AZ-204: Developing Solutions for Microsoft Azure
By default, all client requests to the app's production URL (http://<app_name>.azurewebsites.net) are routed to the production slot. One can automatically route a portion of the traffic to another slot. What is the default routing rule applied to new deployment slots? -0% -10% -20%
0% - By default, new slots are given a routing rule of 0%.
Caching is important because it allows us to store commonly used values in memory. However, we also need a way to expire values when they're stale. In Redis this is done by applying a time to live (TTL) to a key. Which value represents the expire time resolution? -1 millisecond -10 milliseconds -seconds or milliseconds
1 millisecond - The expire time resolution is always 1 millisecond.
Which type of encryption does Azure App Configuration use to encrypt data at rest? -64-bit AES -128-bit AES -256-bit AES
256-bit AES -Azure App Configuration encrypts sensitive information at rest using a 256-bit AES encryption key provided by Microsoft.
Suppose you have recently moved your application to the cloud and your monthly bill seems higher than expected. The utilization level of your VM is high enough that you're hesitant to downsize. What might be a reasonable next step you can take to help you find inefficiencies? -Wait a month and recheck your bill. -Increase the amount of application testing you do before each release. -Add monitoring and instrumentation to your application.
Add monitoring and instrumentation to your application. -Continuous monitoring will give you the data that you need to find cost savings. For example, you might find that demand is extremely variable, and multiple small VMs with autoscale might cost less than the single large VM you currently use.
Which of the following is an example of scaling out (horizontal scaling)? Updating a virtual machine to a larger size -Adding more storage to a virtual machine -Adding more web servers into a web farm -Replicating backups to another region
Adding more web servers into a web farm -Adding more web servers into a web farm is an example of scaling out (horizontal scaling).
Which of the following types of data might need to have security protections? Customer data that contains personal information -Financial data that supports business operations -Intellectual property -All of the above might need security protections
All of the above might need security protections -All of the above might merit additional security protections.
Which of the following statements is a valid statement about an Azure subscription? -Using Azure doesn't require a subscription. -An Azure subscription is a logical unit of Azure services.
An Azure subscription is a logical unit of Azure services. -A subscription is a set of Azure services bundled together for tracking and billing purposes. Resource access control occurs at the subscription level. Organizations use Azure subscriptions to manage and govern their Azure resources.
Which of the following Azure Functions hosting plans is best when predictive scaling and costs are required? -Functions Premium Plan -App service plan -Consumption plan
App service plan -App service plans support setting autoscaling rules based on predictive usage.
Which is likely the best way for Tailwind Traders to identify which billing department each Azure resource belongs to? -Track resource usage in a spreadsheet. -Split the deployment into separate Azure subscriptions, where each subscription belongs to its own billing department. -Apply a tag to each resource that includes the associated billing department.
Apply a tag to each resource that includes the associated billing department. -Tags provide extra information, or metadata, about your resources. The team might create a tag that's named BillingDept whose value would be the name of the billing department. You can use Azure Policy to ensure that the proper tags are assigned when resources are provisioned.
Which of the following app scenarios require code to handle Conditional -Access challenges? -Apps performing the device-code flow -Apps performing the on-behalf-of flow -Apps performing the Integrated Windows authentication flow
Apps performing the on-behalf-of flow -Apps performing the on-behalf-of flow require code to handle Conditional Access challenges.
Which access tier is considered to be offline and can't be read or modified? -Cool -Archive -Hot
Archive - Blobs in the archive tier must be rehydrated to either the hot or cool tier before it can be read or modified.
Which of the following best practices provides the most flexible and secure way to use a service or account shared access signature (SAS)? -Associate SAS tokens with a stored access policy. -Always use HTTPS -Implement a user delegation SAS
Associate SAS tokens with a stored access policy. -The most flexible and secure way to use a service or account SAS is to associate the SAS tokens with a stored access policy.
Which of these statements best describes autoscaling? -Autoscaling requires an administrator to actively monitor the workload on a system. -Autoscaling is a scale out/scale in solution. -Scaling up/scale down provides better availability than autoscaling.
Autoscaling is a scale out/scale in solution. - The system can scale out when specified resource metrics indicate increasing usage, and scale in when these metrics drop.
