AZ-900 Flashcards
The ability to recover from a cloud service outage. Should happen quickly through automation.
Disaster Recovery
The ability to keep services up and running for long periods of time, while experiencing little to no downtime.
High Availability
The ability to increase or decrease resources for a given workload. You can add resources to service a workload (scale out), or add additional capabilities to handle increases in demand (scale up).
Scalability
The ability to automatically or dynamically increase or decrease resources as necessary.
Elasticity
The ability to react quickly. Cloud services can allocate and deallocate resources quickly.
Agility
The ability to remain up and running if a component or service is no longer functioning
Fault Tolerance
The ability to react quickly. Cloud services can allocate and deallocate resources quickly.
Predictive Cost
Best when you need more control over the computing environment than what other compute choices offer.
Azure Virtual Machines
Offers the fastest and simplest way to run a container in Azure, without having to manage any virtual machines.
A great solution for any scenario that can operate in isolated containers, including simple applications, task automation,
Azure Container Instances
An HTTP-based service for hosting web applications, REST APIs, and mobile back ends
Azure App Service
A managed Kubernetes offering that simplifies container-based application deployment and management
Azure Kubernetes Services
Allows you to implement your system’s logic into readily available blocks of code. These code blocks are called “functions”. Different functions can run anytime you need to respond to critical events.
Azure Functions
A collection of Microsoft-managed cloud services that connect, monitor, and control billions of IoT assets. In simpler terms, an IoT solution is made up of one or more IoT devices that communicate with one or more back-end services hosted in the cloud.
Internet of Things
Provides added security for user authentications by requiring two or more elements for authentication.
Multi-Factor Authentication
Allows you to configure network security as an extension of an application’s structure and reuse your security policies at scale.
Azure handles the complexity of explicit IP addresses and multiple rule sets.
Filters network traffic to and from Azure resources connected to Azure Virtual Networks.
Network Security Group
Provides developer services for support teams to plan work, collaborate on code development, and build and deploy applications
DevOps
Designed for serving images or documents directly to a browser, storing files for distributed access, streaming video and audio, and for writing to log files.
Azure Blob Storage
Fully managed file shares in the cloud are accessible via the industry standard Server Message Block (SMB) protocol or Network File System (NFS) protocol.
Can be mounted concurrently by cloud or on-premises deployments
Azure Files
Microsoft’s managed network security service in Azure that protects Azure Virtual Network resources. Uses a static public IP address to represent the virtual network resources behind it.
Azure Firewall
A scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution that delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for alert detection, threat visibility, proactive hunting, and threat response.
Azure Sentinel
Used to provide threat protection for services in Azure and on-premises. Continuously monitors all services, performs automatic security assessments, and uses machine learning to detect and block malware.
Azure Security Center
Stores application secrets in a centralized cloud location, to securely control access permissions, and access logging
Azure Key Vault
Microsoft’s security solution that is used to identify, detect, and investigate advanced threats and compromised identities. Available as part of the Enterprise Mobility + Security 5 suite and as a standalone license.
Azure Advanced Threat Protection
Used to create, assign, and, manage policies that enforce different rules and effects over your resources.
Performs evaluations of resources and scans for those that are not compliant
Azure Policy
Provides fine-grained access management for Azure resources. Used to segregate duties within your team, granting only the specific access that your users need to perform their jobs.
Role-Based Access Control
Used to prevent accidental deletion or modification of Azure resources. Managed from within the Azure portal.
Resource Locks
Used to define repeatable sets of Azure resources that implement and adhere to standards, patterns, and requirements.
A declarative way to manage the deployment of many different resource templates and other artifacts, like role assignments, policy assignments, Azure Resource Manager templates and resource groups.
Azure Blueprints