TD--Wrong Only Flashcards
-3. QUESTION
Category: AZ-104 – Implement and Manage Virtual Networking
Your company has a Microsoft Entra ID tenant named tutorialsdojo.onmicrosoft.com and a public DNS zone for tutorialsdojo.com.
You added the custom domain name tutorialsdojo.com to Microsoft Entra ID. You need to verify that Azure can verify the domain name.
What DNS record type should you use?
A
SOA
MX
CNAME
MX
Microsoft Entra ID is a cloud-based identity and access management service that enables your employees access external resources. Example resources include Microsoft 365, the Azure portal, and thousands of other SaaS applications.
Microsoft Entra ID also helps them access internal resources like apps on your corporate intranet, and any cloud apps developed for your own organization.
Every new Microsoft Entra ID tenant comes with an initial domain name, <domainname>.onmicrosoft.com. You can’t change or delete the initial domain name, but you can add your organization’s names. Adding custom domain names helps you to create user names that are familiar to your users, such as azure@tutorialsdojo.com.</domainname>
You can verify your custom domain name by using TXT or MX record types.
Hence, the correct answer is: MX.
A, CNAME, and SOA are incorrect because these record types are not supported by the Microsoft Entra ID for verifying your custom domain. Only TXT and MX record types are supported.
References:
https://learn.microsoft.com/en-us/entra/fundamentals/whatis
https://learn.microsoft.com/en-us/entra/fundamentals/add-custom-domain
-4. QUESTION
Category: AZ-104 – Implement and Manage Storage
You have an existing Azure subscription that has the following Azure Storage accounts.
(image)
There is a requirement to identify the storage accounts that can be converted to zone-redundant storage (ZRS) replication. This must be done only through a live migration from Azure Support.
Which of the following accounts can you convert to ZRS?
tdaccount4
tdaccount3
tdaccount2
tdaccount1
tdaccount1
Azure Storage always stores multiple copies of your data so that it is protected from planned and unplanned events, including transient hardware failures, network or power outages, and massive natural disasters. Redundancy ensures that your storage account meets its availability and durability targets even in the face of failures.
When deciding which redundancy option is best for your scenario, consider the tradeoffs between lower costs and higher availability. The factors that help determine which redundancy option you should choose to include are:
– How your data is replicated in the primary region.
– Whether your data is replicated to a second region that is geographically distant to the primary region, to protect against regional disasters.
– Whether your application requires read access to the replicated data in the secondary region if the primary region becomes unavailable for any reason.
Data in an Azure Storage account is always replicated three times in the primary region. Azure Storage offers four options for how your data is replicated:
Locally redundant storage (LRS) copies your data synchronously three times within a single physical location in the primary region. LRS is the least expensive replication option but is not recommended for applications requiring high availability.
Zone-redundant storage (ZRS) copies your data synchronously across three Azure availability zones in the primary region. For applications requiring high availability.
Geo-redundant storage (GRS) copies your data synchronously three times within a single physical location in the primary region using LRS. It then copies your data asynchronously to a single physical location in a secondary region that is hundreds of miles away from the primary region.
Geo-zone-redundant storage (GZRS) copies your data synchronously across three Azure availability zones in the primary region using ZRS. It then copies your data asynchronously to a single physical location in the secondary region.
You can switch a storage account from one type of replication to any other type, but some scenarios are more straightforward than others. If you want to add or remove geo-replication or read access to the secondary region, you can use the Azure portal, PowerShell, or Azure CLI to update the replication setting. However, if you want to change how data is replicated in the primary region, by moving from LRS to ZRS or vice versa, then you must perform a manual migration.
The following table provides an overview of how to switch from each type of replication to another:
To request a live migration to ZRS, GZRS, or RA-GZRS, you need to migrate your storage account from LRS to ZRS in the primary region with no application downtime. To migrate from LRS to GZRS or RA-GZRS, first switch to GRS or RA-GRS and then request a live migration. Similarly, you can request a live migration from GRS or RA-GRS to GZRS or RA-GZRS. To migrate from GRS or RA-GRS to ZRS, first switch to LRS, then request a live migration.
Live migration is supported only for storage accounts that use LRS or GRS replication. If your account uses RA-GRS then you need to first change your account’s replication type to either LRS or GRS before proceeding. This intermediary step removes the secondary read-only endpoint provided by RA-GRS before migration.
Hence, the correct answer is: tdaccount1.
tdaccount2 is incorrect because you need to first change your account’s replication type to either LRS or GRS before you change to zone-redundant storage (ZRS). The requirement states that you must only request live migration.
tdaccount3 is incorrect because a general-purpose V1 storage account type does not support zone-redundant storage (ZRS) as its replication option. Only General-purpose V2, FileStorage, and BlockBlobStorage support ZRS.
tdaccount4 is incorrect because a BlobStorage account type does not support zone-redundant storage (ZRS) as its replication option. Only General-purpose V2, FileStorage, and BlockBlobStorage support ZRS.
References:
https://docs.microsoft.com/en-us/azure/storage/common/storage-redundancy
https://docs.microsoft.com/en-us/azure/storage/common/redundancy-migration
-6. QUESTION
Category: AZ-104 – Implement and Manage Storage
You have a file share in your Azure subscription named Manila-Subscription-01.
You plan to synchronize files from your on-premises file server named TDFileServer1 to Azure.
You created an Azure file share and a storage sync service.
Which four actions should you perform in sequence to synchronize files from TDFileServer1 to Azure?
Instructions: rearrange the following into the correct order
- Create a sync group and a cloud endpoint
- Register TDFileServer1 with Storage Sync Service
- Create a server endpoint
- Deploy the Azure File Sync agent to TDFileServer1
A-4
Deploy the Azure File Sync agent to TDFileServer1
B-2
Register TDFileServer1 with Storage Sync Service
C-1
Create a sync group and a cloud endpoint
D-3
Create a server endpoint
Azure Files enables you to set up highly available network file shares that can be accessed by using the standard Server Message Block (SMB) protocol. That means that multiple VMs can share the same files with both read and write access. You can also read the files using the REST interface or the storage client libraries.
One thing that distinguishes Azure Files from files on a corporate file share is that you can access the files from anywhere in the world using a URL that points to the file and includes a shared access signature (SAS) token. You can generate SAS tokens; they allow specific access to a private asset for a specific amount of time.
File shares can be used for many common scenarios:
- Many on-premises applications use file shares. This feature makes it easier to migrate those applications that share data to Azure. If you mount the file share to the same drive letter that the on-premises application uses, the part of your application that accesses the file share should work with minimal, if any, changes.
- Configuration files can be stored on a file share and accessed from multiple VMs. Tools and utilities used by multiple developers in a group can be stored on a file share, ensuring that everybody can find them and that they use the same version.
- Resource logs, metrics, and crash dumps are just three examples of data that can be written to a file share and processed or analyzed later.
You can use Azure File Sync to centralize your organization’s file shares in Azure Files while keeping the flexibility, performance, and compatibility of an on-premises file server. Azure File Sync transforms Windows Server into a quick cache of your Azure file share. You can use any protocol that’s available on Windows Server to access your data locally, including SMB, NFS, and FTPS. You can have as many caches as you need across the world.
You can sync TDFileServer1 to Azure using the following steps in order:
- Prepare Windows Server to use with Azure File Sync
– You need to disable Internet Explorer Enhanced Security Configuration in your server. This is required only for initial server registration. You can re-enable it after the server has been registered.
- Deploy the Storage Sync Service
– Allows you to create sync groups that contain Azure file shares across multiple storage accounts and multiple registered Windows Servers.
- Deploy the Azure File Sync agent to TDFileServer1
– The Azure File Sync agent is a downloadable package that enables Windows Server to be synced with an Azure file share.
- Register TDFileServer1 with Storage Sync Service
– This establishes a trust relationship between your server (or cluster) and the Storage Sync Service. A server can only be registered to one Storage Sync Service and can sync with other servers and Azure file shares associated with the same Storage Sync Service.
– 5. Create a sync group and a cloud endpoint
– A sync group defines the sync topology for a set of files. Endpoints within a sync group are kept in sync with each other.
- Create a server endpoint
– A server endpoint represents a specific location on a registered server, such as a folder on a server volume.
Hence, the correct order of deployment are:
- Deploy the Azure File Sync agent to TDFileServer1
- Register TDFileServer1 with Storage Sync Service
- Create a sync group and a cloud endpoint
- Create a server endpoint
References:
https://docs.microsoft.com/en-us/azure/storage/files/storage-files-introduction
https://docs.microsoft.com/en-us/azure/storage/files/storage-sync-files-deployment-guide
-9. QUESTION
Category: AZ-104 – Implement and Manage Virtual Networking
You have an Azure subscription that contains an Azure virtual network named TDVnet1 with an address space of 10.1.0.0/18 and a subnet named TDSub1 with an address space of 10.1.0.0/22.
You need to connect your on-premises network to Azure by using a site-to-site VPN.
Which four actions should you perform in sequence?
Instructions: To answer, drag the appropriate item from the column on the left to its description on the right. Each correct match is worth one point.
A. Deploy a gateway subnet
B. Deploy a local network gateway
C. Deploy a VPN gateway
D. Deploy a VPN connection
- A-Deploy a gateway subnet
- C-Deploy a VPN gateway
- B-Deploy a local network gateway
- D-Deploy a VPN connection
Azure Virtual Network (VNet) is the fundamental building block for your private network in Azure. VNet enables many types of Azure resources, such as Azure Virtual Machines (VM), to securely communicate with each other, the Internet, and on-premises networks. VNet is similar to a traditional network that you’d operate in your own datacenter but brings with it additional benefits of Azure’s infrastructure such as scale, availability, and isolation.
A Site-to-Site VPN gateway connection is used to connect your on-premises network to an Azure virtual network over an IPsec/IKE (IKEv1 or IKEv2) VPN tunnel. This type of connection requires a VPN device located on-premises that has an externally facing public IP address assigned to it.
