test 2 Flashcards

1
Q

You are securing your virtual network in Azure. Which of the following practices would be effective for establishing secure communication paths within your virtual network and controlling inbound and outbound traffic? (two answer)
Associate an NSG with the subnet.
Implement Azure Bastion for every virtual machine in the network.
Set up security rules in NSGs to define source, destination, and allowed traffic.
Assign a public IP address to each resource for direct access.

A

Associate an NSG with the subnet.
Set up security rules in NSGs to define source, destination, and allowed traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To analyze system updates across multiple virtual machines, which feature of Azure Monitor should you utilize?
Metrics
Insights
Log Analytics
Alerts

A

Log Analytics
Explanation
Log Analytics in Azure Monitor allows you to collect, analyze, and visualize log and performance data from multiple sources, including virtual machines. By utilizing Log Analytics, you can track system updates, identify trends, and troubleshoot issues across multiple virtual machines effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following statements are true regarding managing licenses in Microsoft Entra ID?
Licenses can be assigned to individual users.
Licenses are automatically provisioned when a new user is created.
Licenses can be assigned to groups.
Each user can have only one license.

A

Licenses can be assigned to individual users.
Explanation
Licenses can indeed be assigned to individual users in Microsoft Enterprise ID, allowing organizations to control access to specific features and services based on user roles and responsibilities.

Licenses can be assigned to groups.
Explanation
In Microsoft Enterprise ID, licenses can be assigned to groups as well, enabling organizations to manage licenses more efficiently by assigning them to groups of users with similar needs or roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In Azure, Role-Based Access Control (RBAC) can be assigned at various levels.

Which of the following scopes are valid levels for assigning roles in Azure?
Resource Group
Management Group
Subscription
Virtual Network

A

Resource Group
Explanation
Assigning roles at the Resource Group level in Azure allows for granular control over permissions for a specific set of resources that are grouped together. This level of scope is beneficial for managing access to resources that are related to a particular project or team, ensuring that only authorized users have the necessary permissions.

Management Group
Explanation
Management Groups in Azure serve as containers for organizing and managing resources, subscriptions, and policies. By assigning roles at the Management Group level, you can establish consistent access controls and governance practices across multiple subscriptions within the same hierarchy, making it a valid level for role assignment in Azure.

Subscription
Explanation
At the Subscription level in Azure, Role-Based Access Control (RBAC) enables administrators to define who has access to resources and what actions they can perform within a specific subscription. Assigning roles at this level ensures that permissions are managed effectively across all resources and services within the subscription.

Virtual Network
Explanation
While Virtual Networks in Azure play a crucial role in network connectivity and isolation, they are also valid levels for assigning roles in Role-Based Access Control (RBAC). The resource level is the most granular scope, referring to an individual resource like a virtual machine, storage account, or database. Assigning a role at the resource level means the role assignment applies only to that specific resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following statements are true regarding Azure resource management?
Tags can be used to organize resources and manage costs.
Resource groups are logical containers for resources deployed on Azure.
Every resource can be in only one resource group.
Policies can be used to enforce tags on resources.

A

all option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When configuring an Azure Storage account, which of the following redundancy options are available?
Local Redundancy Storage (LRS)
(Read-Access) Geo-Zone-Redundant Storage ((RA)-GZRS)
Object-Level Redundancy (OLR)
(Read-Access) Geo-Redundant Storage ((RA)-GRS)

A

Local Redundancy Storage (LRS)
(Read-Access) Geo-Zone-Redundant Storage ((RA)-GZRS)
(Read-Access) Geo-Redundant Storage ((RA)-GRS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When examining an Azure Resource Manager (ARM) template, which of the following elements can be commonly found?
Resources
Outputs
Dependencies
Extensions
Variables

A

Resources
Outputs
Variables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have successfully deployed resources using an ARM template. Now, you want to use the Bicep language to manage these resources in the future.

What command do you use to transition from ARM to Bicep?
bicep build
bicep compile
bicep version
bicep decompile

A

bicep decompile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your organization follows strict security policies, and you are required to generate a SAS token for a container in a storage account. You also need to ensure that if the security requirements change, the SAS token permissions can be altered without regenerating the token.

