You are on page 1of 19

Az-104

Multiple choice

Another IT administrator creates an Azure virtual machine scale set with 5 VMs. Later, you notice
that the VMs are all running at max capacity with the CPU being fully consumed. However,
additional VMs are not deploying in the scale set. You need to ensure that additional VMs are
deployed when the CPU is 75% consumed. What should you do?

Select one.

■ Enable the autoscale option.

† Increase the instance count.

† Add the scale set automation script to the library

Multiple choice

Your organization has an app that is used across the business. The performance of this app is critical
to day-to-day operations. Because the app is so important, four IT administrators have been
identified to address any issues. You have configured an alert and need to ensure the administrators
are notified if there is a problem. In which area of the portal will you provide the administrator email
addresses?

Select one.

† Activity log

† Performance group

■ Action Group

Multiple choice

You are using blob storage. Which of the following is true? Select one.

† The cool access tier is for frequent access of objects in the storage account.

† The hot access tier is for storing large amounts of data that is infrequently accessed.

■ You can switch between hot and cool performance tiers at any time.
Multiple choice

You are configuring VNet Peering across two Azure two virtual networks, VNET1 and VNET2. You are
configuring the VPN Gateways. You want VNET2 to be able to use to VNET1's gateway to get to
resources outside the peering. What should you do?

Select one.

■ Select allow gateway transit on VNET1 and use remote gateways on VNET2.

† Select allow gateway transit on VNET2 and use remote gateways on VNET1.

† Select allow gateway transit and use remote gateways on both VNET1 and VNET2.

Multiple choice

Your users want to sign-in to devices, apps, and services from anywhere. They want to sign-in using
an organizational work or school account instead of a personal account. You must ensure corporate
assets are protected and that devices meet standards for security and compliance. Specifically, you
need to be able to enable or disable a device. What should you do?

Select one.

† Enable the device in Azure AD.

■ Join the device to Azure AD.

† Register the device with Azure AD.

Multiple choice

Identify three differences from the following list between Azure Active Directory (AD) and Active
Directory Domain Services (AD DS). Select three.

■ Azure AD uses HTTP and HTTPS communications

Azure AD uses Kerberos authentication

■ There are no Organizational Units (OUs) or Group Policy Objects (GPOs) in Azure AD

■ Azure AD includes Federation Services

Azure AD can be queried through LDAP


Multiple choice

Your company is preparing to move some services andVMs to Microsoft Azure. The company has
opted to use Azure DNS to provide name resolution. A project begins to configure the name
resolution. The project identifies the following requirements:

● A new domain will be used.

● The domain will have DNS records for internal and external resources.

● Minimize ongoing administrative overhead.

You need to prepare and configure the environment with a new domain name and a test hostname
of WWW.Which of the following steps should you perform? (Each answer presents part of the
solution. Choose three.)

■ Register a domain name with a domain registrar.

Register a domain name with MicrosoftAzure.

■ Delegate the new domain name to Azure DNS.

Add an Address (A) record for Azure name servers in the zone.

Add DNS glue records to point to the Azure name servers.

■ Add a record for WWW.

Multiple choice

You are administering a production web app. The app requires scaling to five instances, 40GB of
storage, and a custom domain name. Which App Service Plan should you select? Select one.

† Basic

■ Standard

† Premium

Multiple choice

You want to connect different VNets in the same region as well as different regions and decide to
use VNet peering to accomplish this. Which of the following statements are true benefits of VNet
peering?

Select two.

The virtual networks can exist in any Azure cloud region.

■ Network traffic between peered virtual networks is private.

■ Peering is easy to configure and manage, requiring little to no downtime.

Gateway transit can be configured regionally or globally.


Multiple choice

Your company is preparing to implement persistent connectivity to Microsoft Azure. The company
has a single site, headquarters, which has an on-premises data centre. The company requires the
connectivity be persistent. Connectivity must provide for the entire on-premises site. You need to
implement a connectivity solution to meet the requirements. What should you do?

Select one.

■ Implement a Site-to-Site VPN.

† Implement a Virtual Private Cloud (VPC).

† Implement a VNet-to-VNet VPN.

Multiple choice

You need to provide a contingent staff employee temporary read-only access to the contents of an
Azure storage account container named media. It is important that you grant access while adhering
to the security principle of least-privilege. What should you do? Select one.

† Set the public access level to Container.

■ Generate a shared access signature (SAS) token for the container.

† Configure a Cross-Origin Resource Sharing (CORS) rule for the storage account.

Multiple choice

You are reviewing the Alerts page and notice an alert has been Acknowledged. What does this
mean?

Select one.

■ An administrator has reviewed the alert and started working on it.