You can create a site-to-site VPN connection by deploying the following in order:
- Deploy a virtual network
- Deploy a gateway subnet
– You need to create a gateway subnet for your VNet in order to configure a virtual network gateway. All gateway subnets must be named ‘GatewaySubnet’ to work properly. Don’t name your gateway subnet something else. It is recommended that you create a gateway subnet that uses a /27 or /28.
- Deploy a VPN gateway
– A VPN gateway is a specific type of virtual network gateway that is used to send encrypted traffic between an Azure virtual network and an on-premises location over the public Internet.
- Deploy a local network gateway
– The local network gateway is a specific object that represents your on-premises location (the site) for routing purposes.
- Deploy a VPN connection
– A VPN connection creates the link for the VPN gateway and local network gateway. It also gives you the status of your site-to-site connection.
Since you have deployed TDVnet1, the next step is to deploy a gateway subnet.
Hence, the correct order of deployment are:
- Deploy a gateway subnet
- Deploy a VPN gateway
- Deploy a local network gateway
- Deploy a VPN connection
References:
https://docs.microsoft.com/en-us/azure/virtual-network/virtual-networks-overview
https://docs.microsoft.com/en-us/azure/vpn-gateway/tutorial-site-to-site-portal
-10. QUESTION
Category: AZ-104 – Implement and Manage Virtual Networking
Your company has an Azure subscription that contains the following resources:
(image1)
You plan to create an internal load balancer with the following parameters:
Name: TDB1
SKU: Basic
Subnet: TDSub2
Virtual network: TDVnet1
Yes or No for the following?
1. Traffic between TD5 and TD6 can be load balanced by TDB1
2. Traffic between TD3 and TD4 can be load balanced by TDB1
3. Traffic between TD1 and TD2 can be load balanced by TDB1
- Traffic between TD5 and TD6 can be load balanced by TDB1 NO
- Traffic between TD3 and TD4 can be load balanced by TDB1 NO
- Traffic between TD1 and TD2 can be load balanced by TDB1 YES
Private (or Internal) Load balancer provides a higher level of availability and scale by spreading incoming requests across virtual machines (VMs). A private load balancer distributes traffic to resources that are inside a virtual network. Azure restricts access to the frontend IP addresses of a virtual network that is load balanced. Front-end IP addresses and virtual networks are never directly exposed to an internet endpoint. Internal line-of-business applications run in Azure and are accessed from within Azure or from on-premises resources.
Take note that in this scenario, you need to determine if you can load balance traffic in between virtual machines according to the parameters of TDB1. TD1 and TD2 are the only virtual machines that are associated with an availability set. In the image above, it states that only virtual machines within a single availability set or virtual machine scale set can be used as backend pool endpoints for load balancers that use Basic as its SKU.
The backend pool is a critical component of the load balancer. The backend pool defines the group of resources that will serve traffic for a given load-balancing rule.
Hence, this statement is correct: Traffic between TD1 and TD2 can be load balanced by TDB1
The following statements are incorrect because TDB1 is using the Basic SKU. Since the virtual machines below do not have an availability set or a virtual machine scale set, it does not have the capability to load balance the traffic.
– Traffic between TD3 and TD4 can be load balanced by TDB1
– Traffic between TD5 and TD6 can be load balanced by TDB1
References:
https://docs.microsoft.com/en-us/azure/load-balancer/load-balancer-overview
https://docs.microsoft.com/en-us/azure/load-balancer/skus
-13. QUESTION
Category: AZ-104 – Implement and Manage Virtual Networking
You have a server in your on-premises datacenter that contains a DNS server named TD1 with a primary DNS zone for the tutorialsdojo.com domain.
You have an Azure subscription named TD-Subscription1.
You plan to migrate the tutorialsdojo.com zone to an Azure DNS zone in TD-Subscription1. You must ensure that you minimize administrative effort.
Which two tools can you use?
- Azure CloudShell
- Azure Portal
- Azure Resource Manager templates
- Azure CLI
- Azure PowerShell
– Azure CLI
– Azure Portal
Azure DNS is a hosting service for DNS domains that provides name resolution by using Microsoft Azure infrastructure. By hosting your domains in Azure, you can manage your DNS records by using the same credentials, APIs, tools, and billing as your other Azure services.
You can’t use Azure DNS to buy a domain name. For an annual fee, you can buy a domain name by using App Service domains or a third-party domain name registrar. Your domains can then be hosted in Azure DNS for record management.
A DNS zone file is a text file that contains details of every Domain Name System (DNS) record in the zone. It follows a standard format, making it suitable for transferring DNS records between DNS systems. Using a zone file is a quick, reliable, and convenient way to transfer a DNS zone into or out of Azure DNS.
Take note that Azure DNS supports importing and exporting zone files by using the Azure command-line interface (CLI) and Azure Portal. Zone file import is NOT supported via Azure PowerShell and Azure Cloud Shell.
The Azure CLI is a cross-platform command-line tool used for managing Azure services. It is available for the Windows, Mac, and Linux platforms.
Hence, the correct answer are:
– Azure CLI
– Azure Portal
Azure PowerShell, Azure Resource Manager templates, and Azure CloudShell are incorrect because these user tools are not supported by Azure DNS for importing a DNS zone file. Only Azure CLI and Azure Portal are supported.
References:
https://docs.microsoft.com/en-us/azure/dns/dns-overview
https://docs.microsoft.com/en-us/azure/dns/dns-import-export
-14. QUESTION
Category: AZ-104 – Implement and Manage Virtual Networking
You have an Azure subscription that contains the following virtual network peerings:
(image)
Select the correct answer .
- Virtual Machines on TDVnet1 has network connectivity with hosts on:
?
2.What is the first thing you need to do to change the status of the peering connection for TDVnet2 to Connected:
?
- Virtual Machines on TDVnet1 has network connectivity with hosts on:
TDVnet1 only - What is the first thing you need to do to change the status of the peering connection for TDVnet2 to Connected:
Delete TDVnet1-2
Azure Virtual Network (VNet) is the fundamental building block for your private network in Azure. VNet enables many types of Azure resources, such as Azure Virtual Machines (VM), to securely communicate with each other, the Internet, and on-premises networks. VNet is similar to a traditional network that you’d operate in your own datacenter but brings with it additional benefits of Azure’s infrastructure such as scale, availability, and isolation.
Virtual network peering enables you to connect two or more Virtual Networks in Azure seamlessly. The virtual networks appear as one for connectivity purposes. The traffic between virtual machines in peered virtual networks uses the Microsoft backbone infrastructure. Like traffic between virtual machines in the same network, traffic is routed only through Microsoft’s private network.
In the image above, TDVnet1 is the hub while TDvnet2 and TDVnet3 are the spoke. TDVnet1 hosts can not communicate with TDvnet2 and TDVnet3 because their peerings are in a disconnected state.
Take note that if your VNet peering connection is in a Disconnected state, it means one of the links created was deleted. To re-establish a peering connection, you will need to delete the disconnected peer and recreate it.
Therefore, virtual machines on TDVnet1 can communicate to hosts on TDVnet1 only because the peerings associated with TDVnet1 are in a disconnected state. It means that traffic between virtual networks is prohibited.
Conversely, you need to Delete TDVnet1-2 to re-establish the connection. Once you have deleted the disconnected peer, you can then recreate it.
The following options are incorrect because TDVnet2 and TDVnet3 have a disconnected peer with TDVnet1. No traffic will be able to flow between virtual networks as long as the peer’s status is disconnected. To re-establish the connection, you must delete the disconnected peer and recreate it.
– TDVnet2 only
– TDVnet3 only
– TDVnet1,TDVnet2, and TDVnet3
The option that says: Change the address space is incorrect because you can not change the address space of a virtual network if there is an active peering connection. You need to delete the peer first to change the address space.
The option that says: Delete a subnet is incorrect because even if you delete or add a subnet, it will not have any impact on the state of the peering connection.
The option that says: Enable gateway transit is incorrect because this feature is simply a peering property that lets one virtual network use the VPN gateway in the peered virtual network for cross-premises or VNet-to-VNet connectivity.
References:
https://docs.microsoft.com/en-us/azure/virtual-network/virtual-networks-overview
https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-peering-overview
-16. QUESTION
Category: AZ-104 – Implement and Manage Storage
You have an Azure subscription named TDSubscription that contains Azure file share called TDShare1 and TDShare2. Both have the same storage account and the same region.
You deploy the following resources:
(Image1)
You plan to back up the following file servers in your on-premises datacenter to Azure:
(image2)
You then add E:\tutorials of FileServer1 as the server endpoint of TDGroup1.
For each of the following items, choose Yes if the statement is true or choose No if the statement is false.
- You can add C:\files of FileServer2 as a server endpoint of TDGroup1
- You can add TDShare2 to TDGroup1 as a cloud endpoint
- You can add F:\dojo of FileServer1 as a server endpoint to TDGroup1
- You can add C:\files of FileServer2 as a server endpoint of TDGroup1
YES - You can add TDShare2 to TDGroup1 as a cloud endpoint
NO - You can add F:\dojo of FileServer1 as a server endpoint to TDGroup1
NO
Azure Files enables you to set up highly available network file shares that can be accessed by using the standard Server Message Block (SMB) protocol. That means that multiple VMs can share the same files with both read and write access. You can also read the files using the REST interface or the storage client libraries.
A sync group defines the sync topology for a set of files. Endpoints within a sync group are kept in sync with each other. A sync group must contain one cloud endpoint, which represents an Azure file share, and one or more server endpoints.
A cloud endpoint is a pointer to an Azure file share. All server endpoints will sync with a cloud endpoint, making the cloud endpoint the hub.
A server endpoint represents a specific location on a registered server, such as a folder on a server volume.
Take note that multiple server endpoints can exist on the same volume if their namespaces are not overlapping (for example, F:\sync1 and F:\sync2) and each endpoint is syncing to a unique sync group meaning you can not have more than one server endpoint from the same server in the same sync group.
The statement that says: You can add C:\files of FileServer2 as a server endpoint of TDGroup1 is correct because FileServer2 has no server endpoint yet on TDGroup1. Therefore, you can add the file server to the sync group without any restrictions.
The statement that says: You can add TDShare2 to TDGroup1 as a cloud endpoint is incorrect because you can only have one cloud endpoint per sync group. If you want to add another cloud endpoint, you must create another sync group.
