Search This Blog

Cert Prep: Microsoft Azure Architect Technologies (AZ-303)

 #1

You want to create ARM templates to provision virtual machines with secure passwords that are not visible in the ARM template file. Which service below can help you accomplish this task?
A
Azure Active Directory
B
VM Agents
C
Multi-factor Authentication
Azure Key Vault
Explanation
The Azure Key Vault can be used to securely retrieve a password as a parameter to the Azure template. You need to create a vault and a secret using this service, then ensure that enabledForTemplateDeployment is set to true, and then reference the VaultID and the secretname in the template. 
#2
Your organization has Azure Functions that use HTTP triggering. What is the suggested method to test these functions?
A
Create a lab to mimic the production environment

Code and test the functions locally

C
Implement proxy support, to keep a static proxy URL and redirect as needed to different function URLs as you test multiple versions
D
Develop a .NET function app on your local machine and then upload the compiled binary to the Azure function service once you've tested it outside the cloud
Explanation

Testing can be tricky. The first place to go for function testing is of course the Azure portal itself. Functions that use manual or HTTP triggering are good candidates for ad hoc manual testing using the tools in the portal. If you prefer, for HTTP triggered functions you can also use external tools like Postman or Fiddler to send the HTTP request to your function URLs.

#3
There is a requirement to store audit logs for an application hosted in Azure. Which of the following Azure Blob Storage blob type is recommended for this purpose?
Append blob
B
Page blob
C
Block blob
D
Normal blob
Explanation

The append blob gives the ability to append data to an existing blob. This blob type is ideal for storing data that is relevant to logging and auditing.

#4
If a user is assigned a role that excludes an operation in NotActions, and is assigned another role that allows that same operation, what is the result?
The user can perform that operation
B
The user cannot perform that operation
C
The user receives an error
D
The user will receive intermittent errors
Explanation

The user can perform that operation since NotActions is Not a deny rule.

#8
Your organization wants to monitor hybrid scenarios and gain insights into your on-premises identity infrastructure and synchronization services all from Azure. What Azure Active Directory (Azure AD) tool does Microsoft recommend for this scenario?
A
Trusted Advisor
B
Trust Manager
C
Infrastructure Event Manager
Azure AD Connect Health
Explanation
Azure AD Connect Health helps you monitor and gain insights into your on-premises identity infrastructure and the synchronization services. It enables you to maintain a reliable connection to Office 365 and Microsoft Online Services by providing monitoring capabilities for your key identity components such as Active Directory Federation Services (AD FS) servers, Azure AD Connect servers (also known as Sync Engine), Active Directory domain controllers, etc. It also makes the key data points about these components easily accessible so that you can get usage and other important insights to make informed decisions.
#9
Which service can recommend cost optimization methods based on your usage of Azure virtual machines?

Azure Advisor

B

Azure Monitor

C

Azure Policy

D

Azure Application Insights

Explanation

Advisor will review your virtual machine usage over the last 30 days and determine if you could save money by purchasing an Azure reservation. Advisor will show you the regions and sizes where you potentially have the most savings and will show you the estimated savings from purchasing reservations.

#10
Your onsite data analysis team uses an application with Azure IoT Hub. They currently access the application from their office, but they need to access and process IoT data remotely via authorized, Azure AD-registered mobile devices with Android and iOS operating systems.Which Azure solution would allow these employees to process the same type of data on their mobile devices?
A
Azure Stream Analytics
B
Azure Event Hub
Azure IoT Edge
D
Azure Relay
Explanation

IoT Edge is a tool for empowering IoT devices. It lets you run code directly on client devices instead of in the cloud. So you can do things like change device configuration, get real-time analytical data, or detect abnormal conditions. The chief value of doing such work directly on the device is that it saves the effort of having to send event data back and forth over the internet. So for example, we might want an IoT home sensor to alert us to some unusual condition without having to phone home to the cloud to run an analysis. You can imagine how valuable this could be for something like an IoT smoke detector or security system. IoT Edge can also empower devices where network connectivity is not always reliable.

#13
You need to pull user comments from your companies social media feeds on a daily basis and import them into a central database for review. You've chosen to use Azure Functions. Which of the following triggers would you use?
TimerTrigger
B
ScheduleTrigger
C
WebTrigger
D
Runbook
Explanation

The TimerTrigger will allow you to schedule the function to run on a set schedule.

#15
What Azure Active Directory (Azure AD) tool is used to integrate Azure AD with your on-premises domain controllers?
A

Azure AD Conditional Access

B
Azure AD Sync
Azure AD Connect
D

Azure AD Privileged Identity Management

Explanation

Azure AD Connect is the tool used to integrate Azure AD with your on-premises domain controllers. Azure AD Connect will integrate your on-premises directories with Azure Active Directory.

#16
Within your organization’s Azure Virtual Machine (VM) environment, a new online shopping system with shopping carts and both high-availability and high-performance requirements has been approved by management. The project will utilize several SQL Server databases. What Azure VM storage type is best suited for this scenario?
A
Standard Storage
Premium Storage
C
Hot storage
D
Relational Storage
Explanation

It is important to know the requirements of your application. This will help you select many parameters when setting up your VMs hosting the application. Storage parameters include selecting the storage type: Standard storage or Premium storage. Once you setup your VM disk as Standard or Premium you may not change or convert this option later. Premium storage is made up of SSDs, or Solid-State Disks providing low-latency and faster I/O performance. Premium storage is best suited for heavy I/O applications like SQL Server databases.

#19
A company is hosting a set of resources using Azure Storage services. An external vendor needs temporary access to these resources. Which of the options below is recommended to provide access?
A
Create a Virtual machine, copy the data and then provide access to the data.
B
Copy the data to another storage account and provide the necessary access.
C
Provide the storage account keys to the vendor so that they can access the resources.
Create a Shared Access Signature and provide it to the vendor.
Explanation

A shared access signature is a safe way to provide access to external parties for resources hosted in a storage account. It is not recommended to provide direct access keys to the person for accessing the relevant data in the storage account. Instead, you can create a shared access signature that provides delegated access to resources in your storage account.

#20
You manage IT for an office of 300 employees, as well as 20-30 employees who work remotely. All employees are registered within the company's Azure Active Directory tenant. The remote employees access Azure from external IP addresses outside of the office intranet. You would like all employees, whether they work in the office or remotely, to be able to skip MFA when they log in on their assigned company devices. Assuming your office would take all the necessary steps to configure the solution properly, in the end you want to set up all office employees who sign in through Azure Active Directory as federated users, and managed Trusted IP addresses for your remote employees' specific IP addresses.  Would this approach allow all employees to skip the MFA when logging in on their assigned devices?
No, only office employees would be able to log in without completing MFA in this scenario.
B
No, neither office employees would be able to log in without completing MFA in this scenario.
C
Yes, all employees would be able to log in without completing MFA in this scenario.
D
Yes, but with conditions. Remote employees' Trusted IP address would need to be updated frequently.
Explanation

The Trusted IP address feature only works when users sign in through an organization's company intranet. Users that sign in via the internet cannot bypass MFA through the Trusted IP address feature.

#21
As an Internet system administrator for a small but growing local financial institution that implements Azure Virtual Machines (VMs). One daily task you undertake is to review web activity logs for the institution’s online banking application. Over the past month, you have seen a consistent peak period of activity on Friday’s from noon until 7:00 pm. You present your finding to management explaining the need to schedule higher CPU capacity to keep the institution’s services running smoothly during this peak period. What step should you undertake to best handle this situation?
A
Convert any Zone-redundant storage (ZRS) storage accounts to Locally redundant storage (LRS).
Implement Autoscaling to manipulate the Scale Out feature of Azure VM Scale Sets.
C
Implement Fault Domains to ensure all necessary patches are installed.
D
Move one or more of VMs from one Availability Set to another for better performance.
Explanation

Virtual Machine Scale Sets provide the ability of true autoscaling, adding and removing VMs based on preset or spontaneous resource demands which captures the powerful essence of Cloud Computing. There are two ways of scaling VMs: Scaling Up and Scaling Out. Scaling Up, sometimes referred to as scaling vertically, involves upgrading your virtual machine to a more powerful VM. Scaling Out is commonly referred to as scaling horizontally, meaning we keep the same VM size for all our VMs but we instead add more VM instances to our VM Scale Set in order to service resource demand. Not that you cannot move a VM from one Availability set to another. Finally, note that you cannot convert a ZRS storage account to LRS or GRS nor vice-versa.

#22
Your client is migrating an online service they provide from on-premises servers to the Azure cloud. They are migrating compute resources to Azure Virtual Machines, and need to adopt the best version of Azure backup service for their needs. They currently use Linux servers, and would like to continue that on Azure. They want to protect a wide variety of data, including their virtual machines, applications, workloads and system states. They would like to backup services on premises and in the cloud, and they would like to minimize the price. Which Azure Backup service would meet all their requirements and offer the lowest cost?
A
Azure Backup Agent
B
System Center DPM
Azure Backup Server
D
Azure IaaS VM Backup
Explanation

Azure Backup Server meets all the client requirements because it is Linux compatible, offers cloud and on-premises backup of data, can protect the necessary variety of files, and does not require any licensing fees, unlike System Center DPM.

#24
Which Azure App Service offering allows you to develop workflows visually, and enables process automation based on triggers or third-party application integration(s)?
A
Mobile Apps
B
API Apps
C
Web Apps
Logic Apps
Explanation

Logic Apps provide a way to simplify and implement scalable integrations and workflows in the cloud. It provides a visual designer to model and automate your process as a series of steps known as a workflow. There are many connectors across the cloud and on-premises to quickly integrate across services and protocols. A logic app begins with a trigger (like 'When an account is added to Dynamics CRM') and after firing can begin many combinations of actions, conversions, and condition logic.

#26
You are designing a Table storage solution optimized for query. Which of the following queries describes an ideal PartitionKey?
Efficient queries and sufficient partitions for scalability
B
High encryption and low latency queries
C
High throughput and high latency queries
D
Efficient storage and throughput for usage
Explanation
Choosing a good PartitionKey design is one that enables efficient queries and sufficient partitions for scalability.
#27
You have deployed two separate application replicas to different regions. The primary replica receives a majority of customer traffic, and a secondary replica also handles requests for distant customers, to reduce the service latency for their requests. Which multi-region design did you deploy?
Active-active with geo-location request routing
B

Active-passive with a hot standby

C

Active-passive with a cold standby

D
Active-passive with geo-location request rolling
Explanation

When it comes to multi-region deployments, there are different options for how you might configure things depending on your availability requirements and your budget.

If you need an extremely high level of availability, then you can use an active/passive model with hot standby. With this approach, you have another version of your solution running in a second region, and it doesn't serve up any traffic unless there's a failure in the primary region.

A variation on that is the active/active model with geo-location based request routing. This is similar to the previous option, but the solution that's running in the second region is actively serving up requests to the users who are closer to that region than the primary.

Then there's the active/passive model with cold standby, which means that there's not a solution running in a second region. Instead, it's dynamically created when the first region is unavailable. This is a great option if you want to balance the cost versus the SLA. The switchover is not going to be immediate, but with a well-defined automation plan, this is a viable option.

#28
Which Azure blob type is optimized for streaming and storing cloud objects?
A
Page
Block
C
Append
D
General
Explanation

Blob storage consists of three types of blob accounts: block blobs, append blobs, and page blobs. Block blobs are optimized for streaming and storing cloud objects such as documents, media files, and backups.

#30
A company is building an application on the Azure platform. The application consists of multiple tiers such as a database tier. The passwords should not be managed with the application, or stored anywhere in the application. Which Azure service can fulfill this requirement?
A
Use the Microsoft SQL server service provided in Azure, store the passwords in a separate database using this service.
Use an Azure Key Vault to generate keys from the relevant passwords and use the keys from within the application.
C
Create a separate virtual machine and store the passwords on this virtual machine.
D
There is no dedicated service from Azure and its best to use a third party provider for maintaining the passwords for the application.
Explanation

Azure key vaults can be used to store encryption keys, passwords and other types of keys. This service also has a management process that allows for management of the lifecycle of the keys. This service is outside the boundary of the application, and also can be used as a central store for all keys.

#34
Which Azure App Service app type is used for automating business processes and integrating systems and data across clouds without writing code?
A
Mobile Apps
B
Web Apps
Logic Apps
D
API Apps
Explanation

Azure App Service consists of several app types: Web Apps, Mobile Apps, API Apps and Logic Apps. If you need to automate business processes, select the Logic Apps type.

#35
You are configuring Azure Firewall outbound network rule to allow connections to an IP address via Port 53. Which protocol should you select?

UDP

B

POP

C

DHCP

D

HTTPS

Explanation

To create our network rule, we need to select the Network Rule Collection tab. Now from here, we'll choose the option to add a network rule collection and we'll call this NetworkCollection. Again, we'll set our priority to 200 and we're going to allow our traffic. At this point, we need to define our rule. So under IP addresses, under the Rule section here. For our name, we're going to call it AllowDNS. We'll choose UDP for the protocol since DNS is UDP traffic. 

#36
Which of the following allows you to view alerts, performance monitoring, and usage analytics for your on-premises Active Directory?
Azure AD Connect Health
B
Azure AD Monitoring Agent
C
Azure AD Connect View
D
Azure AD Connect
Explanation

The Azure AD Connect Health allows you to view alerts, performance monitoring, and usage analytics for Azure AD. This information is available in the Azure AD Connect Health Portal. The other choices are incorrect.

#37
Your company has a formal process for sending shared access signatures (SAS) to verified third parties, but is concerned that the SAS tokens could be obtained by an unintended or malicious user. You are considering additional security options to integrate into your SAS process, such as stored access policies. Consider the security options available with shared access signatures. What additional security option is available with stored access policies, and is not possible with shared access signatures alone?
A

Limiting access to a specific IP address or address range

B

Specifying when access via SAS token starts and ends

C

Limiting access to specific Azure storage containers or objects

Modifying existing SAS token permissions

Explanation

Shared access signatures allow you to:

  1. Define the scope of access - account level (multiple Azure Storage services like queue, blob, etc) or resource level (limited to service, container, or blob)
  2. Define allowed actions (read, write, and delete, for example)
  3. Specify start and expiration time
  4. Specify approved IP address or address range that may use the URI
  5. Set approved protocols: HTTP or HTTPS

Stored Access Policies allow you to:

  1. Set at container level
  2. Modify start and expiration time
  3. Revoke a SAS token after it is issued
  4. Modify existing SAS permissions
     
#38
You are deploying Azure Virtual Machines within a single datacenter, but want the VMs to remain available when any server within the data center is offline for maintenance. How can you deploy your virtual machines to accomplish this?
A

Deploy the virtual machines in separate availability zones.

B

Deploy the virtual machines into separate fault domains.

C

Deploy the virtual machines in separate App Service plans.

Deploy the virtual machines in separate update domains.

Explanation

Update domains are configured to limit the effects of server maintenance within an Azure data center. You can deploy your virtual machines in separate update domains by configuring them within an availability set.

#40
It is the end of your organization’s fiscal year. Your accounting department wants you to write several Azure Functions that will run very frequently and for several months, processing the annual financial data for tax purposes and financial record keeping tasks. The functions will run for about 25 minutes on average each time. What Azure Function pricing model should you select when creating the application container in which these functions will reside?
A
The bundle plan
B
The pay as you go plan
The App Service plan
D
The consumption-based plan
Explanation

The App Service plan provides dedicated VM resources on which your function app will reside and execute. This plan works well for function apps that will execute continuously or at least very frequently, and/or in situations where you have existing, under-utilized App Service VMs on which you could deploy a new function app.

#5
You have been hired by a firm that utilizes RAM-intensive enterprise relational database applications to study global customer purchasing trends. The firm’s Chief Technology Officer (CTO) asks you to research and report on the best Azure Virtual Machine Scale Set implementation for the firm. Which VM scale set category would you suggest the firm implement?
A
General purpose
B
Compute optimized
C
Memory optimized
High performance compute
Explanation

There are five categories of Azure VM Scale Set implementations. Memory optimized VM scale sets work well for implementations requiring high memory to core ratios such as those utilizing relational database servers, medium to large caches, and in-memory analytics.

#6
Which service provides notifications about Azure services and tools you are currently using, and provides updates about planned maintenance, service deprecation, and when you approach a service's resource limits?
A

Azure Status

B

Azure Service Health

Azure Resource Health

D

Azure Policy

Explanation

Azure Service Health provides a personalized view of the health of the Azure services and regions you're using. This is the best place to look for service impacting communications about outages, planned maintenance activities, and other health advisories because the authenticated Azure Service Health experience knows which services and resources you currently use. The best way to use Service Health is to set up Service Health alerts to notify you via your preferred communication channels when service issues, planned maintenance, or other changes may affect the Azure services and regions you use.

#7
When designing tables using Azure Table Storage, which of the following design strategies should be adopted to ensure maximum performance for read operations?
Ensure that you define a partition key for the table.
B
Ensure that you define a row key for the table.
C
Consider using query projection
D
Define the least amount of properties for your table
Explanation

Instead of getting all the data from the table, the user can reduce the amount of data transfer and hence reduce on bandwidth costs by querying only the relevant data which is required.