Which of the below represents a logical grouping of VMs that allows Azure to understand how your application is built to provide for redundancy and availability? -Load balancer -Availability zone -Availability set
Availability set - An availability set is a logical grouping of VMs Reason.
Which Azure Storage option is better for storing data for backup and restore, disaster recovery, and archiving? -Azure Files Storage -Azure Disk Storage -Azure Blob Storage
Azure Blob Storage - Azure Blob Storage is your best option for storing disaster recovery files and archives.
Your development team is interested in writing Graph-based applications that take advantage of the Gremlin API. Which option would be ideal for that scenario? -Azure Cosmos DB -Azure SQL Database -Azure Databricks -Azure Database for PostgreSQL
Azure Cosmos DB -Azure Cosmos DB supports SQL, MongoDB, Cassandra, Tables, and Gremlin APIs.
Tailwind Traders uses the LAMP stack for several of its websites. Which option would be ideal for migration? -Azure Cosmos DB -Azure Database for MySQL -Azure Database for PostgreSQL
Azure Database for MySQL - Azure Database for MySQL is the logical choice for existing LAMP stack applications.
Which of the following services should be used when the primary concern is to perform work in response to an event (often via a REST command) that needs a response in a few seconds? -Azure Functions -Azure App Service -Azure Container Instances
Azure Functions -Azure Functions is used when you need to perform work in response to an event (often via a REST request), timer, or message from another Azure service, and when that work can be completed quickly, within seconds or less.
An organization wants to implement a serverless workflow to solve a business problem. One of the requirements is the solution needs to use a designer-first (declarative) development model. Which of the choices below meets the requirements? -Azure Functions -Azure Logic Apps -WebJobs
Azure Logic Apps - Azure Logic Apps enables serverless workloads and uses a designer-first (declarative) development model.
Tailwind Traders has millions of log entries that it wants to analyze. Which option would be ideal for analysis? -Azure Cosmos DB -Azure SQL Database -Azure Database for PostgreSQL -Azure Synapse Analytics
Azure Synapse Analytics -Azure Synapse Analytics is the logical choice for analyzing large volumes of data.
Your company has a team of remote workers that need to use Windows-based software to develop your company's applications, but your team members are using various operating systems like macOS, Linux, and Windows. Which Azure compute service would help resolve this scenario? -Azure App Service -Azure Virtual Desktop -Azure Container Instances
Azure Virtual Desktop -Azure Virtual Desktop enables your team members to run Windows in the cloud, with access to the required applications for your company's needs.
Which of the following is a logical unit of Azure services that links to an Azure account? Azure subscription -Management group -Resource group -Public cloud
Azure subscription - An Azure subscription is a logical unit of Azure services that links to an Azure account. An Azure subscription is an object that represents a container that you can put resources in. Subscriptions are tied to tenants, so one tenant can have many subscriptions, but not vice versa.
Which of the following supports both the in and out direction settings? -Bindings -Trigger -Connection value
Bindings -Input and output bindings use in and out.
Which of the following classes of the Azure Storage client library for .NET allows you to manipulate both Azure Storage containers and their blobs? -BlobClient -BlobContainerClient -BlobUriBuilder
BlobContainerClient -The BlobContainerClient can be used to manipulate both containers and blobs
Each Azure subscription has default limits on resources needed for an Azure Content Delivery Network. Which of the following resources has subscription limitations that may impact your solution? -Resource group -CDN profiles -Storage account
CDN profiles -The number of CDN profiles that can be created is limited by the type of Azure subscription.
Which of the following represents when an event processor marks or commits the position of the last successfully processed event within a partition? -Checkpointing -Scale -Load balance
Checkpointing -Checkpointing is a process by which an event processor marks or commits the position of the last successfully processed event within a partition.
Which Azure Resource Manager template deployment mode deletes resources in a resource group that aren't specified in the template? -Incremental -Complete -Both incremental and complete delete resources
Complete -Complete mode will delete resources not specified in an Azure Resource Manager template deployment.
How can the IT department ensure that employees at the company's retail stores can access company applications only from approved tablet devices? -SSO -Conditional Access -Multifactor authentication
Conditional Access -Conditional Access enables you to require users to access your applications only from approved, or managed, devices.
