az305 Flashcards
(135 cards)
Whis of the following would you use to restrict access to KeyVault?
Access policies for KeyVault
An Azure Policy
RBAC
Azure Ad Multi Factor Auth
Access policies for KeyVault
Requirement: All data in the storage account is encrypted at rest
Azure Storage Encryption
Azure Disk Encryption
Always Encyrpted
Transparent Data Encrption
Azure Storage Encryption
To the manager of the developers, send a monthly email message that lists the access permissions to Application1.
If the manager does not verify an access permission, automatically revoke that permission.
Minimize development effort
A. In Azure Active Directory (Azure AD), create an access review of Application1.
B. Create an Azure Automation runbook that runs the Get-AzRoleAssignment cmdlet.
C. In Azure Active Directory (Azure AD) Privileged Identity Management, create a custom role assignment for the Application1 resources.
D. Create an Azure Automation runbook that runs the Get-AzureADUserAppRoleAssignment cmdlet.
A. In Azure Active Directory (Azure AD), create an access review of Application1.
Some users work remotely and do NOT have VPN access to the on-premises network.You need to provide the remote users with single sign-on (SSO) access to WebApp1. Select 2
A. Azure AD Application Proxy
B. Azure AD Privileged Identity Management (PIM)
C. Conditional Access policies
D. Azure Arc
E. Azure AD enterprise applications
F. Azure Application Gateway
A,E
✑ The evaluation must be repeated automatically every three months.
✑ Every member must be able to report whether they need to be in Group1.
✑ Users who report that they do not need to be in Group1 must be removed from Group1 automatically.
✑ Users who do not report whether they need to be in Group1 must be removed from Group1 automatically.What should you include in the recommendation?
A. Implement Azure AD Identity Protection.
B. Change the Membership type of Group1 to Dynamic User.
C. Create an access review.
D. Implement Azure AD Privileged Identity Management (PIM).
C. Create an access review.
You need to recommend a design for the planned Databrick deployment. The solution must meet the following requirements:
✑ Ensure that the data engineers can only access folders to which they have permissions.
✑ Minimize development effort.
✑ Minimize costs.
Databticks SKU: Premium or Standard
Cluster Config:
Credential Passthrough
Managed Identities
MLFlow
Secret Scope
Premium, Credential Passthrough
You need to analyze the network traffic to identify whether packets are being allowed or denied to the virtual machines.Solution: Use Azure Traffic Analytics in Azure Network Watcher to analyze the network traffic.
Does this meet the goal?
Instead use Azure Network Watcher IP Flow Verify, which allows you to detect traffic filtering issues at a VM level.
Users can connect to app without being prompted for auth:
Azure AD App registration
Azure AD Managed identity
Azure Ad App Proxy
User can only access apps from company owned computers:
A conditional access policy
Azure AD administrative unit
Azure Application Gateway
Azure blueprionts
Azure Policy
Azure AD App registration
A conditional access policy
You need to use Azure Monitor to design an alerting strategy for security-related events.
Which Azure Monitor Logs tables should you query?
Select for win and linux
Azure Activity
Azure Diagnostics
Event
syslog
Win: Event, Linux: Syslog
To which three scopes can you assign Azure Policy definitions?
A. Azure Active Directory (Azure AD) administrative units
B. Azure Active Directory (Azure AD) tenants
C. subscriptions
D. compute resources
E. resource groups
F. management groups
C,E,F
Your on-premises network contains a server named Server1 that runs an ASP.NET application named App1.
You have a hybrid deployment of Azure Active Directory (Azure AD).
You need to recommend a solution to ensure that users sign in by using their Azure AD account and Azure Multi-Factor Authentication (MFA) when they connect to App1 from the internet.
Which three features should you recommend be deployed and configured in sequence?
A public load balancer
A managed identity
an internal azure load balancer
conditional access policy
azure app service plan
Azure AD apllication proxy
Azure Ad application Enterprise
- Application Proxy
- Enterprise Application
- Conditional Access
Your on-premises network contains a server named Server1 that runs an ASP.NET application named App1.
You have a hybrid deployment of Azure Active Directory (Azure AD).
You need to recommend a solution to ensure that users sign in by using their Azure AD account and Azure Multi-Factor Authentication (MFA) when they connect to App1 from the internet.
Which three features should you recommend be deployed and configured in sequence?
A public load balancer
A managed identity
an internal azure load balancer
conditional access policy
azure app service plan
Azure AD apllication proxy
Azure Ad application Enterprise
- Application Proxy
- Enterprise Application
- Conditional Access
You need to recommend a solution to generate a monthly report of all the new Azure Resource Manager (ARM) resource deployments in your Azure subscription.
What should you include in the recommendation?
A. Azure Activity Log
B. Azure Advisor
C. Azure Analysis Services
D. Azure Monitor action groups
A. Azure Activity Log
Your company, named Contoso, Ltd., implements several Azure logic apps that have HTTP triggers. The logic apps provide access to an on-premises web service.
Contoso establishes a partnership with another company named Fabrikam, Inc.
Fabrikam does not have an existing Azure Active Directory (Azure AD) tenant and uses third-party OAuth 2.0 identity management to authenticate its users.
Developers at Fabrikam plan to use a subset of the logic apps to build applications that will integrate with the on-premises web service of Contoso.
You need to design a solution to provide the Fabrikam developers with access to the logic apps. The solution must meet the following requirements:
✑ Requests to the logic apps from the developers must be limited to lower rates than the requests from the users at Contoso.
