Revision Flashcards

1
Q

What is an availability set?

A

Availability sets are logical groupings of VMs that reduce the chance of correlated failures bringing down related VMs at the same time. Availability sets place VMs in different fault domains for better reliability, especially beneficial if a region doesn’t support availability zones. When using availability sets, create two or more VMs within an availability set. Using two or more VMs in an availability set helps highly available applications and meets the 99.95% Azure SLA. There’s no extra cost for using availability sets, you only pay for each VM instance you create.

Each virtual machine in your availability set can be configured with up to 3 fault domains and 20 update domains. Fault domains share power and network, update domains delimit staggered updates, one after the other.

https://learn.microsoft.com/en-us/azure/virtual-machines/availability-set-overview#how-do-availability-sets-work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You plan to deploy an Azure virtual machine.

You are evaluating whether to use an Azure Spot instance.

Which two factors can cause an Azure Spot instance to be evicted? Each correct answer presents a complete solution.

A
  • the Azure capacity needs
  • the current price of the instance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have an Azure subscription that contains an Azure Storage account named vmstorageaccount1.

You create an Azure container instance named container1.

You need to configure persistent storage for container1.

What should you create in vmstorageaccount1?

A

An Azure container instance (Docker container) can mount Azure File Storage shares as directories and use them as persistent storage. An Azure container instance cannot mount and use as persistent storage blob containers, queues and tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the difference between Application Logging (Filesystem) and Application Logging (Blob) in azure app service diagnostic logging?

A

The Filesystem option is for temporary debugging purposes, and turns itself off in 12 hours. The Blob option is for long-term logging, and needs a blob storage container to write logs to. The Blob option also includes additional information in the log messages, such as the ID of the origin VM instance of the log message (InstanceId), thread ID (Tid), and a more granular timestamp (EventTickCount).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In DNS configuration, what’s the function of CNAME and A records?

A

An A record maps a domain name to an IP address.

A CNAME record maps a domain name to another domain name.

DNS uses the second name to look up the address. Users still see the first domain name in their browser. If the IP address changes, a CNAME entry is still valid, whereas an A record must be updated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to fix this when Get-AzRoleDefinition | Format-Table -Property Name, Id echos Name: Custom Role 1, ID: 111-222-333

$rg = "RG1" 
$RoleName = "CustomRole1" 
$Role = Get-AzRoleDefinition -Name $RoleName 
New-AzRoleAssignment -SignInName user1@contoso.com `   
    -RoleDefinitionName $Role.Name `
    -ResourceGroupName $rg
A

$RoleName = "111-222-333"

You should use the ID of the role in case the role name was changed to prevent such a change from breaking the script.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What query language is used in Log Analytics Workspaces?

A

KQL Kusto query language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What the basics of KQL syntax?

A

! Kusto Query Language (KQL) is designed for querying large datasets in Azure Data Explorer and other services that support KQL. It’s a read-only request to process data and return results.

There are several ways to reference the table:
search in (table_name) "search_term"
table_name | <operations>

Note that the select from syntax of SQL is not valid KQL!

Filtering: where operator filters rows based on a condition
StormEvents | where StartTime >= datetime(2020-04-01) and StartTime < datetime(2020-05-01)
Selection: project operator selects which columns to include, rename or introduce new ones.
StormEvents | project StartTime, EndTime, EventType
Aggregation: summarize operator aggregates data, often used with by for grouping.
StormEvents | summarize Count() by EventType
Joining: Joins two tables on a specified condition.
Table1 | join Table2 on Id
Sorting: sort by operator orders the results based on specified columns.
StormEvents | sort by StartTime desc
Top N Rows: top operator returns the first N records sorted by specified columns.
StormEvents | top 10 by StartTime
Comments: Use // for line comments and /* */ for multi-line comments
Advanced
- You can use the make-series operator to turn a dataset in to a time series:
~~~
PageViews
| make-series TotalViews=count() on Timestamp in range(datetime(2023-04-01), datetime(2023-05-01), 1d) by Category
~~~
- extend is used to create new columns in your data or to modify existing ones with calculated values. It’s like adding a custom field based on existing data:
~~~
PageViews
| sort by Timestamp asc
| extend PreviousViews=lag(Views, 1, null) over (Category order by Timestamp asc)
| extend PercentageChange = iif(isnull(PreviousViews) or PreviousViews == 0, double(null), (Views - PreviousViews) / double(PreviousViews) * 100)
~~~

where Timestamp >= datetime(2023-04-01) and Timestamp < datetime(2023-05-01)

https://learn.microsoft.com/en-us/azure/data-explorer/kusto/query/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is an Azure App Service plan?

