az-104 dumps topic 8 Flashcards
Case study -
…
Overview - General Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in Seattle and New York.
Environment - Existing Environment -
Contoso has an Azure subscription named Sub1 that is linked to an Azure Active Directory (Azure AD) tenant. The network contains an onpremises Active Directory domain that syncs to the Azure AD tenant.
The Azure AD tenant contains the users shown in the following table.
Name Type Role
User1 Member None
User2 Guest None
User3 Member None
User4 Member None
Sub1 contains two resource groups named RG1 and RG2 and the virtual networks shown in the following table.
Name Subnet Peered with
VNET1 Subnet1, Subnet2 VNET2
VNET2 Subnet1 VNET1, VNET3
VNET3 Subnet1 VNET2
VNET4 Subnet1 None
User1 manages the resources in RG1. User4 manages the resources in RG2.
Sub1 contains virtual machines that run Windows Server 2019 as shown in the following table
Name IP address Location Connected to
VM1 10.0.1.4 West US VNET1/Subnet1
VM2 10.0.2.4 West US VNET1/Subnet2
VM3 172.16.1.4 Central US VNET2/Subnet1
VM4 192.168.1.4 West US VNET3/Subnet1
VM5 10.0.22.4 East US VNET4/Subnet1
No network security groups (NSGs) are associated to the network interfaces or the subnets.
Sub1 contains the storage accounts shown in the following table.
Name Kind Location File share Identity-based access for file share
storage1 Storage West US sharea Azure Active Directory Domain
(gen. purp. v1) Services (Azure AD DS)
storage2 StorageV2 East US shareb, Disabled
(gen. purp. v2) sharec
storage3 BlobStorage East US 2 Not applicable Not applicable
storage4 FileStorage Central US shared Azure AD DS
Requirements - Planned Changes -
Contoso plans to implement the following changes:
Create a blob container named container1 and a file share named share1 that will use the Cool storage tier.
Create a storage account named storage5 and congure storage replication for the Blob service.
Create an NSG named NSG1 that will have the custom inbound security rules shown in the following table.
Priority Port Protocol Source Destination Action
500 3389 TCP 10.0.2.0/24 Any Deny
1000 Any ICMP Any VNetwork Allow
Associate NSG1 to the network interface of VM1.
Create an NSG named NSG2 that will have the custom outbound security rules shown in the following table.
Priority Port Protocol Source Destination Action
200 3389 TCP 10.0.0.0/16 VNetwork Deny
400 Any ICMP 10.0.2.0/24 10.0.1.0/24 Allow
Associate NSG2 to VNET1/Subnet2.
Technical Requirements -
Contoso must meet the following technical requirements:
Create container1 and share1.
Use the principle of least privilege.
Create an Azure AD security group named Group4.
Back up the Azure file shares and virtual machines by using Azure Backup.
Trigger an alert if VM1 or VM2 has less than 20 GB of free space on volume C.
Enable User1 to create Azure policy denitions and User2 to assign Azure policies to RG1.
Create an internal Basic Azure Load Balancer named LB1 and connect the load balancer to VNET1/Subnet1
Enable flow logging for IP trac from VM5 and retain the flow logs for a period of eight months.
Whenever possible, grant Group4 Azure role-based access control (Azure RBAC) read-only permissions to the Azure file shares.
Question
You need to congure Azure Backup to back up the file shares and virtual machines. What is the minimum number of Recovery Services vaults and backup policies you should create?
Recovery Services vaults: 1, 2, 3, 4, 7
Backup policies: 1, 2, 3, 4, 5, 6,
Recovery Services vaults: 3
If you have data sources in multiple regions, create a Recovery Services vault for each region. The File Shares and VMs are located in three Regions: West US, East US, Central US.
Backup policies: 6
A backup policy is scoped to a vault. For each vault we need one backup policy for File Shares and one backup policy for VM.
Note: Back up the Azure file shares and virtual machines by using Azure Backup
Reference:
https://docs.microsoft.com/en-us/azure/backup/backup-create-rs-vault https://docs.microsoft.com/en-us/azure/backup/guidance-bestpractices
Case study -
…
Overview - General Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in Seattle and New York.
