Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

You are planning to deploy several Linux VMs in Azure. The security team issues a policy that Linux VMs must use an authentication system other

You are planning to deploy several Linux VMs in Azure. The security team issues a policy that Linux VMs must use an authentication system other than passwords. You need to deploy an authentication method for the Linux VMs to meet the requirement. Which authentication method should you use? Select one.
Group of answer choices
SSH key pair
Access keys
Shared access signature
RBAC
Flag question: Question 2
Question 21 pts
Your organization has a security policy that prohibits exposing SSH ports to the outside world. You need to connect to an Azure Linux virtual machine to install software. What should you do? Select one.
Group of answer choices
Configure the Bastion service
Configure a Guest configuration on the virtual machine
Create a custom script extension
Deploy RDP
Flag question: Question 3
Question 31 pts
What is the effect of the default network security settings for a new virtual machine?
Group of answer choices
Neither outbound nor inbound requests are allowed.
Outbound request is allowed. Inbound traffic is only allowed from within the virtual network.
There are no restrictions: all outbound and inbound requests are allowed.
Inbound request is allowed. Outbound traffic is only allowed from within the virtual network.
Flag question: Question 4
Question 41 pts
You have several Linux virtual machines hosted in Azure. You will administer these VMs remotely over SSH from three dedicated machines in your corporate headquarters. Which of the following authentication methods would typically be considered best-practice for this situation?
Group of answer choices
Username and password
Private key
Private key with passphrase
Private key with password
Flag question: Question 5
Question 51 pts
Youre part of the DevOps team for a large food delivery company. Friday night is typically your busiest time. Conversely, 7 AM on Wednesday is generally your quietest time. What should you implement? Select one.
Group of answer choices
autoscale
metric-based rules
schedule-based rules
data-based rules
Flag question: Question 6
Question 61 pts
What is Azure Automation State Configuration?
Group of answer choices
A declarative management platform to configure, deploy, and control systems.
A service used to write, manage, and compile PowerShell Desired State Configuration (DSC) configurations, import DSC resources, and assign configurations to target nodes.
A service that manages the state configuration on each destination, or node.
A feature available after deploying a virtural machine
Flag question: Question 7
Question 71 pts
To configure an autoscale trigger based on average response time, you should select ... Select one.
Group of answer choices
Metric-based
Time-based
User-based
Shedule-based
Flag question: Question 8
Question 81 pts
Which of the following is a reason to select virtual machines over containers?
Group of answer choices
Virtual machines provide complete isolation from the host operating system and other VMs.
Virtual machines run the user mode portion of an operating system and can be tailored to contain just the needed services for your app.
Virtual machines use Azure Disks for local storage for a single node
Virtual machines are used in a scale set

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

SQL Instant Reference

Authors: Gruber, Martin Gruber

2nd Edition

0782125395, 9780782125399

More Books

Students also viewed these Databases questions

Question

4.6 Summarize job design concepts.

Answered: 1 week ago

Question

4.5 Explain what competencies and competency modeling are.

Answered: 1 week ago