A

To create an app service app you need to create an app service plan which configures the infrastructure it will run on. App service plans cannot change regions.

You can move an app to another App Service plan, as long as the source plan and the target plan are in the same resource group, geographical region, and of the same OS type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What would you create a custom RBAC role which does everything except admin of access permissions and is only applicatble to resourceGroups of a specific subscription?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have 100 Azure virtual machines.
You need to quickly identify underutilized virtual machines that can have their service tier changed to a less expensive offering.
Which blade should you use?
A. Azure Monitor
B. Azure Advisor
C. Azure Metrics
D. Azure Customer insights

A

Answer : B

Advisor helps you optimize and reduce your overall Azure spend by identifying idle and underutilized resources. You can get cost recommendations from the Cost tab on the Advisor dashboard.
Reference:
https://docs.microsoft.com/en-us/azure/advisor/advisor-cost-recommendations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When defining a conditional access policy, what does the Cloud apps section refer to?

A

actions that trigger the policy. These cloud apps or actions are the scenarios that you decide require additional processing, such as prompting for multifactor authentication. For example, you could decide that access to a financial application or use of management tools require an additional prompt for authentication.

https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to enable inviting non local AD users to join?

A

From the Users settings blade, modify the External collaboration settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to setup a P2S vpn?

A

Point to site VPNs require downloading a VPN config file (also after every change in network topology) and install the included cert and config.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When might you need to restart a Netowrk gateway between two sites?

A

When you lose cross site VPN connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Enable transit gateway property for in Vnet to Vnet connectivity?

A

It is essentially a boolean that turns off and on the cross VPN network traffic when a VPN peering is set up. You can turn off the traffic one way or both ways temporarily without destroying the VPN peering resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some of the key features of Azure file sync?

A
  • Azure File Sync to centralize your organization’s file shares in Azure Files
  • Azure File Sync transforms Windows Server into a quick cache of your Azure file share
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the steps to setup an on prem fileshare sync to Azure files?

A
  • Prepare Windows Server to use with Azure File Sync
  • Deploy the Storage Sync Service
  • Deploy the Azure File Sync agent to the on-prem server
  • Register on-prem server with Storage Sync Service
  • Create a sync group and a cloud endpoint
  • create a server endpoint

https://tutorialsdojo.com/azure-file-storage/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Traffic Manager?

A

It’s principally a DNS servcice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What load balanching services offer web applciation firewalls and ssl/TLS termination?

A

Application Gateway Tier 2 WAF
Front Door

https://tutorialsdojo.com/azure-load-balancer-vs-app-gateway-vs-traffic-manager/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is SSL/TLS Termination?

A

SSL/TLS termination refers to the process of terminating the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) encryption within a network infrastructure before the traffic reaches its final destination. In the context of Azure or any other cloud service provider, SSL/TLS termination often occurs at a load balancer or a gateway device.

SSL/TLS termination offers several benefits:

Offloading Encryption: It offloads the resource-intensive task of SSL/TLS encryption and decryption from backend servers, improving their performance.
Centralized Management: It centralizes SSL/TLS certificate management, making it easier to update and maintain certificates.
Inspection and Security: It enables inspection of decrypted traffic for security purposes, such as threat detection and prevention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How can you connect 2 vnets?

A

Using Vnet peerings (no ecryption but fast and never public internet) or network gateways (encrypted as passes trhough public internet but lower bandwidth).

Network gateways can communicate accross Tenants and Subscriptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the steps to setup a site to site VPN?

A
  • You need a vnet
  • The vneet needs a subnet called GatewaySubnet using a /27 or /28 CIDR clamp
  • Deploy a local network gateway
  • Deploy a VPN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the requirement to load balance across VMs?

