scope named Scope1 that has addresses for the New York office, DHCP2 contains a scope named Scope2 that has addresses for the Seattle office. The network contains a single on-premises Active Directory Domain Services (AD DS) domain named corp.falbrikam.com. Currently, all the service accounts use individual domain user accounts. All domain controllers have the DNS Server role installed and host a copy of the Active Directory integrated DNS zone of corp.fabrikam.com. The corp.fabrikam.com AD DS domain syncs with an Azure Active Directory (Azure AD) tenant. The corp.fabrikam.com domain contains the organizational units (OUs) and custom Group Policy Objects (GPOs) shown in the following table. Fabrikam identifies the following planned changes: Create a single Azure subscription named Sub1 that will contain a single Azure virtual network named Vnet1. Replace the WAN links between the Seattle and New York offices by using Azure Virtual WAN and FxpressRoute. Both on premises offices will be connected to Vnet1 by using ExpressRoute. Create three Azure file shares named newyorkfiles, seattlefiles, and companyfiles. Create a domain controller named dc3.corp.fabrikam.com in Vnet1. Deploy an Azure Virtual Desktop host pool to Vnet1. The Azure Virtual Desktop session hosts will be hybrid Azure AD-joined. License all servers for Microsoft Defender for servers. Use Azure Policy to enforce configuration management policies on the servers in Azure and on-premises. Fabrikam identifies the following networking requirements: Implement Virtual WAN and ensure that all the network traffic between the sites uses Virtual WAN. All communications must occur over ExpressRoute. If a DHCP server fails, ensure that the client computers can continue to receive their dynamic IP address and renew their existing lease. Ensure that the resources in Vnet1 can resolve the names of the on-premises servers in the corp.fabrikam.com domain. Fabrikam identifies the following security requirements: Apply GPO4 to the Azure Virtual Desktop session hosts. Ensure that Azure Virtual Desktop user sessions lock after being idle for 10 minutes. Users must be able to control the lockout time manually from their client computer. Ensure that server administrators request approval before they can establish a Remote Desktop connection to an Azure virtual machine. If the request is approved, the connection must be established within two hours. Prevent user passwords from containing all or part of words that are based on the company name, such as Fab, f@br1kAm or fabr!|. Ensure that all instances of Webapp1 use the same service account. The password of the service account must change automatically every 30 days. Prevent domain controllers from directly contacting hosts on the internet. You need to configure the synchronization of Azure files to meet the following requirements: Ensure that seattlefiles syncs to FS2. Ensure that newyorkfiles syncs to FS1. Ensure that companyfiles syncs to both FS1 and FS2. You need to configure remote administration to meet the security requirements. What should you use? ![Question 7 part 1](images/question7_16_17_19_22_29_45_1.jpg) ![Question 7 part 2](images/question7_16_17_19_22_29_45_2.jpg)

    • A.Just in time (JIT) VM access.(correct answer)
    • B.Azure AD Privileged Identity Management (PIM).
    • C.Remote Desktop extension for Azure Cloud Services.
    • D.Azure Bastion host.
    Show answer & explanation

    Correct answer: A

    Just in time (JIT) VM access.

    Explanation

    Just-in-Time (JIT) VM access in Microsoft Defender for Cloud reduces exposure to brute-force attacks by allowing access to management ports only when needed and for a limited duration.

  8. Question 8.Contoso, Ltd. is a company that has a main office in Seattle and two branch offices in Los Angeles and Montreal. The network contains an on premises Active Directory Domain Services (AD DS) forest named contoso.com. The forest contains two domains named contoso.com and canada.contoso.com. The forest contains the domain controllers shown in the following table. All the domain controllers are global catalog servers. The network contains the servers shown in the following table. A server named Server4 runs Windows Server and is in a workgroup. Windows Firewall on Server4 uses the private profile. Server2 hosts three virtual machines named VM1, VM2, and VM3. VM3 is a file server that stores data in the volumes shown in the following table. The contoso.com domain has the Group Policies Objects (GPOs) shown in the following table. The forest contains the users shown in the following table. The forest contains the groups shown in the following table. When an administrator signs in to the console of VM2 by using Virtual Machine Connection, and then disconnects from the session without signing out, another administrator can connect to the console session as the currently signed in user. Contoso identifies the following technical requirements: Change the replication schedule for all site links to 30 minutes. Promote Server1 to a domain controller in canada.contoso.com. Install and authorize Server3 as a DHCP server. Ensure that User1 can manage the membership of all the groups in Contoso\OU3. Ensure that you can manage Server4 from Server1 by using PowerShell remoting. Ensure that you can run virtual machines on VM1. Force users to provide credentials when they connect to VM2. On VM3, ensure that Data Deduplication on all volumes is possible. Admin1 must use a password that has at least 14 characters. ![Question 8 part 1](images/question5_8_9_20_33_38_39_43_1.jpg) ![Question 8 part 2](images/question5_8_9_20_33_38_39_43_2.jpg) ![Question 8 part 3](images/question5_8_9_20_33_38_39_43_3.jpg) ![Question 8 part 4](images/question5_8_9_20_33_38_39_43_4.jpg) ![Question 8 part 5](images/question5_8_9_20_33_38_39_43_5.jpg) ![Question 8 part 6](images/question5_8_9_20_33_38_39_43_6.jpg)

    • A.Yes.
    • B.No.(correct answer)
    Show answer & explanation

    Correct answer: B

    No.

    Explanation

    Password complexity and length requirements are governed by either Default Domain Policy or Fine-Grained Password Policies (FGPP). If the requirements are not met during a password change, the action fails.