Which of the following is a good practice to reduce costs? Conducting regular reviews of cloud bills to identify abnormal increases in spend. -Letting all IT teams have access to provision virtual machines of any size. -Provisioning the same capacity in development environments as for production, even though resource requirements are substantially lower in development environments. -Provisioning virtual machines that include licensing costs rather than using a bring-your-own-license image.
Conducting regular reviews of cloud bills to identify abnormal increases in spend. -You should regularly review your bills to identify any abnormalities in your spend, as well as identifying areas where you can reduce costs.
Which of the following App Service plans supports only function apps? -Dedicated -Isolated -Consumption
Consumption -The consumption tier is only available to function apps. It scales the functions dynamically depending on workload.
What are the five disciplines of cloud governance? -Business risk, process, policy and compliance, resource consistency, and deployment acceleration. -Business risk, policy and compliance, security baseline, process, and operations. -Cost management, security baseline, resource consistency, identity baseline, and deployment acceleration.
Cost management, security baseline, resource consistency, identity baseline, and deployment acceleration. -When you build your cloud governance strategy, you need to think about cost management, setting a security baseline, working toward resource consistency through best practices, establishing the identity and access strategy, and accelerating deployment with consistent templates.
Which is the best way for Tailwind Traders to ensure that the team deploys only cost-effective virtual machine SKU sizes? -Create a policy in Azure Policy that specifies the allowed SKU sizes. -Periodically inspect the deployment manually to see which SKU sizes are used. -Create an Azure RBAC role that defines the allowed virtual machine SKU sizes.
Create a policy in Azure Policy that specifies the allowed SKU sizes. -After you enable this policy, that policy is applied when you create new virtual machines or resize existing ones. Azure Policy also evaluates any current virtual machines in your environment.
How can Tailwind Traders allow some users to control the virtual machines in each environment but prevent them from modifying networking and other resources in the same resource group or Azure subscription? -Create a role assignment through Azure role-based access control (Azure RBAC). -Create a policy in Azure Policy that audits resource usage. Split the environment into separate resource groups.
Create a role assignment through Azure role-based access control (Azure RBAC). -Azure RBAC enables you to create roles that define access permissions. You might create one role that limits access only to virtual machines and a second role that provides administrators with access to everything.
What is the first step that you would take in order to share an image file as a blob in Azure Storage? -Create an Azure Storage container to store the image. -Create an Azure Storage account. -Upload the image file and create a container. -Use a Shared Access Signature (SAS) token to restrict access to the image.
Create an Azure Storage account. - You must create an Azure Storage account before you can use any Azure Storage features.
Which of the following availability tests is recommended for authentication tests? -URL ping -Standard -Custom TrackAvailability
Custom TrackAvailability -Custom TrackAvailability test is the long term supported solution for multi request or authentication test scenarios.
Which of the types of permissions supported by the Microsoft identity platform is used by apps that have a signed-in user present? -Delegated permissions -Application permissions -Both delegated and application permissions
Delegated permissions - Delegated permissions are used by apps that have a signed-in user present. The app is delegated with the permission to act as a signed-in user when it makes calls to the target resource.
Which of the following types of application logging is supported on the Linux platform? -Web server logging -Failed request tracing -Deployment logging
Deployment logging -Deployment logging is supported on the Linux platform.
Which of the following components of the API Management service would a developer use if they need to create an account and subscribe to get API keys? -API gateway -Azure portal -Developer portal
Developer portal -The Developer portal serves as the main web presence for developers, and is where they can subscribe to get API keys.
Suppose you want to increase the availability of your system to provide a better service-level agreement (SLA) to your customers. Which of the following is a guiding principle you can use? -Reduce your target for maximum duration of acceptable data loss -Encrypt all data at rest -Eliminate single point of failure
Eliminate single point of failure -Reliability focuses on maintaining service despite temporary conditions and localized failures. Adding redundancy to eliminate single points of failure is a core strategy for improving availability.
