Premium

Microsoft Certified: Azure Solutions Architect Expert Certification Questions and Answer (Dumps and Practice Questions)



Question : You are deploying database (SQL Server ) in cloud, for this you are considering IOPS. Select the correct statement for IOPS

A. For capacity planning, an Azure Storage account can support a maximum of 20,000 IOPs per second
B. Azure disk can support a maximum of 500 IOPs per second in Standard Tier (40 disks)
C. A Basic Tier can support a maximum of 200 IOPs per second (100 disks)
D. Each Azure Storage account has a maximum capacity of 1000 TB

 : You are deploying database (SQL Server ) in cloud, for this you are considering IOPS. Select the correct statement for IOPS
1. A,B
2. B,C
3. Access Mostly Uused Products by 50000+ Subscribers
4. A,D
5. B,D

Correct Answer : Get Lastest Questions and Answer :
Explanation: For capacity planning, an Azure Storage account can support a maximum of 20,000 IOPs per second, and an Azure disk can support a maximum of 500 IOPs per
second in Standard Tier (40 disks). A Basic Tier can support a maximum of 300 IOPs per second (66 disks). Each Azure Storage account has a maximum capacity of 500 TB.




Question : For security reason, you consider the encryption, select the correct statement which applies in Azure

A. Encrypting the operating system disk using BitLocker is supported
B. Using third-party services allows for encryption of the operating system, and data disks
C. Encrypting the operating system disk using BitLocker is not supported. However, encrypting the data disk is


 : For security reason, you consider the encryption, select the correct statement which applies in Azure
1. A,B
2. B,C
3. Access Mostly Uused Products by 50000+ Subscribers
4. A,B,C



Correct Answer : Get Lastest Questions and Answer :
Explanation: Encrypting the operating system disk using BitLocker is not supported. However, encrypting the data disk is. Using third-party services allows for encryption
of the operating system, and data disks.







Question : Using Azure monitoring you can configure metrics such as

 : Using Azure monitoring you can configure metrics such as
1. CPU
2. Memory
3. Access Mostly Uused Products by 50000+ Subscribers
4. 1 and 2 Only
5. All 1,2 and 3



Correct Answer : Get Lastest Questions and Answer :
Explanation: Using Azure monitoring you can configure metrics such as CPU, Memory, Network, and Disk, and view the performance of your virtual machines in the management
portal Alerts can be configured per metric. Each alert requires a name, metric, threshold, and duration. After the threshold has passed the duration, an alert can email the
administrators or co-administrators of the subscription, and you can also specify a specific email address to receive the alert.




Related Questions


Question : You administer an Azure Storage account with a blob container. You enable Storage account logging for read, write and delete requests. You need to reduce the costs
associated with storing the logs. What should you do?

 : You administer an Azure Storage account with a blob container. You enable Storage account logging for read, write and delete requests. You need to reduce the costs
1. Execute Delete Blob requests over https.
2. Create an export job for your container.
3. Access Mostly Uused Products by 50000+ Subscribers
4. Execute Delete Blob requests over http.




Question : Your company is launching a public website that allows users to stream videos. You upload multiple video files to an Azure storage container.
You need to give anonymous users read access to all of the video files in the storage container. What should you do?
 : Your company is launching a public website that allows users to stream videos. You upload multiple video files to an Azure storage container.
1. Edit each blob's metadata and set the access policy to Public Blob.
2. Edit the container metadata and set the access policy to Public Container.
3. Access Mostly Uused Products by 50000+ Subscribers
4. Edit the container metadata and set the access policy to Public Blob.




Question : Your company plans to migrate from On-Premises Exchange to Exchange Online in Office . You plan to integrate your existing Active Directory Domain Services (AD DS)
infrastructure with Azure AD.
You need to ensure that users can log in by using their existing AD DS accounts and passwords. You need to achieve this goal by using minimal additional systems.
Which two actions should you perform? Each answer presents part of the solution.

A. Configure Password Sync.

B. Set up a DirSync Server.

C. Set up an Active Directory Federation Services Server.

D. Set up an Active Directory Federation Services Proxy Server.
 : Your company plans to migrate from On-Premises Exchange to Exchange Online in Office . You plan to integrate your existing Active Directory Domain Services (AD DS)
1. A,B
2. B,C
3. Access Mostly Uused Products by 50000+ Subscribers
4. A,D




Question : You manage a software-as-a-service application named SaasApp that provides
user management features in a multi-directory environment. You plan to offer SaasApp1 to
other organizations that use Azure Active Directory. You need to ensure that SaasApp1
can access directory objects. What should you do?

 : You manage a software-as-a-service application named SaasApp that provides
1. Configure the Federation Metadata URL
2. Register SaasApp1 as a native client application.
3. Access Mostly Uused Products by 50000+ Subscribers
4. Configure the Graph API.




Question : You administer an Azure Active Directory (Azure AD) tenant where Box is configured for: Application Access
Password Single Sign-on An employee moves to an organizational unit that does not require access to Box through the Access Panel.
You need to remove only Box from the list of applications only for this user.

What should you do?


 : You administer an Azure Active Directory (Azure AD) tenant where Box is configured for: Application Access
1. Delete the user from the Azure AD tenant.
2. Delete the Box Application definition from the Azure AD tenant.
3. Access Mostly Uused Products by 50000+ Subscribers
4. Disable the user's account in Windows AD.





Question : You administer an Azure Active Directory (Azure AD) tenant that has a SharePoint web application named TeamSite. TeamSite accesses your Azure AD tenant for user
information. The application access key for TeamSite1 has been compromised. You need to ensure that users can continue to use TeamSite1 and that the compromised
key does not allow access to the data in your Azure AD tenant. Which two actions should you perform? Each correct answer presents part of the solution.

A. Remove the compromised key from the application definition for TeamSite1.

B. Delete the application definition for TeamSite1.

C. Generate a new application key for TeamSite1.

D. Generate a new application definition for TeamSite1.

E. Update the existing application key.
 : You administer an Azure Active Directory (Azure AD) tenant that has a SharePoint web application named TeamSite. TeamSite accesses your Azure AD tenant for user
1. A,B
2. B,C
3. Access Mostly Uused Products by 50000+ Subscribers
4. D,E
5. C,E