Pyhton Practice Test
Pyhton Practice Test
Pyhton Practice Test
Question 1: Correct
Yes or No:
_____________ notifies you about Azure service incidents and planned maintenance so
you can take action to mitigate downtime.
Azure Percept
Azure Health Bot
Azure Service Health
Azure Chaos Studio
Explanation
From the Official Azure Documentation:
Azure Service Health notifies you about Azure service incidents and planned maintenance so
you can take action to mitigate downtime. Configure customisable cloud alerts and use your
personalised dashboard to analyse health issues, monitor the impact to your cloud resources,
get guidance and support, and share details and updates.
Reference: https://azure.microsoft.com/en-ca/features/service-health/#overview
Question 2: Correct
________________ is a cloud-based platform for creating and running
automated workflows that integrate your apps, data, services, and systems.
Azure Events Hub
Azure DevOps
Azure App Service
Explanation
Azure Logic Apps is a cloud service that helps you schedule, automate, and orchestrate
tasks, business processes, and workflows when you need to integrate apps, data, systems, and
services across enterprises or organizations.
Reference : https://docs.microsoft.com/en-us/azure/logic-apps/logic-apps-overview
Question 3: Correct
If your application experiences sudden high demand, what type of scaling would involve
adding more virtual machines or containers?
Vertical scaling
Downscaling
Horizontal scaling
Static scaling
Explanation
From the official docs:
Horizontal scaling
With horizontal scaling, if you suddenly experienced a steep jump in demand, your deployed
resources could be scaled out (either automatically or manually). For example, you could add
additional virtual machines or containers, scaling out. In the same manner, if there was a
significant drop in demand, deployed resources could be scaled in (either automatically or
manually), scaling in.
Vertical scaling
With vertical scaling, if you were developing an app and you needed more processing power,
you could vertically scale up to add more CPUs or RAM to the virtual machine. Conversely,
if you realized you had over-specified the needs, you could vertically scale down by lowering
the CPU or RAM specifications.
Reference: https://learn.microsoft.com/en-us/training/modules/describe-benefits-use-cloud-
services/2-high-availability-scalability-cloud
Question 4: Correct
Yes or No:
No
Yes
Explanation
The Q/A forums is a free service offered by Azure. There is no cost associated with it.
You can get answers to common questions, and even filter by product to limit the results!
Reference: https://azure.microsoft.com/en-ca/resources/knowledge-center/
Question 5: Correct
_______________ is a workflow-based risk assessment tool that helps you track, assign,
and verify your organization's regulatory compliance activities related to Microsoft
Cloud services.
The TCO portal
The Microsoft community Forums website
The Azure Arc Portal
Compliance Manager from the Service Trust Portal
Explanation
Compliance Manager in the Service Trust Portal is a workflow-based risk assessment tool
that helps you track, assign, and verify your organization's regulatory compliance activities
related to Microsoft Cloud services, such as Microsoft 365, Dynamics 365, and Azure.
References: https://servicetrust.microsoft.com/
Question 6: Correct
Yes or No:
ExpressRoute connections go over the public Internet, and they offer more reliability,
faster speeds, and lower latencies than typical Internet connections.
No
Yes
Explanation
No, it is false that ExpressRoute connections go over the public Internet. However, they do
offer more reliability, faster speeds, and lower latencies than typical Internet connections.
All incoming data into Azure using ExpressRoute is free of charge (as with any other
inbound data
transfer to Azure).
Reference: https://azure.microsoft.com/en-us/services/expressroute/#overview
Question 7: Incorrect
Which of the following are valid Azure purchasing options?
Azure website
Microsoft Partner
Microsoft representative
Github website
Explanation
You can choose the purchasing option that works best for your organisation. Or, use
any of the options simultaneously.
Reference : https://azure.microsoft.com/en-ca/pricing/purchase-options/
Question 8: Correct
What is the key difference between vertical scaling and horizontal scaling?
Vertical scaling adjusts the number of resources, while horizontal scaling adjusts
capabilities.
Vertical scaling only applies to virtual machines, while horizontal scaling applies
to containers.
Vertical scaling adds more processing power, while horizontal scaling increases
storage capacity.
Vertical scaling is automatic, while horizontal scaling requires manual
intervention.
Explanation
Vertical scaling involves adjusting the number of resources, such as CPUs or RAM.
Horizontal scaling, on the other hand, involves adding or subtracting resources to adjust
capabilities, such as adding more virtual machines.
Reference: https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/
lock-resources?tabs=json
Question 9: Correct
After taking a lot of courses and understanding cloud fundamentals, you've realized
that migrating your business resources to Azure makes the most sense. Based on your
understanding, which of the following would you need to create first?
A resource lock
A resource group
A virtual network
A subscription
Explanation
A subscription needs to be created first and foremost.
The Azure account is what lets you access Azure services and Azure subscriptions. It is
possible to create multiple subscriptions in our Azure account to create separation for billing
or management purposes. In your subscription(s) you can manage resources in resources
groups.