#11
You have had to troubleshoot several issues related to network interfaces, and spent a great deal of time completing this task. Which service within Azure Network Watcher allows you to review recent activity to check for issues with network interfaces more quickly? 
A
Diagnostic Logs
B
NSG Flow Logs
Next Hop
D
Connection Monitor
Explanation
 The Diagnostic logs capability provides a single interface to enable and disable network resource diagnostic logs for any existing network resource that generates a diagnostic log. You can view diagnostic logs using tools such as Microsoft Power BI and Azure Log Analytics.
#12
There are four replicas of a multi-tier application separated into four resource groups with the following specifications:Each resource group is in a separate region - East US, West US, West Central US, and South Central US.Each resource group includes a replica of a three-tier application replica comprised of five VMs: Two front-end VMs, two mid-tier application VMs, and one back-end database VM.You would like to configure Azure network resources to accomplish the following:Route inbound requests to the application replica with the least network latency.Create a front-end firewall for all incoming requests from the internetEncrypt all traffic throughout communication between different application layers.Load balance incoming requests from the public internet, as well as requests between each tier of the application.Monitor the performance of each VM in each application tierWhich Azure network resource is not required to achieve these design requirements?
Azure Traffic Manager
B
Azure Application Gateway
C
Public Load Balancers
D
Internal Load Balancers
Explanation
Traffic Manager can distribute traffic at a DNS level to the respective application in each region based on estimated latency with performance routing. The application gateway can provide end-to-end SSL and health monitoring. It does not require additional load balancers to connect to the middle and back-end tiers of the application.

#14
There are three types of factors used to authenticate a user request via multi-factor authentication within Azure Active Directory. Which of the following is not one of those types?
A
Knowledge factor
B
Possession factor

Inheritance factor

D
Identity factor
Explanation

There are three types of factors used to authenticate a user request via multi-factor authentication (MFA):

  • A knowledge factor - something the user knows.
  • A possession factor - something the user owns, such as an email address or mobile device.
  • An inheritance factor - something that confirms identity via a physical characteristic, such as a fingerprint or other biometric.
#17
You are configuring the subnet for an Azure Firewall deployment. Which subnet mask is recommended to support Azure Firewall scaling requirements?
A

/26

/24

C

/28

D

/22

Explanation

Azure Firewall must provision more virtual machine instances as it scales. A /26 address space ensures that the firewall has enough IP addresses available to accommodate the scaling.

#18
You want to connect the Azure VNets for three separate branch offices. You are designing a hub and spoke model network topology to do this. The central hub will serve as a firewall between the different locations during backend communication, and also a central location for disaster recovery backup storage. Now you are considering whether to connect your hub-and-spoke model with VNet peering connections or virtual network gateways. Each option has its own benefits. Which statements comparing VNet peering and virtual network gateways in a hub-and-spoke model are correct? (Choose 2 answers)

If you implement the model with virtual network gateways, all VNets must be in the same region. If you implement the model with VNet peering connections, the VNets can be within different regions.

B

Whether the connections are made with virtual network gateways or VNet peering connections, the VNets can be within different Azure subscriptions and associated with separate Azure AD tenants. 

C

If you implement the model with virtual network gateways, all VNets can be in different regions. If you implement the model with VNet peering connections, the VNets must be within the same region.

If you implement the model with virtual network gateways, the VNets can be within different Azure subscriptions that are associated with the same Azure tenant. If you implement the VNets with VNet peering connections, the VNets can be within different Azure subscriptions and associated with separate Azure AD tenants.

Explanation

You could accomplish this network topology using VNet peering or virtual network gateways (VNG), but each option has its requirements and limitations. 

  1. Connecting via VNet peering would require a router to be deployed in the central hub VNet, but this is not required for VNG connections.
  2. VNet peering works both across separate tenants and subscriptions.
  3. Hostname resolution is not possible for VMs connecting from different VNets through a peering connection. Azure DNS is required for these VMs to connect. However, name resolution is possible through a VNG connection.
  4. This type of network topology cannot span regions. All VNets must be in the same region.
#23
You have created an investment app that uses machine learning to analyze day-to-day stock market activity. The real-time data is processed using Azure Stream Analytics, uploaded to an Azure SQL Database for initial queries and then migrated to an SQL Data Warehouse, where it is analyzed. The data analysis is done within a custom application hosted on heterogenous Azure Virtual Machines within an availability set. Analysis of new data is a stateful process assigned to a specific instance within the availability set.  The analysis tasks can take 40 minutes to complete if the process is not interrupted. In the event of any errors or transient failures that cannot be resolved, the analysis must completely restart. Which potential solutions could work together to streamline analysis of new data? (Choose 2 answers)
A
Modify the data analysis process to be idempotent.
Integrate a checkpoint mechanism into the process.
Reduce the time between each retry to address transient failures.
D
Decrease the total number of retries to address errors before applying a circuit breaker.
Explanation

Modifying the two processes so they can be performed idempotently increase the chance that the operation can be spread across multiple instances and continue in the event of an instance failure. Integrating a checkpoint mechanism would also allow the process to save its progress in stages, and in the event of an error, the process could restart from where it left off.

#25
Before you deploy a new application to its production environment, you need to integrate a monitoring solution that sends messages to the development team's mobile devices. The key requirements for this messaging solution are: It can be deployed with minimal customization or administration required.It can deliver messages to mobile devices running Android and iOS operating systems.Which Azure solution is optimal for this scenario?
A
Azure Service Bus
Azure Event Hub
C
Azure Notification Hub
D
Azure Event Grid
Explanation
This is where Azure Notification Hubs and IoT Edge come in. The former is a ready-made smart device notification solution. Need to send push notifications to iPhones, Android phones, or tablets? Notification Hubs is your answer. The great thing about it is that it takes away a lot of the pain involved in supporting a variety of mobile devices. If you have experience as a mobile developer, then you’ll know what I am talking about. Unlike other forms of messaging, push notifications often have tricky platform-dependent logic. Scaling, managing tokens, and routing messages to different segments of users on different hardware and different versions of Android is non-trivial work for even an experienced tech team.

Notification Hub takes away most of that pain. It lets you broadcast to all platforms with a single interface. It can work both in the cloud or on-premises and includes security features like SAS, shared access secrets, and federated authentication. See the “How To” guide link for more details. 

#29
Your IT landscape in Azure consists of both Linux and Windows virtual machines. You configured consistent backup of Windows VMs with Azure Backup using Volume Shadow Copy Service (VSS). Now you want to configure application consistent backup on the Azure Linux virtual machines. What statement below about Azure Backup on Linux virtual machines is correct?
Linux has built in VSS that Azure Backup agent can utilize.
B
Linux does not require any additional configuration since backup is done transparently for the application.
C
Using Azure Backup on Linux requires custom pre- and post-scripts to complete application consistent backup.
D
Azure Backup provides scripts for open source operating systems like Linux.
Explanation

Azure Backup relies on the framework which can execute pre and post which will ensure that the application is consistent during every backup.

#31
When using Azure Resource Manager (ARM) templates, how does Resource Manager handle existing resources in the resource group that are not in the template for new deployment using the 'Complete' update deployment mode?
A
Resource Manager leaves unchanged resources that exist in the resource group but are not specified in the template.
B
Resource Manager deletes resources that exist in the resource group but are not specified in the template.
Resource Manager reconciles resources that exist in the resource group but are not specified in the template.
D
Resource Manager duplicates resources that exist in the resource group but are not specified in the template.
Explanation
When deploying your resources, you specify that the deployment is either an incremental update or a complete update. The primary difference between these two modes is how Resource Manager handles existing resources in the resource group that are not in the template. In complete mode, Resource Manager deletes resources that exist in the resource group but are not specified in the template. In incremental mode, Resource Manager leaves unchanged resources that exist in the resource group but are not specified in the template.
#32
Which Microsoft Azure Site Recovery (ASR) component is responsible for the replication during a failback from Azure?
A
Master target server
B
Process Server
C
Configuration Server
Management Server
Explanation

The master target server is installed on-premise and handles replication data during failback from Azure. The management server you created on-premises has a master target server installed by default. However, depending on the volume of failed back traffic you might need to create a separate master target server for failback.

#33
You have received alerts regarding several resources in a resource group named Resource-Group1. This resource group contains:Three virtual machines, VM-A, VM-B, and VM-CA virtual network named VNet-1, with subnet named Subnet-A.Reviewing the resources, you notice several recent modifications that do not comply with company security and finance requirements. You would like to know how and when the changes were made, who made them, and what processes or requests the resources have initiated since these changes were implemented. Where should you start to find this information? (Choose 2 answers)
A
Check the related diagnostic logs to review processes and requests the resources initiated.
Check the related activity logs to see how and when the resources were modified, and by whom.
Review resource manager templates to see who modified the resources, how they modified them and when.
D
Check the related boot diagnostics to see what processes and requests these resources initiated.
Explanation

The Activity Log provides insight into the operations that were performed on resources in your subscription using Resource Manager, for example, creating a virtual machine or deleting a logic app. The Activity Log is a subscription-level log. Resource-level diagnostic logs provide insight into operations that were performed within that resource itself, for example, getting a secret from a Key Vault.

Resource-level diagnostic logs provide insight into operations that were performed within that resource itself, for example, getting a secret from a Key Vault.

#39
You are the senior Azure SQL Database architect for a Wall Street brokerage firm. Your firm has numerous governmental regulations that require retention of the automatic full Azure SQL database backups for 7 years, which is far beyond Azure’s Database automatic backup feature of 7-35 days. What does Microsoft recommend as the best way to accomplish your long backup requirements?
Use the Azure SQL Database Geo-replication tool as it can handle backups for that time period.
B
Use the Azure SQL Database Long-Term Backup Retention feature.
C
Run nightly tape backup jobs and store the tapes in a third party vault offsite.
D
Use a third party backup and recovery tool to store the databases for seven years on a rotating basis.
Explanation

The Long-Term Backup Retention feature enables you to store your Azure SQL Database backups in an Azure Recovery Services vault for up to 10 years. This feature can be used for applications that have regulatory, compliance, or other business purposes that require you to retain the automatic full database backups beyond the 7-35 days provided by SQL Database's automatic backups.

#2
Which description of the One-time MFA Bypass code is incorrect?
A
It is only intended for users who have lost their registered MFA device.
Configuring a bypass request requires the affected user's username and password.
C
The request for a One-Time MFA Bypass code must be completed by an administrator.
D
The default TTL for the bypass code is 300 seconds.
Explanation

When submitting a request for One-time MFA Bypass code, the administrator must provide the affected user's user-provided name (UPN) and registered email address.

#3
When selecting a storage replication mechanism, which would provide you six total copies of your data (three in the primary region, three in the secondary region) and enable maximum storage durability?
A

Zone-redundant Storage

B

Regional redunandant storage

Geo-redundant Storage

D

Locally redundant Storage

Explanation

Geo-redundant Storage (GRS) maintains six copies of your data. With GRS, your data is replicated three times within the primary region, and is also replicated three times in a secondary region hundreds of miles away from the primary region, providing the highest level of durability. In the event of a failure at the primary region, Azure Storage will failover to the secondary region. GRS ensures that your data is durable in two separate regions.

#5
You are currently managing a company's Azure storage account. A best practice is to ensure that the keys associated with the storage account are frequently rotated. Which of the following methods is recommended when working with regeneration of storage keys, especially when you have applications dependent on those keys for data storage?
A
Regenerate the primary key, and then make all applications using this key.
B
Regenerate the secondary key and then make all applications using this key.
Ensure all applications use the secondary key. Regenerate the primary key and move all applications back to the primary key. Regenerate the secondary key.
D
Ensure all applications use the secondary key. Regenerate the primary key and secondary key.
Explanation

Every storage account comes with 2 keys. This helps in regeneration of storage keys without any interruption. The correct sequence of events is:

  1. Ensure all applications use the secondary key
  2. Regenerate the primary key
  3. Move all applications back to the primary key
  4. Regenerate the secondary key
#8
Your database admins approach you for assistance in implementing security features on their Azure SQL databases. What Azure SQL feature can be enabled to provide data-at-rest encryption for the database, backups, and transaction logs?
A
Azure SQL Database Translucent Database Encryption
B
Azure Security Center
C
Azure Key Vault
Azure SQL Database Transparent Database Encryption
Explanation

Azure SQL Database transparent data encryption helps protect against the threat of malicious activity by performing real-time encryption and decryption of the database, associated backups, and transaction log files at rest without requiring changes to the application. TDE encrypts the storage of an entire database by using a symmetric key called the database encryption key. In SQL Database the database encryption key is protected by a built-in server certificate.

#10
When using Azure Resource Manager (ARM) templates, how does Resource Manager handle existing resources in the resource group that are not in the template for an incremental deployment?
Resource Manager leaves unchanged resources that exist in the resource group but are not specified in the template.
B
Resource Manager deletes resources that exist in the resource group but are not specified in the template.
C
Resource Manager reconciles resources that exist in the resource group but are not specified in the template.
D
Resource Manager duplicates resources that exist in the resource group but are not specified in the template.
Explanation
When deploying your resources, you specify that the deployment is either an incremental update or a complete update. The primary difference between these two modes is how Resource Manager handles existing resources in the resource group that are not in the template. In complete mode, Resource Manager deletes resources that exist in the resource group but are not specified in the template. In incremental mode, Resource Manager leaves unchanged resources that exist in the resource group but are not specified in the template.
#12
An Azure subscription named Subscription 1 contains three resource groups named Development, Test, and Production. Two users, Thomas and Guy, are assigned to an Azure Active Directory group named Group 1.All members of Group 1 can perform all read and write operations on all virtual machines in the Development and Test resource groups. However, they are prevented from performing any operations on virtual machines in the Production resource group through NotActions.Guy is also assigned a second custom resource role, called ProductionVM_Review. The ProductionVM_Review role allows him to perform all read operations on all virtual machines in the Production resource group.If Guy tries to perform a programmatic read operation on all virtual machines within Subscription 1, which of the following outcomes will occur?
Azure Active Directory will allow the operation on all virtual machines.
B
Azure Active Directory will allow the operation on virtual machines for the Development and Test resource groups only.
C
Azure Active Directory will allow the operation on virtual machines for the Production resource group only.
D
Azure Active Directory will deny the operation on all virtual machines.
Explanation

Guy has two assigned roles that apply to him, where the NotActions of one role contradict the Actions of the other. So which wins?

Actions overrule NotActions, so Guy will be able to perform the read operation on all virtual machines, including those in the Production resource group.

#13
Which of the Azure Cosmos DB API programming models should a Data Engineer choose if they want to be able to access data as a graph structure with vertices, edges, and properties?
A

SQL

B

Mongo

Gremlin

D

Table

Explanation

There are 5 APIs available within Azure Cosmos DB (SQL, Mongo, Gremlin, Cassandra, Table). Gremlin is a graph traversal language used to interact with graph databases.

#14
To ensure an SLA of 99.95% for your VMs, what is the minimum requirement?
A
2 virtual machine instances
2 virtual machine instances in an availability set
C
10 virtual machine instances
D
A single virtual machine instance
Explanation

You need to have at least 2 VMs in an availability set in order to have an SLA.

#15
When configuring Azure Firewall network rules to allow connections to an application's DNS server, which port number(s) should you select?

53

B

22

C

25

D

67 and 68

Explanation

SSH - 22

  • SSH is also referred to as 'Secure Shell'. It operates on the port number 22 of the TCP protocol. It carries out the task of remotely connecting to a remote server or host. It allows you to execute a number of commands and move your files remotely as well. However, it is one of the most secure ways of accessing your files remotely. Using this port, you can remotely connect to a computer and move your files with ease. This port sends the data over the network in an encrypted form which adds an extra layer of security on it. In addition to this, only authorized people will be able to remotely log on to their systems using the Port 22 which makes sure that the information does not get into unauthorized hands. It provides the chance to move files within networks as well as gives the privilege to move files between different networks securely. It operates at the Application Layer of the TCP/IP Model and is considered as one of the most secure and reliable ports for accessing files remotely.

DNS - 53

  • DNS is referred to as 'Domain Name System'. It operates on the port 53 of TCP and UDP protocols. DNS makes use of relational databases to link the host names of the computers or networks to their respective IP Addresses. The port 53 waits for requests from DHCP to transfer the data over the network. It operates on the Application Layer of the TCP/IP Model.

DHCP - 67, 68
DHCP is also known as 'Dynamic Host Configuration Protocol'. It basically runs on the UDP protocol. The basic purpose of DHCP is to assign IP Address related information to the clients on a network automatically. This information may comprise of subnet mask, IP Address etc. Many of the devices are automatically configured to look for IP Addresses using DHCP when they connect on a network. It makes it quite reliable to assign all the devices on a network with automatically produced IP Addresses. It generally operates on the Application layer of the TCP/IP Model. DHCP basically makes use of 2 ports; Port 67 and Port 68.
 

 

#16
Your organization runs Azure Functions apps that are assigned to a compute processing instance and if needed, more instances are added or removed dynamically. Which Azure Functions pricing plan is best suited for your organization’s needs?
A
Executable plan
B
Integrated plan
C
App Service plan
Consumption plan
Explanation

Azure Functions provides two pricing plans: App Service plan and Consumption plan. The Azure Functions consumption plan is billed based on resource consumption and executions. The Consumption plan is good if compute needs are intermittent or your job times tend to be very short as it allows you to only pay for compute resources when they are actually in use. 