† The issue has been resolved.

† The issue has been closed


Multiple choice

You decide to move all your services to Azure Kubernetes service. Which of the following
components will contribute to your monthly Azure charge?

Select one.

† Azure managed node

† Pods

■ Customer node virtual machines

Multiple choice

Your company provides cloud software to audit administrative access in Microsoft Azure resources.
The software logs all administrative actions (including all clicks and text input) to log files. The
software is about to be released from beta and the company is concerned about storage
performance. You need to deploy a storage solution for the log files to maximize performance. What
should you do?

Select one.

† Deploy Azure Files using SMB 3.0.

† Deploy blob storage using block blobs.

■ Deploy blob storage using append blobs

Multiple choice

You are researching Microsoft Azure for your company. The company is considering deploying
Windows-based VMs in Azure. However, before moving forward, the management team has asked
you to research the costs associated with Azure VMs. You need to document the configuration
options that are likely to save the company money on their Azure VMs. Which options should you
document? (Each answer presents part of the solution.

Select four.

■ Use HDD instead of SSD for VM storage.

Use unmanaged premium storage instead of managed standard storage.

Bring your own Windows custom images.

■ Use different Azure regions.

■ Use the least powerful VMs that meet your requirements.

Place all VMs in the same resource group.

■ Bring your own Windows license for each VM.


Multiple choice

You deploy a new domain named contoso.com to domain controllers in Azure. You have the
following domain-joined VMs in Azure: You need to add DNS records so that the hostnames resolve
to their respective IP addresses. Additionally, you need to add a DNS record so that
intranet.contoso.com resolves to VM99. What should you do?

(Each answer presents part of the solution. Choose two.)

Add AAAA records for each VM.

■ Add A records for each VM.

Add a TXT record for intranet.contoso.com with the text of VM99.contoso.com.

Add an SRV record for intranet.contoso.com with the target pointing at VM99.contoso.com

■ Add a CNAME record for intranet.contoso.com with a value of VM99.contoso.com.

Multiple choice

You host a service with two Azure virtual machines. You discover that occasional outages cause your

service to fail. What two actions can you do to minimize the impact of the outages?

Select two.

■ Add a load balancer.

■ Put the virtual machines in an availability set.

Put the virtual machines in a scale set.

Add a network gateway.

Add a third instance of the virtual machine.

Multiple choice

You are backing up your App Service. Which of the following is included in the backup? Select two.

■ App configuration

■ Azure database for MySQL

Files and database content totalling 15GB

Firewall enabled-storage account

SSL enabled Azure Database for MySQL


Aws sysops

A user is using a small MySQL RDS DB. The user is experiencing high latency due to the Multi

AZ feature.Which of the below mentioned options may not help the user in this situation?

A. Schedule the automated back up in non-working hours

B. Use a large or higher size instance

C. Use PIOPS

D. Take a snapshot from standby Replica

Answer: D

A user is planning to setup infrastructure on AWS for the Christmas sales. The user is planning to

use Auto Scaling based on the schedule for proactive scaling. What advise would you give to the

user?

A. It is good to schedule now because if the user forgets later on it will not scale up

B. The scaling should be setup only one week before Christmas

C. Wait till end of November before scheduling the activity

D. It is not advisable to use scheduled based scaling

Answer: C

A user has created an ELB with Auto Scaling. Which of the below mentioned offerings from ELB

helps the user to stop sending new requests traffic from the load balancer to the EC2 instance

when the instance is being deregistered while continuing in-flight requests?

A. ELB sticky session

B. ELB deregistration check

C. ELB connection draining

D. ELB auto registration Off

Answer: C
A user has created a queue named “myqueue” in US-East region with AWS SQS. The user’s AWS
account ID is 123456789012. If the user wants to perform some action on this queue, which of the
below Queue URL should he use?

A. http://sqs.us-east-1.amazonaws.com/123456789012/myqueue

B. http://sqs.amazonaws.com/123456789012/myqueue

C. http://sq

D. 123456789012.us-east-1.amazonaws.com/myqueue

E. http:// 123456789012.sq

F. us-east-1.amazonaws.com/myqueue

Answer: A

You are managing the AWS account of a big organization. The organization has more than 1000+

employees and they want to provide access to the various services to most of the employees.

Which of the below mentioned options is the best possible solution in this case?

