Mall Academy AZ-104 Azure Administrator Practice Exam #1 Flashcards
You have an Azure subscription that contains the resources shown in the following table.
Name Type Resource Group
VNET1 Virtual Network RG1
VM1 Virtual Machine RG1
The Not Allowed resource types Azure Policy is assigned to RG1 and uses the following parameters:
Microsoft.Network/virtualNetworks
Microsoft.Compute/virtualMachines
In RG1, you need to create a new virtual machine named V2, and then connect to VM2 to VNET1. What should you do first?
A. Remove Microsoft.Compute/virtualMachines from the policy
B. Create an Azure Resource Manager Template
C. Add a subnet to VNET1
D. Remove Microsoft.Network/virtualNetworks from the policy
A. Remove Microsoft.Compute/virtualMachines from the policy
Explanation:
The Not allowed resource types Azure policy prohibits the deployment of specified resource types. You specify an array of the resource types to block.Virtual Networks and Virtual Machines are prohibited
You have an Azure subscription that contains 10 virtual networks. The virtual networks are hosted in separate resource groups.
Another administrator plans to create several network security groups (Network Security Groupss) in the subscription.
You need to ensure that when an Network Security Groups is created, it automatically blocks TCP port 8080 between the virtual networks.
Solution: From the Resource providers blade, you unregister the Microsoft.ClassicNetwork provider.
Does this meet the goal?
A. No
B. Yes
A. No
Explanation:
You should use a policy definition. Reference: https://docs.microsoft.com/en-us/azure/azure-policy/policy-definition
From the MFA Server blade, you open the Block/unblock users blade as shown in the exhibit. What caused AlexW to be blocked?
A. The user reported a fraud alert when prompted for additional authentication
B. The user account password expired
C. The user entered an incorrect PIN four times within 10 minutes
D. An administrator manually blocked the user
D. An administrator manually blocked the user
Explanation:
Only an admin can block users and not a reason and complaints in terms of the software way of working.
An Administrator can block a user:
- Sign in to the Azure portal as an administrator.
- Browse to Azure Active Directory > MFA > Block/unblock users.
- Select Add to block a user.
- Select the Replication Group. Enter the username for the blocked user as username@domain.com. Enter a comment in the Reason field, for example: Lost phone.
- Select Add to finish blocking the user.
Reference:https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings
Azure Log Analytics can consolidate machine data from on-premises and cloud-based workloads and this data is indexed and categorized for quick searching. Data can be collected only from Windows machines.
A. TRUE
B. FALSE
B. FALSE
Explanation:
Azure Log Analytics can consolidate machine data from on premises and cloud based workloads and this data is indexed and categorized for quick searching. Data can be collected from both Windows and Linux machines
You have an Azure Active Directory (Azure AD) tenant named contosocloud.onmicrosoft.com.
Your company has a public DNS zone for contoso.com.
You add contoso.com as a custom domain name to Azure AD.You need to ensure that Azure can verify the domain name.
Which type of DNS record should you create?
A. PTR
B. SRV
C. RRSIG
D. TXT
D. TXT
Explanation:
You can use either a TXT or MX record to verify the custom domain in the Azure AD
References: https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/add-custom-domain
You have two Azure virtual networks named VNet1 and VNet2.
VNet1 contains an Azure virtual machine named VM1. VNet2 contains an Azure virtual machine named VM2.
VM1 hosts a frontend application that connects to VM2 to retrieve data.
Users report that the frontend application is slower than usual.
You need to view the average round-trip time (RTT) of the packets from VM1 to VM2.
Which Azure Network Watcher feature should you use?
A. Connection Troubleshoot
B. IP Flow Verify
C. Network Security Groups flow logs
D. Connection Monitor
D. Connection Monitor
Explanation:
The connection monitor capability monitors communication at a regular interval and informs you of reachability, latency and network topology changes between the VM and the endpoint
You have the Azure virtual networks shown in the following table.
To which virtual networks can you establish a peering connection from VNet1?
A. VNet2 only
B. VNet2, VNet3 and VNet4
C. VNet2 and VNet3 only
D. VNet3 and VNet4 only
D. VNet3 and VNet4 only
Explanation:
To avoid IP address overlaps, we can only peer with VNET3 and VNET4.
References:
https://docs.microsoft.com/en-us/azure/virtual-network/tutorial-connect-virtual-networks-portal
You have an Azure subscription that contains a virtual network named VNET1. VNET1 contains the subnets shown in the following table.
Each virtual machine uses a static IP address.You need to create network security groups (Network Security Groupss) to meet following requirements:
✑ Allow web requests from the internet to VM3, VM4, VM5, and VM6.
✑ Allow all connections between VM1 and VM2.
✑ Allow Remote Desktop connections to VM1.
Prevent all other network traffic to VNET1.What is the minimum number of Network Security Groupss you should create?
