In the SaaS model, the _____________ manages application data.
For all VMs that have two or more instances deployed across two or more Availability ______________ in the same Azure region, Microsoft guarantees you will have Virtual Machine Connectivity to at least one instance at least 99.99% of the time.
Azure _______ allows you to collect, analyze, and act upon telemetry from both cloud and on-prem environments
Azure Data _____________ is used to send terabytes of data into and out of Azure in a quick, inexpensive, and reliable way.
Azure _______ allows you to implement your system’s logic into readily available blocks of code
Azure _____________ Analytics is a fully managed data warehouse in Azure.
A _____________ support plan is recommended for trial and non-production environments.
__________ Storage is high-performance, highly durable block storage for Azure Virtual Machines.
___________ redundant storage replicates data three times within a single data center in the primary region and provides at least 11 nines of durability of objects over a given year.
The _____________ support plan offers Sev A responses within 1 hour and Sev B responses within 4 hours.
The purchase of hardware usually falls into the __________ model.
______________ provides managed domain services like domain join, group policy, LDAP, and Kerberos/NTLM authentication without the need to deploy, manage, or patch domain controllers.
Azure Key Vault can be used to securely store tokens, passwords, ______________, API keys, and other secrets.
______________ can be used to establish connections to Microsoft cloud services, such as Microsoft Azure and Microsoft 365.
The Microsoft _____________ Statement provides details on the personal data that is collected by Microsoft.
When an Azure service is in ___________ Preview, it’s only available to select customers who have signed up to the program.
Azure _________ Apps is a cloud-based platform that you can use to create and run automated workflows that integrate apps, data, services, and systems.
Microsoft Azure Storage ____________ is a standalone app that you can use to work with Azure Storage data on Windows, macOS, and Linux.
In the ________ cloud model, all hardware resources are owned by a third party, and shared bewteen multiple tenants.
For all VMs that have two or more instances deployed in the same Availability ___________, Microsoft guarantees you will have Virtual Machine Connectivity to at least one instance at least 99.95% of the time.
________________ disks are designed for 99.999% availability.
There are ______________ Availability Zones per supported Azure region.
Azure Identity _____________ allows organizations to automate the detection and remediation of identity-based risks.
You can use an _______________ to filter network traffic to and from Azure resources in an Azure virtual network.
The Azure ______ Service is an HTTP-based service for hosting web applications, REST APIs, and mobile back ends
An Azure _______________ is a boundary for permissions to resources and for billing.
The dedicated subnet for a virtual network gateway is named _____________, and cannot be renamed.
Public IP addresses in Azure are a ___________ offering.
A _____________ support plan is recommended for production workload environments
_______________ is the act of validating that users are whom they claim to be. It is the first step in any security process.
Resource _______ are used to prevent accidental deletion or modification of Azure resources
__________ templates can be used to automate the creation of Azure resources.
When creating a site-to-site VPN between an on-prem network and Azure, the __________ network gateway represents the on-prem endpoint of the VPN.
Azure _______________ is a managed Apache Hadoop cluster in Azure that can be used to process mass amounts of data.
Provides fine-grained access management for Azure resources
Azure Cosmos DB is a _____________ offering.
The ability to increase or decrease resources for a given workload
When implementing a ____________ solution, the customer is responsible for configuring the solution.
When you deploy Azure VMs, you are leveraging __________.
The Azure App Service is an example of a ____________ offering.
Microsoft ____________ delivers intelligent security analytics and threat intelligence across the enterprise, and provides a single solution for attack detection, threat visibility, proactive hunting, and threat response.
In Azure AD Identity Protection, a _________ risk represents the probability that a specific authentication request is not authorized by the identity’s owner.
The ability to automatically or dynamically increase or decrease resources as necessary
You should select the _________ routing option when are using Traffic Manager with endpoints in different geographic locations and you want end users to use the “closest” endpoint for the lowest network latency.
An Azure ___________ can be used to prevent the creation of VMs in a resource group, while still allowing other resources to be created in the resource group.
When deploying multiple VMs to run a custom app that your company needs, if those VMs are deployed to at least ___________ availability zones, the app will continue to run in the event of a single data center failure.
_______________ is one way to create an Azure VM from an Android tablet.
Azure _____________ provides secure and seamless RDP/SSH connectivity to virtual machines directly from the Azure portal over TLS.
Azure Cosmos DB supports _____________.
The type of load balancer you should use to load balance traffic inside a virtual network.
A ____________ is used to allow Azure resources to securely communicate with each other, the internet, and on-premises networks.
Before encrypting a VM in Azure, you must first create an Azure Key __________.
Azure _______ is used to create, assign, and, manage policies that enforce different rules and effects over your resources
Azure _____________ is a service that allows network traffic filtering across multiple Azure subscriptions.
provides developer services for support teams to plan work, collaborate on code development, and build and deploy applications
Azure _______ are used to logically organize your Azure resources
Azure ___________ Labs is a service that allows developers to efficiently self-manage virtual machines and PaaS resources without waiting for approvals.
