Implementing Microsoft Azure Infrastructure Solutions
Question No: 51
You plan to use Azure Monitor with AutoScale Services. You create a URI to be used with the monitoring service. You need to configure an alert that specifies the URI. Which Azure Command-Line Interface (CLI) command or Azure PowerShell cmdlet should you run?
Azure insights logprofile add
Explanation: The New-AzureRmAlertRuleWebhook cmdlet creates an alert rule webhook.
Question No: 52
You manage a cloud service named fabrikamReports that is deployed in an Azure data center.
You deploy a virtual machine (VM) named fabrikamSQL into a virtual network named fabrikamVNet.
FabrikamReports must communicate with fabrikamSQL. You need to add fabrikam Reports to fabrikamVNet.
Which file should you modify?
the network configuration file for fabrikamVNet
the service definition file (.csdef) for fabrikamReports
the service definition file (.csdef) for fabrikamSQL
the service configuration file (.cscfg) for fabrikamReports
the service configuration file (.cscfg) fabrikamSQL
The service configuration file specifies the number of role instances to deploy for each role in the service, the values of any configuration settings, and the thumbprints for any certificates associated with a role. If the service is part of a Virtual Network, configuration information for the network must be provided in the service configuration file, as well as in the virtual networking configuration file. The default extension for the service configuration file is .cscfg.
Question No: 53 HOTSPOT
You have two on-premises networks. You need to connect the two networks to Azure. The networks must be secure.
You need to configure the environment.
Which actions should you perform? For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Question No: 54
Which of the following are the MOST important benefits of a cloud computing solution for an application development provider? (Select two.)
Reduced training time for new developers
Reduced storage requirements.
Reduced complexity for users.
Reduced bandwidth usage.
Reduced development timeframe.
Answer: E,F Explanation:
The biggest promise of Azure-based applications is the ability to write them to scale as needed in real-time. Customers will therefore only use the amount of resources they need, rather than budgeting a set amount of resources that can overtax or underutilize their current setup.
References: http://searchcloudcomputing.techtarget.com/tutorial/An-introduction-to- developing-for-Microsoft-Azure
Question No: 55 HOTSPOT
You manage two websites for your company. The sites are hosted on an internal server that is beginning to experience performances issues due to high traffic.
You plan to migrate the sites to Azure Web Sites. The sites have the following configurations:
In the table below, identity the web hosting plan with the lowest cost for each site. Make only one selection in each column.
Site 2 contains 9 GB of data so Basic mode is enough as it provided 10 GB of data (FREE
and Shared only provide 1 GB of data).
Site 1 contains 11 GB of data so Standard mode is adequate as it provided 50 GB of data.
Question No: 56
You are evaluating an Azure application. The application includes the following elements:
*A web role that provides the ASP.NET user interface and business logic
*A single SQL database that contains all application data
Each webpage must receive data from the business logic layer before returning results to the client. Traffic has increased significantly. The business logic is causing high CPU usage.
You need to recommend an approach for scaling the application. What should you recommend?
Store the business logic results in Azure Table storage.
Vertically partition the SQL database.
Move the business logic to a worker role.
Store the business logic results in Azure local storage.
Answer: C Explanation:
For Cloud Services in Azure applications need both web and worker roles to scale well. References: https://msdn.microsoft.com/en-us/library/azure/dn574746.aspx
Question No: 57
Note: This question is part of a series of questions that present the same scenario. Each questions in the series contains a unique solution that might meet the stated goals. Some questions sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review scree.
You create an Ubuntu Linux virtual machine (VM) by using the Azure Portal. You do not specify a password when you create the VM.
You need to connect to the terminal of the VM.
Solution: You use the Connect button on the Overview blade for the VM. Does the solution meet the goal?
Answer: B Explanation:
Question No: 58 HOTSPOT
You deploy a Web App to Azure. The Web App uses several Basic tier, single instance virtual machines (Vms).
The App includes a web tier, services tier, data tier, and a compute-intensive processing tier, as shown in the following diagram:
You have the following requirements:
-> The application must be available during all Azure platform events, including planned (VM restarts required) and unplanned (hardware failure) events.
-> You must simplify VM deployments by using JSON templates and the Azure
Resource Manager (ARM).
-> The processing tier must support high volume CPU loads at peak times throughout the year.
-> The web tier must support high volumes of incoming Internet traffic during peak times throughout the year.
-> The company has authorized downtime for the infrastructure upgrades. Future updates must not include downtime.
-> The infrastructure upgrades must provide the most economical solution while meeting all requirements.
Users report application outages during planned Azure maintenance windows. You plan to upgrade the application to support upcoming company initiatives as well as address the user reports.
You need to upgrade the application and infrastructure.
For each tier, which action should you perform? To answer, select the appropriate action from each list in the answer area.
Web tier: Use 2 Standard tier VMs in a new availability set, load balanced with Azure Load Balancer.
The web tier must support high volumes of incoming Internet traffic during peak times throughout the year.
Services: Use 2 Standard Tier VM in a new availability set.
Data: Use 2 Standard tier VMs contained within the services tier availability set.
Processing: Use 2 Dv2-series Vms in a new scale set.
The processing tier must support high volume CPU loads at peak times throughout the year.
Dv2-series, a follow-on to the original D-series, features a more powerful CPU. The Dv2- series CPU is about 35% faster than the D-series CPU.
Automatic scaling of virtual machines in a scale set is the creation or deletion of machines in the set as needed to match performance requirements. As the volume of work grows, an application may require additional resources to enable it to effectively perform tasks.
https://docs.microsoft.com/en-us/azure/virtual-machines/virtual-machines-windows-sizes https://docs.microsoft.com/en-us/azure/virtual-machine-scale-sets/virtual-machine-scale- sets-autoscale-overview
Question No: 59
You manage an application that has a front-end tier, a middle tier, and a back-end tier. Each tier is located on a different subnet.
You need to apply access to and between the tiers as follows:
-> Only the front-end tier must be able to access the Internet.
-> You must permit network access between the front-end tier and the middle tier.
-> You must permit network access between the middle tier and the back-end tier.
-> You must prevent all other network traffic.
You need to apply this configuration to all virtual machines inside the subnets. What should you do?
Use a Network Security Group (NSG).
Add a VPN gateway.
Add a regional VNET.
Add an Availability Set.
Answer: D Explanation:
Question No: 60
You develop a Windows Store application that has a web service backend.
You plan to use the Azure Active Directory Authentication Library to authenticate users to Azure Active Directory (Azure AD) and access directory data on behalf of the user.
You need to ensure that users can log in to the application by using their Azure AD credentials.
Which two actions should you perform? Each correct answer presents part of the solution.
Create a native client application in Azure AD.
Configure directory integration.
Create a web application in Azure AD.
Enable workspace join.
Configure an Access Control namespace.
Answer: A,B Explanation:
Windows Store application
鈥淎dd an application my organization is developing鈥?/p>
鈥淚n the Add Application Wizard, enter a Name for your application and click the Native Client Application type鈥?/p>
B: An application that wants to outsource authentication to Azure AD must be registered in Azure AD, which registers and uniquely identifies the app in the directory.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|