  9. Question 9.Contoso, Ltd. is a company that has a main office in Seattle and two branch offices in Los Angeles and Montreal. The network contains an on premises Active Directory Domain Services (AD DS) forest named contoso.com. The forest contains two domains named contoso.com and canada.contoso.com. The forest contains the domain controllers shown in the following table. All the domain controllers are global catalog servers. The network contains the servers shown in the following table. A server named Server4 runs Windows Server and is in a workgroup. Windows Firewall on Server4 uses the private profile. Server2 hosts three virtual machines named VM1, VM2, and VM3. VM3 is a file server that stores data in the volumes shown in the following table. The contoso.com domain has the Group Policies Objects (GPOs) shown in the following table. The forest contains the users shown in the following table. The forest contains the groups shown in the following table. When an administrator signs in to the console of VM2 by using Virtual Machine Connection, and then disconnects from the session without signing out, another administrator can connect to the console session as the currently signed in user. Contoso identifies the following technical requirements: Change the replication schedule for all site links to 30 minutes. Promote Server1 to a domain controller in canada.contoso.com. Install and authorize Server3 as a DHCP server. Ensure that User1 can manage the membership of all the groups in Contoso\OU3. Ensure that you can manage Server4 from Server1 by using PowerShell remoting. Ensure that you can run virtual machines on VM1. Force users to provide credentials when they connect to VM2. On VM3, ensure that Data Deduplication on all volumes is possible. User1 must use a password that has at least 10 characters. ![Question 9 part 1](images/question5_8_9_20_33_38_39_43_1.jpg) ![Question 9 part 2](images/question5_8_9_20_33_38_39_43_2.jpg) ![Question 9 part 3](images/question5_8_9_20_33_38_39_43_3.jpg) ![Question 9 part 4](images/question5_8_9_20_33_38_39_43_4.jpg) ![Question 9 part 5](images/question5_8_9_20_33_38_39_43_5.jpg) ![Question 9 part 6](images/question5_8_9_20_33_38_39_43_6.jpg)

    • A.Yes.(correct answer)
    • B.No.
    Show answer & explanation

    Correct answer: A

    Yes.

    Explanation

    User password requirements are enforced at the time of creation or change. If the password meets the minimum length and complexity rules defined in the effective policy, the operation succeeds.

  10. Question 10.If Admin1 creates a new local user on Server1 the password for the new user must be at least eight characters.

    • A.Yes.
    • B.No.(correct answer)
    Show answer & explanation

    Correct answer: B

    No.

    Explanation

    Local user password policies in Windows Server are managed via Local Security Policy (secpol.msc) or GPOs. If the configured 'Minimum password length' is not met, the user cannot be created.

  11. Question 11.You have an Azure virtual machine named VM1 that runs Windows Server. You need to configure the management of VM1 to meet the following requirements: Require administrators to request access to VM1 before establishing a Remote Desktop connection. Limit access to VM1 from specific source IP addresses. Limit access to VMI to a specific management port. What should you configure?

    • A.Network Security Group (NSG).
    • B.Azure Active Directory (Azure AD) Privileged identity Management (PIM).
    • C.Azure Front Door.
    • D.Microsoft Defender for Cloud.(correct answer)
    Show answer & explanation

    Correct answer: D

    Microsoft Defender for Cloud.

    Explanation

    Microsoft Defender for Cloud provides JIT (Just-In-Time) VM access, which allows you to lock down management ports (like 3389 for RDP) and only open them upon approved request from specific IP addresses.

  12. Question 12.You plan to deploy a containerized application that requires .NET Core. You need to create a container image for the application. The image must be as small as possible. Which base image should you use?

    • A.Nano Server.(correct answer)
    • B.Server Cote.
    • C.Windows Server.
    • D.Windows.
    Show answer & explanation

    Correct answer: A

    Nano Server.

    Explanation

    Nano Server is the cloud-native, minimal footprint installation option for Windows Server, optimized for containers and microservices where size and speed are critical.

  13. Question 13.You need to configure Azure File Sync to meet the file sharing requirements. What should you do? ![Question 13](images/question13.jpg)

    • A.Minimum number of sync groups to create: 2. Minimum number of Storage Sync Services to create: 2.
    • B.Minimum number of sync groups to create: 1. Minimum number of Storage Sync Services to create: 3.
    • C.Minimum number of sync groups to create: 3. Minimum number of Storage Sync Services to create: 1.(correct answer)
    • D.Minimum number of sync groups to create: 2. Minimum number of Storage Sync Services to create: 4.
    Show answer & explanation

    Correct answer: C

    Minimum number of sync groups to create: 3. Minimum number of Storage Sync Services to create: 1.

    Explanation

    Azure File Sync configuration involves Storage Sync Services (the top-level resource) and Sync Groups (which define the replication topology). Minimum requirements depend on the number of endpoints and geographical distribution.

  14. Question 14.You need to implement an availability solution for DHCP that meets the networking requirements. Which two actions should you perform?

    • A.On DHCP1. create a scope that contains 25 percent of the IP addresses from Scope2.
    • B.On the router in each office, configure a DHCP relay.(correct answer)
    • C.DHCP2. configure a scope that contains 25 percent of the IP addresses from Scope 1.
    • D.On each DHCP server, install the Failover Clustering feature and add the DHCP cluster role.
    • E.On each DHCP scope, configure DHCP failover.(correct answer)
    Show answer & explanation

    Correct answer: B, E

    On the router in each office, configure a DHCP relay. / On each DHCP scope, configure DHCP failover.

    Explanation

    DHCP failover provides high availability by allowing two DHCP servers to share lease information. A DHCP relay agent (on the router) is required to forward requests from clients in different subnets to the DHCP servers.

