Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Azure Active Directory (Azure AD) Exam Questions and Answers, Exams of Computer Science

A comprehensive set of questions and answers related to azure active directory (azure ad), covering various aspects of the service, including licensing, branding, administration, security, and domain management. It is a valuable resource for individuals preparing for azure ad exams or seeking to enhance their knowledge of the service.

Typology: Exams

2024/2025

Available from 12/22/2024

Martin-Ray-1
Martin-Ray-1 🇺🇸

5

(8)

6.1K documents

1 / 23

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Computer Studies CS 300 and
SC 300 Exams 2025/2026 Edition
What license is required to add custom branding to Azure AD? -
Correct: ✔✔Azure AD P1, P2, or Office 365
What two file formats can be used to specify the sign-in page
background image? - Correct: ✔✔.png or .jpg
What is the maximum image size for the sign-page background image
(pixels and bytes)? - Correct: ✔✔1920 x 1080, 300,000 bytes
What file formats are acceptable for the AAD banner logo? - Correct:
✔✔.png and .jpg
What are the three limitations for the AAD username hint text? -
Correct: ✔✔unicode, without links, cannot exceed 64 characters
What are the two limitations for the sign-in page text and formatting? -
Correct: ✔✔unicode and not exceed 1024 characters
What AAD role can manage support tickets, monitor service health, and
change password for users, Helpdesk admins, and other users of the
same role? - Correct: ✔✔User Administrator
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17

Partial preview of the text

Download Azure Active Directory (Azure AD) Exam Questions and Answers and more Exams Computer Science in PDF only on Docsity!

Computer Studies CS 300 and

SC – 300 Exams 2025/2026 Edition

What license is required to add custom branding to Azure AD? - Correct: ✔✔Azure AD P1, P2, or Office 365 What two file formats can be used to specify the sign-in page background image? - Correct: ✔✔.png or .jpg What is the maximum image size for the sign-page background image (pixels and bytes)? - Correct: ✔✔1920 x 1080, 300,000 bytes What file formats are acceptable for the AAD banner logo? - Correct: ✔✔.png and .jpg What are the three limitations for the AAD username hint text? - Correct: ✔✔unicode, without links, cannot exceed 64 characters What are the two limitations for the sign-in page text and formatting? - Correct: ✔✔unicode and not exceed 1024 characters What AAD role can manage support tickets, monitor service health, and change password for users, Helpdesk admins, and other users of the same role? - Correct: ✔✔User Administrator

What AAD role can make purchases, manage subscriptions, manage support tickets, and monitor service health? - Correct: ✔✔billing administrator What is the name of the feature that allows AAD Global Administrators to become the user access administrator for all Azure subscriptions associated with the tenant? - Correct: ✔✔Access management for Azure resources What are the 6 AAD roles that can be assigned to an administrative unit? - Correct: ✔✔authentication administrator, groups administrator, Helpdesk administrator, license administrator, password administrator, user administrator What are the three stages of the adoption of administrative units? - Correct: ✔✔Initial adoption, pruning, stabilization What are the eight steps for developing an AAD delegation model? - Correct: ✔✔define the roles you need, delegate app administration, grant the ability to register applications, delegate app ownership, develop a security plan, establish emergency accounts, secure your administrator roles, make privileged elevation temporary

Can AAD Guest Users enumerate a list of users and their contacts? - Correct: ✔✔no Can AAD member users create security groups? - Correct: ✔✔yes Can AAD guest users register new applications? - Correct: ✔✔no How many managed domain names can you have in an AAD? - Correct: ✔✔ 900 How many domain names can be in AAD if you're configuring all your domains for federation? - Correct: ✔✔ 450 Is it possible to add a subdomain to your AAD organization? - Correct: ✔✔yes What steps are necessary to change the DNS registrar associated with an AAD custom domain? - Correct: ✔✔no extra steps needed What three things must be done before deleting a custom domain name in AAD? - Correct: ✔✔ensure no users use the domain, ensure no groups use the domain, ensure that any application in your Azure AD does not have an app ID URI that includes the domain name

___________ can be used to remove a domain name in the Azure AD Admin Center or using Microsoft Graph API. - Correct: ✔✔ForceDelete When is an error returned when using the ForceDelete command to delete a custom domain? - Correct: ✔✔if the number of objects to be renamed is more than 1000 and one of the applications to be renamed is a multi-tenant app file system (FS) - Correct: ✔✔def: an integral part of every OS, whose function is to implement the concept of files. file - Correct: ✔✔def: a named collection of information managed on secondary storage by the FS. record - Correct: ✔✔def: a structure of related data items, possibly of different data types, identified within a file by a record number or a unique key field. access method - Correct: ✔✔def: a set of operations provided by the OS as part of the user interface to access files Note - Correct: ✔✔Note: Direct access is not possible with variable length because a record position cannot be calculated without reading every prior Li.

