Test Prep Flashcards
Where can you obtain details about the personal data Microsoft processes, how Microsoft processes it, and for what purposes? A) Microsoft Privacy Statement B) Compliance Manager C) Azure Service Health D) Trust Center
A) Microsoft Privacy Statement
What type of Virtual Network Gateways are available in Azure? A) Point-to-Site and ExpressRoute B) VPN and Express Route C) Site-to-Site and ExpressRoute D) Policy Based and Site-to-Site
B) VPN and ExpressRoute
Which of the following is NOT a valid Azure Site Recovery migration option? A) Migrate on-premises VirtualBox Virtual machine to Azure B) Migrate physical on-premises server to Azure C) Migrate on-premises Hyper-V virtual machine to Azure D) Migrate Azure virtual machines to a different region
A) Migrate on-premises VirtualBox virtual machines to Azure
Which PowerShell cmdlet and parameter create a virtual machine and assigns it to an existing Availability Set? A) New-AzureRmVM -Faultdomain B) New-AzureRmVM -Updatedomain C) New-AzureRmVM -ASName D) New-AzureRmVM -AvailabilitySetName
D) New-AzureRmVM -AvailabilitySetName
A company has an Azure subscription. The Subscription contains a resource group names “demogroup”. Resources have been deployed to the resource group using templates. You need to see the data and time when the resources were created in the resource group. You decide to use the Subscriptions blade and then choose Programmatic deployment. Would this fulfil the requirement? A) Yes B) No
B) No
A company has an Azure subscription. The Subscription contains a resource group named “demogroup” Resources have been deployed to the resource group using templates You need to see the data and time when the resources were created in the resource group You decide to choose the Deployments section from the Resource group “demogroup” Would this fulfill the requirement? A) Yes B) No
A) Yes
A company has an Azure subscription. The Subscription contains a resource group named “demogroup” Resources have been deployed to the resource group using templates You need to see the data and time when the resources were created in the resource group You decide to use the Subscriptions bland and then choose Resource providers. Would this fulfill the requirement? A) Yes B) No
B) No
You have the following resources as part of your Azure Subscription Name Type testcontainer Blob Container testdb SQL Database testtable Azure Table testshare Azure File Share Which of the following can be exported by using the Azure Import/Export service? A) testshare B) testdb C) testcontainer D) testable
C) testcontainer
You are planning on hosting an application that will run on two Azure virtual machines named demovm1 and demovm2. You are planning on implementing and Availability set for the application. You have to ensure that the application is available during planned maintenance of the hardware that is hosting the two Azure virtual machines. A) One update domain B) One fault domain C) Two Update domains D) Two Fault domains
C) Two update domains
You have an Azure Subscription that contains the following resource groups:
testgrp1 - WestUS
testgrp2 - EastUS
testgrp1 has the following resources
teststore1 - Storage Account - WestUS
vnet1 - Virtual Network - WestUS
nic1 - Network Interface - WestUS
disk1 - Disk - WestUS
testvm1 - Virtual Machine - WestUS
The testvm1 Virtual Machine connects to nic1 and disk1. nic1 connects to vnet1. The testgrp2 resource group contains a public IP address named testip2 in the East US Location. The IP address is not assigned to a virtual machine. Can you move nic1 to testgrp2?
a) Yes
b) No
a) Yes
A company call T3P has an Azure subscription and an Azure tenant. The administrator has enabled multifactor authentication for all users. The administrator needs to ensure that users can lock out their own account if they receive an unsolicited MFA request from Azure. Which of the following needs to be configured for this requirement?
a) Configure Notifications
b) Configure Providers
c) Configure Fraud alerts
d) Configure Block/Unblock users
c) Configure Fraud Alerts
You have to deploy a web application for your company by using the Azure Web App Service. The backup and restore options should be available for the web application. Costs should also be minimized for hosting the application. Which of the following would you choose as the underlying App Service Plan?
a) Shared
b) Standard
c) Basic
d) Premium
b) Standard
Shared does not provide backup and restore options
A company T3P has setup a Load Balancer that load balances traffic on port 80 and 443 across 3 virtual machines. You have to ensure that all clients are serviced by the same web server for each request.
Which of the following would you configure for this requirement?
a) Floating IP
b) TCP Rest
c) Session Persistence
d) Health Probe
c) Session Persistence
You plan to deploy five virtual machines to a virtual network subnet. Each virtual machine will have a public IP address and a private IP address. Each virtual machine requires the same inbound and outbound security rules.