  15. Question 15.You have a server named Host! that has the Hyper-V server role installed. Host! hosts a virtual machine named VM1. You have a management server named Server! that runs Windows Server. You remotely manage Host1 from Server1 by using Hyper-V Manager. You need to ensure that you can access a USB hard drive connected to Server1 when you connect to VM1 by using Virtual Machine Connection. Which two actions should you perform?

    • A.From the Hyper-V Settings of Host1, select Allow enhanced session mode.(correct answer)
    • B.From Disk Management on Host1. attach a virtual hard disk.
    • C.From Virtual Machine Connection, switch to a basic session.
    • D.From Virtual Machine Connection select Show Options and then select the USB hard drive.(correct answer)
    • E.From Disk Management on Host1, select Rescan Disks.
    Show answer & explanation

    Correct answer: A, D

    From the Hyper-V Settings of Host1, select Allow enhanced session mode. / From Virtual Machine Connection select Show Options and then select the USB hard drive.

    Explanation

    Enhanced session mode in Hyper-V allows redirection of local resources (like USB drives, printers, and clipboards) to the virtual machine session, provided it is supported by the guest OS and enabled on the host.

  16. Question 16.Fabrikam, Inc is a manufacturing company that has a main office in New York and a branch office in Seattle. The on-premises network contains servers that run Windows Server as shown in the following table. DC1 hosts all the operation master roles. VM1 and VM2 are connected to the internet. WEB1 and WEB2 run an Internet Information Services (IIS) web app named Webapp1. The New York and Seattle offices are connected by using redundant WAN links. The client computers in each office get IP addresses from their local DHCP server. DHCP1 contains a scope named Scope1 that has addresses for the New York office, DHCP2 contains a scope named Scope2 that has addresses for the Seattle office. The network contains a single on-premises Active Directory Domain Services (AD DS) domain named corp.falbrikam.com. Currently, all the service accounts use individual domain user accounts. All domain controllers have the DNS Server role installed and host a copy of the Active Directory integrated DNS zone of corp.fabrikam.com. The corp.fabrikam.com AD DS domain syncs with an Azure Active Directory (Azure AD) tenant. The corp.fabrikam.com domain contains the organizational units (OUs) and custom Group Policy Objects (GPOs) shown in the following table. Fabrikam identifies the following planned changes: Create a single Azure subscription named Sub1 that will contain a single Azure virtual network named Vnet1. Replace the WAN links between the Seattle and New York offices by using Azure Virtual WAN and FxpressRoute. Both on premises offices will be connected to Vnet1 by using ExpressRoute. Create three Azure file shares named newyorkfiles, seattlefiles, and companyfiles. Create a domain controller named dc3.corp.fabrikam.com in Vnet1. Deploy an Azure Virtual Desktop host pool to Vnet1. The Azure Virtual Desktop session hosts will be hybrid Azure AD-joined. License all servers for Microsoft Defender for servers. Use Azure Policy to enforce configuration management policies on the servers in Azure and on-premises. Fabrikam identifies the following networking requirements: Implement Virtual WAN and ensure that all the network traffic between the sites uses Virtual WAN. All communications must occur over ExpressRoute. If a DHCP server fails, ensure that the client computers can continue to receive their dynamic IP address and renew their existing lease. Ensure that the resources in Vnet1 can resolve the names of the on-premises servers in the corp.fabrikam.com domain. Fabrikam identifies the following security requirements: Apply GPO4 to the Azure Virtual Desktop session hosts. Ensure that Azure Virtual Desktop user sessions lock after being idle for 10 minutes. Users must be able to control the lockout time manually from their client computer. Ensure that server administrators request approval before they can establish a Remote Desktop connection to an Azure virtual machine. If the request is approved, the connection must be established within two hours. Prevent user passwords from containing all or part of words that are based on the company name, such as Fab, f@br1kAm or fabr!|. Ensure that all instances of Webapp1 use the same service account. The password of the service account must change automatically every 30 days. Prevent domain controllers from directly contacting hosts on the internet. You need to configure the synchronization of Azure files to meet the following requirements: Ensure that seattlefiles syncs to FS2. Ensure that newyorkfiles syncs to FS1. Ensure that companyfiles syncs to both FS1 and FS2. What should you implement for the deployment of DC3? ![Question 16 part 1](images/question7_16_17_19_22_29_45_1.jpg) ![Question 16 part 2](images/question7_16_17_19_22_29_45_2.jpg)

    • A.Azure Active Directory Domain Services (Azure AD DS).
    • B.Azure AD Application Proxy.
    • C.Azure virtual machine.(correct answer)
    • D.Azure AD administrative unit.
    Show answer & explanation

    Correct answer: C

    Azure virtual machine.

    Explanation

    To extend an on-premises Active Directory to Azure, you can deploy a domain controller on an Azure virtual machine and connect it to your on-premises network via VPN or ExpressRoute.

