test 10 Flashcards
Which of the following are file formats not recommended for compression?
MP3
JPG
Text/HTML
Text/CSS
MP3
JPG
You are developing a storage plan that includes Premium storage.Which storage redundancy type is
available to use? Select one.
Locally redundant storage
RA Geo redundant Storage
Zone Redundant Storage
Geo Redundant Storage
Locally redundant storage
What is the PowerShell command to add the image information to the virtual machine’s configuration?
Set-AzureRmVMSourceImage -VM $VirtualMachine -PublisherName “MicrosoftWindowsServer” -Offer “WindowsServer” -Skus “2012-R2-Datacenter” -Version “latest”
Get-AzureRmVMSourceImage -VM $VirtualMachine -PublisherName “MicrosoftWindowsServer” -Offer “WindowsServer” -Skus “2012-R2-Datacenter” -Version “latest”
Set-AzureRmVMSourceImage -VM $VirtualMachine -PublisherName “MicrosoftWindowsServer” -Offer “WindowsServer” -Sku “2012-R2-Datacenter” -Version “current”
Set-AzureRmVMSourceImage -VM $VirtualMachine -PublisherName WindowsServer -Offer “WindowsServer” -Skus “2012-R2-Datacenter” -Version “latest
Set-AzureRmVMSourceImage -VM $VirtualMachine -PublisherName “MicrosoftWindowsServer” -Offer “WindowsServer” -Skus “2012-R2-Datacenter” -Version “latest”
For Linux, which of the CLI commands will open up port 80?
az vm open-port –port 80 –resourcegroup myResourceGroup –name myVM
az vm open-port –port 80 –resource-group myResourceGroup –name myVM
az vm set-port –port 80 –resource-group myResourceGroup –name myVM
None of these commands are needed because port 80 is open by default.
az vm open-port –port 80 –resource-group myResourceGroup –name myVM
We are trying to apply a tag to a resource group and need the appropriate permissions using the philosophy of least privileges. Which answer below would be the most appropriate?
You are assigned the Contributor role in RBAC.
You are assigned the Owner role in RBAC.
We are assigned the Reader role in RBAC.
We are assigned the Administrator role in RBAC.
You are assigned the Contributor role in RBAC.
Which account will be able to reset the password regardless of whether the Azure Active Directory password reset enabled option is selected?
An account with Owner permissions.
An account with Contributor permissions.
Azure Administrator
An account with Reader permissions.
Azure Administrator
You want Azure Active Directory’s Application Proxy feature at the lowest price possible. You also want to to make sure you have the enterprise-level SLA of 99.9 percent uptime. Which of the following would be the best option?
Azure Active Directory - Free
Azure Active Directory - Basic
Azure Active Directory - Premium P1
Azure Active Directory - Premium P2
Azure Active Directory - Premium P1
One of your teammates on the IT team is trying to change the size of a VM but can’t seem to do so. They are able to set off the job, but it fails immediately. What is one possible reason why they can’t perform this action?
The subscription doesn’t support this size of VM.
The resource has already reached its maximum size.
The resource is locked.
The user is logged into the classic portal.
The resource is locked.
You are an IT Administrator, and you are concerned about protecting corporate assets and devices meeting standards for security and compliance. What options are available to get a device under the control of Azure AD?
Using Identity Protection.
Registering the device to Azure AD.
Joining a device.
Using the Conditional Access Rule.
Registering the device to Azure AD.
You have a MySQL database that you want to keep secure and prevent access to the public internet. Which of these options would you use? Select 3
Service Endpoint
VNet Peering
NSG
Private IP Address
Service Endpoint
NSG
Private IP Address
The shared access signature (SAS) URI consists of which of the following?
SAS Token
Access Key 2
Access Key 1
Storage Resource
SAS Token
Storage Resource
Which of the following settings are not not swapped when you swap an an app? Select three.
General settings, such as framework version, 32/64-bit, web sockets
Handler mappings
Always On
Correct selection
Custom domain names
Publishing endpoint
Always On
Custom domain names
Publishing endpoints
You are backing up your App Service. Which of the following is included in the backup? Select two.
Files and database content totalling 15GB
SSL enabled Azure Database for MySQL
Firewall enabled-storage account
App configuration
Azure database for MySQL
App configuration
Azure database for MySQL
You want to utilize Azure Identity Protection, which one of the editions below supports this feature?
Free
Basic
Premium P2
Premium P1
Premium P2
You are having problems with the installation of Azure File Sync on your server. What action could you take to get more details on possible issues?
Check the Diagnostics Logs.
Check the Activity Log.
Check the Azure File Sync error log on the local file system.
Run the command StorageSyncAgent.msi /l*v AFSInstaller.log.
Run the command StorageSyncAgent.msi /l*v AFSInstaller.log.
Which series would we choose if we had a virtual machine used for Artificial Intelligence (AI)?
F-Series
A-Series
H-Series
L-Series
H-Series
The Contoso Company would like policies implemented to enforce a standard for how their infrastructure is built. Which of the following RBAC roles will they need to have to view these policies?
Domain Administrator
Security Admin
Security Reader
Security Contributor
Security Reader
You configured a routing table which should be forcing all outgoing traffic from one virtual machine to go through a firewall appliance. However, the traffic is not going through the firewall appliance. Which one of the following would be an effective diagnostic tool?
Create a Log Analytics workspace.
Install Network Monitoring Agent
Network Watcher
Activate Resource Diagnostic Settings
Network Watcher
You have a MySQL database on a Linux instance. The MySQL database is in development and being worked on by your developers. Only the developers should have access to this database while it is in the development stage. Which of the following actions will ensure that only the developers can access the database?
Using the Azure Application Gateway.
Using an NSG rule that has the source: IP addresses identified (outbound rule).
Setting the NSG rules that only allow traffic from the developers.
Using an NSG rule that has the source port range (inbound rule).
Setting the NSG rules that only allow traffic from the developers.
If you wanted to gain insight into your on-premises identity infrastructure that is used to access Azure AD applications and also monitors the synchronizations that occur between your on-premises Azure Directory Domain Services (AD DS) and Azure AD, which of the following tools would you use?
Azure AD Connect Health
Activity Report
This information is not captured within the Azure environment.
Security reports
Azure AD Connect Health
Which of the following is not a recommended protocol to access Azure File Sync from your Windows Server?
nfs
SMB
http
FTPS
http
Your company previously did not allow employees to use their own devices to access company resources for security reasons. However, management is now considering allowing employees to use their own devices in conjunction with AD join. What are the potential security benefits that may persuade management to allow employees to use their own devices?
Organizations can restrict access to apps from only the devices that meet the compliance policy.
Organizations can use Windows Hello support for convenient access to work resources.
Enterprise compliant roaming of user’s settings across joined devices for users with Microsoft accounts.
Organizations can still use on-premise AD to manage security protocols.
Organizations can use single sign-on functionality as long as the employees are connected to the domain network.
Organizations can restrict access to apps from only the devices that meet the compliance policy.
Organizations can use Windows Hello support for convenient access to work resources.
What PowerShell command prompts the user for either a password or a username and password?
Put-Credential
Get-PsCredential
Set-Credential
Get-Credential
Get-Credential
What is the limit on the total number of VNet service endpoints in a virtual network?
25,000
5
500
There is no limit on the total number of VNet service endpoints in a virtual network.
There is no limit on the total number of VNet service endpoints in a virtual network.