#17
Azure Storage provides several mechanisms to secure both the management plane and the data plane. When securing the management plane, what method is used to control access to your storage accounts?
A
Azure Group Policy
Role-based Access Control
C
Resource Manager
D
Azure Security Center
Explanation

Each Azure subscription has an Azure Active Directory. Users, groups, and applications from that directory can be granted access to manage resources in the Azure subscription that use the Resource Manager deployment model. This is referred to as Role-Based Access Control (RBAC). To manage this access, you can use the Azure portal, the Azure CLI tools, PowerShell, or the Azure Storage Resource Provider REST APIs.

#20
The types of failovers that are supported with Microsoft Azure Site Recovery depend on your deployment scenario. If you are doing a failover from Primary (Virtual Machine Manager) VMM site to Secondary VMM site, which failover type is supported?
A
Planned failover
B
Unplanned failover
C
Test failover
All the failover types are supported
Explanation

The types of failovers that are supported depend on your deployment scenario.

Primary (Virtual Machine Manager) VMM site to Secondary VMM site:

Test failover: Supported
Planned failover: Supported
Unplanned failover: Supported

#21
You would like to follow security best practices for your Azure VMs. Which service below will monitor your Azure resources and provide recommendations for to address security vulnerabilities, including any missing network security groups, unencrypted disks, or missing security or software patches?
Azure Security Center
B
Azure Network Watcher
C

Log Analytics

D
Azure Key Vault
Explanation

Azure Security Center is the source of the comprehensive monitoring of all the aspects of security of the virtual machine. It also provides its recommendations through Azure Advisor. Its recommendations consist of not only configuration changes but also potential partner solutions, such as web application firewalls.

#25
Your company includes over 300 office employees and several employees who work remotely. All employees are registered within the company's Azure Active Directory tenant. You want to enable MFA for all employees, but allow them to skip MFA when logging in under normal circumstances. Normal circumstances are as follows: Office employees login through Azure Active Directory over the company intranet. Remote employees login through point-to-site VPNs through devices registered with Azure AD Join. You completed the following configurations:  With ADFS configured, Azure AD will recognize all users logging in from the office as federated users allowed to skip MFA.  A conditional access policy to allow remote users logging in from Azure AD joined devices to skip MFA. Will this allow on-premise and remote employees to bypass MFA under normal circumstances?
Yes
B
No, remote employees will still need to complete MFA.
C
No, office employees will still need to complete MFA.
D
No, both office and remote employees will still need to complete MFA.
Explanation

Federated Trusted IPs would allow office workers to bypass MFA, and the conditional access policy will allow remote workers to login via devices joined to Azure AD.

#27
You need to select a service plan for a web app that your developers are working on. You need at least 35 GB of drive space, auto scaling and between 5 and 8 instances. The instances need 2 cores and at least 3 GB of RAM.Which plan is the least expensive and matches the criteria?
A

Basic

Standard

C

Premium

D

App Service Linux

Explanation

The Standard service plan for web apps allows for up to 10 instances, auto scaling and 50 GB of disk space.

#29
You need to create Azure resource templates to automate the deployment of resources. At the same time, you need to ensure that anyone can differentiate between resources created for development or production. Which of the below template features can help people identify the purpose of deployed resources in this way?
tags
B
resources
C
$schema
D
contentversion
Explanation

Tags can be used in templates to differentiate resources. For example, you can add a tag with a name of “Environment.” You can then assign values of “Production” to production-based instances and “Development” to development-based instances

#32
You are designing an Azure resource template to create a Virtual network,  a storage account, a Windows virtual machine, and assign a public IP address to the virtual machine. The virtual network interface on the virtual machine should be created after the Virtual network is created via the Azure template. Which element in the Azure resource template allows you to do this?
A
nested template
B
template references
dependsOn
D
template variables
Explanation

The dependsOn element can be used to ensure a dependency on one resource on another. In a simple example shown below, suppose if you defined a resource element of the type Microsoft.Network/virtualNetworks with a name of Demonw, and then defining a network interface for your virtual machine. You can then use the dependsOn element to ensure the network interface gets created after the virtualNetworks is created.

"type" : "Microsoft.Network/virtualNetworks",

"name" : "Demonw"

"type" : Microsoft.Network/networkInterfaces",

"dependsOn" : "Microsoft.Network/virtualNetworks/Demonw"

#35
Your data processing application hosted on Azure is performing a data ETL operation (Extract-Transform-Load). Once the data transformation is complete, the data will be uploaded to Azure blob storage. Azure Functions will need to trigger a function once the file is available on Azure Blob Storage, to initiate the next stage of the operation.  Which type of trigger is ideal in this case?
A

A timer-based trigger

B

A webhook trigger

An event-based trigger

D

An HTTP trigger

Explanation

An event-based trigger is ideal because the function is invoked once a file is uploaded to Azure Storage. 

#37
A ____ is a unit of measure of the resources that are guaranteed to be available to a single Azure SQL database at a specific performance level within a single database service tier.
A
Streaming Unit (SU)
Database Transaction Unit (DTU)
C
Request Unit (RU)
D
Data Warehouse Unit (DWU)
Explanation

A Database Transaction Unit (DTU) is a blended measure of CPU, memory, and data I/O and transaction log I/O in a ratio determined by an OLTP benchmark workload designed to be typical of real-world OLTP workloads.

#38
Your company would like to enable Azure MFA within its Azure Active Directory tenants. The company includes an office of roughly 300 employees, with many employees working from home periodically throughout the week. Sales representatives who travel most of the year require remote access to applications in demonstration environments hosted on Azure. The company's requirements are: Minimal administrative overhead in MFA setup and management All employees must register for MFA All employees must complete MFA when logging into their user accounts remotely, but not when in the office. Without considering the necessary Azure Active Directory licenses, what choice best accomplishes these requirements?

Enable Azure AD Identity Protection. Configure an Azure MFA registration policy requiring all users to register and enable MFA. Configure all office IP addresses as trusted IP addresses that can skip MFA.

B
Enable Azure MFA for all employees via the Azure Portal. Configure an Azure MFA registration policy requiring all users to register and enable MFA. Configure all office IP addresses as managed IP addresses which can skip MFA.
C
Enable Azure AD Identity Protection. Configure an Azure MFA registration policy requiring all users to register and enable MFA. Configure an Azure MFA risk-based conditional access policy requiring users accessing Azure resources remotely to complete MFA for all logins.
D
Enable Azure AD Identity Protection. Configure an Azure MFA registration policy requiring all users to register and enable MFA. Configure an MFA bypass option for all employees when they log in through an office IP address.
Explanation

With Azure Active Directory's Identity Protection service, you can set up registration policies that enforce your MFA requirements for all directory users. You can also setup all office IP addresses as federated (not managed) Trusted IP addresses, which will not require MFA, or administrative updates as your office IP addresses change.

#39
When configuring Azure Site Recovery, what does the 'RPO threshold setting' control?
A

The time limit set for your end-to-end recovery point objective

How often data recovery point snapshots are created

C

How long data recovery points are stored

D

The failover method Azure Site Recovery will initiate

Explanation

The RPO threshold setting within Azure Site Recovery's Target Environment configuration panel controls how often data recovery point snapshots are created.

#40
You are designing a transactional records management application for a small investment firm. It runs on memory-optimized virtual machines, which receive messages via Service Bus.The virtual machines are grouped into a scale set with the following Scale Out rules:Scale out one VM if CPU utilization is above 60 percent.Scale out two VMs if CPU utilization is above 80 percent.Scale out one VM if disk writes per second reach 65 percent capacity.Scale out two VMs if disk writes per second reach 85 percent capacity.Scale out one VM if message queue length reaches more than 1500.Scale out two VMs if message queue reaches more than 2500.The following Scale In rules are also applied:Scale in one VM if CPU utilization drops below 35 percent.Scale in two VMs if CPU utilization drops below 20 percent.Currently, your application is at 65 percent CPU utilization, disk writes per second are at 78 percent capacity, and the message queue length is 3000 messages.Based on these metrics, what scaling action(s) will your application perform?
Scale out two virtual machines.
B
Scale in one virtual machine.
C
Scale out one virtual machine.
D
Scale in two virtual machines.
Explanation

First and foremost, scale-out operations always have priority over scale-in operations. Anytime that multiple scale-out operations conflict with one another, the rule that takes precedence will be the one that initiates the largest increase in the number of instances. When it comes to scale-in conflicts, the rule that initiates the smallest decrease in the number of instances will take precedence. 


#1
Within Azure App Service, you want to modify a continuous webjob so that it will process on a single instance, not multiple instances.How and where can you complete this modification within the WebJob?
Update the singleton attribute within the webjob-publish-settings.json file.
B
Create a settings.job file with the singleton attribute code in the root of the job's .zip file
C
Create a custom webjobs-list.json file that assigns the webjob to a specific VM via the singleton attribute parameter.
D
In the Azure Portal, assign the scope of the webjob to a specific VM.
Explanation

If you find yourself in a situation where you need to run a WebJob on a single instance, instead of all instances, you can create a file called settings.job that contains the line you see on your screen.

{ "is_singleton": true }

After adding the line you see on your screen to the settings.job file, save the file to the root folder for the continuous WebJob. What this will do is get your WebJob running as a single instance despite being installed on multiple instances.

#4
Which of the following method is the most efficient for looking up entities in an Azure Table query?
A
Point query (partition key + row key)
B
Range query (partition key + row key range)
Partition scan (partition key + non-key property filtering)
D
Table scan (partition key not included)
Explanation

A Point Query is the most efficient lookup to use and is recommended to be used for high-volume lookups or lookups requiring lowest latency.

#6
When configuring Azure Firewall, which type of rule is specific to Azure Firewall and allows it to access fully qualified domain names from a subnet?
A

Application rules

Network rules

C

Network Security Group rules

D

Application Security Group rules

Explanation

Azure Firewall supports rules and rule collections. A rule collection is a set of rules that share the same order and priority. Rule collections are executed in order of their priority. Network rule collections are higher priority than application rule collections, and all rules are terminating.

There are three types of rule collections:

Application rules: Configure fully qualified domain names (FQDNs) that can be accessed from a subnet.
Network rules: Configure rules that contain source addresses, protocols, destination ports, and destination addresses.
NAT rules: Configure DNAT rules to allow incoming connections.

#7
Your client is expanding their cloud presence as their customer base expands to different distant parts of the globe. They are building a multi-regional architecture, and need the correct Azure Backup configuration to support it. After they select the Azure Backup service that meets their needs, what steps in configuring Azure Backup would allow you to copy all data as easily as possible, and provide the highest level of availability and redundancy?
A
Create a Recovery Services Vault in each region with geo-redundant storage enabled. Enable backup for each VM to the vault in its corresponding region.
B
Create a Recovery services vault in each availability zone with zone-redundant storage enabled. Create a backup policy for each vault that includes all VMs in the availability zone.
C
Create a Recovery Services vault in each region with geo-redundant storage enabled. Create a backup policy for each vault that includes all VMs in the corresponding region.
Create a Recovery Service vault in each region with local-redundant storage enabled. Enable backup for each VM to the vault in its corresponding region.
Explanation

When considering simplicity, availability and redundancy, you should configure the service in the following way:

  1. Create a vault in each region, as the range of the vaults is regional.
  2. Enable geo-redundant storage, so that in the event of a regional outage, the data from each region is replicated to another region and will be intact.
  3. Create a backup policy for each vault rather than for each virtual machine, to simplify the management of the system in the likely event that scaling is necessary, or new virtual machines are created to replace any that have failed.
#9
A company has a set of Windows virtual machines hosted on the Azure platform. They need to ensure all data is encrypted at rest. Which of the following services from Azure can help fulfill this requirement?
A
Register the virtual machine with Azure Active Directory service and use OAuth for tokens to encrypt the data at rest.
B
Use Azure Disk Encryption along with Azure Key Vault.
Register the virtual machine with Azure Active Directory service and use SAML tokens to encrypt the data at rest.
D
Use a custom algorithm along with a custom built application to encrypt the data at rest.
Explanation

Azure Disk encryption can be used to encrypt the data at rest for Windows and Linux based virtual machines. This service can be used along with the Azure Key Vault which can be used to maintain the keys used for encryption purposes

#11
Which of the following resources is a standalone authentication resource that integrates with an existing Azure AD tenant, and can be assigned to multiple Azure resources?

System-assigned Managed Identity

B

User-Assigned Managed Identity

C
Shared Access Signature
D
Bitlock Encryption Key (BEK)
Explanation

A user-assigned managed Identity is a managed identity type that is a standalone resource that can be used with multiple resources, and is independent of any resource lifecycle.

#18
You suspect hackers and bots have been attacking your application's network. What Azure Network Watcher network monitoring or analysis tool would best fit your needs?
Connection Monitor
B
Network Performance Monitor
C
Security Group View
D
Traffic Analytics
Explanation

Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. Traffic analytics analyzes Network Watcher network security group (NSG) flow logs to provide insights into traffic flow in your Azure cloud.

#19
Your company recently enabled Fraud Alerts with Azure MFA. Members of your staff are now unable to sign-in to their user accounts because several fraud alerts have been filed. What actions will best resolve the issue, and allow affected users to sign in? (Select 2 answers)
A
Sign in as a user with the Azure Active Directory administrator role.
B
Sign in as a user with the Designated Approver role.
Unblock all affected accounts with a specified reason for the unblock request.
Use the MFA bypass option to allow users to sign in until the default block expires.
Explanation

When fraud alerts are enabled in Azure MFA, Azure blocks access to any user accounts involved in any reported fraud alert. Administrators can unblock the account with a specific reason for the unblock request, but cannot unblock multiple accounts programmatically and then prevent accounts from being blocked in the future.

The designated approver role is related to role elevation requests within the scope of the Privileged Identity Management feature of Azure Active Directory, and would have no authorization to unblock accounts in the event of a fraud alert.

#22
As a feature of Azure Active Directory, Identity Protection offers each of the following capabilities except which one?

Reporting to help remove/reduce security risks

B

Automated detection of compromised user IDs

C

Enforce multi-factor authentication policy

D

Enable "just-in-time" role assignments

Explanation

Identity Protection allows you to enforce MFA policy, automate detection of potentially compromised user credentials, and can create reports to help you identify and remove or mitigate security risks. However, identity project does not include 'just-in-time' role assignments. This is a feature of privileged identity management, a separate service offered through Azure Active Directory.

#23
Of the listed configuration settings on an Azure Web App, which is not swapped when a deployment slot is swapped?
App Settings
B
Custom Domain Names
C
Connection Strings
D
Webjobs Content
Explanation

When you clone configuration from another deployment slot, the cloned configuration is editable. Furthermore, some configuration elements will follow the content across a swap (not slot specific) while other configuration elements will stay in the same slot after a swap (slot specific). The following lists show the configuration that will change when you swap slots -

  • General settings - such as framework version, 32/64-bit, Web sockets
  • App settings (can be configured to stick to a slot)
  • Connection strings (can be configured to stick to a slot)
  • Handler mappings
  • Monitoring and diagnostic settings
  • WebJobs content
#24
Your application's primary deployment has been attacked by malicious traffic, and you've failed over to a secondary replica in a separate availability zone. To strengthen your security, you want to deploy a virtual appliance to act as a firewall. However, you initially want all traffic to be stopped before reaching any of your primary replica resources, to prevent any other potential malicious traffic.How can you configure a user-defined route to accomplish this?
A
Configure the user-defined route without providing a destination CIDR block address.
B
Configure user-defined route without providing an IP address for the virtual firewall appliance.
C
Configure the user-defined route with the next hop set to 'none.'
Configure the user-defined route to allow outgoing traffic only.
Explanation

When creating a custom route for a routing table, there are three main values to consider. The first is the destination CIDR block for the traffic, which all custom routes require. Then there is the “next hop.” This tells Azure where to route the traffic before it gets to the destination defined above. 

The available options are:
  1. Virtual Network
  2. The next option is the Virtual Network Gateway
  3. Next is the Internet
  4. Then there’s the Virtual Appliance option.
  5. And finally, there’s the None option.
This can be used to stop the traffic dead in its tracks right here. The packets will not be forwarded at all.
#26
You have created a microservices application, but before you launch, you must implement a solution to protect your application's APIs while allowing customers to access your application. How can you accomplish this?
A
Use Azure API Management
B
Use an Azure App Service API apps
Allow access to your application through Azure AD B2C
D
Allow access to your application through Azure AD managed identities
Explanation

This service makes it easy to provide APIs that can be used by both internal developers and external partners and customers. It acts as a gateway between clients and your backend microservices. Not only does it provide an easily accessible front-end to your application, but it also handles important management tasks, such as security, monitoring, analytics, and rate limiting.

It’s easy to add an existing API to the API Management service. You only need to supply a few details, such as its name and URL. Then you can secure it and manage it. 

#28
If you want to review detailed information about what incoming requests have been allowed or denied by network security groups on a per-rule basis, what Network Watcher service will best assist you?
A
NSG Flow Logs
B
Diagnostic Logs
C
Network Performance Monitor
IP Flow Verify
Explanation

Network security group (NSG) flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through an NSG.

