ExamGecko
Home Home / Microsoft / AZ-204

Microsoft AZ-204 Practice Test - Questions Answers, Page 28

Question list
Search
Search

List of questions

Search

Related questions











You are developing an Azure Durable Function to manage an online ordering process.

The process must call an external API to gather product discount information.

You need to implement Azure Durable Function.

Which Azure Durable Function types should you use? Each correct answer presents part of the solution

NOTE: Each correct selection is worth ore point

A.
Orchestrator
A.
Orchestrator
Answers
B.
Entity
B.
Entity
Answers
C.
Activity
C.
Activity
Answers
D.
Client
D.
Client
Answers
Suggested answer: A, B

Explanation:

https://learn.microsoft.com/en-us/azure/azure-functions/durable/durable-functions-types-featuresoverview

You develop a Python application for image rendering that uses GPU resources to optimize rendering processes. You deploy the application to an Azure

Container Instances (ACI) Linux container.

The application requires a secret value to be passed when the container is started. The value must only be accessed from within the container.

You need to pass the secret value.

What are two possible ways to achieve this goal? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.
Create an environment variable Set the secureValue property to the secret value.
A.
Create an environment variable Set the secureValue property to the secret value.
Answers
B.
Add the secret value to the container image. Use a managed identity.
B.
Add the secret value to the container image. Use a managed identity.
Answers
C.
Add the secret value to the application code Set the container startup command.
C.
Add the secret value to the application code Set the container startup command.
Answers
D.
Add the secret value to an Azure Blob storage account. Generate a SAS token.
D.
Add the secret value to an Azure Blob storage account. Generate a SAS token.
Answers
E.
Mount a secret volume containing the secret value in a secrets file.
E.
Mount a secret volume containing the secret value in a secrets file.
Answers
Suggested answer: A, E

Explanation:

Objects with secure values are intended to hold sensitive information like passwords or keys for your application. Using secure values for environment variables is both safer and more flexible than including it in your container's image.

Another option is to use secret volumes, described in Mount a secret volume in Azure Container Instances..... https://docs.microsoft.com/en-us/azure/containerinstances/container-instances-environment-variables

You develop and deploy a web app to Azure App Service. The Azure App Service uses a Basic plan in a region.

Users report that the web app is responding must capture the complete call stack to help performance issues in code. Call stack data must be correlated across app instances. You must minimize cost and impact to users on the web app.

You need to capture the telemetry.

Which three actions should you perform? Each answer presents part Of the solution

NOTE: Each correct selection is worth point

A.
Enable Application Insights site extensions.
A.
Enable Application Insights site extensions.
Answers
B.
Enable Profiler.
B.
Enable Profiler.
Answers
C.
Restart all apps in the App Service plan.
C.
Restart all apps in the App Service plan.
Answers
D.
Enable Snapshot debugger.
D.
Enable Snapshot debugger.
Answers
E.
Enable remote debugging.
E.
Enable remote debugging.
Answers
F.
Enable the Always On setting for the app service.
F.
Enable the Always On setting for the app service.
Answers
G.
Upgrade the Azure App Service plan to Premium
G.
Upgrade the Azure App Service plan to Premium
Answers
Suggested answer: C, D, F

You are developing several microservices to deploy to a Azure Service cluster. The microservices manage data stored in Azure Cosmos DB and Azure Blob storage. The data is secured by using customer-managed keys stored in Aue Key Vault.

You must automate key rotation for all Key Vault keys and allow for manual key rotation. Keys must rotate every three months. Notifications Of expiring keys must be sent before key expiry.

You need to configure key rotation and enable key expiry notifications.

Which two actions should you perform? Each correct answer presents part Of solution.

NOTE: Each correct selection is worth

A.
Create and configure a new Azure Event Grid instance.
A.
Create and configure a new Azure Event Grid instance.
Answers
B.
Create configure a key rotation policy during key creation
B.
Create configure a key rotation policy during key creation
Answers
C.
Create and assign an Azure Key Vault access
C.
Create and assign an Azure Key Vault access
Answers
D.
Configure Azure Key Vault
D.
Configure Azure Key Vault
Answers
Suggested answer: B, D

Explanation:

https://learn.microsoft.com/en-us/azure/key-vault/keys/how-to-configure-key-rotation

You develop Azure Web Apps for a commercial diving company. Regulations require that all divers fill out a health questionnaire every 15 days after each diving job starts.

