test 3 Flashcards

1
Q

Users are reporting that when they attempt to access myapps.microsoft.com, they are prompted multiple times to sign in and are forced to use an account name that ends with onmicrosoft.com. You discover that there is a UPN mismatch between Azure AD and the on-premises Active Directory. You need to ensure that the users can use single-sign-on (SSO) to access Azure resources. What should you do first?

From the on-premises network, deploy Active Directory Federation Services in a clustered environment.

From Azure AD, add and verify a custom domain name.

From the on-premises network, request a new certificate that contains the Active Directory domain name.

From the server that runs Azure AD Connect, modify the filtering options.

A

From Azure AD, add and verify a custom domain name.

The issue arises because users are being forced to use the default onmicrosoft.com domain rather than their actual email UPN (User Principal Name) in the on-premises Active Directory, likely due to a mismatch between the on-premises UPN and the Azure AD UPN. Adding and verifying the custom domain name in Azure AD (e.g., company.com) allows users to log in with their UPNs that match their primary email addresses in the on-premises Active Directory. This helps ensure that users can authenticate seamlessly and use SSO without needing to use the onmicrosoft.com domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following Network watcher feature would you use for the following requirement?

Find out if a network security rule is preventing a network packet from reaching a virtual machine hosted in an Azure virtual network.

IP Flow Verify
Next Hop
Traffic Analysis
Packet Capture

A

IP Flow Verify

IP Flow Verify is specifically designed to check if traffic is allowed or denied by network security group (NSG) rules. You input the source and destination IP addresses, ports, and protocol, and IP Flow Verify will determine if a security rule is blocking the traffic. This makes it the best tool for diagnosing if a network security rule is preventing a network packet from reaching a virtual machine in Azure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company needs to create a storage account that must follow the requirements below:

  • Users should be able to add files, such as images and videos.
  • Ability to store archive data.
  • File shares need to be in place, which can be accessed across several VM’s.
  • The data needs to be available, even if a region goes down.
  • The solution needs to be cost-effective.

What is the type of replication they need to implement for the storage account?
A. Read-access geo-redundant storage (RA-GRS)
B. Locally redundant storage (LRS)
C. Zone-redundant storage (ZRS)
D. Geo-redundant storage (GRS)

A

Read-access geo-redundant storage (RA-GRS):

Correct Choice: RA-GRS provides geo-redundancy by replicating data to a secondary region, ensuring data availability even if the primary region goes down. It also allows read access to the data in the secondary region, which is beneficial for disaster recovery scenarios. This option meets the requirement for data availability across regions and is cost-effective compared to other geo-redundant options.

Geo-redundant storage (GRS):

Incorrect Choice: GRS provides geo-redundancy by replicating data to a secondary region, similar to RA-GRS. However, it does not allow read access to the secondary region, which can be a limitation for certain disaster recovery scenarios. RA-GRS is a more suitable choice when read access to the secondary region is needed.

Option RA-GRS is incorrect because additional read access to data in another region is not mentioned, and we also have to keep the cost to a minimum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You need to allow traffic onto certain FQDN’s via the Azure Firewall. Which of the following rules would you create for this requirement?

A. NAT collections rules
B. Network collection rules
C. Application collection rules
D. FQDN collection rules

A

Application collection rules
Correct. Application collection rules in Azure Firewall are specifically designed to control outbound HTTP/S traffic based on Fully Qualified Domain Names (FQDNs). These rules allow you to specify FQDNs that users can access, making it ideal for allowing traffic to certain FQDNs. Application rules provide Layer 7 (application layer) filtering, which is needed for FQDN filtering, and allow for both wildcard and specific domain matching.

A. NAT collection rules

Incorrect. NAT (Network Address Translation) rules are used for inbound and outbound traffic translation between private and public IP addresses. They don’t provide filtering based on FQDNs and are not suitable for allowing traffic to specific domains.
B. Network collection rules

Incorrect. Network rules operate at Layer 4 (transport layer) and allow traffic based on IP addresses, protocols, and port numbers. They don’t support FQDN filtering, which is a Layer 7 function. Therefore, they are not suitable for controlling access to specific FQDNs.
D. FQDN collection rules

Incorrect. There is no “FQDN collection rules” option in Azure Firewall. FQDN filtering is part of Application collection rules in Azure Firewall, making this option invalid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following can be used to organize resources for cost reporting? Choose the most complete answer.

A. Resource groups and tags
B. Tags
C. Cost Center, subscriptions, resource groups, and tags
D. Subscriptions, resource groups, and tags

A

C: Cost Center, subscriptions, resource groups, and tags

Correct because it includes all key elements used in Azure for cost management and reporting.
Cost Centers are logical units that help allocate costs based on departments, projects, or teams.
Subscriptions separate resources for billing and access control, making it easier to track costs across different teams or environments.
Resource Groups help group related resources, simplifying management and cost allocation.
Tags allow additional metadata to be applied across resources for flexible, detailed reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You need to deploy two Azure virtual machines named VM1 and VM2 based on the Windows server 2016 image. The deployment must meet the following requirements:

  • Provide a Service Level Agreement (SLA) of 99.95 percent availability.
  • Use managed disks.

