Search This Blog

Az-303- Certification

#1
Which feature within SQL Database would allow a user to group multiple databases with variable usage demands together while limiting the cost to the customer?
A

Shards

B

Elastic Clusters

C

Containers

Elastic Pools
Explanation

SQL Database elastic pools are a simple, cost-effective solution for managing and scaling multiple databases that have varying and unpredictable usage demands. The databases in an elastic pool are on a single Azure SQL Database server and share a set number of resources (elastic Database Transaction Units (eDTUs)) at a set price. Elastic pools in Azure SQL Database enable SaaS developers to optimize the price performance for a group of databases within a prescribed budget while delivering performance elasticity for each database.

#2
You have been hired by a small real estate investment firm that utilizes small databases and low traffic Web servers to record and analyze daily commercial mortgage rates and investment property values. The firm’s Chief Technology Officer (CTO) asks you to research and report on the best Azure Virtual Machine Scale Set implantation for the firm. Which VM scale set category would you suggest the firm implement?
General purpose
B
Compute optimized
C
Memory optimized
D
High performance compute
Explanation

There are five categories of Azure VM Scale Set implementations. General purpose VM Scale Sets work well for implementations requiring small to medium databases and low to medium traffic Web servers.

#3
You want to assign a role-based access control (RBAC) role to a user in the Azure Portal. Consider the following steps listed below:Select the userOpen Access Control (IAM) and select 'Add Role Assignment'Open Azure Resource Manager and select 'Add Role Assignment'Provide Reason for AssignmentSelect the roleSaveSelect Eligible or PermanentAssuming you have the necessary permissions, which answer lists the necessary steps to assign an RBAC role to a user in the correct order?
2 - 1 - 5 - 6
B
3 - 1 - 5 - 6
C
2 - 1 - 5 - 7 - 6
D
2 - 1 - 5 - 7 - 4 - 6
Explanation

In Access control (IAM), you can Add permissions to the resources. To assign a role to a user, you simply select the desired Role, Assign access to an Azure AD user, group, or application, Select the user from the list, and click Save.

#4
You are implementing Azure Backup to back up a group VMs. If any VM suffers an outage or data corruption, you would like to restore the entire VM. Your VMs require Managed SSD disk storage. When configuring the staging location for these VMs, how can you guarantee any restored VM through Azure Backup has the same storage configuration as the original VM?
Check that a premium storage account with local redundant storage exists in the same region as the VM and Recovery Service Vault. Make sure Azure Storage Service Encryption has never been enabled on this storage account.
B
Check that a standard storage account endpoint with zone-redundant storage (ZRS) exists in the same resource group as the VM and Recovery Service Vault. Make sure Azure Storage Service Encryption has never been enabled on this storage account.
C
Check that a standard storage account with read-access globally redundant storage (RA_GRS) exists in the same availability zone as the VM and Recovery Service Vault. Make sure Azure Disk Encryption is not currently enabled on this account
D
Check that a standard storage account with local redundant storage exists in the same region as the VM and Recovery Service Vault. Make sure Client-side Encryption is not currently enabled on this storage account.
Explanation

There are several factors to keep in mind here related to requirements for a VM restore through Azure Backup.

  • The storage tier of the staging location determines the storage tier of the restored VM.
  • The VM in question is premium, and the only storage tier that offers premium is Local Redundant Storage.
  • When your VM uses managed disks, the storage account acting as the staging location cannot have Azure Storage Service Encryption enabled at any time.
#5
With a web application deployed to Azure Web Apps, a company wants to start deploying rolling updates, but at the same time, they want to test the updates on the Azure environment before promoting the app to production. Which of the approaches below would help fulfill their requirements?
A
Create a virtual machine and re-create the web application there. Deploy the updates, test the application and then deploy it to production.
B
Create an on-premise virtual machine and re-create the web application there. Deploy the updates, test the application and then deploy it to production.
Create a deployment slot, configure the app on this slot. Test the app, then swap the slots.
D
Create a separate web app, then deploy and test it. Then deploy the web app with the updates to production site using Visual Studio.
Explanation

The Web Apps service in Azure App Service allows you to create deployment slots to have a separate staging environment for testing updates before they get rolled out to production. The deployment slot creates a new environment which can then be swapped with the production environment after all testing is complete.

#8
You have configured Azure Site Recovery, and now want to run a test failover to verify that it works. Which of the following failover directions is not supported?
Azure to Hyper-V site
B
Primary VMM site to Secondary VMM site
C
VMM site to Azure
D
Cloud to Cloud
Explanation

Azure to Hyper-V site is not supported during a test failover.

#11
When designing a Virtual Machine Scale Set, Microsoft recommends what ratio of storage accounts to virtual machines?

One storage account for each virtual machine in a scale set.

B

One storage account for every two virtual machines in a scale set.

C

Two storage accounts for every virtual machine in a scale set.

D

Two storage accounts for every three virtual machines in a scale set.

Explanation

If at all possible, Microsoft would like to see a one to one ratio and have a storage account for each virtual machine created in a scale set. If this is not possible, Microsoft recommends using no more than 20 VMs per storage account.

#14
Your company is being audited, and an external accountant needs access to review and download specific files from the blob storage and file storage services within one specific Azure storage account. You currently use Azure Active Directory to control access to the Azure storage account in question. However, you have been told you need to provide the accountant with immediate access to the blob and file storage account without any further information. How can you provide necessary access, but also limit it to the blobs in question?
A

Provide the accountant with read-only access to the specific Azure Blob and File storage services with a service-level shared access signature token. Allow all read requests but limit write requests to LIST and GET. Specify the HTTPS protocol is required to accept requests.

B

Assign the accountant a guest role in Azure Active Directory with read-only access to the specific Azure Blob and File services in the Azure Storage account.

C

Assign the accountant a contributor role access to the entire storage account using Azure AD role-based access control (RBAC).

Provide the accountant with read-only access to the specific Azure Blob and File storage services with an account-level shared access signature token. Allow all read requests but limit write requests to LIST and GET. Specify the HTTPS protocol is required to accept requests.

Explanation

In this case, an account-level SAS is required because the accountant needs access to two separate services in the account. You do not have the necessary information to create a guest or contributor account to control the accountant's access, but you can add controls to require requests are sent via an HTTPS protocol, and also control the specific read/write actions.

#15
What Azure solution can be combined with Azure Active Directory (Azure AD) to further secure identity management within the platform and can also secure on-premises applications by using additional identity verification?
A
Azure Security Center
Multi-Factor Authentication (MFA)
C
Azure Key Vault
D
Azure Active Directory Domain Services
Explanation
Azure Multi-Factor Authentication (MFA) is Microsoft's two-step verification solution. Azure MFA helps safeguard access to data and applications while meeting user demand for a simple sign-in process. It delivers strong authentication via a range of verification methods, including phone call, text message, or mobile app verification.
#18
You have deployed two separate application replicas to different regions. The primary replica receives a majority of customer traffic, and a secondary replica also handles requests for distant customers, to reduce the service latency for their requests. Which multi-region design did you deploy?
Active-active with geo-location request routing
B

Active-passive with a hot standby

C

Active-passive with a cold standby

D
Active-passive with geo-location request rolling
Explanation

When it comes to multi-region deployments, there are different options for how you might configure things depending on your availability requirements and your budget.

If you need an extremely high level of availability, then you can use an active/passive model with hot standby. With this approach, you have another version of your solution running in a second region, and it doesn't serve up any traffic unless there's a failure in the primary region.

A variation on that is the active/active model with geo-location based request routing. This is similar to the previous option, but the solution that's running in the second region is actively serving up requests to the users who are closer to that region than the primary.

Then there's the active/passive model with cold standby, which means that there's not a solution running in a second region. Instead, it's dynamically created when the first region is unavailable. This is a great option if you want to balance the cost versus the SLA. The switchover is not going to be immediate, but with a well-defined automation plan, this is a viable option.

#19
You have configured a load balancer to monitor a group of stateless VMs with the health probe following settings:Protocol: HTTPMinimum Probe Interval: 15 secondsMinimum Unhealthy Responses: 3Timeout: 90 secondsThe load balancer does not receive any response from a virtual machine named VM-1 after two health probes. It has been 100 seconds since the listener sent a 200 response.What actions will the load balancer take in this scenario?
It marks VM-1 as 'Unhealthy' and stops sending requests to it.
B
It sends one additional health probe before changing the status of VM-1 to 'Unhealthy.'
C
It marks VM-1 as 'Unhealthy' and gradually reduces the number of requests to it.
D
It marks VM-1 as 'Unhealthy' and terminates VM-1.
Explanation

One the timeout has elapsed, the load balancer marks the VM as unhealthy and stops sending requests to it.

#24
The types of failovers that are supported with Microsoft Azure Site Recovery depend on your deployment scenario. If you are doing a failover from Azure to VMM site, which failover type is supported?
A
Test failover
Planned failover
C
Unplanned failover
D
Not supported, you can't failover from Azure to VMM
Explanation

The types of failovers that are supported depend on your deployment scenario.

Azure to VMM site:

  • Test failover: Unsupported
  • Planned failover: Supported
  • Unplanned failover: Unsupported

 

#25
There are several mission-critical network connections between Azure IaaS Virtual Machines and Azure service endpoints in your Azure production environment. The connection health between these VMs and Azure endpoints needs to be continuously, automatically checked, and provide an alert if specific metrics approach unhealthy thresholds. Which Azure Network Watcher feature would be ideal in this case?
A

Connection Troubleshoot

B

IP Flow Verify

Connection Monitor

D

Traffic Analytics

Explanation

The connection monitor capability monitors communication at a regular interval and informs you of reachability, latency, and network topology changes between the VM and the endpoint. For example, you might have a web server VM that communicates with a database server VM. Someone in your organization may, unknown to you, apply a custom route or network security rule to the web server or database server VM or subnet.

#26
It is the end of your organization’s fiscal year. Your accounting department wants you to write several Azure Functions that will run very frequently and for several months, processing the annual financial data for tax purposes and financial record keeping tasks. The functions will run for about 25 minutes on average each time. What Azure Function pricing model should you select when creating the application container in which these functions will reside?
A
The bundle plan
B
The pay as you go plan
The App Service plan
D
The consumption-based plan
Explanation

The App Service plan provides dedicated VM resources on which your function app will reside and execute. This plan works well for function apps that will execute continuously or at least very frequently, and/or in situations where you have existing, under-utilized App Service VMs on which you could deploy a new function app.

