AZ 900 Product Summary Flashcards
Disater Recovery
The ability to recover from a cloud service outage. Should happen quickly through automation.
High Availability
The ability to keep services up and running for long periods of time, while
experiencing little to no downtime.
Scalability
The ability to increase or decrease resources for a given workload. You can add resources to service a
workload (scale out), or add additional capabilities to handle increases in demand (scale up).
Elasticity
The ability to automatically or dynamically increase or decrease resources as necessary.
Agility
The ability to react quickly. Cloud services can allocate and deallocate resources quickly.
Fault Tolerance
The ability to remain up & running even if a component or service is no longer functioning.
Predicitve Cost
The ability to predict what costs will be incurred for a particular cloud service or offering.
Azure Virtual Machines
Best when you need more control over the computing environment than what other compute choices
Azure Container Instances
Offers the fastest and simplest way to run a container in Azure, without having to manage any virtual
machines.
A great solution for any scenario that can operate in isolated containers, including simple applications,
task automation, and build jobs.
Azure App Services
An HTTP-based service for hosting web applications, REST APIs, and mobile back ends.
Azure Kubernetes Service
A managed Kubernetes offering that simplifies container-based application deployment and
management.
Azure Functions
Allows you to implement your system’s logic into readily available blocks of code. These code blocks are
called “functions”. Different functions can run anytime you need to respond to critical events.
Internet of Things
A collection of Microsoft-managed cloud services that connect, monitor, and control billions of IoT
assets. In simpler terms, an IoT solution is made up of one or more IoT devices that communicate with
one or more back-end services hosted in the cloud.
Multi-Factor Authentication
Provides added security for user authentications by requiring two or more elements for authentication
Application Security Group
Allows you to configure network security as an extension of an application’s structure and reuse your
security policies at scale
Azure handles the complexity of explicit IP addresses and multiple rule sets.
Network Security Group
Filters network traffic to and from Azure resources connected to Azure Virtual Networks.
Consists of inbound and outbound rules.
Devops
Provides developer services for support teams to plan work, collaborate on code development, and build
and deploy applications.
Azure Blob Storage
Designed for serving images or documents directly to a browser, storing files for distributed access,
streaming video and audio, and for writing to log files.
Also used to store data for backup and restore, disaster recovery, archiving, and analysis by an on-
premises or Azure-hosted service.
Azure Files
Fully managed file shares in the cloud that are accessible via the industry standard Server Message Block
(SMB) protocol or Network File System (NFS) protocol.
Ccan be mounted concurrently by cloud or on-premises deployments.
Azure Firewall
Microsoft’s managed network security service in Azure that protects Azure Virtual Network resources.
Uses a static public IP address to represent the virtual network resources behind it.
Azure Sentinel
A scalable, cloud-native, security information event management (SIEM) and security orchestration
automated response (SOAR) solution that delivers intelligent security analytics and threat intelligence
across the enterprise, providing a single solution for alert detection, threat visibility, proactive hunting,
and threat response.
Azure Security Center
Used to provide threat protection for services in Azure and on-premises. Continuously monitors all
services, performs automatic security assessments, and uses machine learning to detect and block
malware.
Azure Key Vault
Stores application secrets in a centralized cloud location, to securely control access permissions, and
access logging
Azure Advanced Threat Protection
Microsoft’s security solution that is used to identify, detect, and investigate advanced threats and
compromised identities. Available as part of the Enterprise Mobility + Security 5 suite and as a
standalone license.
Azure Policy
Used to create, assign, and, manage policies that enforce different rules and effects over your resources.
Performs evaluations of resources and scans for those that are not compliant
Role-Based Access Control
Provides fine-grained access management for Azure resources. Used to segregate duties within your
team, granting only the specific access that your users need to perform their jobs.
Resource Locks
Used to prevent accidental deletion or modification of Azure resources. Managed from within the Azure
portal.
Azure Blueprints
Used to define repeatable sets of Azure resources that implement and adhere to standards, patterns,
and requirements.
A declarative way to manage the deployment of many different resource templates and other artifacts,
like role assignments, policy assignments, Azure Resource Manager templates, and Resource Groups.
Azure Tags
Used to logically organize your Azure resources. Consist of name-value pairs, and help organize
resources for billing
Azure Monitor
Allows you to collect, analyze, and act upon telemetry from both cloud and on-prem environments
Azure Serivice Health
Provides personalized guidance and support whenever issues with Azure services affect you
Trust Center
Provides information and details that outline how Microsoft implements and supports security, privacy,
compliance, and transparency in all Microsoft cloud products and services.
Service Trust Portal (STP)
The Service Trust Portal hosts the Compliance Manager service. It’s where Microsoft publishes audit
reports and other compliance-related information.
Compliance Manager
A workflow-based risk assessment dashboard within the Trust Portal used to track, assign, and verify
regulatory compliance activities.