Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > Microsoft > Microsoft Certifications > AZ-800 > AZ-800 Online Practice Questions and Answers

AZ-800 Online Practice Questions and Answers

Questions 4

You need to meet the technical requirements for VM3. On which volumes can you enable Data Deduplication?

A. C and D only

B. D only

C. C, D, E, and F

D. D and E only

E. D, E, and F only

Buy Now

Correct Answer: D

Reference: https://docs.microsoft.com/en-us/windows-server/storage/data-deduplication/understand

Questions 5

SIMULATION

You need to configure a Group Policy preference to ensure that users in the organizational unit (OU) named Server Admins have a shortcut to a folder named \\srv1.contoso.com\data on their desktop when they sign in to the computers in the domain.

To complete this task, sign in the required computer or computers.

A. See explanation below.

B. PlaceHolder

C. PlaceHolder

D. PlaceHolder

Buy Now

Correct Answer: A

Create Desktop Shortcuts on Domain Computers via GPO.

Step 1: Open the Group Policy Management Console (gpmc.msc).

Step 2: Right-click an AD container (Organizational Unit) you want to apply a shortcut creation policy. In this case right-click on the OU Server Admins.

Step 3: Select Create a GPO in this domain, and Link it here..

Step 4: Go to the Group Policy Preferences section: User Configuration -> Preferences -> Windows Settings -> Shortcuts. Click it and select New -> Shortcut;

Step 5: Create a new shortcut item with the following settings: Name: Something Target Type: File System Object (you can select a URL or a Shell object here) Location: Desktop Target Path: \\srv1.contoso.com\data

Reference: http://woshub.com/create-desktop-shortcuts-group-policy/

Questions 6

SIMULATION

You need to ensure that DC2 is the schema master for contoso.com.

To complete this task, sign in the required computer or computers.

A. See explanation below.

B. PlaceHolder

C. PlaceHolder

D. PlaceHolder

Buy Now

Correct Answer: A

Seize operations master roles

You cannot use AD DS snap-ins to seize operations master roles. Instead, you must use either the ntdsutil.exe command-line tool or Windows PowerShell to seize roles.

To seize or transfer the FSMO roles by using the Ntdsutil utility, follow these steps:

Step 1: Sign in to a member computer, in our case DC2, that has the AD RSAT tools installed, or a DC that is located in the forest where FSMO roles are being transferred.

Step 2: Select Start > Run, type ntdsutil in the Open box, and then select OK.

Step 3: Type roles, and then press Enter.

Note:

To see a list of available commands at any one of the prompts in the Ntdsutil utility, type ?, and then press Enter.

Step 4: Type connections, and then press Enter.

Step 5: Type connect to server , and then press Enter.

Step 6: At the server connections prompt, type q, and then press Enter.

Step 7: To seize the role: Type seize , and then press Enter.

In our case we type: size schema master.

Step 8: At the fsmo maintenance prompt, type q, and then press Enter to gain access to the ntdsutil prompt. Type q, and then press Enter to quit the Ntdsutil utility.

Reference: https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/transfer-or-seize-fsmo-roles-in-ad-ds

Questions 7

You have a server named Server1 that hosts Windows containers.

You plan to deploy an application that will have multiple containers. Each container will be on the same subnet. Each container requires a separate MAC address and IP address. Each container must be able to communicate by using its IP

address.

You need to create a Docker network that supports the deployment of the application.

Which type of network should you create?

A. NAT

B. transparent

C. I2bridge

D. I2tunnel

Buy Now

Correct Answer: B

Reference: https://docs.microsoft.com/en-us/virtualization/windowscontainers/container-networking/network-drivers-topologies

Questions 8

Your network contains an on -premises Active Directory Domain Services (AD DS) domain named contoso.com The domain contains the objects shown in the following table.

You plan to sync contoso.com with an Azure Active Directory (Azure AD) tenant by using Azure AD Connect You need to ensure that all the objects can be used in Conditional Access policies

What should you do?

A. Change the scope of Group2 to Universal.

B. Clear the Configure device writeback option.

C. Change the scope of Group1 and Group2 to Global.

D. Select the Configure Hybrid Azure AD join option.

Buy Now

Correct Answer: D

Hybrid Azure AD join needs to be configured to enable Computer1 to be used in Conditional Access Policies. Synchronized users, universal groups and domain local groups can be used in Conditional Access Policies.

Questions 9

You have an Azure virtual machine named Server1 that runs a network management application. Server1 has the following network configurations:

1.

Network interface: Nic1

2.

IP address: 10.1.1.1/24

3.