#27
Your organization is evaluating the deployment and connection of Azure Virtual Machines (VMs). Several system administrators want to use a Windows Server 2016 Datacenter VM and other system administrators want to use the Red Hat Enterprise Linux operating system. What statement describes a consideration that applies to Azure VMs running the Windows Server 2016 operating system?
A Windows VM deployment provides one authentication method using Login IDs and passwords.
B
A Windows VM deployment provides two authentication methods: Login IDs and passwords or an SSH public key.
C
If you are connecting from a Windows Server 2016 machine you can use the SSH command as is.
D
A Windows Server 2016 Datacenter VM is a “Pay-As-You-Go Premium Image”.
Explanation

It is important to understand the pros and cons of the various available operating systems that can run on a VM. For Microsoft Windows VMs, the license is built-in and included as part of the cost of the VM saving money. For deployment, there are slight differences between Windows and Linux VMs primarily concerning how the connection to the VM itself is made. Also, Linux authentication is slightly different in that there are two options for the Authentication type, whereas Windows offers just one authentication method.

#28
You have begun migrating your existing applications from on-premise servers to resources on an Azure Virtual Network. The on-premise network and Azure are currently connected via ExpressRoute. You need to ensure the ExpressRoute connection is healthy at all times. What Network Watcher service can you utilize to monitor the connection?
Network Performance Monitor
B
Traffic Analytics
C
VPN Troubleshoot
D
Connection Monitor
Explanation

Network Performance Monitor is a cloud-based hybrid network monitoring solution that helps you monitor network performance between various points in your network infrastructure. It also helps you monitor network connectivity to service and application endpoints and monitor the performance of Azure ExpressRoute.

#29
A company has an on-premise Active Directory which consists of multiple forests. They are synchronizing data to a Azure Active Directory. Which of the below recommendations applies when you have two user accounts representing the same user in two different forests, and both accounts have the same email address?
A
Copy the contents of one Account to the other, and delete the other account. Have one account that can be synced to Azure Active Directory.
Using Azure AD connect tool, consolidate the information in both accounts using the accounts' Mail attribute.
C
Copy the contents of one Account to the other and rename the other account. Have one account that can be synced to Azure Active Directory.
D
Synchronize the accounts as they are , since the Azure AD connect tool will identify and fix the conflict.
Explanation

When you have multiple forests, there can be users in each forest with the same attributes. The recommendation is to consolidate the information and use Azure AD Connect. When carrying out the synchronization, it can be done by matching the email addresses and consolidating the information.

#31
What Azure Active Directory (Azure AD) Connect Health agent shows alerts, monitoring, and usage analytics of Azure AD Federation Services?
A
The Forest Services agent
The Federation Services agent
C
The Federation Health Domain agent
D
The Federation Forest Domain agent
Explanation

The Active Directory Federation Services agent shows alerts, monitoring, and usage analytics of AD Federation Service. An Azure Active Directory Domain Services agent shows all of the AD Domain Services forests and the Azure AD Connect Sync agent shows the Azure AD Connect servers that are being monitored.

#32
Which of the following Azure tools allows you to make detailed estimates for Azure deployment costs?

Pricing Calculator

B

Total Cost of Ownership (TCO) Calculator 

C

Azure Advisor

D

Azure Cost Management Tool

Explanation

The Pricing Calculator tool is an excellent online tool to assist in estimating your Azure costs.  This tool allows you to select and estimate the costs of deploying resources to Azure.  Of course, to generate the best cost estimate, you’ll need to know exactly what resources you plan to deploy to Azure and their compute and storage requirements. 

#35
A company determines that it is not possible to have a storage account for each virtual machine created in an Azure VM Scale Set. In this event, Microsoft recommends that this organization _____.
plan for no more than 20 VMs per storage account
B
reconfigure its storage accounts
C
should not create a scale set
D
plan for no more than 20 storage accounts per virtual machine
Explanation

If at all possible, Microsoft would like to see a one to one ratio and have a storage account for each virtual machine created in a scale set. If this is not possible, Microsoft recommends using no more than 20 VMs per storage account.

#36
You have specified auto scaling rules for an image processing application hosted on virtual machines. The application receives messages from Azure storage queues when images need to be processed.The virtual machines are grouped into a scale set with the following Scale Out rules:Scale out one VM if CPU utilization is above 60 percent.Scale out two VMs if CPU utilization is above 80 percent.Scale out one VM if disk writes per second reach 65 percent capacity.Scale out two VMs if disk writes per second reach 85 percent capacity.Scale out one VM if message queue length reaches more than 700.Scale out two VMs if the message queue reaches more than 1000.The following Scale In rules are also applied:Scale in one VM if CPU utilization drops below 35 percent.Scale in two VMs if CPU utilization drops below 20 percent.Scale in one VM if your message queue has fewer than 100 messages.The app's CPU utilization is currently at 30 percent, and the message queue contains 735 messages.Based on these metrics, what auto scaling action(s) will your application perform?
It will scale out one virtual machine.
B
It will scale up one virtual machine.
C
It will scale in one virtual machine.
D
It will scale down one virtual machine.
Explanation

First and foremost, scale-out operations always have priority over scale-in operations. Anytime that multiple scale-out operations conflict with one another, the rule that takes precedence will be the one that initiates the largest increase in the number of instances. When it comes to scale-in conflicts, the rule that initiates the smallest decrease in the number of instances will take precedence. 

#37
To manage storage costs, you want to delete old VM disk snapshots. What service can you use to create a backup retention policy, to automatically delete the snapshots after a set duration of time?

A recovery service vault with Azure Backup

B

A vault with Azure Key Vault

C

An alarm in Azure Monitor

D

A resource policy with Azure Policy

Explanation

If you use snapshots on blobs, monitor the snapshots and delete those which are outdated or no longer needed. An even better way to avoid the costs associated with snapshots is to implement a comprehensive backup solution by deploying an Azure Recovery Vault. 

#38
Within Azure Function, what trigger is particularly useful in application instrumentation, user experience or workflow processing, and Internet of Things (IoT) scenarios?
EventHubTrigger
B
HTTPTrigger
C
QueueTrigger
D
BlobTrigger
Explanation

Azure Function provides many types of triggers. Some examples include: The EventHubTrigger responds to events delivered to an Azure Event Hub. Particularly useful in application instrumentation, user experience or workflow processing, and Internet of Things (IoT) scenarios. The HTTPTrigger triggers the execution of your code by using an HTTP request. The QueueTrigger respond to messages as they arrive in an Azure Storage queue. The BlobTrigger processes Azure Storage blobs when they are added to containers. You might use this function for image resizing.

#39
Cosmos DB's SQL API offers a fully managed ____ database service that focuses on performance, high availability, elastic scaling, and global distribution.
A
XML
B
SQL
NoSQL
D
OLAP
Explanation

The Azure Cosmos DB SQL API database implementation differs from traditional relational database or SQL techniques. NoSQL databases that enable storing unstructured and heterogeneous data at scale, and therefore, they are often utilized in modern cloud applications.

#40
Which feature in Azure AD allows you to monitor both Azure and On-Premises resources?
Azure AD Connect Health
B
Multi-Factor Authentication (MFA)
C
Role-Based Access and Control (RBAC)
D
Azure AD Health Monitor
Explanation

Azure AD Connect Health allows you monitor both Azure and On-Premises resources by deploying specialized agents. MFA is responsible for ensuring secure user login. RBAC controls users access to resources, and there is no such thing as Azure AD Health Monitor.

#6
Your company has an application where users upload images and they're processed with different filters. The app is currently on-premises and you must design a solution in Azure. The solution should minimize management effort, it should allow for deployments to be promoted, and the image processing code should run as a separate process from the web application. Which option is best?
A
WebJobs
B
IaaS VMs
C
Azure HPC
Azure HDInsight
Explanation

WebJobs is a feature of Azure App Service that enables you to run a program or script in the same context as a web app, API app, or mobile app, but as a separate process. And using App Services will minimize management, and web apps support deployment slots, allowing for deployment promotion.

#7
A company has a set of services hosted on Azure virtual machines. They want to achieve the following objectives for their set of services: A proper disaster recovery strategyA shorter Recovery time objective Which of the following Azure services should they use?
Azure Backup
B
Azure Site Recovery
C
A new Virtual machine with the right storage options to store the backup data.
D
A new cluster of virtual machines with the right storage options to store the backup data.
Explanation

The Azure Site Recovery can replicate the data on the Virtual machines to another environment to emulate a failover environment that can be switched to immediately. For Azure backup, it can take time to restore the backup and get an available solution in case of a disaster.

#9
Which Azure service can identify global service issues, whether or not they are in use within your account?
A

Azure Status

Azure Service Health

C

Azure Resource Health

D

Azure Monitor

Explanation

Azure Status is a global view of the health of all Azure services across all Azure regions. The status page is a good reference for incidents with widespread impact, but we strongly recommend that current Azure users leverage Azure Service Health to stay informed about Azure incidents and maintenance.

#10
Your company is being audited, and an external accountant needs access to review a blob container in the Blob service within one specific Azure storage account. You currently use Azure Active Directory to control access to the blob storage resources in question. However, you have been told you need to provide the accountant with immediate access to review the blob container in the storage account without any further information. How can you provide necessary access, but also limit it to the container in question?
A

Provide the accountant with read-only access to the specific Azure Blob container with a service-level shared access signature token to expire at the end of the business day. Specify the HTTPS protocol is required to accept requests.

Assign the accountant a guest role in Azure Active Directory with read-only access to the specific Azure Blob storage service in the Azure Storage account.

C

Provide the accountant with read-only access to the specific Azure Blob container with a user-delegation shared access signature token to expire at the end of the business day. Allow all read requests but limit write requests to LIST and GET. Specify the HTTPS protocol is required to accept requests.

D
Provide the accountant with contributor role access to the storage account using Azure AD role-based access control (RBAC).
Explanation

In this case, Azure Storage's Shared Access Signature (SAS) is the best tool to provide limited, authorized access to the necessary blob resources. Remember, SAS allows two levels of access: service-level, which limits access to one type of storage within the Azure storage account, such as Blob, Table, Queue or File storage, and account level, which provides access to all storage types in a single account. The service level also allows you to limit access to specific containers, or even specific blobs, and control the actions that can be performed on the blobs by selecting approved common permission types such as read, write, list, or process.

You cannot provide a user-delegated SAS in this case because you do not know if the accountant has Azure AD credentials, which are required for this type of SAS.

