Describe Azure architecture and services Flashcards

1
Q

Name some resources associated with creating a VM

A

A resource group
An OS image
A network interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the considerations for container instance creation?

A

Image used cannot be changed after instance creation
DNS name label cannot be changed after instance creation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the cost considerations for a Vnet?

A

If you peer Vnets in the same region, no data transfer charges
If you peer Vnets in different regions, you will be billed inter region EGRESS charges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are cost considerations for Azure app services?

A

Billed even when no web apps are running or the web apps are stopped
Must delete an app service plan to stop billing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is authentication?

A

Process of establishing the identity of a person or service and proving they are who they say they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is authorization?

A

Process of establishing what level of access the authenticated person or service has to a resource
What they can access and what action they can perform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are MFA and conditional access?

A

MFA: additional layer of security for identifying a user (2 elements or + for auth)
Conditional access: provide more granular levels of access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are RBAC role scopes?

A

RBAC scope represents the resource level that the access will apply
Scopes are: management group, subscription, resource group, resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are resource groups?

A

Logical containers for Azure resources used as management scopes for access management and policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Zero trust foundational principles?

A

Assume breach
Verify explicitly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Defence-in-Depth? (DiD)

A

Strategy that places multiple layers of different forms of defense between attackers and the resources
No single layer of protection or security service is solely responsible for protecting resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is MS Defender for Cloud?

A

Service used to improve an organization’s security posture and workload protection
Provides:
Cloud Security Posture Management (CSPM)
Cloud Workload Protection (CWP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Are costs incurred for data transfer in and out Azure?

A

INGRESS (into) is free
EGRESS (out of) is billed
Data transfer throught VNET peered between 2 regions is billed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What factors affect costs?

A

purchasing model (pay as you go or reservation)
resource type
location
Usage period
network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What resources will NOT reduce costs for a VM?

A

Network Security Groups
Network Interfaces
Availability Sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Azure Vnet?

A

Azure VNet is an IaaS resource that enables communication with Azure resources.
A VNet represents a software-defined, single-tenant, private network in a single Azure region

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

To what can you attach a Vnet if you need to create and manage it?

A

A VNet belongs to a resource group that belongs to a subscription and can only be part of one region.
VNets can span across data center zones but are not available across regions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How do resources communicate?

A

Resources in different subscriptions can communicate with each other if
- they are part of the same VNet
- they are part of peered VNet
- if a VPN gateway connects the VNets and they don’t have conflicting IP ranges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How is data transfer in Vnets billed?

A

All traffic entering (ingress) a VNet and region is “not billed,”
All traffic leaving (egress) a VNet and between 2 Vnets peered in 2 separated regions is “billed.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Name the 2 kinds of Vnet peering

A

Regional VNet peering: used to connect VNets from the same region
Global VNet peering: used to connect VNets from different regions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What can you use to connect Azure resources, such as Azure SQL databases, to an Azure virtual network?

A

Service endpoints are used to expose Azure services to a virtual network, providing communication between the two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

To which object or level is an Azure role-based access control (RBAC) role applied?

A

An Azure RBAC role is applied to a scope, which is a resource or set of resources that the access applies to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You plan to extend your company’s network to Azure.
The network contains a VPN appliance that uses an IP address of 131.107.200.1.
You need to create an Azure resource that defines the VPN appliance in Azure.
Which Azure resource should you create?

A

A Local Network Gateway is an object in Azure that represents your on-premise VPN device.
A Virtual Network Gateway is the VPN object at the Azure end of the VPN.
A ‘connection’ is what connects the Local Network Gateway and the Virtual Network Gateway to bring up the VPN.

The local network gateway typically refers to your on-premises location.
You give the site a name by which Azure can refer to it, then specify the IP address of the on-premises VPN device to which you will create a connection.
You also specify the IP address prefixes that will be routed through the VPN gateway to the VPN device.
The address prefixes you specify are the prefixes located on your on-premises network.
If your on-premises network changes or you need to change the public IP address for the VPN device, you can easily update the values later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Your company is considering using Linux-based Azure Container Instance to deploy a simple app. The app runs as a stateful app.
You need to provide storage to retrieve and persist state.
What type of storage should you use?

A

Azure Files
Only storage that supports persistant storage for ACI
Need to create the share and then create a container specifying the share and volume mount point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

True or False?
Azure Virtual Desktop supports Remote Desktop clients on MacOS and iOS

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

True or False?
Azure Virtual Desktop users should exist in the same Windows Server Active Directory (AD) that is linked to MS Entra ID

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

True or False?
Virtual Network peering can be used to connect virtual networks across Azure Regions

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

True or False?
Virtual Network peering can be used to transfer data between MS Entra tenants

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

True or False?
Configuring peering requires a short downtime for the peered Vnet

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

You have completed the migration of your org’s core servers and processes to cloud-based VMs
Your final project involves migrating a weekly batch-processing task that can run anytime during the weekend and relies on operating system drivers to print PDF reports.
You also need to minimize costs.
What should you do?

