test 10 Flashcards

1
Q

Which of the following are file formats not recommended for compression?

MP3

JPG

Text/HTML

Text/CSS

A

MP3
JPG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are developing a storage plan that includes Premium storage.Which storage redundancy type is

available to use? Select one.

Locally redundant storage

RA Geo redundant Storage

Zone Redundant Storage

Geo Redundant Storage

A

Locally redundant storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the PowerShell command to add the image information to the virtual machine’s configuration?

Set-AzureRmVMSourceImage -VM $VirtualMachine -PublisherName “MicrosoftWindowsServer” -Offer “WindowsServer” -Skus “2012-R2-Datacenter” -Version “latest”

Get-AzureRmVMSourceImage -VM $VirtualMachine -PublisherName “MicrosoftWindowsServer” -Offer “WindowsServer” -Skus “2012-R2-Datacenter” -Version “latest”

Set-AzureRmVMSourceImage -VM $VirtualMachine -PublisherName “MicrosoftWindowsServer” -Offer “WindowsServer” -Sku “2012-R2-Datacenter” -Version “current”

Set-AzureRmVMSourceImage -VM $VirtualMachine -PublisherName WindowsServer -Offer “WindowsServer” -Skus “2012-R2-Datacenter” -Version “latest

A

Set-AzureRmVMSourceImage -VM $VirtualMachine -PublisherName “MicrosoftWindowsServer” -Offer “WindowsServer” -Skus “2012-R2-Datacenter” -Version “latest”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

For Linux, which of the CLI commands will open up port 80?

az vm open-port –port 80 –resourcegroup myResourceGroup –name myVM

az vm open-port –port 80 –resource-group myResourceGroup –name myVM

az vm set-port –port 80 –resource-group myResourceGroup –name myVM

None of these commands are needed because port 80 is open by default.

A

az vm open-port –port 80 –resource-group myResourceGroup –name myVM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

We are trying to apply a tag to a resource group and need the appropriate permissions using the philosophy of least privileges. Which answer below would be the most appropriate?

You are assigned the Contributor role in RBAC.

You are assigned the Owner role in RBAC.

We are assigned the Reader role in RBAC.

We are assigned the Administrator role in RBAC.

A

You are assigned the Contributor role in RBAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which account will be able to reset the password regardless of whether the Azure Active Directory password reset enabled option is selected?

An account with Owner permissions.

An account with Contributor permissions.

Azure Administrator

An account with Reader permissions.

A

Azure Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You want Azure Active Directory’s Application Proxy feature at the lowest price possible. You also want to to make sure you have the enterprise-level SLA of 99.9 percent uptime. Which of the following would be the best option?

Azure Active Directory - Free

Azure Active Directory - Basic

Azure Active Directory - Premium P1

Azure Active Directory - Premium P2

A

Azure Active Directory - Premium P1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One of your teammates on the IT team is trying to change the size of a VM but can’t seem to do so. They are able to set off the job, but it fails immediately. What is one possible reason why they can’t perform this action?

The subscription doesn’t support this size of VM.

The resource has already reached its maximum size.

The resource is locked.

The user is logged into the classic portal.

A

The resource is locked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are an IT Administrator, and you are concerned about protecting corporate assets and devices meeting standards for security and compliance. What options are available to get a device under the control of Azure AD?

Using Identity Protection.

Registering the device to Azure AD.

Joining a device.

Using the Conditional Access Rule.

A

Registering the device to Azure AD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You have a MySQL database that you want to keep secure and prevent access to the public internet. Which of these options would you use? Select 3

Service Endpoint

VNet Peering

NSG

Private IP Address

A

Service Endpoint
NSG
Private IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The shared access signature (SAS) URI consists of which of the following?

SAS Token

Access Key 2

Access Key 1

Storage Resource

A

SAS Token
Storage Resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following settings are not not swapped when you swap an an app? Select three.

General settings, such as framework version, 32/64-bit, web sockets

Handler mappings

Always On

Correct selection
Custom domain names

Publishing endpoint

A

Always On
Custom domain names
Publishing endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are backing up your App Service. Which of the following is included in the backup? Select two.