#12
What is the least complex deployment method to ensure your application remains available in the event of a data center outage?
Deploy multiple VM replicas within an availability set.
B
Deploy multiple VM replicas to separate availability zones.
C
Deploy multiple VM replicas within a scale set.
D
Deploy multiple VM replicas to separate regions.
Explanation

Availability zones are physically separate locations within a region. They are not available in all regions, but in regions where they are available, deploying VM replicas to separate regions will ensure your system will remain available in the event a data center fails.

#13
When deploying Azure Site Recovery, what do you configure to define a group of machines to failover and model dependencies within machines?
Failover Runbook
B
Orchestration Plan
C
Azure Runbook
D
Recovery Plans
Explanation

Recovery plans can be used to define groups of machines that failover together, and then start up together; model dependencies between machines; run a failover.

#16
Which of the following statements about Azure Table storage design and PartitionKey and RowKey order is correct?
A
Choose a RowKey that defines the most common sort order.
B
Choose a RowKey that defines the least common sort order.
C
Choose a PartitionKey that defines the least common sort order.
Choose a PartitionKey that defines the most common sort order.
Explanation

Queries return multiple entities in PartitionKey and RowKey order. To avoid resorting entities choose a RowKey that defines the most common sort order.

#17
Your company has implemented Azure endpoints to provide service for a single application. You want to leverage Traffic Manager to evenly distribute your clients requests. Which traffic manager mode should you use?
A
Weighted
B
Priority
Performance
D
Round Robin
Explanation
Traffic manager has three modes of operation, which are Priority, Weighted and Performance. Priority enables you to have a backup endpoint in case the primary isn’t reachable. Weighted allows you to spread load balancing across multiple endpoints. Performance allows you to direct requests based on latency.
#20
Your application requires a high number of IOPS to satisfy minimum performance thresholds. You have selected Premium disks, and are now reviewing replication options. Which replication option offers the most redundancy, based on your selection of Premium disks?
A
LRS
GRS
C
RA-GRS
D
ZRS
Explanation

For premium storage accounts the only replication option that is available is LRS. The significance of this is that you need to look for other means of replicating your data to protect for the site outage.

#21
Your company has two endpoints for a web application, one in United States and the other in Western Europe. The endpoint in United States must act as the primary endpoint, and the endpoint in Europe as the secondary. To properly execute this, which routing policy should be selected in Azure Traffic Manager?
weighted
B
performance
C
priority
D
geographic
Explanation

If you want to set up a routing policy so that different endpoints work as an active-passive failover scenario, then you can use the Priority based routing. Here you would define the US endpoint having a priority of 1 and the endpoint in Europe having a priority of 2.

#22
Which feature in Azure AD allows you to restrict access to devices and applications based on predefined rules?
Role-Based Access and Control (RBAC)
B
Multi-Factor Authentication (MFA)
C
Conditional Access
D
Azure AD Connect
Explanation

Conditional Access allows you to restrict access to devices and applications based on predefined rules.  RBAC only controls user access to resources.  MFA deals with authenticating user sign-in, and Azure AD Connect is a tool for Synchronizing On-premises Identity with Azure AD and monitoring.

#23
Which two Azure AD features are only available with the Azure AD Premium P2 edition?
Privileged Identity Management
B
Azure AD Connect Health
C
Identity Protection
Group-based access management and provisioning
Explanation

Identity Protection and Privileged Identity Management requires Azure AD Premium P2 Edition.  Azure AD Connect Health is an Azure AD Premium P1 feature while Group-based access management and provisioning is a feature enabled at the Basic tier.

#30
When using Azure Table Storage, which of the following is true about encrypting table data?
A
Merge is not supported,
Encryption is not currently supported.
C
Snapshots are not supported.
D
The EncryptProperty attribute is not supported.
Explanation

Merge is not supported because encryption may have occurred with different keys. Simply merging the new properties will result in data loss.

#33
Your organization’s marketing department has an occasional job that puts a message on an event hub queue. In turn, this triggers an Azure Function that will save the contents of the message onto a storage account. The function runs for about 4 minutes on average. What Azure Function pricing model should you select when creating the application container in which this function will reside?
A
The bundle plan
The pay as you go plan
C
The App Service plan
D
The consumption-based plan
Explanation
The Consumption Plan is very useful if your functions will only be running intermittently, and not continuously or very frequently throughout a given month. The Consumption plan is the default and offers the following benefits. One - pay only when your functions are running. Two - scale out automatically, even during periods of high load. On a Consumption plan, a function can run for a maximum of 10 minutes.
#34
You have a two-tier application hosted within VNet-01 with an IP address range of 10.0.1.0/16  and the following resource configurations: A web application front end hosted on an IaaS virtual machine named VM_Front within a public subnet with an IP address range of 10.0.2.0/24. VM_Front has a private IP address of 10.0.2.5, and a public IP address of 192.168.50.2. A web application backend hosted on a second IaaS virtual machine named VM_Back within a private subnet with an IP address range of 10.0.3.0/24. VM_Back has a private IP address of 10.0.3.4. A public-facing load balancer with a private IP address of 10.0.1.6 and a public IP address of 172.16.50.35. You are configuring a network security group (NSG) for resources in the private subnet, and want to block all traffic from the public subnet. Traffic from the public subnet that does not meet all Allow rules would then be processed by this rule. Which NSG rule parameters below would meet the requirements for this NSG rule?
A
Inbound Rule
Source: 10.0.2.0/24
Source Port: 0-65535
Destination: 10.0.3.4
Destination Port: 0-65535
Protocol: ANY
Priority: 4096
Action: Deny
Outbound Rule
Source: 10.0.2.0/24
Source Port: 0-65535
Destination: 10.0.3.4
Destination Port: 0-65535
Protocol: ANY
Priority: 20
Action: Deny
C
Inbound Rule
Source: 10.0.1.0/16
Source Port: *
Destination: 10.0.3.4
Destination Port: *
Protocol: ANY
Priority: 4096
Action: Deny
D
Outbound Rule
Source: 0.0.0.0/0
Source Port: *
Destination: 10.0.3.4
Destination Port: *
Protocol: ANY
Priority: 20
Action: Deny
Explanation

The correct NSG rule configuration is:

  • Inbound Rule
  • Source: 0.0.0.0/0
  • Source Port: *
  • Destination: 10.0.3.4
  • Destination Port: *
  • Protocol: ANY
  • Priority: 4096
  • Action: Deny
#1
Which service provides notifications about Azure services and tools you are currently using, and provides updates about planned maintenance, service deprecation, and when you approach a service's resource limits?
A

Azure Status

Azure Service Health

C

Azure Resource Health

D

Azure Policy

Explanation

Azure Service Health provides a personalized view of the health of the Azure services and regions you're using. This is the best place to look for service impacting communications about outages, planned maintenance activities, and other health advisories because the authenticated Azure Service Health experience knows which services and resources you currently use. The best way to use Service Health is to set up Service Health alerts to notify you via your preferred communication channels when service issues, planned maintenance, or other changes may affect the Azure services and regions you use.

#2
Which storage option would provide the ability to offload read access data to Azure storage from a secondary geographic location, while also providing data access in the event that one location fails?
A
Globally Redundant Storage
Read-access Geo-redundant Storage
C
Locally Redundant Storage
D
Geo-redundant Storage
Explanation

Read-access geo-redundant storage replicates your data to a second geographic location and also provides read access to your data in the secondary location. Read-access geo-redundant storage allows you to access your data from either the primary or the secondary location, in the event that one location becomes unavailable. Read-access geo-redundant storage is the default option for your storage account by default when you create it.

#4
Which Azure blob type is best for logging operations?
A
Page
B
Block
Append
D
General
Explanation

Blob storage consists of three types of blob accounts: block blobs, append blobs, and page blobs. Append blobs are optimized for append operations, in which data updates occur by adding a new block to the end. A log data entry is one such example.

#6
You have received alerts regarding several resources in a resource group named Resource-Group1. This resource group contains:Three virtual machines, VM-A, VM-B, and VM-CA virtual network named VNet-1, with subnet named Subnet-A.Reviewing the resources, you notice several recent modifications that do not comply with company security and finance requirements. You would like to know how and when the changes were made, who made them, and what processes or requests the resources have initiated since these changes were implemented. Where should you start to find this information? (Choose 2 answers)
Check the related diagnostic logs to review processes and requests the resources initiated.
Check the related activity logs to see how and when the resources were modified, and by whom.
C
Review resource manager templates to see who modified the resources, how they modified them and when.
D
Check the related boot diagnostics to see what processes and requests these resources initiated.
Explanation

The Activity Log provides insight into the operations that were performed on resources in your subscription using Resource Manager, for example, creating a virtual machine or deleting a logic app. The Activity Log is a subscription-level log. Resource-level diagnostic logs provide insight into operations that were performed within that resource itself, for example, getting a secret from a Key Vault.

Resource-level diagnostic logs provide insight into operations that were performed within that resource itself, for example, getting a secret from a Key Vault.

#8
A company has a set of Windows virtual machines hosted on the Azure platform. They need to ensure all data is encrypted at rest. Which of the following services from Azure can help fulfill this requirement?
A
Register the virtual machine with Azure Active Directory service and use OAuth for tokens to encrypt the data at rest.
Use Azure Disk Encryption along with Azure Key Vault.
C
Register the virtual machine with Azure Active Directory service and use SAML tokens to encrypt the data at rest.
D
Use a custom algorithm along with a custom built application to encrypt the data at rest.
Explanation

Azure Disk encryption can be used to encrypt the data at rest for Windows and Linux based virtual machines. This service can be used along with the Azure Key Vault which can be used to maintain the keys used for encryption purposes

#9
An Azure subscription named Subscription 1 contains three resource groups named Development, Test, and Production. Thomas, Logan, and Guy have been assigned roles via role-based access controls (RBAC) to access Subscription 1 resources.Logan can perform all read and write operations on all compute and storage resources within the Development and Test resource groups. Guy is an owner of the Development and Test resource groups. Thomas is an owner of Subscription 1.If necessary, who would be able to delete the entire Development resource group and all resources within it?
Both Guy and Thomas
B
Only Thomas
C
Only Guy
D
Both Logan and Guy
Explanation

With role-based access controls (RBAC), the permissions applied at a certain scope apply to all child resources within that scope. This means a subscription owner also has owner permissions for all resource groups and resources within the subscription.

As such, both Guy and Thomas could complete the task required in the question below.