✑ The developers must be able to rely on their existing OAuth 2.0 provider to gain access to the logic apps.
✑ The solution must NOT require changes to the logic apps.
✑ The solution must NOT use Azure AD guest accounts.
What should you include in the solution?
A. Azure Front Door
B. Azure AD Application Proxy
C. Azure AD business-to-business (B2B)
D. Azure API Management
Many APIs support OAuth 2.0 to secure the API and ensure that only valid users have access, and they can only access resources to which they’re entitled. To use Azure API Management’s interactive developer console with such APIs, the service allows you to configure your service instance to work with your OAuth 2.0 enabled API.
Incorrect:
Azure AD business-to-business (B2B) uses guest accounts.
Azure AD Application Proxy is for on-premises scenarios.
You have an Azure subscription that contains 300 virtual machines that run Windows Server 2019.
You need to centrally monitor all warning events in the System logs of the virtual machines.
Resources to create:
Event hub
Log Analytics
search engine
storage acount
Conf on Vms:
Create event subs
Conf CD
Install Azure monitor agent
Modify membership of the Event Log Reader Group
Resources to create: Log Analytics
Conf on Vms: Install Azure monitor agent
Security:
Get alerts about changes in administrator assignements
Development:
enable KeyVault access
Quality:
Require temporary admin roles
Azure AD Privilied Identity Management
Azure Managed Identity
Azure AD connect
Azure AD Identity Protection
Security: PIM
Development: MI
Quality: PIM
East / Sub1,Sub2 / tenant1
west / Sub3,Sub4 / tenant2
of Management Group = ? 1,2,3,4
# of Blueprint Definitons = ? 1,2,3,4
# of Blueprint Assignments = ? 1,2,3,4
of Management Group = 2
# of Blueprint Definitons = 2
# of Blueprint Assignments = 2
✑ For new resources, assign tags and values that match the tags and values of the resource group to which the resources are deployed.
✑ For existing resources, identify whether the tags and values match the tags and values of the resource group that contains the resources.
✑ For any non-compliant resources, trigger auto-generated remediation tasks to create missing tags and values.
The solution must use the principle of least privilege.
What should you include in the design?
Azure Policy Effect to use:
Append
EnforceOPAConstraint
EnforceRegoPolicy
Modify
RBAC for remedition tasks:
Managed Identity with Contributer
Managed Identity with User Access Admin
Service Principal with Contributer
Service Principal with User Access Admin
Azure Policy Effect to use:
Modify
RBAC for remedition tasks:
Managed Identity with Contributer
To DB1, you add a diagnostic setting named Settings1. Settings1 archive SQLInsights to storage1 and sends SQLInsights to Workspace1(Azure Log analytics Workspace).
T/F
You can add new dignostic setting that archives SqlInsights logs to storage2
You can add new dignostic setting that sends SqlInsights logs to Workspace2
You can add new dignostic setting that sends SqlInsights logs to EventHub1
T,T,T
You plan to deploy an Azure SQL database that will store Personally Identifiable Information (PII).
You need to ensure that only privileged users can view the PII.
What should you include in the solution?
A. dynamic data masking
B. role-based access control (RBAC)
C. Data Discovery & Classification
D. Transparent Data Encryption (TDE)
A. dynamic data masking
Dynamic data masking limits sensitive data exposure by masking it to non-privileged users.
Store data for multiple users
Ecrypt each users data by using a separate key
Encrypt all the data in the storage account by using customer-managed keys
A. files in a premium file share storage account
B. blobs in a general purpose v2 storage account
C. blobs in an Azure Data Lake Storage Gen2 account
D. files in a general purpose v2 storage account
B. blobs in a general purpose v2 storage account
You have an Azure App Service web app that uses a system-assigned managed identity.
You need to recommend a solution to store the settings of the web app as secrets in an Azure key vault. The solution must meet the following requirements:
✑ Minimize changes to the app code.
✑ Use the principle of least privilege.
KeyVault Integration method: ?
KeyVault permission for the managed identity: ?
KeyVault Integration method: Application settings
KeyVault permission for the managed identity: Secrets: Get
You need to recommend a solution to meet the following requirements for the virtual machines that will run App1:
✑ Ensure that the virtual machines can authenticate to Azure Active Directory (Azure AD) to gain access to an Azure key vault, Azure Logic Apps instances, and an Azure SQL database.
✑ Avoid assigning new roles and permissions for Azure services
✑ Avoid storing secrets and certificates on the virtual machines.
✑ Minimize administrative effort for managing identities.
Which type of identity should you include in the recommendation?
A. a system-assigned managed identity
B. a service principal that is configured to use a certificate
C. a service principal that is configured to use a client secret
D. a user-assigned managed identity
D. a user-assigned managed identity
User assigned MI can be shared with more than one Azure resource
Azure cosmos DB hosts a container that stores continuously updated operational data.
You are designing a solution that will use AS1 to analyze the operational data daily.
You need to recommend a solution to analyze the data without affecting the performance of the operational data store.
What should you include in the recommendation?
A. Azure Cosmos DB change feed
B. Azure Data Factory with Azure Cosmos DB and Azure Synapse Analytics connectors
C. Azure Synapse Link for Azure Cosmos DB
D. Azure Synapse Analytics with PolyBase data loading
C. Azure Synapse Link for Azure Cosmos DB