Azure Study Material Flashcards
What does GZRS stand for?
GEO-ZONE REDUNDANT STORAGE
Copies your data synchronously three times within the primary region using ZRS.
How does GZRS handle redundancy in the secondary region?
It copies the data asynchronously to a single physical location in the secondary region.
Recommended by MSFT for apps requiring high availability.
What is the benefit of using GZRS along with GRS?
With GRS and GZRS, redundancy is extended to the secondary region!
Options within
LRS
Locally Redundant Storage
Copies your data synchronously three times within a single physical location in the primary region.
ZRS
Zone Redundant Storage
Copies your data synchronously across three Azure availability zones in the primary region.
What does GRS stand for?
Geo-Redundant Storage
Copies your data synchronously three times within a single physical location in the primary region using LRS. It then copies it asynchronously to a single physical location in the secondary region. 3 copies using LRS
How does GRS store data?
It copies your data synchronously three times within a single physical location in the primary region using LRS. It then copies it asynchronously to a single physical location in the secondary region. 3 copies using LRS
Copies your data synchronously three times within a single physical location in the primary region using LRS. It then copies it asynchronously to a single physical location in the secondary region. 3 copies using LRS
What is AzCopy?
A command-line utility that you can use to copy blobs or files to or from your storage account.
1:33:10 / 2:30:51 • DOMAIN 2.3 Describe Azure Storage Services
What is Azure Storage Explorer?
A standalone app that provides a graphical interface to manage files and blobs in your Azure Storage Account. Supports file and blob upload, download, or move between accounts.
1:33:10 / 2:30:51 • DOMAIN 2.3 Describe Azure Storage Services
What is Azure File Sync?
A tool that lets you centralize your file shares in Azure Files and keep the flexibility, performance, and compatibility of a Windows file server.
What happens once Azure File Sync is installed on a local Windows server?
It will automatically stay bi-directionally synced with your files in Azure.
What does B2B collaboration support?
Entra ID and social identities
Example sentence: Enable external users to use their preferred identity to sign into your Microsoft or other enterprise applications (SaaS apps, custom-developed apps, etc.)
What does B2B direct connect support?
Multiple two-way trusts
Example sentence: Establish a mutual, two-way trust with another Entra ID organization for seamless collaboration. Useful for heavy, daily collaboration with close business partners.
What does Business-to-Consumer (B2C) support?
Entra & social identities
Example sentence: Publish modern SaaS apps or custom-developed apps to consumers and customers, while using Entra ID B2C for identity and access management.
What is an Entra ID multi-tenant organization?
Collaborate with multiple tenants in a single Entra ID organization via cross-tenant synchronization.
What does LL stand for in Entra ID?
LL stands for language options.
What are some features within Entra ID?
Features within Entra ID include language options.
What is Conditional Access used for?
Used by Entra ID to bring signals together, to make decisions, and enforce organizational policies
Conditional Access is used by Entra ID for these purposes.
What does Azure RBAC help you manage?
who has access to Azure resources,
what they can do with those resources,
which resources/areas they have access to
RBAC = Role Based Access Control
What is Azure RBAC?
Built on Azure Resource Manager and provides fine-grained access management of Azure resources.
Azure RBAC is one element of implementing ‘least privilege’.
What does Azure RBAC stand for?
Azure RBAC stands for Azure Role-Based Access Control.
Example sentence: Azure RBAC allows you to assign specific roles to users, granting them access only to the resources they need.
What are the three principles of Zero Trust?
Verify explicitly
Always authenticate and authorize based on all available data points.
Use least privilege access
Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection.
Assume breach
Segment access to minimize blast radius
What does ‘Verify explicitly’ mean in Zero Trust?
Always authenticate and authorize based on all available data points.
What does ‘Use least privilege access’ mean in Zero Trust?
Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection.