fbpx Skip to content

All About Azure Crossword Answer Key

App The Azure __________ Service is an HTTP-based service for hosting web applications, REST APIs, and mobile back ends.

Zones Availability __________ are unique physical locations within an Azure region. Each one is made up of one or more datacenters equipped with independent power, cooling, and networking.

Functions Azure ____________is a serverless solution that allows you to write less code, maintain less infrastructure, and save on costs.

Lighthouse Azure ____________ enables multi-tenant management with scalability, higher automation, and enhanced governance across resources.

Batch Azure _________ is used to run large-scale parallel and high-performance computing batch jobs efficiently in Azure.

distributed  Azure Service Fabric is a ___________ systems platform that makes it easy to package, deploy, and manage scalable and reliable microservices and containers.

hybrid A ___________ cloud is a type of cloud computing that combines on-premises infrastructure—or a private cloud—with a public cloud.

scalability  The ability to increase or decrease resources for a given workload

elasticity The ability to automatically or dynamically increase or decrease resources as necessary

agility The ability to react quickly. Cloud services can allocate and deallocate resources quickly

Functions Azure _______ allows you to implement your system’s logic into readily available blocks of code

MFA Provides added security for user authentications by requiring two or more elements for authentication

Application An Azure __________ Security Group allows you to configure network security as an extension of an application’s structure

Network An Azure __________ Security Group filters network traffic to and from Azure resources connected to Azure Virtual Networks

DevOps provides developer services for support teams to plan work, collaborate on code development, and build and deploy applications

Blob Azure ________ Storage is often used to serve images or documents directly to a browser

Files Azure ________ are fully managed file shares in the cloud that are accessible via the industry standard Server Message Block (SMB) protocol or Network File System (NFS) protocol

Firewall The Azure _______ is Microsoft’s managed network security service in Azure that protects Azure Virtual Network resources

Sentinel Azure _______ is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution

Policy Azure _______ is used to create, assign, and manage policies that enforce different rules and effects over your resources

RBAC Provides fine-grained access management for Azure resources

locks Resource _______ are used to prevent accidental deletion or modification of Azure resources

Blueprints   Azure _______ is used to define repeatable sets of Azure resources that implement and adhere to standards, patterns, and requirements

tags Azure _______ are used to logically organize your Azure resources

Monitor Azure _______ allows you to collect, analyze, and act upon telemetry from both cloud and on-prem environments

geographies  Discrete markets that preserve data residency and compliance boundaries that typically contain two or more regions

Zones Availability _______ are physically separate locations within an Azure region

compute Azure _______ is Microsoft’s cloud-based on-demand computing service that provides computing resources such as disks, CPUs, memory, networking, and OS

scaleset A VM _______ is a set of identically-configured virtual machines that supports true auto-scale

vNet An Azure _______ allows several types of Azure resources to securely communicate

Gateway A Virtual Network _______ sends encrypted traffic over the public internet between an Azure Virtual Network and an on-prem network and provides a secure connection from an on-prem environment to Azure

application  An Azure _______ Gateway provides for the management of traffic to web applications

SaaS Microsoft Office 365 is an example of _________.

PaaS Azure SQL Managed Instance is an example of ____________.

federation To use traditional AD with Software-as-a-Service applications, you need to deploy a _____________ solution.

Kerberos When a user authenticates from an Azure ADDS-joined device, applications can use ________________ or NTLM for authentication to support legacy applications that have been migrated to VMs in the cloud.

Intune Used to manage Azure AD joined Windows machines.

hyperscale The _________________ service tier is designed for most business workloads. It offers auto-scaling storage, fluid vertical and horizontal compute scaling, fast database restore, and is only available for Single Azure SQL Databases.

scalability  Using dynamic _________________ allows a database to transparently respond to quickly-changing resource requirements. As a result, you only pay for the resources that you need when you need them.

Bitlocker Used on Windows VMs to encrypt disks.

DM-Crypt Used on Linux VMs to encrypt disks.

site-to-site A ____________________ VPN can be used to connect an on-prem network to an Azure virtual network, through an IPsec or IKE1/2 VPN tunnel over the internet.

basic The Single Server deployment option of Azure Database for MySQL comes in three pricing tiers: ________________, General Purpose, and Memory Optimized.

table Azure __________________ storage leverages the NoSQL key-value model where data for a given item is stored as a set of fields, and the item is identified by a unique key.

hot When you create blob storage, the _____________ tier is the default tier.

files Since many apps access data through file-based APIs, Azure __________________ is often a good solution to leverage when migrating existing applications to the cloud.

reader A user who has been assigned the Global _______________ role can access Azure Identity Protection.

Risk A User _________________ Policy allows Identity Protection to calculate what it believes is normal for a user’s behavior. It then uses this information to determine the probability that an identity has been compromised.

PIM Can be used to provide just-in-time access to Azure AD and Azure resources.

metrics Data that consists of numerical values that describe some aspect of a system at a specific point in time.

queries Log data that gets collected by Azure Monitor is analyzed with __________.

Application  The part of Azure Monitor that monitors the availability, performance, and usage of web applications in the cloud and on-prem is called _____________ Insights.

Groups Management ______________ can be used to manage access, policy, and compliance for multiple subscriptions.

Policy Azure ____________ evaluates Azure resources by comparing the properties of those resources to business rules that you define.

public A _______________ Load Balancer can be used to manage outbound connections to the internet from Azure resources.

ExpressRoute Allows you to extend your on-prem network into the Microsoft cloud over a private connection.

Bastion Azure _______________ is a service that you can deploy that allows you to connect to virtual machines via a web browser and the Azure portal.

basic When you deploy an Azure resource, you automatically get DDoS protection via the _________ DDoS protection plan.

Firewall You can use Azure _____________ to create, enforce, and log application and network connectivity policies across multiple subscriptions and multiple virtual networks.

multi-tier Traffic Manager is often used to deploy _____________ applications that require high availability and disaster recovery.

Just getting started with Azure? Consider enrolling in my AZ-900 course. If you are looking for more advanced Azure coverage, enroll in my AZ-305 course.

© 2023 Thomas J Mitchell / TomTeachesIT