The statement that says: You can add F:\dojo of FileServer1 as a server endpoint to TDGroup1 is incorrect because TDGroup1 already has a server endpoint for FileServer1 for the folder E:\tutorials. Take note that you can not have more than one server endpoint from the same server in the same sync group. If you need to add the folder F:\dojo of FileServer1, you need to create another sync group.
References:
https://docs.microsoft.com/en-us/azure/storage/files/storage-files-introduction
https://docs.microsoft.com/en-us/azure/storage/files/storage-sync-files-deployment-guide
1-17. QUESTION
Category: AZ-104 – Deploy and Manage Azure Compute Resources
You need to perform the following actions in a Windows virtual machine:
Create a document on drive C.
Create a document on drive D.
Create a new folder on the desktop.
Create a local user account.
Modify the desktop background
You plan to redeploy the virtual machine.
Which of the following changes will be lost after you redeploy the virtual machine to a new Azure node?
- The created folder.
- The data on drive D.
- The created local user account.
- The data on drive C.
- The data on drive D.
Azure Virtual Machines (VM) is one of several types of on-demand, scalable computing resources that Azure offers. Typically, you choose a VM when you need more control over the computing environment. An Azure VM gives you the flexibility of virtualization without having to buy and maintain the physical hardware. However, you still need to maintain the VM by performing tasks, such as configuring, patching, and installing the software that runs on it.
Most VMs contain a temporary disk, which is not a managed disk. The temporary disk provides short-term storage for applications and processes and is intended to only store data such as page or swap files. Data on the temporary disk may be lost during a maintenance event or when you redeploy a VM. During a successful standard reboot of the VM, data on the temporary disk will persist.
On Azure Linux VMs, the temporary disk is typically /dev/sdb and on Windows VMs the temporary disk is D: by default. The temporary disk is not encrypted by server-side encryption unless you enable encryption at host.
In this scenario, the only changes that will be lost are the data in the temporary disk. The temporary disk is just short-term storage for applications and processes. Take note that you can’t recover any data from this disk. The data loss occurs when the virtual machine moves to a different host server, the host is updated, and the host experiences a hardware failure. By default, the temporary disk on a Windows virtual machine is on drive D.
Hence, the correct answer is: The data on drive D.
The option that says: The created folder is incorrect. Even if you redeploy the virtual machine into a new node, the new folder will still be on the desktop of the virtual machine since drive C is the default storage.
The option that says: The created local user account is incorrect because user accounts are stored in drive C. After you redeploy the virtual machine to a new Azure node, the user account would still be stored in the virtual machine.
The option that says: The data on drive C is incorrect because drive C is a persistent storage. This means the data stored on this drive wouldn’t be deleted even if you redeploy the virtual machine.
References:
https://docs.microsoft.com/en-us/azure/virtual-machines/managed-disks-overview#temporary-disk
https://docs.microsoft.com/es-mx/archive/blogs/mast/understanding-the-temporary-drive-on-windows-azure-virtual-machines
-20. QUESTION
Category: AZ-104 – Deploy and Manage Azure Compute Resources
You have an Azure subscription that has the following vCPU quotas.
(image1)
You plan to create the virtual machines listed below in the order they are listed.
(image2)
The deployed virtual machines are shown in the table below.
(image3)
For each of the following items, choose Yes if the statement is true or choose No if the statement is false.
1.You can create VM5 in North Central US Region.
2. You can create VM4 in North Central US Region.
3.You can create VM6 in North Central US Region.
1.You can create VM5 in North Central US Region.
NO
2. You can create VM4 in North Central US Region.
YES
3.You can create VM6 in North Central US Region.
NO
Azure Virtual Machines (VM) is one of several types of on-demand, scalable computing resources that Azure offers. Typically, you choose a VM when you need more control over the computing environment. An Azure VM gives you the flexibility of virtualization without having to buy and maintain the physical hardware that runs it. However, you still need to maintain the VM by performing tasks such as configuring, patching, and installing the software that runs on it.
The vCPU quotas for virtual machines and virtual machine scale sets are arranged in two tiers for each subscription in each region.
– Total Regional vCPUs
– VM size family cores
Every time you deploy a new VM, the vCPUs must not exceed the vCPU quota for the VM size family or the total regional vCPU. If either of those quotas has been exceeded, the VM deployment will not be allowed. Take note that there is also a quota for the overall number of virtual machines in the region. The quota is calculated based on the total number of cores in use, both allocated and deallocated. If you need additional cores, you can request a quota increase or delete VMs that are no longer needed.
The statement that says: You can create VM4 in North Central US Region is correct because the remaining vCPU quota in North Central US is 3 vCPUs. If you created VM4 in the North Central US Region, the total vCPUs in that Region is 14 of 15 vCPUs.
The statement that says: You can create VM5 in North Central US Region is incorrect. Take note that you already created the VM4 instance. Therefore, the remaining vCPU quota in the North Central US is only 1 vCPU.
The statement that says: You can create VM6 in North Central US Region is incorrect because if you create VM6 in the North Central US, it will exceed the total regional vCPU quota.
References:
https://docs.microsoft.com/en-us/azure/virtual-machines/windows/quotas
https://docs.microsoft.com/en-us/azure/virtual-machines/sizes
https://docs.microsoft.com/en-us/azure/azure-portal/supportability/per-vm-quota-requests
-22. QUESTION
Category: AZ-104 – Deploy and Manage Azure Compute Resources
You have deployed two Azure virtual machines to host a web application.
You plan to set up an Availability Set for your application.
You need to make sure that the application is available during planned maintenance.
Which of the following options will allow you to accomplish this?
- Assign one fault domain in the Availability Set.
- Assign two update domains in the Availability Set.
- Assign one update domain in the Availability Set.
- Assign two fault domains in the Availability Set.
- Assign two update domains in the Availability Set.
Azure Virtual Machines (VM) is one of several types of on-demand, scalable computing resources that Azure offers. Typically, you choose a VM when you need more control over the computing environment. An Azure VM gives you the flexibility of virtualization without having to buy and maintain the physical hardware. However, you still need to maintain the VM by performing tasks, such as configuring, patching, and installing the software that runs on it.
Planned maintenance is periodic updates made by Microsoft to the underlying Azure platform to improve the platform infrastructure’s overall reliability, performance, and security that your virtual machines run on.
To ensure that the application is available during planned maintenance, you must assign two update domains in the Availability Set. An update domain will make sure that the VMs in the Availability Set are not updated at the same time. The order of update domains being rebooted may not proceed sequentially during planned maintenance, but only one update domain is rebooted at a time. A rebooted update domain is given 30 minutes to recover before maintenance is initiated on a different update domain.
Hence, the correct answer is: Assign two update domains in the Availability Set.
The option that says: Assign one update domain in the Availability Set is incorrect because you need to assign one update domain for each virtual machine.
The option that says: Assign two fault domains in the Availability Set is incorrect because the requirement in the scenario is only planned maintenance. Even if you assigned two or more fault domains, the application will still be unavailable during planned maintenance. You must assign two update domains and one virtual machine for each update domain.
The option that says: Assign one fault domain in the Availability Set is incorrect because the fault domain is mainly used for unplanned maintenance. Instead of assigning a fault domain in the Availability Set, you must assign an update domain in order to satisfy this requirement.
References:
https://docs.microsoft.com/en-us/azure/virtual-machines/manage-availability
https://docs.microsoft.com/en-us/azure/virtual-machines/windows/tutorial-availability-sets
-32. QUESTION
Category: AZ-104 – Deploy and Manage Azure Compute Resources
You plan to migrate your business-critical application to Azure virtual machines.
You need to make sure that at least two VMs are available during planned Azure maintenance.
What should you do?
- Create an Availability Set that has two update domains and three fault domains.
- Create an Availability Set that has three update domains and two fault domains.
- Create an Availability Set that has three update domains and one fault domain.
- Create an Availability Set that has one update domain and three fault domains.
- Create an Availability Set that has three update domains and two fault domains.
Azure periodically updates its platform to improve the reliability, performance, and security of the host infrastructure for virtual machines. The purpose of these updates ranges from patching software components in the hosting environment to upgrading networking components or decommissioning hardware.
Updates rarely affect the hosted VMs. When updates do have an effect, Azure chooses the least impactful method for updates:
– If the update doesn’t require a reboot, the VM is paused while the host is updated, or the VM is live-migrated to an already updated host.
– If maintenance requires a reboot, you’re notified of the planned maintenance. Azure also provides a time window in which you can start the maintenance yourself, at a time that works for you. The self-maintenance window is typically 35 days unless the maintenance is urgent. Azure is investing in technologies to reduce the number of cases in which planned platform maintenance requires the VMs to be rebooted.
The main objective of the question is to test your understanding of update and fault domains. Since it’s a requirement in the scenario that at least two virtual machines must be available during planned maintenance, you should add three update domains in the Availability Set. Take note that each virtual machine in your availability set is assigned to an update domain and a fault domain.
During scheduled maintenance, only one update domain is updated at any given time. Update domains aren’t necessarily updated sequentially. A rebooted update domain is given 30 minutes to recover before maintenance is initiated on a different update domain. For fault domains, you can set a minimum number of fault domains in your Availability Set because the main requirement in the scenario is to prepare for planned maintenance.
Hence, the correct answer is: Create an Availability Set that has three update domains and two fault domains.
The option that says: Create an Availability Set that has three update domains and one fault domain is incorrect because if you set 3 update domains and 1 fault domain in an Availability Set, you will receive an error message: “The update domain count must be 1 when fault domain count is 1.” To resolve this error, you must have 2 fault domains instead of 1 fault domain.
The option that says: Create an Availability Set that has two update domains and three fault domains is incorrect because you need to have three update domains instead of two update domains.
The option that says: Create an Availability Set that has one update domain and three fault domains is incorrect because three fault domains are not needed in this scenario. Fault domains are mainly used for unplanned maintenance. Three update domains must be provisioned to adequately satisfy the requirements.