You propose a solution to create a scale set for the requirement. Would the solution meet the goal?

A. Yes
B. No

A

B. No

Explanation:
A scale set is generally used to deploy and manage a group of identical virtual machines, mainly for load balancing and scaling purposes. However, in this scenario, a scale set is not the correct solution because it doesn’t align with the requirements to meet the SLA of 99.95% availability for two individual VMs.

Here’s why each part of the requirements does not match the scale set solution:

99.95% Availability SLA:

Azure provides a 99.95% SLA for availability if two or more virtual machines are deployed in an availability set within the same region. This SLA is achieved by spreading the VMs across multiple fault and update domains, minimizing downtime during maintenance or failures.
Scale sets do provide high availability and scalability but are mainly intended for stateless applications that can scale in and out based on demand. For just two VMs requiring 99.95% SLA, the better solution is an availability set rather than a scale set.
Managed Disks:

Managed disks can be used with both availability sets and scale sets. Therefore, using a scale set does not specifically impact the managed disk requirement.

Solution Recommendation:
To meet the requirements, you should deploy VM1 and VM2 in an availability set with managed disks. This approach will ensure the required 99.95% SLA and support for managed disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your company has the following resources created as part of its Azure subscription:

  • 100 Azure virtual machines
  • 10 Azure SQL databases
  • 50 Azure file shares

You need to create a daily backup of all resources by using Azure Backup. What is the minimum number of backup policies you have to create for this requirement?

160
2
100
1
3

A

2

In this task, there are three types of resources that require a backup. One of them is the Azure SQL database. We don’t need to create a daily backup for Azure SQL Database because Azure provides a backup as an automatic service for every database by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A company has an Azure subscription. They want to transfer around 6 TB of data to the subscription. They plan to use the Azure Import/Export service. Which of the following can they use as the destination for the imported data?

A. Azure SQL Database
B. Azure Data Lake Storage
C. Azure Blob storage
D. Azure File Sync Storage

A

Azure Blob storage

Azure Import/Export service supports transferring data directly to Azure Blob storage. The service is commonly used to import large datasets (like 6 TB) into Blob storage by shipping hard drives to Azure data centers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A company has an Azure AD tenant. They have users that are also synced with their on-premise environment. Getcloudskillsusr1 has the Reports Reader role assigned.

The administrator has enabled self-service password reset (SSPR) for all users.

  • The administrator has enabled the following SSPR settings:
  • Number of methods required to reset – 2
  • Methods available to users – Mobile phone and Security questions
  • Number of questions to register – 3
  • Number of questions to reset – 3

The following security questions are chosen:

  • In what city was your first job?
  • What was the name of the first school you attended?

Would Getcloudskillsusr1 be required to answer the security question “In what city was your first job?” to reset their password?

A. Yes
B. No

A

A. Yes

Yes, here, since SSPR has been enabled for all users, the user would need to answer the security-related question to reset their password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You create Azure AD administrative units for the subsidiaries of your organization. Each of the subsidiaries includes several hundred employees. You need to add these employees as administrative unit members. Select the tool you can use to achieve your goal.

A. Microsoft Office Admin center
B. PowerShell
C. Microsoft Graph
D. Azure CLI
E. Azure AD Portal

A

Azure AD Portal

Microsoft Office Admin center, Microsoft Graph, and PowerShell are incorrect because the Microsoft Office Admin center, Microsoft Graph, and PowerShell can manage individual users in the administrative units but not the list of the users in a bulk manner.

Azure CLI is incorrect because the Azure CLI does not have the functionality to create and manage administrative units.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What benefit does a Content Delivery Network (CDN) provide its users?

A. Allows you to store data that can be retrieved later in an extremely fast and inexpensive manner

B. Allows you to keep temporarily session information on the web visitor such as their login ID or their name

C. Allows you to reduce the traffic coming into a web server for static, unchanging files such as images, videos, and PDFs

D. For a small fee, Azure will take over management of your virtual machine, perform OS updates and ensure it’s running well

A

Allows you to reduce the traffic coming into a web server for static, unchanging files such as images, videos, and PDFs

Explanation:
Content Delivery Networks (CDNs) are specifically designed to optimize the delivery of static content to users by caching it on servers distributed across various geographic locations. This reduces latency and offloads the traffic from the main web server, thereby improving the performance and reliability of serving static assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You have an application in the East US region, running on a virtual network also in the East US region. You need to establish an encrypted, private connection to a data source that exists in Azure’s Japan region, and that data source does not have a public endpoint. Attempting to connect with the Japanese data source from East US results in an error. What is the best way to establish a connection between the two regions?

A. Use Global VNet Peering.

B. Install Gateway devices in both the East US and Japan regions, and connect the gateways together.

C. Install a Network Gateway in the Japan region. And have the East US application establish a private point-to-site VPN to Japan.