A

They must be a backend pool and that means they must be part of an availability set or a scale set

https://tutorialsdojo.com/azure-load-balancer/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What storage acount types support which services?

A

https://tutorialsdojo.com/azure-storage-overview/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the conditions of the backup service¿

A

-you can only backup data sources or virtual machines that are in the same region as the Recovery Services vault
- You can back up virtual machines that have different resource groups or operating systems as long as they are in the same region as the vault

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How to import external DNS record data in to Azuire DNS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Why might a vnet peering peer be disconnected and how to correct it?

A

if your VNet peering connection is in a Disconnected state, it means one of the links created was deleted. To re-establish a peering connection, you will need to delete the disconnected peer and recreate it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the primary constraints of setting up file share syncing?

A
  • You need a Storage sync service instance to create sync groups
  • Each sync group can have a maximum of one cloud endpoint (azure fileshare)
  • Each cloud endpoint can have many server endpoints but servers must be unique (no using the same server twice to sync 2 different filepath locations)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which azure vm disks are not persistant?

A

D:\ and /dev/sdb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Can a backup happen if the VM is running?

A

Yeah. Or stopped or deallocated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the primary purpose of Azure Event Hub?

A

Azure Event Hubs is mainly used for big data streaming platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is Azure Compliance Manager

A

This service allows you to assign, track, and record compliance and assessment-related activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the Application Administrator role inEntra ID?

A

Users in this role can create and manage all aspects of enterprise applications, application registrations, and application proxy settings. This role also grants the ability to consent to delegated permissions, and application permissions excluding Microsoft Graph. Users assigned to this role are not added as owners when creating new application registrations or enterprise applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the Cloud Application Administrator

A

Users in this role have the same permissions as the Application Administrator role, excluding the ability to manage application proxy. Users assigned to this role are not added as owners when creating new application registrations or enterprise applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is
Azure Application Proxy?

A

Azure Application Proxy is a service provided by Microsoft Azure that allows organizations to securely publish internal web applications to external users, without requiring them to connect to a virtual private network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is Microsoft Graph?

A

Microsoft Graph is a unified API (Application Programming Interface) developed by Microsoft that allows developers to access data and intelligence from various Microsoft services, such as Office 365, Azure Active Directory, Windows 10, and more. It provides a single endpoint to interact with multiple Microsoft cloud services, enabling developers to build applications that integrate with and leverage data from these services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is ‘Configure label protection’ in Azure Information Protection?

A

Azure Information Protection. Label protection is used for protecting sensitive documents and emails by using the Rights Management service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the limitation of having 1 fault domain in an availability set?

A

You cannot have more than one update domain when you only have one fault domain

40
Q

What are the selling points of connection monitor

A
  • Handles onprem and cloud network
  • monitors network metrics including lag
41
Q

What is the scope of IP Flow verify?

A

Scoped to a VM to debug traffic filtering

42
Q

Is packet capture able to cover hybrid networks?

A

No, cloud only.

43
Q

What is traffic analytics?

A

It is primarily used to examine NSG flow logs in order to provide insights into traffic flow in your Azure cloud.

44
Q

Does azure traffic manager support ssl/tls termination?

A

No

45
Q

Does Azure load balancer support ssl/tls termination

A

No

46
Q

What are the characteristics of General-purpose v2 accounts

A

Basic storage account type for blobs, files, queues, and tables. Recommended for most scenarios using Azure Storage. It supports LRS, GRS, RA-GRS, ZRS, GZRS, RA-GZRS replication options

47
Q

What are the characteristics of General-purpose v1 accounts

A

Legacy account type for blobs, files, queues, and tables. Use general-purpose v2 accounts instead when possible. Supports LRS, GRS, RA-GRS replication options

48
Q

What are the characteristics of BlockBlobStorage accounts

A

Storage accounts with premium performance characteristics for block blobs and append blobs. Recommended for scenarios with high transaction rates, or scenarios that use smaller objects or require consistently low storage latency. Supports LRS, ZRS replication options

49
Q

What are the characteristics of FileStorage accounts

A

Files-only storage accounts with premium performance characteristics. Recommended for enterprise or high-performance scale applications. Supports LRS, ZRS replication options

50
Q

What are the characteristics of BlobStorage accounts

A

Legacy Blob-only storage accounts. Use general-purpose v2 accounts instead when possible. Supports LRS, GRS, RA-GRS replication options

51
Q

What are the characteristics of Locally redundant storage (LRS)

A

copies your data synchronously three times within a single physical location in the primary region. LRS is the least expensive replication option but is not recommended for applications requiring high availability.