Files and database content totalling 15GB

SSL enabled Azure Database for MySQL

Firewall enabled-storage account

App configuration

Azure database for MySQL

A

App configuration

Azure database for MySQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You want to utilize Azure Identity Protection, which one of the editions below supports this feature?

Free

Basic

Premium P2

Premium P1

A

Premium P2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are having problems with the installation of Azure File Sync on your server. What action could you take to get more details on possible issues?

Check the Diagnostics Logs.

Check the Activity Log.

Check the Azure File Sync error log on the local file system.

Run the command StorageSyncAgent.msi /l*v AFSInstaller.log.

A

Run the command StorageSyncAgent.msi /l*v AFSInstaller.log.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which series would we choose if we had a virtual machine used for Artificial Intelligence (AI)?

F-Series

A-Series

H-Series

L-Series

A

H-Series

12
Q

The Contoso Company would like policies implemented to enforce a standard for how their infrastructure is built. Which of the following RBAC roles will they need to have to view these policies?

Domain Administrator

Security Admin

Security Reader

Security Contributor

A

Security Reader

13
Q

You configured a routing table which should be forcing all outgoing traffic from one virtual machine to go through a firewall appliance. However, the traffic is not going through the firewall appliance. Which one of the following would be an effective diagnostic tool?

Create a Log Analytics workspace.

Install Network Monitoring Agent

Network Watcher

Activate Resource Diagnostic Settings

A

Network Watcher

13
Q

You have a MySQL database on a Linux instance. The MySQL database is in development and being worked on by your developers. Only the developers should have access to this database while it is in the development stage. Which of the following actions will ensure that only the developers can access the database?

Using the Azure Application Gateway.

Using an NSG rule that has the source: IP addresses identified (outbound rule).

Setting the NSG rules that only allow traffic from the developers.

Using an NSG rule that has the source port range (inbound rule).

A

Setting the NSG rules that only allow traffic from the developers.

14
Q

If you wanted to gain insight into your on-premises identity infrastructure that is used to access Azure AD applications and also monitors the synchronizations that occur between your on-premises Azure Directory Domain Services (AD DS) and Azure AD, which of the following tools would you use?

Azure AD Connect Health

Activity Report

This information is not captured within the Azure environment.

Security reports

A

Azure AD Connect Health

15
Q

Which of the following is not a recommended protocol to access Azure File Sync from your Windows Server?

nfs

SMB

http

FTPS

A

http

16
Q

Your company previously did not allow employees to use their own devices to access company resources for security reasons. However, management is now considering allowing employees to use their own devices in conjunction with AD join. What are the potential security benefits that may persuade management to allow employees to use their own devices?

Organizations can restrict access to apps from only the devices that meet the compliance policy.

Organizations can use Windows Hello support for convenient access to work resources.

Enterprise compliant roaming of user’s settings across joined devices for users with Microsoft accounts.

Organizations can still use on-premise AD to manage security protocols.

Organizations can use single sign-on functionality as long as the employees are connected to the domain network.

A

Organizations can restrict access to apps from only the devices that meet the compliance policy.

Organizations can use Windows Hello support for convenient access to work resources.

17
Q

What PowerShell command prompts the user for either a password or a username and password?

Put-Credential

Get-PsCredential

Set-Credential

Get-Credential

A

Get-Credential

18
Q

What is the limit on the total number of VNet service endpoints in a virtual network?

25,000

5

500

There is no limit on the total number of VNet service endpoints in a virtual network.

A

There is no limit on the total number of VNet service endpoints in a virtual network.

19
Q

We have reached the CPU quota in the West US 2 region. What two options do we have to move forward when creating this virtual machine?

Delete other running VMs.

Give the user admin rights.

Click Ok to charge the subscription.

Request a quota increase.

A

Delete other running VMs.

Request a quota increase.

20
Q

Your current virtual machine which is currently running has a size of standard DS2_V2, this plan does not allow more than two NICs and you need to add a third NIC. What are the steps you would take to add the additional NIC (assuming the NIC already exists)?

1) Shut down the machine 2) Go to the network blade of the VM 3) Click on Attach Network Interface. 4) Select the existing network interface 5) Select existing NIC and click okay. 6) Start the machine.