A

Use Global VNet Peering.

Global VNet Peering allows direct, private, and encrypted connectivity between virtual networks in different Azure regions (e.g., East US and Japan regions). This type of peering provides a low-latency connection between the VNets and enables resources in one VNet to communicate with resources in the other VNet as if they are on the same network.
Benefit: It’s the best option to establish a private, encrypted connection between Azure resources across regions without needing additional gateway devices or complex VPN configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company has set up a Virtual Machine in Azure. A web server listening on port 80 and a DNS server has been installed on the Virtual machine. A network security group is attached to the network interface for the virtual machine. The rules for the NSG are given below:

Select all server(s) that internet users will connect to on the Virtual machine if RuleB is deleted.

DNS server only

Both web and DNS servers

RDP, web, and DNS servers

Webserver only

RDP server only

A

RDP server only

If RuleB is deleted, users won’t be able to access port 80 and the webserver.

There is a Deny rule of RuleA for ports 50-60. Since DNS listens on port 53, you will not be able to access the DNS server. But you will still be able to connect to the virtual machine using RDP under the Allow_rdp rule.

Because of this logic, all other options are incorrect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Your company has an Azure AD tenant named getcloudskills.com.

The following user is part of the tenant:

  • Getcloudskillsusr1 is a User administrator.

The following VM is part of the tenant:

  • Getclouskillsvm1 is a Windows 10 device that is AAD registered.

The following group is part of the tenant:

  • Getcloudskillsgroup1 is a Dynamic Device group, Getcloudskillsusr1 is an owner of that group.

Would user Getcloudskillsusr1 be able to add device Getclouskillsvm1 to group Getcloudskillsgroup1?
A. Yes
B. No

A

No
Since the group is Dynamic in nature, you will not be able to add users or devices to a group manually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Your company needs to deploy an application to a set of three virtual machines. You have to ensure that two virtual machines are always available in the event of a data center failure at any point in time.

You decide to deploy the virtual machines as part of an Availability Set.

Would this fulfill the requirement?

A. Yes

B. No

A

B. No

Availability sets can’t protect virtual machines from a data center-level failure. Availability zones protect VMs from data center failure.

You need to distribute your virtual machines across three Availability Zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A company is planning to deploy a set of virtual machines across different system tiers.

The following requirement needs to be met:

  • Incoming requests to the Business Logic tier (50 VMs that are not accessible from the internet) from the web servers (5 VMs that are accessible from the internet) need to be spread equally across the virtual machines.

Which of the following would you implement?

An application gateway that uses the Standard tier

A network security group

An application gateway that uses the WAF tier

An Internal Load Balancer

A Public Load Balancer

A

An Internal Load Balancer

The Business Logic Tier has the requirement of NOT being accessible from the Internet. This means we should spin up an Internal Load Balancer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You have defined an autoscale condition with four autoscale rules. The first rule scales out when the CPU utilization reaches 70 percent. The second rule scales back in when the CPU utilization drops below 50 percent. The third rule scales out if memory occupancy exceeds 75 percent. The fourth rule scales back in when memory occupancy falls below 50 percent. When will the system scale out?

When CPU utilization reaches 70 percent, or memory occupancy exceeds 75 percent

When CPU utilization reaches 70 percent, and memory occupancy exceeds 75 percent

You can’t do this with a single autoscale condition. An autoscale condition can only contain autoscale rules that use the same metric

A

When CPU utilization reaches 70 percent, or memory occupancy exceeds 75 percent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A company has an Azure subscription and an Azure tenant named getcloudskills.onmicrosoft.com. Getcloudskillsusr1 has Global Administrator permissions in Azure Active Directory.

The user getcloudskillsusr1 creates a new directory named staging.getcloudskills.onmicrosoft.com. New users need to be added to the new tenant. The company asks getcloudskillsusr1 to create user accounts.

Would this fulfill the requirement?

No

Yes

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You need to connect Azure resources like Azure virtual machines across geographical regions. Which Azure networking option should you use?

VPN Gateway

Azure ExpressRoute

Virtual network peering

A

Virtual network peering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You have an Azure subscription named Getcloudskillsstaging. Under the subscription, you create a Resource group named Getcloudskillsrg.

You then create an Azure policy based on the “Not allowed resources types” definition. You define the parameters as Microsoft.Network. virtual networks as the not allowed resource type. You assign this policy to the Tenant Root Group. A Virtual Network does not already exist in this subscription.

Would you be able to create a virtual machine in the Getcloudskillsrg Resource group?

Yes

No

A

No

Since the policy is applied to the Tenant Root Group, it would be applied to all subscriptions and Resource groups. If you need to create a virtual machine, you must have permission to create virtual network resources required for VM provisioning. Hence the policy restricts the creation of the Vnet resources. You wouldn’t be able to create a new VM in this resource group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You need to synchronize the files in the file share with an on-premise server named Getcloudskillsserver. Which of the following would you need to implement to fulfill this requirement? Choose 3 answers from the options given below.