Reference: https://techcommunity.microsoft.com/t5/azure/understanding-azure-account-
subscription-and-directory/m-p/34800
Other options -
Reference: https://learn.microsoft.com/en-us/azure/architecture/framework/scalability/
design-scale
Azure App Service - This is incorrect as Azure App Service supports tagging. Tags
can be used to help organize and manage App Service resources.
Reference: https://learn.microsoft.com/en-us/azure/container-registry/container-registry-intro
Azure Storage always stores multiple copies of your data so that it's protected from planned
and unplanned events, including transient hardware failures, network or power outages, and
massive natural disasters. Redundancy ensures that your storage account meets its availability
and durability targets even in the face of failures.
Data in an Azure Storage account is always replicated three times in the primary region.
Azure Storage offers two options for how your data is replicated in the primary region:
Locally redundant storage (LRS) copies your data synchronously three times within
a single physical location in the primary region. LRS is the least expensive replication
option, but isn't recommended for applications requiring high availability or
durability.
Zone-redundant storage (ZRS) copies your data synchronously across three Azure
availability zones in the primary region. For applications requiring high availability,
Microsoft recommends using ZRS in the primary region, and also replicating to a
secondary region.
Reference: https://docs.microsoft.com/en-us/azure/storage/common/storage-account-
overview
Therefore, the "compute" layer in the defense-in-depth model concentrates on securing access
to virtual machines and ensuring they are properly protected. It involves implementing
security controls and measures within the virtual machine environment. This is the best
option out of the ones given.
Reference: https://learn.microsoft.com/en-us/training/modules/describe-azure-identity-
access-security/8-describe-defense-depth
As an administrator, you can lock a subscription, resource group, or resource to prevent other
users in your organization from accidentally deleting or modifying critical resources. The
lock overrides any permissions the user might have.
You can set the lock level to CanNotDelete or ReadOnly. In the portal, the locks are
called Delete and Read-only respectively:
1) CanNotDelete means authorized users can still read and modify a resource, but they can't
delete the resource.
2) ReadOnly means authorized users can read a resource, but they can't delete or update the
resource. Applying this lock is similar to restricting all authorized users to the permissions
granted by the Reader role.
Reference: https://docs.microsoft.com/en-us/azure/azure-resource-manager/management/
lock-resources
Azure Firewall Manager is not a tool for vulnerability management within the Azure Security
Center. Instead, Azure Firewall Manager is a centralized security management service that
provides a single pane of glass to manage multiple Azure Firewall instances and virtual
networks across different regions and subscriptions. It allows you to configure and deploy
Azure Firewall instances, create and apply security policies, and view security alerts and
reports.
Other options -
Azure Defender: This is a unified security management service that provides
advanced threat protection across your hybrid cloud workloads, including virtual
machines, containers, and Azure services. It includes a variety of security tools, such
as vulnerability assessment, security alerts, and security recommendations.
Azure Advisor: This is a service within the Azure Security Center that provides
personalized recommendations to optimize your Azure resources for performance,
high availability, security, and cost. It includes recommendations related to security
vulnerabilities, such as enabling Network Security Groups (NSGs) and applying
endpoint protection.
Azure Policy: This is a service that helps you enforce compliance with your
corporate standards and regulatory requirements by applying policies to your Azure
resources. It includes built-in policies to help identify and remediate security
vulnerabilities, such as requiring encryption for storage accounts and enforcing secure
communication protocols.
Reference: https://learn.microsoft.com/en-us/azure/firewall-manager/overview
One of their interns has suggested that deploying these VMs using a Scale Set would
solve the problem. Do you agree?
No
Yes
Explanation
This answer does not specify that the scale set will be configured across multiple data centers
so this solution does not meet the goal.
Azure virtual machine scale sets let you create and manage a group of load balanced VMs.
The number of VM instances can automatically increase or decrease in response to demand
or a defined schedule. Scale sets provide high availability to your applications, and allow you
to centrally manage, configure, and update many VMs.
Virtual machines in a scale set can be deployed across multiple update domains and fault
domains to maximize availability and resilience to outages due to data center outages, and
planned or unplanned maintenance events.
Reference: https://docs.microsoft.com/en-us/azure/virtual-machine-scale-sets/availability
A Network Security Group (NSG) is a basic form of firewall that can be used to filter
network traffic between subnets in an Azure virtual network. NSGs are used to define
inbound and outbound traffic rules that control the flow of traffic to and from resources in a
virtual network.
Other options -
Azure Firewall: It is a firewall service that can be used to filter network traffic, and is
typically used to protect virtual networks from external threats and to enforce network
security policies. However, Azure Firewall is not typically used to filter network traffic
between subnets in an Azure virtual network. This is because Network Security Group (NSG)
is the recommended method for filtering network traffic within a virtual network.
Azure Application Gateway: It provides application-level load balancing and routing, but is
not used to filter network traffic between subnets in an Azure virtual network. It is focused on
providing routing and load balancing for web traffic, rather than network traffic.
