General Flashcards

(104 cards)

1
Q

Export all resource in a RG as a template

A

Export-AzResourceGroup cmdlet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Create a template from a deployment in the deployment history of a RG.

A

Save-AzResourceGroupDeploymentTemplate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Deployment history of RG

A

Get-AzResourceGroupDeployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

All operations performed during deployment

A

Get-AzResourceGroupDeploymentOperation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Register this provider namespace for Azure Log Analytics workspace.

A

Microsoft.OperationalInsights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Register this provider namespace for Azure Policy which is used for governance and guard rails within the Azure landing zone

A

Microsoft.PolicyInsights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Register this provider namespace forAzure Autmoation that automates different tasks within the environment (ex: patching servers)

A

Microsoft.Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Register this provider namespace for Azure Event Hubs, a big data streaming platform and event ingestion service that can be integrated with Azure native services.

A

Microsoft.NotificationHubs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. ArcPull
  2. ArcPush
  3. Owner
A

Authenticate with an ACR using Azure AD service principal.
What are the roles assigned to ACR to pull a non-quarantined image?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pull.
Docker pull a non-quarantined image or pull another supported artifact, such as Helm chart, from a registry.
Requires authentication with the registry using authorized identity.

A

ArcPull

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pull and push
Docker push an image or push another supported artifact, such as Helm chart, to a registry.
Requires authentication with the registry using authorized identity.

A

ArcPush

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pull, push, and assign roles to others
Access resource manager
Create/delete registry
Push/pull image
Delete image data
Change policies
No - assign images

A

ACR role - Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Delete container images or other supported artifacts such as Helm chart, from a registry.

A

ArcDelete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sign images, usually assigned to an automated process, which would use a service principal

A

ArcImageSigner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True/False
KEDA checks once every 30 seconds

A

True (KEDA polling interval)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True/False
If queue is > 0, KEDA scales the app by adding one new instance

A

True (KEDA scale up step)
Rate new instances are added: 1, 4, 8, 16, 32, …, maxReplicas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Scale up to 30 host instances
Enhanced compute capabilities
Web apps are hosted on dedicated VMs

A

Azure App Service plan: Premium V2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Virtual instances are shared with other customers.
Multi-tenant infrastructure.
Designed for development and testing
No autoscale
1 instance

A

Azure App Service plan: Shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Expensive

A

Azure App Service plan: Isolated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Scale up to 10 host instances
Storage 5 GB
Web apps are hosted on dedicated VMs

A

Azure App Service plan: Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Deployment template file
Gets the resource group object that will be used to deploy the template.
resourceGroup().location = location parameter

A

resourceGroup()

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Deploy scripts as continuous WebJobs
Create as linked to a web project
Supported in Basic App Service plan

A

WebJobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

3 instances
No autoscale

A

Azure App Service plan: Basic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Can be hosted on Windows or Linux

