Topic 5: Mix Questions
You have an Azure subscription that contains the alerts shown in the following exhibit


Explanation:
Azure Monitor alerts utilize a "User Response" (state) to help administrators track the progress of an incident. There are three primary states: New, Acknowledged, and Closed. The "Alert Condition" (Fired or Resolved) is managed by the system, but the "User Response" is managed manually by the user. An administrator can transition an alert between any of these three states at any time to reflect the current status of the troubleshooting or resolution process.
Correct Options:
For Alert1, User response: can be changed to New or Acknowledged
For Alert2, User response: can be changed to Acknowledged or Closed
The "User response" field is a metadata state that allows for manual transitions. Since Alert1 is currently in the "Closed" state, it can be moved back to "New" if the issue recurs or "Acknowledged" if it needs further investigation. Since Alert2 is currently in the "New" state, it can be transitioned to "Acknowledged" once a technician starts working on it, or "Closed" once the issue is verified as resolved.
Incorrect Options:
Cannot be changed:
This is incorrect because alert states are designed to be interactive. They are not permanent records and must be adjustable to facilitate incident management workflows.
Can be changed to [Specific State] only:
These options are incorrect because Azure does not restrict the directional flow of alert states. You are not forced into a linear progression (New -> Acknowledged -> Closed); you can move from Closed back to New or skip Acknowledged entirely depending on the administrative requirement.
Reference:
Manage your alert instances - Azure Monitor | Microsoft Learn
You have an Azure subscription that contains the resources shown in the following table:


Explanation:
This tests understanding of Azure Policy inheritance and the "Apply tag and its default value" effect. This policy assigns the specified tag (Label:Value1) to all resources in the scope (RG6), overriding any existing value for that same tag name. Tags applied directly to the resource group are not inherited by resources by default.
Most Likely Correct Options (assuming VNET1 is in a different RG):
VNET1: Department: D1 only.
(Assuming the initial table shows VNET1 is in a different resource group, e.g., RG1, which has the tag Department: D1 applied directly to the VNET or its RG, and is not in the scope of the policy assigned to RG6).
VNET2: Label: Value1 only.
VNET2 is deployed to RG6, which has the "Apply tag" policy assigned. The policy forcibly applies Label:Value1. The RGroup:RG6 tag applied to the resource group does not automatically propagate to resources within it. Therefore, VNET2 only gets the policy-mandated tag.
Incorrect Options for VNET2:
RGroup: RG6 only or RGroup: RG6, and Label: Value1 are incorrect because resource group tags are metadata for the container, not inherited properties.
None is incorrect because the policy explicitly applies a tag.
Reference:
Microsoft Learn: Understand how effects work - Modify (The "Apply tag and its default value" definition uses a modify effect).
You have an Azure subscription.
You plan to create the Azure Storage account as shown in the following exhibit.

Explanation:
This question focuses on understanding Azure Storage replication and data lifecycle management. Azure ensures high availability by maintaining multiple copies of data. The number of copies is determined by the Replication strategy selected (LRS, GRS, ZRS, etc.). Additionally, Azure Storage accounts support different Access Tiers (Hot, Cool, Cold, Archive) to optimize costs based on how frequently data is accessed. Modifying these settings post-deployment or during creation allows administrators to balance data durability requirements with budget constraints.
Correct Option:
The minimum number of copies of the storage account will be: 3
To reduce the cost of infrequently accessed data in the storage account, you must modify the: Access tier (default)
The exhibit shows Locally-redundant storage (LRS) selected. LRS replicates your data three times within a single data center in the primary region. For cost optimization, the Access tier is currently set to Hot, which is ideal for frequent access but has higher storage costs. Changing this to Cool or Archive is the standard method for reducing costs for data that is not accessed regularly.
Incorrect Option:
Replication (for cost reduction):
While changing replication (e.g., from GRS to LRS) can reduce costs, the specific question asks about "infrequently accessed data," which is a use case specifically addressed by Access Tiers, not replication levels.
Performance:
Changing Performance from "Standard" to "Premium" would increase costs and is used for low-latency requirements, not for managing infrequently accessed data.
Copies (1, 2, or 4):
In Azure, LRS always maintains 3 copies. There is no standard replication tier that maintains only 1 or 2 copies; even the most basic redundancy (LRS) starts at 3.
Reference:
Azure Storage redundancy - Azure Storage | Microsoft Learn Access tiers for Azure Blob Storage - Azure Storage | Microsoft Learn
You have an Azure subscription that contains a storage account named storage1.
You need to configure a shared access signature (SAS) to ensure that users can only download blobs securely by name.
Which two settings should you configure? To answer, select the appropriate settings in the answer area.
NOTE: Each correct answer is worth one point.