Azure Load Balancer: It can be used to distribute incoming traffic across multiple virtual
machines or instances within a Virtual Network, but is not used to filter network traffic
between subnets in an Azure virtual network. It provides a load balancing service, rather than
a filtering service.
Reference: https://learn.microsoft.com/en-us/azure/virtual-network/network-security-groups-
overview
Azure Active Directory Domain Services (Azure AD DS) provides managed domain
services such as domain join, group policy, lightweight directory access protocol (LDAP),
and Kerberos/NTLM authentication. You use these domain services without the need to
deploy, manage, and patch domain controllers (DCs) in the cloud.
An Azure AD DS managed domain lets you run legacy applications in the cloud that can't
use modern authentication methods, or where you don't want directory lookups to always go
back to an on-premises AD DS environment. You can lift and shift those legacy applications
from your on-premises environment into a managed domain, without needing to manage the
AD DS environment in the cloud.
Azure AD DS integrates with your existing Azure AD tenant. This integration lets users sign
in to services and applications connected to the managed domain using their existing
credentials. You can also use existing groups and user accounts to secure access to resources.
These features provide a smoother lift-and-shift of on-premises resources to Azure.
Reference: https://docs.microsoft.com/en-us/azure/active-directory-domain-services/
overview
No
Yes
Explanation
Tricky question! PowerAutomate is not the same as PowerShell.
PowerAutomate moreover isn't a part of Azure! It falls under the Microsoft umbrella of
offerings, just like PowerApps.
Hence, this statement is definitely False. You can use the Azure portal to provision Virtual
Machines, or even the CLI.
Reference: https://docs.microsoft.com/en-us/azure/virtual-machines/windows/quick-create-
portal
Having a hybrid cloud solution in place could be useful when regulations or policies do
not permit moving specific data or workloads to the cloud.
No
Yes
Explanation
From the official Azure documentation:
When organizations move workloads and data to the cloud, their on-premises datacenters
often continue to play an important role. The term hybrid cloud refers to a combination of
public cloud and on-premises datacenters, to create an integrated IT environment that spans
both. Some organizations use hybrid cloud as a path to migrate their entire datacenter to the
cloud over time. Other organizations use cloud services to extend their existing on-premises
infrastructure.
Azure Powershell - Available to install on MacOS, Windows, Linux, Docker, and Arm
(Subset of Azure Cloudshell)
Reference : https://docs.microsoft.com/en-us/powershell/scripting/install/installing-
powershell-core-on-macos?view=powershell-7
https://docs.microsoft.com/en-us/azure/cloud-shell/overview
https://docs.microsoft.com/en-us/cli/azure/install-azure-cli-macos
Data in an Azure Storage account is always replicated three times in the primary region.
Azure Storage offers two options for how your data is replicated in the primary region:
Locally redundant storage (LRS) copies your data synchronously three times within
a single physical location in the primary region. LRS is the least expensive replication
option, but isn't recommended for applications requiring high availability or
durability.
Zone-redundant storage (ZRS) copies your data synchronously across three Azure
availability zones in the primary region. For applications requiring high availability,
Microsoft recommends using ZRS in the primary region, and also replicating to a
secondary region.
Reference: https://docs.microsoft.com/en-us/azure/storage/common/storage-
redundancy#geo-redundant-storage
Other options:
Reference: https://learn.microsoft.com/en-us/training/modules/describe-features-tools-azure-
for-governance-compliance/2-describe-purpose-of-azure-blueprints
Reference: https://learn.microsoft.com/en-us/training/modules/describe-azure-identity-
access-security/9-describe-microsoft-defender-for-cloud
The Azure Monitor activity log is a platform log in Azure that provides insight into
subscription-level events. The activity log includes information like when a resource is
modified or a virtual machine is started. You can view the activity log in the Azure portal or
retrieve entries with PowerShell and the Azure CLI. This article provides information on how
to view the activity log and send it to different destinations.
Reference: https://docs.microsoft.com/en-us/azure/azure-monitor/essentials/activity-log
Virtual network peering enables you to seamlessly connect two or more Virtual Networks in
Azure. The virtual networks appear as one for connectivity purposes. The traffic between
virtual machines in peered virtual networks uses the Microsoft backbone infrastructure. Like
traffic between virtual machines in the same network, traffic is routed through
Microsoft's private network only.
Reference: https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-peering-
overview
As you consider and evaluate public cloud services, it’s critical to understand the shared
responsibility model and which security tasks are handled by the cloud provider and which
tasks are handled by you. The workload responsibilities vary depending on whether the
workload is hosted on Software as a Service (SaaS), Platform as a Service (PaaS),
Infrastructure as a Service (IaaS), or in an on-premises datacenter.
Division of responsibility
In an on-premises datacenter, you own the whole stack. As you move to the cloud some
responsibilities transfer to Microsoft. The following diagram illustrates the areas of
responsibility between you and Microsoft, according to the type of deployment of your stack.
For all cloud deployment types, you own your data and identities. You are responsible
for protecting the security of your data and identities, on-premises resources, and the
cloud components you control (which varies by service type).