#30
The types of failovers that are supported with Microsoft Azure Site Recovery depend on your deployment scenario. If you are doing a failover from Physical server to Azure, which failover type is supported?
Test Failover
B
Planned Failover
C
Unplanned failover
D
Not supported
Explanation

The types of failovers that are supported depend on your deployment scenario.

Physical server to Azure:

Test failover: Unsupported
Planned failover: This scenario uses continuous replication so there's no distinction between planned and unplanned failover. You select Failover
Unplanned failover: NA

#31
Your firm is utilizing Azure Virtual Machine (VM) technology. Performance, as well as backup and recovery are a critical aspects of the firm’s IT strategy and governance policies. With that in mind, the firm is using managed disks with premium storage, and the Azure Backup service. What storage replication option should your firm be implementing?
A
Locally redundant storage (LRS)
Zone-redundant storage (ZRS)
C
Geo-redundant storage (GRS)
D
Read-access geo-redundant (RA-GRS)
Explanation
A Managed Disk is a service that Azure provides which alleviates the work of you having to manage storage accounts. Azure will manage your disks and provide all the redundancy and replication options for you in the background. You just choose the Storage type, Standard or Premium, and choose any option from these two tiers. Managed disks integrate very well with other Azure services as well such as the Azure Backup service. This is important since managed disks can only be use with the LRS storage option and so for disaster recovery you want to use managed disks with the Azure Backup service. In this case, managed disk cost is an acceptable tradeoff to incur.
#33
When configuring Azure Firewall, which type of rule is specific to Azure Firewall and contains source addresses, protocols, destination ports, and destination addresses?
A

Application rules

B

Network rules

C

Application Security Group rules

Network Security Group Rules

Explanation

Azure Firewall supports rules and rule collections. A rule collection is a set of rules that share the same order and priority. Rule collections are executed in order of their priority. Network rule collections are higher priority than application rule collections, and all rules are terminating.

There are three types of rule collections:

Application rules: Configure fully qualified domain names (FQDNs) that can be accessed from a subnet.
Network rules: Configure rules that contain source addresses, protocols, destination ports, and destination addresses.
NAT rules: Configure DNAT rules to allow incoming connections.

#34
You are fixing an AttributeValueMustBeUnique error in Azure AD. Which of the following tools can help you identify the duplicate values that are causing the error?
A
Azure AD Connect Health for sync
Azure AD Application Insights
C
Kudu
D
Azure AD Connect Health Report
Explanation

Azure AD Connect Health for sync can generate a report that will help identify the duplicates.

#36
You are creating a VNet to VNet connection using a virtual network gateway. What step below is not required for this configuration?
A
Create gateway subnets in each VNet.
Assign public IP addresses for each virtual network gateway.
C
Select 'Allow VNet access' when configuring your virtual network gateway.
D
Create a shared encryption key.
Explanation

Each of these steps is required for a VNet-to-VNet connection via virtual network gateway except enabling "Allow VNet access," which is required for VNet peering configurations.

#1
Which feature within SQL Database would allow a user to group multiple databases with variable usage demands together while limiting the cost to the customer?
A

Shards

B

Elastic Clusters

C

Containers

Elastic Pools
Explanation

SQL Database elastic pools are a simple, cost-effective solution for managing and scaling multiple databases that have varying and unpredictable usage demands. The databases in an elastic pool are on a single Azure SQL Database server and share a set number of resources (elastic Database Transaction Units (eDTUs)) at a set price. Elastic pools in Azure SQL Database enable SaaS developers to optimize the price performance for a group of databases within a prescribed budget while delivering performance elasticity for each database.

#2
You have been hired by a small real estate investment firm that utilizes small databases and low traffic Web servers to record and analyze daily commercial mortgage rates and investment property values. The firm’s Chief Technology Officer (CTO) asks you to research and report on the best Azure Virtual Machine Scale Set implantation for the firm. Which VM scale set category would you suggest the firm implement?
General purpose
B
Compute optimized
C
Memory optimized
D
High performance compute
Explanation

There are five categories of Azure VM Scale Set implementations. General purpose VM Scale Sets work well for implementations requiring small to medium databases and low to medium traffic Web servers.

#3
You want to assign a role-based access control (RBAC) role to a user in the Azure Portal. Consider the following steps listed below:Select the userOpen Access Control (IAM) and select 'Add Role Assignment'Open Azure Resource Manager and select 'Add Role Assignment'Provide Reason for AssignmentSelect the roleSaveSelect Eligible or PermanentAssuming you have the necessary permissions, which answer lists the necessary steps to assign an RBAC role to a user in the correct order?
2 - 1 - 5 - 6
B
3 - 1 - 5 - 6
C
2 - 1 - 5 - 7 - 6
D
2 - 1 - 5 - 7 - 4 - 6
Explanation

In Access control (IAM), you can Add permissions to the resources. To assign a role to a user, you simply select the desired Role, Assign access to an Azure AD user, group, or application, Select the user from the list, and click Save.

#4
You are implementing Azure Backup to back up a group VMs. If any VM suffers an outage or data corruption, you would like to restore the entire VM. Your VMs require Managed SSD disk storage. When configuring the staging location for these VMs, how can you guarantee any restored VM through Azure Backup has the same storage configuration as the original VM?
Check that a premium storage account with local redundant storage exists in the same region as the VM and Recovery Service Vault. Make sure Azure Storage Service Encryption has never been enabled on this storage account.
B
Check that a standard storage account endpoint with zone-redundant storage (ZRS) exists in the same resource group as the VM and Recovery Service Vault. Make sure Azure Storage Service Encryption has never been enabled on this storage account.
C
Check that a standard storage account with read-access globally redundant storage (RA_GRS) exists in the same availability zone as the VM and Recovery Service Vault. Make sure Azure Disk Encryption is not currently enabled on this account
D
Check that a standard storage account with local redundant storage exists in the same region as the VM and Recovery Service Vault. Make sure Client-side Encryption is not currently enabled on this storage account.
Explanation

There are several factors to keep in mind here related to requirements for a VM restore through Azure Backup.

  • The storage tier of the staging location determines the storage tier of the restored VM.
  • The VM in question is premium, and the only storage tier that offers premium is Local Redundant Storage.
  • When your VM uses managed disks, the storage account acting as the staging location cannot have Azure Storage Service Encryption enabled at any time.
#5
With a web application deployed to Azure Web Apps, a company wants to start deploying rolling updates, but at the same time, they want to test the updates on the Azure environment before promoting the app to production. Which of the approaches below would help fulfill their requirements?
A
Create a virtual machine and re-create the web application there. Deploy the updates, test the application and then deploy it to production.
B
Create an on-premise virtual machine and re-create the web application there. Deploy the updates, test the application and then deploy it to production.
Create a deployment slot, configure the app on this slot. Test the app, then swap the slots.
D
Create a separate web app, then deploy and test it. Then deploy the web app with the updates to production site using Visual Studio.
Explanation

The Web Apps service in Azure App Service allows you to create deployment slots to have a separate staging environment for testing updates before they get rolled out to production. The deployment slot creates a new environment which can then be swapped with the production environment after all testing is complete.

#8
You have configured Azure Site Recovery, and now want to run a test failover to verify that it works. Which of the following failover directions is not supported?
Azure to Hyper-V site
B
Primary VMM site to Secondary VMM site
C
VMM site to Azure
D
Cloud to Cloud
Explanation

Azure to Hyper-V site is not supported during a test failover.

#11
When designing a Virtual Machine Scale Set, Microsoft recommends what ratio of storage accounts to virtual machines?

One storage account for each virtual machine in a scale set.

B

One storage account for every two virtual machines in a scale set.

C

Two storage accounts for every virtual machine in a scale set.

D

Two storage accounts for every three virtual machines in a scale set.

Explanation

If at all possible, Microsoft would like to see a one to one ratio and have a storage account for each virtual machine created in a scale set. If this is not possible, Microsoft recommends using no more than 20 VMs per storage account.

#14
Your company is being audited, and an external accountant needs access to review and download specific files from the blob storage and file storage services within one specific Azure storage account. You currently use Azure Active Directory to control access to the Azure storage account in question. However, you have been told you need to provide the accountant with immediate access to the blob and file storage account without any further information. How can you provide necessary access, but also limit it to the blobs in question?
A

Provide the accountant with read-only access to the specific Azure Blob and File storage services with a service-level shared access signature token. Allow all read requests but limit write requests to LIST and GET. Specify the HTTPS protocol is required to accept requests.

B

Assign the accountant a guest role in Azure Active Directory with read-only access to the specific Azure Blob and File services in the Azure Storage account.

C

Assign the accountant a contributor role access to the entire storage account using Azure AD role-based access control (RBAC).

Provide the accountant with read-only access to the specific Azure Blob and File storage services with an account-level shared access signature token. Allow all read requests but limit write requests to LIST and GET. Specify the HTTPS protocol is required to accept requests.

Explanation

In this case, an account-level SAS is required because the accountant needs access to two separate services in the account. You do not have the necessary information to create a guest or contributor account to control the accountant's access, but you can add controls to require requests are sent via an HTTPS protocol, and also control the specific read/write actions.

#15
What Azure solution can be combined with Azure Active Directory (Azure AD) to further secure identity management within the platform and can also secure on-premises applications by using additional identity verification?
A
Azure Security Center
Multi-Factor Authentication (MFA)
C
Azure Key Vault
D
Azure Active Directory Domain Services
Explanation
Azure Multi-Factor Authentication (MFA) is Microsoft's two-step verification solution. Azure MFA helps safeguard access to data and applications while meeting user demand for a simple sign-in process. It delivers strong authentication via a range of verification methods, including phone call, text message, or mobile app verification.
#18
You have deployed two separate application replicas to different regions. The primary replica receives a majority of customer traffic, and a secondary replica also handles requests for distant customers, to reduce the service latency for their requests. Which multi-region design did you deploy?
Active-active with geo-location request routing
B

Active-passive with a hot standby

C

Active-passive with a cold standby

D
Active-passive with geo-location request rolling
Explanation

When it comes to multi-region deployments, there are different options for how you might configure things depending on your availability requirements and your budget.

If you need an extremely high level of availability, then you can use an active/passive model with hot standby. With this approach, you have another version of your solution running in a second region, and it doesn't serve up any traffic unless there's a failure in the primary region.

A variation on that is the active/active model with geo-location based request routing. This is similar to the previous option, but the solution that's running in the second region is actively serving up requests to the users who are closer to that region than the primary.

Then there's the active/passive model with cold standby, which means that there's not a solution running in a second region. Instead, it's dynamically created when the first region is unavailable. This is a great option if you want to balance the cost versus the SLA. The switchover is not going to be immediate, but with a well-defined automation plan, this is a viable option.

#19
You have configured a load balancer to monitor a group of stateless VMs with the health probe following settings:Protocol: HTTPMinimum Probe Interval: 15 secondsMinimum Unhealthy Responses: 3Timeout: 90 secondsThe load balancer does not receive any response from a virtual machine named VM-1 after two health probes. It has been 100 seconds since the listener sent a 200 response.What actions will the load balancer take in this scenario?
It marks VM-1 as 'Unhealthy' and stops sending requests to it.
B
It sends one additional health probe before changing the status of VM-1 to 'Unhealthy.'
C
It marks VM-1 as 'Unhealthy' and gradually reduces the number of requests to it.
D
It marks VM-1 as 'Unhealthy' and terminates VM-1.
Explanation

One the timeout has elapsed, the load balancer marks the VM as unhealthy and stops sending requests to it.

#24
The types of failovers that are supported with Microsoft Azure Site Recovery depend on your deployment scenario. If you are doing a failover from Azure to VMM site, which failover type is supported?
A
Test failover
Planned failover
C
Unplanned failover
D
Not supported, you can't failover from Azure to VMM
Explanation

The types of failovers that are supported depend on your deployment scenario.

Azure to VMM site:

  • Test failover: Unsupported
  • Planned failover: Supported
  • Unplanned failover: Unsupported

 

#25
There are several mission-critical network connections between Azure IaaS Virtual Machines and Azure service endpoints in your Azure production environment. The connection health between these VMs and Azure endpoints needs to be continuously, automatically checked, and provide an alert if specific metrics approach unhealthy thresholds. Which Azure Network Watcher feature would be ideal in this case?
A

Connection Troubleshoot

B

IP Flow Verify

Connection Monitor

D

Traffic Analytics

Explanation

The connection monitor capability monitors communication at a regular interval and informs you of reachability, latency, and network topology changes between the VM and the endpoint. For example, you might have a web server VM that communicates with a database server VM. Someone in your organization may, unknown to you, apply a custom route or network security rule to the web server or database server VM or subnet.

#26
It is the end of your organization’s fiscal year. Your accounting department wants you to write several Azure Functions that will run very frequently and for several months, processing the annual financial data for tax purposes and financial record keeping tasks. The functions will run for about 25 minutes on average each time. What Azure Function pricing model should you select when creating the application container in which these functions will reside?
A
The bundle plan
B
The pay as you go plan
The App Service plan
D
The consumption-based plan
Explanation

The App Service plan provides dedicated VM resources on which your function app will reside and execute. This plan works well for function apps that will execute continuously or at least very frequently, and/or in situations where you have existing, under-utilized App Service VMs on which you could deploy a new function app.

#27
Your organization is evaluating the deployment and connection of Azure Virtual Machines (VMs). Several system administrators want to use a Windows Server 2016 Datacenter VM and other system administrators want to use the Red Hat Enterprise Linux operating system. What statement describes a consideration that applies to Azure VMs running the Windows Server 2016 operating system?
A Windows VM deployment provides one authentication method using Login IDs and passwords.
B
A Windows VM deployment provides two authentication methods: Login IDs and passwords or an SSH public key.
C
If you are connecting from a Windows Server 2016 machine you can use the SSH command as is.
D
A Windows Server 2016 Datacenter VM is a “Pay-As-You-Go Premium Image”.
Explanation

It is important to understand the pros and cons of the various available operating systems that can run on a VM. For Microsoft Windows VMs, the license is built-in and included as part of the cost of the VM saving money. For deployment, there are slight differences between Windows and Linux VMs primarily concerning how the connection to the VM itself is made. Also, Linux authentication is slightly different in that there are two options for the Authentication type, whereas Windows offers just one authentication method.

#28
You have begun migrating your existing applications from on-premise servers to resources on an Azure Virtual Network. The on-premise network and Azure are currently connected via ExpressRoute. You need to ensure the ExpressRoute connection is healthy at all times. What Network Watcher service can you utilize to monitor the connection?
Network Performance Monitor
B
Traffic Analytics
C
VPN Troubleshoot
D
Connection Monitor
Explanation

Network Performance Monitor is a cloud-based hybrid network monitoring solution that helps you monitor network performance between various points in your network infrastructure. It also helps you monitor network connectivity to service and application endpoints and monitor the performance of Azure ExpressRoute.

#29
A company has an on-premise Active Directory which consists of multiple forests. They are synchronizing data to a Azure Active Directory. Which of the below recommendations applies when you have two user accounts representing the same user in two different forests, and both accounts have the same email address?
A
Copy the contents of one Account to the other, and delete the other account. Have one account that can be synced to Azure Active Directory.
Using Azure AD connect tool, consolidate the information in both accounts using the accounts' Mail attribute.
C
Copy the contents of one Account to the other and rename the other account. Have one account that can be synced to Azure Active Directory.
D
Synchronize the accounts as they are , since the Azure AD connect tool will identify and fix the conflict.
Explanation

When you have multiple forests, there can be users in each forest with the same attributes. The recommendation is to consolidate the information and use Azure AD Connect. When carrying out the synchronization, it can be done by matching the email addresses and consolidating the information.

#31
What Azure Active Directory (Azure AD) Connect Health agent shows alerts, monitoring, and usage analytics of Azure AD Federation Services?
A
The Forest Services agent
The Federation Services agent
C
The Federation Health Domain agent
D
The Federation Forest Domain agent
Explanation

The Active Directory Federation Services agent shows alerts, monitoring, and usage analytics of AD Federation Service. An Azure Active Directory Domain Services agent shows all of the AD Domain Services forests and the Azure AD Connect Sync agent shows the Azure AD Connect servers that are being monitored.

#32
Which of the following Azure tools allows you to make detailed estimates for Azure deployment costs?

Pricing Calculator

B

Total Cost of Ownership (TCO) Calculator 

C

Azure Advisor

D

Azure Cost Management Tool

Explanation

The Pricing Calculator tool is an excellent online tool to assist in estimating your Azure costs.  This tool allows you to select and estimate the costs of deploying resources to Azure.  Of course, to generate the best cost estimate, you’ll need to know exactly what resources you plan to deploy to Azure and their compute and storage requirements. 

#35
A company determines that it is not possible to have a storage account for each virtual machine created in an Azure VM Scale Set. In this event, Microsoft recommends that this organization _____.
plan for no more than 20 VMs per storage account
B
reconfigure its storage accounts
C
should not create a scale set
D
plan for no more than 20 storage accounts per virtual machine
Explanation

If at all possible, Microsoft would like to see a one to one ratio and have a storage account for each virtual machine created in a scale set. If this is not possible, Microsoft recommends using no more than 20 VMs per storage account.

