Question : You work for a company named ABC.com. Your role as Cloud Administrator includes the management of the company's public and private cloud infrastructure. The company has an Azure tenant. The company has a development department. Developers are creating a new application that will be used by company employees and customers to manage users in Azure Active Directories. The application must be able to perform the following actions on Azure Active Directory objects: .Create new users. .Delete users. .Update user account properties. .Change user account password. You need to ensure that the application can perform the required operations. Which of the following actions should you perform?
1. You should configure Active Directory Federation Services 2.0 (AD FS). 2. You should configure the application to run on Azure a software-as-a-service (SaaS). 3. You should configure the Graph API. 4. You should configure the application as an Identity Provider.
Correct Answer : 3 Explanation: The graph API is used by applications to create, read, update, or delete directory objects in Azure Active Directory. An application must be configured for either the Read Directory Data or Read And Write Directory Data permissions to use the graph API. The Azure Active Directory Graph API provides programmatic access to Azure AD through REST API endpoints. Applications can use the Graph API to perform create, read, update, and delete (CRUD) operations on directory data and objects. For example, the Graph API supports the following common operations for a user object: Create a new user in a directory Get a user's detailed properties, such as their groups Update a user's properties, such as their location and phone number, or change their password Check a user's group membership for role-based access Disable a user's account or delete it entirely In addition to user objects, you can perform similar operations on other objects such as groups and applications. To call the Graph API on a directory, the application must be registered with Azure AD and be configured to allow access to the directory. This is normally achieved through a user or admin consent flow.
The Graph API enables many application scenarios. The following scenarios are the most common: Line of Business (Single Tenant) Application: In this scenario, an enterprise developer works for an organization that has an Office 365 subscription. The developer is building a web application that interacts with Azure AD to perform tasks such assigning a license to a user. This task requires access to the Graph API, so the developer registers the single tenant application in Azure AD and configures read and write permissions for the Graph API. Then the application is configured to use either its own credentials or those of the currently sign-in user to acquire a token to call the Graph API. Software as a Service Application (Multi-Tenant): In this scenario, an independent software vendor (ISV) is developing hosted multi-tenant web application that provides user management features for other organizations that use Azure AD. These features require access to directory objects, and so the application needs to call the Graph API. The developer
registers the application in Azure AD, configures it to require read and write permissions for the Graph API, and then enables external access so that other organizations can consent to use the application in their directory. When a user in another organization authenticates to the application for the first time, they are shown a consent dialog with the permissions the application is requesting. Granting consent will then give the application those requested permissions to the Graph API in the user's directory. For more information on the consent framework, see Overview of the Consent Framework.
Question : You work as a Messaging Administrator at ABC.com. The company has a single Active Directory Domain Services (AD DS) domain and has , employees. The company currently has a Microsoft Exchange Server on-premises environment. The company plans to implement an Office 365 Exchange online environment in a hybrid configuration. Some mailboxes will be hosted on Exchange online and some mailboxes will be hosted on Exchange on-premises for a period of time. Eventually, all mailboxes will be migrated to Exchange online. You want users to be able to log on the Azure Active Directory (AD) by using their current Active Directory Domain Services (AD DS) user names and passwords. Which of the following services are the minimum system requirements to achieve this goal?
1. Active Directory Federation Services 2.0 (AD FS) and Directory Sync with Password Sync enabled. 2. Active Directory Domain Services (AD DS) domain controllers hosted on-premise and on Azure. 3. Directory Sync with Password Sync enabled. 4. Active Directory Federation Services Server 2.0 (AD FS), Active Directory Federation Services (AD FS) Proxy and Directory Sync with Password Sync enabled. 5. Active Directory Federation Services 2.0 (AD FS) and Directory Sync.
Correct Answer : 3 Explanation: Active Directory Federation Services (AD FS) simplifies access to systems and applications using a claims-based access (CBA) authorization mechanism to maintain application security. AD FS supports Web single-sign-on (SSO) technologies that help information technology (IT) organizations collaborate across organizational boundaries. AD FS 2.0 is a downloadable Windows Server 2008 update that is the successor to AD FS 1.0, which was first delivered in Windows Server 2003 R2, and AD FS 1.1, which was made available as a server role in Windows Server 2008 and Windows Server 2008 R2. Previous versions of AD FS are referred to collectively as AD FS 1.x.