Regardless of the type of deployment, the following responsibilities are always retained by
you:
Data
Endpoints
Account
Access management
Reference: https://docs.microsoft.com/en-us/azure/security/fundamentals/shared-
responsibility
Yes
No
Explanation
From the Official Azure Documentation:
Azure Service Health notifies you about Azure service incidents and planned maintenance
so you can take action to mitigate downtime. Configure customisable cloud alerts and use
your personalised dashboard to analyse health issues, monitor the impact to your cloud
resources, get guidance and support, and share details and updates.
Reference: https://docs.microsoft.com/en-us/learn/modules/intro-to-governance/7-
monitoring
No
Yes
Explanation
From the Official Azure Documentation:
Azure DNS is a hosting service for DNS domains that provides name resolution by using
Microsoft Azure infrastructure. By hosting your domains in Azure, you can manage your
DNS records by using the same credentials, APIs, tools, and billing as your other Azure
services.
You can't use Azure DNS to buy a domain name. For an annual fee, you can buy a domain
name by using App Service domains or a third-party domain name registrar. Your domains
then can be hosted in Azure DNS for record management. For more information,
see Delegate a domain to Azure DNS.
Reference: https://azure.microsoft.com/en-ca/services/advisor/#features
Azure Dedicated Host is an Azure service that offers a dedicated physical server to host
your virtual machines. With Azure Dedicated Host, you can control the underlying host
infrastructure and manage host maintenance operations such as updates and reboots. You can
also select the number of cores, amount of memory, and types of storage devices that best suit
your workloads.
Other options -
Azure Bare Metal: This is a term that generally refers to a physical server or
machine without a hypervisor layer. While Azure provides access to virtual machines
with a range of hardware specifications, Azure Bare Metal is not a specific service
that provides dedicated physical servers.
Reference: https://learn.microsoft.com/en-us/azure/virtual-machines/dedicated-hosts
SQL Databases!
SQL Database elastic pools are a simple, cost-effective solution for managing and scaling
multiple databases that have varying and unpredictable usage demands. The databases in an
elastic pool are on a single Azure SQL Database server and share a set number of resources at
a set price. Elastic pools in Azure SQL Database enable SaaS developers to optimize the
price performance for a group of databases within a prescribed budget while delivering
performance elasticity for each database.
Reference : https://docs.microsoft.com/en-us/azure/sql-database/sql-database-elastic-pool
Azure Service Health allows us to define the critical resources that should never be
impacted due to outages and downtimes.
Yes
No
Explanation
From the Official Azure Documentation:
Azure Service Health notifies you about Azure service incidents and planned maintenance so
you can take action to mitigate downtime. Configure customisable cloud alerts and use your
personalised dashboard to analyse health issues, monitor the impact to your cloud resources,
get guidance and support, and share details and updates.
Although you can see when a maintenance is planned and act accordingly to migrate a VM if
needed, you can't prevent service failures.
Reference: https://azure.microsoft.com/en-ca/features/service-health/#features
Event Hubs is a fully managed, real-time data ingestion service that’s simple, trusted and
scalable. Stream millions of events per second from any source to build dynamic data
pipelines and immediately respond to business challenges. Keep processing data during
emergencies using the geo-disaster recovery and geo-replication features.
Integrate seamlessly with other Azure services to unlock valuable insights. Allow existing
Apache Kafka clients and applications to talk to Event Hubs without any code changes – you
get a managed Kafka experience without having to manage your own clusters. Experience
real-time data ingestion and microbatching on the same stream.
Reference : https://azure.microsoft.com/en-ca/services/event-hubs/
The defence in depth model is all about multiple layers - so always choose the option that
best matches this.
A dedicated intrusion detection system (IDS) is an example of a security layer in the defense-
in-depth model. It monitors network traffic for suspicious activity and helps detect and
respond to potential breaches.
Reference: https://azure.microsoft.com/en-us/blog/microsoft-azures-defense-in-depth-
approach-to-cloud-vulnerabilities/
You can set locks that prevent either deletions or modifications. In the portal, these locks are
called Delete and Read-only. In the command line, these locks are
called CanNotDelete and ReadOnly.
CanNotDelete means authorized users can read and modify a resource, but they can't
delete it.
ReadOnly means authorized users can read a resource, but they can't delete or update
it. Applying this lock is similar to restricting all authorized users to the permissions
that the Reader role provides.
Based on these definitions, we can still READ but not modify/delete the resources. This
allows you to view resource configurations without accidentally altering them.
Reference: https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/
lock-resources
Regional Pairs are 2 connected Azure Regions for Disaster Recovery within the same
Geography.
Many organizations require both high availability provided by availability zones that are also
supported with protection from large-scale phenomena and regional disasters. As discussed in
the resiliency overview for regions and availability zones, Azure regions are designed to offer
protection against local disasters with availability zones. But they can also provide protection
from regional or large geography disasters with disaster recovery by making use of another
region that uses cross-region replication.
To ensure customers are supported across the world, Azure maintains multiple geographies.
