CSCE 590 Midterm

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Select the answer that correctly completes the sentence. Increasing the capacity of an application by adding additional virtual machine is called [answer choice]. A. agility B. high availability C. horizontal scaling D. vertical scaling

C

The human resources organization wants to ensure that stored employee data is encrypted. Which security mechanism would they use? A. Hashing B. Encryption in transit. C. Encryption at rest.

C

What statement best describes Azure Blob Storage access tiers? A. The cool access tier is for frequent access of objects in the storage account. B. The hot access tier is for storing large amounts of data that's infrequently accessed. C. The administrator can switch between hot and cool performance tiers at any time.

C

When should you use Azure Functions? A. To host my Web API. B. To run long > 30-min batch jobs. C. To run code that needs to run for a reason.

C

Which feature in the Microsoft Purview governance portal should you use to manage access to data sources and datasets? A. Data Catalog B. Data Estate Insights C. Data Policy D. Data Sharing

C

You need to allow resources on two different Azure virtual networks to communicate with each other. What should you configure? A. a network security group (NSG) B. a point-to-site VPN C. peering D. service endpoints

C

According to the shared responsibility model, which cloud service type places the most responsibility on the customer? A. IaaS B. SaaS C. PaaS

A

An organization has deployed Microsoft 365 applications to all employees. Considering the shared responsibility model, who is responsible for the accounts and identities relating to these employees? A. The organization. B. Microsoft, the SaaS provider. C. There's shared responsibility between an organization and Microsoft

A

How is data in a relational table organized? A. Rows and Columns B. Header and Footer C. Pages and Paragraphs

A

What Azure feature can help stay organized and track usage based on metadata associated with resources? A. Tags B. Tracers C. Values

A

What are triggers and bindings? A. A trigger is a condition for when code should run, and binding is code written to facilitate connecting to and writing data to a data source. B. A trigger is connection code that helps you access a data source, and a binding is condition that defines when code should run. C. A trigger is when code times out and binding is the code that runs as a result.

A

What feature can support the denial of traffic based on the IP address range? A. Statically assigned IP addresses B. Dynamically assigned IP addresses C. IP addresses in the reserved range

A

What is cloud computing? A. Delivery of computing services over the internet. B. Delivery of storage services over the internet. C. Delivery of websites accessible via the internet.

A

What provides recommendations to reduce the cost of Azure resources? A. Azure Advisor B. Azure Dashboard C. Azure Service Health D. Microsoft Defender for Cloud

A

What service helps you manage your Azure, on-premises, and multicloud environments? A. Azure Arc B. Azure Policy C. Azure Cloud Manager

A

What two components could you use to implement a "infrastructure as code" deployment? A. Bicep and ARM Templates B. Azure Policy and Azure Arc C. Azure Monitor and Azure Arc

A

Which of the following changes between access tiers happens immediately? A. Hot tier to cool tier B. Archive tier to cool tier C. Archive tier to hot tier

A

Which of the following standard HTTP headers are supported for both containers and blobs when setting properties by using REST? A. Last-Modified B. Content-Length C. Origin

A

In which two deployment models are customers responsible for managing operating systems that host applications? A. infrastructure as a service (IaaS) B. on-premises C. platform as a service (PaaS) D. software as a service (SaaS)

A, B

Which Azure component allows you to replicate resources across a geography to ensure business continuity during a natural disaster at the primary site?

region pairs

How many triggers does an Azure Function have? A. An Azure Function doesn't require a trigger. B. An Azure Function should have one trigger. C. An Azure Function can have multiple triggers.

B

How would you describe blob object replication? A. Blob object replication doesn't require versioning to be enabled. B. Blob object replication doesn't support blob snapshots. C. Blob object replication is supported in the archive tier.

B

What is a data warehouse? A. A nonrelational database optimized for read and write operations B. A relational database optimized for read operations C. A storage location for unstructured data files

B

What's the best method to estimate the cost of migrating to the cloud while incurring minimal costs? A. Migrate a small sample to the cloud and track costs over time. B. Use the Total Cost of Ownership calculator to estimate expected costs. C. Migrate to the cloud, but track usage closely using tags to rapidly understand costs.

B

Which cloud model uses some datacenters focused on providing cloud services to anyone that wants them, and some data centers that are focused on a single customer? A. Public cloud B. Hybrid cloud C. Multi-cloud

B

Which of the following best describes the concept of data sovereignty? A. There are regulations that govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally. B. Data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed. C. Trust no one, verify everything.

B

Which of the following classes of the Azure Storage client library for .NET allows you to manipulate both Azure Storage containers and their blobs? A. BlobClient B. BlobContainerClient C. BlobUriBuilder

B

Which of the following is an example of unstructured data? A. An Employee table with columns EmployeeID, EmployeeName, and EmployeeDesignation B. Audio and Video files C. A table within a relational database

B

Which of the following measures might an organization implement as part of the defense in-depth security methodology? A. Locating all its servers in a single physical location. B. Multifactor authentication for all users. C. Ensuring there's no segmentation of your corporate network.

B

Which of the following statements about Azure Virtual Network is correct? A. Outbound communication with the internet must be configured for each resource on the virtual network. B. Azure Virtual Network enables communication between Azure resources. C. Azure virtual networks can't be configured to communicate with on-premises resources.

B

Which scenario is a use case for a VPN gateway? A. communicating between Azure resources B. connecting an on-premises datacenter to an Azure virtual network C. filtering outbound network traffic D. partitioning a virtual network's address space

B

Your organization is building a custom application. You need to focus on application development rather than configuration and management of servers. Which cloud service model should you use? A. infrastructure as a service (IaaS) B. platform as a service (PaaS) C. software as a service (SaaS)

B

Which two attributes are characteristics of the private cloud deployment model? Each correct answer presents a complete solution. A. Applications can be provisioned and deprovisioned quickly. B. Hardware must be purchased. C. Organizations only pay for what they use. D. The company has complete control over physical resources and security.

B, D

What can you use to restrict the deployment of a virtual machine to a specific location?

Azure Policy


संबंधित स्टडी सेट्स

Chapter 4: Functional Anatomy of Prokaryotic and Eukaryotic Cells

View Set

Chapter 13 Debtor Creditor and Consumer Credit Law

View Set

Property and Casualty Chapter 1: Insurance Terms and Related Concepts

View Set

Chapter 32 skin integrity and wound care

View Set

Chapter 12 Windows under the hood, 1002

View Set

anatomy chapter 4: Tissues test bank

View Set