0% found this document useful (0 votes)
320 views6 pages

RYC Azzure

Uploaded by

Amit Baranwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
320 views6 pages

RYC Azzure

Uploaded by

Amit Baranwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Q1.

Identify the Azure Computing Service that develops a microservice to simplify other bundled
smaller applications.
ANSService Fabric

Q2.Consider your organization is planning to migrate a critical on-premises application to Azure. The
application requires low latency and high availability. You need to design the network architecture to
meet these requirements effectively. Which Azure networking service should you consider to ensure
low latency and high availability for the application migration? Select the correct answer from the
given choices.
ANSAzure Express Route

Q3.Assume that your client operates a highly regulated financial institution and has strict compliance
requirements. The client chooses Azure as its cloud provider and is concerned about maintaining
security and compliance. Your role is to ensure that their Azure environment meets these
requirements while optimizing its performance and cost-effectiveness.
Short Scenario: Your client's compliance team has raised concerns about data exposure and
unauthorized access in Azure. They want to ensure that data at rest and in transit is adequately
protected. What Azure service should you recommend to address these concerns?
ANSAzure Key Vault

Q4.A deployment team has deployed Azure Premium tier Redis Cache for better performance: CO
caches for dev environments and C1 for production environments. However, whenever the
production servers reach higher CPU utilization (which resolves after 20 seconds), a connection
timeout occurs for production servers.
ANSIncrease the connection timeout of client library to 25 seconds.

Q5.An Azure content management team has configured an endpoint in CDN portal. This endpoint
has been configured using Azure CDN Standard from Akamai profile and helps in optimization of
static and dynamic contents. The team now wants to add some routing rules, however, the manage
rules icon is disabled as shown in the image below Determine the correct troubleshooting ways to
add the routing rules.
ANSRouting rule is not possible in Azure CDN Standard from Akamai profile. Add the routing rules
under general web delivery in Azure CDN Standard from Verizon profile

Q6.Deployment has been using blob storage account and was deleted by mistake. The team was
trying to recover the storage account, and they are facing a resource group error while restoring.
Choose a workaround to succeed in the restore process:
ANSResource group which existed in the storage account must be recreated to complete the
restore process.

Q7.A user's macOS keychain is causing issues. These issues are related to the Storage Explorer
authentication library.
a. What are the initial steps to be followed to solve the issue?
b. What message is displayed in the Storage Explorer after the keychain log-in? c. Once the user
clears the above error, he realizes he is in a reauthentication loop.
He goes to Help>Reset, but still, the problem persists. What can he do to fix this error further?
ANS
a. Step 1: Close Storage Explorer.
Step 2: Press Command+Spacebar, type keychain. Then press "Enter"
b. "Service hub wants to access the Keychain"
c. Delete the IdentityService.
Q8.Which of the following statements about device authentication is/are true?
ANSA and C
ASHISHOnly A

Q9.Which of the following statements about HDinsight is/are true?


ANS B and C
ASHISH A,B and C

Q10.Assume that you are responsible for designing and managing complex cloud infrastructure
solutions. Your organization has decided to migrate its microservices-based application to Azure
Kubernetes Service (AKS) to take advantage of container orchestration and scaling capabilities. As
part of this migration, you are facing some challenging scenarios.
In your AKS deployment, you have configured multiple node pools to optimize resource allocation
for different workloads. One of your node pools is experiencing frequent node failures due to
unexpected hardware issues. What is the most appropriate action to mitigate this problem? Select
the correct answer from the given choices.
ANSConfigure a node pool auto scaling rule to replace failed nodes automaticaly.