Explanation:
A Shared Access Signature (SAS) provides secure, delegated access to resources in your storage account without exposing your account keys. To ensure users can only download specific blobs by name, you must configure the SAS to target the correct level of the storage hierarchy and limit the actions allowed. Restricting access to "by name" specifically implies that users should not be able to list all contents of a container, but rather must know the exact URI of the blob they wish to retrieve.
Correct Options:
Allowed resource types: Object
Allowed permissions: Read
The Object resource type restricts the SAS to specific blobs (objects) rather than the entire service or container. By selecting Read permissions, you enable the "download" functionality while adhering to the principle of least privilege, as it prevents users from deleting, modifying, or even listing other files. This combination ensures that as long as a user has the blob's name/URL and the SAS token, they can securely download that specific file.
Incorrect Options:
Allowed resource types:
Service or Container: These options are incorrect because "Service" grants access to account-level APIs, and "Container" allows operations on the entire container, such as listing all blobs within it.
Allowed permissions:
List, Write, or Delete: "List" would allow a user to see all blobs in a container, which violates the requirement to access blobs only "by name". "Write" and "Delete" would grant unnecessary administrative-level control over the data.
Allowed services:
File, Queue, or Table: The question specifically mentions "blobs," so the "Blob" service must be selected; adding other services would grant unnecessary access to different storage types.
Reference:
Grant limited access to Azure Storage resources using shared access signatures (SAS) - Microsoft Learn
You have an Azure subscription that contains a resource group named RG1.
You plan to use an Azure Resource Manager (ARM) template named template1 to deploy resources. The solution must meet the following requirements:
• Deploy new resources to RG1.
• Remove all the existing resources from RG1 before deploying the new resources.
How should you complete the command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.


Explanation:
The question requires a deployment command that removes all existing resources in RG1 before deploying the new ones from template1. In Azure Resource Manager (ARM) deployments, the -Mode parameter controls this behavior. Using Complete mode ensures the resource group's state matches the template exactly, deleting any resources in the resource group not specified in the template.
Correct Options:
-ResourceGroupName RG1
This parameter specifies the target resource group for the deployment, which is a required piece of information for the New-AzResourceGroupDeployment cmdlet. It directs the deployment to the correct container (RG1) as per the first requirement.
-Mode Complete
This is the critical parameter that meets the second requirement. When -Mode is set to Complete, the deployment engine deletes any resources that exist in the resource group (RG1) but are not defined in the current template (template1). This achieves the goal of removing all existing resources before the new deployment.
Incorrect Options:
-Name / -QueryString / -Tag: These are not valid parameters for the New-AzResourceGroupDeployment cmdlet in this context. -Name is for the deployment name (optional, often auto-generated). -QueryString and -Tag are not standard parameters for this deployment command.
-Mode Incremental: This is the default mode. It leaves unchanged any resources that already exist in the resource group but are not specified in the template. This does not meet the requirement to remove all existing resources.
-Mode All: This is not a valid value for the -Mode parameter. The only valid options are Incremental and Complete.
Reference:
Microsoft Learn: Azure Resource Manager deployment modes - Specifically documents that Complete mode deletes resources that exist in the resource group but are not in the template.
You have an Azure subscription that contains the storage accounts shown in the following table.

