Welcome! This pre-evaluation exam is designed to be used in conjunction with my AZ-305 bootcamp course. It tests your understanding of key features, topics, and services that are covered in the AZ-305 Exam: Designing Microsoft Azure Infrastructure Solutions. While this pre-evaluation exam WILL cover important concepts that you must understand before sitting for the real AZ-305 exam, this pre-evaluation exam IS NOT designed to emulate the real AZ-305 exam. The questions in this exam were written in ways that will really dig into your understanding of the topics covered in the AZ-305 certification exam. While nothing is ever guaranteed, passing this pre-evaluation exam demonstrates that you have a firm grasp of many of the requisite topics covered in the actual AZ-305 exam. This is an UNTIMED exam that consists of 34 questions. To pass, you must achieve a score of 70% or higher. The correct answers for all questions will be displayed at the completion of the exam. Click NEXT to begin the pre-evaluation exam. 1. Azure Monitor includes several different tools. Three of the options below are tools that are included in Azure Monitor. Which ones are they? VM Insights Smart Alerts Resource Mapper Container Insights Log Analytics 2. ___________ is a part of Azure Monitor that monitors the availability, performance, and usage of web applications in the cloud and on-prem.Application InsightsContainer InsightsVM InsightsLog Analytics 3. In Azure Monitor, ____________ allow you to perform data analysis and to create visual reports right in the Azure portal.DashboardsPower BIWorkbooksPlaybooks 4. _________________ is a set of tools that provides support when issues with Azure services crop up and affect your environment. It consists of three different services, including Azure Status, Service Health, and Resource Health.Azure MonitorAzure Service MonitorAzure Service HealthApplication Insights 5. ____________________ is used to collect and view security analytics data and threat intelligence data in your environment. It uses Microsoft’s analytics and threat intelligence to detect previously undetected threats, and can be used to investigate incidents, using artificial intelligence.Azure Security CenterAzure SentinelAzure MonitorAzure Attack Simulator 6. Which tool would you use to allow Steve to manage only the resources in the Finance resource group, while allowing Jen to manage only the resources in the Marketing resource group?Resource LocksResource TagsAzure RBACAzure AD RBAC 7. RBAC roles can be assigned to ______________, __________________, _________________, and _______________.Users, Resources, Groups, Managed IdentitiesUsers, Resource Groups, Management Groups, Service PrincipalsUsers, Groups, Distribution Lists, Managed AccountsUsers, Groups, Service Principals, Managed Identities 8. A _____________ is a collection of permissions that defines the actions that can be performed by the entity to which it is assigned.Role DefinitionSecurity PrincipalRole GroupManaged Identity 9. Steve is a member of the Marketing group. The Marketing group is a member of the Sales group, which has been granted the Contributor role at the subscription scope. Steve will inherit the permissions defined in the Contributor role that is assigned to the Sales group.TrueFalse 10. The Blue Widget Corp is deploying Azure AD. They will require dynamic groups, self-service group management, and self-service password reset for on-prem users. Which edition of Azure AD should they deploy in order to get these features, while minimizing costs?Azure AD FreeAzure AD BasicAzure AD Premium P1Azure AD Premium P2 11. You've been asked to check on how many users have administrative access in your Azure AD environment. Which identity governance tool should you use to accomplish this?Entitlement ManagementAzure AD Access ReviewsPrivileged Identity ManagementActivity and Auditing 12. The Blue Widget Corp is a brand-new startup in the planning stages. They want to deploy a cloud-based version of Active Directory that supports group policy, Kerberos, and NTLM. Which Active Directory solution should you recommend?Azure Active Directory FreeAzure Active Directory Premium P1Azure Active Directory Premium P2Azure Active Directory Domain Services 13. Azure AD Identity Protection default policies that administrators can choose to enable. Select the default policies below. There are multiple correct answers. MFA Registration Policy User Lockout Policy User Risk Remediation Policy User Expiry Remediation Policy Sign-In Risk Remediation Policy 14. ___________________ is an Azure AD service that allows you to manage, control, and monitor access to resources in Azure AD, Azure, and other Microsoft Online Services such as Microsoft 365 or Microsoft Intune.Azure AD Access ReviewsPrivileged Identity ManagementAzure Identity ProtectionAzure Security Center 15. You've been asked to enable just-in-time privileged access to Azure AD and Azure resources within the Blue Widget Corp subscription. Which tool or service would you use to accomplish this?Azure Security CenterResource LocksPrivileged Identity ManagementIdentity and Access Management 16. To use Privileged Identity Management, you must first have an ________________ license.Azure AD FreeAzure AD Premium P1Azure AD Premium P2All Answers Are Correct 17. The four levels of management, in order of precedence, that are available in Azure include _____________, ______________, __________________, and _________________.management groups, subscriptions, resource groups, resourcessubscriptions, tenants, resource groups, resourcesmanagement groups, tenants, subscriptions, resource groupstenants, management