






Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
An overview of azure policy, a service in azure that allows you to create, assign, and manage policies to enforce different rules and effects over your resources. It covers the key concepts of policy definitions, policy assignments, and policy effects, as well as how to use azure policy to stay compliant with your corporate standards and service-level agreements (slas). The document also includes information on related azure services, such as role-based access control (rbac) and azure service health, as well as best practices for network security and azure cli commands. Overall, this document is a comprehensive guide for azure administrators to understand and effectively utilize azure policy to manage and govern their azure resources.
Typology: Exams
1 / 12
This page cannot be seen from the preview
Don't miss anything!
Azure Policy
is an Azure service you use to create, assign, and manage policies.
Creating a policy
Policy definition
expresses what to evaluate and what action to take. represented as a JSON file
Ex. Allowed Storage Account SKUs
This policy definition has a set of conditions/rules that determine whether a storage account that is being deployed is within a set of SKU sizes. Its effect is to deny all storage accounts that do not adhere to the set of defined SKU sizes.
Ex. Allowed Resource Type
This policy definition has a set of conditions/rules to specify the resource types that your organization can deploy. Its effect is to deny all resources that are not part of this defined list.
Ex. Allowed Locations
This policy enables you to restrict the locations that your organization can specify when deploying resources. Its effect is used to enforce your geographic compliance requirements.
Ex. Allowed Virtual Machine SKUs
This policy enables you to specify a set of VM SKUs that your organization can deploy.
Ex. Not allowed resources types
Prevents a list of resource types from being deployed.
Policy assignment
a policy definition that has been assigned to take place within a specific scope.
Policy Effect: Deny
The resource creation/update fails due to policy.
Policy Effect: Disabled
The policy rule is ignored (disabled). Often used for testing.
Policy Effect: Append
Which Azure service allows you to create, assign, and, manage policies to enforce different rules and effects over your resources and stay compliant with your corporate standards and service- level agreements (SLAs)?
Azure Policy
Which of the following services provides up-to-date status information about the health of Azure services?
Azure Service Health
Where can you obtain details about the personal data Microsoft processes, how Microsoft processes it, and for what purposes?
Microsoft Privacy Statement
Suppose you want to run a network appliance on a virtual machine. Which workload option should you choose?
Compute optimized
True or false: Resource Manager templates are JSON files?
True
What are network standards used for?
To ensure that hardware and software made by different vendors can work together seamlessly.
What is the primary purpose of a hub?
A hub allows the connection of multiple Ethernet devices to make them act as a single network segment.
What is the principal difference between hub routing and switch routing?
Hub routing sends all packets to all connected devices. Switch routing sends packets to specific devices.
What does a router do?
A router is a network device that forwards data packets between computer networks.
Which of these standards and protocols is used predominantly for email?
SMTP
Which network security protocol provides a cryptographic network protocol?
SSH
What is the Internet Control Message Protocol (ICMP) used for?
To send error messages and operational information that indicate success or failure when communicating with another IP address.
What would you use the Simple Network Management Protocol (SNMP) for?
For collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.
What is the structure of an IPv4 address?
It's made up of four numbers, in the range 0-255, each separated by a dot.
Which of the following best practices should you implement for your network security on Azure?
Disable SSH/RDP protocols.
You need to prevent users' devices from directly requesting web pages from the internet. Which tool would you use to do this?
Proxy server firewall.
You need to query log data for applications across your network in Azure. Which tool do you use?
You use Log Analytics to query the data that has been collected.
What is Syslog used for?
Syslog is used to let your device send event messages.
Azure CLI commands: az find
find particular commands
Azure CLI commands: az login
brings you to login screen to authenticate account
Azure CLI commands: az group create
(az group create --name
creates a resource group must specify name and location
Azure CLI commands: az group list
az group list --output table
lists your Azure resource groups
more concise view -formats the output as a simple table
What do you need to install on your machine to let you execute Azure CLI commands locally?
Only the Azure CLI
True or false: The Azure CLI can be installed on Linux, macOS, and Windows, and the CLI commands you use are the same in all platforms.
True
Which parameter can you add to most CLI commands to get concise, formatted output?
table
What does the term identity mean?
Something that can be authenticated. It can be a user, application, service, or anything that needs to be identified.
Which licensing plan supports Identity Protection?
Azure Active Directory Premium P
What does Azure AD B2B provide?
Azure AD B2B allows you to invite external users to your tenant so that your staff can collaborate with them.
What does Azure AD Application Proxy do?
You use it to add on-premises applications to your instance of Azure AD.
Docker Desktop is an app for building and sharing containerized apps and microservices available on which of the following operating systems?
Windows, macOS, and Windows Subsystem for Linux (WSL)
Which is correct Docker command to rebuild a container image?
docker build
Which of the following sentences describe a container image the best?
A container image is a read-only portable package that contains software and may include an operating system.
A container is launched using the --publish 80:8080 flag. Which of the following options is the most likely network configured used for the container?
bridge
Which storage option is the best choice that allows the host and container to share a file to manage name server resolution, for example the resolve.conf file on Linux?
Bind mount
A JSON file is an example of which type of data?
Semi-Structured
A video is an example of which type of data?
Unstructured
Which type of transactional database system would work best for product data?
OLTP
Suppose the operations to update inventory and process payments are in the same transaction. A user is attempting to apply a $30 store credit for the full amount of an order, and submitted the exact same order using the store credit (for the full amount) using their phone and laptop at the same time - so two identical orders are received. The database behind the scenes is an ACID- compliant database, what would happen?
One order would be processed and use the in-store credit, and the other order would not be processed.