  17. Question 17.Fabrikam, Inc is a manufacturing company that has a main office in New York and a branch office in Seattle. The on-premises network contains servers that run Windows Server as shown in the following table. DC1 hosts all the operation master roles. VM1 and VM2 are connected to the internet. WEB1 and WEB2 run an Internet Information Services (IIS) web app named Webapp1. The New York and Seattle offices are connected by using redundant WAN links. The client computers in each office get IP addresses from their local DHCP server. DHCP1 contains a scope named Scope1 that has addresses for the New York office, DHCP2 contains a scope named Scope2 that has addresses for the Seattle office. The network contains a single on-premises Active Directory Domain Services (AD DS) domain named corp.falbrikam.com. Currently, all the service accounts use individual domain user accounts. All domain controllers have the DNS Server role installed and host a copy of the Active Directory integrated DNS zone of corp.fabrikam.com. The corp.fabrikam.com AD DS domain syncs with an Azure Active Directory (Azure AD) tenant. The corp.fabrikam.com domain contains the organizational units (OUs) and custom Group Policy Objects (GPOs) shown in the following table. Fabrikam identifies the following planned changes: Create a single Azure subscription named Sub1 that will contain a single Azure virtual network named Vnet1. Replace the WAN links between the Seattle and New York offices by using Azure Virtual WAN and FxpressRoute. Both on premises offices will be connected to Vnet1 by using ExpressRoute. Create three Azure file shares named newyorkfiles, seattlefiles, and companyfiles. Create a domain controller named dc3.corp.fabrikam.com in Vnet1. Deploy an Azure Virtual Desktop host pool to Vnet1. The Azure Virtual Desktop session hosts will be hybrid Azure AD-joined. License all servers for Microsoft Defender for servers. Use Azure Policy to enforce configuration management policies on the servers in Azure and on-premises. Fabrikam identifies the following networking requirements: Implement Virtual WAN and ensure that all the network traffic between the sites uses Virtual WAN. All communications must occur over ExpressRoute. If a DHCP server fails, ensure that the client computers can continue to receive their dynamic IP address and renew their existing lease. Ensure that the resources in Vnet1 can resolve the names of the on-premises servers in the corp.fabrikam.com domain. Fabrikam identifies the following security requirements: Apply GPO4 to the Azure Virtual Desktop session hosts. Ensure that Azure Virtual Desktop user sessions lock after being idle for 10 minutes. Users must be able to control the lockout time manually from their client computer. Ensure that server administrators request approval before they can establish a Remote Desktop connection to an Azure virtual machine. If the request is approved, the connection must be established within two hours. Prevent user passwords from containing all or part of words that are based on the company name, such as Fab, f@br1kAm or fabr!|. Ensure that all instances of Webapp1 use the same service account. The password of the service account must change automatically every 30 days. Prevent domain controllers from directly contacting hosts on the internet. You need to configure the synchronization of Azure files to meet the following requirements: Ensure that seattlefiles syncs to FS2. Ensure that newyorkfiles syncs to FS1. Ensure that companyfiles syncs to both FS1 and FS2. You need to meet the security requirements for passwords. Where should you configure the components for Azure AD Password Protection? ![Question 17 part 1](images/question7_16_17_19_22_29_45_1.jpg) ![Question 17 part 2](images/question7_16_17_19_22_29_45_2.jpg) ![Question 17 part 3](images/question17_3.jpg)

    • A.The Azure AD Password Protection DC agent: All the domain controllers. The Azure AD Password Protection proxy service: VM1 and VM2. A custom banned password list: The Azure AD tenant.(correct answer)
    • B.The Azure AD Password Protection DC agent: DC1 only. The Azure AD Password Protection proxy service: The Azure AD tenant. A custom banned password list: VM1 and VM2.
    • C.The Azure AD Password Protection DC agent: VM1 and VM2. The Azure AD Password Protection proxy service: All the domain controllers. A custom banned password list: DC1 only.
    • D.The Azure AD Password Protection DC agent: All the domain controllers. The Azure AD Password Protection proxy service: The Azure AD tenant. A custom banned password list: VM1 and VM2.
    Show answer & explanation

    Correct answer: A

    The Azure AD Password Protection DC agent: All the domain controllers. The Azure AD Password Protection proxy service: VM1 and VM2. A custom banned password list: The Azure AD tenant.

    Explanation

    Azure AD Password Protection for on-premises AD DS requires a DC agent on every domain controller to intercept password changes and a proxy service on a member server to communicate with the Azure AD tenant.

  18. Question 18.You have an Azure virtual machine named VM1 that runs Windows Server. You perform the following actions on VM1: Create a folder named Folder1 on volume C. Create a folder named Folder2 on volume D. Add a new data disk to VM1 and create a new volume that is assigned drive letter E. Install an app named App1 on volume E. You plan to resize VM1. Which objects will present after you resize VM1?

    • A.Folder1 and Folder2 only.
    • B.Folder1, volume E, and App1 only.(correct answer)
    • C.Folder1 only.
    • D.Folder1, Folder2, App1, and volume E.
    Show answer & explanation

    Correct answer: B

    Folder1, volume E, and App1 only.

    Explanation

    When resizing an Azure VM, the OS disk (C:) and data disks (E:) are preserved. However, the temporary disk (D:) is ephemeral and its data may be lost if the VM is moved to a new host during the resize.