Which of the following options isn't a benefit of ExpressRoute? -Redundant connectivity -Consistent network throughput -Encrypted network communication -Access to Microsoft cloud services
Encrypted network communication -ExpressRoute does provide private connectivity, but it isn't encrypted.
Which of the following durable function types is used to read and update small pieces of state? -Orchestrator -Activity -Entity
Entity -Entity functions define operations for reading and updating small pieces of state.
Which of the following Event Grid built-in roles is appropriate for managing Event Grid resources? -Event Grid Contributor -Event Grid Subscription Contributor -Event Grid Data Sender
Event Grid Contributor - The Event Grid Contributor role has permissions to manage resources.
Which of the following consistency levels below offers the greatest throughput? -Strong -Session -Eventual
Eventual -The eventual consistency level offers the greatest throughput at the cost of weaker consistency.
Which of the following is an example of an attack you might see at the policies and access layer? Exposed credentials posted online -A SYN flood attack -Following an employee into a datacenter without presenting credentials -Ransomware that encrypts the disks of a virtual machine
Exposed credentials posted online -Exposed credentials are a huge risk to an organization and apply at the policies and access layer.
Which of the below evaluates the state of a feature flag? -Feature flag -Feature manager -Filter
Filter -A filter is a rule for evaluating the state of a feature flag. A user group, a device or browser type, a geographic location, and a time window are all examples of what a filter can represent.
Which of the following Azure virtual machine types is most appropriate for testing and development? -Compute optimized -General Purpose -Storage optimized
General Purpose -This type has a balanced CPU-to-memory ratio, and is ideal for testing and development.
Which of the following storage account types supports lifecycle policies? -General Purpose v1 -General Purpose v2 -FileStorage
General Purpose v2 - Azure Blob storage lifecycle management offers a rich, rule-based policy for General Purpose v2 and Blob storage accounts.
In which of the app configuration settings categories below would you set the language and SDK version? -Application settings -Path mappings -General settings
General settings -This category is used to configure stack, platform, debugging, and incoming client certificate settings.
Which of the following types of storage accounts is recommended for most scenarios using Azure Storage? -General-purpose v2 -General-purpose v1 -FileStorage
General-purpose v2 - This supports blobs, files, queues, and tables. It's recommended for most scenarios using Azure Storage.
Which of the following networking features of App Service can be used to control outbound network traffic? -App-assigned address -Hybrid Connections -Service endpoints
Hybrid Connections -Hybrid Connections are an outbound network feature.
Tailwind Traders wants to create a secure communication tunnel between its branch offices. Which of the following technologies can't be used? Point-to-site virtual private network -Implicit FTP over SSL -Azure ExpressRoute -Site-to-site virtual private network
Implicit FTP over SSL -FTP over SSL can't be used to create a secure communication tunnel.
Which of the following characteristics is indicative of user-assigned identities? -Shared lifecycle with an Azure resource -Independent life-cycle -Can only be associated with a single Azure resource
Independent life-cycle - User-assigned identities exist independently from the resources they're associated with and must be explicitly deleted.
Which of the below correctly lists the two components of a partition key? -Key path, synthetic key -Key path, key value -Key value, item ID
Key path, key value -A partition key has two components: partition key path and the partition key value.
Which of the following standard HTTP headers are supported for both containers and blobs when setting properties by using REST? -Last-Modified -Content-Length -Origin
Last-Modified - Last-Modified is supported on both containers and blobs.
Which of the following MSAL libraries supports single-page web apps? -MSAL Node -MSAL.js -MSAL.NET
MSAL.js -MSAL.js supports single-page applications.
Which of the below methods of authenticating to Azure Key Vault is recommended for most scenarios? -Service principal and certificate -Service principal and secret -Managed identities
Managed identities -The benefit of this approach is that Azure automatically rotates the identity.
Which of the following can be used to manage governance across multiple Azure subscriptions? -Azure initiatives -Management groups -Resource groups
Management groups -Management groups facilitate the hierarchical ordering of Azure resources into collections, at a level of scope above subscriptions. Distinct governance conditions can be applied to each management group, along with Azure Policy and Azure role-based access controls, to manage Azure subscriptions effectively. The resources and subscriptions assigned to a management group automatically inherit the conditions applied to the management group.
