Reviewnprep 1 Flashcards
Your network contains an on premises Active Directory domain named corp.contoso.com.
You have an Azure subscription named Sub1 that is associated to an Azure Active Directory tenant named contoso.com.
You sync all on premises identities to Azure AD. You need to prevent users who have a givenName attribute that starts with TEST from being synced to Azure AD. The solution must minimize administrative effort. What should you use?
A. Synchronization Rules Editor
B. Web Service Configuration Tool
C. The Azure AD Connect Wizard
D. Active Directory Users and Computers
E. None of these
A. Synchronization Rules Editor
Explanation:
Use the Synchronization Rules Editor and write attribute based filtering rules
The Synchronization Rules Editor is used to see and change the default configuration. You can find it on the Start menu under the Azure AD Connect group
You have a hybrid configuration of Azure Active Directory (Azure AD).
All users have computers that run Windows 10 and are hybrid Azure AD joined.
You have an Azure SQL database that is configured to support Azure AD Authentication.
Database developers must connect to the SQL Database by using Microsoft SQL server Management Studio (SSMS) and authenticate by using their on premises Active Directory account.
You need to tell the developers which authentication method to use to connect to the SQL database from SSMS. The solution must minimize authentication prompts.
Which authentication method should you instruct the developers to use?
A. SQL Login
B. Active Directory - Universal with MFA support
C. Active Directory - Integrated
D. Active Directory - Password
C. Active Directory - Integrated
Explanation:
Use this method if you are logged into Windows using your Azure Active Directory credentials from a federated domain, or a managed domain that is configured for seamless single sign on for pass through and password hash authentication. No password is needed or can be entered because your existing credentials will be presented for the connection
You have an Azure subscription. You configure the subscription to use a different Azure Active Directory (Azure AD) tenant. What are two possible effects of the change? Each correct answer presents a complete solution
A. Role assignments at the subscription level are lost
B. Virtual machine managed identities are lost
C. Virtual machine disk snapshots are lost
D. Existing Azure resources are deleted
A. Role assignments at the subscription level are lost
B. Virtual machine managed identities are lost
Explanation:
Because you can associated or add an Azure subscription to your Azure Active Directory tenant, do the following:
- Users that have been assigned roles using Azure RBAC will lose their access
- Service Administrator and Co Administrators will loss access
- If you have any key vaults, they will be inaccessible and you will have to fix them after association
- If you have any managed identities for resources such as Virtual Machines or Logic Apps, you must re enable or recreate them after the associations
You have an Azure subscription that contains an Azure key vault named Vault1
In Vault1, you create a secret named Seecret1
An application developer registers an application in Azure Active Directory (Azure AD).
You need to ensure that the application can use Secret1. What should you do?
A. in Azure AD, create a role
B. In Azure Key Vault, create a key
C. In Azure Key Vault, create an access policy
D. In Azure AD, enable Azure AD application proxy
C. In Azure Key Vault, create an access policy
Explanation:
Key Vault access policy determines whether a given service principal, namely an application or user group, can perform different operations on Key Vault secrets, keys and certs.
Access policy is for data plane, which require here for accessing the secret.
You may need to configure the target resource to allow access from your application.
You are troubleshooting a security issue for an Azure Storage account. You enable the diagnostic logs for the storage account. What should you use to retrieve the diagnostics logs?
A. The Security and Compliance Admin Center
B. Azure Security Center
C. Azure Cosmos DB Explorer
D. AzCopy
D. AzCopy
Explanation:
Storage Analytics logs detailed information about successful and failed requests to a storage service. This information can be used to monitor individual requests and to diagnose issues with a storage service. Requests are logged on a best effort basis. To view and analyze your log data, you should download the blobs that contain the log data you are interested in to a local machine. Many storage browsing tools enables you to download blobs from your storage account; you can also use the Azure Storage team provided command line Azure Copy Tool AzCopy to download your log data. AzCopy is a command line utility that you can use to copy blobs or files to or from a storage account
You plan to use Azure Resource Manager templates to perform multiple deployments of identically configured Azure virtual machines. The password for the administrator account of each deployment is stored as a secret in different Azure key vaults. You need to identify a method to dynamically construct a resource ID that will designate the key vault containing the appropriate secret during each deployment. The name of the key vault and the name of the secret will be provided as inline parameters. What should you use to construct the resource ID?
A. A key vault access policy
B. A linked template
C. A parameters file
D. An automation account
E. A configuration file
B. A linked template
Explanation:
You can dynamically generate the resource ID for a key vault secret by using a linked template
You use Azure Security Center for the centralized policy management of three Azure subscriptions. You use several policy definitions to manage the security of the subscriptions. You need to deploy the policy definitions as a group to all three subscriptions. You create an initiative and an assignment that is scoped to a management group. Does this meet the goal?
A. Yes
B. No
A. Yes
Explanation:
Management groups in Microsoft Azure solve the problem of needing to impose governance policy on more than on Azure subscription simultaneously. You need to use an initiative to bundle the policy definitions into a group that can be applied to the management group
You have an Azure subscription that contains a user named User1 and an Azure Container Registry named ConReg1. You enable content trust for ContReg1. You need to ensure that User1 can create trusted images in ContReg1.
The solution must use the principle of least privilege. Which two roles should you assign to user1?
A. ArcQuarantineReader
B. Contributor
C. AcrPush
D. ArcImageSigner
E. ArcQuarantineWriter
C. AcrPush
D. ArcImageSigner
Explanation:
The ability to sign images usually assigned to an automated process, which would use a service principal. This permission is typically combined with push image to allow pushing a trusted image to a registry. This allows the user to sign and push trusted images. Only the users or systems you have granted permission can push trusted images to your registry. To grant trusted image push permission to a user (or a system using a service principal), grant their Azure AD identities the AcrimageSigner role. This is in addition to the AcrPush role required for pushing images to the registry
You use Azure Security Center for the centralized policy management of three Azure subscriptions. You use several policy definitions to manage the security of the subscriptions. You need to deploy the definitions as a group to all three subscriptions. You create a resource graph and an assignment that is scoped to a management group. Does this meet the goal?