52
Q

*

What are the characteristics of Zone-redundant storage (ZRS)

A

copies your data synchronously across three Azure availability zones in the primary region. For applications requiring high availability.

53
Q

What are the characteristics of Geo-redundant storage (GRS)

A

copies your data synchronously three times within a single physical location in the primary region using LRS. It then copies your data asynchronously to a single physical location in a secondary region that is hundreds of miles away from the primary region.

54
Q

What are the characteristics of Geo-zone-redundant storage (GZRS)

A

copies your data synchronously across three Azure availability zones in the primary region using ZRS. It then copies your data asynchronously to a single physical location in the secondary region.

55
Q

What is the port used for fileshare network activity

A

445

56
Q

Whats the best usecase for Azure Blob storage

A

Blob storage is optimized for storing massive amounts of unstructured data. Unstructured data is data that doesn’t adhere to a particular data model or definition, such as text or binary data.

Blob storage is designed for:

– Serving images or documents directly to a browser.

– Storing files for distributed access.

– Streaming video and audio.

– Writing to log files.

– Storing data for backup and restore disaster recovery and archiving.

– Storing data for analysis by an on-premises or Azure-hosted service.

57
Q

what is an Azure Network Security Group

A

It is used to filter network traffic to and from Azure resources in an Azure virtual network. A network security group contains security rules that allow or deny inbound network traffic to, or outbound network traffic from, several types of Azure resources. For each rule, you can specify source and destination, port, and protocol.

58
Q

What are the properties of an Azure storage account

A

contains all of your Azure Storage data objects: blobs, files, queues, tables, and disks. The storage account provides a unique namespace for your Azure Storage data that is accessible from anywhere in the world over HTTP or HTTPS. Data in your Azure storage account is durable and highly available, secure, and massively scalable.

59
Q

What is a Virtual Network service endpoint?

A

Virtual Network service endpoint allows administrators to create network rules that allow traffic only from selected VNets and subnets, creating a secure network boundary for their data. Service endpoints extend your VNet private address space and identity to the Azure services, over a direct connection. This allows you to secure your critical service resources to only your virtual networks, providing private connectivity to these resources and fully removing Internet access. You need to explicitly specify which subnets can access your storage account.

60
Q

Can Azure Backup backup your storage account (in the same sub) to run backups and restore unmanged disks in VMs?

A

Yes. In the storage account “Allow trusted Microsoft Services to access this storage account” check box must be checked.

61
Q

What is the best solution to copy data to a specific other region?

A

Configure object replication. You cannot choose which secondary region is used when using GRS so if you have to choose a specific region, you should use object replication.

62
Q

In DNS, what is referred to as the Split-Horizon View?

A

Split-Horizon View: This refers to a DNS configuration where the same domain name is associated with different IP addresses depending on the perspective of the DNS resolver. In other words, when a DNS query is made from inside a specific network, it gets a different IP address resolution compared to the same query made from outside that network.

63
Q

What are the DNS alias recordsets A, AAAA, MX, TXT, PTR, SOA, SRV, NS and CNAME?

A
  • A – maps the host to IPv4.
  • AAAA – maps the host to IPv6.
  • MX - mail servers
  • txt - commonly used to verify domain ownership (can hold any data)
  • PTR - used to map a network interface (IP address) to a hostname. These are primarily used in reverse DNS lookups
  • SOA - Start of Authority Record holding inportant info about the domain (owner email, ttl etc)
  • SRV - used to identify servers hosting specific services, such as Microsoft Office 365, LDAP
  • NS - used to delegate authority to specific DNS servers for a particular zone or domain
  • CNAME – alias one domain name to another e.g. my-app.com -> www.my-app.com
64
Q

What’s the relation ship between Private DNS Zones and vNets?