Explanation:
Azure Storage Lifecycle Management allows you to automate the transition of data to cooler storage tiers or delete it based on age to optimize costs. This feature is supported by General Purpose v2 (GPv2), Premium BlockBlobStorage, and BlobStorage account types. However, the Archive access tier has stricter limitations; it is only available at the blob level for GPv2 and BlobStorage accounts. Premium storage accounts (BlockBlobStorage) do not currently support the Archive tier as they are designed for high-performance scenarios that conflict with the high latency of the Archive tier.
Correct Option:
Lifecycle management: storage1, storage2, and storage3
The Archive access tier: storage1 and storage2 only
All three accounts (storage1: GPv2, storage2:
BlobStorage, and storage3: BlockBlobStorage) support Lifecycle Management policies to automate data movement or deletion. Regarding the Archive tier, it is supported by storage1 (GPv2) and storage2 (BlobStorage) which allow for tiering blobs to the lowest-cost storage. Storage3 is a BlockBlobStorage account, which is a "Premium" performance tier; these accounts do not support the Archive access tier because they are optimized for low-latency, high-throughput workloads.
Incorrect Option:
Lifecycle management (storage1 only / storage2 only):
These are incorrect because lifecycle policies are broadly supported across all modern storage account kinds including GPv2 and Premium BlockBlob.
Archive tier (storage3 / storage1, storage2, and storage3):
Including storage3 in the Archive tier selection is incorrect because Premium BlockBlobStorage accounts do not support the Archive tier. Only Standard performance tiers (GPv2 and legacy BlobStorage) provide the Archive option for long-term data retention at a lower cost.
Reference:
Optimize costs by automating Azure Blob Storage access tiers - Microsoft Learn
You have an Azure Active Directory (Azure AD) tenant named contoso.com.
You have a CSV file that contains the names and email addresses of 500 external users.
You need to create a quest user account in contoso.com for each of the 500 external users.
Solution: from Azure AD in the Azure portal, you use the Bulk create user operation.
Does this meet the goal?
A.
Yes
B.
No
No
Explanation:
"Bulk Create" is for new Azure AD Users.
For Guests:
- Use "Bulk invite users" to prepare a comma-separated value (.csv) file with the user information and invitation preferences
- Upload the .csv file to Azure AD
- Verify the users were added to the directory
You have two Azure App Service apps named App1 and App2. Each app has a production deployment slot and a test deployment slot. The Backup Configuration settings for the production slots are shown in the following table.


You create an Azure Storage account named Contoso storage.
You plan to create a file share named data.
Users need to map a drive to the data file share from home computers that run Windows 10.
Which outbound port should be open between the home computers and the data file share?
A.
80
B.
443
C.
445
D.
3389
445
Explanation:
Ensure port 445 is open: The SMB protocol requires TCP port 445 to be open; connections will fail if port 445 is blocked.
You have an Azure subscription that contains The storage accounts shown in the following table.

You deploy a web app named Appl to the West US Azure region.
You need to back up Appl. The solution must minimize costs.
Which storage account should you use as the target for the backup?
A.
storage1
B.
storage2
C.
storage3
D.
storage4
storage4
Explanation:
To back up a web app, you need to configure a custom backup that specifies a storage account and a container as the target for the backup1. The storage account must be in the same subscription as the web app, and the container must be accessible by the web app2.
The backup size is limited to 10 GB, and the backup frequency can be configured to minimize costs.
According to the table, storage1 is the only storage account that meets these requirements.
Storage1 is in the same subscription and region as the web app, and it is a generalpurpose v2 account that supports custom backups. Storage2 and storage3 are in a different region than the web app, which may incur additional costs for data transfer.
Storage4 is a FilesStorage account, which does not support custom backups.
Therefore, you should use storage1 as the target for the backup of your web app. To configure a custom backup, you can follow these steps:
In your app management page in the Azure portal, in the left menu, select Backups.
At the top of the Backups page, select Configure custom backups.
In Storage account, select storage1. Do the same with Container.
Specify the backup frequency, retention period, and database settings as needed.
Click Configure.
At the top of the Backups page, select Backup Now.
You plan to use Azure Network Watcher to perform the following tasks:
Task1: Identify a security rule that prevents a network packet from reaching an Azure virtual machine
Task2: Validate outbound connectivity from an Azure virtual machine to an external host
Which feature should you use for each task? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.


You have an Azure subscription that contains the virtual networks shown in the following table.


| Page 3 out of 38 Pages |
| Previous |