A

.NET Core 3.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Can be hosted on Windows
ASP.NET 4.8
26
Networking feature Configure access to App Services Provide service endpoints or private endpoints Load balancing between regional instances
Azure Application Gateway
27
Create scalable web applications with instances across multiple regions Support for Web Application Firewall Load balancing across multiple regions
Azure Front Door
28
Efficiently deliver web content to globally distributed users. High-bandwidth physical delivery nodes placed at strategic locations across the globe.
Azure Content Delivery Network (CDN) endpoints
29
Centralize an organization's file shares Cache Azure file shares to on-premises Windows file servers
Azure File Sync
30
Can be hosted on Linux
PHP 7.3
31
Can be hosted on Linux
Ruby 2.6
32
Adds additional fieds during the creation/update of a resource If field exists and values are different from policy, policy acts as a deny
Subscription Policy - Append effect
33
Create a warning event in the activity log for non-compliant resources
Subscription Policy - Audit effect
34
Evaluated if the request executed by Resource Provider resturns a success status code. Triggered if the resource does NOT exist or the resource defined by ExistenceCondition is evaluated as false
Subscription Policy - DeployIfNotExists effect
35
Disabled Append Deny Audit
Subscription Policy - order of effect evaluation
36
create new resource tag
New-AzTag
37
1. Create Azure AD group; add users to group 2. Enable SSPR with Selected option 3. Select Azure AD group for which you want to allow SSPR 4. Register authentication method for SSPR
Steps to configure SSPR
38
User Azure CLI Ensures that the subscription logged into works with Azure Policies Microsoft.PolicyInsights Contributor & Owner roles
Azure Policy Insights
39
Create/configure policies Create support tickets Read resources
Resource Policy Contributor
40
Prevents deletion of resources in RG. Allows changes to resources in RG.
CanNotDelete lock
41
Prevent addition of resources to RG
ReadOnly lock
42
Cost savings by leveraging existing on-premises licenses.
Azure Hybird Benefit
43
Quickly deploy/manage identical load balanced VMs
VM scale set
44
User Principal Names Add UPN as guest users in Azure AD tenant. This sends an invitation to users to access services.
UPN
45
Need to enable Allow hybrid users to use SSPR
Password writeback
46
Specify requirements for users to access Azure AD protected apps
Conditional access policy
47
Prevents configuration drift on newly deployed or existing Azure or on-premises nodes
Azure Automation Desired State Configuration (DSC)
48
Allows customers to define own rules for using Azure. JSON statements
Custom Azure Policy template
49
Remove subscription from current management group
Remove-AzManagementGroupSubscription
50
Add subscription to a management group
New-AzManagementGroupSubscription
51
Delete management group
Remove-AzManagementGroup
52
Update supported parameters, such as display name or change the management group parent
Update-AzManagementGroup
53
An App Service cannot be moved with an SSL certificate configured
SSL (Secure Sockets Layer)
54
Do NOT move within same subscription.
Load Balancer
55
Disable before moving VNet.
peer VNet
56
Can be moved within same subscription. Move all dependent resources with it (Redis cache)
VNet
57
Azure AD entitlement management with Microsoft Graph PowerShell. Retrieve catalog identifier
Microsoft Entra ID Governance
58
Required for SSPR
Azure AD Premim P1
59
Required for SSPR. Secure way to send password updates back from Azure AD to onpremises AD DS
Azure AD Connect
60
Create/manage users, groups Manage support tickets Monitor service health
User Access Administrator
61
Manage user access to Azure resources but grants full access to all resources User Access Administrator Role + Contributor Role
Owner role
62
Create/manage all types of resources NO - manage users' access to resources in subscription
Contributor Role
63
No - Azure resources Grants permissions to manage users/groups in Azure AD tenant associated with subscription
User Administrator role
64
Roles assigned to resources does NOT move - orphanced The roles need to be re-created
Migration between subscriptions
65
One of the products specified in the group contains a service plan that conflics with another service plan already assigned to the user via a different product.
MutuallyExclusiveViolation
66
LRS to ZRS Azure Files NFSv4.1
Manual migration of file storage
67
LRS to GRS and RA-GRS
Azure portal migration of file storage
68
LRS to GRS and RA-GRS
PowerShell migration of file storage
69
LRS to ZRS NOT Azure Files NFSv4.1
Live migration of file storage
70
1. Open Azure Storage Explorer 2. Connecto to " 3. Create blob container 4. Upload blob to blob container 5. Get SAS for blob and specify start/expiry time and permissions 6. Use HTTPS to provide access of the URL to user
Steps to give SAS access using Azure Storage Explorer
71
Use to migrate resources into Blob Storage , Queue, and Table resources using AzCopy. User Azure AD credentials
Azure AD authorization
72
Use for Azure files, an identity-based authorization over SMB Hosted in Azure
Azure AD DS authorization
73
Use for Azure files, an identity-based authorization over SMB Hosted on-prem
AD DS authorization
74
1. Create storage account (New-AzStrorageAccount) 2. Get access key (Get-AzStorageAccountKeys) 3&4. Create file share - New-AzStorageContext - New-AzStorageShare 5. CMDKEY on Windows Servers - to store access 6. New-PSDrive on Windows Servers - map drive
Steps to mount file share in a new storage account
75
Requirement for mounting Azure file sahre as on-premises SMB file share on on-premises network
TCP port 445 open in on-premises internet firewall
76
Private connection between on-premises network and Microsoft cloud. No need to configure on-premises firewall
ExpressRoute circuit
77
Set Share ACL operation with SMB protocol Additional level of control over SAS
Stored Access Policy for file shares
78
Physical device Import/export data from Azure Terabytes of data
Azure Data Box
79
Enables service endpoint (Microsoft.Storage) on the subnet for a storage account Allows connections from storage account to subnet.
Set-AzVirtualNetworkSubnetConfig
80
Makes the changes persistent
Set-AzVirtualNetwork
81
Add firewall exception on the NetworkRule property in the storage account. Allows communication from subnet to storage account
Add-AzStorageAccountNetworkRule
82
Updates NetworkRule property to allow other Azure services, like Backup or Event Hubs, to have access to storage account
Update-AzStorageAccountNetworkRuleSet
83
Allow connections from other Azure services
Update-AzStorageAccountNetworkRuleSet -Bypass AzureServices
84
Modify storage account Set a tag, update customer domain, update type of account
Set-AzStorageAccount
85
Remove NetworkRule property from storage account
Remove-AzStorageAccountNetworkRuleSet
86
-Bypass -None (remove access to all Azure services) -Metrics -Logging
Parameters for Update-AzStorageAccountNetworkRuleSet
87
Shared Access Signature URL Define time-limited read-only or read-write access to storage account resource Configure a stored access policy Validate data written using a SAS Revoke SAS by deleting a stored access policy
SAS
88
Azure AD, SAS
Blob storage authentication methods
89
SAS
File storage authentication methods
90
Port 445 Users SMB protocol on port 445 Error 67 - blocked port - Can use domain services, either on-premises or in Azure, to support identity-based access to Azure file shares over SMB protocol
Azure file shares
91
Port 2049
Network File Share (NFS) protocol
92
Error 53 Suuport Azure file shares
New Technology LAN Manager version 1 (NTLMv2)
93
2 options: 1. ad-hoc SAS 2. stored access policy
SAS options
94
Specify start & expiration time, permissions to URI
ad-hoc SAS
95
96
1. Put Blob 2. Put Block List 3. Copy Blob 4. Set Blob Metadata
Blob versioning
97
Create new block, page, or append blob Update existing block blob (overwrite metadata)
Blob versioning - Put Blob
98
Writes a blob by specifying the list of block IDs that make up the blobl. Update a blob by uploading only those blocks that have changed and committing the new/existing blocks together
Blob versioning - Put Block List
99
Copies a blob to a destination within the storage account
Blob versioning - Copy Blob
100
Sets user-defined metadata for the specified blob as one or more name-value pairs
Blob versioning - Set Blob Metadata
101
Zone-redundant storage Copies data synchronously across 3 AZs in the primary region to provide high availability Protects against failure at physical location bud does not protect against region-wide failures.
ZRS
102
Locally Redundant Storage Copie data synchronously 3x within a single physical location
LRS
103
GRS - protect against reginal outages GZRS - maximize availability and durability of
GRS, GZRS
104