A
  • A vNet can have only one PDNS Zone
  • A private DNS zone can have many vNets
65
Q

In vNet peerings, what is the function of the gateway transit boolean?

A

Two peered vNets can communicate freely when peered but one vNet cannot pass through the peered vNet’s network gateways to the public internet unless gateway transit is enabled.

66
Q

How to Import data using the shipping process?

A
  • The first step to creating an import job is to determine which directories and files you are going to import (in dataset.csv). This determines the /dataset flag.
  • Contains the list of disks to which the drive letters are mapped so that the tool can correctly pick the list of disks to be prepared (in driveset.csv). Determines the /InitialDriveSet or /AdditionalDriveSet flags
67
Q

What can’t you back up with Azure backup?

A

It is not possible to backup Blob containers and Azure SQL Database using Azure Backup.

68
Q

How to enable accessing you app service app with a custom domain?

A

Add the dns records:

  • A Record:
    ~~~
    Host: @
    Type: A
    Value: 123.45.67.89 (Example IP)
    ~~~
  • TXT Record:
    ~~~
    Host: @
    Type: TXT
    Value: “some-verification-code-1234”
    ~~~
  • CNAME Record:
    ~~~
    Host: www
    Type: CNAME
    Value: tutorialsdojo.com
    ~~~
69
Q

What is the primary limitation of restoring a file from a backup point?

A

You can only restore files to an operating system of the same major version (minor and patch are tolerated)

70
Q

What are the possible VM restoration options?

A
  • Create a new VM
  • Restore a disk
  • Replace existing disk (OLR i.e. online replacement). VM must still exist. Original (replaced) disk is not deleted from the resource group with this operation (it has to be done manually)
71
Q

How does Azure storage sync handle conflicts between the Cloud endpoint and server endpoints?

A
  • The newer version is determined by the LastWriteTime metadata associated
  • Nothing is overwritten, every version is stored but with a customised name so the content can be accessed
  • The conflict naming notation is <FileNameWithoutExtension>-<endpointName>[-#].<ext>
  • A maximum of 100 conflicts per file are supported. After that syncing will be halted until enough conflicts are resolved to bring the total number below 100
72
Q

What is Traffic Manager

A

allows you to distribute traffic to your public-facing applications across the global Azure regions. Traffic Manager also provides your public endpoints with high availability and quick responsiveness.

73
Q

what is azure front door

A

it just enables you to define, manage, and monitor the global routing for your web traffic. Azure Front Door is a global, scalable entry-point that uses the Microsoft global edge network to create fast, secure, and widely scalable web applications.

73
Q

Azure Blueprints

A

The Azure Blueprints service simply enables you to define a repeatable set of Azure resources that implements and adheres to an organization’s standards, patterns, and requirements

74
Q

Azure Service Bus

A

fully managed enterprise message broker with message queues and public-subscribe topics

75
Q

what is IT Service Management Connector (ITSMC)

A

allows you to connect Azure to a supported IT Service Management (ITSM) product or service. ITSMC supports connections with the ITSM tools, such as ServiceNow, System Center Service Manager, Provance, and Cherwell. With ITSMC, you can:

– Create work items in your ITSM tool, based on your Azure alerts (metric alerts, activity log alerts, and Log Analytics alerts).

– Sync your incident and change request data from your ITSM tool to an Azure Log Analytics workspace.

75
Q

whats the difference between assigned membership groups and dynamic membership groups?

A

-The assigned membership type lets you add specific users to be members of the group and to have unique permissions.

-While dynamic membership type lets you add and remove members automatically based on your dynamic membership rules (user attributes such as department, location, or job title).

If you need to delete the groups automatically, you can set an expiration policy in Microsoft 365 groups. Take note that when a group expires, all of its associated services will also be deleted.

76
Q

what is the disk criteria for moving a vm into an availability zone with Azure Site Recovery

A

you must be using managed disks

77
Q

What is the difference between a security group and membership?

