To maintain compliance, Azure _______ provides a unified policy management layer across Azure services.

  • Defender
  • Monitor
  • Policy
  • Sentinel
Azure Policy provides a unified policy management layer, ensuring compliance across various Azure services.

Azure _______ provides a serverless file system that can be shared by Azure Virtual Machines.

  • Blob Storage
  • File Storage
  • Queue Storage
  • Table Storage
Azure File Storage is designed to provide a serverless file system that can be shared among Azure Virtual Machines, making it suitable for scenarios that require shared file access.

How does Azure Data Factory facilitate data movement across different data stores?

  • Direct SQL Queries
  • File-based Copy-Paste
  • HTTP Data Transfer
  • Using Linked Services
Azure Data Factory utilizes Linked Services to establish connections and facilitate seamless data movement across different data stores in a scalable and efficient manner.

In Azure Security Basics, which tool is used primarily for detecting and responding to security threats?

  • Azure Active Directory
  • Azure Blob Storage
  • Azure Key Vault
  • Azure Security Center
Azure Security Center is the primary tool used for detecting and responding to security threats in Azure. It provides advanced threat protection across your Azure workloads.

How does Azure support MPI (Message Passing Interface) in High-Performance Computing scenarios?

  • Azure Batch
  • Azure CycleCloud
  • Azure HPC Cache
  • Azure Virtual Machines
Azure supports MPI in HPC scenarios through Azure CycleCloud, which facilitates the deployment and management of MPI-based workloads in a scalable manner.

An organization requires a solution to protect sensitive documents containing personally identifiable information (PII) in Azure. What Azure service would you recommend?

  • Azure Active Directory Rights Management (AADRM)
  • Azure Information Protection
  • Azure Key Vault
  • Azure Security Center
Azure Information Protection is designed to safeguard sensitive documents by classifying and applying appropriate protection policies, including encryption and access controls.

Application Security Groups (ASG) in Azure are used to _______ network security rules for virtual machines.

  • Apply
  • Customize
  • Modify
  • Organize
Application Security Groups (ASGs) in Azure are used to organize and apply network security rules for virtual machines, providing a more granular approach to security.

What type of database model is Azure SQL Database primarily based on?

  • Graph Database
  • In-memory Database
  • NoSQL Database
  • Relational Database
Azure SQL Database is primarily based on the relational database model, emphasizing structured and tabular data storage.

Explain how Azure PowerShell's advanced cmdlets aid in automating complex deployment tasks.

  • Infrastructure as Code
  • Resource provisioning
  • Scripting automation
  • Virtual Machine configuration
Azure PowerShell's advanced cmdlets excel in Infrastructure as Code, enabling the automation of complex deployment tasks by defining and managing Azure resources programmatically.

How do Azure Managed Applications enhance the security and compliance of enterprise applications?

  • They enable multi-factor authentication (MFA)
  • They enforce role-based access control (RBAC)
  • They offer data encryption at rest
  • They provide automated patching and updates
Azure Managed Applications enhance security and compliance by enforcing RBAC, ensuring that only authorized users have access, reducing potential security risks.