Exam Code: 70-533 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Implementing Microsoft Azure Infrastructure Solutions
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-533 Exam.
Q31. You administer of a set of virtual machine (VM) guests hosted in Hyper-V on Windows Server 2012 R2.
The virtual machines run the following operating systems:
Windows Server 2008 Windows Server 2008 R2 Linux (openSUSE 13.1)
All guests currently are provisioned with one or more network interfaces with static bindings and VHDX disks. You need to move the VMs to Azure Virtual Machines hosted in an Azure subscription.
Which three actions should you perform? Each correct answer presents part of the solution.
A. Install the WALinuxAgent on Linux servers.
B. Ensure that all servers can acquire an IP by means of Dynamic Host Configuration Protocol (DHCP).
C. Upgrade all Windows VMs to Windows Server 2008 R2 or higher.
D. Sysprep all Windows servers.
E. Convert the existing virtual disks to the virtual hard disk (VHD) format.
Answer: A,C,D
Explanation: * A: Azure Linux Agent
This agent is installed on the Linux VM and is responsible to communicate with the Azure Frabric Controller.
* UPLOADING A VIRTUAL MACHINE TO WINDOWS AZURE
Assumption: A Windows Server (2008 R2 or 2012) is created and running as a virtual machine in Hyper-V. (C) Log onto the Windows Server hosted in Hyper-V you’d like to upload to Windows Azure
and open and command prompt (I’m using Windows Server 2012 R2).
Navigate to c:\Windows\System32\Sysprep
Type in sysprep.exe and select enter: (D)
Q32. DRAG DROP
You administer an Azure Virtual Machine (VM) named CON-CL1. CON-CL1 is in a cloud service named ContosoService1.
You discover unauthorized traffic to CON-CL1. You need to:
. Create a rule to limit access to CON-CL1.
. Ensure that the new rule has the highest precedence.
Which Azure Power Shell cmdlets and values should you use? To answer, drag the appropriate cmdlet or value to the correct location in the Power Shell command. Each cmdlet or value may be used once, more than once, or not at all. You may need to drag the split bat between panes or scroll to view content.
Answer:
Q33. DRAG DROP
You plan to deploy a cloud service named contosoapp. The service includes a web role named contosowebrole. The web role has an endpoint named restrictedEndpoint.
You need to allow access to restricted Endpoint only from your office machine using the IP address 145.34.67.82.
Which values should you use within the service configuration file? To answer, drag the appropriate value to the correct location in the service configuration file. Each value may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Answer:
Q34. You administer a Microsoft Azure SQL Database data base in the US Central region named contosodb. Contosodb runs on a Standard tier within the S1 performance level.
You have multiple business-critical applications that use contosodb.
You need to ensure that you can bring contosodb back online in the event of a natural disaster in the US Central region. You want to achieve this goal with the least amount of downtime.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Upgrade to S2 performance level.
B. Use active geo-replication.
C. Use automated Export.
D. Upgrade to Premium tier.
E. Use point in time restore.
F. Downgrade to Basic tier.
Answer: B,D
Explanation: B: The Active Geo-Replication feature implements a mechanism to provide database redundancy within the same Microsoft Azure region or in different regions (geo-redundancy). One of the primary benefits of Active Geo-Replication is that it provides a database-level disaster recovery solution. Using Active Geo-Replication, you can configure a user database in the Premium service tier to replicate transactions to databases on different Microsoft Azure SQL Database servers within the same or different regions. Cross-region redundancy enables applications to recover from a permanent loss of a datacenter caused by natural disasters, catastrophic human errors, or malicious acts.
D: Active Geo-Replication is available for databases in the Premium service tier only.
Reference: Active Geo-Replication for Azure SQL Database
http://msdn.microsoft.com/en-us/library/azure/dn741339.aspx
Q35. You administer an Azure Web Site named contoso. You create a job named Cleanlogs.cmd that will be executed manually, twice a week.
You need to deploy the job.
To which folder location should you deploy CleanLogs.cmd?
