ExamGecko
Home / Microsoft / AZ-204 / List of questions
Ask Question

Microsoft AZ-204 Practice Test - Questions Answers, Page 28

List of questions

Question 271

Report
Export
Collapse

You a web application that provides access to legal documents that are stored on Azure Blob Storage with version level immutability policies. Documents are protected with both time-based policies legal hold policies. All time‚Ä"based retention policies have AllowProtectedAppendWrites property enabled.

You have a requirement to prevent the user from attempting to perform operations that would fail only a legal is in effect and when all other are expired.

You reed to meet the requirement.

Which two operations you prevent?

overwriting existing
overwriting existing
adding data to documents
adding data to documents
deleting documents
deleting documents
creating document
creating document
Suggested answer: A, C
asked 02/10/2024
Lakshmana Mittadoddi
39 questions

Question 272

Report
Export
Collapse

You are developing an Azure Durable Function to manage an online ordering process.

The process must call an external API to gather product discount information.

You need to implement Azure Durable Function.

Which Azure Durable Function types should you use? Each correct answer presents part of the solution

NOTE: Each correct selection is worth ore point

Orchestrator
Orchestrator
Entity
Entity
Activity
Activity
Client
Client
Suggested answer: A, B

Explanation:

https://learn.microsoft.com/en-us/azure/azure-functions/durable/durable-functions-types-featuresoverview

asked 02/10/2024
Bamidele Ariwodola
38 questions

Question 273

Report
Export
Collapse

You develop a Python application for image rendering that uses GPU resources to optimize rendering processes. You deploy the application to an Azure

Container Instances (ACI) Linux container.

The application requires a secret value to be passed when the container is started. The value must only be accessed from within the container.

You need to pass the secret value.

What are two possible ways to achieve this goal? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Create an environment variable Set the secureValue property to the secret value.
Create an environment variable Set the secureValue property to the secret value.
Add the secret value to the container image. Use a managed identity.
Add the secret value to the container image. Use a managed identity.
Add the secret value to the application code Set the container startup command.
Add the secret value to the application code Set the container startup command.
Add the secret value to an Azure Blob storage account. Generate a SAS token.
Add the secret value to an Azure Blob storage account. Generate a SAS token.
Mount a secret volume containing the secret value in a secrets file.
Mount a secret volume containing the secret value in a secrets file.
Suggested answer: A, E

Explanation:

Objects with secure values are intended to hold sensitive information like passwords or keys for your application. Using secure values for environment variables is both safer and more flexible than including it in your container's image.

Another option is to use secret volumes, described in Mount a secret volume in Azure Container Instances..... https://docs.microsoft.com/en-us/azure/containerinstances/container-instances-environment-variables

asked 02/10/2024
Korrakot Tianniam
34 questions

Question 274

Report
Export
Collapse

You develop and deploy a web app to Azure App Service. The Azure App Service uses a Basic plan in a region.

Users report that the web app is responding must capture the complete call stack to help performance issues in code. Call stack data must be correlated across app instances. You must minimize cost and impact to users on the web app.

You need to capture the telemetry.

Which three actions should you perform? Each answer presents part Of the solution

NOTE: Each correct selection is worth point

Enable Application Insights site extensions.
Enable Application Insights site extensions.
Enable Profiler.
Enable Profiler.
Restart all apps in the App Service plan.
Restart all apps in the App Service plan.
Enable Snapshot debugger.
Enable Snapshot debugger.
Enable remote debugging.
Enable remote debugging.
Enable the Always On setting for the app service.
Enable the Always On setting for the app service.
Upgrade the Azure App Service plan to Premium
Upgrade the Azure App Service plan to Premium
Suggested answer: C, D, F
asked 02/10/2024
Yusuf E
38 questions

Question 275

Report
Export
Collapse

You are developing several microservices to deploy to a Azure Service cluster. The microservices manage data stored in Azure Cosmos DB and Azure Blob storage. The data is secured by using customer-managed keys stored in Aue Key Vault.

You must automate key rotation for all Key Vault keys and allow for manual key rotation. Keys must rotate every three months. Notifications Of expiring keys must be sent before key expiry.