A. 1
B. 3
C. 4
D. 12
C. 4
Explanation:
A network security group (Network Security Groups) contains a list of security rules that allow or deny network traffic to resources connected to Azure Virtual Networks (VNet).
Network Security Groupss can be associated to subnets, individual VMs (classic), or individual network interfaces (NIC) attached to VMs (Resource Manager). Each network security group also contains default security rules.
References: https://docs.microsoft.com/en-us/azure/virtual-network/security-overview#default-security-rules
You manage a virtual network named VNet1 that is hosted in the West US Azure region.
VNet1 hosts two virtual machines named VM1 and VM2 that run Windows Server.
You need to inspect all the network traffic from VM1 to VM2 for a period of three hours.
Solution: From Performance Monitor, you create a Data Collector Set (DCS).
Does this meet the goal?
A. No
B. Yes
A. No
Explanation:
Use the Connection Monitor feature of Azure Network Watcher.
References: https://docs.microsoft.com/en-us/azure/network-watcher/network-watcher-monitoring-overview
You have an Azure DNS zone named adatum.com.You need to delegate a subdomain named research.adatum.com to a different DNS server in Azure.What should you do?
A. Create an NS record named research in the adatum.com zone
B. Create an A record named *.research in the adatum.com zone
C. Modify the SOA record of adatum.com
D. Create a PTR record named research in the adatum.com zone
A. Create an NS record named research in the adatum.com zone
Explanation:
You need to create a name server (NS) record for the zone. References: https://docs.microsoft.com/en-us/azure/dns/delegate-subdomain
Role-based access control allows you to grant users, groups, and service principals access to Azure resources at the subscription, resource group, or resource scopes with RBAC inheritance. The three core roles are Owner, Administrator, and Guest.
A. FALSE
B. TRUE
A. FALSE
Explanation:
Role-based access control allows you to grant users, groups, and service principals access to Azure resources at the subscription, resource group, or resource scopes with RBAC inheritance. The three core roles are Owner, Contributor, and Reader.
Azure storage accounts provide ___________________ .
A. blobs
B. tables
C. Queues
D. Files
A. blobs
B. tables
C. Queues
D. Files
Explanation:
Azure storage accounts provide 4 separate services: blobs, tables, queues and files. Understand the usage scenarios of each service.
You have an Azure virtual machine named VM1. The network interface for VM1 is configured as shown in the picture.
You deploy a web server on VM1, and then create a secure website that is accessible by using the HTTPS protocol.
VM1 is used as a web server only.
You need to ensure that users can connect to the website from the internet. What should you do?
You have an Azure subscription named Subscription1 and two Azure Active Directory (Azure AD) tenants named Tenant1 and Tenant2.
Subscription1 is associated to Tenant1. Multi-factor authentication (MFA) is enabled for all the users in Tenant1.
You need to enable MFA for the users in Tenant2. The solution must maintain MFA for Tenant1.
What should you do first?
A. Change the directory for subscription1
B. Configure the MFA server setting in Tenant1
C. Create and link a subscription to Tenant2
D. Transfer the administration of Subsription1 to a global admin of Tenant2
C. Create and link a subscription to Tenant2
Explanation:
You configure Azure AD Connect for Azure Active Directory Seamless Single Sign-On (Azure AD Seamless SSO) for an on-premises network.Users report that when they attempt to access myapps.microsoft.com, they are prompted multiple times to sign in and are forced to use an account name that ends with onmicrosoft.com.
You discover that there is a UPN mismatch between Azure AD and the on-premises Active Directory.
You need to ensure that the users can use single-sign-on (SSO) to access Azure resources.
What should you do first?
A. From the on premises network, deploy Active Directory Federation Services (AD FS)
B. From the server that runs Azure AD Connect, modify the filtering options
C. From Azure AD, add and verify a custom domain name
D. From the on premises network, request a new cert that contains the AD Domain name
C. From Azure AD, add and verify a custom domain name
Explanation:
Every new Azure AD tenant comes with an initial domain name, domainname.onmicrosoft.com. You can’t change or delete the initial domain name, but you can add your organization’s names to the list. Adding custom domain names helps you to create user names that are familiar to your users, such as alain@contoso.com.
References: https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/add-custom-domain
You have an Azure Active Directory (Azure AD) tenant.All administrators must enter a verification code to access the Azure portal.You need to ensure that the administrators can access the Azure portal only from your on-premises network.What should you configure?
A. the MFA service settings
B. The default for all the roles in Azure AD privileged identity management
C. an Azure AD Identity Protection user risk policy
A. the MFA service settings
Explanation:
You have an Azure subscription that contains 10 virtual networks. The virtual networks are hosted in separate resource groups.
Another administrator plans to create several network security groups (Network Security Groupss) in the subscription.
You need to ensure that when an Network Security Groups is created, it automatically blocks TCP port 8080 between the virtual networks.
Solution: You configure a custom policy definition, and then you assign the policy to the subscription.
Does this meet the goal?