1.) Byte-oriented files 2.) Fixed-length record files 3.) Variable-length record files 3.) Both fixed-length and variable-length record files Explanation: The FS can maintain a current record position regardless of the record lengths. - Correct: ✔✔Question: Read/write next record is applicable to ____. 1.) Only fixed-length records 2.) Only variable-length record files 3.) Both fixed-length and variable-length record files Metadata - Correct: ✔✔def: information about the format and organization of a file's data and is generally stored in a file header file header - Correct: ✔✔def: a portion of the file preceding the actual data and is visible to only the FS itself. magic number - Correct: ✔✔def: a short sequence of characters at the start of the file header, which identifies the file type. The file type, in turn, determines which programs are allowed to access and interpret the file.

File extension - Correct: ✔✔def: a sequence of one or more characters following the file name. Unlike a magic number, it is not hidden within the file header and thus can conveniently be examined by the user. The drawback is that it can easily be changed without changing the file's type. Thus it supports only a weak form of file typing by providing convenient hints about a file's type but do not rigorously enforce which operations are valid for a given file type.

  1. Opening the .docx file in MS Word and storing the contents in a .pdf file. Explanation: MS Word knows both the .docx and the .pdf formats and can produce the properly formatted file for Adobe Acrobat. - Correct: ✔✔Question: When double-clicking a file, the system is set up to open the file using:- MS Word when the file extension is .docx- Adobe Acrobat when the file extension is .pdf- A simple text editor when the file extension is .txt. The contents of a file created in MS Word can be displayed using Adobe Acrobat by _____.
  2. Changing the file extension from .docx to .pdf
  3. Opening the .docx file in MS Word and storing the contents in a .pdf file.
  4. Changing the file's magic number to indicate a pdf format 1.invokes MS Word, which displays the text "Testing" as originally formatted.

An MS Word file test.docx, containing the text 'Testing', is renamed by the user to test.txt. Under weak file type enforcement, double-clicking the file _____. 1.invokes MS Word, which displays the text "Testing" as originally formatted 2.Invokes the simple text editor, which displays the text "Testing" as an ASCII string without any formatting

  1. invokes the simple text editor, which displays a string of unprintable and unintelligible characters. file directory (or folder) - Correct: ✔✔def: a special-purpose file that records information about other files and possibly other directories tree-structured directory hierarchy - Correct: ✔✔def: a collection of directories organized such that (1) every directory points to zero or more files or directories at the next lower level, and (2) every file and directory except the root is pointed to by exactly one parent directory at the next higher level root - Correct: ✔✔def: the highest level directory, which does not have a parent directory in a tree-structured directory hierarchy. absolute path name - Correct: ✔✔def: uniquely identified by an internal ID, f, is the concatenation of the directory and file names leading from the root to the file f. The individual names are separated by an agreed-upon delimiter, typically a forward slash or a backslash.

relative path name - Correct: ✔✔def: a concatenation of file names starting with the current directory. directed acyclic directory hierarchy - Correct: ✔✔def: organizes directories such that any directory at a given level may point to zero or more files or other directories at lower levels but also permits any file or directory to have more than one parent directory. reference count - Correct: ✔✔def: a non-negative integer associated with a file f, which indicates how many directories are pointing to the file. symbolic link (or shortcut) - Correct: ✔✔def: directory entry that points to a file or directory just like a regular entry but is treated differently with respect to deletion. A delete operation only removes the link but not the file itself. File control block(FCB) - Correct: ✔✔def: a data structure associated with a filename that contains all relevant attributes of the file. False: File names are part of every directory entry, regardless of the approach. - Correct: ✔✔Question(True/false): Keeping only the file name and an FCB pointer instead of all attributes in a directory entry is preferable when file names are very long

False: The length of a newly created file is always 0 and thus does not have to be specified. - Correct: ✔✔Question(True/False): The create operation must specify as a parameter the file length. True: A symbolic file name is a character string assigned to a file at the time of creation. - Correct: ✔✔Question(True/False): The create operation must specify as a parameter the file name. False: A newly created file has no contents and thus no blocks are needed. Only when a file is modified must disk blocks be allocated. - Correct: ✔✔Question(True/False): The create operation must specify as a parameter the the list of blocks to hold the file's contents 2.) Current directory explanation: If the same file name was used two or more times in a given directory, the files could not be distinguished. But the same name can be used in different directories because the path names remain unique. - Correct: ✔✔To avoid having duplicate file names, the create operation must search 1.) The entire directory structure 2.) Current directory