The __________ Center can be used to identify whether or not Azure complies with your company’s regional requirements.
Azure Network ____________ monitors and repairs the network health of IaaS offerings like VMs, vNets, Load Balancers, etc.
Every property in Azure is protected by Azure DDoS Protection __________ at no additional cost.
A network security group can be attached to a network interface on a VM, a virtual network, or a ____________.
You can use the Azure _____________ to purchase third-party virtual appliances to deploy to your Azure subscription.
Azure Traffic Manager is a __________-based traffic load balancer that allows you to distribute traffic to your public facing applications across the global Azure regions.
Functions is a ________________ compute service.
An Azure _______ Gateway provides for the management of traffic to web applications
You should create a separate ___________ for each of the 5 geographical locations in your organization if they all need to specify their own payment options for Azure services that they consume.
The Apache Spark-based analytics service available in Azure is called Azure _________________.
The ability to react quickly. Cloud services can allocate and deallocate resources quickly
A ___________ cloud is created when a company extends its private cloud to Azure.
__________-redundant storage replicates your Azure Storage data synchronously across three Azure availability zones in the primary region.
Private IP addresses in Azure are a ___________ offering.
Azure _____________ can be used to estimate the costs of an Azure solution.
Azure Backup offers ___________ types of replication to keep storage/data highly available.
Web __________ Firewall can be deployed with Azure Application Gateway, Azure Front Door, and Azure CDN service to provide centralized protection of web applications from common exploits and vulnerabilities.
Availability _______ are physically separate locations within an Azure region
An Virtual Network _______ sends encrypted traffic over the public internet between an Azure Virtual Network and an on-prem network and provides a secure connection from an on-prem environment to Azure
Azure ________________ are used to define the requirements for Azure resource properties during deployment and for pre-existing resources.
An Azure Availability ___________ can be used to protect your Azure solution from a rack failure within an Azure data center.
If you want to be alerted whenever someone stops an Azure VM, you should configure Azure _____________.
To allow only HTTP traffic from the internet to an Azure VM, what can you utilize?
When creating a site-to-site VPN between an on-prem network and Azure, the __________ network gateway represents the Azure endpoint of the VPN.
A _____________ load balancer can provide outbound connections for virtual machines inside your virtual network.
Azure ________ Storage is often used to serve images or documents directly to a browser
Discrete markets that preserve data residency and compliance boundaries that typically contain two or more regions
To run a PowerShell script on a computer that runs macOS, you must first install PowerShell ___________ on the machine.
An Azure Availability ___________ can be used to protect your Azure solution from an Azure data center failure.
_____________ is an example of elasticity.
An Azure service is available to all Azure customers when it reaches __________ preview.
A ____________-to-site VPN gateway connection allows you to create a secure connection to a virtual network from an individual client computer.
IP addresses, service tags, and ___________ security groups can be used as a source for an NSG’s inbound security rule.
Using __________ to label resources allows you to generate billing reports that show Azure resource utilization, broken down by department.
Office 365 is considered a ____________ offering.
The Blue Widget Corp has a Software Assurance agreement that covers Windows Server licenses. Because of this, the organization can leverage the Azure _________ Benefit to minimize licensing costs when deploying VMs.
Azure ______ is Microsoft’s managed network security service in Azure that protects Azure Virtual Network resources
Azure _____________ can be used to identify underutilized Azure VMs.
Azure __________ is a distributed network of servers that can efficiently deliver web content to users. It stores cached content on edge servers in point-of-presence locations that are close to end users, to minimize latency.
You can use the Azure _________ service to create a storage solution that allows Windows 10 machines to map network drives to it.
Azure _______ is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution
Azure _______ is Microsoft’s cloud-based on-demand computing service that provides computing resources such as disks, CPUs, memory, networking, and OS
______________ in system security is the process of giving a user permission to access a specific resource or function.
Azure Monitor workbooks can be used to automate responses to threats that are detected by Azure ___________.
The Azure __________ service offers a set of version control tools that can be used to manage code.
Microsoft ____________for Cloud provides you with a Secure Score, which allows you to see, at a glance, what your current security situation is.
Azure Site Recovery is used to provide fault _____________ for virtual machines.
Azure _______ is used to define repeatable sets of Azure resources that implement and adhere to standards, patterns, and requirements
________________ security groups allow you to configure network security as a natural extension of an application’s structure by allowing you to group virtual machines and define network security policies based on those groups.
Provides added security for user authentications by requiring two or more elements for authentication
An Azure __________ Security Group filters network traffic to and from Azure resources connected to Azure Virtual Networks
An Availability _____________ has its own distinct power source, network, and cooling.
Azure ________ are fully managed file shares in the cloud that are accessible via the industry standard Server Message Block (SMB) protocol or Network File System (NFS) protocol
A VM _______ is a set of identically-configured virtual machines that supports true auto-scale
Azure DDoS Protection _____________ is a paid offerings that when, combined with application design best practices, provides enhanced DDoS mitigation features to defend against DDoS attacks.
The ____________ model refers to the accounting model where you pay for services as you use them.