A

Run the batch processing task using spot instances
Spot instances or VMs:
* reduce cost by taking advantage of unutilized compute capacity
* However, they don’t offer guaranteed compute resources at a specific time
* Perfect for batch and other asynchronous processing that can occur on a flexible schedule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is Azure spot instance?

A

Spot pricing provides access to Azure compute resources at deep discounts when unused.
You can set the maximum price that you agree to pay: when it’s reached or if Azure has no computer capacity available, your spot VMs are automatically evicted

Azure capacity is available
Spot VMs have no SLA
If Azure needs capacity back, spot VMs can be evicted with a 30 secs notice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What’s Azure Dedicated Host?

A

Provides physical servers dedicated to your organizational workload only and not shared with other Azure customers.
You are billed at the host level, regardless of the number of VMs you deploy

33
Q

What is Azure key vault?

A

Azure Keyvault is used to securely store secret objects.
Features include
* securing storage and controlled access to token, passwords, certificates, API keys etc
* creating and controlling encryption keys used to encrypt data
* provisioning, managing, and deploying both public and private SSL/TLS certificates
* Storing secrets and keys proteted by software or FIPS 140-2 level 2 validated hardware security modules

34
Q

MS Entra ID and Active Directory Federation Services
When they both exist what’s the consequence on authentication process ?

A

When it’s used with on perm Active Directory Federation Services, MS Entra ID hands off authentication to the AD FS server

MS Entra ID authentication and authorization support doesn’t require integration with an on-perm AD.

35
Q

Is it possible to authenticate with MS Entra ID on a web app?

A

Web apps must be registered with MS Entra ID to support authentication and authorization services.
Registration is through the MS Azure Management Portal

36
Q

2 companies have their own MS Entra tenants. One acquires the other.
The billing ownership of a subscription for an account in your MS Entra tenant is transfered to an account in another MS Entra tenant. It associates the subscription with the new directory.
What happens to the users and groups with role-based access to manage the subscription?

A

They loose their access

RBAC assignments do not carry over when you associate the subscription with a new tenant
Classic subscription admin (Service admin or Co-admin) lose access
The only user initially able to manage resources in the subscription is the user account that accepts the transfer

37
Q

2 companies have their own MS Entra tenants. One acquires the other.
The billing ownership of a subscription for an account in your MS Entra tenant is transfered to an account in another MS Entra tenant. It associates the subscription with the new directory.
What happens to System assigned Managed IDs?

A

They are NOT re-enabled automatically
They must be re-enabled after the transfer

38
Q

2 companies have their own MS Entra tenants. One acquires the other.
The billing ownership of a subscription for an account in your MS Entra tenant is transfered to an account in another MS Entra tenant. It associates the subscription with the new directory.
What happens to the Azure Kubernetes Service cluster owned by the subscription? Does this cause the AKS to lose functionality?

A

the Azure Kubernetes Service cluster owned by the subscription looses its functionalities
This is due to lost service principal and lost role assignments

39
Q

You want to publish on perm web app using MS Entra ID functionality to authenticate.
Which minimum license do you need?

40
Q

You want on perm directory synchro with MS Entra ID
Which minimum license should you use?

A

You can use the free one
It also supports SSO and user and group management

41
Q

You want on-perm users to be able to reset their passwords
Which minimum MS Entra ID license should you use?

42
Q

What is the use of Application security groups?

A

Application security groups enable you to configure network security as a natural extension of an application’s structure, allowing you to group virtual machines, or similar servers, and define network security policies based on those groups.
You can reuse your security policy at scale without manual maintenance of explicit IP addresses.

43
Q

Which solutions can you use to transfer an on-perm virtual hard disk to Azure?

A
  • Azure Copy, using Azure PowerShell or Azure CLI (or Azure CloudShell): CLI to upload and download data to and from Azure Blob, to transfer data within Azure storage accounts or between them
  • Azure Storage Explorer
44
Q

You use MS 365 for email. You need to ensure that users do not accidentally send credit card numbers to external customers via email
What can you do?

A

In MS Purview
1. Identify and define a sensitive information type
2. Define a MS Purview Data Loss Prevention (DLP) Policy

MS Purview comes bundled with predifined info types that you can use to scan content for sensitive infos (credit cards numbers…)

45
Q

What can you use to migrate quickly an SQL Server from an on-perm to Azure with retention of operating system access?

A

SQL Server on Azure VMs

46
Q

What can you use as a cost effective, serverless database with an intermittent usage pattern and low compute utilization over time?

A

Azure SQL Database

47
Q

What an you use to lift and shift an on perm SQL server with minimal changes to an Azure PaaS solution?

