I'm a little confused on this one. I know a DMZ is used to protect the internal network, but I'm not sure about the specifics of how the servers in the DMZ are accessed and isolated. I'll have to review my notes on DMZs before I can feel confident answering this.
Alright, I've got this. A DMZ is used to expose certain servers to the internet while keeping the internal network secure, so option A is definitely true. And option D is also true since the whole point of a DMZ is to isolate those servers from the internal network.
Okay, let me think this through. I know a DMZ is a network zone that sits between the internal network and the internet, so option A seems correct. But I'm not sure about the other options - I'll have to think about that a bit more.
Okay, I think I've got this. The passage mentions that Data Risk Control is used for things like account log on, online activity, and payment. So the option that doesn't fit is application installation, since that's not one of the key service processes mentioned.
Ah, I've seen this type of issue before. I'm pretty confident that option D, "az vm disk attach", is the correct command to mount the OS disk offline. Let me quickly review the details to confirm.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Nan
3 months agoLashawn
3 months agoLashawnda
4 months agoRonna
4 months agoTwanna
4 months agoJuliana
4 months agoKallie
4 months agoDonette
5 months agoJimmie
5 months agoAlpha
5 months agoTandra
5 months agoLorrie
5 months agoAilene
5 months agoSue
5 months agoMadonna
5 months agoCharlette
5 months ago