Connected to: Vnet1/Subnet1

You need to connect Server1 to an additional subnet named Vnet1/Subnet2.

What should you do?

A. Modify the IP configurations of Nic1.

B. Add an IP configuration to Nic1.

C. Add a network interface to Server1.

D. Create a private endpoint on Subnet2.

Buy Now

Correct Answer: C

First add another network interface to Server1, then connect it to Subnet2.

Virtual network and subnets.

A subnet is a range of IP addresses in the virtual network. You can divide a virtual network into multiple subnets for organization and security. Each NIC in a VM is connected to one subnet in one virtual network. NICs connected to subnets

(same or different) within a virtual network can communicate with each other without any extra configuration.

Reference:

https://docs.microsoft.com/en-us/azure/virtual-network/network-overview

Questions 10

You have an Azure subscription. The subscription contains a virtual machine named VM1 that runs Windows Server.

You plan to manage VM1 by using a PowerShell runbook.

You need to create the runbook.

What should you create first?

A. an Azure Automation account

B. an Azure workbook

C. a Log Analytics workspace

D. a Microsoft Power Automate flow

Buy Now

Correct Answer: A

Create Automation PowerShell runbook using managed identity This tutorial walks you through creating a PowerShell runbook in Azure Automation that uses a managed identity, rather than the Run As account to interact with resources. PowerShell runbooks are based on Windows PowerShell. A managed identity from Azure Active Directory (Azure AD) allows your runbook to easily access other Azure AD-protected resources.

Prerequisites

*

An Azure Automation account with at least one user-assigned managed identity.

*

Etc.

Reference: https://learn.microsoft.com/en-us/azure/automation/learn/powershell-runbook-managed-identity

Questions 11

HOTSPOT

You have a server named Server1 that runs Windows Server and has the Hyper-V server role installed.

You need to limit which Hyper-V module cmdlets helpdesk users can use when administering Server1 remotely.

You configure Just Enough Administration (JEA) and successfully build the role capabilities and session configuration files.

How should you complete the PowerShell command? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Buy Now

Correct Answer:

Reference: https://docs.microsoft.com/en-us/powershell/scripting/learn/remoting/jea/session-configurations?view=powershell-7.2 https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/new-pssessionconfigurationfile?view=powershell-7.2

Questions 12

HOTSPOT

Your network contains an Azure Active Directory Domain Services (Azure AD DS) domain named contoso.com.

You need to configure a password policy for the local user accounts on the Azure virtual machines joined to contoso.com.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Buy Now

Correct Answer:

Box 1: AAD DC Administrators group

To create a custom password policy in a managed domain, you must be signed in to a user account that's a member of the AAD DC Administrators group.

Box 2: AADDC Users organizational unit (OU)

Password policies can only be applied to groups. In the Locations dialog, expand the domain name, such as aaddscontoso.com, then select an OU, such as AADDC Users. If you have a custom OU that contains a group of users you wish to

apply, select that OU.

Reference: https://learn.microsoft.com/en-us/azure/active-directory-domain-services/password-policy

Questions 13

HOTSPOT

Your on-premises network contains an Active Directory Domain Services (AD DS) domain. The domain contains the servers shown in the following table.

The domain controllers do NOT have internet connectivity.

You plan to implement Azure AD Password Protection for the domain.

You need to deploy Azure AD Password Protection agents. The solution must meet the following requirements:

1.

All Azure AD Password Protection policies must be enforced.

2.

Agent updates must be applied automatically.

3.

Administrative effort must be minimized.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Buy Now

Correct Answer:

Box 1: DC1 and DC2 only Install the Azure AD Password Protection agent on

Incorrect:

* RODC1 Read-only domain controller considerations Password change or set events aren't processed and persisted on read-only domain controllers (RODCs). Instead, they're forwarded to writable domain controllers. You don't have to install the Microsoft Entra Password Protection DC agent software on RODCs.

Box 2: Server2

Install the Azure AD Password Protection Proxy on

Microsoft Entra Password Protection proxy service

The following requirements apply to the Microsoft Entra Password Protection proxy service:

*

Network access must be enabled for the set of ports and URLs specified in the Application Proxy environment setup procedures.

*

Etc.

Note: Deployment strategy

The following diagram shows how the basic components of Microsoft Entra Password Protection work together in an on-premises Active Directory environment:

Reference: https://learn.microsoft.com/en-us/entra/identity/authentication/howto-password-ban-bad-on-premises-deploy

Exam Code: AZ-800
Exam Name: Administering Windows Server Hybrid Core Infrastructure
Last Update: Jun 13, 2025
Questions: 247

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.