#36
You have specified auto scaling rules for an image processing application hosted on virtual machines. The application receives messages from Azure storage queues when images need to be processed.The virtual machines are grouped into a scale set with the following Scale Out rules:Scale out one VM if CPU utilization is above 60 percent.Scale out two VMs if CPU utilization is above 80 percent.Scale out one VM if disk writes per second reach 65 percent capacity.Scale out two VMs if disk writes per second reach 85 percent capacity.Scale out one VM if message queue length reaches more than 700.Scale out two VMs if the message queue reaches more than 1000.The following Scale In rules are also applied:Scale in one VM if CPU utilization drops below 35 percent.Scale in two VMs if CPU utilization drops below 20 percent.Scale in one VM if your message queue has fewer than 100 messages.The app's CPU utilization is currently at 30 percent, and the message queue contains 735 messages.Based on these metrics, what auto scaling action(s) will your application perform?
It will scale out one virtual machine.
B
It will scale up one virtual machine.
C
It will scale in one virtual machine.
D
It will scale down one virtual machine.
Explanation

First and foremost, scale-out operations always have priority over scale-in operations. Anytime that multiple scale-out operations conflict with one another, the rule that takes precedence will be the one that initiates the largest increase in the number of instances. When it comes to scale-in conflicts, the rule that initiates the smallest decrease in the number of instances will take precedence. 

#37
To manage storage costs, you want to delete old VM disk snapshots. What service can you use to create a backup retention policy, to automatically delete the snapshots after a set duration of time?

A recovery service vault with Azure Backup

B

A vault with Azure Key Vault

C

An alarm in Azure Monitor

D

A resource policy with Azure Policy

Explanation

If you use snapshots on blobs, monitor the snapshots and delete those which are outdated or no longer needed. An even better way to avoid the costs associated with snapshots is to implement a comprehensive backup solution by deploying an Azure Recovery Vault. 

#38
Within Azure Function, what trigger is particularly useful in application instrumentation, user experience or workflow processing, and Internet of Things (IoT) scenarios?
EventHubTrigger
B
HTTPTrigger
C
QueueTrigger
D
BlobTrigger
Explanation

Azure Function provides many types of triggers. Some examples include: The EventHubTrigger responds to events delivered to an Azure Event Hub. Particularly useful in application instrumentation, user experience or workflow processing, and Internet of Things (IoT) scenarios. The HTTPTrigger triggers the execution of your code by using an HTTP request. The QueueTrigger respond to messages as they arrive in an Azure Storage queue. The BlobTrigger processes Azure Storage blobs when they are added to containers. You might use this function for image resizing.

#39
Cosmos DB's SQL API offers a fully managed ____ database service that focuses on performance, high availability, elastic scaling, and global distribution.
A
XML
B
SQL
NoSQL
D
OLAP
Explanation

The Azure Cosmos DB SQL API database implementation differs from traditional relational database or SQL techniques. NoSQL databases that enable storing unstructured and heterogeneous data at scale, and therefore, they are often utilized in modern cloud applications.

#40
Which feature in Azure AD allows you to monitor both Azure and On-Premises resources?
Azure AD Connect Health
B
Multi-Factor Authentication (MFA)
C
Role-Based Access and Control (RBAC)
D
Azure AD Health Monitor
Explanation

Azure AD Connect Health allows you monitor both Azure and On-Premises resources by deploying specialized agents. MFA is responsible for ensuring secure user login. RBAC controls users access to resources, and there is no such thing as Azure AD Health Monitor.

#6
Your company has an application where users upload images and they're processed with different filters. The app is currently on-premises and you must design a solution in Azure. The solution should minimize management effort, it should allow for deployments to be promoted, and the image processing code should run as a separate process from the web application. Which option is best?
A
WebJobs
B
IaaS VMs
C
Azure HPC
Azure HDInsight
Explanation

WebJobs is a feature of Azure App Service that enables you to run a program or script in the same context as a web app, API app, or mobile app, but as a separate process. And using App Services will minimize management, and web apps support deployment slots, allowing for deployment promotion.

#7
A company has a set of services hosted on Azure virtual machines. They want to achieve the following objectives for their set of services: A proper disaster recovery strategyA shorter Recovery time objective Which of the following Azure services should they use?
Azure Backup
B
Azure Site Recovery
C
A new Virtual machine with the right storage options to store the backup data.
D
A new cluster of virtual machines with the right storage options to store the backup data.
Explanation

The Azure Site Recovery can replicate the data on the Virtual machines to another environment to emulate a failover environment that can be switched to immediately. For Azure backup, it can take time to restore the backup and get an available solution in case of a disaster.

#9
Which Azure service can identify global service issues, whether or not they are in use within your account?
A

Azure Status

Azure Service Health

C

Azure Resource Health

D

Azure Monitor

Explanation

Azure Status is a global view of the health of all Azure services across all Azure regions. The status page is a good reference for incidents with widespread impact, but we strongly recommend that current Azure users leverage Azure Service Health to stay informed about Azure incidents and maintenance.

#10
Your company is being audited, and an external accountant needs access to review a blob container in the Blob service within one specific Azure storage account. You currently use Azure Active Directory to control access to the blob storage resources in question. However, you have been told you need to provide the accountant with immediate access to review the blob container in the storage account without any further information. How can you provide necessary access, but also limit it to the container in question?
A

Provide the accountant with read-only access to the specific Azure Blob container with a service-level shared access signature token to expire at the end of the business day. Specify the HTTPS protocol is required to accept requests.

Assign the accountant a guest role in Azure Active Directory with read-only access to the specific Azure Blob storage service in the Azure Storage account.

C

Provide the accountant with read-only access to the specific Azure Blob container with a user-delegation shared access signature token to expire at the end of the business day. Allow all read requests but limit write requests to LIST and GET. Specify the HTTPS protocol is required to accept requests.

D
Provide the accountant with contributor role access to the storage account using Azure AD role-based access control (RBAC).
Explanation

In this case, Azure Storage's Shared Access Signature (SAS) is the best tool to provide limited, authorized access to the necessary blob resources. Remember, SAS allows two levels of access: service-level, which limits access to one type of storage within the Azure storage account, such as Blob, Table, Queue or File storage, and account level, which provides access to all storage types in a single account. The service level also allows you to limit access to specific containers, or even specific blobs, and control the actions that can be performed on the blobs by selecting approved common permission types such as read, write, list, or process.

You cannot provide a user-delegated SAS in this case because you do not know if the accountant has Azure AD credentials, which are required for this type of SAS.

#12
What is the least complex deployment method to ensure your application remains available in the event of a data center outage?
Deploy multiple VM replicas within an availability set.
B
Deploy multiple VM replicas to separate availability zones.
C
Deploy multiple VM replicas within a scale set.
D
Deploy multiple VM replicas to separate regions.
Explanation

Availability zones are physically separate locations within a region. They are not available in all regions, but in regions where they are available, deploying VM replicas to separate regions will ensure your system will remain available in the event a data center fails.

#13
When deploying Azure Site Recovery, what do you configure to define a group of machines to failover and model dependencies within machines?
Failover Runbook
B
Orchestration Plan
C
Azure Runbook
D
Recovery Plans
Explanation

Recovery plans can be used to define groups of machines that failover together, and then start up together; model dependencies between machines; run a failover.

#16
Which of the following statements about Azure Table storage design and PartitionKey and RowKey order is correct?
A
Choose a RowKey that defines the most common sort order.
B
Choose a RowKey that defines the least common sort order.
C
Choose a PartitionKey that defines the least common sort order.
Choose a PartitionKey that defines the most common sort order.
Explanation

Queries return multiple entities in PartitionKey and RowKey order. To avoid resorting entities choose a RowKey that defines the most common sort order.

#17
Your company has implemented Azure endpoints to provide service for a single application. You want to leverage Traffic Manager to evenly distribute your clients requests. Which traffic manager mode should you use?
A
Weighted
B
Priority
Performance
D
Round Robin
Explanation
Traffic manager has three modes of operation, which are Priority, Weighted and Performance. Priority enables you to have a backup endpoint in case the primary isn’t reachable. Weighted allows you to spread load balancing across multiple endpoints. Performance allows you to direct requests based on latency.
#20
Your application requires a high number of IOPS to satisfy minimum performance thresholds. You have selected Premium disks, and are now reviewing replication options. Which replication option offers the most redundancy, based on your selection of Premium disks?
A
LRS
GRS
C
RA-GRS
D
ZRS
Explanation

For premium storage accounts the only replication option that is available is LRS. The significance of this is that you need to look for other means of replicating your data to protect for the site outage.

#21
Your company has two endpoints for a web application, one in United States and the other in Western Europe. The endpoint in United States must act as the primary endpoint, and the endpoint in Europe as the secondary. To properly execute this, which routing policy should be selected in Azure Traffic Manager?
weighted
B
performance
C
priority
D
geographic
Explanation

If you want to set up a routing policy so that different endpoints work as an active-passive failover scenario, then you can use the Priority based routing. Here you would define the US endpoint having a priority of 1 and the endpoint in Europe having a priority of 2.

#22
Which feature in Azure AD allows you to restrict access to devices and applications based on predefined rules?
Role-Based Access and Control (RBAC)
B
Multi-Factor Authentication (MFA)
C
Conditional Access
D
Azure AD Connect
Explanation

Conditional Access allows you to restrict access to devices and applications based on predefined rules.  RBAC only controls user access to resources.  MFA deals with authenticating user sign-in, and Azure AD Connect is a tool for Synchronizing On-premises Identity with Azure AD and monitoring.

#23
Which two Azure AD features are only available with the Azure AD Premium P2 edition?
Privileged Identity Management
B
Azure AD Connect Health
C
Identity Protection
Group-based access management and provisioning
Explanation

Identity Protection and Privileged Identity Management requires Azure AD Premium P2 Edition.  Azure AD Connect Health is an Azure AD Premium P1 feature while Group-based access management and provisioning is a feature enabled at the Basic tier.

#30
When using Azure Table Storage, which of the following is true about encrypting table data?
A
Merge is not supported,
Encryption is not currently supported.
C
Snapshots are not supported.
D
The EncryptProperty attribute is not supported.
Explanation

Merge is not supported because encryption may have occurred with different keys. Simply merging the new properties will result in data loss.

#33
Your organization’s marketing department has an occasional job that puts a message on an event hub queue. In turn, this triggers an Azure Function that will save the contents of the message onto a storage account. The function runs for about 4 minutes on average. What Azure Function pricing model should you select when creating the application container in which this function will reside?
A
The bundle plan
The pay as you go plan
C
The App Service plan
D
The consumption-based plan
Explanation
The Consumption Plan is very useful if your functions will only be running intermittently, and not continuously or very frequently throughout a given month. The Consumption plan is the default and offers the following benefits. One - pay only when your functions are running. Two - scale out automatically, even during periods of high load. On a Consumption plan, a function can run for a maximum of 10 minutes.
#34
You have a two-tier application hosted within VNet-01 with an IP address range of 10.0.1.0/16  and the following resource configurations: A web application front end hosted on an IaaS virtual machine named VM_Front within a public subnet with an IP address range of 10.0.2.0/24. VM_Front has a private IP address of 10.0.2.5, and a public IP address of 192.168.50.2. A web application backend hosted on a second IaaS virtual machine named VM_Back within a private subnet with an IP address range of 10.0.3.0/24. VM_Back has a private IP address of 10.0.3.4. A public-facing load balancer with a private IP address of 10.0.1.6 and a public IP address of 172.16.50.35. You are configuring a network security group (NSG) for resources in the private subnet, and want to block all traffic from the public subnet. Traffic from the public subnet that does not meet all Allow rules would then be processed by this rule. Which NSG rule parameters below would meet the requirements for this NSG rule?
A
Inbound Rule
Source: 10.0.2.0/24
Source Port: 0-65535
Destination: 10.0.3.4
Destination Port: 0-65535
Protocol: ANY
Priority: 4096
Action: Deny
Outbound Rule
Source: 10.0.2.0/24
Source Port: 0-65535
Destination: 10.0.3.4
Destination Port: 0-65535
Protocol: ANY
Priority: 20
Action: Deny
C
Inbound Rule
Source: 10.0.1.0/16
Source Port: *
Destination: 10.0.3.4
Destination Port: *
Protocol: ANY
Priority: 4096
Action: Deny
D
Outbound Rule
Source: 0.0.0.0/0
Source Port: *
Destination: 10.0.3.4
Destination Port: *
Protocol: ANY
Priority: 20
Action: Deny
Explanation

The correct NSG rule configuration is:

  • Inbound Rule
  • Source: 0.0.0.0/0
  • Source Port: *
  • Destination: 10.0.3.4
  • Destination Port: *
  • Protocol: ANY
  • Priority: 4096
  • Action: Deny
#1
Which service provides notifications about Azure services and tools you are currently using, and provides updates about planned maintenance, service deprecation, and when you approach a service's resource limits?
A

Azure Status

Azure Service Health

C

Azure Resource Health

D

Azure Policy

Explanation

Azure Service Health provides a personalized view of the health of the Azure services and regions you're using. This is the best place to look for service impacting communications about outages, planned maintenance activities, and other health advisories because the authenticated Azure Service Health experience knows which services and resources you currently use. The best way to use Service Health is to set up Service Health alerts to notify you via your preferred communication channels when service issues, planned maintenance, or other changes may affect the Azure services and regions you use.

#2
Which storage option would provide the ability to offload read access data to Azure storage from a secondary geographic location, while also providing data access in the event that one location fails?
A
Globally Redundant Storage
Read-access Geo-redundant Storage
C
Locally Redundant Storage
D
Geo-redundant Storage
Explanation

Read-access geo-redundant storage replicates your data to a second geographic location and also provides read access to your data in the secondary location. Read-access geo-redundant storage allows you to access your data from either the primary or the secondary location, in the event that one location becomes unavailable. Read-access geo-redundant storage is the default option for your storage account by default when you create it.

#4
Which Azure blob type is best for logging operations?
A
Page
B
Block
Append
D
General
Explanation

Blob storage consists of three types of blob accounts: block blobs, append blobs, and page blobs. Append blobs are optimized for append operations, in which data updates occur by adding a new block to the end. A log data entry is one such example.

#6
You have received alerts regarding several resources in a resource group named Resource-Group1. This resource group contains:Three virtual machines, VM-A, VM-B, and VM-CA virtual network named VNet-1, with subnet named Subnet-A.Reviewing the resources, you notice several recent modifications that do not comply with company security and finance requirements. You would like to know how and when the changes were made, who made them, and what processes or requests the resources have initiated since these changes were implemented. Where should you start to find this information? (Choose 2 answers)
Check the related diagnostic logs to review processes and requests the resources initiated.
Check the related activity logs to see how and when the resources were modified, and by whom.
C
Review resource manager templates to see who modified the resources, how they modified them and when.
D
Check the related boot diagnostics to see what processes and requests these resources initiated.
Explanation

The Activity Log provides insight into the operations that were performed on resources in your subscription using Resource Manager, for example, creating a virtual machine or deleting a logic app. The Activity Log is a subscription-level log. Resource-level diagnostic logs provide insight into operations that were performed within that resource itself, for example, getting a secret from a Key Vault.

Resource-level diagnostic logs provide insight into operations that were performed within that resource itself, for example, getting a secret from a Key Vault.

#8
A company has a set of Windows virtual machines hosted on the Azure platform. They need to ensure all data is encrypted at rest. Which of the following services from Azure can help fulfill this requirement?
A
Register the virtual machine with Azure Active Directory service and use OAuth for tokens to encrypt the data at rest.
Use Azure Disk Encryption along with Azure Key Vault.
C
Register the virtual machine with Azure Active Directory service and use SAML tokens to encrypt the data at rest.
D
Use a custom algorithm along with a custom built application to encrypt the data at rest.
Explanation

Azure Disk encryption can be used to encrypt the data at rest for Windows and Linux based virtual machines. This service can be used along with the Azure Key Vault which can be used to maintain the keys used for encryption purposes

#9
An Azure subscription named Subscription 1 contains three resource groups named Development, Test, and Production. Thomas, Logan, and Guy have been assigned roles via role-based access controls (RBAC) to access Subscription 1 resources.Logan can perform all read and write operations on all compute and storage resources within the Development and Test resource groups. Guy is an owner of the Development and Test resource groups. Thomas is an owner of Subscription 1.If necessary, who would be able to delete the entire Development resource group and all resources within it?
Both Guy and Thomas
B
Only Thomas
C
Only Guy
D
Both Logan and Guy
Explanation

With role-based access controls (RBAC), the permissions applied at a certain scope apply to all child resources within that scope. This means a subscription owner also has owner permissions for all resource groups and resources within the subscription.

As such, both Guy and Thomas could complete the task required in the question below.

#12
If you want to review detailed information about what incoming requests have been allowed or denied by network security groups on a per-rule basis, what Network Watcher service will best assist you?
NSG Flow Logs
B
Diagnostic Logs
C
Network Performance Monitor
D
IP Flow Verify
Explanation

Network security group (NSG) flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through an NSG.