1) Shut down the machine. 2) Increase the plan size to DS3_v2. 3) Go into the network blade of the VM. 4) Go into the NSG blade. 5) Click attach network interface, 6) Select the existing NIC, and then click okay. 7) Start the machine.

1) Shut down the machine. 2) Increase the plan size to DS3_v2. 3) Go into the networking blade of the VM 4) Click Attach Network Interface. 5) Select the existing NIC, and then click okay. 6) Start the machine.

1) Upgrade the grade plan size to DS3_v2. 2) Go to the network security group blade. 3) Click Attach Network Interface. 4) Select the existing NIC, and then click okay. 5) Reboot the machine for the new NIC to be seen.

A

1) Shut down the machine. 2) Increase the plan size to DS3_v2. 3) Go into the networking blade of the VM 4) Click Attach Network Interface. 5) Select the existing NIC, and then click okay. 6) Start the machine.

21
Q

Which of the following items can be associated with a Network Security Group (NSG)?

Security Rule

Subnets

NIC

Virtual Machine

A

Security Rule
Subnets
NIC

22
Q

You decide to move all your services to Azure Kubernetes service. Which of the following components will contribute to your monthly Azure charge? Select one

Master node

Node virtual machines

Tables

Pods

A

Node virtual machines

23
Q

What method does Microsoft Azure App Service use to obtain credentials for users attempting to access an app? Select one.

synchronization of accounts across providers

pass-through authentication

credentials that are stored in the browser

redirection to a provider endpoint

A

redirection to a provider endpoint

24
Q

You are the new administrator of an organization, and one of the changes that you want to implement is multi-factor authentication (MFA). How would you be able to get a count of how many users have not registered for multi-factor authentication?

This information is not collected.

Security Alerts from Privileged Identity Management

Users page, within the MFA Settings site.

Identity Protection within the MFA report.

A

Users page, within the MFA Settings site.

25
Q

You have four different storage accounts. If you want to limit access to a team of people within the organization to just one storage service on one storage account, with the least amount of work, which of the following would be used to accomplish this goal?

SAS service.

SAS account.

Azure Traffic Manager

NSG

A

SAS service.

26
Q

Can you add an existing VM to an availability set?

Only when the VM has been suspended.

No, you can only add a VM to an availability set when creating the VM.

Only when the VM has been shutdown.

Yes, you can add an existing VM to an availability set at any time.

A

No, you can only add a VM to an availability set when creating the VM.

27
Q

You are configuring networking for the Azure Kubernetes service. Which of the following maps incoming direct traffic to the pods? Select one.

Load Balancer

ClusterIP

NodePort

† AKS node

A

NodePort

28
Q

Which of the following is not true about container groups? Select one.

Is assigned a DNS name label.

Exposes a single public IP address, with one exposed port.

Includes two Azure file shares as volume mounts.

Consists of two containers.

Is scheduled on a multiple host machines.

A

Is scheduled on a multiple host machines.

29
Q

You have an existing virtual machine that is currently running, and you need to add an existing custom data disk. What are the steps you would take?

A. Select the VM you are trying to attach the existing disk.
Click Attach existing to attach the available disk to the VM.
From the existing disk pane, select your disk, and then click OK.
Restart the machine in order for the additional disk to be seen

B. A shutdown of the machine.
Select the VM you are trying to attach the existing disk.
Click Attach existing to attach the available disk to the VM.
From the existing disk pane, select your disk, and then click OK

C. Select the VM you are trying to attach the existing disk.
Click Attach new to attach the available disk to the VM.
Select your disk, and then click OK.

D. Select the VM you are trying to attach the existing disk.
Click Attach existing to attach the available disk to the VM.
From the existing disk pane, select your disk, and then click OK

A

D. Select the VM you are trying to attach the existing disk.
Click Attach existing to attach the available disk to the VM.
From the existing disk pane, select your disk, and then click OK

30
Q

Which of the following built-in roles has the required Microsoft Authorization permissions that will allow a user account to create a cloud endpoint?

Reader and Data Access

Contributor

Owner

User Access Administrator

A

Owner
User Access Administrator