You need to configure the Azure Web Apps so that the instance count scales up when divers are filling out the questionnaire and scales down after they are complete.

You need to configure autoscaling.

What are two possible autoscaling configurations to achieve this goal? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.
Predictive autoscaling
A.
Predictive autoscaling
Answers
B.
CPU usage-based autoscaling
B.
CPU usage-based autoscaling
Answers
C.
Recurrence profile
C.
Recurrence profile
Answers
D.
Fixed date profile
D.
Fixed date profile
Answers
Suggested answer: A, D

You are developing a web application that uses the Microsoft identity platform to authenticate users and resources, The web application calls several REST APIs.

The APIs require an access token from the Microsoft identity platform.

You need to request a token.

Which three properties should you use? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.
Application name
A.
Application name
Answers
B.
Application secret
B.
Application secret
Answers
C.
Application ID
C.
Application ID
Answers
D.
Supported account type
D.
Supported account type
Answers
E.
Redirect URI/URL
E.
Redirect URI/URL
Answers
Suggested answer: A, B, C

You are developing an Azure App Service web app.

The web app must securely store session information in Azure Redis Cache.

You need to connect the web app to Azure Redis Cache.

Which three Azure Redis Cache properties should you use? Each correct answer presents part of the solution.

Each correct selection is worth one point.

A.
SSL port
A.
SSL port
Answers
B.
Subscription name
B.
Subscription name
Answers
C.
Location
C.
Location
Answers
D.
Host name
D.
Host name
Answers
E.
Access key
E.
Access key
Answers
F.
Subscription id
F.
Subscription id
Answers
Suggested answer: A, C, D

Explanation:

https://learn.microsoft.com/en-us/azure/azure-cache-for-redis/cache-web-app-howto

You are creating an Azure key vault using PowerShell. Objects deleted from the key vault must be kept for a set period of 90 days.

Which two of the following parameters must be used in conjunction to meet the requirement?

(Choose two.)

A.
EnabledForDeployment
A.
EnabledForDeployment
Answers
B.
EnablePurgeProtection
B.
EnablePurgeProtection
Answers
C.
EnabledForTemplateDeployment
C.
EnabledForTemplateDeployment
Answers
D.
EnableSoftDelete
D.
EnableSoftDelete
Answers
Suggested answer: B, D

A company maintains multiple web and mobile applications. Each application uses custom in-house identity providers as well as social identity providers.

You need to implement single sign-on (SSO) for all the applications.

What should you do?

A.
Use Azure Active Directory B2C (Azure AD B2C) with custom policies. Most Voted
A.
Use Azure Active Directory B2C (Azure AD B2C) with custom policies. Most Voted
Answers
B.
Use Azure Active Directory B2B (Azure AD B2B) and enable external collaboration.
B.
Use Azure Active Directory B2B (Azure AD B2B) and enable external collaboration.
Answers
C.
Use Azure Active Directory B2C (Azure AD B2C) with user flows.
C.
Use Azure Active Directory B2C (Azure AD B2C) with user flows.
Answers
D.
Use Azure Active Directory B2B (Azure AD B2B).
D.
Use Azure Active Directory B2B (Azure AD B2B).
Answers
Suggested answer: A

Explanation:

https://docs.microsoft.com/en-us/azure/active-directory-b2c/custom-policy-reference-sso

You are developing an application to store business-critical data in Azure Blob storage. The application must meet the following requirements:

- Data must not be modified or deleted for a user-specified interval.

- Data must be protected from overwntes and deletes.

- Data must be written once and allowed to be read many times.

You need to protect the data fen the Azure Blob storage account.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.
Enable version-level immutability support for the storage account.
A.
Enable version-level immutability support for the storage account.
Answers
B.
Create an account shared-access signature (SAS).
B.
Create an account shared-access signature (SAS).
Answers
C.
Enable point-in-time restore for containers in the storage account.
C.
Enable point-in-time restore for containers in the storage account.
Answers
D.
Create a service shared-access signature (SAS).
D.
Create a service shared-access signature (SAS).
Answers
E.
Enable the blob change feed for the storage account.
E.
Enable the blob change feed for the storage account.
Answers
Suggested answer: D, E
Total 345 questions
Go to page: of 35