What should you use?
Generate an account-level SAS without any stored access policy.
Generate a service-level SAS linked to a stored access policy.
Generate an account-level SAS and link it to a role-based access control (RBAC) policy.
Use managed identity to access the container.

A

Generate a service-level SAS linked to a stored access policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are managing data between two storage accounts. You have just set up object replication between these accounts. Using AzCopy, you noticed that some blobs that existed before enabling replication haven’t been replicated.

What steps should you consider next? (Choose two)
Disabling and Re-enabling Replication
Use Azure Storage Explorer to manually copy the missing blobs.
Use AzCopy to copy the pre-existing blobs between the source and destination.
Changing Blob Types

A

Use Azure Storage Explorer to manually copy the missing blobs.
Use AzCopy to copy the pre-existing blobs between the source and destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company wishes to optimize its costs related to Blob Storage. They have a mix of frequently accessed data, data that’s accessed occasionally, and archives. They also want data that hasn’t been accessed for 180 days to be deleted automatically.

Which actions should the company take? (Choose three)
Set infrequently accessed blobs to the “Cool” access tier.
Set archives to “Premium” access tier.
Configure a lifecycle management policy to delete blobs that haven’t been accessed in 180 days.
Use the “Hot” access tier for frequently accessed data.
Only use the Hot Access tier.

A

Set infrequently accessed blobs to the “Cool” access tier.
Configure a lifecycle management policy to delete blobs that haven’t been accessed in 180 days.
Use the “Hot” access tier for frequently accessed data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your organization has recently decided to adopt Bicep as the primary language for infrastructure as code on Azure.

Which of the following actions can you perform with Bicep?
Directly convert an ARM template JSON file to a Bicep file using Azure CLI.
Deploy resources to Azure using a Bicep file without any pre-compilation.
Translate a Bicep file into an equivalent ARM template JSON file.
Validate a Bicep file using Azure PowerShell without deploying it.

A

Directly convert an ARM template JSON file to a Bicep file using Azure CLI.
Deploy resources to Azure using a Bicep file without any pre-compilation.
Translate a Bicep file into an equivalent ARM template JSON file.
Validate a Bicep file using Azure PowerShell without deploying it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are tasked with ensuring the confidentiality and security of data at rest within your Azure virtual machines.

Which of the following actions will help you achieve this? (Choose two).
Encrypt VM OS and data disks using Azure Disk Encryption.
Convert unmanaged disks to managed disks.
Enable Defender for the virtual machines.
Store VM disks in Azure Blob Storage with a private access level.

A

Encrypt VM OS and data disks using Azure Disk Encryption.
Convert unmanaged disks to managed disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are responsible for developing a containerized application workflow for your organization. You decide to use Azure to streamline deployment and scaling.

Which of the following actions are critical to successfully deploy and scale a containerized application in Azure?
Create an Azure Container Registry and store the Docker images.
Deploy the container using Azure Container Services for orchestration.
Provision the application using Azure Container Instances for rapid elasticity.
Enable auto-scaling and customize scaling rules in Azure Container Apps.

A

Create an Azure Container Registry and store the Docker images.
Enable auto-scaling and customize scaling rules in Azure Container Apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are setting up a highly available e-commerce web application in Azure. You decide to use Azure App Service for hosting the application.

Which of the following configurations will ensure that the application remains operational during regional outages and maintenance?
Deploy the app to multiple regions and use Azure Front Door for load balancing
Deploy the App Service in a single region and enable Geo-Redundant backups.

Deploy the App Service in a single region with multiple deployment slots.
Use an Azure CDN in front of the App Service.

A

Deploy the app to multiple regions and use Azure Front Door for load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You have been tasked to optimize a mission-critical Azure App Service for security, continuity, and agility.

Which of the following actions should you take?
Map a custom domain to the App Service and configure a managed certificate for Transport Layer Security (TLS).
Configure daily backups of the App Service with a retention period of 30 days.
Set up deployment slots for staging and testing new features before production deployment.
Disable the public endpoint and enable Azure Private Link for secure access to the App Service.

