Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft Exam DP-300 Topic 8 Question 98 Discussion

Actual exam question for Microsoft's DP-300 exam
Question #: 98
Topic #: 8
[All DP-300 Questions]

You have an Azure subscription that contains the resources shown in the following table.

You need to configure a connection between VM1 and MIL The solution must meet the following requirements:

* The connection must be encrypted.

* Network latency must be minimized.

What should you implement?

Show Suggested Answer Hide Answer
Suggested Answer: D, E

Contribute your Thoughts:

Ira
1 months ago
I bet the correct answer is B) private endpoints. Azure loves its private endpoints these days. It's like the new cool kid on the block.
upvoted 0 times
Susana
20 hours ago
I would go with B) private endpoints for sure.
upvoted 0 times
...
Abraham
21 days ago
I think A) virtual network peering is the best option.
upvoted 0 times
...
Amina
28 days ago
I agree with you, private endpoints are definitely the new cool kid on the block in Azure.
upvoted 0 times
...
Brice
29 days ago
I'm not so sure, I think virtual network peering might be a better option for minimizing network latency.
upvoted 0 times
...
Marnie
1 months ago
I think you're right, private endpoints are the way to go for encrypted connections.
upvoted 0 times
...
...
Sharan
2 months ago
A site-to-site VPN? Really? That's overkill for just connecting two resources in the same Azure subscription. Why would you use a VPN for that?
upvoted 0 times
Lakeesha
18 days ago
User1: Definitely, using a site-to-site VPN for this scenario would be unnecessary and overcomplicating things.
upvoted 0 times
...
Olene
21 days ago
User2: Yeah, I agree. It's a more efficient way to connect resources within the same Azure subscription.
upvoted 0 times
...
Candida
22 days ago
User1: I think virtual network peering would be a better option for connecting VM1 and MIL.
upvoted 0 times
...
...
Vicky
2 months ago
Service endpoints? Isn't that just for restricting access to certain Azure services? I don't think that's the right solution here.
upvoted 0 times
Elmira
6 days ago
B) private endpoints
upvoted 0 times
...
Timothy
8 days ago
I agree, virtual network peering would also meet the requirements.
upvoted 0 times
...
Tawna
14 days ago
A) virtual network peering
upvoted 0 times
...
Rickie
28 days ago
I think a site-to-site VPN would be the best option for encrypted connection and minimizing network latency.
upvoted 0 times
...
Lakeesha
1 months ago
D) a site-to-site VPN
upvoted 0 times
...
Alex
1 months ago
C) service endpoints
upvoted 0 times
...
Dorothy
1 months ago
B) private endpoints
upvoted 0 times
...
Carma
1 months ago
A) virtual network peering
upvoted 0 times
...
...
Shawna
2 months ago
I'm thinking private endpoints. That way, the connection is secure and the resources can communicate directly without going through the public internet.
upvoted 0 times
Talia
21 days ago
I'm thinking private endpoints. That way, the connection is secure and the resources can communicate directly without going through the public internet.
upvoted 0 times
...
Laticia
22 days ago
D) a site-to-site VPN
upvoted 0 times
...
Lyndia
23 days ago
C) service endpoints
upvoted 0 times
...
Linwood
2 months ago
B) private endpoints
upvoted 0 times
...
Ming
2 months ago
A) virtual network peering
upvoted 0 times
...
...
Arlene
2 months ago
I'm not sure, but I think private endpoints could also meet the requirements.
upvoted 0 times
...
Zachary
2 months ago
Hmm, virtual network peering seems like the best option to me. It's a direct, encrypted connection between the virtual networks, and should minimize latency.
upvoted 0 times
...
Leonora
3 months ago
I agree with Yvette, virtual network peering would minimize network latency as well.
upvoted 0 times
...
Yvette
3 months ago
I think we should implement virtual network peering for encrypted connection.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77