Create a container instance

Download an automation script

Correct selection
Register Getcloudskillsserver

Create a sync group

Install the Azure File Sync agent on Getcloudskillsserver

A

Register Getcloudskillsserver

Create a sync group

Install the Azure File Sync agent on Getcloudskillsserver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A company has set up a Load balancer that load balances traffic on ports 80 and 443 across 3 virtual machines. You have to ensure that all RDP traffic is directed towards a VM named getcloudskillsvm. How would you achieve this?

By creating an inbound NAT rule

By creating a new public load balancer for getcloudskillsvm

By creating a new internal load balancer for getcloudskillsvm

By creating a new IP configuration

A

By creating an inbound NAT rule

23
Q

When adding custom domain names, which of the following record needs to be added to your custom domain registrar?

NS record.

TXT record and Updating Name Server (NS) Records.

A record.

PTR record.

A

TXT record and Updating Name Server (NS) Records.

24
Q

Which of the following needs to be set up in Azure for the Site-to-Site VPN connection?

A service endpoint

A gateway subnet

An additional address space for the Virtual Network

A gateway Virtual Machine

A

A gateway subnet

25
Q

In order to get diagnostics from an Azure virtual machine you own, what is the first step to doing that?

A diagnostics agent needs to be installed on the VM

You need to create a storage account to store it

You need to grant RBAC permissions to the user requesting diagnostics

A

You need to create a storage account to store it

26
Q

You have an application that processes highly sensitive data. This data must remain in the same country due to data sovereignty rules, but you still want maximum durability in case of data center failures.

Which redundancy option should you choose for the storage account?

A. Geo-redundant storage (GRS)
B. Locally redundant storage (LRS)
C. Zone-redundant storage (ZRS)
D. Read-access geo-redundant storage (RA-GRS)

A

Zone-redundant storage (ZRS) is the correct choice because it provides high availability and durability by replicating data across multiple availability zones within the same region. This ensures that the data remains within the same country, complying with data sovereignty rules, while also providing resilience against data center failures. Unlike Geo-redundant storage (GRS) or Read-access geo-redundant storage (RA-GRS), which replicate data to a secondary region, ZRS keeps the data within the same region, making it suitable for scenarios where data must remain in the same country.

27
Q

Your company has two Azure VNets: VNetA and VNetB. Both VNets are peered with each other. You need to ensure that traffic from VNetA to VNetB always goes through a network virtual appliance (NVA) and you need a way to troubleshoot if there are any connectivity issues.

Which of the following actions should you take?
Set up a user-defined route in VNetA to point to the NVA for traffic destined to VNetB.
Use Azure Network Watcher’s IP flow verify to diagnose any connectivity issues.
Remove the peering and connect VNets using Azure VPN Gateway.
Ensure both VNets have the same address space.

A

Set up a user-defined route in VNetA to point to the NVA for traffic destined to VNetB.
Use Azure Network Watcher’s IP flow verify to diagnose any connectivity issues.
Ensure both VNets have the same address space.

28
Q

You have an Azure environment that uses a standard load balancer to distribute traffic across several VMs. Lately, some users report they cannot access the application. You suspect a load-balancing issue.

Which of the following steps should you take to troubleshoot the problem?
Check the backend health of the load balancer.
Verify the NSG rules associated with the subnet or NIC of the VMs to ensure traffic is allowed.
Ensure the VMs have a static public IP address.
Confirm that the health probes of the load balancer are correctly configured.
Change the load balancer tier.

A

Check the backend health of the load balancer.
Verify the NSG rules associated with the subnet or NIC of the VMs to ensure traffic is allowed.
Confirm that the health probes of the load balancer are correctly configured.

29
Q

You are troubleshooting connectivity issues between two virtual machines using Azure Network Watcher. Which tool within Network Watcher should you use to diagnose any communication problems between the virtual machines due to user-defined routing or security groups?
IP Flow Verify
Network Performance Monitor
Connection Troubleshoot
Packet Capture

A

IP Flow Verify

30
Q

You have just created a Recovery Services vault in an Azure subscription.

Which of the following is the default backup storage replication option for this vault?
Geo-Redundant Storage (GRS)
Locally Redundant Storage (LRS)
Zone-Redundant Storage (ZRS)
Premium Storage

A

Geo-Redundant Storage (GRS)

31
Q

You are a cloud engineer responsible for assigning Azure roles to your team members. You’re tasked with ensuring that the first user can view all resources in the subscription but only modify virtual machine (VM) resources. You also need to ensure that the second user can view and manage all resources, but only within a specific resource group.

Which of the following role assignments would fulfill these requirements? (Choose three)
Assign the ‘Reader’ role at the subscription scope to the first user.
Assign the ‘Contributor’ role at the subscription scope to the second user.
Assign the ‘Virtual Machine Contributor’ role at the subscription scope to the first user.
Assign the ‘Contributor’ role at the specific resource group scope to the second user.