True: Only an existing file can be destroyed and thus the destroy operation must find a match for the given file name. - Correct: ✔✔Question(True/False): The destroy operation must search the directory for the file name. True: free the directory entry corresponding to the file - Correct: ✔✔Question(True/False): The destroy operation must free the directory entry corresponding to the file. False: The file length is recorded in the FCB, which is deleted or marked as free. - Correct: ✔✔Question(True/False): The destroy operation must reset the file length to 0. False: The block pointers are kept in the FCB, which is deleted or marked as free. No changes need to be made to the FCB. - Correct: ✔✔Question(True/False): The destroy operation must set all pointers to disk blocks to NULL. True: The file is being destroyed and thus all allocated blocks are returned to the FS. - Correct: ✔✔Question(True/False): The destroy operation must free all disk blocks currently allocated to hold the file's contents

1.) Supplied as a Parameter to the open operation 2.) Extracted from the FCB 3.) Generated by the open operation 2.): The file length is recorded in the FCB and is copied into the OFT. - Correct: ✔✔Question: The file name is 1.) Supplied Parameter to the open operation 2.) Extracted from the FCB 3.) Generated by the open operation 3.) Generated by the open operation: When a file is opened, the current position is always 0. - Correct: ✔✔Question: The current position maintained in the OFT is 1.) Supplied Parameter to the open operation 2.) Extracted from the FCB 3.) Generated by the open operation 2.) the file length is 0: File length 0 means the file contains no data and thus the r/w buffer is empty. - Correct: ✔✔Question: The r/w buffer of an open file contains no data if 1.) the current position is 0. 2.) the file length is 0.

read file operation - Correct: ✔✔def: copies data from an open file to a specified area in main memory. The data may be accessed either directly, one record at a time, or sequentially, by specifying the number of bytes to be read next. a: The first character of the file is "a", which is copied into memory starting at position m. - Correct: ✔✔Question: A file contains the 26 characters "a" through "z". The file is open with the OFT index 3. The block size is 16 bytes. The following operations are issued:

  1. read 3, m, 1
  2. read 3, m, 24
  3. read 3, m, 1 1)After operation 1, the first byte of the memory area m contains the character _____. 26: The initial file length of 26 is copied into the OFT when the file is opened. A read operation does not change the file length - Correct: ✔✔Question: A file contains the 26 characters "a" through "z". The file is open with the OFT index 3. The block size is 16 bytes. The following operations are issued:
  4. read 3, m, 1
  5. read 3, m, 24
  6. read 3, m, 1 After operation 1, the file length recorded in the OFT is _____.
  1. read 3, m, 1
  2. read 3, m, 24
  3. read 3, m, 1 z: The current position is 25, which results in reading the last character "z". The memory address m is the same as before and thus the first byte is overwritten with the character "z". - Correct: ✔✔Question: A file contains the 26 characters "a" through "z". The file is open with the OFT index 3. The block size is 16 bytes. The following operations are issued:
  4. read 3, m, 1
  5. read 3, m, 24
  6. read 3, m, 1 After operation 3, the first byte of the memory area m will contain the character _____. write file operation - Correct: ✔✔def: copies data from an area in main memory to a specified open file seek operation - Correct: ✔✔def: moves the current position of an open file to a new specified position 0: The position, 5, is divided by the block size, 512, yields the block number: 5/512 = 0. - Correct: ✔✔Question:

A file is open with the OFT index 3. The block size is 512 bytes. The following operation are issued:

  1. seek 3, 5
  2. seek 3, 511
  3. seek 3, 2058 After operation 1, the r/w buffer contains block _____ of the file. 5: The position, 5, modulo the block size, 512, yields the offset within the buffer: 5 mod 512 = 5. - Correct: ✔✔Question: A file is open with the OFT index 3. The block size is 512 bytes. The following operation are issued:
  4. seek 3, 5
  5. seek 3, 511
  6. seek 3, 2058 After operation 1, the offset within the r/w buffer is _____. 0: The block number does not change because the position remains within the same block: 511/512 = 0. - Correct: ✔✔Question: A file is open with the OFT index 3. The block size is 512 bytes. The following operation are issued:
  7. seek 3, 5
  8. seek 3, 511
  9. seek 3, 2058