  19. Question 19.Fabrikam, Inc is a manufacturing company that has a main office in New York and a branch office in Seattle. The on-premises network contains servers that run Windows Server as shown in the following table. DC1 hosts all the operation master roles. VM1 and VM2 are connected to the internet. WEB1 and WEB2 run an Internet Information Services (IIS) web app named Webapp1. The New York and Seattle offices are connected by using redundant WAN links. The client computers in each office get IP addresses from their local DHCP server. DHCP1 contains a scope named Scope1 that has addresses for the New York office, DHCP2 contains a scope named Scope2 that has addresses for the Seattle office. The network contains a single on-premises Active Directory Domain Services (AD DS) domain named corp.falbrikam.com. Currently, all the service accounts use individual domain user accounts. All domain controllers have the DNS Server role installed and host a copy of the Active Directory integrated DNS zone of corp.fabrikam.com. The corp.fabrikam.com AD DS domain syncs with an Azure Active Directory (Azure AD) tenant. The corp.fabrikam.com domain contains the organizational units (OUs) and custom Group Policy Objects (GPOs) shown in the following table. Fabrikam identifies the following planned changes: Create a single Azure subscription named Sub1 that will contain a single Azure virtual network named Vnet1. Replace the WAN links between the Seattle and New York offices by using Azure Virtual WAN and FxpressRoute. Both on premises offices will be connected to Vnet1 by using ExpressRoute. Create three Azure file shares named newyorkfiles, seattlefiles, and companyfiles. Create a domain controller named dc3.corp.fabrikam.com in Vnet1. Deploy an Azure Virtual Desktop host pool to Vnet1. The Azure Virtual Desktop session hosts will be hybrid Azure AD-joined. License all servers for Microsoft Defender for servers. Use Azure Policy to enforce configuration management policies on the servers in Azure and on-premises. Fabrikam identifies the following networking requirements: Implement Virtual WAN and ensure that all the network traffic between the sites uses Virtual WAN. All communications must occur over ExpressRoute. If a DHCP server fails, ensure that the client computers can continue to receive their dynamic IP address and renew their existing lease. Ensure that the resources in Vnet1 can resolve the names of the on-premises servers in the corp.fabrikam.com domain. Fabrikam identifies the following security requirements: Apply GPO4 to the Azure Virtual Desktop session hosts. Ensure that Azure Virtual Desktop user sessions lock after being idle for 10 minutes. Users must be able to control the lockout time manually from their client computer. Ensure that server administrators request approval before they can establish a Remote Desktop connection to an Azure virtual machine. If the request is approved, the connection must be established within two hours. Prevent user passwords from containing all or part of words that are based on the company name, such as Fab, f@br1kAm or fabr!|. Ensure that all instances of Webapp1 use the same service account. The password of the service account must change automatically every 30 days. Prevent domain controllers from directly contacting hosts on the internet. You need to configure the synchronization of Azure files to meet the following requirements: Ensure that seattlefiles syncs to FS2. Ensure that newyorkfiles syncs to FS1. Ensure that companyfiles syncs to both FS1 and FS2. Which three actions should you perform in sequence to meet the security requirements for Webapp1? ![Question 19 part 1](images/question7_16_17_19_22_29_45_1.jpg) ![Question 19 part 2](images/question7_16_17_19_22_29_45_2.jpg) ![Question 19 part 3](images/question19_3.jpeg)

    • A.Box 1: Configure the IIS application pool to run as Network Service. Box 2: Create a group managed service account (gMSA) in Active Directory. Box 3: Create the Key Distribution Services (KDS) root key in AD DS.
    • B.Box 1: Create the Key Distribution Services (KDS) root key in AD DS. Box 2: Create a group managed service account (gMSA) in Active Directory. Box 3: Configure the IIS application pool to run as Network Service.(correct answer)
    • C.Box 1: Create a standalone managed service account (sMSA) in AD DS. Box 2: Create a group managed service account (gMSA) in Active Directory. Box 3: Configure the IIS application pool to run as Network Service.
    • D.Box 1: Create a system-assigned managed identity in Azure AD. Box 2: Create a group managed service account (gMSA) in Active Directory. Box 3: Create the Key Distribution Services (KDS) root key in AD DS.
    Show answer & explanation

    Correct answer: B

    Box 1: Create the Key Distribution Services (KDS) root key in AD DS. Box 2: Create a group managed service account (gMSA) in Active Directory. Box 3: Configure the IIS application pool to run as Network Service.

    Explanation

    Implementing a group Managed Service Account (gMSA) involves creating a KDS root key (one-time forest requirement), creating the account in AD, and then configuring the service (e.g., IIS App Pool) to use it.

  20. Question 20.Contoso, Ltd. is a company that has a main office in Seattle and two branch offices in Los Angeles and Montreal. The network contains an on premises Active Directory Domain Services (AD DS) forest named contoso.com. The forest contains two domains named contoso.com and canada.contoso.com. The forest contains the domain controllers shown in the following table. All the domain controllers are global catalog servers. The network contains the servers shown in the following table. A server named Server4 runs Windows Server and is in a workgroup. Windows Firewall on Server4 uses the private profile. Server2 hosts three virtual machines named VM1, VM2, and VM3. VM3 is a file server that stores data in the volumes shown in the following table. The contoso.com domain has the Group Policies Objects (GPOs) shown in the following table. The forest contains the users shown in the following table. The forest contains the groups shown in the following table. When an administrator signs in to the console of VM2 by using Virtual Machine Connection, and then disconnects from the session without signing out, another administrator can connect to the console session as the currently signed in user. Contoso identifies the following technical requirements: Change the replication schedule for all site links to 30 minutes. Promote Server1 to a domain controller in canada.contoso.com. Install and authorize Server3 as a DHCP server. Ensure that User1 can manage the membership of all the groups in Contoso\OU3. Ensure that you can manage Server4 from Server1 by using PowerShell remoting. Ensure that you can run virtual machines on VM1. Force users to provide credentials when they connect to VM2. On VM3, ensure that Data Deduplication on all volumes is possible. You need to meet the technical requirements for Server4. Which cmdlets should you run on Server1 and Server4? ![Question 20 part 1](images/question5_8_9_20_33_38_39_43_1.jpg) ![Question 20 part 2](images/question5_8_9_20_33_38_39_43_2.jpg) ![Question 20 part 3](images/question5_8_9_20_33_38_39_43_3.jpg) ![Question 20 part 4](images/question5_8_9_20_33_38_39_43_4.jpg) ![Question 20 part 5](images/question5_8_9_20_33_38_39_43_5.jpg) ![Question 20 part 6](images/question5_8_9_20_33_38_39_43_6.jpg) ![Question 20 part 7](images/question20_7.jpg)

    • A.Server1: Enable-ServerManagerStandardUserRemoting. Server4: Enable-PSRemoting.
    • B.Server1: Enable-PSRemoting. Server4: Enable-ServerManagerStandardUserRemoting.
    • C.Server1: Set-Item. Server4: Enable-PSRemoting.
    • D.Server1: Start-Service. Server4: Enable-PSRemoting.(correct answer)
    Show answer & explanation

    Correct answer: D

    Server1: Start-Service. Server4: Enable-PSRemoting.