These discrete demarcations define a disaster recovery and data residency boundary across
one or multiple Azure regions.
Cross-region replication is one of several important pillars in the Azure business continuity
and disaster recovery strategy. Cross-region replication builds on the synchronous replication
of your applications and data that exists by using availability zones within your primary
Azure region for high availability. Cross-region replication asynchronously replicates the
same applications and data across other Azure regions for disaster recovery protection.
Example -
Reference: https://docs.microsoft.com/en-us/azure/availability-zones/cross-region-
replication-azure
The Azure CLI is functionally equivalent to Azure PowerShell, with the primary difference
being the syntax of commands. While Azure PowerShell uses PowerShell commands, the
Azure CLI uses Bash commands.
The Azure CLI provides the same benefits of handling discrete tasks or orchestrating
complex operations through code. It’s also installable on Windows, Linux, and Mac
platforms, as well as through Azure Cloud Shell.
Due to the similarities in capabilities and access between Azure PowerShell and the Bash
based Azure CLI, it mainly comes down to which language you’re most familiar with.
Reference: https://learn.microsoft.com/en-us/training/modules/describe-features-tools-
manage-deploy-azure-resources/2-describe-interacting-azure
Other options -
The budget is automatically increased.by 10%: This is incorrect because reaching the
budget alert level does not cause the budget to automatically increase. The purpose of the
alert is to notify you when the spending reaches a certain threshold.
The resource usage is suspended: This is incorrect because a budget alert by itself does not
suspend resource usage. It simply provides a notification that the alert threshold has been
reached. However, you can configure advanced automation to suspend or modify resources
based on budget conditions, but this is not the default behavior.
An invoice is sent to the account owner: This is incorrect because reaching the budget alert
level does not trigger an invoice to be sent to the account owner. The budget alert is intended
to inform you about the spending level, not to generate an invoice.
Reference: https://learn.microsoft.com/en-us/training/modules/describe-cost-management-
azure/6-describe-azure-tool
Cloud services and on-premises infrastructure have different security models, with unique
strengths and weaknesses. While cloud services provide greater control over some aspects of
data security, such as network security and access control, they also require a greater degree
of trust in the cloud provider to maintain physical security of the data centers where the data
is stored. In contrast, on-premises infrastructure provides greater control over physical
security, as the organization has direct control over the physical security measures and can
ensure that the data is physically secure.
This is why you'll see a lot of large organizations aren't comfortable storing sensitive data on
the cloud.
A Resource can only access other resources in the same resource group.
No
Yes
Explanation
From the official Azure documentation:
A resource can connect to resources in other resource groups. This scenario is common when
the two resources are related but don't share the same lifecycle. For example, you can have a
web app that connects to a database in a different resource group.
Reference : https://docs.microsoft.com/en-us/azure/azure-resource-manager/management/
overview#resource-groups
With cloud elasticity, a company avoids paying for unused capacity or idle resources and
doesn’t have to worry about investing in the purchase or maintenance of additional resources
and equipment.
References : https://azure.microsoft.com/en-us/overview/what-is-elastic-computing/
Reference : https://docs.azure.cn/en-us/articles/azure-china-purchasing-guidance/
External Identities is a set of capabilities that enables organizations to secure and manage any
external user, including customers and partners. Building on B2B collaboration, External
Identities gives you more ways to interact and connect with users outside your organization.
Reference: https://docs.microsoft.com/en-us/azure/active-directory/external-identities/
Credit alerts: Correct. Credit alerts notify you when your Azure credit monetary
commitments are consumed. Monetary commitments are for organizations with
Enterprise Agreements (EAs).
Other options -
Resource usage alerts: Incorrect. Resource usage alerts are not part of the Cost
Management service. Cost Management focuses on costs, budgets, and spending
alerts.
Reference: https://learn.microsoft.com/en-us/training/modules/describe-cost-management-
azure/6-describe-azure-tool
Other options -
Cost analysis: Incorrect because cost analysis is used to explore and analyze your
organizational costs in different ways, such as by billing cycle, region, or resource. It helps
you understand spending trends but does not provide notifications for reaching a certain
threshold.
Cost alerts: Incorrect because cost alerts are the notifications you receive when a certain
threshold is reached, but they are not the feature you use to set up the alert in the first place.
You need to set a budget and configure a budget alert to receive cost alerts.
Department spending quota alerts: Incorrect because department spending quota alerts are
specific to organizations with Enterprise Agreements (EAs) and are used to notify when
department spending reaches a fixed threshold of the quota. This alert type is not related to
general Azure spending thresholds.
Reference: https://learn.microsoft.com/en-us/training/modules/describe-cost-management-
azure/6-describe-azure-tool
Many people get confused between Azure HDInsight and Azure Databricks -
1) Azure HDInsight brings both Hadoop and Spark under the same umbrella and enables
enterprises to manage both using the same set of tools e.g. using Ambari, Apache Ranger etc.
It also offers industry standard notebook experience with support for both Jupyter and
Zeppelin notebooks. Enterprises that want this ease of manageability across all their big data
workloads can choose to use HDInsight.