What is the minimum number of network security groups that you require?
a) 2
b) 5
c) 1
d) 10
c) 1
Which of the following rule would you apply to the Network Security Group for the Network interface attached to the Web server? Choose best possible answer?
a) An outbound rule allowing traffic on port 80
b) An outbound rule allowing traffic on port 443
c) An inbound rule allowing traffic on port 443
d) An inbound rule allowing traffic on port 80
c) An inbound rule allowing traffic on port 443
You need to configure a VPN connection for T3P-net2. Which of the following would you need to configure in the virtual network?
a) A peering connection
b) An additional address space
c) A gateway subnet
d) An express route connection
c) A gateway subnet
Your users want to sign in to devices, apps, and services from anywhere. They want to sign-in using organizational work or school account instead of a personal account. You must ensure corporate assets are protected and that devices meet standards for security and compliance. Specifically, you need to be able to enable or disable a device. What should you do? Select one.
a) Enable the device in Azure AD
b) Join the device to Azure AD
c) Connect the device to AzureAD
d) Register the device with AzureAD
b) Join the device to AzureAD
Join the device to Azure AD. Joining a device is an extension to registering a device. This means it provides you with all the benefits of registering a device, like being able to enable or disable the device. In addition, it also changes the local state of a device. Changing the local state enables your users to sign-in to a device using an organizational work or school account instead of a personal account.
Identify three differences from the following list between Azure Active Directory (AD) and Active Directory Domain Services (AD DS). Select three
a) Azure AD uses HTTP and HTTPS communications
b) Azure AD uses Kerberos authentication
c) There are no Organizational Units (OUs) or Group Policy Objects (GPOs) in Azure AD
d) Azure AD includes Federation Services
e) Azure AD can be queried through LDAP
a) Azure AD uses HTTP and HTTPS
c) There are no Organizational Units (OUs) or Group Policy Objects (GPOs) in Azure AD
d) Azure AD includes Federation Services
You are configuring Self-Service Password Reset. Which of the following is not a validation method? Select one
a) An email notification
b) A test or code sent to a user’s mobile or office phone
c) A paging services
d) A set of security questions
c) A paging service
Your company financial comptroller wants to be notified whenever the company is half-way to spending the money allocated for cloud services. What should you do?
a) Create an Azure reservation
b) Create a budget and a spending threshold
c) Create a management group
d) Enter workloads in the Total Cost of Ownership calculator
b) Create a budget and a spending threshold
Create a budget and a spending threshold. Billing Alerts help you monitor and manage billing activity for your Azure accounts. You can set up a total of five billing alerts per subscription, with a different threshold and up to two email recipients for each alert. Monthly budgets are evaluated against spending every four hours. Budgets reset automatically at the end of a period.
What tool can you use to gain greater visibility into your spending patterns? Select one
a) Cost Insights
b) Cost Analysis
c) Your invoice
b) Cost Analysis
Cost analysis. Cost analysis is one of Azure Cost Management’s primary tools to help you better understand costs.
Your company is concerned about cost and provisioning too many virtual machines at once. What’s the best way to control resource provisioning? Select one.
a) Change your subscription to Pay As You Go
b) Apply spending limits to the development team’s Azure subscription
c) Verbally give the managers a budget and hold them accountable for overages
b) Apply spending limits to the development team’s Azure subscription
Apply spending limits to the development team’s Azure subscription. If you exceed your spending limit, active resources are deallocated. You can then decide whether to increase your limit or provision fewer resources.
The leadership team wants information on resource costs by departments. What’s the best way to categorize costs by department? Select one.
a) Apply a tag to each resource that identifies the appropriate billing department
b) Split the cost evenly between departments
c) Keep a spreadsheet that lists each team’s resources
a) Apply a tag to each resource that identifies the appropriate billing department
Apply a tag to each resource that identifies the appropriate billing department. You can apply tags to groups of Azure resources to organize billing data.
An Azure subscription … Select one
a) is a logical container used to provision resources in Azure
b) is associated with a single department or organization
c) represents a single domain
a) is a logical container used to provision resources in Azure
An Azure subscription is a logical container used to provision resources in Azure. A subscription might have one or more tenants, directories, and domains associated with it.