Which of the following advanced features of Azure Service Bus creates a first-in, first-out (FIFO) guarantee? -Transactions -Scheduled delivery -Message sessions
Message sessions -To create a first-in, first-out (FIFO) guarantee in Service Bus, use sessions. Message sessions enable joint and ordered handling of unbounded sequences of related messages.
Which of the components of the Microsoft 365 platform is used to deliver data external to Azure into Microsoft Graph services and applications? -Microsoft Graph API -Microsoft Graph connectors -Microsoft Graph Data Connect
Microsoft Graph connectors - Microsoft Graph connectors work in the incoming direction. Connectors exist for many commonly used data sources such as Box, Google Drive, Jira, and Salesforce.
Which of the following Microsoft Graph .NET SDK packages provides an authentication scenario-based wrapper of the Microsoft Authentication Library? -Microsoft.Graph -Microsoft.Graph.Core -Microsoft.Graph.Auth
Microsoft.Graph.Auth - The Microsoft.Graph.Auth package provides an authentication scenario-based wrapper of the Microsoft Authentication Library for use with the Microsoft Graph SDK.
Which application pattern would you use for a durable function that is polling a resource until a specific condition is met? -Function chaining -Fan out/fan in -Monitor
Monitor -The monitor pattern refers to a flexible, recurring process in a workflow. An example is polling until specific conditions are met.
How can the IT department use biometric properties, such as facial recognition, to enable delivery drivers to prove their identities? -SSO -Conditional Access -Multifactor authentication
Multifactor authentication -Authenticating through multifactor authentication can include something the user knows, something the user has, and something the user is.
Which of the following choices correctly lists the two parts of a feature flag? -Name, App Settings -Name, one or more filters -Feature manager, one or more filters
Name, one or more filters -Each feature flag has two parts: a name and a list of one or more filters that are used to evaluate if a feature's state is on.
When publishing a website through Azure CDN, the files on that site are cached until their time-to-live (TTL) expires. What is the default TTL for large file optimizations? -One day -One week -One year
One day - The default TTL for large file optimizations is one day.
Which HTTP method below is used to update a resource with new values? -POST -PATCH -PUT
PATCH -The PATCH method does update a resource with a new value.
Which of the following types of blobs are used to store virtual hard drive files? -Block blobs -Append blobs -Page blobs
Page blobs - Page blobs store random access files up to 8 TB in size, and are used to store virtual hard drive (VHD) files and serve as disks for Azure virtual machines.
Which of the following Event Hubs concepts represents an ordered sequence of events that is held in an Event Hub? -Consumer group -Partition -Event Hub producer
Partition - A partition is an ordered sequence of events that is held in an Event Hub.
In Azure Service Bus messages are durably stored which enables a load-leveling benefit. Which of the below correctly describes the load-leveling benefit relative to a consuming application's performance? -Performance needs to handle peak load -Performance needs to handle average load -Performance needs to handle low loads
Performance needs to handle average load -Intermediating message producers and consumers with a queue means that the consuming application only has to be able to handle average load instead of peak load.
Which of the following is a good example of using testing in your environment? -Waiting for users to reach out to you with reports of errors in your application. -Performing functionality tests in the development environment that are different from functionality tests in the production environment. -Omitting infrastructure deployment from test plans. -Performing regular security tests of your application code in development and production environments.
Performing regular security tests of your application code in development and production environments. -Regular security tests are a key element of security for your application and can help identify security defects and issues.
Which of the options below best describes the relationship between logical and physical partitions? -Logical partitions are collections of physical partitions. -Physical partitions are collections of logical partitions -There's no relationship between physical and logical partitions.
Physical partitions are collections of logical partitions - One or more logical partitions are mapped to a single physical partition.
The Cloud Adoption Framework for Azure helps customers make their journey to the cloud. What are the three main stages of the framework? -Plan, Business Justification, and Implementation. -Migrate, Test, and Optimize. -Plan, Ready, and Adopt.