Q11.Assume that your team is working on a critical project involving continuous integration and
deployment using Azure DevOps pipelines. The project involves multiple microservices, each
managed by a separate development team. In order to ensure smooth collaboration and effective
pipeline management, you decide to implement a version control strategy. What is the most suitable
branching strategy for managing multiple microservices in an Azure DevOps project with several
development teams? Select the correct answer from the given choices.
ANSGitflow branching

Q12.Consider that your team is working on a critical project that involves designing a highly available
and scalable database solution for a global e-commerce platform. The project demands a deep
understanding of Azure Database Services to ensure maximum performance and reliability. Here is a
challenging question related to this scenario:
In your Azure-based e-commerce project, you need to choose the appropriate database service to
handle rapidly changing customer data while ensuring low-latency access worldwide. Which Azure
Database Service should you select? Select the correct answer from the given choices.
ANSAzure Cosmos DB

Q13.Consider that one of your clients, a large e-commerce company, is experiencing issues with data
storage and retrieval in its Azure environment. The company has asked for your expertise to
optimize its storage setup.
Question:
What Azure Storage service should you recommend to your client to store large amounts of
unstructured data such as images, videos, and log files efficiently? Select the correct answer from
the given choices.
ANSAzure Blob Storage

Q14.Consider you have been tasked with optimizing a complex Azure environment for a large
enterprise. One of your main goals is to ensure effective monitoring and diagnostics to maintain
system health and performance. Let us test your Azure Monitoring and Diagnostics expertise:
In your Azure environment, you notice increased latency and occasional downtime for a critical web
application. You suspect that underlying infrastructure issues might be causing these problems.
Which Azure service should you use to proactively identify and diagnose these infrastructure issues?
Select the correct answer from the given choices.
ANSAzure Resource Health.

Q15.Assume that your current project involves optimizing a complex Azure Virtual Machines (VMs)
environment for a global e-commerce platform. The client's primary concern is ensuring high
availability and cost- efficiency while accommodating peak traffic loads during holiday seasons. As
you delve into the project, you encounter various challenges and decisions to make. Let us test your
expertise with the given scenario-based MCQ:
While designing the architecture for the e-commerce platform's VMs, you need to ensure high
availability across multiple regions. Which Azure service should you leverage for this purpose? Select
the correct answer from the given choices.
ANSAzure Availability Zones

Q16.Assume that your client, a multinational corporation, has recently migrated its critical
workloads to Azure. The company is concerned about security and access control for its resources
and has tasked you with implementing Azure Identity and Access Management (IAM) to ensure
proper security measures. Let us test your IAM expertise with the listed question:
In your Azure IAM configuration, you want to grant a user access to Azure Virtual Machines without
giving the user full administrative privileges. Which built-in role should you assign to this user? Select
the correct answer from the given choices.
ANSVirtual Machine Contributor

Q17.Assume that your company's Azure environment includes multiple resource groups named "RG-
East" and "RG-West". Each resource group contains a mix of virtual machines (VMs), Azure SQL
Databases, and Azure App Services. You have been assigned the responsibility of analyzing resource
utilization and identifying opportunities for resource optimization. Which is the most suitable Azure
service to help you analyze and optimize resource utilization across the "RG-East" and "RG-West"
resource groups in your Azure environment? Select the correct answer from the given choices.
ANSAzure Advisor

Q18.A support team is using Azure defender to monitor many SQL servers on virtual machines which
are enabled in analytical workspace. Due to very high pricing, the team now wants to unprotect
certain SQL instances running on that SQL server. Choose a suitable way to exclude certain SQL
instances from being protected by Azure defender.
ANSSQL server machine details should be connected to Azure Security centre dashboard but
excluding all the SQL instances

Q19.Assume that your Azure application is connected to the Github repository to link the commits
and pull requests. Now you want to show the Kanban board's status in the repo:
1. Which file will you choose to complete the given requirement?
2. Which option will you choose in Kanban board settings during the configuration to ignore the first
and last columns (work stage)?
Select the option with the correct set of answers from the given choices.
ANS
1. README.md file
2. Status Badge

Q20.Which operation can be used to manipulate data with any service end points in Azure?
ANSConnectors
Q21.Which type of application service provided by Paas in cloud computing runs in the mobile
application without the requirement of set-up code?
ANSMobile apps

Q22.A firm opts for a point to point communication and delivers the messages using queues when
requested.
Which operation in the azure cloud-based service bus ensures delivering messages without shorter
interruptions?
ANSPull operation

Q23.An organisation uses a managed connector of azure for accessing a specific application from the
cloud.
Enable database servers and enterprise integration.
What is the first step to implement before using the connector?
ANSCreating a connection authentication of identity.