A

Map a custom domain to the App Service and configure a managed certificate for Transport Layer Security (TLS).
Configure daily backups of the App Service with a retention period of 30 days.
Set up deployment slots for staging and testing new features before production deployment.
Disable the public endpoint and enable Azure Private Link for secure access to the App Service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You’ve been assigned to ensure that traffic from the Internet to your Azure virtual machine (VM) is restricted only to HTTP and HTTPS. However, internal traffic within your VNet should flow freely.

Which of the following configurations would best suit this requirement?
Implement an NSG with inbound security rules that allow HTTP and HTTPS traffic and associate it with the subnet of your VM.
Implement an NSG with inbound security rules that allow HTTP and HTTPS traffic and associate it with the VM’s network interface.
Implement an application security group and associate it with the VM. Allow only HTTP and HTTPS traffic.
Remove all security groups and use Azure Firewall for these rules.

A

Implement an NSG with inbound security rules that allow HTTP and HTTPS traffic and associate it with the VM’s network interface.
Explanation
Implementing an NSG with inbound security rules that allow only HTTP and HTTPS traffic and associating it with the VM’s network interface would ensure that only HTTP and HTTPS traffic from the Internet reaches the VM while allowing internal VNet traffic to flow freely. This configuration meets the requirement of restricting Internet traffic to HTTP and HTTPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You are architecting a secure Azure environment. You want to ensure that your VMs are accessible only from within the Azure portal and your Azure SQL Database is only accessible from a specific VNet.

Which of the following should you consider implementing?
Deploy Azure Bastion in the VNet where your VMs are located.
Implement Azure Private Link for your Azure SQL Database.
Configure a service endpoint on the VNet for Azure SQL Database.
Use Azure Front Door to secure VM access.

A

Deploy Azure Bastion in the VNet where your VMs are located.
Configure a service endpoint on the VNet for Azure SQL Database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You are setting up a custom domain for your Azure Web App and plan to use Azure DNS. What type of record should you establish in Azure DNS to point to the hostname of your Azure Web App?
A Record
CNAME Record
MX Record
TXT Record

A

CNAME Record
Explanation
A CNAME Record, also known as Canonical Name Record, is used to alias one domain name to another. In the context of setting up a custom domain for an Azure Web App, a CNAME Record is the appropriate choice to point to the hostname of the Web App.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You have an Azure environment that uses a standard load balancer to distribute traffic across several VMs. Lately, some users report they cannot access the application. You suspect a load-balancing issue.

Which of the following steps should you take to troubleshoot the problem?
Check the backend health of the load balancer.
Verify the NSG rules associated with the subnet or NIC of the VMs to ensure traffic is allowed.
Ensure the VMs have a static public IP address.
Confirm that the health probes of the load balancer are correctly configured.

A

Check the backend health of the load balancer.
Verify the NSG rules associated with the subnet or NIC of the VMs to ensure traffic is allowed.
Ensure the VMs have a static public IP address.
Confirm that the health probes of the load balancer are correctly configured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You are configuring Azure Backup and Azure Site Recovery for a production workload.

Which of the following statements is true?
Azure Backup Vault and Recovery Services Vault are the same.
Azure Backup only supports the backup of virtual machines.
Recovery Services vault supports Azure VM backup, Azure Site Recovery, and Azure Backup for SQL Server in Azure VM.

A

Azure Site Recovery can be used to automate the recovery of services when a site-wide outage happens.
Recovery Services vault supports Azure VM backup, Azure Site Recovery, and Azure Backup for SQL Server in Azure VM.

22
Q

You have configured a backup policy for your Azure virtual machines.

Which of the following default retention duration options is NOT available when configuring an enhanced daily backup policy for an Azure VM?
60 days
180 days
12 weeks
60 months
10 years

A

60 days
Explanation
The default retention duration option of 60 days is not available when configuring an enhanced daily backup policy for an Azure VM. This option is not part of the standard retention durations provided for daily backups in Azure.