Plan, Ready, and Adopt. -The Cloud Adoption Framework describes how the organization must prepare its people with technical readiness, adjust business processes to drive business and technology changes, and enable business outcomes through implementation of the defined technology plan
Which of the following metric collection types below provides near real-time querying and alerting on dimensions of metrics, and more responsive dashboards? -Log-based -Pre-aggregated -Azure Service Bus
Pre-aggregated -Pre-aggregated metrics are stored as a time series and only with key dimensions, which enable near real-time alerting on dimensions of metrics, more responsive dashboards.
Which of the following would one use to validate properties of an item being created? -Pre-trigger -Post-trigger -User-defined function
Pre-trigger - Pre-triggers can be used to conform data before it's added to the container.
Which of the following Azure Container Registry support geo-replication to manage a single registry across multiple regions? -Basic -Standard -Premium
Premium -The premium tier adds geo-replication as a feature.
When setting up Azure Cosmos DB there are three account type options. Which of the account type options below is used to specify the number of RUs for an application on a per-second basis? -Provisioned throughput -Serverless -Autoscale
Provisioned throughput - In this mode, you provision the number of RUs for your application on a per-second basis in increments of 100 RUs per second.
Which of the following features does not apply to resource groups? Resources can be in only one resource group. -Role-based access control can be applied to the resource group. -Resource groups can be nested.
Resource groups can be nested. - Resource groups cannot be nested.
What purpose does the outputs section of an Azure Resource Manager template serve? -Specify the resources to deploy. -Return values from the deployed resources -Define values that are reused in your templates.
Return values from the deployed resources -The "outputs" section returns values from the resource(s) that were deployed.
Which of the following is an example of waste, resulting in an increased resource cost? Archiving infrequently accessed data to an archive storage tier. -Using a service that automatically adjusts resources that are provisioned to match user load. -Pooling databases to share provisioned capacity. -Running a development environment overnight that is used only during business hours.
Running a development environment overnight that is used only during business hours. -A non-production environment that is unused outside business hours can be shut down to reduce costs.
How can the IT department reduce the number of times users must authenticate to access multiple applications? -SSO -Conditional Access -Multifactor authentication
SSO -SSO enables a user to remember only one ID and one password to access multiple applications.
The common value drivers that business decision makers can use to justify moving their business to the cloud are Cost, Scale, Productivity, and Reliability. What is the specific value of scale in cloud computing? -Scale is the ability to deliver the right amount of IT resources. -Scale eliminates capital expense. -Scale eases the burden of data backup, disaster recovery, and business continuity.
Scale is the ability to deliver the right amount of IT resources. -Scale is the ability to scale elastically and deliver the right amount of IT resources.
A client app requests managed identities for an access token for a given resource. Which of the below is the basis for the token? -Oauth 2.0 -Service principal -Virtual machine
Service principal -The token is based on the managed identities for Azure resources service principal.
Tailwind Traders wants to use Azure ExpressRoute to connect its on-premises network to the Microsoft cloud. Which of the following choices isn't an ExpressRoute model that Tailwind Traders can use? -Any-to-any connection -Site-to-site virtual private network -Point-to-point Ethernet connection -CloudExchange colocation
Site-to-site virtual private network -A site-to-site virtual private network isn't an ExpressRoute model.
Which of the Azure Cache for Redis service tiers is the lowest tier recommended for use in production scenarios? -Basic -Standard -Premium
Standard - The standard tier is the lowest tier that offers replication,which is always recommended for production scenarios.
When defining a stored procedure in the Azure portal input parameters are always sent as what type to the stored procedure? -String -Integer -Boolean
String - When defining a stored procedure in Azure portal, input parameters are always sent as a string to the stored procedure.
Which of the following event schema properties requires a value? -Topic -Data -Subject
Subject -The subject property specifies the publisher-defined path to the event subject and is required.
Financial planning for cloud adoption requires organizations to decide whether to expand on-premises capabilities or move certain workloads and functions off-premises to cloud-delivered services. Microsoft has tools that can help. What Microsoft tool is available for a CFO who's trying to estimate the expected monthly bill and track actual account usage? -The Azure Total Cost of Ownership (TCO) Calculator. -The Azure Pricing Calculator. -Microsoft Cost Management.
The Azure Pricing Calculator. -Organizations can estimate their expected monthly bills by using the pricing calculator to track their actual account usage and bills at any time on the billing portal.
