New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft AZ-400 Exam - Topic 6 Question 70 Discussion

Actual exam question for Microsoft's AZ-400 exam
Question #: 70
Topic #: 6
[All AZ-400 Questions]

You have an Azure subscription that uses Azure Monitor and contains a Log Analytics workspace.

You have an encryption key.

You need to configure Azure Monitor to use the key to encrypt log data

Show Suggested Answer Hide Answer
Suggested Answer:
Create an Azure key vault and store the key. Configure the key vault properties for the cluster. Grant the system-assigned managed identity Key permission for the key vault. Create an Azure Monitor Logs dedicated cluster that has a system-assigned managed identity. Link the log Analytics workspace to the cluster.

Contribute your Thoughts:

0/2000 characters
Dorcas
4 months ago
I thought encryption was only for storage accounts, not logs.
upvoted 0 times
...
Ashlee
4 months ago
Just make sure your permissions are set correctly!
upvoted 0 times
...
Gail
4 months ago
Wait, can you really encrypt log data like that?
upvoted 0 times
...
Terrilyn
4 months ago
Totally agree, it's the best way to manage keys!
upvoted 0 times
...
Raina
5 months ago
You can use Azure Key Vault for encryption keys.
upvoted 0 times
...
Adolph
5 months ago
I think there's a specific setting in Azure Monitor for enabling encryption, but I can't remember if it requires additional configurations for the key.
upvoted 0 times
...
Kristofer
5 months ago
I feel like we might have to set some permissions for the Log Analytics workspace to access the encryption key, but I’m a bit hazy on the details.
upvoted 0 times
...
Shantay
5 months ago
I remember a practice question about configuring encryption for log data, but I can't recall if it specifically mentioned using a key or just default settings.
upvoted 0 times
...
Linwood
5 months ago
I think we need to look into the Azure Key Vault for managing the encryption key, but I'm not entirely sure how to link it with Azure Monitor.
upvoted 0 times
...
Magda
5 months ago
Okay, let me think this through step-by-step. The key things I need to remember are that covered entities must have policies and procedures in place, train their workforce, and designate a privacy officer. I think I can use that knowledge to eliminate some of the incorrect options.
upvoted 0 times
...
Sabine
5 months ago
This is a classic time value of money problem. I've got this - I'll just need to make sure I'm using the right formula and plugging in the numbers correctly. No problem!
upvoted 0 times
...
Ashton
5 months ago
This question is testing our knowledge of the specifics of segment-routing architectures. I'll need to carefully read through the options and think about how the routing information is distributed and how the segments make their steering decisions in this type of network setup.
upvoted 0 times
...
Shala
5 months ago
I'm a bit confused on this one. The options seem to be about changing the authentication method, but I'm not sure which one is the right fix. Guess I'll have to think it through carefully.
upvoted 0 times
...
Laine
5 months ago
I think option B sounds right since a single object would make updates easier, but I'm not fully convinced about the trade-offs.
upvoted 0 times
...

Save Cancel