A

Assign the ‘Reader’ role at the subscription scope to the first user.

32
Q

You’re managing Azure Blob Storage for your organization. You need to ensure the following:

Infrequently accessed data is moved to a more cost-effective storage tier automatically.

Old versions of the blobs are retained for up to 60 days.

Objects that are deleted are recoverable for 30 days.

Which of the following features of Azure Blob Storage would you configure to meet these requirements? (Choose three)
Soft Delete for blobs
Blob versioning
Cool storage tier
Blob lifecycle management policy

A

Soft Delete for blobs
Blob versioning
Blob lifecycle management policy

33
Q

Your Azure environment hosts several applications behind a public Azure Load Balancer. You notice that one of the applications is not receiving any traffic.

What are two possible reasons for this behavior?
The application VM’s NSG blocks incoming traffic from the Load Balancer
The back-end pool of the Load Balancer does not include the VM associated with the application
The health probe of the Load Balancer is set to a high threshold, leading to consistent unavailability reports
The application’s VM size does not support Load Balancing

A

The application VM’s NSG blocks incoming traffic from the Load Balancer
The back-end pool of the Load Balancer does not include the VM associated with the application

34
Q

You are configuring a backup policy for your virtual machines in Azure.

Which of the following three parameters are essential for defining the backup frequency? (Select two)
Backup schedule
Data retention period
Recovery Point Objective (RPO)
Vault name

A

Backup schedule
Recovery Point Objective (RPO)

35
Q

A partner company is collaborating with you on a project. You’re required to provide some of their team members with access to specific Azure resources without giving them a permanent email within your organization.

Which of the following steps should you take first to enable such access?

Assign a guest license in Microsoft Entra ID.

Configure self-service password reset.

Configure Microsoft Entra B2B collaboration for the partner’s domain.

Assign the partner users to a Microsoft Entra ID group.

A

Configure Microsoft Entra B2B collaboration for the partner’s domain.

Explanation
Configuring Microsoft Entra B2B collaboration for the partner’s domain is the correct step to enable access for external users without giving them a permanent email within your organization. This choice is correct because it allows you to establish a secure connection between your organization and the partner’s domain, enabling controlled access to specific Azure resources.

36
Q

When creating an Azure Storage account, you have a requirement to ensure that the data remains available if there’s a failure at the primary region and must be most cost-restrictive.

Which redundancy option should you choose?
Locally redundant storage (LRS)
Zone-redundant storage (ZRS)
Geo-redundant storage (GRS)
Read-access geo-zone-redundant storage (RA-GZRS)

A

Geo-redundant storage (GRS)

Explanation
Geo-redundant storage (GRS) replicates your data to a secondary region, which is typically hundreds of miles away from the primary region. In case of a failure at the primary region, data can be accessed from the secondary region, ensuring high availability. This option meets the requirement of ensuring data availability in case of a failure at the primary region while being cost-effective.

37
Q

Select all true statements that apply to the use of Azure Disk Encryption (ADE) for Windows Azure VM disk protection.

A. ADE can use Azure Key Vault and Azure Recovery Service Vault from different Azure regions.

B. ADE uses BitLocker for Windows VM-controlled disks.

C. ADE supports the encryption of Basic tier VM’s.

D. ADE encrypted VM can be backed up to the Recovery Service Vault.

E. ADE encrypts all data at rest and in transit.

F. ADE uses DM-Crypt for Linux-based VMs.

G. ADE uses DM-Crypt for Windows VM-controlled disks.

H. ADE is integrated with Azure Key Vault.

A

B. ADE uses BitLocker for Windows VM-controlled disks.

Explanation: Azure Disk Encryption (ADE) leverages BitLocker to provide encryption for Windows virtual machines. BitLocker is a native Windows feature that encrypts the entire disk, ensuring data protection and security.

D. ADE encrypted VM can be backed up to the Recovery Service Vault.

Explanation: Azure Disk Encryption supports backing up encrypted VMs to the Azure Recovery Services Vault. This ensures that encrypted data can be securely backed up and restored as needed.

F. ADE uses DM-Crypt for Linux-based VMs.

Explanation: For Linux virtual machines, ADE uses DM-Crypt, which is a transparent disk encryption subsystem in Linux. This allows for the encryption of Linux VM disks, ensuring data security.

H. ADE is integrated with Azure Key Vault.

Explanation: Azure Disk Encryption is integrated with Azure Key Vault to manage and control the disk encryption keys. This integration provides a secure and centralized way to manage encryption keys.

Incorrect Statements:

A. ADE can use Azure Key Vault and Azure Recovery Service Vault from different Azure regions.

Explanation: Azure Disk Encryption requires that the Key Vault and the resources it manages (like VMs) be in the same region to ensure compliance and reduce latency. Therefore, using Key Vault and Recovery Service Vault from different regions is not supported.