    Explanation

    To manage a workgroup server from another server via PowerShell remoting, you must enable PSRemoting on the target and ensure the management server trusts the target (using TrustedHosts) or uses a valid certificate.

  21. Question 21.You have a file server named Server1 that runs Windows Server and contains the volumes shown in the following table. On which volumes can you use BitLocker Drive Encryption (BitLocker) and disk quotas? ![Question 21 part 1](images/question21_1.jpg) ![Question 21 part 2](images/question21_2.jpg)

    • A.BitLocker: C, D, and E. Disk quotas: C and D only.
    • B.BitLocker: C and D only. Disk quotas: C, D, and E.
    • C.BitLocker: C only. Disk quotas: D only.
    • D.BitLocker: D only. Disk quotas: C only.
    Show answer & explanation

    Correct answer:

    Explanation

    BitLocker Drive Encryption can be used on NTFS, ReFS, FAT16, FAT32, and exFAT volumes. Disk quotas in Windows Server are only supported on NTFS volumes.

  22. Question 22.Fabrikam, Inc is a manufacturing company that has a main office in New York and a branch office in Seattle. The on-premises network contains servers that run Windows Server as shown in the following table. DC1 hosts all the operation master roles. VM1 and VM2 are connected to the internet. WEB1 and WEB2 run an Internet Information Services (IIS) web app named Webapp1. The New York and Seattle offices are connected by using redundant WAN links. The client computers in each office get IP addresses from their local DHCP server. DHCP1 contains a scope named Scope1 that has addresses for the New York office, DHCP2 contains a scope named Scope2 that has addresses for the Seattle office. The network contains a single on-premises Active Directory Domain Services (AD DS) domain named corp.falbrikam.com. Currently, all the service accounts use individual domain user accounts. All domain controllers have the DNS Server role installed and host a copy of the Active Directory integrated DNS zone of corp.fabrikam.com. The corp.fabrikam.com AD DS domain syncs with an Azure Active Directory (Azure AD) tenant. The corp.fabrikam.com domain contains the organizational units (OUs) and custom Group Policy Objects (GPOs) shown in the following table. Fabrikam identifies the following planned changes: Create a single Azure subscription named Sub1 that will contain a single Azure virtual network named Vnet1. Replace the WAN links between the Seattle and New York offices by using Azure Virtual WAN and FxpressRoute. Both on premises offices will be connected to Vnet1 by using ExpressRoute. Create three Azure file shares named newyorkfiles, seattlefiles, and companyfiles. Create a domain controller named dc3.corp.fabrikam.com in Vnet1. Deploy an Azure Virtual Desktop host pool to Vnet1. The Azure Virtual Desktop session hosts will be hybrid Azure AD-joined. License all servers for Microsoft Defender for servers. Use Azure Policy to enforce configuration management policies on the servers in Azure and on-premises. Fabrikam identifies the following networking requirements: Implement Virtual WAN and ensure that all the network traffic between the sites uses Virtual WAN. All communications must occur over ExpressRoute. If a DHCP server fails, ensure that the client computers can continue to receive their dynamic IP address and renew their existing lease. Ensure that the resources in Vnet1 can resolve the names of the on-premises servers in the corp.fabrikam.com domain. Fabrikam identifies the following security requirements: Apply GPO4 to the Azure Virtual Desktop session hosts. Ensure that Azure Virtual Desktop user sessions lock after being idle for 10 minutes. Users must be able to control the lockout time manually from their client computer. Ensure that server administrators request approval before they can establish a Remote Desktop connection to an Azure virtual machine. If the request is approved, the connection must be established within two hours. Prevent user passwords from containing all or part of words that are based on the company name, such as Fab, f@br1kAm or fabr!|. Ensure that all instances of Webapp1 use the same service account. The password of the service account must change automatically every 30 days. Prevent domain controllers from directly contacting hosts on the internet. You need to configure the synchronization of Azure files to meet the following requirements: Ensure that seattlefiles syncs to FS2. Ensure that newyorkfiles syncs to FS1. Ensure that companyfiles syncs to both FS1 and FS2. You need to configure the Group Policy settings to ensure that the Azure Virtual Desktop session hosts meet the security requirements. What should you configure? ![Question 22 part 1](images/question7_16_17_19_22_29_45_1.jpg) ![Question 22 part 2](images/question7_16_17_19_22_29_45_2.jpg)

    • A.Security filtering for the link of GP04.
    • B.Security filtering for the link of GPO1.
    • C.Loopback processing in GPO4.(correct answer)
    • D.Enforced property for the link of GP01.
    • E.Loopback processing in GPO1.
    • F.Enforced property for the link of GP04.
    Show answer & explanation

    Correct answer: C

    Loopback processing in GPO4.

    Explanation

    Loopback processing in Group Policy is used to apply user configuration settings to any user who logs on to a specific computer, regardless of which OU the user object resides in. This is common for RDS/AVD hosts.