23
Q

Your organization uses Microsoft Entra ID for managing licenses. You are tasked with ensuring an external partner can access certain company resources without consuming a license and that an internal user gets an appropriate license.

Which of the following actions should you take? (Choose two)
Invite a external user.
Add the external partner as a member in Entra ID.
Provide the internal user with a (direct) license assignment.
Assign an Azure Blob Storage permission to the internal user.

A

Invite a external user.
Provide the internal user with a (direct) license assignment.

24
Q

An employee reports they are unable to use the Self-Service Password Reset (SSPR) feature.

Which of the following could be the potential reason?
Their account is flagged as a high-risk user.
SSPR is not enabled for their user group.
They are using Azure DevOps.
They have not accessed any Azure resources in the last 30 days.

A

SSPR is not enabled for their user group.

25
Q

Which resource lock prevents accidental deletion or modification of an Azure resource, but allows resources to be read?
ReadOnly
NotDelete
DoNoDelete
None

A

ReadOnly

26
Q

Azure Disk Encryption uses which of the following to encrypt the OS and data disks of Azure virtual machines?
Bitlocker
Azure Key Vault
Azure Policy
Entra ID

A

Bitlocker
Explanation
Bitlocker is the correct choice for Azure Disk Encryption as it is the encryption technology used to encrypt the OS and data disks of Azure virtual machines. It provides encryption for data at rest and helps protect against unauthorized access to the disks.

27
Q

You want to ensure high availability for your Azure VMs and want to relocate some VMs to a different region for disaster recovery.

Which of the following steps are required? (Choose two)
Deploy VM in an availability set in the target region
Move VM to a different subscription
Use Azure Site Recovery to replicate the VM to the target region
Perform a full backup of the VMs before enabling replication.

A

Deploy VM in an availability set in the target region
Move VM to a different subscription
Use Azure Site Recovery to replicate the VM to the target region

28
Q

Which of the following is NOT a benefit of Azure Virtual Machine Scale Sets?
Support for different VM sizes and configurations within the same scale set.
Auto-scaling based on demand.
High Availability.
Integration with Azure Load Balancer.

A

Support for different VM sizes and configurations within the same scale set.

29
Q

You’ve been asked to set up a UDR (User-Defined Route) to route traffic from a subnet in your virtual network through a Network Virtual Appliance.

Which of the following properties is NOT needed when setting up this UDR?
Address Prefix
Next Hop Type
Subnet Mask
Next Hop Address

A

Subnet Mask

30
Q

You are deploying a secure environment in Azure. You want to ensure that your virtual machines are only accessed through Azure Bastion and that your Azure SQL Database instance is only accessible from a specific virtual network.

Which of the following actions would you need to take? (Choose two)
Implement Azure Bastion in the virtual network
Configure a private endpoint for the Azure SQL Database in the virtual network
Create a service endpoint for the Azure SQL Database on the subnet
Associate the NSG of the virtual network with the Azure SQL Database server firewall

A

Implement Azure Bastion in the virtual network
Create a service endpoint for the Azure SQL Database on the subnet

31
Q

You are responsible for setting up Azure DNS for your organization’s primary domain “example.com”. Which record type would you set up to ensure that mail.example.com points to your mail server’s IP address?
A record
CNAME record
MX record
TXT record

A

A record
Explanation
An A record (Address record) is used to map a domain name to an IPv4 address. In this case, setting up an A record for mail.example.com would ensure that the domain points to the specific IP address of your mail server, allowing mail delivery to the correct destination.

32
Q

You have an application running on several VMs in Azure. You want to set up an alert in Azure Monitor to notify you when network latency goes above a certain threshold.

Which Azure service would best serve this purpose?
Azure Metrics Explorer
Azure Log Analytics
Connection Monitor
Azure Service Health

A

Connection Monitor
Explanation
Connection Monitor is the correct choice for setting up alerts based on network latency thresholds. It is a service in Azure Monitor that allows you to monitor network connectivity between various endpoints and set up alerts based on specific criteria, such as latency exceeding a certain threshold.