2) Azure Databricks is a premium Spark offering that is ideal for customers who want their
data scientists to collaborate easily and run their Spark based workloads efficiently and at
industry leading performance.
Azure Databricks is an Apache Spark-based analytics platform optimized for the Microsoft
Azure cloud services platform. For more details, refer to Azure Databricks Documentation.
Reference: https://azure.microsoft.com/en-ca/services/hdinsight/#faq
https://docs.microsoft.com/en-us/answers/questions/26097/can-anyone-please-post-the-
differences-between-azu.html
VPNs use an encrypted tunnel within another network. They're typically deployed to connect
two or more trusted private networks to one another over an untrusted network (typically the
public internet). Traffic is encrypted while traveling over the untrusted network to prevent
eavesdropping or other attacks.
VPNs can enable branch offices to share sensitive information between locations. For
example, let's say that your offices on the East coast region of North America need to access
your company's private customer data, which is stored on servers that are physically located
in a West coast region. A VPN can connect your East coast offices to your West coast servers
allowing your company to securely access your private customer data.
Reference: https://docs.microsoft.com/en-ca/learn/modules/azure-networking-
fundamentals/azure-vpn-gateway-fundamentals
Azure Site Recovery is a disaster recovery solution that provides continuous replication of
virtual machines and physical servers to a secondary site, allowing for rapid recovery in case
of a disaster. It supports a wide range of scenarios, including replication from VMware,
Hyper-V, and physical servers to Azure, as well as replication between Azure regions or
datacenters.
Reference: https://learn.microsoft.com/en-us/azure/site-recovery/site-recovery-overview
When you need to assign more than the maximum number of allowed tags to an Azure
resource, you can use JSON strings to include multiple values for a single tag name. This
approach allows you to apply more tag values than the limit allows while maintaining
compliance with Azure's tag limit. The JSON string should be added as the tag value, and it
should contain a comma-separated list of values that you want to apply to the tag.
Reference: https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/
tag-resources?tabs=json#limitations
1) Secrets Management - Azure Key Vault can be used to Securely store and tightly control
access to tokens, passwords, certificates, API keys, and other secrets
2) Key Management - Azure Key Vault can also be used as a Key Management solution.
Azure Key Vault makes it easy to create and control the encryption keys used to encrypt your
data.
3) Certificate Management - Azure Key Vault is also a service that lets you easily
provision, manage, and deploy public and private Transport Layer Security/Secure Sockets
Layer (TLS/SSL) certificates for use with Azure and your internal connected resources.
Azure Key Vault has two service tiers: Standard, which encrypts with a software key, and a
Premium tier, which includes hardware security module(HSM)-protected keys
Reference: https://docs.microsoft.com/en-us/azure/key-vault/key-vault-overview
Azure strives to ensure a minimum distance of 300 miles (483 kilometers) between
datacenters in enabled regions, although it isn't possible across all geographies. Datacenter
separation reduces the likelihood that natural disaster, civil unrest, power outages, or physical
network outages can affect multiple regions. Isolation is subject to the constraints within a
geography, such as geography size, power or network infrastructure availability, and
regulations.
Reference : https://docs.microsoft.com/en-us/azure/best-practices-availability-paired-regions
1) Monitoring of traffic patterns 24 hours a day, 7 days a week, looking for indicators of
attacks.
2) Detailed reports in five-minute increments during an attack, and a complete summary after
the attack ends.
3) Engagement of a dedicated team for help with attack investigation and analysis.
Azure DDoS Protection enables you to protect your Azure resources from denial of service
(DoS) attacks with always-on monitoring and automatic network attack mitigation. There is
no upfront commitment, and your total cost scales with your cloud deployment.
Reference: https://azure.microsoft.com/en-ca/pricing/details/ddos-protection/
A blob is a binary, large object and a storage option for any type of data that you want to
store in a binary format. Learn about blob types.
Azure Blob storage is Microsoft's object storage solution for the cloud. Blob storage is
optimized for storing massive amounts of unstructured data. Unstructured data is data that
doesn't adhere to a particular data model or definition, such as text or binary data.
5) Storing data for backup and restore, disaster recovery, and archiving.
Reference : https://azure.microsoft.com/en-us/services/storage/blobs/#security
Role assignments
Policy assignments
Azure Resource Manager templates
Resource groups
Reference: https://learn.microsoft.com/en-us/training/modules/describe-features-tools-azure-
for-governance-compliance/2-describe-purpose-of-azure-blueprints
What should the company use to build, test, and deploy predictive analytics solutions?
Azure Machine Learning Studio is an enterprise-grade service for the end-to-end machine
learning lifecycle.
It empower data scientists and developers to build, deploy, and manage high-quality models
faster and with confidence. It accelerates time to value with industry-leading machine
learning operations (MLOps), open-source interoperability, and integrated tools. Innovate on
a secure, trusted platform designed for responsible AI applications in machine learning.
Reference : https://azure.microsoft.com/en-ca/services/machine-learning/#product-overview
An Azure Firewall has the ability to encrypt data at rest as well as in transit.