  23. Question 23.You have two on-premises servers named Server1 and Servet2 that run Windows Server. You have an Azure Storage account named storage1 that contains a file share named share. Server1 syncs with share1 by using Azure File Sync You need to configure Server2 to sync with share1. Which three actions should you perform in sequence? ![Question 23](images/question23.jpeg)

    • A.Box 1: Add a Storage Sync Service to the Azure Subscription. Box 2: Add a server endpoint to the sync group. Box 3: On Server2, install the Azure File Sync agent.
    • B.Box 1: Add a server endpoint to the sync group. Box 2: On Server2, install the Azure File Sync agent. Box 3: Add a cloud endpoint to the sync group.
    • C.Box 1: On Server2, install the Azure File Sync agent. Box 2: Add a cloud endpoint to the sync group. Box 3: Register Server2 with the Storage Sync Service.
    • D.Box 1: On Server2, install the Azure File Sync agent. Box 2: Register Server2 with the Storage Sync Service. Box 3: Add a server endpoint to the sync group.(correct answer)
    Show answer & explanation

    Correct answer: D

    Box 1: On Server2, install the Azure File Sync agent. Box 2: Register Server2 with the Storage Sync Service. Box 3: Add a server endpoint to the sync group.

    Explanation

    To add a new server to an existing Azure File Sync topology, you must first install the AFS agent on the new server, register it with the Storage Sync Service, and then add it as a server endpoint to the desired sync group.

  24. Question 24.Which groups can you add to Group3 and Group5? ![Question 24](images/question24.jpg)

    • A.Group3: Group1 and Group2 only. Group5: Group4 only.
    • B.Group3: Group1 and Group4 only. Group5: Group6 only.
    • C.Group3: Group1, Group2, Group4, and Group5 only. Group5: Group4 only.(correct answer)
    • D.Group3: Group6 only. Group5: Group4 and Group6 only.
    Show answer & explanation

    Correct answer: C

    Group3: Group1, Group2, Group4, and Group5 only. Group5: Group4 only.

    Explanation

    In AD DS, Global groups can contain user accounts and global groups from the same domain. Domain Local groups can contain users, global groups, and universal groups from any domain in the forest.

  25. Question 25.You have five tile servers that run Windows Server. You need to block users from uploading video files that have the .mov extension to shared folders on the file servers. All other types of files must be allowed. The solution must minimize administrative effort. What should you create?

    • A.Dynamic Access Control central access policy.
    • B.File screen.(correct answer)
    • C.Dynamic Access Control central access rule.
    • D.Data loss prevention (DLP) policy.
    Show answer & explanation

    Correct answer: B

    File screen.

    Explanation

    File Server Resource Manager (FSRM) screens allow you to block specific file types based on extensions across multiple folders or volumes, helping to control storage usage and compliance.

  26. Question 26.Your network contains an Active Directory Domain Services (AD DS) domain named adatum.com. The domain contains a server named Server1 and the users shown in the following table. Server1 contains a folder named D:Folder1. The advanced security settings for Folder 1 are configured as shown in the Permissions exhibit. Folder1 is shared by using the following configurations. The share permissions for Share1 are shown in the following table. User1 can read the files in Share1. ![Question 26 part 1](images/question26_27_28_1.jpg) ![Question 26 part 2](images/question26_27_28_2.png) ![Question 26 part 3](images/question26_27_28_3.png) ![Question 26 part 4](images/question26_27_28_4.png)

    • A.Yes.(correct answer)
    • B.No.
    Show answer & explanation

    Correct answer: A

    Yes.

    Explanation

    Effective permissions are the combination of Share and NTFS permissions. The most restrictive permission applies when comparing Share and NTFS levels.

  27. Question 27.Your network contains an Active Directory Domain Services (AD DS) domain named adatum.com. The domain contains a server named Server1 and the users shown in the following table. Server1 contains a folder named D:Folder1. The advanced security settings for Folder 1 are configured as shown in the Permissions exhibit. Folder1 is shared by using the following configurations. The share permissions for Share1 are shown in the following table. User3 can delete files in Share1. ![Question 27 part 1](images/question26_27_28_1.jpg) ![Question 27 part 2](images/question26_27_28_2.png) ![Question 27 part 3](images/question26_27_28_3.png) ![Question 27 part 4](images/question26_27_28_4.png)

    • A.Yes.
    • B.No.(correct answer)
    Show answer & explanation

    Correct answer: B

    No.

    Explanation

    User permissions can be explicitly denied or limited by the combination of groups. If the effective permission (lower of Share vs NTFS) does not include 'Modify' or 'Full Control', the user cannot delete files.

  28. Question 28.Your network contains an Active Directory Domain Services (AD DS) domain named adatum.com. The domain contains a server named Server1 and the users shown in the following table. Server1 contains a folder named D:Folder1. The advanced security settings for Folder 1 are configured as shown in the Permissions exhibit. Folder1 is shared by using the following configurations. The share permissions for Share1 are shown in the following table. If User2 connects to \\Server1.adatum.com from File Explorer, Share1 will be listed. ![Question 28 part 1](images/question26_27_28_1.jpg) ![Question 28 part 2](images/question26_27_28_2.png) ![Question 28 part 3](images/question26_27_28_3.png) ![Question 28 part 4](images/question26_27_28_4.png)

    • A.Yes.(correct answer)
    • B.No.
    Show answer & explanation

    Correct answer: A

    Yes.

    Explanation

    Access-Based Enumeration (ABE) hides files and folders that a user does not have permissions to access. If the user has at least Read access, the share remains visible in File Explorer.

