Answered step by step
Verified Expert Solution
Question
1 Approved Answer
You are planning to deploy several Linux VMs in Azure. The security team issues a policy that Linux VMs must use an authentication system other
You are planning to deploy several Linux VMs in Azure. The security team issues a policy that Linux VMs must use an authentication system other than passwords. You need to deploy an authentication method for the Linux VMs to meet the requirement. Which authentication method should you use? Select one. Group of answer choices SSH key pair Access keys Shared access signature RBAC Flag question: Question Question pts Your organization has a security policy that prohibits exposing SSH ports to the outside world. You need to connect to an Azure Linux virtual machine to install software. What should you do Select one. Group of answer choices Configure the Bastion service Configure a Guest configuration on the virtual machine Create a custom script extension Deploy RDP Flag question: Question Question pts What is the effect of the default network security settings for a new virtual machine? Group of answer choices Neither outbound nor inbound requests are allowed. Outbound request is allowed. Inbound traffic is only allowed from within the virtual network. There are no restrictions: all outbound and inbound requests are allowed. Inbound request is allowed. Outbound traffic is only allowed from within the virtual network. Flag question: Question Question pts You have several Linux virtual machines hosted in Azure. You will administer these VMs remotely over SSH from three dedicated machines in your corporate headquarters. Which of the following authentication methods would typically be considered bestpractice for this situation? Group of answer choices Username and password Private key Private key with passphrase Private key with password Flag question: Question Question pts Youre part of the DevOps team for a large food delivery company. Friday night is typically your busiest time. Conversely, AM on Wednesday is generally your quietest time. What should you implement? Select one. Group of answer choices autoscale metricbased rules schedulebased rules databased rules Flag question: Question Question pts What is Azure Automation State Configuration? Group of answer choices A declarative management platform to configure, deploy, and control systems. A service used to write, manage, and compile PowerShell Desired State Configuration DSC configurations, import DSC resources, and assign configurations to target nodes. A service that manages the state configuration on each destination, or node. A feature available after deploying a virtural machine Flag question: Question Question pts To configure an autoscale trigger based on average response time, you should select Select one. Group of answer choices Metricbased Timebased Userbased Shedulebased Flag question: Question Question pts Which of the following is a reason to select virtual machines over containers? Group of answer choices Virtual machines provide complete isolation from the host operating system and other VMs Virtual machines run the user mode portion of an operating system and can be tailored to contain just the needed services for your app. Virtual machines use Azure Disks for local storage for a single node Virtual machines are used in a scale set
You are planning to deploy several Linux VMs in Azure. The security team issues a policy that Linux VMs must use an authentication system other than passwords. You need to deploy an authentication method for the Linux VMs to meet the requirement. Which authentication method should you use? Select one.
Group of answer choices
SSH key pair
Access keys
Shared access signature
RBAC
Flag question: Question
Question pts
Your organization has a security policy that prohibits exposing SSH ports to the outside world. You need to connect to an Azure Linux virtual machine to install software. What should you do Select one.
Group of answer choices
Configure the Bastion service
Configure a Guest configuration on the virtual machine
Create a custom script extension
Deploy RDP
Flag question: Question
Question pts
What is the effect of the default network security settings for a new virtual machine?
Group of answer choices
Neither outbound nor inbound requests are allowed.
Outbound request is allowed. Inbound traffic is only allowed from within the virtual network.
There are no restrictions: all outbound and inbound requests are allowed.
Inbound request is allowed. Outbound traffic is only allowed from within the virtual network.
Flag question: Question
Question pts
You have several Linux virtual machines hosted in Azure. You will administer these VMs remotely over SSH from three dedicated machines in your corporate headquarters. Which of the following authentication methods would typically be considered bestpractice for this situation?
Group of answer choices
Username and password
Private key
Private key with passphrase
Private key with password
Flag question: Question
Question pts
Youre part of the DevOps team for a large food delivery company. Friday night is typically your busiest time. Conversely, AM on Wednesday is generally your quietest time. What should you implement? Select one.
Group of answer choices
autoscale
metricbased rules
schedulebased rules
databased rules
Flag question: Question
Question pts
What is Azure Automation State Configuration?
Group of answer choices
A declarative management platform to configure, deploy, and control systems.
A service used to write, manage, and compile PowerShell Desired State Configuration DSC configurations, import DSC resources, and assign configurations to target nodes.
A service that manages the state configuration on each destination, or node.
A feature available after deploying a virtural machine
Flag question: Question
Question pts
To configure an autoscale trigger based on average response time, you should select Select one.
Group of answer choices
Metricbased
Timebased
Userbased
Shedulebased
Flag question: Question
Question pts
Which of the following is a reason to select virtual machines over containers?
Group of answer choices
Virtual machines provide complete isolation from the host operating system and other VMs
Virtual machines run the user mode portion of an operating system and can be tailored to contain just the needed services for your app.
Virtual machines use Azure Disks for local storage for a single node
Virtual machines are used in a scale set
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started