Additional Questions Flashcards

1
Q

Single sign-on (SSO) is __________ method that enables users to sign in the first time and access various applications and resource by using same password.

A. a validation
B. an authentication
C. a configuration
D. an authorization

A

B. an authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which option is used to set the communication between an on-premises VPN device and an Azure VPN gateway through an encrypted tunnel over the internet?

A. ExpressRoute
B. Point-to-Site (P2S) VPN
C. Site-to-Site VPN

A

C. Site-to-Site VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Azure serverless computing technology provides the ability to execute workflows to automate business scenarios by using triggers without writing any code?

A. Azure Functions
B. Azure Logic Apps
C. Azure Front Door
D. Azure DevOps

A

B. Azure Logic Apps

Azure Logic Apps are designed in a web-based designer and can execute logic triggered by Azure services without writing any code.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question # 12 (Multiple Choice)

A. Azure portal
B. Azure PowerShell
C. Azure Command Line Interface (CLI)
D. Azure Resource Manager (ARM) template

A

A. Azure portal

You can access the Cloud Shell in three ways:
* Direct link: Open a browser to https://shell.azure.com.
* Azure portal: Select the Cloud Shell icon on the Azure portal.
* Code snippets: On learn.microsoft.com and Microsoft Learn, select the Try It button

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__________ enables you to scale to thousands of virtual machines for high-performance computing and large-scale parallel jobs.

A. An Azure virtual machine scale set
B. An availability set
C. Azure Batch
D. An availability zone

A

C. Azure Batch

Azure Batch allows you to scale to thousands of virtual machines for high-performance computing (HPC) and large-scale parallel jobs. Other Azure functionalities allow you to scale multiple VMs, but only Azure Batch will allow for thousands of VMs for HPC.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__________ enables you to provision a group of matching and load-balanced virtual machines in Azure.

A. Azure Logic Apps
B. An availability set
C. An Azure virtual machine scale set
D. Azure Load Balancer

A

C. An Azure virtual machine scale set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__________ alerts you when service issues occur in an Azure environment, such as a regional Azure outage that affects all Azure customers.

A. Azure Monitor
B. Azure Advisor
C. Azure Service Health
D. Azure Application Insights

A

C. Azure Service Health

Azure Service Health alerts you about service issues that happen in Azure itself, such as a regional Azure outage

https://learn.microsoft.com/training/modules/monitoring-fundamentals/2-identify-product-options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Authentication?

A

To confirm the identity of a person who wants access.
Authentication is the process of establishing the identity of a person or service that wants to access a resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Authorization?

A

Authorization - To grant the proper access to a legitimate user.
Authorization is the process of establishing what level of access a legitimate user or service should have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between Azure Functions and Logic Apps?

A

With Functions, you write code to complete each step.

With Logic Apps, you use a GUI to define the actions and how they relate to one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe layers of defense in depth: physical security layer

A

First line of defense to protect computing hardware in the datacenter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe layers of defense in depth: identity and access

A

controls access to infrastructure and change control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe layers of defense in depth: perimeter layer

A

uses distributed denial of service (DDoS) protection to filter large-scale attacks before they can cause a denial of service for users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe layers of defense in depth: network layer

A

limits communication between resources through segmentation and access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe layers of defense in depth: compute layer

A

secures access to virtual machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe layers of defense in depth: application layer

A

helps ensure that applications are secure and free of security vulnerabilities.

17
Q

Describe layers of defense in depth: data layer

A

controls access to business and customer data that you need to protect.