#12
If you want to review detailed information about what incoming requests have been allowed or denied by network security groups on a per-rule basis, what Network Watcher service will best assist you?
NSG Flow Logs
B
Diagnostic Logs
C
Network Performance Monitor
D
IP Flow Verify
Explanation

Network security group (NSG) flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through an NSG.

#13
You have a two-tier application hosted within VNet-01 with an IP address range of 10.0.1.0/16  and the following resource configurations: A web application front end hosted on an IaaS virtual machine named VM_Front within a public subnet with an IP address range of 10.0.2.0/24. VM_Front has a private IP address of 10.0.2.5, and a public IP address of 192.168.50.2. A web application backend hosted on a second IaaS virtual machine named VM_Back within a private subnet with an IP address range of 10.0.3.0/24. VM_Back has a private IP address of 10.0.3.4. A public-facing load balancer with a private IP address of 10.0.1.6 and a public IP address of 172.16.50.35. You are configuring the network security group for VM_Front, and want it to receive encrypted HTTP traffic from the load balancer, and want this to be one of the first rules the NSG processes against all incoming traffic. How would you configure a rule to allow this? 
Inbound Rule

Source: 10.0.1.6

Source Port: *

Destination: 10.0.2.5

Destination Port: 443

Protocol: TCP

Priority: 100

Action: Allow
B
Inbound Rule

Source: 10.0.2.5

Source Port: 80

Destination: 172.16.50.35

Destination Port: *

Protocol: UDP

Priority: 100

Action: Allow
C
Inbound Rule

Source: 10.0.1.6

Source Port: *

Destination: 10.0.3.4

Destination Port: 8080

Protocol: TCP

Priority 5000

Action: Allow
D
Inbound Rule

Source: 10.0.2.5

Source Port: *

Destination: 10.0.3.4

Destination Port: 443

Protocol: HTTPS

Priority: 9999

Action: Allow
Explanation

The correct rule parameters are:

  • Inbound Rule
  • Source: 10.0.1.6
  • Source Port: *
  • Destination: 10.0.2.5
  • Destination Port: 443
  • Protocol: TCP
  • Priority 100
  • Action: Allow
#14
You are creating a VNet to VNet connection using a virtual network gateway. What step below is not required for this configuration?
A
Create gateway subnets in each VNet.
B
Assign public IP addresses for each virtual network gateway.
Select 'Allow VNet access' when configuring your virtual network gateway.
D
Create a shared encryption key.
Explanation

Each of these steps is required for a VNet-to-VNet connection via virtual network gateway except enabling "Allow VNet access," which is required for VNet peering configurations.

#16
Before you deploy a new application to its production environment, you need to integrate a monitoring solution that sends messages to the development team's mobile devices. The key requirements for this messaging solution are: It can be deployed with minimal customization or administration required.It can deliver messages to mobile devices running Android and iOS operating systems.Which Azure solution is optimal for this scenario?
A
Azure Service Bus
B
Azure Event Hub
Azure Notification Hub
D
Azure Event Grid
Explanation
This is where Azure Notification Hubs and IoT Edge come in. The former is a ready-made smart device notification solution. Need to send push notifications to iPhones, Android phones, or tablets? Notification Hubs is your answer. The great thing about it is that it takes away a lot of the pain involved in supporting a variety of mobile devices. If you have experience as a mobile developer, then you’ll know what I am talking about. Unlike other forms of messaging, push notifications often have tricky platform-dependent logic. Scaling, managing tokens, and routing messages to different segments of users on different hardware and different versions of Android is non-trivial work for even an experienced tech team.

Notification Hub takes away most of that pain. It lets you broadcast to all platforms with a single interface. It can work both in the cloud or on-premises and includes security features like SAS, shared access secrets, and federated authentication. See the “How To” guide link for more details. 

#19
Your organization has Azure Functions that use HTTP triggering. What is the suggested method to test these functions?
A
Create a lab to mimic the production environment

Code and test the functions locally

C
Implement proxy support, to keep a static proxy URL and redirect as needed to different function URLs as you test multiple versions
D
Develop a .NET function app on your local machine and then upload the compiled binary to the Azure function service once you've tested it outside the cloud
Explanation

Testing can be tricky. The first place to go for function testing is of course the Azure portal itself. Functions that use manual or HTTP triggering are good candidates for ad hoc manual testing using the tools in the portal. If you prefer, for HTTP triggered functions you can also use external tools like Postman or Fiddler to send the HTTP request to your function URLs.

#20
Your IT landscape in Azure consists of both Linux and Windows virtual machines. You configured consistent backup of Windows VMs with Azure Backup using Volume Shadow Copy Service (VSS). Now you want to configure application consistent backup on the Azure Linux virtual machines. What statement below about Azure Backup on Linux virtual machines is correct?
A
Linux has built in VSS that Azure Backup agent can utilize.
B
Linux does not require any additional configuration since backup is done transparently for the application.
Using Azure Backup on Linux requires custom pre- and post-scripts to complete application consistent backup.
D
Azure Backup provides scripts for open source operating systems like Linux.
Explanation

Azure Backup relies on the framework which can execute pre and post which will ensure that the application is consistent during every backup.

#21
A hospital recently installed an on-premise patient registration application that operates on sensitive data stored in an Azure SQL database hosted in a virtual machine on Microsoft Azure. The hospital uses the Always Encrypted (AE) feature and stores Always Encrypted keys in a trusted key store hosted on-premise. The hospital’s Vice President is concerned that Azure cloud administrators can gain access to the sensitive data and potential HIPPA violations. How can the AE feature reduce the Vice President’s concerns?
A
AE uses data masking to protect the data stored in the cloud to prevent unintentional access.
B
AE provides column-level encryption or cell-level encryption to protect the sensitive patient data.
C
AE uses a tailored security communication protocol between Azure clients and the database engine.
AE provides a separation between those who own the data and those who manage the data.
Explanation
Always Encrypted (AE) is a feature designed to protect sensitive data (credit card numbers or social security numbers) stored in Azure SQL Databases. AE allows clients to encrypt sensitive data inside client applications and never reveal the encryption keys to the Database Engine (SQL Database or SQL Server). Thus, Always Encrypted provides a separation between those who own the data and can view it (the hospital), and those who manage the data but should have no access (Microsoft cloud administrators) as desired in this hospital case.
#22
Within Azure App Service, you want to modify a continuous webjob so that it will process on a single instance, not multiple instances.How and where can you complete this modification within the WebJob?
A
Update the singleton attribute within the webjob-publish-settings.json file.
Create a settings.job file with the singleton attribute code in the root of the job's .zip file
C
Create a custom webjobs-list.json file that assigns the webjob to a specific VM via the singleton attribute parameter.
D
In the Azure Portal, assign the scope of the webjob to a specific VM.
Explanation

If you find yourself in a situation where you need to run a WebJob on a single instance, instead of all instances, you can create a file called settings.job that contains the line you see on your screen.

{ "is_singleton": true }

After adding the line you see on your screen to the settings.job file, save the file to the root folder for the continuous WebJob. What this will do is get your WebJob running as a single instance despite being installed on multiple instances.

#24
When using Azure Resource Manager (ARM) templates, how does Resource Manager handle existing resources in the resource group that are not in the template for new deployment using the 'Complete' update deployment mode?
A
Resource Manager leaves unchanged resources that exist in the resource group but are not specified in the template.
Resource Manager deletes resources that exist in the resource group but are not specified in the template.
C
Resource Manager reconciles resources that exist in the resource group but are not specified in the template.
D
Resource Manager duplicates resources that exist in the resource group but are not specified in the template.
Explanation
When deploying your resources, you specify that the deployment is either an incremental update or a complete update. The primary difference between these two modes is how Resource Manager handles existing resources in the resource group that are not in the template. In complete mode, Resource Manager deletes resources that exist in the resource group but are not specified in the template. In incremental mode, Resource Manager leaves unchanged resources that exist in the resource group but are not specified in the template.
#25
Which Azure management service can provide the status of specific instances, as well as a log of recent platform events?
A

Azure Status

B

Azure Service Health

Azure Resource Health

D

Azure Security Center

Explanation

Azure Resource Health helps you diagnose and get support when an Azure service problem affects your resources. It informs you about the current and past health of your resources. And it provides technical support to help you mitigate problems.

#26
Using Traffic Manager, which of the following traffic routing methods directs users to specific endpoints based on specific location of their DNS query?
A
Priority
B
Weighted
C
Performance
Geographic
Explanation

The Geographic Traffic Manager routing method allows users to be directed to specific endpoints (Azure, External or Nested) based on which geographic location from which their DNS query originates.

#28
You have had to troubleshoot several issues related to network interfaces, and spent a great deal of time completing this task. Which service within Azure Network Watcher allows you to review recent activity to check for issues with network interfaces more quickly? 
Diagnostic Logs
B
NSG Flow Logs
C
Next Hop
D
Connection Monitor
Explanation
 The Diagnostic logs capability provides a single interface to enable and disable network resource diagnostic logs for any existing network resource that generates a diagnostic log. You can view diagnostic logs using tools such as Microsoft Power BI and Azure Log Analytics.
#29
You suspect hackers and bots have been attacking your application's network. What Azure Network Watcher network monitoring or analysis tool would best fit your needs?
A
Connection Monitor
B
Network Performance Monitor
C
Security Group View
Traffic Analytics
Explanation

Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. Traffic analytics analyzes Network Watcher network security group (NSG) flow logs to provide insights into traffic flow in your Azure cloud.

#30
When comparing network security options, which of the following actions can Azure Firewall perform that a network security group cannot?
A

Allow or deny inbound and outbound traffic to or from specific IP addresses

B

Allow or deny inbound and outbound traffic to or from IP address ranges

Allow or deny inbound traffic to or from specific domain names

D

Control traffic in and out of an entire virtual network

Explanation

Network security groups, or NSGs for short, are an Azure firewall technology that implements a stateful packet inspection with some simple inbound and outbound rules to deny or allow connections, based on a few properties. These include the source IP address and port, the destine IP address and port, and the protocol, whether it's TCP or UDP. The source IPs and destination IPs can either be individual IPs, or they can be ranges of IPs. You can attach a network security group to a virtual network, or to a NIC card, a network interface card.

The advantage of using Azure Firewall is that it’s more feature-rich. For example, you can tell it to allow outbound traffic only to certain domain names. NSGs can’t do that. They only allow you to specify IP addresses, not entire domains. An Azure Firewall is centralized, so it works across virtual networks and even across subscriptions.

