Azure Resource Manager Correct Answer Is a deployment and management service for Azure Provides consistent management layer that enables you to create, update, and delete resources in your Azure subscription. Azure Security Center Correct Answer is designed to help protect Azure cloud, nonazure cloud, and hybrid computing resources through a set of security tools. This is supposed to strengthen a company's security posture, protect against threats, and quickly secure your computing environment. Azure Advisor Correct Answer analyzes your resource configuration to help you optimize your Azure deployments. It provides best practices recommendations regarding performance, security, and availability Lock Correct Answer prevents new resources from being added to a resource group by anyone. Azure Initiative Correct Answer a collection of Azure Policies targeted towards reaching a single overall goal. This simplifies managing and assigning policy definitions by grouping a set of policies as a single item Policy Correct Answer Is a JSON template that is assigned to a scope such as a resource group. The JSON file defines rules to take for certain resources RBAC (Role Based Access Control) Correct Answer allows permissions that apply to users and groups 12 months Correct Answer The amount of time Microsoft gives notice before retiring the Guest OS Azure Monitor Correct Answer collects resource on applications, Guest OS, resource operations, tenant level services and information about health and operation of Azure. Azure Service Health Correct Answer provides information about planned maintenance, service outage, and resource usage quota. (EX: you can set up to receive an email when a VM exceeds its quota) Horizontal Auto-Scale Correct Answer You can configure rules that monitor metrics such as requesting memory usage in CPU percentage to determine when Azure should automatically add or remove VM instances. Advantages of Public Cloud Correct Answer Lower Costs Can spread among multiple tenants Higher level of reliability because it is based on a larger network of servers. Advantages of Private Cloud Correct Answer Secure based on private network including storage resources limiting access to subscribing tenant Higher level of customization because of tenants exclusive access Alerts Correct Answer allows an administrator to configure actions when specific conditions are met. (EX: can send an email to the administrator when the CPU on a VM exceeds a certain threshold.) Metrics Correct Answer A numerical value that describes some aspect of the system (ex: CPU time) Application Insights Correct Answer An application performance management tool that detects performance in REAL TIME. This allows cloud and on-premises applications to send telemetry data to Azure. The Standard Plan Correct Answer Least expensive plan Provides 24/7 technical phone support The Developer Plan Correct Answer is for non-production environments Provides business hour access to support engineers via email only The Professional Direct Plan Correct Answer provides 24/7 technical support via email and phone but is more expensive and is geared towards business critical workload The Premier Plan Correct Answer provides 24/7 technical support via email and phone. This is not the most expensive plan, it is geared toward multiple product dependence. GDPR (General Data Protection Regulation) Correct Answer regulation enforced by a government agency. This is controlled by the EU. Germany Correct Answer uses a deditcated trustee for customer data. Microsoft created a separate instance of Azure to meet this requirement. This allows a local company to have control of customer data unless the customer grants others access to the data. ISO (International Standards Organization) Correct Answer International Standards Organization NIST (National Institute of Standards and Technology) Correct Answer National Institute of Standards and Technology Azure AD Correct Answer is Microsoft's cloud-based identity and access management service, which helps employees sign in and access resources in both external and internal resources Supports authorization through the use of RBAC used for authorization and authentication. Honeytoken account Correct Answer an account you set up to be a decoy, such as a server admin. This account should never be used. IF you notice login attempts from this account, it is most likely malicious. brute force attack Correct Answer an attacker attempts to authenticate with many different passwords for different accounts until a correct password is found for at least one account. Once found, an attacker can log in using that account.
Category | exam bundles |
Comments | 0 |
Rating | |
Sales | 0 |