A. ./App_Code/jobs/triggered/cleanLogs/CleanLogs.cmd
B. ./App_Data/jobs/triggered/clean Logs/CleanLogs.cmd
C. ./App_Code/jobs/continuous/cleanLogs/CleanLogs.cmd
D. ./App_Data/jobs/continuous/cleanLogs/CleanLogs.cmd
Answer: B
Explanation: A WebJob is stored under the following directory in your site:
site\wwwroot\App_Data\jobs\{job type}\{job name}
Where {job type} can be either continuous for a job that is always running or triggered for a job that starts from an external trigger (on demand / scheduler).
Reference: How to deploy Azure WebJobs
URL: http://blog.amitapple.com/post/74215124623/deploy-azure-webjobs/#.VDZam_mSx8E
Q36. DRAG DROP
You manage an Azure Web Site named contososite.
You download the subscription publishing credentials named Contoso-Enterprise.publishsettings.
You need to use Azure Power Shell to achieve the following:
Connect to the Contoso-Enterprise subscription.
Create a new App Setting named CustomSetting with a value of True.
Restart the website.
Which commands should you use? To answer, drag the appropriate Azure PowerShell command to the correct location in the solution. Each command may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Answer:
Q37. You administer an Azure Active Directory (Azure AD) tenant that has a SharePoint web application named TeamSite1. TeamSite1 accesses your Azure AD tenant for user information.
The application access key for TeamSite1 has been compromised.
You need to ensure that users can continue to use TeamSite1 and that the compromised key does not allow access to the data in your Azure AD tenant.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Remove the compromised key from the application definition for TeamSite1.
B. Delete the application definition for TeamSite1.
C. Generate a new application key for TeamSite1.
D. Generate a new application definition for TeamSite1.
E. Update the existing application key.
Answer: A,C
Explanation: One of the security aspects of Windows Azure storage is that all access is protected by access keys.
It is possible to change the access keys (e.g. if the keys become compromised), and if changed, we’d need to update the application to have the new key.
Q38. You administer an Azure Active Directory (Azure AD) tenant where Box is configured for: . Application Access . Password Single Sign-on An employee moves to an organizational unit that does not require access to Box through
the Access Panel.
You need to remove only Box from the list of applications only for this user.
What should you do?
A. Delete the user from the Azure AD tenant.
B. Delete the Box Application definition from the Azure AD tenant.
C. From the Management Portal, remove the user's assignment to the application.
D. Disable the user's account in Windows AD.
Answer: C
Explanation: Note: Use Azure AD to manage user access, provision user accounts, and enable single sign-on with Box. Requires an existing Box subscription.
Q39. You manage a cloud service that utilizes data encryption.
You need to ensure that the certificate used to encrypt data can be accessed by the cloud service application.
What should you do?
A. Upload the certificate referenced in the application package.
B. Deploy the certificate as part of the application package.
C. Upload the certificate's public key referenced in the application package.
D. Use RDP to install the certificate.
Answer: C
Explanation: The developer must deploy the public key with their application so that, when Windows Azure spins up role instances, it will match up the thumbprint in the service definition with the uploaded service certificate and deploy the private key to the role instance. The private key is intentionally non-exportable to the .pfx format, so you won’t be able to grab the private key through an RDC connection into a role instance.
Reference: Field Note: Using Certificate-Based Encryption in Windows Azure Applications
Q40. You administer an Azure Storage account named contoso storage. The account has queue containers with logging enabled.
You need to view all log files generated during the month of July 2014.
Which URL should you use to access the list?
A.
http://contosostorage.queue.core.windows.net/$logs? restype=container&comp=list&prefix=queue/2014/07
B.
http://contosostorage.queue.core.windows.net/$files? restype=container&comp=list&prefix=queue/2014/07
C. http://contosostorage.blob.core.windows.net/$files?
restype=container&comp=list&prefix=blob/2014/07
D. http://contosostorage.blob.core.windows.net/$logs? restype=container&comp=list&prefix=blob/2014/07
Answer: A
Explanation: http://msdn.microsoft.com/library/azure/hh343262.aspx