#31
Your company has an application where users upload images and they're processed with different filters. The app is currently on-premises and you must design a solution in Azure. The solution should minimize management effort, it should allow for deployments to be promoted, and the image processing code should run as a separate process from the web application. Which option is best?
WebJobs
B
IaaS VMs
C
Azure HPC
D
Azure HDInsight
Explanation

WebJobs is a feature of Azure App Service that enables you to run a program or script in the same context as a web app, API app, or mobile app, but as a separate process. And using App Services will minimize management, and web apps support deployment slots, allowing for deployment promotion.

#33
You are looking for cost savings in your Azure compute resources, and have identified a default VM scale set running daily batch processes during non-business hours is a fairly large expense. These batch processes are not mission-critical to your daily operation, and occasional interruptions will not have any consequence on the business.What cost-saving method could you implement?
A
Replacing the existing VM scale set with Reserved VMs
B
Replacing the existing VM scale set with Azure Functions
C
Replacing the existing VM scale set with Azure App Service
Replacing the existing VM scale set with 'Low Priority' VM scale set
Explanation

Low-priority VMs are cheaper, but can be terminated at any time by Azure. They are ideal for this type of use case, but not to support applications that must persist reliably and be highly available.

#34
A company currently has an on-premise environment using Active Directory as its identity store. It plans to extend its presence to the Azure cloud. The company wants to ensure that employees can access on-premise and Azure resources using a single password, and also wants to enforce current on-premise Active Directory policies in the Azure cloud, without purchasing additional licenses or configuring additional on-premise servers. What choice below meets these requirements?
A
Use Powershell to sync the passwords for the on-premise Active Directory and Azure Active Directory.
B

Use Azure AD Connect's password hash synchronization (PHS).

Use Azure AD Connect's pass-through authentication.
D
Use Azure Directory Federated Services.
Explanation

Azure Active Directory (Azure AD) Pass-through Authentication allows your users to sign in to both on-premises and cloud-based applications using the same passwords. This feature provides your users a better experience - one less password to remember, and reduces IT helpdesk costs because your users are less likely to forget how to sign in. When users sign in using Azure AD, this feature validates users' passwords directly against your on-premises Active Directory.

This feature is an alternative to Azure AD Password Hash Synchronization, which provides the same benefit of cloud authentication to organizations. However, certain organizations wanting to enforce their on-premises Active Directory security and password policies, can choose to use Pass-through Authentication instead.

#36
A company is planning to use Azure Site Recovery to replicate VMware virtual machines to Azure. But there is a concern that the replication might not work. Which of the following is a case when virtual machines cannot be replicated using Azure Site Recovery?
The virtual machine has encrypted disks which cannot be replicated.
B
The OS disk on the Virtual Machine is a basic disk.
C
Storage and network accounts must be in the same region as the vault.
D
The host name of the Virtual Machine is 15 characters.
Explanation
The following is true for VMWare Virtual Machines being replicated using the Azure Site Recovery service

  1. The OS disk should be basic, and not dynamic. The data disk can be dynamic.
  2. One can't replicate virtual machines with encrypted disks, or virtual machines with UEFI/EFI boot.
  3. Storage and network accounts must be in the same region as the vault
  4. The host name should be 15 characters or less
#37
You are fixing an AttributeValueMustBeUnique error in Azure AD. Which of the following tools can help you identify the duplicate values that are causing the error?
Azure AD Connect Health for sync
B
Azure AD Application Insights
C
Kudu
D
Azure AD Connect Health Report
Explanation

Azure AD Connect Health for sync can generate a report that will help identify the duplicates.

#38
Which Azure App Service app type is used for automating business processes and integrating systems and data across clouds without writing code?
A
Mobile Apps
B
Web Apps
Logic Apps
D
API Apps
Explanation

Azure App Service consists of several app types: Web Apps, Mobile Apps, API Apps and Logic Apps. If you need to automate business processes, select the Logic Apps type.

#3
A company has a set of services hosted on Azure virtual machines. They want to achieve the following objectives for their set of services: A proper disaster recovery strategyA shorter Recovery time objective Which of the following Azure services should they use?
Azure Backup
B
Azure Site Recovery
C
A new Virtual machine with the right storage options to store the backup data.
D
A new cluster of virtual machines with the right storage options to store the backup data.
Explanation

The Azure Site Recovery can replicate the data on the Virtual machines to another environment to emulate a failover environment that can be switched to immediately. For Azure backup, it can take time to restore the backup and get an available solution in case of a disaster.

#5
Your company recently enabled Fraud Alerts with Azure MFA. Members of your staff are now unable to sign-in to their user accounts because several fraud alerts have been filed. What actions will best resolve the issue, and allow affected users to sign in? (Select 2 answers)
A
Sign in as a user with the Azure Active Directory administrator role.
B
Sign in as a user with the Designated Approver role.
Unblock all affected accounts with a specified reason for the unblock request.
Use the MFA bypass option to allow users to sign in until the default block expires.
Explanation

When fraud alerts are enabled in Azure MFA, Azure blocks access to any user accounts involved in any reported fraud alert. Administrators can unblock the account with a specific reason for the unblock request, but cannot unblock multiple accounts programmatically and then prevent accounts from being blocked in the future.

The designated approver role is related to role elevation requests within the scope of the Privileged Identity Management feature of Azure Active Directory, and would have no authorization to unblock accounts in the event of a fraud alert.

#7
Your expenses have increased as you've expanded international operations. It is critical to sort expenses for Azure resources deployed for specific international markets by the product, resource type, and global region. What Azure service or tool should you use to organize your expense reports?
A

Azure Advisor

Azure Cost Management tool

C

Azure Price Calculator

D

Azure Resource Tags

Explanation

Another way to track Azure costs is by using tags. Tags can be applied to Azure resources as a means of grouping them for things like cost tracking. Tags can be applied based on department, project, environment, or any other purpose.  

Each tag is a name/value pair where the name defines the type, or category of tag, and the value identifies a specific instance of that type. For example, a tag name could be a department, and values could then be IT and Development. 

#10
You have a large amount of data within a table in Azure Table Storage, and are primarily interested in specific column data. While querying the table with Azure Powershell, you need to minimize the data searched within a query as well as the query result size as much as possible, due to cost restraints. Which Powershell query will return useful results and meet your cost requirements?
A

$Query.SelectColumns = $Columns

B

$Query.FilterString = $Columns

C

$Query.FilterTable = $Columns

$Query.SelectColumns = $list

Explanation

Using the SelectColumns query property is especially useful when dealing with large entities. If you don't require all of the entity data this can be a significant bandwidth savings. The PartitionKey, RowKey, and Timestamp are always returned, regardless of the selected columns.

#11
When configuring Azure Firewall, which type of rule is specific to Azure Firewall and allows it to access fully qualified domain names from a subnet?
A

Application rules

B

Network rules

C

Network Security Group rules

Application Security Group rules

Explanation

Azure Firewall supports rules and rule collections. A rule collection is a set of rules that share the same order and priority. Rule collections are executed in order of their priority. Network rule collections are higher priority than application rule collections, and all rules are terminating.

There are three types of rule collections:

Application rules: Configure fully qualified domain names (FQDNs) that can be accessed from a subnet.
Network rules: Configure rules that contain source addresses, protocols, destination ports, and destination addresses.
NAT rules: Configure DNAT rules to allow incoming connections.

#15
A company is planning to use the Azure Backup service. They have the requirement of storing backups to both disk storage and tape storage. Which Azure Backup service should they use?
A
Azure Backup agent
B
System Center Data Protection Manager
Azure Backup Server
D
Azure IaaS Virtual Machine Backup
Explanation

The System Center Data Protection Manager helps in business continuity and disaster recovery. It can store backup data to:

Disk - For short-term storage Data Protection Manager backs up data to disk pools.

Azure - For both short-term and long-term storage off-premises, Data Protection Manager data stored in disk pools can be backed up to the Microsoft Azure cloud using the Azure Backup service.

Tape - For long-term storage you can back up data to tape, which can then be stored offsite.

#18
Azure Cosmos DB offers multiple regional configurations that respond differently in the event of a regional outage. In which configuration would you enable failover in the event of a regional outage?
A

Single Region

B

Single Region with Availability Zones

C

Multi-region with a single-write region

Multi-region with multiple write regions

Explanation

If your Cosmos DB database has a multi-region configuration with a single-write region, and that write region experiences a regional outage, enabling failover to a secondary region to then serve as the primary would minimize the damage. Enabling failover would not be possible in either single region configuration, and would not be necessary in a multi-region configuration with multiple write regions.

#23
As a feature of Azure Active Directory, Identity Protection offers each of the following capabilities except which one?

Reporting to help remove/reduce security risks

B

Automated detection of compromised user IDs

C

Enforce multi-factor authentication policy

D

Enable "just-in-time" role assignments

Explanation

Identity Protection allows you to enforce MFA policy, automate detection of potentially compromised user credentials, and can create reports to help you identify and remove or mitigate security risks. However, identity project does not include 'just-in-time' role assignments. This is a feature of privileged identity management, a separate service offered through Azure Active Directory.

#27
Which of the following resources is a standalone authentication resource that integrates with an existing Azure AD tenant, and can be assigned to multiple Azure resources?
A

System-assigned Managed Identity

B

User-Assigned Managed Identity

Shared Access Signature
D
Bitlock Encryption Key (BEK)
Explanation

A user-assigned managed Identity is a managed identity type that is a standalone resource that can be used with multiple resources, and is independent of any resource lifecycle.

#32
Of the listed configuration settings on an Azure Web App, which is not swapped when a deployment slot is swapped?
A
App Settings
B
Custom Domain Names
Connection Strings
D
Webjobs Content
Explanation

When you clone configuration from another deployment slot, the cloned configuration is editable. Furthermore, some configuration elements will follow the content across a swap (not slot specific) while other configuration elements will stay in the same slot after a swap (slot specific). The following lists show the configuration that will change when you swap slots -

  • General settings - such as framework version, 32/64-bit, Web sockets
  • App settings (can be configured to stick to a slot)
  • Connection strings (can be configured to stick to a slot)
  • Handler mappings
  • Monitoring and diagnostic settings
  • WebJobs content
#35
You have created a microservices application, but before you launch, you must implement a solution to protect your application's APIs while allowing customers to access your application. How can you accomplish this?
A
Use Azure API Management
B
Use an Azure App Service API apps
Allow access to your application through Azure AD B2C
D
Allow access to your application through Azure AD managed identities
Explanation

This service makes it easy to provide APIs that can be used by both internal developers and external partners and customers. It acts as a gateway between clients and your backend microservices. Not only does it provide an easily accessible front-end to your application, but it also handles important management tasks, such as security, monitoring, analytics, and rate limiting.