33
Q

You are configuring a backup policy for your virtual machines in Azure.

Which of the following three parameters are essential for defining the backup frequency?
Backup schedule
Data retention period
Recovery Point Objective (RPO)
Vault name

A

Backup schedule
Data retention period
Recovery Point Objective (RPO)

34
Q

Which of the following are crucial components when setting up a backup strategy in Azure?
Setting up a backup frequency
Configuring Storage Tier
Determining retention period
Assigning public IP addresses to backups

A

Setting up a backup frequency
Determining retention period

35
Q

You’re planning to safeguard your data against data loss in Azure.

Which of the following would you utilize to store backup data, such as files, folders, and system state?
Azure Storage Account
Recovery Services vault
Azure Cosmos DB
Azure Blob Storage

A

Recovery Services vault
Explanation
Recovery Services vault is the correct choice for storing backup data, including files, folders, and system state in Azure. It provides a centralized management and protection solution for backup and disaster recovery scenarios, ensuring data availability and recoverability in case of data loss.

36
Q

To analyze system updates across multiple virtual machines, which feature of Azure Monitor should you utilize?
Metrics
Insights
Log Analytics
Alerts

A

Log Analytics

37
Q

You are deploying a web application in Azure and want to ensure its high availability and that it uses a custom domain.

Which of the following steps should you take?
Register a custom domain using Azure DNS.
Assign a static public IP address to each VM running the web application.
Configure an Azure public load balancer and associate it with the VMs running the web application.
Directly route traffic from the custom domain to one VM.

A

Register a custom domain using Azure DNS.
Configure an Azure public load balancer and associate it with the VMs running the web application.

38
Q

Your company has deployed Microsoft Entra SSPR. To enhance security, which of the following configurations can you enforce for users utilizing SSPR? (Choose two)
Set a minimum password age.
Mandate a mobile phone number.
Enforce multi-factor authentication during reset.
Enforcing the use of smart cards.

A

Mandate a mobile phone number.

Explanation
Mandating a mobile phone number is a crucial security measure for users utilizing SSPR. By requiring a mobile phone number, users can receive verification codes or alerts for additional security during the password reset process.

Enforce multi-factor authentication during reset.
Explanation
Enforcing multi-factor authentication during reset is a critical security measure for users utilizing SSPR. By requiring users to verify their identity through multiple factors, such as a password and a verification code sent to their mobile phone, the security of the reset process is significantly enhanced.

39
Q

You’re an Azure administrator for a multinational corporation. You’ve been tasked with delegating access to a team to manage virtual machines within an Azure subscription but not to modify the networking configurations.

Which built-in Azure role should you assign?
Virtual Machine Contributor
Network Contributor
Contributor
Reader

A

Virtual Machine Contributor
Explanation
Virtual Machine Contributor role allows users to manage virtual machines, but it does not grant permissions to modify networking configurations. This role is suitable for delegating access to a team to manage virtual machines within an Azure subscription without giving them the ability to make changes to networking settings.

40
Q

Which of the following is NOT a valid mode for an Azure Policy definition?
Indexed
All
DoNotAllow

A

DoNotAllow
Explanation
DoNotAllow is NOT a valid mode for an Azure Policy definition. The correct modes for Azure Policy definitions include Indexed, All, and NotSpecified. DoNotAllow is not a recognized mode for defining Azure Policies.

41
Q

You have deployed a critical resource in Azure. You want to ensure that no one, including users with administrative access, accidentally deletes or modifies this resource.

Which resource lock level should you apply and is most restrictive?
ReadOnly
CanNotDelete
CanNotModify
Delete

A

ReadOnly

Explanation
Applying a ReadOnly lock level to the critical resource in Azure ensures that no one, including users with administrative access, can delete or modify the resource. This lock level is the most restrictive as it only allows users to view the resource and its properties without making any changes.

