practice Flashcards
In the Infrastructure as a service cloud service model, the subscriber is responsible for the management of which two components?
- application
- physical networking
- operating system
- storage
- virtualization
Application
Operating system
it stores three data copies in each of two regions
Geo-redundant storage(GRS)
It allows replicated data to be accessed in two zones
Read-access GRS(RA-GRS)
It stores all replicas in one data center
Locally redundant storage(LRS)
(T/F) Azure powershell can be used to create scripts to automate Azure Management tasks
True
(T/F) Azure pwoershell virtual machine(VM) management is limited to WIndows VMs only
False
(T/F) Azure powershell can be run in a browser in the Azure Cloud Shell
True
(T/F)Azure Resource Manager templates use Azure PowerShell syntax
False
(T/F) Azure Active Directory(Azure AD) is used to manage API cryptographic keys
False
(T/F)Azure Storage encryption is enabled by default and cannot be disabled
True
(T/F) Azure Expressroute is used to secure traffic between virtual networks
False
Includes a virtual processor, memory, storage, and networking resources
Azure Virtual Machines
Is a lightweight, virtualized application environment
Container Instances
Includes the abstraction of servers, infrastructure, and operating systems.
Azure functions
Which two locations are valid destination for platform logs and metrics collected by Azure Monitor? Each correct answer presents a complete solution
- a resource health dashboard
- an azure storage account
- an azure log analytics workspace
- an azure advisor monitor
- an azure storage account
- an azure log analytics workspace
_______is the ability to restore a cloud service in the wake of a catastrophic loss
Disaster Recovery
Build a baseline behavioral profile of organizational entities to identify anomalous activity
Microsoft Sentinel
Secure store a database connection string to avoid its accidental exposure in a web site’s source code
Azure Key Vault
Deny traffic to your Azure Virtual Network resource from known malicious IP addresses
Azure firewall
____ defines initiative that allows you to control the type of resources that can be deployed
purpose of a resource group
You should use _________ to provision virtual machines automatically
Scale sets
prevents users from deleting resources from a subscription with contents spanning multiple resource groups
Azure locks
use _________ to use any information from Azure Security Center to develop best practices recommendation for optimization
Azure Advisor
use __________ to define a set of policies to help ensure compliance for resource contained in a resource group
Initative
use ________ to define policies you would combine into a set as an Initiative
Azure Policies
____ are used to define granular security for users and groups over management groups, subscriptions, resource groups and resources
role based access controls (RBACs)