You are assigning Azure AD roles. Which role will allow the user to manage all the groups in your Teams tenants and be able to assign other administrator roles? Select one
a) Global Administrator
b) Password administrator
c) Security Administrator
d) User administrator
a) Global Administrator
Global administrator. Only the global administrator can manage groups across tenants and assign other administrator roles.
You would like to add a user who has a Microsoft account to your subscription. Which type of user account is this? Select one.
a) Cloud identity
b) Directory-Synchronized
c) Provider identity
d) Guest User
e) Hosted identity
d) Guest User
Guest user. Guest users are users added to Azure AD from a third party like Microsoft or Google.
If you delete a user account by mistake, can it be restored? Select one
a) When a user account is deleted, it’s gone forever and can’t be restored
b) The user account can be restored, but only when it’s created within the last 30 days
c) The user account can be restored, but only when it’s deleted within the last 30 days
c) The user account can be restored, but only when it’s deleted within the last 30 days
The user account can be restored, but only when it’s deleted within the last 30 days. A user account can be restored when it’s deleted within the last 30 days.
Which of the following roles has full access to manage all resources but does not allow you to assign roles? Select one
a) Owner
b) Contributor
c) Reader
b) Contributor
Contributor. Grants full access to manage all resources, but does not allow you to assign roles.
Your organization has several Azure policies that they would like to create and enforce for a new branch office. What should you do? Select one.
a) Create a policy initiative
b) Create a management group
c) Create a resource group
d) Create a new subscription
a) Create a policy initiative
Create a policy initiative. A policy initiative would include all the policies of interest. Once your initiative is created, you can assign the definition to establish its scope. A scope determines what resources or grouping of resources the policy assignment gets enforced on.
You would like to categorize resources and billing for different departments like IT and HR. The billing needs to be consolidated across multiple resource groups and you need to ensure everyone complied with the solution. What should you do? Choose two to complete a solution.
a) Create tags for each department
b) Create a billing group for each department
c) Create an Azure policy
d) Add the groups into a single resource group
e) Create a subscription account rule
a) Create tags for each department
c) Create an Azure policy
Create tags for each department and create an Azure policy. You should create a tag with a key:value pair like department:HR. You can then create an Azure policy which requires the tag be applied before a resource is created.
Your company wants to ensure that only cost-effective virtual machine SKU sizes are deployed. What should you do? Select one
a) Periodically inspect the deployment to see which SKU sizes are used
b) Create an Azure RBAC role that defines the allowed virtual machine SKU sizes
c) Create a policy in Azure Policy that specifies the allowed SKU sizes
c) Create a policy in Azure Policy that specifies the allowed SKU sizes
Create a policy in Azure Policy that specifies the allowed SKU sizes. After you enable this policy, that policy is applied when you create new virtual machines or resize existing ones.
Which of the following can be used to manage governance across multiple Azure subscriptions?
a) Azure initiatives
b) Resource Groups
c) Management Groups
c) Management Groups
Management groups. Management groups facilitate the hierarchical ordering of Azure resources into collections, at a level of scope above subscriptions. Distinct governance conditions can be applied to each management group, with Azure Policy and Azure role-based access controls, to manage Azure subscriptions effectively. The resources and subscriptions assigned to a management group automatically inherit the conditions applied to the management group.
Your company hires a new IT Administrator. She needs to manage a resource group with first-tier web servers including assigning permissions. However, she should not have access to other resource groups inside the subscription. You need to configure role-based access. What should you do? Select one.
a) Assign her as a Subscription Contributor
b) Assign her as a Resource Group Owner
c) Assign her as a Resource Group Contributor
b) Assign her as a Resource Group Owner
Assign her as a Resource Group owner. The new IT administrator needs to be able to assign permissions.
You have three virtual machines (VM1, VM2, and VM3) in a resource group. The Helpdesk hires a new employee. The new employee must be able to modify the settings on VM3, but not on VM1 and VM2. Your solution must minimize administrative overhead. What should you do? Select one
a) Assign the user to the Contributor role on the resource group
b) Assign the user the Contributor role on VM3
c) Move VM3 to a new resource group and assign the user to the Contributor role on VM3
b) Assign the user the Contributor role on VM3
Assign the user to the Contributor role on VM3. This means the user will not have access to VM1 or VM2. The Contributor role will allow the user to change the settings on VM1.