References:
https://docs.microsoft.com/en-us/azure/virtual-machines/maintenance-and-updates
https://docs.microsoft.com/en-us/azure/virtual-machines/manage-availability
-34. QUESTION
Category: AZ-104 – Deploy and Manage Azure Compute Resources
Your company has an Azure Kubernetes Service (AKS) cluster and a Windows 10 workstation with Azure CLI installed.
You plan to use the kubectl client on Windows 10.
Which of the following commands should you run?
- az aks install-cli
- az aks nodepool
- az aks create
- az aks browse
- az aks install-cli
Azure Kubernetes Service (AKS) makes it simple to deploy a managed Kubernetes cluster in Azure. AKS reduces the complexity and operational overhead of managing Kubernetes by offloading much of that responsibility to Azure. As a hosted Kubernetes service, Azure handles critical tasks like health monitoring and maintenance for you. The Kubernetes masters are managed by Azure. You only manage and maintain the agent nodes.
To connect to the Kubernetes cluster from your local computer, you need to use kubectl (Kubernetes command-line client). But before you can use kubectl, you should first run the command az aks install-cli in the command-line interface. The kubectl allows you to deploy applications, inspect and manage cluster resources, and view logs.
Hence, the correct answers is: az aks install-cli.
The option that says: az aks nodepool is incorrect because this command only allows you to manage node pools in a Kubernetes cluster. It is stated in the scenario that you need to use the kubectl client. Therefore, you should first run the az aks install-cli command.
The option that says: az aks create is incorrect because this will just create a new managed Kubernetes cluster. Take note that in this scenario, you need to use the Kubernetes command-line client in Windows 10. In order for you to manage cluster resources, you should use the kubectl client.
The option that says: az aks browse is incorrect because it will simply show the dashboard of the Kubernetes cluster in your web browser. Instead of running the command az aks browse, you should run az aks install-cli to download and install the Kubernetes command-line tool.
References:
https://docs.microsoft.com/en-us/cli/azure/aks
https://docs.microsoft.com/en-us/azure/aks/intro-kubernetes
-40. QUESTION
Category: AZ-104 – Implement and Manage Virtual Networking
Note: This item is part of a series of case study questions with the exact same scenario but has a different technical requirement. Each one in the series has a unique solution that may or may not comply with the requirements specified in the scenario.
Overview
Contoso Limited is an online learning portal for technology-related topics that empowers its users to upgrade their skills and career. Contoso Limited has users from all over the world, ranging from the United States, Europe, and Asia.
Existing Environment
Currently, Contoso Limited utilizes a three-tier system for their LMS application on-premises, including the following:
-Web frontend tier
-Application tier
-SQL Server
Each tier contains three virtual machines with no ability to scale out.
The contents of the application are stored in the file server.
Planned changes
Contoso Limited plans to implement the following modifications for their migration to Azure:
-Migrate the web and application tier to Azure virtual machines.
-Migrate the SQL server to the Azure SQL database.
-Move the existing file server to a more efficient service.
Technical Requirements
-Minimize administrative effort and cost whenever possible.
-Ensure that the user can increase the number of virtual machines for the web tier and application tier when there is high demand.
-Ensure that there will be automated backups for all virtual machines.
-Ensure that the file server can be mounted from Azure and on-premises data center.
-Enable Multi-Factor Authentication (MFA) for administrators only.
-Assets must be stored in the Azure Storage service.
-Enable SSL termination at the load balancer layer.
-The architecture must be highly available.
You need to deploy a load balancer that supports SSL termination.
What Azure service should you use?
- Azure Application Gateway
- Azure Front Door
- Azure Load Balancer
- Azure Traffic Manager
- Azure Application Gateway
Azure Application Gateway is a web traffic load balancer that enables you to manage traffic to your web applications. Traditional load balancers operate at the transport layer (OSI layer 4 – TCP and UDP) and route traffic based on source IP address and port, to a destination IP address and port. Application Gateway can make routing decisions based on additional attributes of an HTTP request, for example, URI path or host headers.
SSL termination refers to the process of decrypting encrypted traffic before passing it along to a web server. TLS is just an updated, more secure, version of SSL. An SSL connection sends encrypted data between a user and a web server by using a certificate for authentication. SSL termination helps speed the decryption process and reduces the processing burden on the servers.
Azure Application Gateway supports end-to-end traffic encryption and TLS/SSL termination. Based on the defined routing rules, the gateway applies the rules to the traffic, re-encrypts the packet, and forwards the packet to the appropriate server. Any reply from the web server goes back to the same process.
Hence, the correct answer is: Azure Application Gateway.
Azure Traffic Manager is incorrect because Traffic Manager does not support SSL termination. This service is mainly used for DNS-based traffic load balancing.
Azure Load Balancer is incorrect. Just like the option above, this service does not support SSL termination. You can use this service to create public and internal load balancers only.
Azure Front Door is incorrect. Although it supports SSL offloading, this service is not a load balancer. Azure Front Door is a global, scalable entry-point that uses the Microsoft global edge network to create fast, secure, and widely scalable web applications.
References:
https://docs.microsoft.com/en-us/azure/application-gateway/overview
https://azure.microsoft.com/en-us/services/application-gateway/
-45. QUESTION
Category: AZ-104 – Monitor and Maintain Azure Resources
Your company hosts its business-critical Azure virtual machines in the Australia East region.
The servers are then replicated to a secondary region using Azure site recovery for disaster recovery.
The Australia East region is experiencing an outage and you need to failover to your secondary region.
Which three actions should you perform?
- Run a test failover.
- Run a failback.
- Initiate replication.
- Run a failover.
- Reprotect virtual machine.
- Verify if the virtual machines are protected and healthy.
-6. Verify if the virtual machines are protected and healthy.
-5. Run a failover.
-4. Reprotect the VM.
A Recovery Services vault is a storage entity in Azure that houses data. The data is typically copies of data or configuration information for virtual machines (VMs), workloads, servers, or workstations. You can use Recovery Services vaults to hold backup data for various Azure services such as IaaS VMs (Linux or Windows) and Azure SQL databases.
Recovery Services vaults support System Center DPM, Windows Server, Azure Backup Server, and more. Recovery Services vaults make it easy to organize your backup data while minimizing management overhead.
When you enable replication for a VM to set up disaster recovery, the Site Recovery Mobility service extension installs on the VM and registers it with Azure Site Recovery.
During replication, VM disk writes are sent to a cache storage account in the source region. Data is sent from there to the target region, and recovery points are generated from the data. When you fail over a VM during disaster recovery, a recovery point is used to restore the VM in the target region.
To perform a failover, you should complete the following steps:
Verify the VM settings – Check if the VM is healthy and protected. You also need to verify if the VM is running a support Windows or Linux operation system and if the VM complies with compute, storage and networking requirements.
Run a failover – In the failover tab, you are required to choose a recovery point. The Azure VM in the target region is created using data from this recovery point.
Reprotect the VM – After failover, you reprotect the VM in the secondary region so that it replicates back to the primary region.
Hence, the correct answers are:
– Verify if the virtual machines are protected and healthy.
– Run a failover.
– Reprotect the VM.
Initiate replication is incorrect because this is the first step in setting up a disaster recovery for virtual machines. The question states that the servers are already replicated to the secondary region which indicates that it is ready for a failover
Run a failback is incorrect because this option allows you to failback to your primary region and is only executed once the primary region is running as normal again.
Run a test failover is incorrect because you only run a test failover to check if an actual failover will work. This is done during disaster recovery drills.
References:
https://docs.microsoft.com/en-us/azure/site-recovery/site-recovery-overview
https://docs.microsoft.com/en-us/azure/site-recovery/azure-to-azure-tutorial-enable-replication
-50. QUESTION
Category: AZ-104 – Implement and Manage Storage
Which of the following authentication methods can you use when transferring data using AzCopy to Blob storage and File storage?
For each sotrage type, can you use shared access signature, RBAC, or both?
- Blob storage - ?
- File storage - ?
- Blob storage - Shared access signature
- File storage - (Shared access signature)
AzCopy is a command-line utility that you can use to copy blobs or files to or from a storage account. You can also provide authorization credentials on your AzCopy command by using Azure Active Directory (AD) or by using a Shared Access Signature (SAS) token.
For blob storage, the supported authorization methods are: shared access signature and by using your Active Directory credentials.
Meanwhile, for file storage, the only supported authorization method is shared access signature.
Therefore, for both blob storage and file storage, you have to use shared access signature token as your authorization method.
References:
https://docs.microsoft.com/en-us/azure/storage/common/storage-account-overview
https://learn.microsoft.com/en-us/azure/storage/common/storage-use-azcopy-v10
2-7. QUESTION
Category: AZ-104 – Implement and Manage Storage
You have an Azure subscription that contains several virtual machines deployed to a virtual network named TDVnet1.
You created an Azure storage account named tdstorageaccount1 as shown in the following exhibit:
(image)
Select yes or no for the following:
- Your virtual machines deployed to the 20.2.1.0/24 subnet will have access to the file shares in tdstorageaccount1.
? - The unmanaged disks of the virtual machines can be backed up to tdsotrageaccount1 by using Azure Backup.
?
-1. No
-2. No
An Azure storage account contains all of your Azure Storage data objects: blobs, files, queues, tables, and disks. The storage account provides a unique namespace for your Azure Storage data that is accessible from anywhere in the world over HTTP or HTTPS. Data in your Azure storage account is durable and highly available, secure, and massively scalable.
Virtual Network service endpoint allows administrators to create network rules that allow traffic only from selected VNets and subnets, creating a secure network boundary for their data. Service endpoints extend your VNet private address space and identity to the Azure services, over a direct connection. This allows you to secure your critical service resources to only your virtual networks, providing private connectivity to these resources and fully removing Internet access. You need to explicitly specify which subnets can access your storage account.
Azure Backup can access your storage account in the same subscription for running backups and restores of unmanaged disks in virtual machines. To enable this, you need to tick the “Allow trusted Microsoft Services to access this storage account” box.
Take note that in the screenshot presented in the scenario, the following observations can be made:
- There are two subnets inside TDVnet1, 20.2.0.0/24 and 20.2.1.0/24. The only subnet included in the lists of allowed subnets to tdstorageaccount1 is 20.2.0.0/24. The virtual machines deployed to the subnet 20.2.1.0/24 will never have access to tdstorageaccount1.