#13
You have a two-tier application hosted within VNet-01 with an IP address range of 10.0.1.0/16  and the following resource configurations: A web application front end hosted on an IaaS virtual machine named VM_Front within a public subnet with an IP address range of 10.0.2.0/24. VM_Front has a private IP address of 10.0.2.5, and a public IP address of 192.168.50.2. A web application backend hosted on a second IaaS virtual machine named VM_Back within a private subnet with an IP address range of 10.0.3.0/24. VM_Back has a private IP address of 10.0.3.4. A public-facing load balancer with a private IP address of 10.0.1.6 and a public IP address of 172.16.50.35. You are configuring the network security group for VM_Front, and want it to receive encrypted HTTP traffic from the load balancer, and want this to be one of the first rules the NSG processes against all incoming traffic. How would you configure a rule to allow this? 
Inbound Rule

Source: 10.0.1.6

Source Port: *

Destination: 10.0.2.5

Destination Port: 443

Protocol: TCP

Priority: 100

Action: Allow
B
Inbound Rule

Source: 10.0.2.5

Source Port: 80

Destination: 172.16.50.35

Destination Port: *

Protocol: UDP

Priority: 100

Action: Allow
C
Inbound Rule

Source: 10.0.1.6

Source Port: *

Destination: 10.0.3.4

Destination Port: 8080

Protocol: TCP

Priority 5000

Action: Allow
D
Inbound Rule

Source: 10.0.2.5

Source Port: *

Destination: 10.0.3.4

Destination Port: 443

Protocol: HTTPS

Priority: 9999

Action: Allow
Explanation

The correct rule parameters are:

  • Inbound Rule
  • Source: 10.0.1.6
  • Source Port: *
  • Destination: 10.0.2.5
  • Destination Port: 443
  • Protocol: TCP
  • Priority 100
  • Action: Allow
#14
You are creating a VNet to VNet connection using a virtual network gateway. What step below is not required for this configuration?
A
Create gateway subnets in each VNet.
B
Assign public IP addresses for each virtual network gateway.
Select 'Allow VNet access' when configuring your virtual network gateway.
D
Create a shared encryption key.
Explanation

Each of these steps is required for a VNet-to-VNet connection via virtual network gateway except enabling "Allow VNet access," which is required for VNet peering configurations.

#16
Before you deploy a new application to its production environment, you need to integrate a monitoring solution that sends messages to the development team's mobile devices. The key requirements for this messaging solution are: It can be deployed with minimal customization or administration required.It can deliver messages to mobile devices running Android and iOS operating systems.Which Azure solution is optimal for this scenario?
A
Azure Service Bus
B
Azure Event Hub
Azure Notification Hub
D
Azure Event Grid
Explanation
This is where Azure Notification Hubs and IoT Edge come in. The former is a ready-made smart device notification solution. Need to send push notifications to iPhones, Android phones, or tablets? Notification Hubs is your answer. The great thing about it is that it takes away a lot of the pain involved in supporting a variety of mobile devices. If you have experience as a mobile developer, then you’ll know what I am talking about. Unlike other forms of messaging, push notifications often have tricky platform-dependent logic. Scaling, managing tokens, and routing messages to different segments of users on different hardware and different versions of Android is non-trivial work for even an experienced tech team.

Notification Hub takes away most of that pain. It lets you broadcast to all platforms with a single interface. It can work both in the cloud or on-premises and includes security features like SAS, shared access secrets, and federated authentication. See the “How To” guide link for more details. 

#19
Your organization has Azure Functions that use HTTP triggering. What is the suggested method to test these functions?
A
Create a lab to mimic the production environment

Code and test the functions locally

C
Implement proxy support, to keep a static proxy URL and redirect as needed to different function URLs as you test multiple versions
D
Develop a .NET function app on your local machine and then upload the compiled binary to the Azure function service once you've tested it outside the cloud
Explanation

Testing can be tricky. The first place to go for function testing is of course the Azure portal itself. Functions that use manual or HTTP triggering are good candidates for ad hoc manual testing using the tools in the portal. If you prefer, for HTTP triggered functions you can also use external tools like Postman or Fiddler to send the HTTP request to your function URLs.

#20
Your IT landscape in Azure consists of both Linux and Windows virtual machines. You configured consistent backup of Windows VMs with Azure Backup using Volume Shadow Copy Service (VSS). Now you want to configure application consistent backup on the Azure Linux virtual machines. What statement below about Azure Backup on Linux virtual machines is correct?
A
Linux has built in VSS that Azure Backup agent can utilize.
B
Linux does not require any additional configuration since backup is done transparently for the application.
Using Azure Backup on Linux requires custom pre- and post-scripts to complete application consistent backup.
D
Azure Backup provides scripts for open source operating systems like Linux.
Explanation

Azure Backup relies on the framework which can execute pre and post which will ensure that the application is consistent during every backup.

#21
A hospital recently installed an on-premise patient registration application that operates on sensitive data stored in an Azure SQL database hosted in a virtual machine on Microsoft Azure. The hospital uses the Always Encrypted (AE) feature and stores Always Encrypted keys in a trusted key store hosted on-premise. The hospital’s Vice President is concerned that Azure cloud administrators can gain access to the sensitive data and potential HIPPA violations. How can the AE feature reduce the Vice President’s concerns?
A
AE uses data masking to protect the data stored in the cloud to prevent unintentional access.
B
AE provides column-level encryption or cell-level encryption to protect the sensitive patient data.
C
AE uses a tailored security communication protocol between Azure clients and the database engine.
AE provides a separation between those who own the data and those who manage the data.
Explanation
Always Encrypted (AE) is a feature designed to protect sensitive data (credit card numbers or social security numbers) stored in Azure SQL Databases. AE allows clients to encrypt sensitive data inside client applications and never reveal the encryption keys to the Database Engine (SQL Database or SQL Server). Thus, Always Encrypted provides a separation between those who own the data and can view it (the hospital), and those who manage the data but should have no access (Microsoft cloud administrators) as desired in this hospital case.
#22
Within Azure App Service, you want to modify a continuous webjob so that it will process on a single instance, not multiple instances.How and where can you complete this modification within the WebJob?
A
Update the singleton attribute within the webjob-publish-settings.json file.
Create a settings.job file with the singleton attribute code in the root of the job's .zip file
C
Create a custom webjobs-list.json file that assigns the webjob to a specific VM via the singleton attribute parameter.
D
In the Azure Portal, assign the scope of the webjob to a specific VM.
Explanation

If you find yourself in a situation where you need to run a WebJob on a single instance, instead of all instances, you can create a file called settings.job that contains the line you see on your screen.

{ "is_singleton": true }

After adding the line you see on your screen to the settings.job file, save the file to the root folder for the continuous WebJob. What this will do is get your WebJob running as a single instance despite being installed on multiple instances.

#24
When using Azure Resource Manager (ARM) templates, how does Resource Manager handle existing resources in the resource group that are not in the template for new deployment using the 'Complete' update deployment mode?
A
Resource Manager leaves unchanged resources that exist in the resource group but are not specified in the template.
Resource Manager deletes resources that exist in the resource group but are not specified in the template.
C
Resource Manager reconciles resources that exist in the resource group but are not specified in the template.
D
Resource Manager duplicates resources that exist in the resource group but are not specified in the template.
Explanation
When deploying your resources, you specify that the deployment is either an incremental update or a complete update. The primary difference between these two modes is how Resource Manager handles existing resources in the resource group that are not in the template. In complete mode, Resource Manager deletes resources that exist in the resource group but are not specified in the template. In incremental mode, Resource Manager leaves unchanged resources that exist in the resource group but are not specified in the template.
#25
Which Azure management service can provide the status of specific instances, as well as a log of recent platform events?
A

Azure Status

B

Azure Service Health

Azure Resource Health

D

Azure Security Center

Explanation

Azure Resource Health helps you diagnose and get support when an Azure service problem affects your resources. It informs you about the current and past health of your resources. And it provides technical support to help you mitigate problems.

#26
Using Traffic Manager, which of the following traffic routing methods directs users to specific endpoints based on specific location of their DNS query?
A
Priority
B
Weighted
C
Performance
Geographic
Explanation

The Geographic Traffic Manager routing method allows users to be directed to specific endpoints (Azure, External or Nested) based on which geographic location from which their DNS query originates.

#28
You have had to troubleshoot several issues related to network interfaces, and spent a great deal of time completing this task. Which service within Azure Network Watcher allows you to review recent activity to check for issues with network interfaces more quickly? 
Diagnostic Logs
B
NSG Flow Logs
C
Next Hop
D
Connection Monitor
Explanation
 The Diagnostic logs capability provides a single interface to enable and disable network resource diagnostic logs for any existing network resource that generates a diagnostic log. You can view diagnostic logs using tools such as Microsoft Power BI and Azure Log Analytics.
#29
You suspect hackers and bots have been attacking your application's network. What Azure Network Watcher network monitoring or analysis tool would best fit your needs?
A
Connection Monitor
B
Network Performance Monitor
C
Security Group View
Traffic Analytics
Explanation

Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. Traffic analytics analyzes Network Watcher network security group (NSG) flow logs to provide insights into traffic flow in your Azure cloud.

#30
When comparing network security options, which of the following actions can Azure Firewall perform that a network security group cannot?
A

Allow or deny inbound and outbound traffic to or from specific IP addresses

B

Allow or deny inbound and outbound traffic to or from IP address ranges

Allow or deny inbound traffic to or from specific domain names

D

Control traffic in and out of an entire virtual network

Explanation

Network security groups, or NSGs for short, are an Azure firewall technology that implements a stateful packet inspection with some simple inbound and outbound rules to deny or allow connections, based on a few properties. These include the source IP address and port, the destine IP address and port, and the protocol, whether it's TCP or UDP. The source IPs and destination IPs can either be individual IPs, or they can be ranges of IPs. You can attach a network security group to a virtual network, or to a NIC card, a network interface card.

The advantage of using Azure Firewall is that it’s more feature-rich. For example, you can tell it to allow outbound traffic only to certain domain names. NSGs can’t do that. They only allow you to specify IP addresses, not entire domains. An Azure Firewall is centralized, so it works across virtual networks and even across subscriptions.

#31
Your company has an application where users upload images and they're processed with different filters. The app is currently on-premises and you must design a solution in Azure. The solution should minimize management effort, it should allow for deployments to be promoted, and the image processing code should run as a separate process from the web application. Which option is best?
WebJobs
B
IaaS VMs
C
Azure HPC
D
Azure HDInsight
Explanation

WebJobs is a feature of Azure App Service that enables you to run a program or script in the same context as a web app, API app, or mobile app, but as a separate process. And using App Services will minimize management, and web apps support deployment slots, allowing for deployment promotion.

#33
You are looking for cost savings in your Azure compute resources, and have identified a default VM scale set running daily batch processes during non-business hours is a fairly large expense. These batch processes are not mission-critical to your daily operation, and occasional interruptions will not have any consequence on the business.What cost-saving method could you implement?
A
Replacing the existing VM scale set with Reserved VMs
B
Replacing the existing VM scale set with Azure Functions
C
Replacing the existing VM scale set with Azure App Service
Replacing the existing VM scale set with 'Low Priority' VM scale set
Explanation

Low-priority VMs are cheaper, but can be terminated at any time by Azure. They are ideal for this type of use case, but not to support applications that must persist reliably and be highly available.

#34
A company currently has an on-premise environment using Active Directory as its identity store. It plans to extend its presence to the Azure cloud. The company wants to ensure that employees can access on-premise and Azure resources using a single password, and also wants to enforce current on-premise Active Directory policies in the Azure cloud, without purchasing additional licenses or configuring additional on-premise servers. What choice below meets these requirements?
A
Use Powershell to sync the passwords for the on-premise Active Directory and Azure Active Directory.
B

Use Azure AD Connect's password hash synchronization (PHS).

Use Azure AD Connect's pass-through authentication.
D
Use Azure Directory Federated Services.
Explanation

Azure Active Directory (Azure AD) Pass-through Authentication allows your users to sign in to both on-premises and cloud-based applications using the same passwords. This feature provides your users a better experience - one less password to remember, and reduces IT helpdesk costs because your users are less likely to forget how to sign in. When users sign in using Azure AD, this feature validates users' passwords directly against your on-premises Active Directory.

This feature is an alternative to Azure AD Password Hash Synchronization, which provides the same benefit of cloud authentication to organizations. However, certain organizations wanting to enforce their on-premises Active Directory security and password policies, can choose to use Pass-through Authentication instead.

#36
A company is planning to use Azure Site Recovery to replicate VMware virtual machines to Azure. But there is a concern that the replication might not work. Which of the following is a case when virtual machines cannot be replicated using Azure Site Recovery?
The virtual machine has encrypted disks which cannot be replicated.
B
The OS disk on the Virtual Machine is a basic disk.
C
Storage and network accounts must be in the same region as the vault.
D
The host name of the Virtual Machine is 15 characters.
Explanation
The following is true for VMWare Virtual Machines being replicated using the Azure Site Recovery service

  1. The OS disk should be basic, and not dynamic. The data disk can be dynamic.
  2. One can't replicate virtual machines with encrypted disks, or virtual machines with UEFI/EFI boot.
  3. Storage and network accounts must be in the same region as the vault
  4. The host name should be 15 characters or less
#37
You are fixing an AttributeValueMustBeUnique error in Azure AD. Which of the following tools can help you identify the duplicate values that are causing the error?
Azure AD Connect Health for sync
B
Azure AD Application Insights
C
Kudu
D
Azure AD Connect Health Report
Explanation

Azure AD Connect Health for sync can generate a report that will help identify the duplicates.

#38
Which Azure App Service app type is used for automating business processes and integrating systems and data across clouds without writing code?
A
Mobile Apps
B
Web Apps
Logic Apps
D
API Apps
Explanation

Azure App Service consists of several app types: Web Apps, Mobile Apps, API Apps and Logic Apps. If you need to automate business processes, select the Logic Apps type.

#3
A company has a set of services hosted on Azure virtual machines. They want to achieve the following objectives for their set of services: A proper disaster recovery strategyA shorter Recovery time objective Which of the following Azure services should they use?
Azure Backup
B
Azure Site Recovery
C
A new Virtual machine with the right storage options to store the backup data.
D
A new cluster of virtual machines with the right storage options to store the backup data.
Explanation

The Azure Site Recovery can replicate the data on the Virtual machines to another environment to emulate a failover environment that can be switched to immediately. For Azure backup, it can take time to restore the backup and get an available solution in case of a disaster.

#5
Your company recently enabled Fraud Alerts with Azure MFA. Members of your staff are now unable to sign-in to their user accounts because several fraud alerts have been filed. What actions will best resolve the issue, and allow affected users to sign in? (Select 2 answers)
A
Sign in as a user with the Azure Active Directory administrator role.
B
Sign in as a user with the Designated Approver role.
Unblock all affected accounts with a specified reason for the unblock request.
Use the MFA bypass option to allow users to sign in until the default block expires.
Explanation

When fraud alerts are enabled in Azure MFA, Azure blocks access to any user accounts involved in any reported fraud alert. Administrators can unblock the account with a specific reason for the unblock request, but cannot unblock multiple accounts programmatically and then prevent accounts from being blocked in the future.

The designated approver role is related to role elevation requests within the scope of the Privileged Identity Management feature of Azure Active Directory, and would have no authorization to unblock accounts in the event of a fraud alert.

#7
Your expenses have increased as you've expanded international operations. It is critical to sort expenses for Azure resources deployed for specific international markets by the product, resource type, and global region. What Azure service or tool should you use to organize your expense reports?
A

Azure Advisor

Azure Cost Management tool

C

Azure Price Calculator

D

Azure Resource Tags

Explanation

Another way to track Azure costs is by using tags. Tags can be applied to Azure resources as a means of grouping them for things like cost tracking. Tags can be applied based on department, project, environment, or any other purpose.  

Each tag is a name/value pair where the name defines the type, or category of tag, and the value identifies a specific instance of that type. For example, a tag name could be a department, and values could then be IT and Development. 

#10
You have a large amount of data within a table in Azure Table Storage, and are primarily interested in specific column data. While querying the table with Azure Powershell, you need to minimize the data searched within a query as well as the query result size as much as possible, due to cost restraints. Which Powershell query will return useful results and meet your cost requirements?
A

$Query.SelectColumns = $Columns

B

$Query.FilterString = $Columns

C

$Query.FilterTable = $Columns

$Query.SelectColumns = $list

Explanation

Using the SelectColumns query property is especially useful when dealing with large entities. If you don't require all of the entity data this can be a significant bandwidth savings. The PartitionKey, RowKey, and Timestamp are always returned, regardless of the selected columns.

#11
When configuring Azure Firewall, which type of rule is specific to Azure Firewall and allows it to access fully qualified domain names from a subnet?
A

Application rules

B

Network rules

C

Network Security Group rules

Application Security Group rules

Explanation

Azure Firewall supports rules and rule collections. A rule collection is a set of rules that share the same order and priority. Rule collections are executed in order of their priority. Network rule collections are higher priority than application rule collections, and all rules are terminating.

There are three types of rule collections:

Application rules: Configure fully qualified domain names (FQDNs) that can be accessed from a subnet.
Network rules: Configure rules that contain source addresses, protocols, destination ports, and destination addresses.
NAT rules: Configure DNAT rules to allow incoming connections.