A

Azure SQL Managed Instance
SQL Managed Instance allows existing SQL Server customers to lift and shift their on-premises applications to the cloud with minimal application and database changes

48
Q

Which features are supported by MS Entra ID P1 edition?

A

MS Entra ID P1 edition supports
* RBAC
* MS Entra Conditional access
* users and groups management (like free version)
* authentication (like free version)
* SSO (like free version)

49
Q

Which features are supported by MS Entra ID P2 edition?

A

MS Entra ID P2 edition supports
* users and groups management (like free version)
* authentication (like free version)
* SSO (like free version)
* RBAC (like P1)
* MS Entra Conditional access (like P1)
* Identity Protection
* Self service entitled management
* Privileged Identity Management
* just in time access

50
Q

True or false?
A Network Security group can be used with virtual networks in multiple regions.

A

False.
An NSG can ONLY be associated with Vnets in THE SAME REGION in which it was created

51
Q

True or false?
You can associate a Network seurity group with more than one network interface and subnet

A

True
Multiple networks interfaces and subnets can share the same NSG

52
Q

Does MS Entra ID provides Active Directory Federation Services?

A

No
If you need ADFS you need to keep it and your AD domain controllers are still required to support ADFS authentication

53
Q

Azure Storage is an example of
* IaaS
* PaaS
* SaaS

A

IaaS
In IaaS, network, compute and storage resources are offered

54
Q

What is Application Insights?

A

Application Insights is a feature of Azure Monitor that allows you to visually analyse telemetry data.
It’s an App Performance Management service.
Developer can install a small instrumentation package in their web app to send telemetry data to Azure

55
Q

You use an Application Container Instance.
You want to store its data, in a persistent state.
What is the type of storage you must choose?

A

For ACI persistent storage, the only storage option is Azure Files
You would need to create the share and then create a container specifying the share and volume mount point

56
Q

Describe Azure Cloud Adaption Framework steps

A
  • Strategy: define business justification and expected outcomes of adoption
  • Plan align actionable adoption plans with business outcomes. Inventory of digital estate, establish plans, manage plan changes
  • Ready: prepare the cloud environment for the planned changes
  • Adopt: how to migrate, modernize, innovate, and relocate workloads in Azure
  • Govern: structured approach for establishing and optimizing cloud governance
  • Manage: define, establish and expand management baseline
  • Secure: structured approach for securing your Azure cloud estate.
  • Organize: approach to establishing and maintaining the proper organizational structures
57
Q

What is Infrastucture as a Code (IaC)?

A

Infrastructure as code (IaC) uses DevOps methodology and versioning with a descriptive model to define and deploy infrastructure, such as networks, virtual machines, load balancers, and connection topologies.
Just as the same source code always generates the same binary, an IaC model generates the same environment every time it deploys.

58
Q

Name some Infrastucture as a Code (IaC) benefits

A
  • Avoid manual configuration to enforce consistency: you create a master copy of device, once the template is created and tested, it can be deployed over and over, whenever needed. It facilitates the centralized storage and management of these configurations.
  • Deliver stable test environments rapidly at scale
  • By representing desired environment states via well-documented code in formats such as JSON,
59
Q

Name some Infrastucture as a Code (IaC) limits

A
  • Non administrative users can make configuration changes
  • Administrators are still required to maintain configurations for network devices: laC does not eliminate the requirement for administrators to create and test configurations. It facilitates the centralized storage and management of these configurations.
60
Q

There are 6 required resources for deploying a VPN Gateway. List them

A
  • Virtual network
  • A Subnet named “Gateway SubNet”
  • Public IP add
  • Local Network Gateway (on your VPN on perm device, on site, on point…)
  • Virtual network gateway
  • Connection
61
Q

What is Azure Databox Gateway?

A

Azure Data Box Gateway is a storage solution to and from Azure Data Box.
You can use it to replicate data:
* between on perm storage and Azure Data Box
* to transfer data into and out of Azure storage accounts using you Data box.

The virtual device resides in your premises and you write data to it using the NFS and SMB protocols.
The device then transfers your data to Azure block blob, page blob, or Azure Files.

62
Q

What is Azure Data Share?

A

Using Data Share, a data provider can share data and manage their shares all in one place. They can stay in control of how their data is handled by specifying terms of use for their data share.
The data consumer must accept these terms before being able to receive the data.
Data providers can specify the frequency at which their data consumers receive updates. Access to new updates can be revoked at any time by the data provider.

63
Q

What are managed identities for Azure resources?

A

Managed identities provide an automatically managed identity in Microsoft Entra ID for applications to use when connecting to resources that support Microsoft Entra authentication.
Applications can use managed identities to obtain Microsoft Entra tokens without having to manage any credentials.