C. ADE supports the encryption of Basic tier VM’s.

Explanation: Azure Disk Encryption does not support Basic tier VMs. It is only available for Standard and Premium tier VMs, which provide the necessary infrastructure for encryption.

E. ADE encrypts all data at rest and in transit.

Explanation: Azure Disk Encryption specifically encrypts data at rest on the VM disks. It does not encrypt data in transit, which is typically handled by other Azure services or network security configurations.

G. ADE uses DM-Crypt for Windows VM-controlled disks.

Explanation: This statement is incorrect because ADE uses BitLocker, not DM-Crypt, for Windows VM-controlled disks. DM-Crypt is used for Linux VMs, as mentioned in the correct statement F.

38
Q

You create an App Service plan B1 for your web app. You want Azure to be able to add up to 10 VM instances to run your app automatically during the highest traffic on your site.

What are two configuration options you should implement to achieve your goal in the most cost-effective way?

A. Scale up based on a schedule

B. Scale up based on a metric

C. Scale-out based on a metric

D. Scale out the service plan to P1

E. Scale out the service plan to S1

F. Scale up the service plan to P1

G. Scale up the service plan to S1

H. Scale out based on a schedule

A

C. Scale-out based on a metric.

Explanation: Scaling out based on a metric allows you to automatically add more instances of your app service when certain conditions are met, such as CPU usage or memory consumption. This ensures that your app can handle increased traffic efficiently without manual intervention, and you only pay for the additional resources when they are needed.

E. Scale out the service plan to S1.

Explanation: The B1 App Service plan is a Basic tier, which does not support auto-scaling. By scaling out to the S1 tier, which is part of the Standard tier, you gain access to auto-scaling features. The S1 tier allows you to configure up to 10 instances, which aligns with your requirement to handle high traffic.

Incorrect Statements:

A. Scale up based on a schedule.

Explanation: Scaling up involves moving to a higher pricing tier with more resources, which is not the same as adding more instances. It is also not cost-effective for handling temporary traffic spikes.

B. Scale up based on a metric.

Explanation: Similar to scaling up based on a schedule, this involves increasing the resources of a single instance rather than adding more instances, which is not the goal here.

D. Scale out the service plan to P1.

Explanation: The P1 tier is part of the Premium tier, which is more expensive than the Standard tier. While it offers more features, it is not the most cost-effective option for simply adding instances.

F. Scale up the service plan to P1.

Explanation: Scaling up to the P1 tier increases the resources of a single instance and is more costly. It does not address the need for multiple instances.

G. Scale up the service plan to S1.

Explanation: Scaling up to S1 increases the resources of a single instance, but does not provide the ability to automatically add instances based on demand.

H. Scale out based on a schedule.

Explanation: While scaling out based on a schedule can be useful, it is not as flexible or cost-effective as scaling based on a metric, which responds dynamically to actual traffic conditions.

39
Q

True or false: Microsoft ExpressRoute is a virtual networking technology that operates over the public Internet that allows secure, scalable access to Microsoft Azure services while ensuring performance, security, and reliability.

False

True

A

False

ExpressRoute operates over a private network, not the Internet. You must connect through a communications service provider to arrange a private direct connection.

40
Q

A company has an Azure subscription and an Azure tenant named getcloudskills.onmicrosoft.com. Getcloudskillsusr1 has Global Administrator permissions in Azure Active Directory.

The user getcloudskillsusr1 creates a new directory named staging.getcloudskills.onmicrosoft.com. New users need to be added to the new tenant. The company asks getcloudskillsusr1 to create user accounts.

Would this fulfill the requirement?

A. Yes

B. No

A

A. Yes. The user getcloudskillsusr1, having Global Administrator permissions in Azure Active Directory, can create new user accounts in the new directory named staging.getcloudskills.onmicrosoft.com. The Global Administrator role provides the necessary permissions to manage users and groups across all directories within the Azure tenant. Therefore, getcloudskillsusr1 can fulfill the requirement of adding new users to the new tenant.

41
Q

In order to use ARM templates in automation, what other file is usually required besides the ARM template JSON file itself?

The parameter JSON file

The parameter XML file

No other files are required. But a parameter JSON file would be used if the template had parameters as inputs.

A .PS1 PowerShell script file

A .SH file to contain the Shell Script in CLI

A

No other files are required. But a parameter JSON file would be used if the template had parameters as inputs.

42
Q

A company has an Azure AD tenant. They have users that are also synced with their on-premise environment. Getcloudskillsusr1 has the Reports Reader role assigned.

The administrator has enabled self-service password reset (SSPR) for all users.

  • The administrator has enabled the following SSPR settings:
  • Number of methods required to reset – 2
  • Methods available to users – Mobile phone and Security questions
  • Number of questions to register – 3
  • Number of questions to reset – 3

The following security questions are chosen:

  • In what city was your first job?
  • What was the name of the first school you attended?

Would Getcloudskillsusr1 be required to answer the security question “In what city was your first job?” to reset their password?