- The “Allow trusted Microsoft Services to access this storage account” is not enabled. This means that Azure Backup will never have the capability to backup the unmanaged disks of the virtual machines to tdstorageaccount1.
Therefore, your virtual machines in 20.2.1.0/24 will Never have access to the file shares in tdstorageaccount1.
Conversely, Azure Backup will Never be able to backup unmanaged disks of the virtual machines.
References:
https://docs.microsoft.com/en-us/azure/storage/blobs/storage-blobs-overview
https://docs.microsoft.com/en-us/azure/storage/common/storage-network-security
2-8. QUESTION
Category: AZ-104 – Implement and Manage Storage
You have an Azure blob storage account in your Azure subscription named TD1, located in the Southeast Asia region.
Due to compliance requirements, data uploaded to TD1 must be duplicated to the Australia Central region for redundancy. The solution must minimize administrative effort.
What should you do?
- Configure Geo-redundant storage (GRS).
- Configure firewalls and virtual networks.
- Configure object replication.
- Configure versioning.
Object replication asynchronously copies block blobs between a source storage account and a destination account. Some scenarios supported by object replication include:
- Minimizing latency. Object replication can reduce latency for read requests by enabling clients to consume data from a region that is in closer physical proximity.
- Increase efficiency for compute workloads. With object replication, compute workloads can process the same sets of block blobs in different regions.
- Optimizing data distribution. You can process or analyze data in a single location and then replicate just the results to additional regions.
- Optimizing costs. After your data has been replicated, you can reduce costs by moving it to the archive tier using life cycle management policies.
The requirement states that whenever data is uploaded to TD1 must be duplicated to Australia Central due to compliance requirements. Since the regional pair of Southeast Asia is East Asia, we won’t be able to use geo-redundant storage (GRS) as we cannot choose the secondary region due to regional pairs. Instead, we can use object replication to copy data from TD1 to a storage account in Australia Central region.
Object replication is supported for general-purpose v2 storage accounts and premium block blob accounts. Both the source and destination accounts must be either general-purpose v2 or premium block blob accounts. Object replication supports block blobs only; append blobs and page blobs aren’t supported.
Hence, the correct answer is: Configure object replication.
The option that says: Configure firewalls and virtual networks is incorrect because this feature only allows users of Azure storage accounts to block or allow specific traffic to your storage account. It does not have any capability to replicate data to another region.
The option that says: Configure versioning is incorrect because this allows you to automatically maintain previous versions of an object in a single storage account. Although, to use object replication, versioning must be enabled in the source and target storage accounts.
The option that says: Configure Geo-redundant storage (GRS) is incorrect because the data will automatically be stored in East Asia since it is the regional pair of Southeast Asia region. You don’t get to choose the secondary region when enabling geo-redundant storage. Instead, use object replication.
References:
https://learn.microsoft.com/en-us/azure/storage/blobs/object-replication-overview
https://learn.microsoft.com/en-us/azure/reliability/cross-region-replication-azure
2-9. QUESTION
Category: AZ-104 – Implement and Manage Virtual Networking
You have an Azure subscription that contains a Windows virtual machine named TD1 with the following configurations:
Virtual network: TDVnet1
Public IP Address: 20.10.0.1
Private IP Address: 48.156.83.51
Location: Southeast Asia
You deploy the following Azure DNS zones:
(image)
You need to determine which DNS zones can be linked to TDVnet1 and which DNS zones TD1 can be automatically registered.
- TDVnet1 can be linked to the following DNS zones:
? - TD1 can be automatically registered to the following DNS zones:
?
- Manila.com and Davao.com only can be linked to TDVNet1 since they are both private DNS zones.
- TD1 can be automatically registered to Manila.com and Davao.com only because both DNS zones are private DNS zones provided that you enable the auto registration feature.
Azure Private DNS provides a reliable, secure DNS service to manage and resolve domain names in a virtual network without the need to add a custom DNS solution. By using private DNS zones, you can use your own custom domain names rather than the Azure-provided names available today.
Using custom domain names helps you to tailor your virtual network architecture to best suit your organization’s needs. It provides name resolution for virtual machines (VMs) within a virtual network and between virtual networks. Additionally, you can configure zone names with a split-horizon view, which allows a private and a public DNS zone to share the name.
Once you create a private DNS zone in Azure, it is not immediately accessible from any virtual network. You must link it to a virtual network before a VM hosted in that network can access the private DNS zone.
When you create a link between a private DNS zone and a virtual network, you have an option to turn on autoregistration of DNS records for virtual machines. If you choose this option, the virtual network becomes a registration virtual network for the private DNS zone.
– A DNS record is automatically created for the virtual machines that you deploy in the network. DNS records are created for the virtual machines that you have already deployed in the virtual network.
– One private DNS zone can have multiple registration virtual networks, however, every virtual network can have exactly one registration zone associated with it.
When you create a virtual network link under a private DNS zone and choose not to enable DNS record autoregistration, the virtual network is treated as a resolution only virtual network.
– DNS records for virtual machines deployed in such networks will not be automatically created in the linked private DNS zone. However, the virtual machines deployed in such a network can successfully query the DNS records from the private DNS zone.
– These records may be manually created by you or may be populated from other virtual networks that have been linked as registration networks with the private DNS zone.
– One private DNS zone can have multiple resolution virtual networks and a virtual network can have multiple resolution zones associated to it.
Take note that you can only link a virtual network and use the auto registration feature to a private DNS zone only.
Therefore, Manila.com and Davao.com only can be linked to TDVNet1 since they are both private DNS zones.
Conversely, TD1 can be automatically registered to Manila.com and Davao.com only because both DNS zones are private DNS zones provided that you enable the auto registration feature.
The following options are incorrect because Dagupan.com and Palawan.com are public DNS zones. You can not use public DNS zones as they do not have the capability to use virtual network links and the auto registration feature.
– Manila.com and Dagupan.com only
– Davao.com and Palawan.com
– Dagupan.com and Palawan.com only
References:
https://docs.microsoft.com/en-us/azure/dns/private-dns-overview
https://docs.microsoft.com/en-us/azure/dns/private-dns-virtual-network-links
https://docs.microsoft.com/en-us/azure/dns/private-dns-autoregistration
2-11. QUESTION
Category: AZ-104 – Implement and Manage Storage
You have an Azure subscription that contains a storage account named tdstorageaccount1.
You have 14 TB of files you need to migrate to tdstorageaccount1 using Azure Import/Export service.
You need to identify the two files you need to create before the preparation of the drives for journal file.
Which two files should you create?
- ARM template
- Dataset CSV File
- WAImportExport file
- Driveset CSV file
- PowerShell PS1 file
- Dataset CSV File
- Driveset CSV file
Azure Import/Export service is used to securely import large amounts of data to Azure Blob storage and Azure Files by shipping disk drives to an Azure datacenter. This service can also be used to transfer data from Azure Blob storage to disk drives and ship to your on-premises sites. Data from one or more disk drives can be imported either to Azure Blob storage or Azure Files.
Consider using Azure Import/Export service when uploading or downloading data over the network is too slow or getting additional network bandwidth is cost-prohibitive. Use this service in the following scenarios:
– Data migration to the cloud: Move large amounts of data to Azure quickly and cost-effectively.
– Content distribution: Quickly send data to your customer sites.
– Backup: Take backups of your on-premises data to store in Azure Storage.
– Data recovery: Recover large amount of data stored in storage and have it delivered to your on-premises location.
The first step of an import job is the preparation of the drives. This is where you need to generate a journal file. The following files are needed before you create a journal file:
– The Dataset CSV File
– Dataset CSV file is the value of /dataset flag is a CSV file that contains a list of directories and/or a list of files to be copied to target drives. The first step to creating an import job is to determine which directories and files you are going to import.
– This can be a list of directories, a list of unique files, or a combination of those two. When a directory is included, all files in the directory and its subdirectories will be part of the import job.
– The Driveset CSV file
– The value of the /InitialDriveSet or /AdditionalDriveSet flag is a CSV file that contains the list of disks to which the drive letters are mapped so that the tool can correctly pick the list of disks to be prepared.
Hence, the correct answers are:
– Dataset CSV File
– Driveset CSV file
The following options are incorrect because an Azure Import/Export journal file only requires a driveset CSV file and dataset CSV File during the preparation of your drives.
– ARM template
– PowerShell PS1 file
– WAImportExport file
References:
https://docs.microsoft.com/en-us/azure/import-export/storage-import-export-service
https://docs.microsoft.com/en-us/azure/import-export/storage-import-export-data-to-files
2-14. QUESTION
Category: AZ-104 – Monitor and Maintain Azure Resources
Your company has an Azure subscription that contains the following resources:
(image)
You have an Azure Recovery Services vault named TDBackup1 that backs up TD1, TD2, and TD3 daily without an Azure Backup Agent.
Select the correct answer from the drop-down list of options. Each correct selection is worth one point.
- You can execute a file recovery operation TD2 to:
? - You can restore TD3 to:
?
- You can execute a file recovery operation TD2 to:
TD2 only - You can restore TD3 to: TD3 only
Azure Backup provides independent and isolated backups to guard against unintended destruction of the data on your VMs. Backups are stored in a Recovery Services vault with built-in management of recovery points. Configuration and scaling are simple, backups are optimized, and you can easily restore as needed.
To recover a specific file, you must specify the recovery point of your backup and download a script that will mount the disks from the selected recovery point. After the script is successfully downloaded, make sure you have the right machine to execute this script.
When recovering files, you can’t restore files to a previous or future operating system version. For example, you can’t restore a file from a Windows Server 2016 VM to Windows Server 2012 or a Windows 8 computer. You can restore files from a VM to the same server operating system, or to the compatible client operating system.
You can restore a virtual machine with the following options:
– Create a new VM
– Restore Disk
– Replace existing disk (OLR)
As one of the restore options, you can replace an existing VM disk with the selected restore point. The current VM must exist. If it’s been deleted, this option can’t be used. Azure Backup takes a snapshot of the existing VM before replacing the disk, and stores it in the staging location you specify.