A. The user should create a separate IAM user for each employee and provide access to them as

per

the policy

B. The user should create an IAM role and attach STS with the role. The user should attach

that role to

the EC2 instance and setup AWS authentication on that server

C. The user should create IAM groups as per the organization’s departments and add each user

to the

group for better access control

D. Attach an IAM role with the organization’s authentication service to authorize each user

for various

AWS services

Answer: D
A user has created a Cloudformation stack. The stack creates AWS services, such as

EC2 instances, ELB, AutoScaling, and RDS. While creating the stack it created EC2, ELB

and AutoScaling but failed to create RDS. What will Cloudformation do in this scenario?

A. Cloudformation can never throw an error after launching a few services since it verifies all

the steps before launching

B. It will warn the user about the error and ask the user to manually create RDS

C. Rollback all the changes and terminate all the created services

D. It will wait for the user’s input about the error and correct the mistake after the input

Answer: C

An organization is measuring the latency of an application every minute and storing data inside a

file in the JSON format. The organization wants to send all latency data to AWS CloudWatch.

How can the organization achieve this?

A. The user has to parse the file before uploading data to CloudWatch
B. It is not possible to upload the custom data to CloudWatch
C. The user can supply the file as an input to the CloudWatch command
D. D. The user can use the CloudWatch Import command to import data from the file to
CloudWatch

Answer: C

A user is planning to use AWS services for his web application. If the user is trying to set up his

own billing management system for AWS, how can he configure it?

A. Set up programmatic billing access. Download and parse the bill as per the requirement

B. It is not possible for the user to create his own billing management service with AWS

C. Enable the AWS CloudWatch alarm which will provide APIs to download the alarm data

D. Use AWS billing APIs to download the usage report of each service from the AWS

billing console

Answer: A
A user has created a public subnet with VPC and launched an EC2 instance within it. The user

is trying to delete the subnet. What will happen in this scenario?

A. It will delete the subnet and make the EC2 instance as a part of the default subnet

B. It will not allow the user to delete the subnet until the instances are terminated

C. It will delete the subnet as well as terminate the instances

D. The subnet can never be deleted independently, but the user has to delete the VPC firs

Answer: B

A user has setup an EBS backed instance and attached 2 EBS volumes to it. The user has setup

a CloudWatch alarm on each volume for the disk data. The user has stopped the EC2 instance and

detached the EBS volumes. What will be the status of the alarms on the EBS volume?

A. OK

B. Insufficient Data

C. Alarm

D. The EBS cannot be detached until all the alarms are removed

Answer: B

A user has launched an RDS postgreSQL DB with AWS. The user did not specify the

maintenance window during creation. The user has configured RDS to update the DB instance

type from micro to large. If the user wants to have it during the maintenance window, what will

AWS do?

A. AWS will not allow to update the DB until the maintenance window is configured

B. AWS will select the default maintenance window if the user has not provided it

C. AWS will ask the user to specify the maintenance window during the update

D. It is not possible to change the DB size from micro to large with RDS

Answer: B
A user has launched an EBS backed instance with EC2-Classic. The user stops and starts

the instance. Which of the below mentioned statements is not true with respect to the

stop/start action?

A. The instance gets new private and public IP addresses

B. The volume is preserved

C. The Elastic IP remains associated with the instance

D. The instance may run on a anew host computer

Answer: C

A user has launched an EC2 instance from an instance store backed AMI. The infrastructure team

wants to create an AMI from the running instance. Which of the below mentioned credentials is not

required while creating the AMI?

A. AWS account ID

B. X.509 certificate and private key

C. AWS login ID to login to the console

D. Access key and secret access key

Answer: C

A user has launched an EC2 instance from an instance store backed AMI. The infrastructure team

wants to create an AMI from the running instance. Which of the below mentioned steps will not be

performed while creating the AMI?

A. Define the AMI launch permissions

B. Upload the bundled volume

C. Register the AMI

D. Bundle the volume

Answer: A
A user has created a VPC with public and private subnets using the VPC wizard. The user has

not launched any instance manually and is trying to delete the VPC. What will happen in this

scenario?

A. It will not allow to delete the VPC as it has subnets with route tables

B. It will not allow to delete the VPC since it has a running route instance

C. It will terminate the VPC along with all the instances launched by the wizard

D. It will not allow to delete the VPC since it has a running NAT instance

Answer: D

A sys admin is trying to understand the Auto Scaling activities. Which of the below mentioned

processes is not performed by Auto Scaling?

A. Reboot Instance

B. Schedule Actions

C. Replace Unhealthy

D. Availability Zone Balancing

Answer: A

A user has launched an EBS backed EC2 instance. The user has rebooted the instance. Which of

the below mentioned statements is not true with respect to the reboot action?

A. The private and public address remains the same

B. The Elastic IP remains associated with the instance

C. The volume is preserved

D. The instance runs on a new host computer

Answer: D
A user has launched an EC2 instance. The instance got terminated as soon as it was launched.