Yes

No

A

Yes, here, since SSPR has been enabled for all users, the user would need to answer the security-related question to reset their password.

43
Q

Which of the following needs to be set up in Azure for the Site-to-Site VPN connection?

A. A service endpoint

B. A gateway subnet

C. A gateway Virtual Machine

D. An additional address space for the Virtual Network

A

B. A gateway subnet. For a Site-to-Site VPN connection in Azure, a gateway subnet is required. The gateway subnet contains the IP addresses used by the virtual network gateway services. When you create a virtual network gateway for your VPN, you must specify a gateway subnet, which Azure uses to deploy the gateway VMs and services needed for the VPN connection. This is essential for establishing the Site-to-Site VPN connection.

44
Q

A company is planning to deploy a set of virtual machines across different system tiers.

The following requirement needs to be met:

  • Incoming requests to the Business Logic tier (50 VMs that are not accessible from the internet) from the web servers (5 VMs that are accessible from the internet) need to be spread equally across the virtual machines.

Which of the following would you implement?

A. An application gateway that uses the Standard tier

B. An Internal Load Balancer

C. A Public Load Balancer

D. A network security group

E. An application gateway that uses the WAF tier

A

B. An Internal Load Balancer. An Internal Load Balancer (ILB) is the correct choice for distributing incoming requests from the web servers to the Business Logic tier VMs. The ILB is designed to handle traffic within a virtual network or between connected virtual networks, and it does not expose the VMs to the internet. This meets the requirement of spreading the requests equally across the 50 VMs in the Business Logic tier while keeping them inaccessible from the internet.

45
Q

Your company has an Azure AD tenant named getcloudskills.com.

The following user is part of the tenant:

  • Getcloudskillsusr1 is a User administrator.

The following VM is part of the tenant:

  • Getclouskillsvm1 is a Windows 10 device that is AAD registered.

The following group is part of the tenant:

  • Getcloudskillsgroup1 is a Dynamic Device group, Getcloudskillsusr1 is an owner of that group.

Would user Getcloudskillsusr1 be able to add device Getclouskillsvm1 to group Getcloudskillsgroup1?

Yes

No

A

B. No. User Getcloudskillsusr1, being a User administrator and owner of the group, does not have the ability to manually add devices to a Dynamic Device group. Dynamic groups in Azure AD automatically include devices based on specific rules or attributes, and manual additions are not permitted. Therefore, Getcloudskillsusr1 cannot add the device Getclouskillsvm1 to the group Getcloudskillsgroup1.

46
Q

A new Network interface named Secondary has been created. The Network interface needs to be added to the Virtual machine. What must be done first in order to ensure that the network interface can be attached to the Virtual Machine?

A. The public IP needs to be deallocated from the primary network interface

B. The primary network interface needs to be removed

C. The machine needs to be stopped first

A

C. The machine needs to be stopped first. In Azure, to attach a new network interface to an existing virtual machine, the VM must be in a stopped (deallocated) state. This ensures that the changes can be applied without causing any disruption to the running VM. Once the VM is stopped, you can attach the new network interface and then start the VM again.

47
Q

In your company, all virtual networks are hosting virtual machines with varying workloads. A virtual machine named getcloudskillsvm is hosted in Vnet getcloudskills-vnet1. This virtual machine will have intrusion detection software installed on it. All traffic on all other virtual networks must be routed via this virtual machine.

You need to complete the required steps for implementing this requirement.

Which of the following would you need to create additional to ensure that traffic is sent via the virtual machine hosting the intrusion software?

A. A new route table

B. Add an address space

C. Add DNS servers

D. Add a service endpoint

A

A. A new route table. To ensure that all traffic from other virtual networks is routed through the virtual machine hosting the intrusion detection software, you need to create a new route table. This route table will contain user-defined routes that direct traffic to the virtual machine’s network interface as the next hop. By associating this route table with the subnets of the other virtual networks, you can control the flow of traffic and ensure it passes through the specified VM for inspection.

48
Q

Your company goes ahead and registers a domain name of demodomain.com. You then go ahead and create an Azure DNS zone named demodomain.com. You then add an A record to the zone for a host named www that has an IP address of 123.10.9.143. But the users complain that they cannot resolve the URL www.demodomain.com to 123.10.9.143. This issue needs to be resolved.

You propose a solution to modify the name server at the domain registrar.

Would this solution resolve the issue?

No

Yes

A

Yes. Modifying the name server at the domain registrar to point to the Azure DNS name servers for the demodomain.com DNS zone would resolve the issue. When you create a DNS zone in Azure, it is hosted on Azure’s DNS name servers. For the domain name to resolve correctly, the domain registrar must be updated to use these Azure DNS name servers. This change ensures that DNS queries for www.demodomain.com are directed to Azure DNS, where the A record is configured.

49
Q

A company has set up a Load balancer that load balances traffic on ports 80 and 443 across 3 virtual machines. You have to ensure that all RDP traffic is directed towards a VM named getcloudskillsvm. How would you achieve this?