A. Yes
B. No
B. No
Explanation:
Management groups in Azure solve the problem of needing to impose governance policy on more than one Azure subscription simultaneously.. However, you need to use an initiative, not a resource graph to bundle the policy definitions into a group that can be applied to the management group. You bundle up policies into initiatives and apply the initiatives to the management groups, not resource graph
Azure Resource Graph is a service in Azure that is designed to extend Azure Resource Management by providing efficient and performant resource exploration with the ability to query at scale across a given set of subscriptions so that you can effectively govern your environment.
You use Azure Security Center for the centralized policy management of three Azure subscriptions. You use several policy definitions to manage the security of the subscriptions. You need to deploy the policy definitions as a group to all three subscriptions. You create a policy definition and assignments that are scoped to resource groups. Does this meet the goal?
A. Yes
B. No
B. No
Explanation:
A resource group is a container that holds related resources for an Azure solution. The resource group can include all the resources for the solution, or only those resources that you want to manage as a group. You decide how you want to allocate resources to resource groups based on what makes the most sense for your organization. Generally, add resources that share the same lifecycle to the same resource group so you can easily deploy, update, and delete them as a group. Management groups in Azure solve the problem of needing to impose governance policy on more than one Azure subscription simultaneously. You can only group multiple subscriptions in a management groups, NOT in resource groups which is meant for multiple resources.
You plan on configuring your Azure SQL deployment such that users can authenticate to it using their Azure AD credentials. What must be done first to allow this?
A. Set an Azure AD admin account for SQL
B. Register SQL as an Azure AD enterprise app
C. Configure Azure AD connect
D. Local Active Directory Domain sync with Azure AD Connect
E. Users must be configure to use MFA
A. Set an Azure AD admin account for SQL
Explanation:
In order to integrate Azure SQL Servers with Azure Active Directory, an Active Directory Admin must be assigned to the SQL server. This account can then log into the SQL server using SMSS and assign other AD user and group principals to the server
Which AAD Connect service allows us to override the default synchronization behavior by creating custom criteria?
A. Synchronization Service
B. Synchronization Rules Editor
C. AAD Connect Wizard
D. Start-ADSyncSyncCycle
B. Synchronization Rules Editor
Explanation:
To create custom rules that modify the behavior of AAD connect object synchronization, we can use the Synchronization Rules Editor
From Azure Security Center, you enable Azure Container Registry vulnerability scanning of the images in Registry1. You perform the following actions:
1. Push a Windows image named Image1 to Registry1
2. Push a Linux image named Image2 to Registry1
3. Push a Windows image named Image3 to Registry1
4. Modify Image1 and push the new image as Image4 to Registry1
5. Modify Image2 and push the new image as Image5 to Registry1
A. Image4
B. Image2
C. Image1
D. Image3
E. Image5
B. Image2
E. Image5
Explanation:
Only Linux images are scanned
Which statement regarding SQL auditing configurations is correct?
A. Server-level Blob auditing flows down to databases
B. After auditing is enabled, the server must be retsrated
C. Server-level Blob auditing does not flow down to databases
D. Database auditing is enabled by default
A. Server-level Blob auditing flows down to databases
Which statement regarding multiple Azure AD tenants in the same Azure account are true?
A. Switching to a different AD tenant shows the same deployed cloud resources
B. Switching to a different AD tenant shows different deploy cloud resources
C. Switching to a different AD tenant shows only a subset of deployed cloud resources
D. An Azure account can have only one Azure AD tenant
B. Switching to a different AD tenant shows different deploy cloud resources
Explanation:
Switching to a different AD tenant shows different deployed cloud resources under that directory
Your company has an Azure subscription named Sub1. Sub1 contains an Azure web app named WebAPp1 that uses Azure Application Insights. WebApp1 requires users to authenticate by using OAuth 2.0 client secrets. Developers at the company plan to create a multi step web test app that performs synthetic transactions emulating user traffic to Web App1. You need to ensure that web tests can run unattended. What should you do first?
A. In Microsoft Visual Studio, modify the .webtest file
B. Upload the .webtest file to Application Insights
C. Register the web test app in Azure AD
D. Add a plug in to the web test app
B. Upload the .webtest file to Application Insights
Explanation:
You can monitor a recorded sequence of URLs and interactions with a website via multi step web tests
You have an Azure subscription. You create an Azure web app named Contoso1812 that uses an S1 app service plan. You create a DNS record for www.contoso.com that points to the IP address of Contoso1812. You need to ensure that users can access Contoso1812 by using the https://www.contoso.com URL. Which two actions should you perform?
A. Turn on the system assigned managed identity for Contoso1812
B. Add a hostname to Contoso1812
C. Scale out the App Service plan of Contoso1812
D. Add a deployment slot to Contoso1812
E. Scale up the App Service plan of Contoso1812
F. Upload a PFX file to Contoso1812
B. Add a hostname to Contoso1812
F. Upload a PFX file to Contoso1812
Explanation:
You can configure Azure DNS to a host custom domain for your web apps. For example, you can create an Azure web app and have your users access it using either www.contoso.com or contoso.com as a FQDN. To do this, you have to create three records:
A root “A” record pointing to contoso.com
A root “TXT” record for verification
A CNAME record for www name that points to the A record
To use HTTPS, you need to upload a PFX file to the Azure Web App. The PFX file will contain the SSL cert required for HTTPS