New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft AZ-140 Exam - Topic 3 Question 26 Discussion

Actual exam question for Microsoft's AZ-140 exam
Question #: 26
Topic #: 3
[All AZ-140 Questions]

You have a Azure Virtual Desktop deployment.

You need to monitor the deployment of using the Azure Virtual Desktop Insights solution in Azure Monitor.

What should you use as the Diagnostic settings destination for the host pool?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

0/2000 characters
Fabiola
4 months ago
Wait, can you really use a storage account for this? Sounds off.
upvoted 0 times
...
Ines
4 months ago
Totally agree, Log Analytics is the way to go!
upvoted 0 times
...
Nikita
4 months ago
Storage account seems like an odd choice here.
upvoted 0 times
...
Judy
5 months ago
I thought Event hub might be better for real-time data.
upvoted 0 times
...
Tabetha
5 months ago
Definitely Log Analytics workspace for monitoring!
upvoted 0 times
...
Margurite
5 months ago
I think the Log Analytics workspace is the most common destination for diagnostic settings, but I can't recall if there are exceptions for specific use cases.
upvoted 0 times
...
Jade
5 months ago
I feel like I might be mixing up the options. Wasn't there something about using Event Hub for real-time data streaming?
upvoted 0 times
...
Hyun
5 months ago
I remember practicing a similar question where we had to choose between Log Analytics and a storage account. Log Analytics seemed to be the better fit for insights.
upvoted 0 times
...
Stefanie
5 months ago
I think the Log Analytics workspace is the right choice for monitoring, but I'm not entirely sure if Event Hub could also work in some scenarios.
upvoted 0 times
...
Rosalind
5 months ago
Okay, I think I've got it. The agent starts 6 minutes before the scheduled shift, and the Start Before threshold is 5 minutes. So they're starting 1 minute earlier than the allowed threshold, which means they're considered non-adherent. The answer is B.
upvoted 0 times
...
King
5 months ago
This looks like a straightforward question about using security baselines from the Microsoft Security Compliance Toolkit. I think the key is to identify the right tool to compare the baselines to the current device configurations.
upvoted 0 times
...
Latanya
5 months ago
I remember we practiced top-down estimating in class, but wasn't there a point where we said it isn't as precise as the others?
upvoted 0 times
...
Lorrie
5 months ago
Hmm, this one seems a bit tricky. I'll need to re-read the CAN-SPAM Act details to make sure I understand the specific criteria for a compliant transactional email.
upvoted 0 times
...

Save Cancel