It’s easy to add an existing API to the API Management service. You only need to supply a few details, such as its name and URL. Then you can secure it and manage it. 

#39
There are three types of factors used to authenticate a user request via multi-factor authentication within Azure Active Directory. Which of the following is not one of those types?
A
Knowledge factor
B
Possession factor

Inheritance factor

D
Identity factor
Explanation

There are three types of factors used to authenticate a user request via multi-factor authentication (MFA):

  • A knowledge factor - something the user knows.
  • A possession factor - something the user owns, such as an email address or mobile device.
  • An inheritance factor - something that confirms identity via a physical characteristic, such as a fingerprint or other biometric.
#40
You need to back up a VM using Azure Backup immediately, so you need to create a Recovery Service Vault. The general steps are listed below, in no particular order.Assign a backup policy to the VMConfigure replication redundancy level.Manually initiate the first backup.Assign a resource group and location.Configure the backup policy.Which answer numerically lists the steps to back up a virtual machine in the correct order?
A
4-2-5-1-3
B
4-5-1-2-3
C
2-5-1-4-3
5-1-2-4-3
Explanation

The correct order of execution is:

  1. Assign a resource group and location.
  2. Configure replication redundancy level.
  3. Configure the backup policy.
  4. Assign a backup policy to the VM.
  5. Manually initiate the first backup.
#17
Which of the Azure Cosmos DB API programming models should a Data Engineer choose if they want to store data JSON document format in a non-relational database? (Choose 2 answers)
A

Table API

B

Graph API

C

SQL API

D

Mongo API

Explanation

Both Mongo API and SQL API in Cosmos DB allow you to store JSON documents in a non-relational database. SQL API is a bit tricky of a misnomer because it is a non-relational database. It is called SQL API because it allows you to query JSON documents in a SQL-like language.

 #2

You want to connect the Azure VNets for three separate branch offices. You are designing a hub and spoke model network topology to do this. The central hub will serve as a firewall between the different locations during backend communication, and also a central location for disaster recovery backup storage. Now you are considering whether to connect your hub-and-spoke model with VNet peering connections or virtual network gateways. Each option has its own benefits. Which statements comparing VNet peering and virtual network gateways in a hub-and-spoke model are correct? (Choose 2 answers)

If you implement the model with virtual network gateways, all VNets must be in the same region. If you implement the model with VNet peering connections, the VNets can be within different regions.

Whether the connections are made with virtual network gateways or VNet peering connections, the VNets can be within different Azure subscriptions and associated with separate Azure AD tenants. 

C

If you implement the model with virtual network gateways, all VNets can be in different regions. If you implement the model with VNet peering connections, the VNets must be within the same region.

D

If you implement the model with virtual network gateways, the VNets can be within different Azure subscriptions that are associated with the same Azure tenant. If you implement the VNets with VNet peering connections, the VNets can be within different Azure subscriptions and associated with separate Azure AD tenants.

Explanation

You could accomplish this network topology using VNet peering or virtual network gateways (VNG), but each option has its requirements and limitations. 

  1. Connecting via VNet peering would require a router to be deployed in the central hub VNet, but this is not required for VNG connections.
  2. VNet peering works both across separate tenants and subscriptions.
  3. Hostname resolution is not possible for VMs connecting from different VNets through a peering connection. Azure DNS is required for these VMs to connect. However, name resolution is possible through a VNG connection.
  4. This type of network topology cannot span regions. All VNets must be in the same region.
#5
Your organization requires that a set of columns should only be available to be read by a small select set of users.  Other users should see an obfuscated value. How can this be implemented in an Azure SQL Database?
A

Encrypt the columns using a symmetric encryption key

B

Use row-level security (RLS)

Use dynamic data masking (DDM)

D

Use transparent data encryption

Explanation

The Azure SQL Database option to obfuscate data is to use dynamic data masking (DDM).  Symmetric encryption would not obfuscate the data for some users, it would encrypt for all.  The row-level security determines row to be shown not columns. Always encrypted would encrypt the data throughout the system, and transparent data encryption (TDE) would encrypt data at rest but would deliver in plain text to the end user.

#6
The types of failovers that are supported with Microsoft Azure Site Recovery depend on your deployment scenario. If you are doing a failover from Physical server to Azure, which failover type is supported?
A
Test Failover
Planned Failover
C
Unplanned failover
D
Not supported
Explanation

The types of failovers that are supported depend on your deployment scenario.

Physical server to Azure:

Test failover: Unsupported
Planned failover: This scenario uses continuous replication so there's no distinction between planned and unplanned failover. You select Failover
Unplanned failover: NA

#7
Your company has a formal process for sending shared access signatures (SAS) to verified third parties, but is concerned that the SAS tokens could be obtained by an unintended or malicious user. You are considering additional security options to integrate into your SAS process, such as stored access policies. Consider the security options available with shared access signatures. What additional security option is available with stored access policies, and is not possible with shared access signatures alone?
A

Limiting access to a specific IP address or address range

B

Specifying when access via SAS token starts and ends

C

Limiting access to specific Azure storage containers or objects

Modifying existing SAS token permissions

Explanation

Shared access signatures allow you to:

  1. Define the scope of access - account level (multiple Azure Storage services like queue, blob, etc) or resource level (limited to service, container, or blob)
  2. Define allowed actions (read, write, and delete, for example)
  3. Specify start and expiration time
  4. Specify approved IP address or address range that may use the URI
  5. Set approved protocols: HTTP or HTTPS

Stored Access Policies allow you to:

  1. Set at container level
  2. Modify start and expiration time
  3. Revoke a SAS token after it is issued
  4. Modify existing SAS permissions
     
#8
With a web application deployed to Azure Web Apps, a company wants to start deploying rolling updates, but at the same time, they want to test the updates on the Azure environment before promoting the app to production. Which of the approaches below would help fulfill their requirements?
A
Create a virtual machine and re-create the web application there. Deploy the updates, test the application and then deploy it to production.
B
Create an on-premise virtual machine and re-create the web application there. Deploy the updates, test the application and then deploy it to production.
Create a deployment slot, configure the app on this slot. Test the app, then swap the slots.
D
Create a separate web app, then deploy and test it. Then deploy the web app with the updates to production site using Visual Studio.
Explanation

The Web Apps service in Azure App Service allows you to create deployment slots to have a separate staging environment for testing updates before they get rolled out to production. The deployment slot creates a new environment which can then be swapped with the production environment after all testing is complete.

#10
Which two Azure AD features are only available with the Azure AD Premium P2 edition?
Privileged Identity Management
B
Azure AD Connect Health
Identity Protection
D
Group-based access management and provisioning
Explanation

Identity Protection and Privileged Identity Management requires Azure AD Premium P2 Edition.  Azure AD Connect Health is an Azure AD Premium P1 feature while Group-based access management and provisioning is a feature enabled at the Basic tier.

#11
Which feature in Azure AD allows you to restrict access to devices and applications based on predefined rules?
A
Role-Based Access and Control (RBAC)
B
Multi-Factor Authentication (MFA)
Conditional Access
D
Azure AD Connect
Explanation

Conditional Access allows you to restrict access to devices and applications based on predefined rules.  RBAC only controls user access to resources.  MFA deals with authenticating user sign-in, and Azure AD Connect is a tool for Synchronizing On-premises Identity with Azure AD and monitoring.

#12
You have a two-tier application hosted within VNet-01 with an IP address range of 10.0.1.0/16  and the following resource configurations: A web application front end hosted on an IaaS virtual machine named VM_Front within a public subnet with an IP address range of 10.0.2.0/24. VM_Front has a private IP address of 10.0.2.5, and a public IP address of 192.168.50.2. A web application backend hosted on a second IaaS virtual machine named VM_Back within a private subnet with an IP address range of 10.0.3.0/24. VM_Back has a private IP address of 10.0.3.4. A public-facing load balancer with a private IP address of 10.0.1.6 and a public IP address of 172.16.50.35. You are configuring a network security group (NSG) for resources in the private subnet, and want to block all traffic from the public subnet. Traffic from the public subnet that does not meet all Allow rules would then be processed by this rule. Which NSG rule parameters below would meet the requirements for this NSG rule?
Inbound Rule
Source: 10.0.2.0/24
Source Port: 0-65535
Destination: 10.0.3.4
Destination Port: 0-65535
Protocol: ANY
Priority: 4096
Action: Deny
B
Outbound Rule
Source: 10.0.2.0/24
Source Port: 0-65535
Destination: 10.0.3.4
Destination Port: 0-65535
Protocol: ANY
Priority: 20
Action: Deny
C
Inbound Rule
Source: 10.0.1.0/16
Source Port: *
Destination: 10.0.3.4
Destination Port: *
Protocol: ANY
Priority: 4096
Action: Deny
D
Outbound Rule
Source: 0.0.0.0/0
Source Port: *
Destination: 10.0.3.4
Destination Port: *
Protocol: ANY
Priority: 20
Action: Deny
Explanation

The correct NSG rule configuration is:

  • Inbound Rule
  • Source: 0.0.0.0/0
  • Source Port: *
  • Destination: 10.0.3.4
  • Destination Port: *
  • Protocol: ANY
  • Priority: 4096
  • Action: Deny
#13
Your company has implemented Azure endpoints to provide service for a single application. You want to leverage Traffic Manager to evenly distribute your clients requests. Which traffic manager mode should you use?
Weighted
B
Priority
C
Performance
D
Round Robin
Explanation
Traffic manager has three modes of operation, which are Priority, Weighted and Performance. Priority enables you to have a backup endpoint in case the primary isn’t reachable. Weighted allows you to spread load balancing across multiple endpoints. Performance allows you to direct requests based on latency.
#14
Your application requires a high number of IOPS to satisfy minimum performance thresholds. You have selected Premium disks, and are now reviewing replication options. Which replication option offers the most redundancy, based on your selection of Premium disks?
LRS
B
GRS
C
RA-GRS
D
ZRS
Explanation

For premium storage accounts the only replication option that is available is LRS. The significance of this is that you need to look for other means of replicating your data to protect for the site outage.

#15
You are configuring the subnet for an Azure Firewall deployment. Which subnet mask is recommended to support Azure Firewall scaling requirements?