Your company wants to allow some users to control the virtual machines in each environment. These users should be prevented from modifying networking and other resources in the same resource group or Azure subscription. What should you do? Select one
a) Create a policy in Azure Policy that audits resource usage
b) Split the environment into separate resource groups
c) Create a role assignment through Azure RBAC
c) Create a role assignment through Azure RBAC
Create a role assignment through Azure RBAC. Azure RBAC enables you to create roles that define access permissions. You might create one role that limits access only to virtual machines and a second role that provides administrators with access to everything.
Suppose a team member can’t view resources in a resource group. Where would the administrator go to check the team member’s access? Select one
a) Check the team member’s permissions by going to their Azure profile > My Permissions
b) Go to the resources group and select Access Control (IAM) > Role Assignments
c) Go to one of the resources in the resource group and select Role Assignments
b) Go to the resource group and select Access control (IAM) > Role Assignments
Go to the resource group and select Access control (IAM) > Role assignments. Find the list of role of assignments on the resource group.
A user who had Owner access to a subscription is leaving the company. No one else has access to this subscription. How can you grant another employee access to this subscription? Select one
a) Use the Azure portal to elevate your own access
b) Ask the former employee for their password
c) Ask the former employee to sign in and select a different employee to grant their permission to
a) Use the Azure portal to elevate your own access
Use the Azure portal to elevate your own access. Temporarily elevate your own access to assign the Owner role to another user.
What’s included in a custom Azure role definition? Select one.
a) The assignment of the custom role
b) Operations allowed for Azure resources and the scope of permissions
c) Actions and DataActions operations that you can scope to the tenant level
b) Operations allowed for Azure resources and the scope of permissions
Operations allowed for Azure resources and the scope of permissions. A custom role definition includes the operations allowed such as read, write, and delete for Azure resources and the scope of those permissions.
What information does an Action provide in a role definition? Select one.
a) An Action provides the allowed management capabilities for the role
b) An Action determines what data the role can manipulate
c) An Action decides what resource the role is applied to
a) An Action provides the allowed management capabilities for the role
An Action provides the allowed management capabilities for the role. The Action provides what the role can do.
How are NotActions used in a role definition? Select one.
a) NotActions are subtracted from the Actions to define the list of permissible operations
b) NotActions are consulted after Actions to deny access to a specific operation
c) NotActions allow you to specify a single operation that is not allowed
a) NotActions are subtracted from the Actions to define the list of permissible operations
NotActions are subtracted from the Actions to define the list of permissible operations.
You are creating a new resource group to use for testing. Which two of the following parameters are required when you create a resource group with PowerShell of the CLI? Select two.
a) Location
b) Name
c) Region
d) Subscription
e) Tag
a) Location
b) Name
Location and Name are required by PowerShell (New-AzResourceGroup) and the CLI (az group create).
You have a new Azure subscription and need to move resources to that subscription. Which of the following resources cannot be moved? Select One.
a) Key Vault
b) Storage Account
c) Tenant
c) Tenant
A Tenant cannot be moved between subscriptions
You are reviewing your virtual machine usage. You notice that you have reached the limit for virtual machines in the US East region. Which of the following provides the easier solution? Select One.
a) Add another resource group
b) Change your subscription plan
c) Request support to increase your limit
c) Request support to increase your limit
Request support increase your limit. If you need to increase a default limit, there is a Request Increase link. You will complete and submit the support request.
Which of the following would be a good example of when to use a resource lock? Select one.
a) A ExpressRoute circuit with connectivity back to your on-premises network
b) A non-production virtual machine used to test occasional application builds
c) A storage account used to temporarily store images processed in a development environment.
a) A ExpressRoute circuit with connectivity back to your on-premises network
An ExpressRoute circuit with connectivity back to your on-premises network. Resource locks prevent other users in your organization from accidentally deleting or modifying critical resources.
Your manager asks you to explain how Azure uses resource groups. You provide all of the following information, except? Select one
a) Resources can be in only one resource group
b) Resources can be moved from one resource group to another resource group
c) Resources groups can be nested
c) Resource groups can be nested
Resource groups cannot be nested. You should carefully plan your resource group deployments.
Which of the following is not true about the Cloud Shell?
a) Authenticates automatically for instant access to your resources
b) Cloud Shell is assigned multiple machines per user account
c) Provides both Bash and PowerShell sessions
b) Cloud Shell is assigned multiple machines per user account
Cloud Shell is assigned multiple machines per user account, is not true. The cloud shell is assigned one machine per user account.
