Microsoft Certified Azure Fundamentals Study Guide. James Boyce

Читать онлайн.
Название Microsoft Certified Azure Fundamentals Study Guide
Автор произведения James Boyce
Жанр Зарубежная компьютерная литература
Серия
Издательство Зарубежная компьютерная литература
Год выпуска 0
isbn 9781119771159



Скачать книгу

4 for more information.

      1 24. B. Azure ExpressRoute Direct provides similar capabilities as Azure ExpressRoute but is not routed across the Internet. See Chapter 4 for more information.

      1 25. C. Azure Content Delivery Network (CDN) enables you to place replicas of content geographically near the users who need to consume the content. See Chapter 4 for more information.

      1 26. A. An Azure NSG enables you to restrict access to the VM based on port, and RBAC enables you to restrict access to specific individuals. See Chapter 4 for more information.

      1 27. B. To implement custom routing, create a user‐defined route and apply it to all relevant virtual networks. See Chapter 4 for more information.

      1 28. D. No change is needed, since DDoS Standard provides alerting to ongoing distributed denial‐of‐service (DDoS) attacks. It also provides alerting and mitigation reporting. See Chapter 4 for more information.

      1 29. D. In this example, the first three options are examples of authentication (identifying the holder), but do not authorize the user. The visa provides that authorization for entering the country. See Chapter 4 for more information.

      1 30. B. Adding the capability to synchronize password changes to on‐premises AD requires Azure AD Premium. See Chapter 4 for more information.

      1 31. C. Security Center provides recommendations on improving security, as well as monitoring and alerts. See Chapter 4 for more information.

      1 32. D. Azure Key Vault is the appropriate place to store secrets such as security credentials in Azure. See Chapter 4 for more information.

      1 33. D. Azure Information Protection (AIP) provides the capability to protect emails and documents using policies, identities, and encryption. See Chapter 4 for more information.

      1 34. B. Advanced Threat Protection (ATP) provides protection from many kinds of security threats, including pass‐the‐hash, pass‐the‐token, and others. See Chapter 4 for more information.

      1 35. B. A honeytoken attack is an attempt to authenticate to a fake account that you have created as a “honeypot” to attract attackers. See Chapter 4 for more information.

      1 36. C. You can use Azure Policies to enforce restrictions on VM resources. See Chapter 4 for more information.

      1 37. A. You can apply policies at the resource or resource group levels, and if at the resource group, the policies apply to all resources in the group. See Chapter 4 for more information.

      1 38. C. Locking a resource with the CanNotDelete lock prevents resources in the resource group from being deleted. The lock must be removed before a resource in the group can be deleted. See Chapter 4 for more information.

      1 39. D. Blueprints enable you to create large, repeatable deployments of resources in Azure with corresponding role and policy assignments. See Chapter 4 for more information.

      1 40. B. You do not need to configure Azure Monitor for it to begin monitoring a resource. Instead, Azure Monitor begins monitoring as soon as you create a resource. See Chapter 4 for more information.

      1 41. B. Azure Service Health enables you to view status information for resources that you host in Azure. See Chapter 4 for more information.

      1 42. C. Azure Service Health enables you to view information about planned maintenance in Azure. See Chapter 4 for more information.

      1 43. A. ISO and NIST are both standards‐based, nonregulatory agencies. General Data Protection Regulation (GDPR) defines data protection and privacy requirements as a regulation in European Union law. See Chapter 4 for more information.

      1 44. A, C. Microsoft can share your personal information with vendors and third parties without your consent, including in response to legal actions. You can use a work email when setting up a Microsoft account. See Chapter 4 for more information.

      1 45. A. IoT Hub provides bidirectional communication between IoT devices in Azure. See Chapter 5 for more information.

      1 46. B. IoT Central enables you to monitor and control IoT devices. See Chapter 5 for more information.

      1 47. C. Cognitive Services provides human‐like analysis services in Azure. See Chapter 5 for more information.

      1 48. C. Azure Bot Services provides human‐like interaction, including natural language question‐and‐answer capabilities. See Chapter 5 for more information.

      1 49. A. Azure Logic Apps enables you to create serverless workflow solutions in Azure. See Chapter 5 for more information.

      1 50. D. The statement is correct, so no change is needed. See Chapter 5 for more information.

      1 51. C. Although Azure DevOps provides features and functions similar to GitHub, GitHub is intended for open source projects. See Chapter 5 for more information.

      1 52. C. The first step before you create or use any resources in Azure is to create a subscription to host those resources. See Chapter 6 for more information.

      1 53. B. Although you can purchase Azure through an EA, a CSP, and the Azure portal, only option B is correct as stated. See Chapter 6 for more information.

      1 54. C. The TCO Calculator enables you to factor in facilities costs and other factors when estimating a move from on‐premises to Azure. See Chapter 6 for more information.

      1 55. A. The Pricing Calculator enables you to price individual Azure