No
Yes
Explanation
A Firewall is used to mainly filter the traffic.
Azure Firewall is a managed, cloud-based network security service that protects your Azure
Virtual Network resources. It's a fully stateful firewall as a service with built-in high
availability and unrestricted cloud scalability.
You can centrally create, enforce, and log application and network connectivity policies
across subscriptions and virtual networks. Azure Firewall uses a static public IP address for
your virtual network resources allowing outside firewalls to identify traffic originating from
your virtual network. The service is fully integrated with Azure Monitor for logging and
analytics.
Reference: https://docs.microsoft.com/en-us/azure/security/azure-security-data-encryption-
best-practices#protect-data-in-transit
https://docs.microsoft.com/en-us/azure/firewall/overview
Other options -
Reference: https://learn.microsoft.com/en-us/azure/architecture/multitenant-identity/
You can link virtual networks together by using virtual network peering. Peering enables
resources in each virtual network to communicate with each other. These virtual networks
can be in separate regions, which allows you to create a global interconnected network
through Azure.
User-defined routes (UDR) are a significant update to Azure’s Virtual Networks that allows
for greater control over network traffic flow. This method allows network administrators to
control the routing tables between subnets within a VNet, as well as between VNets.
Reference: https://docs.microsoft.com/en-ca/learn/modules/azure-networking-
fundamentals/azure-virtual-network-fundamentals
(Incorrect)
(Correct)
Azure FileSync
Explanation
From the Official Azure Documentation:
Azure Storage Explorer is a free tool to conveniently manage your Azure cloud storage
resources from your desktop.
Reference : https://azure.microsoft.com/en-ca/features/storage-explorer/#overview
Azure Arc is a bridge that extends the Azure platform to help you build applications and
services with the flexibility to run across datacenters, at the edge, and in multicloud
environments. Develop cloud-native applications with a consistent development, operations,
and security model. Azure Arc runs on both new and existing hardware, virtualization and
Kubernetes platforms, IoT devices, and integrated systems.
Today, companies struggle to control and govern increasingly complex environments that
extend across data centers, multiple clouds, and edge. Each environment and cloud possesses
its own set of management tools, and new DevOps and ITOps operational models can be hard
to implement across resources.
Azure Arc simplifies governance and management by delivering a consistent multi-cloud and
on-premises management platform.
Reference: https://docs.microsoft.com/en-us/azure/azure-arc/overview
Cognitive Services brings AI within reach of every developer and data scientist. With
leading models, a variety of use cases can be unlocked. All it takes is an API call to embed
the ability to see, hear, speak, search, understand, and accelerate advanced decision-making
into your apps. Enable developers and data scientists of all skill levels to easily add AI
capabilities to their apps.
Reference : https://azure.microsoft.com/en-us/services/cognitive-services/
Azure DNS is a hosting service for DNS domains that provides name resolution by using
Microsoft Azure infrastructure. By hosting your domains in Azure, you can manage your
DNS records by using the same credentials, APIs, tools, and billing as your other Azure
services.
You can't use Azure DNS to buy a domain name. For an annual fee, you can buy a domain
name by using App Service domains or a third-party domain name registrar. Your domains
then can be hosted in Azure DNS for record management. For more information,
see Delegate a domain to Azure DNS.
Reference: https://docs.microsoft.com/en-us/azure/dns/dns-overview
Security: Classification of data and security impact is a vital data point for the team,
when breaches or other security issues arise. To operate securely, tagging for data
classification is required.
Workload optimization: Tagging can help identify patterns and resolve broad issues.
Tag can also help identify the assets required to support a single workload. Tagging
all assets associated with each workload enables deeper analysis of your mission-
critical workloads to make sound architectural decisions.
To learn even more about this : https://docs.microsoft.com/en-us/azure/cloud-adoption-
framework/decision-guides/resource-tagging/?toc=%2Fazure%2Fazure-resource-manager
%2Fmanagement%2Ftoc.json
Azure Advisor provides a cloud score to assess how well-architected your workloads are
AND can also provide 'Step-by-Step' guidance and quick actions for fast remediation.
No
Yes
Explanation
From the Official Azure Documentation:
Azure Advisor helps in quick and easy optimization of your Azure deployments. Azure
Advisor analyses your configurations and usage telemetry and offers personalised, actionable
recommendations to help you optimise your Azure resources for reliability, security,
operational excellence, performance and cost.
Reference: https://azure.microsoft.com/en-ca/services/advisor/#security
Azure RBAC is an authorization system built on Azure Resource Manager that provides fine-
grained access management to Azure resources.
Here are some examples of what you can do with Azure RBAC:
Allow one user to manage virtual machines in a subscription and another user to
manage virtual networks
Allow a DBA group to manage SQL databases in a subscription
Allow a user to manage all resources in a resource group, such as virtual machines,
websites, and subnets
Allow an application to access all resources in a resource group
Reference: https://docs.microsoft.com/en-us/azure/role-based-access-control/overview
Azure allows users to assign name-value pairs, called tags, to each resource, resource group,
and subscription. The maximum number of tag name-value pairs that can be assigned to each
of these entities is 50. If you need to apply more tags than the allowed number, you can use a
JSON string to include multiple values for a single tag name. Each resource group or
subscription can contain numerous resources, each with their own set of 50 tag name-value
pairs.