You are managing Azure locally using PowerShell. You have launched the app as an Administrator. Which of the following commands would you do first?
a) Connect-AzAccount
b) Get-AzResourceGroup
c) Get-AzSubscription
a) Connect-AzAccount
Connect-AzAccount. When you are working locally you are not automatically logged in to Azure. So, the first thing you should do is to connect to Azure and provide your credentials.
What do you need to install on your machine so you can execute Azure CLI commands locally? Select one
a) The Azure cloud shell
b) The Azure CLI and Azure PowerShell
c) Only the Azure CLI
c) Only the Azure CLI
Only the Azure CLI. You only need to install the Azure CLI. You will use a shell to issue the CLI commands, but every platform has at least one built-in shell.
Which parameter can you add to most CLI commands to get concise, formatted output? Select One
a) list
b) table
c) group
b) table
Table. The table parameter formats the output as a table. This can make things much more readable for commands that produce a large amount of output.
What needs to be installed on your machine to let you execute Azure PowerShell cmdlets locally? Select one
a) The Azure cloud shell
b) The Azure CLI and Azure PowerShell
c) The base PowerShell product and the Az module
c) The base PowerShell product and the Az module
You need both the base PowerShell product and the Az module. The base product gives you the shell itself, a few core commands, and programming constructs like loops, variables, etc. The Az modules adds the cmdlets you need to work with Azure resources
Suppose you are building a video-editing application that will offer online storage for user-generated video content. You will store the videos in Azure Blobs, so you need to create an Azure storage account to contain the blobs. Once the storage account is in place, it is unlikely you would remove and recreate it because this would delete all the user videos. Which tool is likely to offer the quickest and easiest way to create the storage account? Select one.
a) Azure Portal
b) Azure CLI
c) Azure PowerShell
a) Azure Portal
The portal is a good choice for one-off operations like creating a long-lived storage account. The portal gives you a GUI containing all the storage-account properties and provides tool tips to help you select the right options for your needs.
Which of the following is not an element in the template schema? Select one
a) Functions
b) Inputs
c) Outputs
d) Parameters
b) Inputs
Inputs is not a part of the template schema. The elements of an Azure Resource Manager template are schema, contentVersion, apiProfile, parameters, variables, functions, resources, and output.
Which of the following best describes the formate of an Azure Resource Manager template? Select one.
a) A Markdown document with a pointer table
b) A JSON document with key-value pairs
c) A TXT document with key-value pairs
d) An XML document with element-value pairs
b) A JSON document with key-value pairs
A JSON document with key-value pairs. An Azure Resource Template is a JSON document with key-value pairs.
Azure Resource Manager templates are idempotent. This means if you run a template with no changes a second time … Select one.
a) Azure Resource Manager will deploy new resources as copies of the previously deployed resources
b) Azure Resource Manager won’t make any changes to the deployed resources
c) Azure Resource Manager will delete the previously deployed resources and redeploy them
b) Azure Resource Manager won’t make any changes to the deployed resources
If the resource already exists and no change is detected in the properties, no action is taken. If the resource already exists and a property has changed, the resource is updated. If the resource doesn’t exist, it’s created.
You are planning to configure networking Microsoft Azure. Your company has a new Microsoft Azure presence with the following network characteristics:
- 1 Virtual Network
- 1 subnet using 192.168.0.0/23 (does not have existing resources)
Your on-premises data center has the following network characteristics:
- 10 subnets using 102.168.1.0/24 through 192.168.10.0/24
The company intends to use 192.168.1.0/24 on-premises and 192.168.0.0/24 in Azure. You need to update your company’s environment to enable the needed functionality. What should you do? Each answer represents part of the solution. Choose two.
a) Delete 192.168.0.0/23 from Azure
b) Delete 192.168.1.0/24 from the on-premises environment
c) Create a matching public subnet in Azure and in the on-premises environment
d) Create a subnet for 192.168.0.0/23 in the on-premises environment
e) Create a subnet for 192.168.0.0/24 in Azure
a) Delete 192.168.0.0/23 from Azure
e) Create a subnet for 192.168.0.0/24 in Azure
First, you need to delete 192.168.0.0/23 from Azure. It overlaps with 192.168.1.0/24, which you intend to use for on-premises. Second, you need to create a subnet for 192.168.0.0/24 in Azure to enable usage in Azure.