A

security groups can only be used for devices or users and not for groups

78
Q

What are proximity placement groups

A

A proximity placement group is a logical grouping used to make sure that Azure compute resources are physically located close to each other. Proximity placement groups are useful for workloads where low latency is a requirement. When you assign your virtual machines to a proximity placement group, the virtual machines are placed in the same data center, resulting in lower and deterministic latency for your applications.

Remember that when you are configuring a proximity placement group for a virtual machine scale set. Both the placement group and scale set must be in the same region.

79
Q

Whats the difference between action rules and action groups in azure monitor?

A

Action rules help you define or suppress actions at any Azure Resource Manager scope (Azure subscription, resource group, or target resource). It has various filters that can help you narrow down the specific subset of alert instances that you want to act on.

Action groups are a collection of notification preferences defined by the owner of an Azure subscription. Azure Monitor and Service Health alerts use action groups to notify users that an alert has been triggered. Various alerts may use the same action group or different action groups depending on the user’s requirements.

80
Q

User Administrator role

A

can create users and manage all aspects of users with some restrictions, and can update password expiration policies. Additionally, users with this role can create and manage all groups.

81
Q

Cloud Device Administrator role

A

can enable, disable, and delete devices in Azure AD and read Windows 10 BitLocker keys (if present) in the Azure portal. The role does not grant permission to manage any other properties on the device.

The Cloud Device Administrator role can only manage devices in Azure AD. The role does not have permission to manage a group like a User Administrator role.

82
Q

Security Administrator role

A

has permissions to manage security-related features in the Microsoft 365 security center, Azure Active Directory Identity Protection, Azure Active Directory Authentication, Azure Information Protection, and Office 365 Security & Compliance Center.

83
Q

HOw to get a device in Azure AD?

A

You have 3 options:

  1. Azure AD registered – devices that are Azure AD registered are typically personally owned or mobile devices, and are signed in with a personal Microsoft account or another local account.
  2. Azure AD joined – devices that are Azure AD joined are owned by an organization, and are signed in with an Azure AD account belonging to that organization. They exist only in the cloud.
  3. Hybrid Azure AD joined – devices that are hybrid Azure AD joined are owned by an organization and are signed in with an Active Directory Domain Services account belonging to that organization. They exist in the cloud and on-premises.
84
Q

what happens when you redeploy a vm?

A

When you redeploy a VM, it moves the VM to a new node within the Azure infrastructure and then powers it back on

85
Q

what network protocol does RDP use?

A

TCP/IP

86
Q

What is azure cost management?

A

Cost Management shows the organizational cost and usage patterns with advanced analytics. Reports in Cost Management show the usage-based costs consumed by Azure services and third-party Marketplace offerings. The reports help you understand your spending and resource use and can help find spending anomalies. Cost Management uses Azure management groups, budgets, and recommendations to show clearly how your expenses are organized and how you might reduce costs.

87
Q

What is the structural summary of azure AD?

A
  • Each directory is given a single top-level management group called the root management group. The root management group is built into the hierarchy to have all management groups and subscriptions fold up to it. This root management group allows for global policies and Azure role assignments to be applied at the directory level.
  • Azure AD Global Administrators are the only users that can elevate themselves to gain access to the root management group
    -If you are a Global Administrator in Azure AD, you can assign yourself access to all Azure subscriptions and management groups in your directory.
88
Q

what port is used by email?

A

587

89
Q

what uses port 3306?

A

this port is the default port for the classic MySQL protocol.

90
Q

3389?

A

RDP

91
Q

whats the correct UNC format of azure fileshares?

A

\<storageAccountName>.file.core.windows.net\<File></File></storageAccountName>

92
Q

what persistant storage is compatible with azure container instances?

A

Azure files and azure queue storage

93
Q

What is the purpose of the azcopy make command?

A

The azcopy make command is used to create a new container or file share in Azure Storage. This can be useful if you need to set up a new storage area before transferring data to it using other AzCopy commands.

e.g. azcopy make [destination]

The azcopy make command is commonly used to create a container or a file share.

94
Q

Are security groups global resources?

A

Non. You can only associate a network security group to a subnet or network interface within the same region as the network security group. So if your network security is in the Azure security groups, it can’t be moved from one region to another.

95
Q
A