  29. Question 29.Fabrikam, Inc is a manufacturing company that has a main office in New York and a branch office in Seattle. The on-premises network contains servers that run Windows Server as shown in the following table. DC1 hosts all the operation master roles. VM1 and VM2 are connected to the internet. WEB1 and WEB2 run an Internet Information Services (IIS) web app named Webapp1. The New York and Seattle offices are connected by using redundant WAN links. The client computers in each office get IP addresses from their local DHCP server. DHCP1 contains a scope named Scope1 that has addresses for the New York office, DHCP2 contains a scope named Scope2 that has addresses for the Seattle office. The network contains a single on-premises Active Directory Domain Services (AD DS) domain named corp.falbrikam.com. Currently, all the service accounts use individual domain user accounts. All domain controllers have the DNS Server role installed and host a copy of the Active Directory integrated DNS zone of corp.fabrikam.com. The corp.fabrikam.com AD DS domain syncs with an Azure Active Directory (Azure AD) tenant. The corp.fabrikam.com domain contains the organizational units (OUs) and custom Group Policy Objects (GPOs) shown in the following table. Fabrikam identifies the following planned changes: Create a single Azure subscription named Sub1 that will contain a single Azure virtual network named Vnet1. Replace the WAN links between the Seattle and New York offices by using Azure Virtual WAN and FxpressRoute. Both on premises offices will be connected to Vnet1 by using ExpressRoute. Create three Azure file shares named newyorkfiles, seattlefiles, and companyfiles. Create a domain controller named dc3.corp.fabrikam.com in Vnet1. Deploy an Azure Virtual Desktop host pool to Vnet1. The Azure Virtual Desktop session hosts will be hybrid Azure AD-joined. License all servers for Microsoft Defender for servers. Use Azure Policy to enforce configuration management policies on the servers in Azure and on-premises. Fabrikam identifies the following networking requirements: Implement Virtual WAN and ensure that all the network traffic between the sites uses Virtual WAN. All communications must occur over ExpressRoute. If a DHCP server fails, ensure that the client computers can continue to receive their dynamic IP address and renew their existing lease. Ensure that the resources in Vnet1 can resolve the names of the on-premises servers in the corp.fabrikam.com domain. Fabrikam identifies the following security requirements: Apply GPO4 to the Azure Virtual Desktop session hosts. Ensure that Azure Virtual Desktop user sessions lock after being idle for 10 minutes. Users must be able to control the lockout time manually from their client computer. Ensure that server administrators request approval before they can establish a Remote Desktop connection to an Azure virtual machine. If the request is approved, the connection must be established within two hours. Prevent user passwords from containing all or part of words that are based on the company name, such as Fab, f@br1kAm or fabr!|. Ensure that all instances of Webapp1 use the same service account. The password of the service account must change automatically every 30 days. Prevent domain controllers from directly contacting hosts on the internet. You need to configure the synchronization of Azure files to meet the following requirements: Ensure that seattlefiles syncs to FS2. Ensure that newyorkfiles syncs to FS1. Ensure that companyfiles syncs to both FS1 and FS2. You are planning the implementation Azure Arc to support the planned changes. You need to configure the environment to support configuration management policies. What should you do? ![Question 29 part 1](images/question7_16_17_19_22_29_45_1.jpg) ![Question 29 part 2](images/question7_16_17_19_22_29_45_2.jpg)

    • A.Hybrid Azure AD join all the servers.
    • B.Create a hybrid runbook worker m Azure Automation.
    • C.Deploy the Azure Connected Machine agent to all the servers.(correct answer)
    • D.Deploy the Azure Monitor agent to all the servers.
    Show answer & explanation

    Correct answer: C

    Deploy the Azure Connected Machine agent to all the servers.

    Explanation

    Azure Arc-enabled servers allow you to manage your on-premises and multi-cloud machines through the Azure portal. The Azure Connected Machine agent is required to register and manage these machines.

  30. Question 30.You have a Windows Server container host named Server 1 and a container image named Image1. You need to start a container from image1. The solution must run the container on a Hyper-V virtual machine. Which parameter should you specify when you run the docker run command?

    • A.–expose.
    • B.–privileged.
    • C.–runtime.
    • D.–entrypoint.
    • E.–isolation.(correct answer)
    Show answer & explanation

    Correct answer: E

    –isolation.

    Explanation

    Windows Server support two types of container isolation: process isolation (Windows Server Containers) and Hyper-V isolation. The '--isolation' parameter in the 'docker run' command specifies which one to use.

Ready for the full AZ-800 exam?

Get all 150+ Questions, timed simulation, and weak-area analytics. Plans from $2.99 — credits never expire.

See pricing

Frequently Asked Questions

Are these real AZ-800 practice questions?+
Yes. These 30 questions are taken directly from our 150+ Questions pool, written and reviewed by certified practitioners. They mirror the style, difficulty, and scope of the official Azure AZ-800 exam.
Is the AZ-800 exam hard?+
The Azure Azure Hybrid Administrator (AZ-800) is considered a pass-mark exam (passing score: 700 out of 1000). Most candidates need 4–8 weeks of focused preparation. Use these free questions to gauge where you stand before committing to a full study plan.
How many questions are on the real AZ-800 exam?+
The official AZ-800 exam has 40-60 questions.
Do I need to sign up to use these questions?+
No. These 30 questions are free and require no signup. If you want timed simulation, performance analytics, and access to all 150+ Questions, our paid plans start at $2.99 per exam with credits that never expire.

Keep studying

Pass AZ-800 on your first try

Join candidates using DummyExams to practice with realistic timed exams, detailed explanations, and weak-area analytics.

Start full AZ-800 practice exam