You are planning your Azure network implementation to support your company’s migration to Azure. Your first task is to prepare for the deployment of the first set of VMs. The first set of VMs that you are deploying has the following requirements:
- Consumers on the internet must be able to communicate directly with the web application on the VMs
- The IP configuration must be zone redundant
You need to configure the environment to prepare for the first VM. Additionally, you need to minimize costs, whenever possible, while still meeting the requirements. What should you do? Select one
a) Create a standard public IP address. During the creation of the first VM, associate the public IP address with the VM’s NIC
b) Create a standard public IP address. After the first VM is created, remove the private IP address and assign the public IP address to the NIC.
c) Create a basic public IP address. During the creation of the first VM, associate the public IP address with the VM
d) Create a basic public IP address. After the first VM is created, remove the private IP address and assign the public IP address to the NIC
a) Create a standard public IP address. During the creation of the first VM, associate the public IP address with the VM’s NIC
To meet the requirement of communicating directly with consumers on the internet, you must use a public IP address. To meet the requirement of having a zone redundant configuration, you must use a standard public IP address. Of the answer choices, only the answer that creates the standard public IP address first, then associates it during VM creation, functions and meets the requirements. You cannot configure a VM with only a public IP address. Instead, all VMs have a private IP address and can optionally have one or more public IP addresses.
You have a VM with two NICs named NIC1 and NIC2. NIC1 is connected to 10.10.8.0/24 subnet. NIC2 is connected to 10.20.8.0/24 subnet. You plan to update the VM configuration to provide the following functionality.
- Enable direct communication from the internet to TCP port 443
- Maintain existing communication across the 10.10.8.0/24 and 10.20.8.0/24 subnets
- Maintain a simple configuration whenever possible
You need to update the VM configuration to support the new functionality. What should you do? select one.
a) Remove the private IP address from NIC2 and then assign a public IP address to it. Then, create an inbound security rule
b) Add a third NIC and associate a public IP address to it. Then, create an inbound security rule
c) Associate a public IP address to NIC2 and create an inbound security rule
d) Create an inbound security rule for TCP port 443
c) Associate a public IP address to NIC2 and create an inbound security rule
To enable direct communication from the internet to the VM, you must have a public IP address. You also need an inbound security rule. You can associate the public IP address with NIC1 or NIC2, although this scenario only presents an option to associate it with NIC2 so that is the correct answer.
You’re currently using Network Security Groups (NSGs) to control how your network traffic flows in and out of your virtual network subnets and network interface. You want to customize how your NSGs work. For all incoming traffic, you need to apply your security rules to both the virtual machine and subnet level.
Which of the following options will let you accomplish this? (Choose two)
a) Configure the AllowVNetInBound security rule for all new NSGs
b) Create rules for both NICs and subnets with an allow action
c) Delete the default rules
d) Add rules with a higher priority than the default rules
b) Create rules for both NICs and subnets with an allow actions
d) Add rules with a higher priority than the default rules
You should add rules with a higher priority than the default rules if needed, as you cannot delete the default rules. Also, in order to meet the requirement to apply security rules to both VM and subnet level, you should create rules with an allow action for both. There is no need to configure the AllowVnetInBound rule as it as a default rule for any new security group you create.
Your company has two NSG security rules for inbound traffic to your web servers. There is an allow rule with a priority of 200. And, there is a deny rule with a priority of 150. Which rule takes precedence?
Select one
a) The allow rule takes precedence
b) The deny rule takes precedence
c) The rule that was created first takes precedence
b) The deny rule takes precedence
The deny rule takes precedence because it’s processed first. The rule with priority 150 is processed before the rule with priority 200
Which of the following is a default inbound security rule? Select one
a) Allow inbound coming from any VM to any other VM within the subnet
b) Allow inbound coming from any VM to any other VM within the same virtual network
c) Allow traffic from any external source to any of the VMs
a) Allow inbound coming from any VM to any other VM within the subnet
By default, inbound security rules allow traffic from any VM to any other VM within the subnet.
Your company wants to simplify network security group rules by using service tags. Which of the following is a valid service tag? Select one
a) VirtualNetwork
b) VPNGateway
c) Database
a) VirtualNetwork
VirtualNetwork. Service tags represent a group of IP addresses. For resources that you can specify by using a tag, you don’t need to know the IP address or port details. Other valid service tags are Internet, SQL, Storage, AzureLoadBalancer, and AzureTrafficManager.