42
Q

Which of the following statements are true regarding Azure resource tags?
Not all resource types support tags
Tag values are case-sensitive
Tags support cost-accruing services
Tags applied to a resource group are automatically inherited by the resources in that group.
All resource types support tags

A

Not all resource types support tags
Tag values are case-sensitive
Tags support cost-accruing services

43
Q

In Azure, when you set a budget, what feature can you use to trigger actions based on budget thresholds being met or exceeded?
Action Groups
Azure Policy
Azure Automation runbook
Azure Functions

A

Action Groups

Explanation
Action Groups in Azure allow you to define a set of notifications and actions that are triggered based on alerts or other conditions. When setting a budget in Azure, you can use Action Groups to trigger specific actions when budget thresholds are met or exceeded, such as sending notifications, running automation tasks, or scaling resources.

44
Q

You are setting up authentication mechanisms for your Azure Storage.

Which of the following can be used to provide secure access to your data in Azure Files? (Choose four)
Microsoft Entra Domain Services
Shared Access Signature
Storage account keys
On-premises Active Directory Domain Services (AD DS)
Azure role-based access control (Azure RBAC)
Shared Key authorization

A

Microsoft Entra Domain Services
Storage account keys
On-premises Active Directory Domain Services (AD DS)
Azure role-based access control (Azure RBAC)

45
Q

You’re managing the data flow between two Azure Storage accounts. You need to set up a one-way replication for blobs between the accounts and occasionally need to copy data manually.

Which of the following tools or services will help you achieve this? (Choose two)

Azure Blob Storage lifecycle policy
Azure Storage Explorer
Object replication
Azure Site Recovery

A

Azure Storage Explorer
Object replication

46
Q

You’re managing Azure Blob Storage for your organization. You need to ensure the following:

Infrequently accessed data is moved to a more cost-effective storage tier automatically.

Old versions of the blobs are retained for up to 60 days.

Objects that are deleted are recoverable for 30 days.

Which of the following features of Azure Blob Storage would you configure to meet these requirements? (Choose three)
Soft Delete for blobs
Blob versioning
Cool tier
Blob lifecycle management policy
Access tiers

A

Soft Delete for blobs
Blob versioning
Blob lifecycle management policy

47
Q

You are reviewing a Bicep file that intends to deploy a virtual machine. You noticed that the file lacks a declaration to specify the virtual machine’s size. To ensure the deployment uses a Standard_DS1_v2 size for the VM, which line should you add to the Bicep file?
vmSize: ‘Standard_DS1_v2’
properties.size: ‘Standard_DS1_v2’
sku: ‘Standard_DS1_v2’
vm_sku: ‘Standard_DS1_v2’

A

vmSize: ‘Standard_DS1_v2’

Explanation
The correct way to specify the size of a virtual machine in a Bicep file is by using the ‘vmSize’ property with the desired size value, in this case ‘Standard_DS1_v2’. This line directly sets the size of the VM to the specified value.

48
Q

Which of the following are valid methods to restrict access to Azure Storage accounts?
Configuring a firewall to allow requests from specific IP ranges.
Setting up a virtual network to allow only traffic from within the VNet to access the storage.
Utilizing Entra ID-based authentication for Azure Files.
Creating a new Azure subscription.

A

Configuring a firewall to allow requests from specific IP ranges.
Setting up a virtual network to allow only traffic from within the VNet to access the storage.

49
Q

When configuring an Azure Storage account, which of the following redundancy options are available?
Local Redundancy Storage (LRS)
(Read-Access) Geo-Zone-Redundant Storage ((RA)-GZRS)
Object-Level Redundancy (OLR)
Remote Redundancy Storage (RRS)
(Read-Access) Geo-Redundant Storage ((RA)-GRS)

A

Local Redundancy Storage (LRS)
(Read-Access) Geo-Zone-Redundant Storage ((RA)-GZRS)
(Read-Access) Geo-Redundant Storage ((RA)-GRS)

50
Q

When creating and managing Azure file shares, which of the following features are available?
Soft delete to recover a deleted share.
Conversion of a file share into a blob container.
Creation of snapshots for a point-in-time copy of the file share.
Auto-expansion of file shares.

A

Soft delete to recover a deleted share.
Creation of snapshots for a point-in-time copy of the file share.