#15
A company is planning to use the Azure Backup service. They have the requirement of storing backups to both disk storage and tape storage. Which Azure Backup service should they use?
A
Azure Backup agent
B
System Center Data Protection Manager
Azure Backup Server
D
Azure IaaS Virtual Machine Backup
Explanation

The System Center Data Protection Manager helps in business continuity and disaster recovery. It can store backup data to:

Disk - For short-term storage Data Protection Manager backs up data to disk pools.

Azure - For both short-term and long-term storage off-premises, Data Protection Manager data stored in disk pools can be backed up to the Microsoft Azure cloud using the Azure Backup service.

Tape - For long-term storage you can back up data to tape, which can then be stored offsite.

#18
Azure Cosmos DB offers multiple regional configurations that respond differently in the event of a regional outage. In which configuration would you enable failover in the event of a regional outage?
A

Single Region

B

Single Region with Availability Zones

C

Multi-region with a single-write region

Multi-region with multiple write regions

Explanation

If your Cosmos DB database has a multi-region configuration with a single-write region, and that write region experiences a regional outage, enabling failover to a secondary region to then serve as the primary would minimize the damage. Enabling failover would not be possible in either single region configuration, and would not be necessary in a multi-region configuration with multiple write regions.

#23
As a feature of Azure Active Directory, Identity Protection offers each of the following capabilities except which one?

Reporting to help remove/reduce security risks

B

Automated detection of compromised user IDs

C

Enforce multi-factor authentication policy

D

Enable "just-in-time" role assignments

Explanation

Identity Protection allows you to enforce MFA policy, automate detection of potentially compromised user credentials, and can create reports to help you identify and remove or mitigate security risks. However, identity project does not include 'just-in-time' role assignments. This is a feature of privileged identity management, a separate service offered through Azure Active Directory.

#27
Which of the following resources is a standalone authentication resource that integrates with an existing Azure AD tenant, and can be assigned to multiple Azure resources?
A

System-assigned Managed Identity

B

User-Assigned Managed Identity

Shared Access Signature
D
Bitlock Encryption Key (BEK)
Explanation

A user-assigned managed Identity is a managed identity type that is a standalone resource that can be used with multiple resources, and is independent of any resource lifecycle.

#32
Of the listed configuration settings on an Azure Web App, which is not swapped when a deployment slot is swapped?
A
App Settings
B
Custom Domain Names
Connection Strings
D
Webjobs Content
Explanation

When you clone configuration from another deployment slot, the cloned configuration is editable. Furthermore, some configuration elements will follow the content across a swap (not slot specific) while other configuration elements will stay in the same slot after a swap (slot specific). The following lists show the configuration that will change when you swap slots -

  • General settings - such as framework version, 32/64-bit, Web sockets
  • App settings (can be configured to stick to a slot)
  • Connection strings (can be configured to stick to a slot)
  • Handler mappings
  • Monitoring and diagnostic settings
  • WebJobs content
#35
You have created a microservices application, but before you launch, you must implement a solution to protect your application's APIs while allowing customers to access your application. How can you accomplish this?
A
Use Azure API Management
B
Use an Azure App Service API apps
Allow access to your application through Azure AD B2C
D
Allow access to your application through Azure AD managed identities
Explanation

This service makes it easy to provide APIs that can be used by both internal developers and external partners and customers. It acts as a gateway between clients and your backend microservices. Not only does it provide an easily accessible front-end to your application, but it also handles important management tasks, such as security, monitoring, analytics, and rate limiting.

It’s easy to add an existing API to the API Management service. You only need to supply a few details, such as its name and URL. Then you can secure it and manage it. 

#39
There are three types of factors used to authenticate a user request via multi-factor authentication within Azure Active Directory. Which of the following is not one of those types?
A
Knowledge factor
B
Possession factor

Inheritance factor

D
Identity factor
Explanation

There are three types of factors used to authenticate a user request via multi-factor authentication (MFA):

  • A knowledge factor - something the user knows.
  • A possession factor - something the user owns, such as an email address or mobile device.
  • An inheritance factor - something that confirms identity via a physical characteristic, such as a fingerprint or other biometric.
#40
You need to back up a VM using Azure Backup immediately, so you need to create a Recovery Service Vault. The general steps are listed below, in no particular order.Assign a backup policy to the VMConfigure replication redundancy level.Manually initiate the first backup.Assign a resource group and location.Configure the backup policy.Which answer numerically lists the steps to back up a virtual machine in the correct order?
A
4-2-5-1-3
B
4-5-1-2-3
C
2-5-1-4-3
5-1-2-4-3
Explanation

The correct order of execution is:

  1. Assign a resource group and location.
  2. Configure replication redundancy level.
  3. Configure the backup policy.
  4. Assign a backup policy to the VM.
  5. Manually initiate the first backup.
#17
Which of the Azure Cosmos DB API programming models should a Data Engineer choose if they want to store data JSON document format in a non-relational database? (Choose 2 answers)
A

Table API

B

Graph API

C

SQL API

D

Mongo API

Explanation

Both Mongo API and SQL API in Cosmos DB allow you to store JSON documents in a non-relational database. SQL API is a bit tricky of a misnomer because it is a non-relational database. It is called SQL API because it allows you to query JSON documents in a SQL-like language.

 #2

You want to connect the Azure VNets for three separate branch offices. You are designing a hub and spoke model network topology to do this. The central hub will serve as a firewall between the different locations during backend communication, and also a central location for disaster recovery backup storage. Now you are considering whether to connect your hub-and-spoke model with VNet peering connections or virtual network gateways. Each option has its own benefits. Which statements comparing VNet peering and virtual network gateways in a hub-and-spoke model are correct? (Choose 2 answers)

If you implement the model with virtual network gateways, all VNets must be in the same region. If you implement the model with VNet peering connections, the VNets can be within different regions.

Whether the connections are made with virtual network gateways or VNet peering connections, the VNets can be within different Azure subscriptions and associated with separate Azure AD tenants. 

C

If you implement the model with virtual network gateways, all VNets can be in different regions. If you implement the model with VNet peering connections, the VNets must be within the same region.

D

If you implement the model with virtual network gateways, the VNets can be within different Azure subscriptions that are associated with the same Azure tenant. If you implement the VNets with VNet peering connections, the VNets can be within different Azure subscriptions and associated with separate Azure AD tenants.

Explanation

You could accomplish this network topology using VNet peering or virtual network gateways (VNG), but each option has its requirements and limitations. 

  1. Connecting via VNet peering would require a router to be deployed in the central hub VNet, but this is not required for VNG connections.
  2. VNet peering works both across separate tenants and subscriptions.
  3. Hostname resolution is not possible for VMs connecting from different VNets through a peering connection. Azure DNS is required for these VMs to connect. However, name resolution is possible through a VNG connection.
  4. This type of network topology cannot span regions. All VNets must be in the same region.
#5
Your organization requires that a set of columns should only be available to be read by a small select set of users.  Other users should see an obfuscated value. How can this be implemented in an Azure SQL Database?
A

Encrypt the columns using a symmetric encryption key

B

Use row-level security (RLS)

Use dynamic data masking (DDM)

D

Use transparent data encryption

Explanation

The Azure SQL Database option to obfuscate data is to use dynamic data masking (DDM).  Symmetric encryption would not obfuscate the data for some users, it would encrypt for all.  The row-level security determines row to be shown not columns. Always encrypted would encrypt the data throughout the system, and transparent data encryption (TDE) would encrypt data at rest but would deliver in plain text to the end user.

#6
The types of failovers that are supported with Microsoft Azure Site Recovery depend on your deployment scenario. If you are doing a failover from Physical server to Azure, which failover type is supported?
A
Test Failover
Planned Failover
C
Unplanned failover
D
Not supported
Explanation

The types of failovers that are supported depend on your deployment scenario.

Physical server to Azure:

Test failover: Unsupported
Planned failover: This scenario uses continuous replication so there's no distinction between planned and unplanned failover. You select Failover
Unplanned failover: NA

#7
Your company has a formal process for sending shared access signatures (SAS) to verified third parties, but is concerned that the SAS tokens could be obtained by an unintended or malicious user. You are considering additional security options to integrate into your SAS process, such as stored access policies. Consider the security options available with shared access signatures. What additional security option is available with stored access policies, and is not possible with shared access signatures alone?
A

Limiting access to a specific IP address or address range

B

Specifying when access via SAS token starts and ends

C

Limiting access to specific Azure storage containers or objects

Modifying existing SAS token permissions

Explanation

Shared access signatures allow you to:

  1. Define the scope of access - account level (multiple Azure Storage services like queue, blob, etc) or resource level (limited to service, container, or blob)
  2. Define allowed actions (read, write, and delete, for example)
  3. Specify start and expiration time
  4. Specify approved IP address or address range that may use the URI
  5. Set approved protocols: HTTP or HTTPS

Stored Access Policies allow you to:

  1. Set at container level
  2. Modify start and expiration time
  3. Revoke a SAS token after it is issued
  4. Modify existing SAS permissions
     
#8
With a web application deployed to Azure Web Apps, a company wants to start deploying rolling updates, but at the same time, they want to test the updates on the Azure environment before promoting the app to production. Which of the approaches below would help fulfill their requirements?
A
Create a virtual machine and re-create the web application there. Deploy the updates, test the application and then deploy it to production.
B
Create an on-premise virtual machine and re-create the web application there. Deploy the updates, test the application and then deploy it to production.
Create a deployment slot, configure the app on this slot. Test the app, then swap the slots.
D
Create a separate web app, then deploy and test it. Then deploy the web app with the updates to production site using Visual Studio.
Explanation

The Web Apps service in Azure App Service allows you to create deployment slots to have a separate staging environment for testing updates before they get rolled out to production. The deployment slot creates a new environment which can then be swapped with the production environment after all testing is complete.

#10
Which two Azure AD features are only available with the Azure AD Premium P2 edition?
Privileged Identity Management
B
Azure AD Connect Health
Identity Protection
D
Group-based access management and provisioning
Explanation

Identity Protection and Privileged Identity Management requires Azure AD Premium P2 Edition.  Azure AD Connect Health is an Azure AD Premium P1 feature while Group-based access management and provisioning is a feature enabled at the Basic tier.

#11
Which feature in Azure AD allows you to restrict access to devices and applications based on predefined rules?
A
Role-Based Access and Control (RBAC)
B
Multi-Factor Authentication (MFA)
Conditional Access
D
Azure AD Connect
Explanation

Conditional Access allows you to restrict access to devices and applications based on predefined rules.  RBAC only controls user access to resources.  MFA deals with authenticating user sign-in, and Azure AD Connect is a tool for Synchronizing On-premises Identity with Azure AD and monitoring.

#12
You have a two-tier application hosted within VNet-01 with an IP address range of 10.0.1.0/16  and the following resource configurations: A web application front end hosted on an IaaS virtual machine named VM_Front within a public subnet with an IP address range of 10.0.2.0/24. VM_Front has a private IP address of 10.0.2.5, and a public IP address of 192.168.50.2. A web application backend hosted on a second IaaS virtual machine named VM_Back within a private subnet with an IP address range of 10.0.3.0/24. VM_Back has a private IP address of 10.0.3.4. A public-facing load balancer with a private IP address of 10.0.1.6 and a public IP address of 172.16.50.35. You are configuring a network security group (NSG) for resources in the private subnet, and want to block all traffic from the public subnet. Traffic from the public subnet that does not meet all Allow rules would then be processed by this rule. Which NSG rule parameters below would meet the requirements for this NSG rule?
Inbound Rule
Source: 10.0.2.0/24
Source Port: 0-65535
Destination: 10.0.3.4
Destination Port: 0-65535
Protocol: ANY
Priority: 4096
Action: Deny
B
Outbound Rule
Source: 10.0.2.0/24
Source Port: 0-65535
Destination: 10.0.3.4
Destination Port: 0-65535
Protocol: ANY
Priority: 20
Action: Deny
C
Inbound Rule
Source: 10.0.1.0/16
Source Port: *
Destination: 10.0.3.4
Destination Port: *
Protocol: ANY
Priority: 4096
Action: Deny
D
Outbound Rule
Source: 0.0.0.0/0
Source Port: *
Destination: 10.0.3.4
Destination Port: *
Protocol: ANY
Priority: 20
Action: Deny
Explanation

The correct NSG rule configuration is:

  • Inbound Rule
  • Source: 0.0.0.0/0
  • Source Port: *
  • Destination: 10.0.3.4
  • Destination Port: *
  • Protocol: ANY
  • Priority: 4096
  • Action: Deny
#13
Your company has implemented Azure endpoints to provide service for a single application. You want to leverage Traffic Manager to evenly distribute your clients requests. Which traffic manager mode should you use?
Weighted
B
Priority
C
Performance
D
Round Robin
Explanation
Traffic manager has three modes of operation, which are Priority, Weighted and Performance. Priority enables you to have a backup endpoint in case the primary isn’t reachable. Weighted allows you to spread load balancing across multiple endpoints. Performance allows you to direct requests based on latency.
#14
Your application requires a high number of IOPS to satisfy minimum performance thresholds. You have selected Premium disks, and are now reviewing replication options. Which replication option offers the most redundancy, based on your selection of Premium disks?
LRS
B
GRS
C
RA-GRS
D
ZRS
Explanation

For premium storage accounts the only replication option that is available is LRS. The significance of this is that you need to look for other means of replicating your data to protect for the site outage.

#15
You are configuring the subnet for an Azure Firewall deployment. Which subnet mask is recommended to support Azure Firewall scaling requirements?

/26

B

/24

C

/28

D

/22

Explanation

Azure Firewall must provision more virtual machine instances as it scales. A /26 address space ensures that the firewall has enough IP addresses available to accommodate the scaling.

#16
Which Azure blob type is optimized for streaming and storing cloud objects?
A
Page
Block
C
Append
D
General
Explanation

Blob storage consists of three types of blob accounts: block blobs, append blobs, and page blobs. Block blobs are optimized for streaming and storing cloud objects such as documents, media files, and backups.

#17
You have deployed two separate application replicas to different regions. The primary replica receives a majority of customer traffic, and a secondary replica also handles requests for distant customers, to reduce the service latency for their requests. Which multi-region design did you deploy?
Active-active with geo-location request routing
B

Active-passive with a hot standby

C

Active-passive with a cold standby

D
Active-passive with geo-location request rolling
Explanation

When it comes to multi-region deployments, there are different options for how you might configure things depending on your availability requirements and your budget.

If you need an extremely high level of availability, then you can use an active/passive model with hot standby. With this approach, you have another version of your solution running in a second region, and it doesn't serve up any traffic unless there's a failure in the primary region.

A variation on that is the active/active model with geo-location based request routing. This is similar to the previous option, but the solution that's running in the second region is actively serving up requests to the users who are closer to that region than the primary.

Then there's the active/passive model with cold standby, which means that there's not a solution running in a second region. Instead, it's dynamically created when the first region is unavailable. This is a great option if you want to balance the cost versus the SLA. The switchover is not going to be immediate, but with a well-defined automation plan, this is a viable option.

#18
You need to create Azure resource templates to automate the deployment of resources. At the same time, you need to ensure that anyone can differentiate between resources created for development or production. Which of the below template features can help people identify the purpose of deployed resources in this way?
tags
B
resources
C
$schema
D
contentversion
Explanation

Tags can be used in templates to differentiate resources. For example, you can add a tag with a name of “Environment.” You can then assign values of “Production” to production-based instances and “Development” to development-based instances

#19
Which Azure service can identify global service issues, whether or not they are in use within your account?

Azure Status

B

Azure Service Health

C

Azure Resource Health

D

Azure Monitor

Explanation

Azure Status is a global view of the health of all Azure services across all Azure regions. The status page is a good reference for incidents with widespread impact, but we strongly recommend that current Azure users leverage Azure Service Health to stay informed about Azure incidents and maintenance.

#20
Your company is being audited, and an external accountant needs access to review and download specific files from the blob storage and file storage services within one specific Azure storage account. You currently use Azure Active Directory to control access to the Azure storage account in question. However, you have been told you need to provide the accountant with immediate access to the blob and file storage account without any further information. How can you provide necessary access, but also limit it to the blobs in question?
A

Provide the accountant with read-only access to the specific Azure Blob and File storage services with a service-level shared access signature token. Allow all read requests but limit write requests to LIST and GET. Specify the HTTPS protocol is required to accept requests.

B

Assign the accountant a guest role in Azure Active Directory with read-only access to the specific Azure Blob and File services in the Azure Storage account.

C

Assign the accountant a contributor role access to the entire storage account using Azure AD role-based access control (RBAC).

Provide the accountant with read-only access to the specific Azure Blob and File storage services with an account-level shared access signature token. Allow all read requests but limit write requests to LIST and GET. Specify the HTTPS protocol is required to accept requests.

Explanation

In this case, an account-level SAS is required because the accountant needs access to two separate services in the account. You do not have the necessary information to create a guest or contributor account to control the accountant's access, but you can add controls to require requests are sent via an HTTPS protocol, and also control the specific read/write actions.