Which of the below mentioned options is not a possible reason for this?

A. The user account has reached the maximum EC2 instance limit

B. The snapshot is corrupt

C. The AMI is missing. It is the required part

D. The user account has reached the maximum volume limit

Answer: A

A user is displaying the CPU utilization, and Network in and Network out CloudWatch metrics

data of a single instance on the same graph. The graph uses one Y-axis for CPU utilization and

Network in and another Y-axis for Network out. Since Network in is too high, the CPU utilization

data is not visible clearly on graph to the user. How can the data be viewed better on the same

graph?

A. It is not possible to show multiple metrics with the different units on the same graph

B. Add a third Y-axis with the console to show all the data in proportion

C. Change the axis of Network by using the Switch command from the graph

D. Change the units of CPU utilization so it can be shown in proportion with Network

Answer: C
Python

Consider:
var = [1,2,3,4]
Which of the following statement is True for 'var'
Ans- var is not of type ‘boolean’ therefore its tru

What is the output of the following code :


a = ['XX', 'YY']
for i in a: i.lower()
print(a)
ans- ['XX', 'YY']

For the following code:


L= [12, 12.21, 'aaaa', (2, 1), 'ss']
L[0] = 'abcd'
print (L)
pick the correct option:
ans- ['abcd', 12.21, 'aaaa', (2, 1), 'ss']

For the following code :


mystr = 'this is a test string'
print (mystr[0])
mystr[0] = 'T'
print (mystr)
Pick the correct statement:
Ans- line3 generates an error
What is the output of the following:
"YellowStone"[6:]
Revisit
Choose the best option

Ans- stone

After executing the following python code:


x = [1, 2, 3, 4]
y=x

ans- both ‘x’ and ‘y’ refer to same objects

After executing the following code:


s = {x**2 for x in range(-3, 3)}
what will be the elements in 's' ?
ans- 9,4,1,0,1,4,9

Give the program output:


s1 = set(abcaabde')
s2 = set('abcddeeffg')
print (len(s2-s1))
ans- 2

Pick the correct statement:


Choose the best option
def statement creates a function object
def statement executes the function
def statement can lie inside a list
def statement can lie inside a dictionary
Ans- def statement creates a function object
For the following code :
L= [12, 12.21, 'aaaa', (2, 1), 'ss']
L[0] = 'abcd'
print (L)
pick the correct option:
ans – runs successfully displaying : ['abcd', 12.21, 'aaaa', (2, 1), 'ss']

Choose the correct Python statement:


Choose the best option
When an imported module is re-imported, it
When a module is imported again, It genes
O When a module is first time imported, it c
O Every time a module is imported, it gets
Ans -

What is the output of the following:


def foo():
try:
foo()
print(1, end='')
finally:
print(2, end='')
print(3)
ans- 1 2 3
For the following code what is output ?
11=[1, 2, 3, 4]
12 11[:]+ [100]
What is 12' after executing the above code
Ans- [1,2,3,4,100]

Which of the following comprehensions will generate the same list as:
[x for x in range(1,50) if '5' in str() and not x%5]
Ans - [x for x in range (5, 50, 10)]

What does the Thread.join() method do?


Revisit
Choose the best option
Restrict access to resource
Adds the thread to a pool
Merges two threads into one
Ans- Waits for the thread on which join is pe

Give the output of the following code


coll = []
for i in range(1, 10):
lambda: coll.append(i)
print(coll)
ans- []
[1,2,3,4,5,6,7,8,91
[1, 2, 3, 4, 5, 6, 7, 8, 9, 10]
[0, 1,2,3,4,5,6,7,8,91
Give the output of the following code :
def f():
a="
print(a[0], end='')
def g():
try:
f()
finally :
print('finally', end='')
try: g()
except: print('except', end='')
ans- syntax error – finally without expect in

What is output for code


def fun(arg) :
s = 'All is well'
return s+arg
g = fun
res = g('here')
print(res)
Ans - All is well here

Give the output of the following:


{x if x>0 else -x : x+100 for x in range(-3, 3)}
Syntax error
(3: 103,2 102, 1. 101,0. 100)
Ans- {3: 97, 2: 102, 1: 101, 0: 100}
(3:97, 298, 1: 99,0: 100)
Give the output of the following code :
data = 'it is fun to learn programming and it is fun to learn Python’
1=0
for x in data.split('') :
if x not in l:
1.append(x)
print (1)
ans- [‘it’ , ‘is’, ‘fun’, ‘to’, ‘learn’, ‘programming’ ,and’, ’it’ is fun

which looping statement runs atleast once


ans - do while loop

You might also like