You are configuring the Azure Firewall. You need to allow Windows Update network traffic through the firewall. Which of the following should you use? Select one.
a) Application Rules
b) Destination inbound rules
c) NAT Rules
d) Network rules
a) Application rules
Application rules. Application rules define fully qualified domain names (FQDNs) that can be accessed from a subnet. That would be appropriate to allow Windows Update network traffic.
Your company wants to allow external users to access an Azure virtual server with a remote desktop connection. Which one of the following items would you implement on Azure Firewall to allow these connections? Select one.
a) Service Tag
b) Source network address translation
c) Destination network address translation
c) Destination Network Address translation
Destination network address translation (DNAT). You use DNAT to translate Azure Firewall’s public IP address to the private IP address of the virtual server.
Your company wants to allow access to an Azure SQL database instance. Which of the following network rules types should they use to configure Azure Firewall?
a) Application
b) Network
c) NAT
a) Application
Application. You use an application rule to filter traffic based on an FQDN such as server1.database.windows.net.
Your company has an existing Azure tenant named aplineskihouse.onmicrosoft.com. The company wants to start using alpineskihouse.com for their Azure resources. You add a custom domain to Azure.
Now you need to add a DNS record to prepare for verifying the custom domain. Which two of the following record types would you create?
a) Add a PTR record to the DNS Zone
b) Add a TXT record to the DNS Zone
c) Add an MX record to the DNS Zone
d) Add an SRV record to the DNS Zone
e) Add a CNAME record to the DNS Zone
b) Add a TXT record to the DNS Zone
c) Add an MX record to the DNS Zone
By default, Azure will prompt you to create a custom TXT record in your DNS zone to verify a custom domain. Optionally, you can use an MX record instead. The result is the same. Other record types are not supported.
You deploy a new domain named contoso.com to domain controllers in Azure. You have the following domain-joined VMs in Azure:
- VM1 at 10.20.30.10
- VM2 at 10.20.30.11
- VM3 at 10.20.30.12
- VM99 at 10.20.40.101
You need to add DNS records so that the hostnames resolve to their respective IP Addresses. Additionally, you need to add a DNS record so that intranet.contoso.com resolved to VM99. What should you do? (Each answer presents part of the solution. Choose two)
a) Add AAAA records for each VM
b) Add A records for each VM
c) Add a TXT record for intranet.contoosl.com with the text of VM99.contoso.com
d) Add an SRV record for intranet.contoso.com with the target pointing at VM99.contoso.com
e) Add a CNAME record for intranet.contoso.com with a value of VM99.contoso.com
b) Add A records for each VM
e) Add a CNAME record for intranet.contoso.com with a value of VM99.contoso.com
In this scenario, the hostnames have IPv4 IP addresses. Thus, to resolve those hostnames, you must add A records for each of the VMs. To enable intranet.contoso.com to resolve to VM99.contoso.com, you need to add a CNAME record. A CNAME record is often referred to as an “alias”.
Your company is preparing to move some services and VMs to Microsoft Azure. The company has opted to use Azure DNS to provide name resolution. A project begins to configure the name resolution. The project identifies the following requirements:
- A new domain will be used
- The domain will have DNS records for internal and external resources
- Minimize ongoing administrative overhead
you need to prepare and configure the environment with a new domain name and a test hostname of WWW. Which of the following steps should you perform? (Each answer presents part of the solution. Choose three)
a) Register a domain name with a domain registrar
b) Register a domain name with Microsoft Azure
c) Delegate the new domain name to Azure DNS
d) Add an Address (A) record for Azure name servers in the Zone
e) Add DNS glue records to point to the Azure name servers
f) Add a record for WWW
a) Register a domain name with a domain registrar
c) Delegate the new domain name to Azure DNS
f) Add a record for WWW
For private domain names, you must register with a registrar because Azure isn’t a registrar. Thereafter, you need to delegate the new domain name to Azure DNS, which enables Azure DNS to be authoritative for the domain. After delegation, you should add a test hostname of WWW and test name resolution.
You want to connect different VNets in the same region as well as different regions and decide to use VNet peering to accomplish this. Which of the following statements is not true about VNet peering? Select one.
a) The virtual networks can only exist in the same Azure cloud region
b) Network traffic between peered virtual networks is private
c) Peering is easy to configure and manage, requiring little to no downtime
d) Gateway transit can be configured regionally or globally
a) The virtual networks can only exist in the same Azure cloud region
The virtual networks can exist in any Azure cloud region.