#21
Your company would like to enable Azure MFA within its Azure Active Directory tenants. The company includes an office of roughly 300 employees, with many employees working from home periodically throughout the week. Sales representatives who travel most of the year require remote access to applications in demonstration environments hosted on Azure. The company's requirements are: Minimal administrative overhead in MFA setup and management All employees must register for MFA All employees must complete MFA when logging into their user accounts remotely, but not when in the office. Without considering the necessary Azure Active Directory licenses, what choice best accomplishes these requirements?

Enable Azure AD Identity Protection. Configure an Azure MFA registration policy requiring all users to register and enable MFA. Configure all office IP addresses as trusted IP addresses that can skip MFA.

B
Enable Azure MFA for all employees via the Azure Portal. Configure an Azure MFA registration policy requiring all users to register and enable MFA. Configure all office IP addresses as managed IP addresses which can skip MFA.
C
Enable Azure AD Identity Protection. Configure an Azure MFA registration policy requiring all users to register and enable MFA. Configure an Azure MFA risk-based conditional access policy requiring users accessing Azure resources remotely to complete MFA for all logins.
D
Enable Azure AD Identity Protection. Configure an Azure MFA registration policy requiring all users to register and enable MFA. Configure an MFA bypass option for all employees when they log in through an office IP address.
Explanation

With Azure Active Directory's Identity Protection service, you can set up registration policies that enforce your MFA requirements for all directory users. You can also setup all office IP addresses as federated (not managed) Trusted IP addresses, which will not require MFA, or administrative updates as your office IP addresses change.

#22
Your organization wants to monitor hybrid scenarios and gain insights into your on-premises identity infrastructure and synchronization services all from Azure. What Azure Active Directory (Azure AD) tool does Microsoft recommend for this scenario?
A
Trusted Advisor
B
Trust Manager
C
Infrastructure Event Manager
Azure AD Connect Health
Explanation
Azure AD Connect Health helps you monitor and gain insights into your on-premises identity infrastructure and the synchronization services. It enables you to maintain a reliable connection to Office 365 and Microsoft Online Services by providing monitoring capabilities for your key identity components such as Active Directory Federation Services (AD FS) servers, Azure AD Connect servers (also known as Sync Engine), Active Directory domain controllers, etc. It also makes the key data points about these components easily accessible so that you can get usage and other important insights to make informed decisions.
#24
Which Microsoft Azure Site Recovery (ASR) component is responsible for the replication during a failback from Azure?
Master target server
B
Process Server
C
Configuration Server
D
Management Server
Explanation

The master target server is installed on-premise and handles replication data during failback from Azure. The management server you created on-premises has a master target server installed by default. However, depending on the volume of failed back traffic you might need to create a separate master target server for failback.

#25
Your firm is utilizing Azure Virtual Machine (VM) technology. Performance, as well as backup and recovery are a critical aspects of the firm’s IT strategy and governance policies. With that in mind, the firm is using managed disks with premium storage, and the Azure Backup service. What storage replication option should your firm be implementing?
Locally redundant storage (LRS)
B
Zone-redundant storage (ZRS)
C
Geo-redundant storage (GRS)
D
Read-access geo-redundant (RA-GRS)
Explanation
A Managed Disk is a service that Azure provides which alleviates the work of you having to manage storage accounts. Azure will manage your disks and provide all the redundancy and replication options for you in the background. You just choose the Storage type, Standard or Premium, and choose any option from these two tiers. Managed disks integrate very well with other Azure services as well such as the Azure Backup service. This is important since managed disks can only be use with the LRS storage option and so for disaster recovery you want to use managed disks with the Azure Backup service. In this case, managed disk cost is an acceptable tradeoff to incur.
#26
You manage IT for an office of 300 employees, as well as 20-30 employees who work remotely. All employees are registered within the company's Azure Active Directory tenant. The remote employees access Azure from external IP addresses outside of the office intranet. You would like all employees, whether they work in the office or remotely, to be able to skip MFA when they log in on their assigned company devices. Assuming your office would take all the necessary steps to configure the solution properly, in the end you want to set up all office employees who sign in through Azure Active Directory as federated users, and managed Trusted IP addresses for your remote employees' specific IP addresses.  Would this approach allow all employees to skip the MFA when logging in on their assigned devices?
No, only office employees would be able to log in without completing MFA in this scenario.
B
No, neither office employees would be able to log in without completing MFA in this scenario.
C
Yes, all employees would be able to log in without completing MFA in this scenario.
D
Yes, but with conditions. Remote employees' Trusted IP address would need to be updated frequently.
Explanation

The Trusted IP address feature only works when users sign in through an organization's company intranet. Users that sign in via the internet cannot bypass MFA through the Trusted IP address feature.

#27
Your organization runs Azure Functions apps that are assigned to a compute processing instance and if needed, more instances are added or removed dynamically. Which Azure Functions pricing plan is best suited for your organization’s needs?
A
Executable plan
B
Integrated plan
C
App Service plan
Consumption plan
Explanation

Azure Functions provides two pricing plans: App Service plan and Consumption plan. The Azure Functions consumption plan is billed based on resource consumption and executions. The Consumption plan is good if compute needs are intermittent or your job times tend to be very short as it allows you to only pay for compute resources when they are actually in use. 

#28
Within the Azure SQL Database service, ____ is the default recovery option when your database is unavailable because of an incident in the region where the database is hosted.
A
Data file restore
B
Point-In-Time restore
Geo-Restore
D
Data page restore
Explanation

Geo-Restore allows you to restore a SQL database on any server in any Azure region from the most recent geo-replicated automated daily backup. Point-In-Time restore allows you to restore an existing database as a new database to an earlier point in time on the same logical server using SQL Database automated backups.

#29
When designing a Virtual Machine Scale Set, Microsoft recommends what ratio of storage accounts to virtual machines?

One storage account for each virtual machine in a scale set.

B

One storage account for every two virtual machines in a scale set.

C

Two storage accounts for every virtual machine in a scale set.

D

Two storage accounts for every three virtual machines in a scale set.

Explanation

If at all possible, Microsoft would like to see a one to one ratio and have a storage account for each virtual machine created in a scale set. If this is not possible, Microsoft recommends using no more than 20 VMs per storage account.

#30
To manage storage costs, you want to delete old VM disk snapshots. What service can you use to create a backup retention policy, to automatically delete the snapshots after a set duration of time?

A recovery service vault with Azure Backup

B

A vault with Azure Key Vault

C

An alarm in Azure Monitor

D

A resource policy with Azure Policy

Explanation

If you use snapshots on blobs, monitor the snapshots and delete those which are outdated or no longer needed. An even better way to avoid the costs associated with snapshots is to implement a comprehensive backup solution by deploying an Azure Recovery Vault. 

#32
You have been hired by a firm that utilizes RAM-intensive enterprise relational database applications to study global customer purchasing trends. The firm’s Chief Technology Officer (CTO) asks you to research and report on the best Azure Virtual Machine Scale Set implementation for the firm. Which VM scale set category would you suggest the firm implement?
A
General purpose
B
Compute optimized
Memory optimized
D
High performance compute
Explanation

There are five categories of Azure VM Scale Set implementations. Memory optimized VM scale sets work well for implementations requiring high memory to core ratios such as those utilizing relational database servers, medium to large caches, and in-memory analytics.

#33
Which Azure App Service offering allows you to develop workflows visually, and enables process automation based on triggers or third-party application integration(s)?
A
Mobile Apps
B
API Apps
C
Web Apps
Logic Apps
Explanation

Logic Apps provide a way to simplify and implement scalable integrations and workflows in the cloud. It provides a visual designer to model and automate your process as a series of steps known as a workflow. There are many connectors across the cloud and on-premises to quickly integrate across services and protocols. A logic app begins with a trigger (like 'When an account is added to Dynamics CRM') and after firing can begin many combinations of actions, conversions, and condition logic.

#34
You have specified auto scaling rules for an image processing application hosted on virtual machines. The application receives messages from Azure storage queues when images need to be processed.The virtual machines are grouped into a scale set with the following Scale Out rules:Scale out one VM if CPU utilization is above 60 percent.Scale out two VMs if CPU utilization is above 80 percent.Scale out one VM if disk writes per second reach 65 percent capacity.Scale out two VMs if disk writes per second reach 85 percent capacity.Scale out one VM if message queue length reaches more than 700.Scale out two VMs if the message queue reaches more than 1000.The following Scale In rules are also applied:Scale in one VM if CPU utilization drops below 35 percent.Scale in two VMs if CPU utilization drops below 20 percent.Scale in one VM if your message queue has fewer than 100 messages.The app's CPU utilization is currently at 30 percent, and the message queue contains 735 messages.Based on these metrics, what auto scaling action(s) will your application perform?
It will scale out one virtual machine.
B
It will scale up one virtual machine.
C
It will scale in one virtual machine.
D
It will scale down one virtual machine.
Explanation

First and foremost, scale-out operations always have priority over scale-in operations. Anytime that multiple scale-out operations conflict with one another, the rule that takes precedence will be the one that initiates the largest increase in the number of instances. When it comes to scale-in conflicts, the rule that initiates the smallest decrease in the number of instances will take precedence. 

#35
You have begun migrating your existing applications from on-premise servers to resources on an Azure Virtual Network. The on-premise network and Azure are currently connected via ExpressRoute. You need to ensure the ExpressRoute connection is healthy at all times. What Network Watcher service can you utilize to monitor the connection?
Network Performance Monitor
B
Traffic Analytics
C
VPN Troubleshoot
D
Connection Monitor
Explanation

Network Performance Monitor is a cloud-based hybrid network monitoring solution that helps you monitor network performance between various points in your network infrastructure. It also helps you monitor network connectivity to service and application endpoints and monitor the performance of Azure ExpressRoute.

#36
What is the least complex deployment method to ensure your application remains available in the event of a data center outage?
A
Deploy multiple VM replicas within an availability set.
Deploy multiple VM replicas to separate availability zones.
C
Deploy multiple VM replicas within a scale set.
D
Deploy multiple VM replicas to separate regions.
Explanation

Availability zones are physically separate locations within a region. They are not available in all regions, but in regions where they are available, deploying VM replicas to separate regions will ensure your system will remain available in the event a data center fails.

#37
It is the end of your organization’s fiscal year. Your accounting department wants you to write several Azure Functions that will run very frequently and for several months, processing the annual financial data for tax purposes and financial record keeping tasks. The functions will run for about 25 minutes on average each time. What Azure Function pricing model should you select when creating the application container in which these functions will reside?
A
The bundle plan
B
The pay as you go plan
The App Service plan
D
The consumption-based plan
Explanation

The App Service plan provides dedicated VM resources on which your function app will reside and execute. This plan works well for function apps that will execute continuously or at least very frequently, and/or in situations where you have existing, under-utilized App Service VMs on which you could deploy a new function app.

#38
Your client has two requirements for their Azure solution utilizing Azure Virtual Machines that affect how it needs to be deployed. They want the highest level of availability, and also large customer populations in distant parts of the globe. What model would generally help address this client's needs?
A
Deploying segments of all application tiers in multiple availability zones
A multi-region active-active model with geo-location based request routing
C
A multi-region active-passive model with cold standby
D
A multi-region active-passive model with hot standby
Explanation

Due to the fact that this client desires the highest level of availability, it is clear they need multi-regional deployment and not multi-zone. Then there is the issue of the customers on distant parts of the globe, which raises the issue of latency. The two best options in terms of minimal downtime are active/active and active/passive with hot standby, and since the client needs to serve two distinct locations, minimizing service latency is the reason to choose active/active with geo-location based request routing.

#39
Your organization’s marketing department has an occasional job that puts a message on an event hub queue. In turn, this triggers an Azure Function that will save the contents of the message onto a storage account. The function runs for about 4 minutes on average. What Azure Function pricing model should you select when creating the application container in which this function will reside?
A
The bundle plan
B
The pay as you go plan
C
The App Service plan
The consumption-based plan
Explanation
The Consumption Plan is very useful if your functions will only be running intermittently, and not continuously or very frequently throughout a given month. The Consumption plan is the default and offers the following benefits. One - pay only when your functions are running. Two - scale out automatically, even during periods of high load. On a Consumption plan, a function can run for a maximum of 10 minutes.
#40
Your company has two endpoints for a web application, one in United States and the other in Western Europe. The endpoint in United States must act as the primary endpoint, and the endpoint in Europe as the secondary. To properly execute this, which routing policy should be selected in Azure Traffic Manager?
A
weighted
B
performance
priority
D
geographic
Explanation

If you want to set up a routing policy so that different endpoints work as an active-passive failover scenario, then you can use the Priority based routing. Here you would define the US endpoint having a priority of 1 and the endpoint in Europe having a priority of 2.

#1
Which of the following is NOT true about Table Storage?
A
It is a key-attribute data store
B
It allows fast access to large quantities of data
C
It stores unstructured datasets
It is a NoSQL data store
Explanation

Table Storage stores structured datasets. Table storage is a NoSQL key-attribute data store, which allows for rapid development and fast access to large quantities of data.

#3
Your application's primary deployment has been attacked by malicious traffic, and you've failed over to a secondary replica in a separate availability zone. To strengthen your security, you want to deploy a virtual appliance to act as a firewall. However, you initially want all traffic to be stopped before reaching any of your primary replica resources, to prevent any other potential malicious traffic.How can you configure a user-defined route to accomplish this?
A
Configure the user-defined route without providing a destination CIDR block address.
B
Configure user-defined route without providing an IP address for the virtual firewall appliance.
C
Configure the user-defined route with the next hop set to 'none.'
Configure the user-defined route to allow outgoing traffic only.
Explanation

When creating a custom route for a routing table, there are three main values to consider. The first is the destination CIDR block for the traffic, which all custom routes require. Then there is the “next hop.” This tells Azure where to route the traffic before it gets to the destination defined above. 

The available options are:
  1. Virtual Network
  2. The next option is the Virtual Network Gateway
  3. Next is the Internet
  4. Then there’s the Virtual Appliance option.
  5. And finally, there’s the None option.
This can be used to stop the traffic dead in its tracks right here. The packets will not be forwarded at all.
#4
Your company is being audited, and an external accountant needs access to review a blob container in the Blob service within one specific Azure storage account. You currently use Azure Active Directory to control access to the blob storage resources in question. However, you have been told you need to provide the accountant with immediate access to review the blob container in the storage account without any further information. How can you provide necessary access, but also limit it to the container in question?
A

Provide the accountant with read-only access to the specific Azure Blob container with a service-level shared access signature token to expire at the end of the business day. Specify the HTTPS protocol is required to accept requests.

B

Assign the accountant a guest role in Azure Active Directory with read-only access to the specific Azure Blob storage service in the Azure Storage account.

Provide the accountant with read-only access to the specific Azure Blob container with a user-delegation shared access signature token to expire at the end of the business day. Allow all read requests but limit write requests to LIST and GET. Specify the HTTPS protocol is required to accept requests.

D
Provide the accountant with contributor role access to the storage account using Azure AD role-based access control (RBAC).
Explanation

In this case, Azure Storage's Shared Access Signature (SAS) is the best tool to provide limited, authorized access to the necessary blob resources. Remember, SAS allows two levels of access: service-level, which limits access to one type of storage within the Azure storage account, such as Blob, Table, Queue or File storage, and account level, which provides access to all storage types in a single account. The service level also allows you to limit access to specific containers, or even specific blobs, and control the actions that can be performed on the blobs by selecting approved common permission types such as read, write, list, or process.

You cannot provide a user-delegated SAS in this case because you do not know if the accountant has Azure AD credentials, which are required for this type of SAS.

#9
Azure Cosmos DB offers multiple regional configurations that respond differently in the event of a regional outage. In which configuration would enabling failover not be necessary to minimize loss of availability and data?
A

Single Region

B

Single Region with Availability Zones

Multi-region with a single-write region

D

Multi-region with multiple write regions

Explanation

If your Cosmos DB database has a multi-region configuration with a single-write region, and that write region experiences a regional outage, enabling failover to a secondary region to then serve as the primary would minimize the damage. Enabling failover would not be possible in either single region configuration, and would not be necessary in a multi-region configuration with multiple write regions.

#23
What Azure Backup service is not application aware?
A
Azure Backup (MARS) Agent
System Center DPM
C
Azure Backup Server
D
Azure IaaS VM Backup
Explanation

Azure Backup Agent is not application aware, meaning it stores no information related to the connected service's status or performance.

#31
When configuring Azure Firewall, which type of rule is specific to Azure Firewall and contains source addresses, protocols, destination ports, and destination addresses?

Application rules

B

Network rules

C

Application Security Group rules

D

Network Security Group Rules

Explanation

Azure Firewall supports rules and rule collections. A rule collection is a set of rules that share the same order and priority. Rule collections are executed in order of their priority. Network rule collections are higher priority than application rule collections, and all rules are terminating.

There are three types of rule collections:

Application rules: Configure fully qualified domain names (FQDNs) that can be accessed from a subnet.
Network rules: Configure rules that contain source addresses, protocols, destination ports, and destination addresses.
NAT rules: Configure DNAT rules to allow incoming connections.

2 comments:

AZ-304 Exam Preparation: Additional Resources

  Content Congratulations on making it all the way through this learning path. If you’re preparing to write the Microsoft AZ-304 exam, note ...