Reference: https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/
tag-resources
Upon applying a Tag to a Resource Group, all Resources inside it inherit that Tag.
Yes
No
Explanation
Important question!
Tags applied to the resource group or subscription aren't inherited by the resources. To apply
tags from a subscription or resource group to the resources, see Azure Policies - tags.
Reference : https://docs.microsoft.com/en-us/azure/azure-resource-manager/management/
tag-resources
Each organization has different needs when it comes to authentication. Microsoft global
Azure and Azure Government offer the following three passwordless authentication options
that integrate with Azure Active Directory (Azure AD):
ou can also allow your employee's phone to become a passwordless authentication method.
You may already be using the Authenticator app as a convenient multi-factor authentication
option in addition to a password. You can also use the Authenticator App as a passwordless
option.
Reference: https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-
authentication-passwordless
No
Yes
Explanation
Azure Virtual Machines and Azure Virtual Networks both fall under the IaaS category, and
therefore this solution would meet the lead architect's ask.
Azure provides native support for IaC via the Azure Resource Manager model. Teams can
define declarative ARM templates that specify the infrastructure required to deploy solutions.
Third-party platforms like Terraform, Ansible, Chef, and Pulumi also support IaC to manage
automated infrastructure.
Reference: https://learn.microsoft.com/en-us/devops/deliver/what-is-infrastructure-as-code
Azure File Sync enables centralizing your organization's file shares in Azure Files, while
keeping the flexibility, performance, and compatibility of a Windows file server. While some
users may opt to keep a full copy of their data locally, Azure File Sync additionally has the
ability to transform Windows Server into a quick cache of your Azure file share. You can use
any protocol that's available on Windows Server to access your data locally, including SMB,
NFS, and FTPS. You can have as many caches as you need across the world.
Reference: https://docs.microsoft.com/en-us/azure/storage/file-sync/file-sync-introduction
Azure virtual networks enable you to link resources together in your on-premises
environment and within your Azure subscription. In effect, you can create a network that
spans both your local and cloud environments. There are three mechanisms for you to
achieve this connectivity:
Site-to-site virtual private networks A site-to-site VPN links your on-premises VPN
device or gateway to the Azure VPN gateway in a virtual network. In effect, the
devices in Azure can appear as being on the local network. The connection is
encrypted and works over the internet.
Azure ExpressRoute For environments where you need greater bandwidth and even
higher levels of security, Azure ExpressRoute is the best approach. ExpressRoute
provides a dedicated private connectivity to Azure that doesn't travel over the internet.
Reference: https://docs.microsoft.com/en-ca/learn/modules/azure-networking-
fundamentals/azure-virtual-network-fundamentals
Reference : https://docs.microsoft.com/en-us/azure/availability-zones/az-overview
Reference: https://azure.microsoft.com/en-us/services/databox/
Reference: https://learn.microsoft.com/en-us/training/modules/describe-azure-identity-
access-security/9-describe-microsoft-defender-for-cloud
You can set locks that prevent either deletions or modifications. In the portal, these locks are
called Delete and Read-only. In the command line, these locks are
called CanNotDelete and ReadOnly.
CanNotDelete means authorized users can read and modify a resource, but they can't
delete it.
ReadOnly means authorized users can read a resource, but they can't delete or update
it. Applying this lock is similar to restricting all authorized users to the permissions
that the Reader role provides.
Unlike role-based access control (RBAC), you use management locks to apply a restriction
across all users and roles. To learn about setting permissions for users and roles, see Azure
RBAC.
Therefore, Resource locks in Azure are used to prevent accidental deletion or modification
of important resources. They help maintain the integrity of critical resources by preventing
unwanted changes.
Reference: https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/
lock-resources
A Network Security Group (NSG) has the ability to encrypt data at rest and in transit.
No
Yes
Explanation
No, a Network Security Group (NSG) DOES NOT encrypt traffic.
From the Official Azure Documentation:
You can use an Azure network security group to filter network traffic to and from
Azure resources in an Azure virtual network. A network security group contains security
rules that allow or deny inbound network traffic to, or outbound network traffic from, several
types of Azure resources. For each rule, you can specify source and destination, port, and
protocol.
Reference: https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-
overview
To help protect data in the cloud, you need to account for the possible states in which your
data can occur, and what controls are available for that state. Best practices for Azure data
security and encryption relate to the following data states:
1) At rest: This includes all information storage objects, containers, and types that exist
statically on physical media, whether magnetic or optical disk.
AzCopy is a command-line utility that you can use to copy blobs or files to or from a storage
account.
Example of a command -
Reference: https://docs.microsoft.com/en-us/azure/storage/common/storage-use-azcopy-v10