Which of the following would be affected by your defined recovery point objective (RPO)? -The frequency of database backups -The number of regions that data is replicated to -The number of instances in a database cluster -The type of load-balancing technology used in your application
The frequency of database backups -Because the recovery point objective is concerned with the amount of data loss that is tolerable, the frequency of backups needs to be within this time window and is directly affected by your defined RPO.
Which of these scenarios is a suitable candidate for autoscaling? -The number of users requiring access to an application varies according to a regular schedule. For example, more users use the system on a Friday than other days of the week. -The system is subject to a sudden influx of requests that grinds your system to a halt. -Your organization is running a promotion and expects to see increased traffic to their web site for the next couple of weeks.
The number of users requiring access to an application varies according to a regular schedule. For example, more users use the system on a Friday than other days of the week. - Changes in application load that are predictable are good candidates for autoscaling.
Motivations for cloud adoption include migration and innovation triggers. Migration triggers include such things as cost saving and operations optimization. Which of the following is an example of an innovation trigger which drives cloud adoption? -Reduction in IT staff for on-premises hardware. -Transform products or services. -Increase business agility.
Transform products or services. - The desire to transform products or services might be an innovation trigger which drives cloud adoption.
Azure Key Vault protects data when it is traveling between Azure Key Vault and clients. What protocol does it use for encryption? -Secure Sockets Layer -Transport Layer Security -Presentation Layer
Transport Layer Security - Azure Key Vault enforces Transport Layer Security protocol to protect data when it's traveling between Azure Key Vault and clients.
Which of the following is required for a function to run? -Binding -Trigger -Both triggers and bindings
Trigger - A trigger defines how a function is invoked and a function must have exactly one trigger.
Which of the following is an example of scaling up (vertical scaling)? Updating your application to use a queuing service -Adding more web servers into a web farm -Adding another virtual machine into a database cluster -Updating a virtual machine to a larger size
Updating a virtual machine to a larger size -Changing a virtual machine to a larger size increases the resources available to the instance, and is an example of scaling up (vertical scaling).
Which of the following types of shared access signatures (SAS) applies to -Blob storage only? -Account SAS -Service SAS -User delegation SAS
User delegation SAS -A user delegation SAS is secured with Azure Active Directory credentials and also by the permissions specified for the SAS. A user delegation SAS applies to Blob storage only.
Which of the following is a good example of using automation to improve operational excellence? -Manually provisioning development environments every day for your development teams. -Logging on Linux VMs after deployment and installing the software packages that are required for the application. -Using a configuration template to deploy infrastructure in each environment. -Manually copying application binaries from your build system to your deployment infrastructure
Using a configuration template to deploy infrastructure in each environment. -By using a configuration template to deploy infrastructure, you can be sure to have consistent, repeatable environments.
Which Azure compute resource can be deployed to manage a set of identical virtual machines? -Virtual machine scale sets -Virtual machine availability sets -Virtual machine availability zones
Virtual machine scale sets -Virtual machine scale sets let you deploy and manage a set of identical virtual machines.
Which of the following options can you use to link virtual networks? -Network address translation -Multi-chassis link aggregation -Dynamic Host Configuration Protocol -Virtual network peering
Virtual network peering -Virtual network peering can be used to link virtual networks.
Some configuration elements follow the content across a swap (not slot specific), whereas other configuration elements stay in the same slot after a swap (slot specific). Which of the settings below are swapped? -Publishing endpoints -WebJobs content -WebJobs schedulers
WebJobs content - WebJobs content are swapped.
Which of the methods below is recommended when deploying a multi-container group that includes only containers? -Azure Resource Management template -YAML file -az container creates command
YAML file -Due to the YAML format's more concise nature, a YAML file is recommended when your deployment includes only container instances.
Which of the following API Management policies would one use if one wants to apply a policy based on a condition? -forward-request -choose -return-response
choose -The choose policy applies enclosed policy statements based on the outcome of evaluation of boolean expressions.
There are multiple rules in an autoscale profile. Which of the following scale operations will run if any of the rule conditions are met? -scale-out -scale-in -scale-out/in
scale-out - Scale-out operations will trigger if any of the rule conditions are met.