groups, subscriptions, resource groups 18. _______________ can be used to manage access, policy, and compliance for multiple subscriptions.TenantsSubscription GroupsManagement GroupsNone of the Above 19. The organization that you work for is an MSP that supports several dozen customers. You've been asked to streamline the management of your customers' resources via Azure delegated resource management. Which solution should you recommend to make this happen?Azure SentinelAzure LighthouseAzure MonitorAzure Management Group 20. When you create an Azure policy, you start with the _________________, which defines the conditions under which the policy will be enforced. Several policy definitions can be grouped together to form ______________. Once a policy definition or initiative has been created, __________________ is used to assign the policy definition or initiative to a scope of resources that Azure supports.policy initiative, a policy definition, an assignmentpolicy definition, a policy initiative, a scope policypolicy definition, a policy initiative, an assignmentpolicy, a policy assignment, a scope 21. ________________ focus on resource properties during deployment and for already existing resources to ensure those resources adhere to requirements and standards that you define; whereas _________________ are used to build entire environments that adhere to requirements and standards.ARM Templates, Azure PoliciesAzure Policies, Azure BlueprintsAzure Blueprints, ARM TemplatesAzure Blueprints. Azure Policies 22. There are two service tiers available in Azure Key Vault. The ____________ tier encrypts with a software key, while the _____________ tier includes HSM-protected keys.Standard, PremiumBasic, PremiumFree, StandardFree, Premium 23. When using key vault to store keys and secrets, you can monitor their access and use by enabling logging for the vault. When doing so, you can configure Azure Key Vault to archive to a storage account, or to stream to an event hub. You cannot send the logs to Azure Monitor logs.TrueFalse 24. The vCore-based purchasing model is available for both the Azure SQL Database offering and the Azure SQL Managed Instance offering.TrueFalse 25. The Database transaction unit (DTU)-based purchasing model is available for both the Azure SQL Database offering and the Azure SQL Managed Instance offering.TrueFalse 26. You've been asked by the Blue Widget Corp to deploy an Azure SQL Managed Instance. This instance will support a customer-facing app that can get quite busy. Availability is of utmost importance. Which purchasing model and service tier should you deploy?DTU-Based Purchasing Model and Business Critical TierDTU-Based Purchasing Model and HyperscalevCore Purchasing Model and Business Critical TiervCore Purchasing Model and Hyperscale 27. Azure disk encryption is used to protect both Windows and Linux virtual machines. It uses _______________ technology on Windows VMs, and _____________ on Linux VMs to protect ________________ with full volume encryption.Microsoft InTune, Let's Encrypt, the OS disk onlyWindows BitLocker, Linux DM-Crypt, both the OS disk and data disksWindows BitLocker, Linux DM-Crypt, the OS disk onlyWindows BitLocker, Linux DM-Crypt, data disks only 28. Transparent Data Encryption, or TDE, can be used to encrypt __________________ data files in real time.SQL ServerAzure SQL DatabaseAzure Synapse AnalyticsAllNone 29. The Blue Widget Corp employs 50 people who are geographically dispersed. These users all work from home. You've been asked to deploy a solution that allows them to connect to the corporate network in New York. Which solution should you deploy to ensure these users can connect, and that their connections are encrypted?Point-to-Site VPNsSite-to-Site VPNsExpressRoute ConnectionsLocal Network Gateways 30. The Single Server deployment option of Azure Database for MySQL comes in three pricing tiers: _________________, ___________________, and _________________.Basic, General Purpose, and Memory OptimizedFree, Basic, General PurposeGeneral Purpose, Advanced, Memory OptimizedFree, Basic, Standard 31. Azure Database for PostgreSQL is a _______________ database service available in the Microsoft cloud. It’s available in three deployment modes, including ___________________, ______________, and ___________________.relational, single server, flexible server, multi-servernon-relational, free, basic, premiumnon-relational, single server, flexible server, hyperscalerelational, single server, flexible server, hyperscale 32. Inventory management systems, order management systems, reporting databases, and accounting packages are common examples of solutions that leverage relational databases.TrueFalse 33. The Blue Widget Corp has asked you to deploy a storage solution that will serve as the backend for an IoT system that's being deployed. This IoT system will consist of environmental sensors that collect data. Your storage solution will need to hold this sensor data. There needs to be a separate partition for each device, and the data that is collected and stored needs to be ordered by the date and time that each measurement was captured. Which storage solution would be a viable solution?Azure File StorageAzure Table StorageAzure Queue StorageAzure Blob Storage 34. The Blue Widget Corp is deploying a new, static website to host assembly diagrams of its products. These diagrams are in image format (JPG, PNG, etc). Users will access these diagrams via their web browsers. Which storage solution should you deploy to allow the organization to serve up these images?Azure File StorageAzure Table StorageAzure Queue StorageAzure Blob Storage Time is Up! Time's up 2021-11-30