You need to configure key rotation and enable key expiry notifications.

Which two actions should you perform? Each correct answer presents part Of solution.

NOTE: Each correct selection is worth

Create and configure a new Azure Event Grid instance.
Create and configure a new Azure Event Grid instance.
Create configure a key rotation policy during key creation
Create configure a key rotation policy during key creation
Create and assign an Azure Key Vault access
Create and assign an Azure Key Vault access
Configure Azure Key Vault
Configure Azure Key Vault
Suggested answer: B, D

Explanation:

https://learn.microsoft.com/en-us/azure/key-vault/keys/how-to-configure-key-rotation

asked 02/10/2024
Danilo Paolucci
42 questions

Question 276

Report
Export
Collapse

You develop Azure Web Apps for a commercial diving company. Regulations require that all divers fill out a health questionnaire every 15 days after each diving job starts.

You need to configure the Azure Web Apps so that the instance count scales up when divers are filling out the questionnaire and scales down after they are complete.

You need to configure autoscaling.

What are two possible autoscaling configurations to achieve this goal? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Predictive autoscaling
Predictive autoscaling
CPU usage-based autoscaling
CPU usage-based autoscaling
Recurrence profile
Recurrence profile
Fixed date profile
Fixed date profile
Suggested answer: A, D
asked 02/10/2024
Sergy Camilo
36 questions

Question 277

Report
Export
Collapse

You are developing a web application that uses the Microsoft identity platform to authenticate users and resources, The web application calls several REST APIs.

The APIs require an access token from the Microsoft identity platform.

You need to request a token.

Which three properties should you use? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Application name
Application name
Application secret
Application secret
Application ID
Application ID
Supported account type
Supported account type
Redirect URI/URL
Redirect URI/URL
Suggested answer: A, B, C
asked 02/10/2024
Rio Ordonez
51 questions

Question 278

Report
Export
Collapse

You are developing an Azure App Service web app.

The web app must securely store session information in Azure Redis Cache.

You need to connect the web app to Azure Redis Cache.

Which three Azure Redis Cache properties should you use? Each correct answer presents part of the solution.

Each correct selection is worth one point.

SSL port
SSL port
Subscription name
Subscription name
Location
Location
Host name
Host name
Access key
Access key
Subscription id
Subscription id
Suggested answer: A, C, D

Explanation:

https://learn.microsoft.com/en-us/azure/azure-cache-for-redis/cache-web-app-howto

asked 02/10/2024
Nenad Celikovic
38 questions

Question 279

Report
Export
Collapse

You are creating an Azure key vault using PowerShell. Objects deleted from the key vault must be kept for a set period of 90 days.

Which two of the following parameters must be used in conjunction to meet the requirement?

(Choose two.)

EnabledForDeployment
EnabledForDeployment
EnablePurgeProtection
EnablePurgeProtection
EnabledForTemplateDeployment
EnabledForTemplateDeployment
EnableSoftDelete
EnableSoftDelete
Suggested answer: B, D
asked 02/10/2024
Alex Fill
30 questions

Question 280

Report
Export
Collapse

A company maintains multiple web and mobile applications. Each application uses custom in-house identity providers as well as social identity providers.

You need to implement single sign-on (SSO) for all the applications.

What should you do?

Use Azure Active Directory B2C (Azure AD B2C) with custom policies. Most Voted
Use Azure Active Directory B2C (Azure AD B2C) with custom policies. Most Voted
Use Azure Active Directory B2B (Azure AD B2B) and enable external collaboration.
Use Azure Active Directory B2B (Azure AD B2B) and enable external collaboration.
Use Azure Active Directory B2C (Azure AD B2C) with user flows.
Use Azure Active Directory B2C (Azure AD B2C) with user flows.
Use Azure Active Directory B2B (Azure AD B2B).
Use Azure Active Directory B2B (Azure AD B2B).
Suggested answer: A

Explanation:

https://docs.microsoft.com/en-us/azure/active-directory-b2c/custom-policy-reference-sso

asked 02/10/2024
Ali Alaqoul
34 questions
Total 377 questions
Go to page: of 38
Search

Related questions