Microsoft Certified Azure Fundamentals Study Guide. James Boyce. Читать онлайн. Newlib. NEWLIB.NET

Автор: James Boyce
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Зарубежная компьютерная литература
Год издания: 0
isbn: 9781119771159
Скачать книгу
4 for more information.

      1 24. B. Azure ExpressRoute Direct provides similar capabilities as Azure ExpressRoute but is not routed across the Internet. See Chapter 4 for more information.

      1 25. C. Azure Content Delivery Network (CDN) enables you to place replicas of content geographically near the users who need to consume the content. See Chapter 4 for more information.

      1 26. A. An Azure NSG enables you to restrict access to the VM based on port, and RBAC enables you to restrict access to specific individuals. See Chapter 4 for more information.

      1 27. B. To implement custom routing, create a user‐defined route and apply it to all relevant virtual networks. See Chapter 4 for more information.

      1 28. D. No change is needed, since DDoS Standard provides alerting to ongoing distributed denial‐of‐service (DDoS) attacks. It also provides alerting and mitigation reporting. See Chapter 4 for more information.

      1 29. D. In this example, the first three options are examples of authentication (identifying the holder), but do not authorize the user. The visa provides that authorization for entering the country. See Chapter 4 for more information.

      1 30. B. Adding the capability to synchronize password changes to on‐premises AD requires Azure AD Premium. See Chapter 4 for more information.

      1 31. C. Security Center provides recommendations on improving security, as well as monitoring and alerts. See Chapter 4 for more information.

      1 32. D. Azure Key Vault is the appropriate place to store secrets such as security credentials in Azure. See Chapter 4 for more information.

      1 33. D. Azure Information Protection (AIP) provides the capability to protect emails and documents using policies, identities, and encryption. See Chapter 4 for more information.

      1 34. B. Advanced Threat Protection (ATP) provides protection from many kinds of security threats, including pass‐the‐hash, pass‐the‐token, and others. See Chapter 4 for more information.

      1 35. B. A honeytoken attack is an attempt to authenticate to a fake account that you have created as a “honeypot” to attract attackers. See Chapter 4 for more information.

      1 36. C. You can use Azure Policies to enforce restrictions on VM resources. See Chapter 4 for more information.

      1 37. A. You can apply policies at the resource or resource group levels, and if at the resource group, the policies apply to all resources in the group. See Chapter 4 for more information.

      1 38. C. Locking a resource with the CanNotDelete lock prevents resources in the resource group from being deleted. The lock must be removed before a resource in the group can be deleted. See Chapter 4 for more information.

      1 39. D. Blueprints enable you to create large, repeatable deployments of resources in Azure with corresponding role and policy assignments. See Chapter 4 for more information.

      1 40. B. You do not need to configure Azure Monitor for it to begin monitoring a resource. Instead, Azure Monitor begins monitoring as soon as you create a resource. See Chapter 4 for more information.

      1 41. B. Azure Service Health enables you to view status information for resources that you host in Azure. See Chapter 4 for more information.

      1 42. C. Azure Service Health enables you to view information about planned maintenance in Azure. See Chapter 4 for more information.

      1 43. A. ISO and NIST are both standards‐based, nonregulatory agencies. General Data Protection Regulation (GDPR) defines data protection and privacy requirements as a regulation in European Union law. See Chapter 4 for more information.

      1 44. A, C. Microsoft can share your personal information with vendors and third parties without your consent, including in response to legal actions. You can use a work email when setting up a Microsoft account. See Chapter 4 for more information.

      1 45. A. IoT Hub provides bidirectional communication between IoT devices in Azure. See Chapter 5 for more information.

      1 46. B. IoT Central enables you to monitor and control IoT devices. See Chapter 5 for more information.

      1 47. C. Cognitive Services provides human‐like analysis services in Azure. See Chapter 5 for more information.

      1 48. C. Azure Bot Services provides human‐like interaction, including natural language question‐and‐answer capabilities. See Chapter 5 for more information.

      1 49. A. Azure Logic Apps enables you to create serverless workflow solutions in Azure. See Chapter 5 for more information.

      1 50. D. The statement is correct, so no change is needed. See Chapter 5 for more information.

      1 51. C. Although Azure DevOps provides features and functions similar to GitHub, GitHub is intended for open source projects. See Chapter 5 for more information.

      1 52. C. The first step before you create or use any resources in Azure is to create a subscription to host those resources. See Chapter 6 for more information.

      1 53. B. Although you can purchase Azure through an EA, a CSP, and the Azure portal, only option B is correct as stated. See Chapter 6 for more information.

      1 54. C. The TCO Calculator enables you to factor in facilities costs and other factors when estimating a move from on‐premises to Azure. See Chapter 6 for more information.

      1 55. A. The Pricing Calculator enables you to price individual Azure