/26

B

/24

C

/28

D

/22

Explanation

Azure Firewall must provision more virtual machine instances as it scales. A /26 address space ensures that the firewall has enough IP addresses available to accommodate the scaling.

#16
Which Azure blob type is optimized for streaming and storing cloud objects?
A
Page
Block
C
Append
D
General
Explanation

Blob storage consists of three types of blob accounts: block blobs, append blobs, and page blobs. Block blobs are optimized for streaming and storing cloud objects such as documents, media files, and backups.

#17
You have deployed two separate application replicas to different regions. The primary replica receives a majority of customer traffic, and a secondary replica also handles requests for distant customers, to reduce the service latency for their requests. Which multi-region design did you deploy?
Active-active with geo-location request routing
B

Active-passive with a hot standby

C

Active-passive with a cold standby

D
Active-passive with geo-location request rolling
Explanation

When it comes to multi-region deployments, there are different options for how you might configure things depending on your availability requirements and your budget.

If you need an extremely high level of availability, then you can use an active/passive model with hot standby. With this approach, you have another version of your solution running in a second region, and it doesn't serve up any traffic unless there's a failure in the primary region.

A variation on that is the active/active model with geo-location based request routing. This is similar to the previous option, but the solution that's running in the second region is actively serving up requests to the users who are closer to that region than the primary.

Then there's the active/passive model with cold standby, which means that there's not a solution running in a second region. Instead, it's dynamically created when the first region is unavailable. This is a great option if you want to balance the cost versus the SLA. The switchover is not going to be immediate, but with a well-defined automation plan, this is a viable option.

#18
You need to create Azure resource templates to automate the deployment of resources. At the same time, you need to ensure that anyone can differentiate between resources created for development or production. Which of the below template features can help people identify the purpose of deployed resources in this way?
tags
B
resources
C
$schema
D
contentversion
Explanation

Tags can be used in templates to differentiate resources. For example, you can add a tag with a name of “Environment.” You can then assign values of “Production” to production-based instances and “Development” to development-based instances

#19
Which Azure service can identify global service issues, whether or not they are in use within your account?

Azure Status

B

Azure Service Health

C

Azure Resource Health

D

Azure Monitor

Explanation

Azure Status is a global view of the health of all Azure services across all Azure regions. The status page is a good reference for incidents with widespread impact, but we strongly recommend that current Azure users leverage Azure Service Health to stay informed about Azure incidents and maintenance.

#20
Your company is being audited, and an external accountant needs access to review and download specific files from the blob storage and file storage services within one specific Azure storage account. You currently use Azure Active Directory to control access to the Azure storage account in question. However, you have been told you need to provide the accountant with immediate access to the blob and file storage account without any further information. How can you provide necessary access, but also limit it to the blobs in question?
A

Provide the accountant with read-only access to the specific Azure Blob and File storage services with a service-level shared access signature token. Allow all read requests but limit write requests to LIST and GET. Specify the HTTPS protocol is required to accept requests.

B

Assign the accountant a guest role in Azure Active Directory with read-only access to the specific Azure Blob and File services in the Azure Storage account.

C

Assign the accountant a contributor role access to the entire storage account using Azure AD role-based access control (RBAC).

Provide the accountant with read-only access to the specific Azure Blob and File storage services with an account-level shared access signature token. Allow all read requests but limit write requests to LIST and GET. Specify the HTTPS protocol is required to accept requests.

Explanation

In this case, an account-level SAS is required because the accountant needs access to two separate services in the account. You do not have the necessary information to create a guest or contributor account to control the accountant's access, but you can add controls to require requests are sent via an HTTPS protocol, and also control the specific read/write actions.

#21
Your company would like to enable Azure MFA within its Azure Active Directory tenants. The company includes an office of roughly 300 employees, with many employees working from home periodically throughout the week. Sales representatives who travel most of the year require remote access to applications in demonstration environments hosted on Azure. The company's requirements are: Minimal administrative overhead in MFA setup and management All employees must register for MFA All employees must complete MFA when logging into their user accounts remotely, but not when in the office. Without considering the necessary Azure Active Directory licenses, what choice best accomplishes these requirements?

Enable Azure AD Identity Protection. Configure an Azure MFA registration policy requiring all users to register and enable MFA. Configure all office IP addresses as trusted IP addresses that can skip MFA.

B
Enable Azure MFA for all employees via the Azure Portal. Configure an Azure MFA registration policy requiring all users to register and enable MFA. Configure all office IP addresses as managed IP addresses which can skip MFA.
C
Enable Azure AD Identity Protection. Configure an Azure MFA registration policy requiring all users to register and enable MFA. Configure an Azure MFA risk-based conditional access policy requiring users accessing Azure resources remotely to complete MFA for all logins.
D
Enable Azure AD Identity Protection. Configure an Azure MFA registration policy requiring all users to register and enable MFA. Configure an MFA bypass option for all employees when they log in through an office IP address.
Explanation

With Azure Active Directory's Identity Protection service, you can set up registration policies that enforce your MFA requirements for all directory users. You can also setup all office IP addresses as federated (not managed) Trusted IP addresses, which will not require MFA, or administrative updates as your office IP addresses change.

#22
Your organization wants to monitor hybrid scenarios and gain insights into your on-premises identity infrastructure and synchronization services all from Azure. What Azure Active Directory (Azure AD) tool does Microsoft recommend for this scenario?
A
Trusted Advisor
B
Trust Manager
C
Infrastructure Event Manager
Azure AD Connect Health
Explanation
Azure AD Connect Health helps you monitor and gain insights into your on-premises identity infrastructure and the synchronization services. It enables you to maintain a reliable connection to Office 365 and Microsoft Online Services by providing monitoring capabilities for your key identity components such as Active Directory Federation Services (AD FS) servers, Azure AD Connect servers (also known as Sync Engine), Active Directory domain controllers, etc. It also makes the key data points about these components easily accessible so that you can get usage and other important insights to make informed decisions.
#24
Which Microsoft Azure Site Recovery (ASR) component is responsible for the replication during a failback from Azure?
Master target server
B
Process Server
C
Configuration Server
D
Management Server
Explanation

The master target server is installed on-premise and handles replication data during failback from Azure. The management server you created on-premises has a master target server installed by default. However, depending on the volume of failed back traffic you might need to create a separate master target server for failback.

#25
Your firm is utilizing Azure Virtual Machine (VM) technology. Performance, as well as backup and recovery are a critical aspects of the firm’s IT strategy and governance policies. With that in mind, the firm is using managed disks with premium storage, and the Azure Backup service. What storage replication option should your firm be implementing?
Locally redundant storage (LRS)
B
Zone-redundant storage (ZRS)
C
Geo-redundant storage (GRS)
D
Read-access geo-redundant (RA-GRS)
Explanation
A Managed Disk is a service that Azure provides which alleviates the work of you having to manage storage accounts. Azure will manage your disks and provide all the redundancy and replication options for you in the background. You just choose the Storage type, Standard or Premium, and choose any option from these two tiers. Managed disks integrate very well with other Azure services as well such as the Azure Backup service. This is important since managed disks can only be use with the LRS storage option and so for disaster recovery you want to use managed disks with the Azure Backup service. In this case, managed disk cost is an acceptable tradeoff to incur.
#26
You manage IT for an office of 300 employees, as well as 20-30 employees who work remotely. All employees are registered within the company's Azure Active Directory tenant. The remote employees access Azure from external IP addresses outside of the office intranet. You would like all employees, whether they work in the office or remotely, to be able to skip MFA when they log in on their assigned company devices. Assuming your office would take all the necessary steps to configure the solution properly, in the end you want to set up all office employees who sign in through Azure Active Directory as federated users, and managed Trusted IP addresses for your remote employees' specific IP addresses.  Would this approach allow all employees to skip the MFA when logging in on their assigned devices?
No, only office employees would be able to log in without completing MFA in this scenario.
B
No, neither office employees would be able to log in without completing MFA in this scenario.
C
Yes, all employees would be able to log in without completing MFA in this scenario.
D
Yes, but with conditions. Remote employees' Trusted IP address would need to be updated frequently.
Explanation

The Trusted IP address feature only works when users sign in through an organization's company intranet. Users that sign in via the internet cannot bypass MFA through the Trusted IP address feature.

#27
Your organization runs Azure Functions apps that are assigned to a compute processing instance and if needed, more instances are added or removed dynamically. Which Azure Functions pricing plan is best suited for your organization’s needs?
A
Executable plan
B
Integrated plan
C
App Service plan
Consumption plan
Explanation

Azure Functions provides two pricing plans: App Service plan and Consumption plan. The Azure Functions consumption plan is billed based on resource consumption and executions. The Consumption plan is good if compute needs are intermittent or your job times tend to be very short as it allows you to only pay for compute resources when they are actually in use. 

#28
Within the Azure SQL Database service, ____ is the default recovery option when your database is unavailable because of an incident in the region where the database is hosted.
A
Data file restore
B
Point-In-Time restore
Geo-Restore
D
Data page restore
Explanation

Geo-Restore allows you to restore a SQL database on any server in any Azure region from the most recent geo-replicated automated daily backup. Point-In-Time restore allows you to restore an existing database as a new database to an earlier point in time on the same logical server using SQL Database automated backups.

#29
When designing a Virtual Machine Scale Set, Microsoft recommends what ratio of storage accounts to virtual machines?

One storage account for each virtual machine in a scale set.

B

One storage account for every two virtual machines in a scale set.

C

Two storage accounts for every virtual machine in a scale set.

D

Two storage accounts for every three virtual machines in a scale set.

Explanation

If at all possible, Microsoft would like to see a one to one ratio and have a storage account for each virtual machine created in a scale set. If this is not possible, Microsoft recommends using no more than 20 VMs per storage account.

#30
To manage storage costs, you want to delete old VM disk snapshots. What service can you use to create a backup retention policy, to automatically delete the snapshots after a set duration of time?

A recovery service vault with Azure Backup

B

A vault with Azure Key Vault

C

An alarm in Azure Monitor

D

A resource policy with Azure Policy

Explanation

If you use snapshots on blobs, monitor the snapshots and delete those which are outdated or no longer needed. An even better way to avoid the costs associated with snapshots is to implement a comprehensive backup solution by deploying an Azure Recovery Vault. 

#32
You have been hired by a firm that utilizes RAM-intensive enterprise relational database applications to study global customer purchasing trends. The firm’s Chief Technology Officer (CTO) asks you to research and report on the best Azure Virtual Machine Scale Set implementation for the firm. Which VM scale set category would you suggest the firm implement?
A
General purpose
B
Compute optimized
Memory optimized
D
High performance compute
Explanation

There are five categories of Azure VM Scale Set implementations. Memory optimized VM scale sets work well for implementations requiring high memory to core ratios such as those utilizing relational database servers, medium to large caches, and in-memory analytics.

