Which authentication mechanism should you use?
Your company is developing an Azure API. You need to implement authentication for the Azure API. You have the following requirements: - All API calls must be secure. - Callers to the API must not send credentials to the API. Which authentication mechanism should you use?A . BasicB . AnonymousC...
What should you do?
Case Study 2 - Coho Winery LabelMaker app Coho Winery produces bottles, and distributes a variety of wines globally. You are developer implementing highly scalable and resilient applications to support online order processing by using Azure solutions. Coho Winery has a LabelMaker application that prints labels for wine bottles. The...
Which two actions should you perform?
You are developing a web app that is protected by Azure Web Application Firewall (WAF). All traffic to the web app is routed through an Azure Application Gateway instance that is used by multiple web apps. The web app address is contoso.azurewebsites.net. All traffic must be secured with SSL. The...
Which of the following would you use to implement a single public IP endpoint to route traffic to multiple microservices?
You have to deploy a microservice based application to Azure. The application needs to be deployed to an Azure Kubernetes cluster. The solution has the following requirements: - Reverse proxy capabilities - Ability to configure traffic routing - Termination of TLS with a custom certificate Which of the following would...
Which code segment should you use?
You develop Azure solutions. You must connect to a No-SQL globally-distributed database by using the .NET API. You need to create an object to configure and execute requests in the database. Which code segment should you use?A . new Container(EndpointUri, PrimaryKey);B . new Database(Endpoint, PrimaryKey);C . new CosmosClient(EndpointUri, PrimaryKey);View AnswerAnswer:...
Which of the following would you use as the Permission for the Microsoft Graph API?
You have to develop an ASP.Net Core application. The application is used to work with blobs in an Azure storage account. The application authenticates via Azure AD credentials. Role based access has been implemented on the containers that contain the blobs. These roles have been assigned to the users. You...
How should you complete the Azure CLI commands?
Hotspot Question You are developing a ticket reservation system for an airline. The storage solution for the application must meet the following requirements: - Ensure at least 99.99% availability and provide low latency. - Accept reservations event when localized network outages or other unforeseen failures occur. - Process reservations in...
Hotspot Question
Hotspot Question You are developing an application that uses Azure Storage Queues. You have the following code: For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: No The QueueDescription.LockDuration property...
Which component should you use?
Drag and Drop Question You are developing a microservices solution. You plan to deploy the solution to a multinode Azure Kubernetes Service (AKS) cluster. You need to deploy a solution that includes the following features: - reverse proxy capabilities - configurable traffic routing - TLS termination with a custom certificate...
Which of the following would you use as the filter condition for the requirement?
You are developing an application that is going to making use of the Azure Service Bus. You have to create filters based on the different types of subscribers that would subscribe to the topic. The broad classification of these subscribers are: - Subscribers should be able to receive all messages...