A. No
B. Yes
B. Yes
Explanation:
Resource policy definition used by Azure Policy enables you to establish conventions for resources in your organization by describing when the policy is enforced and what effect to take. By defining conventions, you can control costs and more easily manage your resources. Reference: https://docs.microsoft.com/en-us/azure/azure-policy/policy-definition
You can create resources only from the Azure Resource Manager templates
A. TRUE
B. FALSE
B. FALSE
Explanation:
You can create resources from the portal, PowerShell, the CLI tools, and Azure Resource Manager templates. You should understand when to use which tool and how to configure the resource during provisioning and after provisioning.
You have an Azure subscription that contains a policy-based virtual network gateway named GW1 and a virtual network named VNet1.You need to ensure that you can configure a point-to-site connection from VNet1 to an on-premises computer.Which two actions should you perform? Each correct answer presents part of the solution.NOTE: Each correct selection is worth one point.
A. Reset GW1
B. Add a public IP address space to VNet1
C. Add a connection to GW1
D. Delete GW1
E. Create a route based virtual network gateway
D. Delete GW1
E. Create a route based virtual network gateway
Explanation:
A VPN gateway is used when creating a VPN connection to your on-premises network.Route-based VPN devices use any-to-any (wildcard) traffic selectors, and let routing/forwarding tables direct traffic to different IPsec tunnels. It is typically built on router platforms where each IPsec tunnel is modeled as a network interface or VTI (virtual tunnel interface). Policy-based VPN devices use the combinations of prefixes from both networks to define how traffic is encrypted/decrypted through IPsec tunnels. It is typically built on firewall devices that perform packet filtering. IPsec tunnel encryption and decryption are added to the packet filtering and processing engine.
Incorrect Answers: Point-to-Site connections do not require a VPN device or a public-facing IP address.
References: https://docs.microsoft.com/en-us/azure/vpn-gateway/create-routebased-vpn-gateway-portal https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-connect-multiple-policybased-rm-ps
You have an Azure Active Directory (Azure AD) tenant. You have an existing Azure AD conditional access policy named Policy1. Policy1 enforces the use of Azure AD-joined devices when members of the GlobalAdministrators group authenticate to Azure AD from untrusted locations.You need to ensure that members of the Global Administrators group will also be forced to use multi-factor authentication when authenticating from untrusted locations.What should you do?
A. From the MFA page, modify the user settings
B. From the Azure portal, modify session control of Policy 1
C. From the Azure portal, modify grant control of Policy1
D. From the MFA page, modify the service settings
C. From the Azure portal, modify grant control of Policy1
Explanation:
There are two types of controls: Grant controls “ To gate access Session controls “ To restrict access to a sessionGrant controls oversee whether a user can complete authentication and reach the resource that they’re attempting to sign-in to.
If you have multiple controls selected, you can configure whether all of them are required when your policy is processed.
The current implementation of Azure Active Directory enables you to set the following grant control requirements:
Reference: https://blog.lumen21.com/2017/12/15/conditional-access-in-azure-active-directory/
A resource group are multiple resources in one group, not necessary a logical grouping.
A. TRUE
B. FALSE
B. FALSE
Explanation:
A resource group is a logical grouping of resources. For example, a Resource Group where you deploy a VM compute instance may be composed of a Network Interface Card (NIC), a Virtual Machine, a Virtual Network, and a Public IP Address.
A resource is simply a single service instance in Azure. Most services in Azure can be represented as a resource. For example, a Web App instance is a resource. An App Service Plan is also a resource. Even a SQL Database instance is a resource.
A. FALSE
B. TRUE
B. TRUE
Explanation:
A resource is simply a single service instance in Azure. Most services in Azure can be represented as a resource. For example, a Web App instance is a resource. An App Service Plan is also a resource. Even a SQL Database instance is a resource.
You manage a virtual network named VNet1 that is hosted in the West US Azure region. VNet1 hosts two virtual machines named VM1 and VM2 that run Windows Server. You need to inspect all the network traffic from VM1 to VM2 for a period of three hours.
Solution: From Azure Network Watcher, you create a connection monitor.
Does this meet the goal?
A. Yes
B. NO
A. Yes
Explanation:
References: https://azure.microsoft.com/en-us/updates/general-availability-azure-network-watcher-connection-monitor-in-all-public-regions/
You manage a virtual network named VNet1 that is hosted in the West US Azure region.
VNet1 hosts two virtual machines named VM1 and VM2 that run Windows Server.
You need to inspect all the network traffic from VM1 to VM2 for a period of three hours.
Solution: From Azure Network Watcher, you create a packet capture. Does this meet the goal?
A. Yes
B. No
A. Yes
Explanation:
Answer is Yes. Create a connection monitor to monitor communication over i.e TCP port 22, from VM1 to VM2
Read link below.
You need to inspect and capture all the network traffic from VM1 to VM2 for a period of three hours. through Azure Network Watcher, you create a packet capture.
https://docs.microsoft.com/en-us/azure/network-watcher/connection-monitor