#33
Which Azure App Service offering allows you to develop workflows visually, and enables process automation based on triggers or third-party application integration(s)?
A
Mobile Apps
B
API Apps
C
Web Apps
Logic Apps
Explanation

Logic Apps provide a way to simplify and implement scalable integrations and workflows in the cloud. It provides a visual designer to model and automate your process as a series of steps known as a workflow. There are many connectors across the cloud and on-premises to quickly integrate across services and protocols. A logic app begins with a trigger (like 'When an account is added to Dynamics CRM') and after firing can begin many combinations of actions, conversions, and condition logic.

#34
You have specified auto scaling rules for an image processing application hosted on virtual machines. The application receives messages from Azure storage queues when images need to be processed.The virtual machines are grouped into a scale set with the following Scale Out rules:Scale out one VM if CPU utilization is above 60 percent.Scale out two VMs if CPU utilization is above 80 percent.Scale out one VM if disk writes per second reach 65 percent capacity.Scale out two VMs if disk writes per second reach 85 percent capacity.Scale out one VM if message queue length reaches more than 700.Scale out two VMs if the message queue reaches more than 1000.The following Scale In rules are also applied:Scale in one VM if CPU utilization drops below 35 percent.Scale in two VMs if CPU utilization drops below 20 percent.Scale in one VM if your message queue has fewer than 100 messages.The app's CPU utilization is currently at 30 percent, and the message queue contains 735 messages.Based on these metrics, what auto scaling action(s) will your application perform?
It will scale out one virtual machine.
B
It will scale up one virtual machine.
C
It will scale in one virtual machine.
D
It will scale down one virtual machine.
Explanation

First and foremost, scale-out operations always have priority over scale-in operations. Anytime that multiple scale-out operations conflict with one another, the rule that takes precedence will be the one that initiates the largest increase in the number of instances. When it comes to scale-in conflicts, the rule that initiates the smallest decrease in the number of instances will take precedence. 

#35
You have begun migrating your existing applications from on-premise servers to resources on an Azure Virtual Network. The on-premise network and Azure are currently connected via ExpressRoute. You need to ensure the ExpressRoute connection is healthy at all times. What Network Watcher service can you utilize to monitor the connection?
Network Performance Monitor
B
Traffic Analytics
C
VPN Troubleshoot
D
Connection Monitor
Explanation

Network Performance Monitor is a cloud-based hybrid network monitoring solution that helps you monitor network performance between various points in your network infrastructure. It also helps you monitor network connectivity to service and application endpoints and monitor the performance of Azure ExpressRoute.

#36
What is the least complex deployment method to ensure your application remains available in the event of a data center outage?
A
Deploy multiple VM replicas within an availability set.
Deploy multiple VM replicas to separate availability zones.
C
Deploy multiple VM replicas within a scale set.
D
Deploy multiple VM replicas to separate regions.
Explanation

Availability zones are physically separate locations within a region. They are not available in all regions, but in regions where they are available, deploying VM replicas to separate regions will ensure your system will remain available in the event a data center fails.

#37
It is the end of your organization’s fiscal year. Your accounting department wants you to write several Azure Functions that will run very frequently and for several months, processing the annual financial data for tax purposes and financial record keeping tasks. The functions will run for about 25 minutes on average each time. What Azure Function pricing model should you select when creating the application container in which these functions will reside?
A
The bundle plan
B
The pay as you go plan
The App Service plan
D
The consumption-based plan
Explanation

The App Service plan provides dedicated VM resources on which your function app will reside and execute. This plan works well for function apps that will execute continuously or at least very frequently, and/or in situations where you have existing, under-utilized App Service VMs on which you could deploy a new function app.

#38
Your client has two requirements for their Azure solution utilizing Azure Virtual Machines that affect how it needs to be deployed. They want the highest level of availability, and also large customer populations in distant parts of the globe. What model would generally help address this client's needs?
A
Deploying segments of all application tiers in multiple availability zones
A multi-region active-active model with geo-location based request routing
C
A multi-region active-passive model with cold standby
D
A multi-region active-passive model with hot standby
Explanation

Due to the fact that this client desires the highest level of availability, it is clear they need multi-regional deployment and not multi-zone. Then there is the issue of the customers on distant parts of the globe, which raises the issue of latency. The two best options in terms of minimal downtime are active/active and active/passive with hot standby, and since the client needs to serve two distinct locations, minimizing service latency is the reason to choose active/active with geo-location based request routing.

#39
Your organization’s marketing department has an occasional job that puts a message on an event hub queue. In turn, this triggers an Azure Function that will save the contents of the message onto a storage account. The function runs for about 4 minutes on average. What Azure Function pricing model should you select when creating the application container in which this function will reside?
A
The bundle plan
B
The pay as you go plan
C
The App Service plan
The consumption-based plan
Explanation
The Consumption Plan is very useful if your functions will only be running intermittently, and not continuously or very frequently throughout a given month. The Consumption plan is the default and offers the following benefits. One - pay only when your functions are running. Two - scale out automatically, even during periods of high load. On a Consumption plan, a function can run for a maximum of 10 minutes.
#40
Your company has two endpoints for a web application, one in United States and the other in Western Europe. The endpoint in United States must act as the primary endpoint, and the endpoint in Europe as the secondary. To properly execute this, which routing policy should be selected in Azure Traffic Manager?
A
weighted
B
performance
priority
D
geographic
Explanation

If you want to set up a routing policy so that different endpoints work as an active-passive failover scenario, then you can use the Priority based routing. Here you would define the US endpoint having a priority of 1 and the endpoint in Europe having a priority of 2.

#1
Which of the following is NOT true about Table Storage?
A
It is a key-attribute data store
B
It allows fast access to large quantities of data
C
It stores unstructured datasets
It is a NoSQL data store
Explanation

Table Storage stores structured datasets. Table storage is a NoSQL key-attribute data store, which allows for rapid development and fast access to large quantities of data.

#3
Your application's primary deployment has been attacked by malicious traffic, and you've failed over to a secondary replica in a separate availability zone. To strengthen your security, you want to deploy a virtual appliance to act as a firewall. However, you initially want all traffic to be stopped before reaching any of your primary replica resources, to prevent any other potential malicious traffic.How can you configure a user-defined route to accomplish this?
A
Configure the user-defined route without providing a destination CIDR block address.
B
Configure user-defined route without providing an IP address for the virtual firewall appliance.
C
Configure the user-defined route with the next hop set to 'none.'
Configure the user-defined route to allow outgoing traffic only.
Explanation

When creating a custom route for a routing table, there are three main values to consider. The first is the destination CIDR block for the traffic, which all custom routes require. Then there is the “next hop.” This tells Azure where to route the traffic before it gets to the destination defined above. 

The available options are:
  1. Virtual Network
  2. The next option is the Virtual Network Gateway
  3. Next is the Internet
  4. Then there’s the Virtual Appliance option.
  5. And finally, there’s the None option.
This can be used to stop the traffic dead in its tracks right here. The packets will not be forwarded at all.
#4
Your company is being audited, and an external accountant needs access to review a blob container in the Blob service within one specific Azure storage account. You currently use Azure Active Directory to control access to the blob storage resources in question. However, you have been told you need to provide the accountant with immediate access to review the blob container in the storage account without any further information. How can you provide necessary access, but also limit it to the container in question?
A

Provide the accountant with read-only access to the specific Azure Blob container with a service-level shared access signature token to expire at the end of the business day. Specify the HTTPS protocol is required to accept requests.

B

Assign the accountant a guest role in Azure Active Directory with read-only access to the specific Azure Blob storage service in the Azure Storage account.

Provide the accountant with read-only access to the specific Azure Blob container with a user-delegation shared access signature token to expire at the end of the business day. Allow all read requests but limit write requests to LIST and GET. Specify the HTTPS protocol is required to accept requests.

D
Provide the accountant with contributor role access to the storage account using Azure AD role-based access control (RBAC).
Explanation

In this case, Azure Storage's Shared Access Signature (SAS) is the best tool to provide limited, authorized access to the necessary blob resources. Remember, SAS allows two levels of access: service-level, which limits access to one type of storage within the Azure storage account, such as Blob, Table, Queue or File storage, and account level, which provides access to all storage types in a single account. The service level also allows you to limit access to specific containers, or even specific blobs, and control the actions that can be performed on the blobs by selecting approved common permission types such as read, write, list, or process.

You cannot provide a user-delegated SAS in this case because you do not know if the accountant has Azure AD credentials, which are required for this type of SAS.

#9
Azure Cosmos DB offers multiple regional configurations that respond differently in the event of a regional outage. In which configuration would enabling failover not be necessary to minimize loss of availability and data?
A

Single Region

B

Single Region with Availability Zones

Multi-region with a single-write region

D

Multi-region with multiple write regions

Explanation

If your Cosmos DB database has a multi-region configuration with a single-write region, and that write region experiences a regional outage, enabling failover to a secondary region to then serve as the primary would minimize the damage. Enabling failover would not be possible in either single region configuration, and would not be necessary in a multi-region configuration with multiple write regions.

#23
What Azure Backup service is not application aware?
A
Azure Backup (MARS) Agent
System Center DPM
C
Azure Backup Server
D
Azure IaaS VM Backup
Explanation

Azure Backup Agent is not application aware, meaning it stores no information related to the connected service's status or performance.

#31
When configuring Azure Firewall, which type of rule is specific to Azure Firewall and contains source addresses, protocols, destination ports, and destination addresses?

Application rules

B

Network rules

C

Application Security Group rules

D

Network Security Group Rules

Explanation

Azure Firewall supports rules and rule collections. A rule collection is a set of rules that share the same order and priority. Rule collections are executed in order of their priority. Network rule collections are higher priority than application rule collections, and all rules are terminating.

There are three types of rule collections:

Application rules: Configure fully qualified domain names (FQDNs) that can be accessed from a subnet.
Network rules: Configure rules that contain source addresses, protocols, destination ports, and destination addresses.
NAT rules: Configure DNAT rules to allow incoming connections.

No comments:

Post a Comment

AZ-304 Exam Preparation: Additional Resources

  Content Congratulations on making it all the way through this learning path. If you’re preparing to write the Microsoft AZ-304 exam, note ...