Q.24.Assume that you are configuring a CI/CD pipeline for a .NET Core web application hosted on
Azure. The application includes unit tests that need to be executed as part of the build process. You
want to ensure that the pipeline fails if any of the unit tests fail. Furthermore, you want to generate
a code coverage report and store it for later analysis. Which code snippet should you use in the
Azure DevOps YAML pipeline configuration file to achieve these requirements? Analyze the given
choices and select the correct option
ANS1- script: dotnet test configuration Release
displaytime Run unit tests' 2
continueOnError: false

Q.25.Assume that you are working with Azure Repos and need to ensure that only specific
individuals in your team can approve and merge pull requests. Enforcing this requirement is crucial
to maintain code quality and avoid unauthorized changes. What is the recommended approach to
enforce this requirement? Select the correct answer from the given choices.
ANSGrant the appropriate permissions using branch policies and limit access to the repository

Q.26.in order to achieve dynamic deployments and accommodate various environments, assume
that you decide to use conditional statements and loops in your Bicep templates. Furthermore, you
want to parameterize your Asture DevOpo release pipelines for difierent environments. Which Azure
DevOps task or concept should you use for dynamic deployments? Select the comect answer from
the given choices.
ANSImplement stage templates for environment-specific deployment
AshishUse the "Azure Resource Group Deployment task with pptforconditional Deployments

Q.27.Assume that you are configuring an Azure Bicep project to calculate a series of /26 subnet
ranges from the given/16 subnet '192.168.0.0/16'. You need to generate these subnets
programmatically to ensure efficient IP address allocation within your Azure network. Which Azure
Bicep code correctly calculates a series of five /26 subnet ranges from the specified/16 subnet
'192.168.0.0/16? Select the correct answer from the given choices.
ANSoutput subnets array = [for i in range(0, 5): cidrSubnet(192.168.0.0/16, 26, i)]

Q.28.Consider you are setting up a CI/CD pipeline for an application hosted on Azure. The application
requires a specific version of a third-party library during the build process. The library is not available
by default in the pipeline environment:
1. How can you ensure that the correct library version is available in the pipeline environment to
successfully build the application?
2. Which Azure DevOps task can you use to ensure that the correct library version is available in the
pipeline environment during the build process?
ANS1. Use an artifact repository to store and manage different versions of the library and fetch
the required version during the build process
2. Use the Artifacts download task to retrieve the specific library version from.an artifact repository
Ashish1. Use an artifact repository to store and manage different versions of the library and fetch
the required version during the build process
2. Use the NuGet task to restore and download the required library version from a NuGet package

Q.29.Consider you want to ensure that your Infrastructure as Code (laC) practices follow best
practices. You have decided to implement version control for your Bicep templates using Git
repositories and enable collaborative development workflows using Azure DevOps and Git. Which
commands or concepts will you use for effective version control and collaborative development?
Select the correct answer from the given choices
ANSSet up a Git repository, use git clone to clone the repository, and then leverage Git commands
like git add, git commit, and git push for version control. Utilize Azure DevOps for collaboration.