Existing disks connected to the VM are replaced with the selected restore point. The snapshot is copied to the vault and retained in accordance with the retention policy.
After the Replace Disk operation, the original disk is retained in the resource group. You can choose to manually delete the original disks if they aren’t needed.
Therefore, you can perform file recovery to TD2 only because the operating systems of TD1 and TD3 are not compatible with TD2. You need to ensure that the machine you are recovering the file to meets the requirements before executing the script.
Conversely, you can restore TD3 to TD3 only because you can not restore the disk of TD3 to TD1 and TD2. You can only restore a virtual machine by creating a new VM, restoring a disk, or replace the existing VM disk.
References:
https://docs.microsoft.com/en-us/azure/backup/backup-overview
https://docs.microsoft.com/en-us/azure/backup/backup-azure-arm-restore-vms
https://docs.microsoft.com/en-us/azure/backup/backup-azure-restore-files-from-vm
2-15. QUESTION
Category: AZ-104 – Implement and Manage Storage
You have an Azure subscription that contains a sync group named TDSync1 which has an associated cloud endpoint called TDCloud1. The file tutorials.docx is included in the cloud endpoint.
You have the following on-premises Windows Server 2019 file servers that you want to synchronize to Azure:
(image)
You first registered FileServer1 as a server endpoint to TDSync1 and then registered FileServer2 as a server endpoint to TDSync1.
For each of the following items, choose Yes if the statement is true or choose No if the statement is false.
- tutorials.docx on TDCloud1 will be overwritten by tutorials.docx from FileServer1
- dojo.mp4 will be synced to FileServer1
- tutorials.docx on FileServer1 will be overwritten by tutorials.docx from TDCloud1
- tutorials.docx on TDCloud1 will be overwritten by tutorials.docx from FileServer1
NO - dojo.mp4 will be synced to FileServer1
YES - tutorials.docx on FileServer1 will be overwritten by tutorials.docx from TDCloud1
NO
Azure Files enables you to set up highly available network file shares that can be accessed by using the standard Server Message Block (SMB) protocol. That means that multiple VMs can share the same files with both read and write access. You can also read the files using the REST interface or the storage client libraries.
Remember that whenever you make changes to any cloud endpoint or server endpoint in the sync group, it will be synced to the other endpoints in the sync group. If you make a change to the cloud endpoint (Azure file share) directly, changes first need to be discovered by an Azure File Sync change detection job. A change detection job is only initiated for a cloud endpoint once every 24 hours.
Take note that Azure does not overwrite any files in your sync group. Instead, it will keep both changes to files that are changed in two endpoints at the same time. The most recently written change keeps the original file name.
The older file (determined by LastWriteTime) has the endpoint name and the conflict number appended to the filename. For server endpoints, the endpoint name is the name of the server. For cloud endpoints, the endpoint name follows this taxonomy:
– <FileNameWithoutExtension>-<endpointName>[-#].<ext></ext></endpointName></FileNameWithoutExtension>
– For example, tutorials-FileServer1.docx
Azure File Sync supports 100 conflict files per file. Once the maximum number of conflict files has been reached, the file will fail to sync until the number of conflict files is less than 100.
Hence, this statement is correct: dojo.mp4 will be synced to FileServer1.
The following statements are incorrect because Azure File Sync will not overwrite any files in your endpoints. It will simply append a conflict number to the filename of the older file, while the most recent change will retain the original file name.
– tutorials.docx on FileServer1 will be overwritten by tutorials.docx from TDCloud1.
– tutorials.docx on TDCloud1 will be overwritten by tutorials.docx from FileServer1.
References:
https://docs.microsoft.com/en-us/azure/storage/files/storage-files-introduction
https://docs.microsoft.com/en-us/azure/storage/files/storage-sync-files-deployment-guide
2-20. QUESTION
Category: AZ-104 – Monitor and Maintain Azure Resources
Your company has an Azure Log Analytics workspace in their Azure subscription.
You are instructed to find the error in the table named EventLogs.
Which log query should you run in the workspace?
- search in (EventLogs) “error”
- EventLogs | take 10
- search “error”
- EventLogs | sort by TimeGenerated desc
- search in (EventLogs) “error”
Azure Monitor is a service in Azure that provides performance and availability monitoring for applications and services in Azure, other cloud environments, or on-premises. Azure Monitor collects data from multiple sources into a common data platform where it can be analyzed for trends and anomalies. Rich features in Azure Monitor assist you in quickly identifying and responding to critical situations that may affect your application.
To retrieve data in the Log Analytics workspace, you need to use a Kusto Query Language (KQL). Remember that there are different types of log queries in Azure Monitor. Based on the given question, you only need to find the “error” in the table named “EventLogs.”
With search queries, you can find the specific value that you need in your table. This query searches the “TableName” table for records that contains the word “value”:
search in (TableName) “value”
If you omit the “in (TableName)“ part and just run the search “value”, the search will go over all tables, which would take longer and be less efficient.
Hence, the correct answer is: search in (EventLogs) “error”.
The option that says: EventLogs | take 10 is incorrect because this option would only take 10 results in the EventLogs table. Remember that the requirement in the scenario is to show all the logs containing the word “error” in the table named EventLogs.
The option that says: search “error” is incorrect because this query would search “error” in all the tables. Take note that you only need to query the table EventLogs.
The option that says: EventLogs | sort by TimeGenerated desc is incorrect because this query will only sort the entire EventLogs table by the TimeGenerated column.
References:
https://docs.microsoft.com/en-us/azure/azure-monitor/log-query/get-started-queries
https://docs.microsoft.com/en-us/azure/azure-monitor/log-query/log-analytics-tutorial
2-23. QUESTION
Category: AZ-104 – Deploy and Manage Azure Compute Resources
You deployed ten web servers that are running in Windows Server 2019 virtual machines behind an Azure load balancer. The virtual machines host a stateless web application.
You need to ensure that successive requests from the same client IP address and protocol will be handled by the same virtual machine.
What should you configure in the load balancer?
- Set idle timeout to the maximum available limit.
- Set the session persistence to Client IP and protocol.
- Configure Client IP as the session persistence type.
- Enable floating IP.
- Set the session persistence to Client IP and protocol.
Azure Load Balancer is a Layer-4 (TCP, UDP) load balancer that provides high availability by distributing incoming traffic among healthy VMs. A load balancer health probe monitors a given port on each VM and only distributes traffic to an operational VM. You define a front-end IP configuration that contains one or more public IP addresses. This front-end IP configuration allows your load balancer and applications to be accessible over the Internet.
To redirect the client request to the same virtual machine, you need to add a session persistence in the load balancing rule. Session persistence specifies that traffic from a client should be handled by the same virtual machine in the backend pool for the duration of a session.
There are three options in session persistence:
– None – specifies that successive requests from the same client may be handled by any virtual machine.
– Client IP – specifies that the same virtual machine will handle successive requests from the same client IP address.
– Client IP and protocol – specifies that the same virtual machine will handle successive requests from the same client IP address and protocol combination.
Since the requirement in the scenario is to handle the same client IP address and protocol, you need to set the Session Persistence to Client IP and protocol.
Hence, the correct answer is: Set the session persistence to Client IP and protocol.
The option that says: Configure Client IP as the session persistence type is incorrect because the requirement in the scenario is the same client IP address and protocol. This type of configuration is only applicable if you want to persist the same client IP address, excluding its protocol.
The option that says: Set idle timeout to the maximum available limit is incorrect because the maximum available limit in idle timeout is 30 minutes. Also, idle timeout is used to keep TCP or HTTP connections open without relying on clients to send keep-alive messages. You don’t need to set idle timeout because the only requirement is to redirect the same client IP address and protocol to the same virtual machine.
The option that says: Enable Floating IP is incorrect because this feature just changes the IP address mapping to the front-end IP of the load balancer. The Floating IP feature is not capable of handling sticky sessions.
References:
https://docs.microsoft.com/en-us/azure/load-balancer/manage
https://docs.microsoft.com/en-us/azure/load-balancer/load-balancer-overview
2-26. QUESTION
Category: AZ-104 – Deploy and Manage Azure Compute Resources
A company plans to deploy an Azure Virtual Machine with the following parameters:
Region: South Central US
OS disk type: Standard HDD
Ultra Disk compatibility: Disabled
Managed disks: Disabled
To prevent downtime, you need to make sure that the instance can be moved in different Availability Zones using Site Recovery.
Which parameter should be modified?
- Managed disks
- Region
- OS disk type
- Ultra Disk compatibility
- Managed disks
Azure Site Recovery helps ensure business continuity by keeping business apps and workloads running during outages. Site Recovery replicates workloads running on physical and virtual machines (VMs) from a primary site to a secondary location. When an outage occurs at your primary site, you fail over to a secondary location, and access apps from there. After the primary location is running again, you can fail back to it.
Site Recovery can manage replication for:
– Azure VMs replicating between Azure regions
– Replication from Azure Public Multi-Access Edge Compute (MEC) to the region
– Replication between two Azure Public MECs
– On-premises VMs, Azure Stack VMs, and physical servers
Managed disks are designed to have a 99.999% uptime. Managed disks achieve this by storing three copies of your data, resulting in high durability. If one or two replicas fail, the remaining replicas help ensure data persistence and high failure tolerance.
With Azure Site Recovery, you can move single-instance VMs into Availability Zones in a target region. However, in order to move a VM to an Availability Zone, you must first ensure that the VM is using managed disks. You can also convert existing Windows VMs that use unmanaged disks to use managed disks.
Hence, the correct answer is: Managed disks.
Region is incorrect because South Central US already allows you to select Availability Zone as an option. This means that you can move the VM to different AZs. Take note that some Regions or locations don’t support AZs.
OS disk type is incorrect because it doesn’t matter what type of disk the VM is using, if you already enabled “use managed disks” in advanced disk configuration.
Ultra Disk compatibility is incorrect because the requirement is not related to data-intensive workloads. You only need to ensure that the VMs can be moved to a different AZ in the event of a disaster.