Environment - Existing Environment -
Contoso has an Azure subscription named Sub1 that is linked to an Azure Active Directory (Azure AD) tenant. The network contains an onpremises Active Directory domain that syncs to the Azure AD tenant.
The Azure AD tenant contains the users shown in the following table.
Name Type Role
User1 Member None
User2 Guest None
User3 Member None
User4 Member None
Sub1 contains two resource groups named RG1 and RG2 and the virtual networks shown in the following table.
Name Subnet Peered with
VNET1 Subnet1, Subnet2 VNET2
VNET2 Subnet1 VNET1, VNET3
VNET3 Subnet1 VNET2
VNET4 Subnet1 None
User1 manages the resources in RG1. User4 manages the resources in RG2.
Sub1 contains virtual machines that run Windows Server 2019 as shown in the following table
Name IP address Location Connected to
VM1 10.0.1.4 West US VNET1/Subnet1
VM2 10.0.2.4 West US VNET1/Subnet2
VM3 172.16.1.4 Central US VNET2/Subnet1
VM4 192.168.1.4 West US VNET3/Subnet1
VM5 10.0.22.4 East US VNET4/Subnet1
No network security groups (NSGs) are associated to the network interfaces or the subnets.
Sub1 contains the storage accounts shown in the following table.
Name Kind Location File share Identity-based access for file share
storage1 Storage West US sharea Azure Active Directory Domain
(gen. purp. v1) Services (Azure AD DS)
storage2 StorageV2 East US shareb, Disabled
(gen. purp. v2) sharec
storage3 BlobStorage East US 2 Not applicable Not applicable
storage4 FileStorage Central US shared Azure AD DS
Requirements - Planned Changes -
Contoso plans to implement the following changes:
Create a blob container named container1 and a file share named share1 that will use the Cool storage tier.
Create a storage account named storage5 and congure storage replication for the Blob service.
Create an NSG named NSG1 that will have the custom inbound security rules shown in the following table.
Priority Port Protocol Source Destination Action
500 3389 TCP 10.0.2.0/24 Any Deny
1000 Any ICMP Any VNetwork Allow
Associate NSG1 to the network interface of VM1.
Create an NSG named NSG2 that will have the custom outbound security rules shown in the following table.
Priority Port Protocol Source Destination Action
200 3389 TCP 10.0.0.0/16 VNetwork Deny
400 Any ICMP 10.0.2.0/24 10.0.1.0/24 Allow
Associate NSG2 to VNET1/Subnet2.
Technical Requirements -
Contoso must meet the following technical requirements:
Create container1 and share1.
Use the principle of least privilege.
Create an Azure AD security group named Group4.
Back up the Azure file shares and virtual machines by using Azure Backup.
Trigger an alert if VM1 or VM2 has less than 20 GB of free space on volume C.
Enable User1 to create Azure policy denitions and User2 to assign Azure policies to RG1.
Create an internal Basic Azure Load Balancer named LB1 and connect the load balancer to VNET1/Subnet1
Enable flow logging for IP trac from VM5 and retain the flow logs for a period of eight months.
Whenever possible, grant Group4 Azure role-based access control (Azure RBAC) read-only permissions to the Azure file shares.
Question
You need to congure the alerts for VM1 and VM2 to meet the technical requirements.
Which three actions should you perform in sequence?
- Create a Log Analytics workspace.
- Configure the Diagnostic settings.
- Create an alert rule.
- Collect Windows performance counters from the Log Analytics agents.
- Create an Azure SQL database.
(maybe) - Create a Log Analytics workspace.
- Collect Windows performance counters from the Log Analytics agents.
- Create an alert rule.
Create a Log Analytics workspace: This is where the data collected from the VMs will be stored and analyzed.
Collect Windows performance counters from the Log Analytics agents: This step involves configuring the VMs to collect performance data, such as free disk space, and send it to the Log Analytics workspace.
Create an alert rule: Finally, you create an alert rule based on the performance data collected in the Log Analytics workspace to trigger an alert if VM1 or VM2 has less than 20 GB of free space on volume C.