Q.30.Consider you want to ensure that your Infrastructure as Code (laC) practices follow best
practices. You have decided to implement version control for your Bicep templates using Git
repositories and enable collaborative development workflows using Azure DevOps and Git. Which
commands or concepts will you use for effective version control and collaborative development?
Select the correct answer from the given choices
ANSSet up a Git repository, use git clone to clone the repository, and then leverage Git commands
like git add, git commit, and git push for version control. Utilize Azure DevOps for collaboration

Q.31.In a complex hybrid Azure environment spanning multiple business units, each with unique
resource management requirements, you are responsible for managing access control. Your task is
to delegate role assignments and permissions to business unit administrators, allowing them to
customize access control to meet their specific needs
ANSAzure Role-Based Access Control (RBAC)

Q.32.A private cloud contains mutiple virtual machines being utilized by an organization to host an
application. In this scenario, there is a requirement to uptate all the virtual machines to match with
the application's configuration. Identify a suitable solution for the given scenario.
ANSUsing the virtual scale set features, all the virtual machines can be updated.

Q.33.A newly created suppression rule created in Azure defender suppresses only local user security
alerts, not for the remote users. To test this rule, the HTTP REST api 'GET' method is used to simulate
the new suppression rule operations. The rule does not get activated and simulation does not work
due to lack of access permission. Choose the right solution to resolve this issue.
ANSExecute the below command to check whether the service Defender IoT micro agent service is
running with admin privileges: journalctl -u defender-iot-micro-agent | tail -n 200

Q.34.A cloud-based music app that is hosted on the Azure portal has a user base upto 2000
concurrent users. An intruder injects a malicious javascript in the HTTP request and hacks the music
app. The web application firewall is active but still this vulnerability is not detected. Identify a
possible cause for this situation from the given options.
ANSThe global parameter "Inspect request body" in the web application firewall is set to off
Q.35.A developer has created a U-SQL file to manage an account. The file contains the details of the
security and the firewall data. Now, the developer needs to change that file into a U-SQL job. In this
scenario, which of the following scripts should be used, given the following details?
ANS
1 $filepath "d:\azure\example.usql"
2 $script Out-File $filepath
3 Submit-AdlJob Sadla -ScriptPath $filepath -Name "test"

Q.36.Given below is an example of a trigger recurrence schedule in the Azure Data Factory.
What does it indicate?
ANS<style type="text/css"> <!-td (border: 1px solid #cccbr [mso-data-placementsame cell)->
</style> The trigger runs at 7:10 AM 7:40 AM 1:10 PM and 1:40 PM every day.

Q.37.An Azure support team wants to lock down the TCP inbound traffic to their virtual machine
with the help of JIT access. Currently, the VM has been enabled the required JIT access covering the
traffic on port 22. However, the team wants to restrict the traffic only to TCP. Choose the correct
remediation action to be taken to meet this requirement.
ANSIn Security Centre -> VM -> JIT -> Edit the existing configuration with custom port number and
TCP protocol with appropriate Max request time.

Q.38.A deployment team wants to test an endpoint in production VM. The production servers are
maintained using the traffic manager with a performance traffic-routing technique. The traffic
routing map is shown in the image given below. How can the traffic be routed to test the endpoint
using traffic manager?
ANSAssign weighted traffic routing to the child profile to route traffic to the test endpoint.

Q.39.Which of the following commands in Azure Command-Line Interface (CLI) is used to create
application gateway in Azure?
ANSCreate-AzureApplicationGateway

Q.40.VPN has been enabled between the virtual server in Azure and your organization infrastructure
to have a secure connection. In this scenario, you need to test the throughput of the VPN and hence
you have opted for iperf tool to test. The organization address is a public IP and hence the VPN test
was not successful through iperf tool. What is a suitable solution to this issue?
ANSEnable the NSG/ACL rule for the public IP

Q.41.An agent wants to protect enterprise from multiple threats by importing all data into Azure
Sentinel that is collected on an on-premise MS ATA server. The data should not contain only logs in
particular but should have all information. How can a support team help the agent to import data
into Azure Sentinel?
ANS Modify agent configuration in Log Analytics workspace
AshishModify the linked storage account in log analytics workspace.

You might also like