References:
https://learn.microsoft.com/en-us/azure/site-recovery/move-azure-vms-avset-azone
https://learn.microsoft.com/en-us/azure/virtual-machines/windows/convert-unmanaged-to-managed-disks
2-28. QUESTION
Category: AZ-104 – Manage Azure Identities and Governance
Your company has an Azure subscription named TD-Sub1 that contains the resources shown in the table below.
(image)
You created a new Azure subscription named TD-Sub2.
You plan to move the resources from TD-Sub1 to TD-Sub2.
Which resources in TD-Sub1 can you move to the new subscription?
- Virtual machine, Virtual network, Recovery Services vault, and Storage account
- Virtual machine, Virtual network, and Storage account
- Virtual machine, Virtual network, and Recovery Services vault
- Virtual machine and Virtual network
- Virtual machine, Virtual network, Recovery Services vault, and Storage account
A resource group is a container that holds related resources for an Azure solution. The resource group can include all the resources for the solution, or only those resources that you want to manage as a group. You decide how you want to allocate resources to resource groups based on what makes the most sense for your organization. Generally, add resources that share the same lifecycle to the same resource group so you can easily deploy, update, and delete them as a group.
If you need to move your resources to a new subscription or resource group under the same subscription, you can use Azure portal, Azure PowerShell, Azure CLI, or the REST API. Take note that when you move a resource to a new resource group or subscription, the location of the resource won’t change.
Hence, the correct answer is: Virtual machine, Virtual network, Recovery Services vault, and Storage account.
The following options are incorrect because you can move all these resources to a new subscription or resource group.
– Virtual machine, Virtual network, and Storage account
– Virtual machine, Virtual network, and Recovery Services vault
– Virtual machine and Virtual network
References:
https://docs.microsoft.com/en-us/azure/azure-resource-manager/management/move-resource-group-and-subscription
https://docs.microsoft.com/en-us/azure/azure-resource-manager/management/overview
2-30. QUESTION
Category: AZ-104 – Manage Azure Identities and Governance
You are managing a Microsoft Entra ID tenant and a Microsoft 365 tenant.
You need to grant several users who must belong to the same Azure group temporary access to the Microsoft SharePoint document library. The group must automatically be deleted after 180 days for compliance purposes.
Which two actions could you perform?
- Set up a dynamic membership on Microsoft 365 groups.
- Set up an assigned membership on security groups.
- Set up an assigned membership on Microsoft 365 groups.
- Set up a dynamic membership on security groups.
- Set up an external identity provider.
- Set up a dynamic membership on Microsoft 365 groups.
- Set up an assigned membership on Microsoft 365 groups.
Microsoft Entra ID is a cloud-based identity and access management service that enables your employees access external resources. Example resources include Microsoft 365, the Azure portal, and thousands of other SaaS applications.
Microsoft Entra ID also helps them access internal resources like apps on your corporate intranet, and any cloud apps developed for your own organization.
When creating a new group in Microsoft Entra ID, you can select two types of membership.
-The assigned membership type lets you add specific users to be members of the group and to have unique permissions.
-While dynamic membership type lets you add and remove members automatically based on your dynamic membership rules (user attributes such as department, location, or job title).
Since you need to delete the groups automatically, you can set an expiration policy in Microsoft 365 groups. Take note that when a group expires, all of its associated services will also be deleted.
Hence, the correct answers are:
– Set up a dynamic membership on Microsoft 365 groups.
– Set up an assigned membership on Microsoft 365 groups.
The options that say: Set up an assigned membership on security groups and Set up a dynamic membership on security groups are incorrect because security groups can only be used for devices or users and not for groups.
The option that says: Set up an external identity provider is incorrect because external identities only allow users outside your organization to access your resources. This option won’t help you create an expiration policy.
References:
https://docs.microsoft.com/en-us/microsoft-365/solutions/microsoft-365-groups-expiration-policy
https://learn.microsoft.com/en-us/entra/fundamentals/how-to-manage-groups
https://learn.microsoft.com/en-us/entra/identity/users/groups-create-rule
2-32. QUESTION
Category: AZ-104 – Deploy and Manage Azure Compute Resources
You are managing an Azure subscription that contains the following resources:
(image)
You plan to configure a proximity placement group for the TD-VMSS1 virtual machine scale set.
Which of the following proximity placement groups should you use?
- TD-Proximity1 and TD-Proximity3
- TD-Proximity2
- TD-Proximity3
- TD-Proximity1, TD-Proximity2, and TD-Proximity3
- TD-Proximity3
Azure virtual machine scale sets let you create and manage a group of load-balanced VMs. The number of VM instances can automatically increase or decrease in response to demand or a defined schedule. Scale sets provide high availability to your applications and allow you to centrally manage, configure, and update a large number of VMs. With virtual machine scale sets, you can build large-scale services for areas such as compute, big data, and container workloads.
A proximity placement group is a logical grouping used to make sure that Azure compute resources are physically located close to each other. Proximity placement groups are useful for workloads where low latency is a requirement. When you assign your virtual machines to a proximity placement group, the virtual machines are placed in the same data center, resulting in lower and deterministic latency for your applications.
It is stated in the scenario that you must configure a placement group for TD-VMSS1. Among the given placement groups, you can only assign TD-Proximity3 since it belongs to the same region as TD-VMSS1. Remember that when you are configuring a proximity placement group for a virtual machine scale set. Both the placement group and scale set must be in the same region.
Hence, the correct answer is: TD-Proximity3.
The option that says: TD-Proximity2 is incorrect because TD-VMSS1 is located in East Asia and not in Australia East. Although both TD-VMSS1 and TD-Proximity2 belong to the same resource group, take note that the location of the resource group is irrelevant in this scenario. You should assign TD-VMSS1 to the TD-Proximity3 placement group to satisfy the requirement.
The option that says: TD-Proximity1 and TD-Proximity3 is incorrect. You can’t configure TD-Proximity1 for TD-VMSS1 since the location of TD-Proximity1 is in Southeast Asia while TD-VMSS1 is in Australia East. The region of the virtual machine scale set and the proximity placement group should be the same.
The option that says: TD-Proximity1, TD-Proximity2, and TD-Proximity3 is incorrect because you can only assign TD-VMSS1 in TD-Proximity3. In this scenario, both the virtual machine scale set and proximity placement group must be in the same region.
References:
https://docs.microsoft.com/en-us/azure/virtual-machines/windows/proximity-placement-groups-portal
https://azure.microsoft.com/en-us/blog/announcing-the-general-availability-of-proximity-placement-groups/
2-33. QUESTION
Category: AZ-104 – Monitor and Maintain Azure Resources
Your company has an Azure subscription that contains the following resources:
(image1)
You are instructed to monitor the storage account and configure an SMS notification for the following signals.
(image2)
How many alert rules and action groups should you create?
Select the correct answer from the drop-down list of options. Each correct selection is worth one point.
- Alert rules
? - Action groups
?
- Alert rules
4 - Action groups
3
Azure Monitor is a service in Azure that provides performance and availability monitoring for applications and services in Azure, other cloud environments, or on-premises. Azure Monitor collects data from multiple sources into a common data platform where it can be analyzed for trends and anomalies. Rich features in Azure Monitor assist you in quickly identifying and responding to critical situations that may affect your application.
Action rules help you define or suppress actions at any Azure Resource Manager scope (Azure subscription, resource group, or target resource). It has various filters that can help you narrow down the specific subset of alert instances that you want to act on.
An action group is a collection of notification preferences defined by the owner of an Azure subscription. Azure Monitor and Service Health alerts use action groups to notify users that an alert has been triggered. Various alerts may use the same action group or different action groups depending on the user’s requirements.
The requirement in the scenario is to identify how many alert rules and action groups should be created. Based on the given signal types, you should create four alert rules. Take note that you need to create one alert rule per signal type.
For the action groups, you only need to create 3 action groups because the users that will be notified for Availability and Create/Update Storage Account are the same (User 1, User 2, and User 3). Remember that action groups are created for each unique set of users that will be notified.
Therefore, the correct answers are:
– Alert rules = 4
– Action groups = 3
References:
https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-action-rules
https://docs.microsoft.com/en-us/azure/azure-monitor/platform/action-groups
2-34. QUESTION
Category: AZ-104 – Manage Azure Identities and Governance
You are managing an Azure subscription that has an Azure AD tenant named tutorialsdojo.onmicrosoft.com. The tenant contains the following users:
(image1)
You created the following security groups in tutorialsdojo.onmicrosoft.com:
(image2)
The tutorialsdojo.onmicrosoft.com contains the following Windows 10 devices:
(image3)
For each of the following items, choose Yes if the statement is true or choose No if the statement is false.
- TD-User1 can add TD-Device2 to TD-SG2.
- TD-User1 can add TD-Device2 to TD-SG1.
- TD-User2 can add TD-Device1 to TD-SG1.
- TD-User1 can add TD-Device2 to TD-SG2.
NO - TD-User1 can add TD-Device2 to TD-SG1.
YES - TD-User2 can add TD-Device1 to TD-SG1.
NO
Azure Active Directory (Azure AD) is Microsoft’s cloud-based identity and access management service, which helps your employees sign in and access resources in external (such as Microsoft 365, the Azure portal, and thousands of other SaaS applications) and internal resources (such as apps on your corporate network and intranet, along with any cloud apps developed by your own organization).
Azure Role-Based Access Control (Azure RBAC) has several Azure built-in roles that you can assign to users, groups, service principals, and managed identities. Role assignments are the way you control access to Azure resources. If the built-in roles don’t meet the specific needs of your organization, you can create your own Azure custom roles. For the given scenario, the Owner role has full access to manage all resources, including the ability to assign roles in Azure RBAC.
In the given scenario, there are three Azure AD roles:
- User Administrator role – can create users and manage all aspects of users with some restrictions, and can update password expiration policies. Additionally, users with this role can create and manage all groups.
- Cloud Device Administrator role – can enable, disable, and delete devices in Azure AD and read Windows 10 BitLocker keys (if present) in the Azure portal. The role does not grant permission to manage any other properties on the device.
- Security Administrator role – has permissions to manage security-related features in the Microsoft 365 security center, Azure Active Directory Identity Protection, Azure Active Directory Authentication, Azure Information Protection, and Office 365 Security & Compliance Center.