A. By creating a new IP configuration

B. By creating a new public load balancer for getcloudskillsvm

C. By creating an inbound NAT rule

D. By creating a new internal load balancer for getcloudskillsvm

A

C. By creating an inbound NAT rule. To ensure that all RDP traffic is directed towards a specific VM, such as getcloudskillsvm, you can create an inbound NAT (Network Address Translation) rule on the existing load balancer. This rule will map the RDP port (typically port 3389) on the load balancer’s public IP address to the RDP port on the getcloudskillsvm. This setup allows RDP traffic to be directed specifically to getcloudskillsvm while the load balancer continues to distribute other traffic (like HTTP and HTTPS) across the other VMs.

50
Q

You need to synchronize the files in the file share with an on-premise server named Getcloudskillsserver. Which of the following would you need to implement to fulfill this requirement? Choose 3 answers from the options given below.

A. Install the Azure File Sync agent on Getcloudskillsserver

B. Create a sync group

C. Register Getcloudskillsserver

D. Download an automation script

E. Create a container instance

A

A. Install the Azure File Sync agent on Getcloudskillsserver.

Explanation: The Azure File Sync agent is necessary to enable synchronization between the Azure file share and the on-premise server. It facilitates the connection and data transfer between the two environments.

B. Create a sync group.

Explanation: A sync group defines the relationship between the Azure file share and the on-premise server. It specifies which files and folders are synchronized and ensures that changes are propagated between the cloud and on-premise locations.

C. Register Getcloudskillsserver.

Explanation: Registering the on-premise server with Azure File Sync is a crucial step. It allows the server to be recognized by Azure and included in the sync group, enabling synchronization to occur.

Incorrect Options:

D. Download an automation script.

Explanation: While automation scripts can be useful for various tasks in Azure, they are not directly related to setting up Azure File Sync for synchronizing files between an Azure file share and an on-premise server.

E. Create a container instance.

Explanation: Container instances are used for running containerized applications and are not relevant to the process of synchronizing files between an Azure file share and an on-premise server using Azure File Sync.

51
Q

You need to allow traffic onto certain FQDN’s via the Azure Firewall. Which of the following rules would you create for this requirement?

A. Application collection rules

B. Network collection rules

C. FQDN collection rules

D. NAT collections rules

A

A. Application collection rules. Application collection rules in Azure Firewall are designed to allow or deny traffic based on fully qualified domain names (FQDNs). These rules enable you to specify which FQDNs are accessible through the firewall, making them the correct choice for allowing traffic to certain FQDNs.

Incorrect Options:

B. Network collection rules.

Explanation: Network collection rules are used to control traffic based on IP addresses, ports, and protocols, not FQDNs. They are not suitable for scenarios where you need to filter traffic based on domain names.

C. FQDN collection rules.

Explanation: There is no specific rule type called “FQDN collection rules” in Azure Firewall. The functionality to filter traffic based on FQDNs is provided by application collection rules.

D. NAT collections rules.

Explanation: NAT (Network Address Translation) collection rules are used to translate network traffic from one IP address to another. They do not provide the capability to filter traffic based on FQDNs.

52
Q

Imagine your company has the following storage accounts in place as part of its Azure subscription:

  • General Purpose V1
  • General Purpose V2
  • Blob Storage

Which of the following storage account/accounts could be used to store objects as part of the Archive tier?

A. General Purpose V1 and General Purpose V2 only

B. General Purpose V2 only

C. Blob Storage only

D. All Storage accounts

E. General Purpose V1 only

F. General Purpose V2 and Blob Storage only

G. General Purpose V1 and Blob Storage only

A

F. General Purpose V2 and Blob Storage only. The Archive tier is available for blob storage in General Purpose V2 storage accounts and Blob Storage accounts. General Purpose V1 storage accounts do not support the Archive tier. Therefore, the correct answer is General Purpose V2 and Blob Storage only.

Incorrect Options:
A. General Purpose V1 and General Purpose V2 only - General Purpose V1 does not support the Archive tier.
B. General Purpose V2 only - While General Purpose V2 supports the Archive tier, Blob Storage accounts also support it.
C. Blob Storage only - While Blob Storage accounts support the Archive tier, General Purpose V2 accounts also support it.
D. All Storage accounts - Not all storage accounts support the Archive tier. General Purpose V1 does not support it.
E. General Purpose V1 only - General Purpose V1 does not support the Archive tier.
G. General Purpose V1 and Blob Storage only - General Purpose V1 does not support the Archive tier.

53
Q

If no rules other than the default NSG rules are in place, are VM’s on SubnetA and SubnetB be able to connect to the Internet?

A. Yes

B. No

A

A. Yes. By default, Network Security Groups (NSGs) in Azure have rules that allow outbound traffic to the internet. The default outbound rule allows all outbound traffic from any subnet to the internet. Therefore, if no other rules are in place, VMs on SubnetA and SubnetB will be able to connect to the internet.