64
Q

Name some of the benefits of using managed identities

A
  • You don’t need to manage credentials. Credentials aren’t even accessible to you.
  • You can use managed identities to authenticate to any resource that supports Microsoft Entra authentication, including your own applications.
  • Managed identities can be used at no extra cost.
65
Q

A Vnet is created in the scope of a————-

66
Q

For a given scenario, which factors help you to choose between deploying a Vnet peering and deploying a VPN gateway between 2 Vnets?

A

Global VNet Peering provides a low latency, high bandwidth connection useful in scenarios such as cross-region data replication and database failover scenarios.
Since traffic is completely private and remains on the Microsoft backbone, customers with strict data policies prefer to use VNet Peering as public internet is not involved. Since there is no gateway in the path, there are no extra hops, ensuring low latency connections.

VPN Gateways provide a limited bandwidth connection and is useful in scenarios where encryption is needed, but bandwidth restrictions are tolerable. In these scenarios, customers are also not as latency-sensitive.

67
Q

What is Azure Storage Explorer?

A

It’s a cloud storage service that offers secure, scalable, and highly available storage solutions for data, applications, and virtual machines.
It offers a range of storage options, including Blob Storage, File Storage, Queue Storage, and Table Storage.

68
Q

What are some key advantages with ARM?

A
  • Declarative JSON templates; easy infrastructure management
  • Manage a single Resource or a group of them - Deploy and Redeploy easily and consistently
  • Define dependencies between Resources for correct deployment order
  • Apply RBAC (Role Based Access Control)
  • Apply additional Tags/Tagging
69
Q

What is Azure WebJobs?

A

WebJobs is a feature of Azure App Service that allows you to run a program or script in the same context as a Web/API/Mobile app.

Often used to run Background tasks as part of application logic.

70
Q

What is Azure Sentinel and what’s the difference between it and Azure Security Center?

What are four (4) things that it does?

A

Azure’s SIEM System.
This is the system you’d go to for breaches. Unlike Security Center which is proactive prevention, Sentinel is reactive actions and prevention.

  • Data Aggregation at scale; across all users, devices, apps, and both on-prem and cloud infrastructure (even multiple clouds)
  • Detects previously undetected threats using Microsoft’s comprehensive analytics and threat intelligence
  • Investigates threats with AI ; examines suspicious activities at scale
  • Rapid Incident Response with built-in orchestration and automation of common tasks
71
Q

Hint: PS, IA, P, N, C, A, D

What are seven (7) layers that comprise Defense in Depth ?

A
  1. Physical Security Layer
  2. Identity & Access Layer
  3. Perimeter Layer
  4. Network Layer
  5. Compute Layer
  6. Application Layer
  7. Data Layer
72
Q

Which service provides network traffic filtering across multiple Azure subscriptions and virtual networks?

A

Azure Firewall

Caution: NSG cannot because they cannot filter between subscriptions

73
Q

Which resources can be used as a source for a Network security group inbound security rule?

A
  • IP Addresses,
  • Service tags
  • Application security groups
74
Q

You have an Azure Sentinel workspace.
You need to automate responses to threats detected by Azure Sentinel.
What should you use?

A

Azure Sentinel playbooks

75
Q

What is the Microsoft identity platform?

A

cloud identity service that allows you to build applications your users and customers can sign in to using their Microsoft identities or social accounts.
The identity platform supports developers building single-tenant, line-of-business (LOB) applications, as well as multi-tenant software-as-a-service (SaaS) applications.

76
Q

To what should an application connect to retrieve security tokens?

A

The Microsoft identity platform authenticates users and provides security tokens, such as access tokens, refresh tokens, and ID tokens

77
Q

Which resource is required to use Azure Cloud Shell ?

A

A storage account.
The first time you start Cloud Shell, you’re prompted to select your storage options.
If you want store files that can be used every time you use Cloud Shell, you must create new or choose existing storage resources.
Cloud Shell uses a Microsoft Azure Files share to persist files across sessions.

78
Q

How to calculate composite SLA?

A

When combining SLAs across different service offerings, the resultant SLA is a called a Composite SLA.
For example, consider an App Service web app that writes to Azure SQL Database.
At the time of this writing, these Azure services have the following SLAs:
* App Service web apps = 99.95%
* SQL Database = 99.99%

The probability of each service failing is independent, so the composite SLA for this application is 99.95% × 99.99% = 99.94%
That’s lower than the individual SLAs, which isn’t surprising because an application that relies on multiple services has more potential failure points.

79
Q

Which feature in Azure firewall enables users on the internet to access a server on a Vnet ?

A

DNAT rules (Aka Network Address Translation) allow or deny inbound traffic through the firewall public IP address(es).
You can use a DNAT rule when you want a public IP address to be translated into a private IP address.
The Azure Firewall public IP addresses can be used to listen to inbound traffic from the Internet, filter the traffic and translate this traffic to internal resources in Azure.