To organize users or devices by geographic location, department, or hardware characteristics, you can create the following types of groups:
- Assigned – the Administrators can manually assign users or devices to this group, and manually remove users or devices.
- Dynamic – automatically add/remove users or devices to user groups or device groups based on an expression you create. For example, when a user is added with the manager title, the user is automatically added to an All managers users group. Or, when a device has the iOS/iPadOS device OS type, the device is automatically added to an All iOS/iPadOS devices group.
To get a device in Azure AD, you have multiple options:
- Azure AD registered – devices that are Azure AD registered are typically personally owned or mobile devices, and are signed in with a personal Microsoft account or another local account.
- Azure AD joined – devices that are Azure AD joined are owned by an organization, and are signed in with an Azure AD account belonging to that organization. They exist only in the cloud.
- Hybrid Azure AD joined – devices that are hybrid Azure AD joined are owned by an organization and are signed in with an Active Directory Domain Services account belonging to that organization. They exist in the cloud and on-premises.
The statement that says: TD-User1 can add TD-Device2 to TD-SG1 is correct because TD-User1 has the role of User Administrator and also the owner of TD-SG1. Since the membership type of TD-SG1 is assigned, TD-User1 would be able to add or assign TD-Device2 to the group.
The statement that says: TD-User2 can add TD-Device1 to TD-SG1 is incorrect. Take note that the Cloud Device Administrator role can only manage devices in Azure AD. The role does not have permission to manage a group like a User Administrator role. But if TD-User2 is the owner of TD-SG1, then it has the permission to add TD-Device1 to TD-SG1.
The statement that says: TD-User1 can add TD-Device2 to TD-SG2 is incorrect because TD-SG2 is a dynamic group. This means that users and devices are automatically added to the group. In short, TD-User1 can’t manually add or remove users and devices in TD-SG2.
References:
https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference
https://docs.microsoft.com/en-us/mem/intune/fundamentals/groups-add
https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles
2-36. QUESTION
Category: AZ-104 – Deploy and Manage Azure Compute Resources
Note: This item is part of a series of questions with the exact same scenario but with a different proposed answer. Each one in the series has a unique solution that may, or may not, comply with the requirements specified in the scenario.
You deployed an Ubuntu server using Azure Virtual Machine.
You received an email notification that your resources will be affected by the planned maintenance.
You need to migrate the virtual machine to a new Azure host.
Solution: Redeploy the virtual machine.
Does the solution meet the goal?
No
Yes
YES
Azure Virtual Machines (VM) is one of several types of on-demand, scalable computing resources that Azure offers. Typically, you choose a VM when you need more control over the computing environment. An Azure VM gives you the flexibility of virtualization without having to buy and maintain the physical hardware that runs it. However, you still need to maintain the VM by performing tasks, such as configuring, patching, and installing the software that runs on it.
When you redeploy a VM, it moves the VM to a new node within the Azure infrastructure and then powers it back on. This means that the virtual machine will be unavailable when the redeployment is in progress. Since the requirement in the scenario is to migrate the VM to a new Azure host then redeploying the virtual machine will satisfy the requirement.
Hence, the correct answer is: Yes.
References:
https://docs.microsoft.com/en-us/azure/virtual-machines/troubleshooting/redeploy-to-new-node-linux
https://docs.microsoft.com/en-us/azure/virtual-machines/troubleshooting/redeploy-to-new-node-windows
2-38. QUESTION
Category: AZ-104 – Implement and Manage Virtual Networking
Note: This item is part of a series of case study questions with the exact same scenario but with a different proposed answer. Each one in the series has a unique solution that may, or may not, comply with the requirements specified in the scenario.
Your company has an Azure subscription that contains a virtual network with a subnet named TDSub1 and a virtual machine named TD1 with a public IP address and is configured to allow Remote Desktop Connections.
TDSub1 is the subnet of TD1.
You created two network security groups named TDSG-TD1 attached to the network interface of TD1 and TDSG-TDSub1 attached to TDSub1.
TDSG-TDSub1 uses default inbound security rules while TDSG-TD1 has the default inbound security rules with a custom rule:
Name: RDP
Priority: 100
Source: Any
Source port range: *
Destination: *
Destination port range: 3389
Protocol: ICMP
Action: Allow
You need to ensure that you can connect to TD1 from the Internet using Remote Desktop connections.
Solution: You add an inbound security rule to TDSG-TDSub1 with the following configuration:
Priority: 200
Source: Any
Source port range: *
Destination: *
Destination port range: 3389
Protocol: TCP
Action: Allow
Does this meet the goal?
Yes
No
NO
Azure Network Security Group is used to filter network traffic to and from Azure resources in an Azure virtual network. A network security group contains security rules that allow or deny inbound network traffic to, or outbound network traffic from, several types of Azure resources. For each rule, you can specify source and destination, port, and protocol.
The solution in this scenario states that you will add a new inbound security rule that allows port 3389 traffic from the Internet using TCP protocol to TDSG-TDSub1.
In the image above, the Remote Desktop connection will first be evaluated by the security rules in TDSG-TDSub1, since it is associated to TDSub1 and TD1 is in TDSub1. The connection is allowed and will be evaluated next by TDSG-TD1. The connection is then denied by TDSG-TD1 because the custom rule only allows port 3389 traffic from the Internet using ICMP protocol.
You should modify the current custom rule of TDSG-TD1 by changing the ICMP protocol to TCP protocol or you can create a new inbound security rule in TDSG-TD1 that allows port 3389 traffic from the Internet using TCP protocol.
Hence, the correct answer is: No.
References:
https://docs.microsoft.com/en-us/azure/virtual-network/virtual-networks-overview
https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview
2-39. QUESTION
Category: AZ-104 – Implement and Manage Virtual Networking
Note: This item is part of a series of case study questions with the exact same scenario but with a different proposed answer. Each one in the series has a unique solution that may, or may not, comply with the requirements specified in the scenario.
Your company has an Azure subscription that contains a virtual network with a subnet named TDSub1 and a virtual machine named TD1 with a public IP address and is configured to allow Remote Desktop Connections.
TDSub1 is the subnet of TD1.
You created two network security groups named TDSG-TD1 attached to the network interface of TD1 and TDSG-TDSub1 attached to TDSub1.
TDSG-TDSub1 uses default inbound security rules while TDSG-TD1 has the default inbound security rules with a custom rule:
Name: RDP
Priority: 100
Source: Any
Source port range: *
Destination: *
Destination port range: 3389
Protocol: TCP
Action: Allow
You need to ensure that you can connect to TD1 from the Internet using Remote Desktop connections.
Solution: You add an inbound security rule to TDSG-TDSub1 with the following configuration:
Priority: 200
Source: Service tag
Source port range: Virtual Network
Destination: *
Destination port range: 3389
Protocol: TCP
Action: Allow
You disassociate TDSG-TD1 from the network interface of TD1.
Does this meet the goal?
No
Yes
NO
Azure Network Security Group is used to filter network traffic to and from Azure resources in an Azure virtual network. A network security group contains security rules that allow or deny inbound network traffic to, or outbound network traffic from, several types of Azure resources. For each rule, you can specify source and destination, port, and protocol.
In the image above, the Remote Desktop connection will first be evaluated by the security rules in TDSG-TDSub1, since it is associated to TDSub1 and TD1 is in TDSub1. Take note that TDSG-TDSub1 uses only the default security rules, the connection is denied by the DenyAllInbound default security rule, and never evaluated by TDSG-TD1 since TDSG-TD1 is associated to the network interface. If TDSG-TDSub1 has a security rule that allows port 3389 from the Internet, the traffic is then processed by TDSG-TD1.
It is recommended that you associate a network security group to a subnet or a network interface, but not both. Since rules in a network security group associated with a subnet can conflict with rules in a network security group associated with a network interface, you can have unexpected communication problems that require troubleshooting.
To allow port 3389 from the Internet to TD1, you create an inbound security rule to TDSG-TDSub1 that allows port 3389 from the Internet instead of the virtual network service tag and you disassociate TDSG-TD1 from the network interface of TD1.
Hence, the correct answer is: No.
References:
https://docs.microsoft.com/en-us/azure/virtual-network/virtual-networks-overview
https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview
- QUESTION
Category: AZ-104 – Manage Azure Identities and Governance
Your company has a subscription to Azure that has multiple virtual machines.
You have been tasked to manage all computing resources.
You must determine unattached disks that can be deleted in order to reduce costs.
Which of the following options should you use?
- Use Azure Cost Management cost analysis to download resources data.
- Use Azure Advisor to identify low usage virtual machines.
- Use Azure Cost Management to view Advisor recommendations.
- Use Azure Monitor VM insights.
- Use Azure Cost Management to view Advisor recommendations.
Cost Management shows the organizational cost and usage patterns with advanced analytics. Reports in Cost Management show the usage-based costs consumed by Azure services and third-party Marketplace offerings. The reports help you understand your spending and resource use and can help find spending anomalies. Cost Management uses Azure management groups, budgets, and recommendations to show clearly how your expenses are organized and how you might reduce costs.
Advisor recommendations show how to optimize and improve efficiency by identifying idle and underutilized resources. Alternatively, they can display less expensive resource options. When you follow the advice, you change the way you use your resources to save money.
It is important to note that deleting the disk eliminates the possibility of recovery. Azure recommends taking a snapshot before deleting data or ensuring that the data on the disk is no longer required.
Hence, the correct answer is: Use Azure Cost Management to view Advisor recommendations.
The option that says: Use Azure Advisor to identify low usage virtual machines is incorrect because you only need to identify unattached disks and not the virtual machine usage.
The option that says: Use Azure Cost Management cost analysis to download resources data is incorrect because cost analysis only helps you view accumulated costs over time to estimate monthly, quarterly, or even yearly cost trends against a budget.
The option that says: Use Azure Monitor VM insights is incorrect because you don’t need to monitor the health and performance of virtual machines just to identify unattached disks.
References:
https://learn.microsoft.com/en-us/azure/advisor/advisor-reference-cost-recommendations
https://learn.microsoft.com/en-us/azure/cost-management-billing/cost-management-billing-overview