Active Directory Federation Services (AD FS) 2.0 helps simplify access to applications and other systems with an open and interoperable claims-based model. The AD FS 2.0 platform provides a fully redesigned Windows-based Federation Service that supports the WS-Trust, WS-Federation, and Security Assertion Markup Language (SAML) protocols.
Active Directory Federation Services (AD FS) makes it possible for local users and federated users to use claims-based single sign-on (SSO) to Web sites and services. You can use AD FS to enable your organization to collaborate securely across Active Directory domains with other external organizations by using identity federation. This reduces the need for duplicate accounts, management of multiple logons, and other credential management issues that can occur when you establish cross-organizational trusts.
Question : You work for a company named ABC.com. Your role as Cloud Administrator includes the management of the company's public and private cloud infrastructure. The company has an Azure Active Directory (Azure AD) tenant. All users have user accounts in Azure Active Directory (AD). The company has an Intranet web application hosted in Azure. The web application can read and modify user account information in Azure AD. You suspect that the application key has been compromised. You need to prevent access to the Azure AD by using the key. Users must continue to be able to use the web application. Which of the following actions should you perform?
1. Modify the existing key in the application definition. 2. Remove the old key and generate a new key for the application. 3. Delete the web application and configure a new application. 4. Disable the graph API.
Correct Answer : 2 Explanation: If the app secret key is compromised, we can create a new one for 1 or 2 years. When saving the settings, a new key is generated. We can use this key to replace the old one in our app. So all keys we need in our app can be managed here in the Azure portal. They are stored directly in the WAAD.
We also can manage users and groups here. Change to the Users or Groups menu and add new objects into the AD.
1. Adding the VMs to an Availability Set. 2. Adding the VMs to separate Availability Sets. 3. Adding the VMs to an Affinity Group. 4. Adding the VMs to separate Affinity Groups.
You should ALWAYS specify an availability set when creating more than one virtual machine for the same purpose.
Examples:
Two or more web servers Two or more SQL servers Two or more AD servers you get the idea Specifying an availability set in these situations gives you multiple advantages.
Highly Available Hardware
Putting two or more VMs in availability sets guarantees that your VMs are spread across multiple racks in the Windows Azure Data Centers. This means redundant power supply, switches and servers.
Rolling Host Updates
Grouping VMs in availability sets also gives the Windows Azure Fabric Controller the information it needs to intelligently update the host OSs that your guest VMs are running on. Without availability sets the FC would have no idea that two machines were serving the same purpose and could reasonable take them both down for host OS updates.
99.95% SLA
If you wish to have the 99.95% SLA guaranteed by Windows Azure for uptime using availability sets is the way to achieve it.
Question : You work for a company named ABC.com. Your role as Cloud Administrator includes the management of the company's public and private cloud infrastructure. You have applications and virtual machines hosted on Windows Azure. All company employees use an application named CorpApp. The CorpApp application runs as a Windows Azure Cloud Service. Two instances of a virtual machine (VM) running in Windows Azure perform back-end functionality for the CorpApp application. The VMs access large amounts of data that is stored in a Windows Azure Storage Account. You want to optimize the performance of the CorpApp application by locating the cloud service and VMs in a data center as close to the storage services as possible. Which of the following actions should you perform?
1. You should add the services to the same availability group. 2. You should add the services to the same affinity group. 3. You should add the services to the same IP address subnet.. 4. You should add the services to the same virtual network.
1. You should configure port forwarding on the corporate firewall.
2. You should add an endpoint to AppVM1. 3. You should add a static route to AppVM1. 4. You should configure Network Address Translation (NAT) on the corporate firewall.
1. You should configure Network Out monitoring. 2. You should configure Network In monitoring. 3. You should configure Disk Write Bytes/sec monitoring. 4. You should configure Endpoint monitoring.