aiotestking uk

70-533 Exam Questions - Online Test


70-533 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Your network includes a legacy application named LegacyApp1. The application only runs in the Microsoft .NET 3.5 Framework on Windows Server 2008. 

You plan to deploy to Azure Cloud Services. 

You need to ensure that LegacyApp1 will run correctly in the new environment. 

What are two possible ways to achieve this goal? Each correct answer presents a complete solution. 

A. Upload a VHD with Windows Server 2008 installed. 

B. Deploy LegacyApp1 to a cloud service instance configured with Guest OS Family 2. 

C. Deploy LegacyApp1 to a cloud service instance configured with Guest OS Family 1. 

D. Deploy LegacyApp1 to a cloud service instance configured with Guest OS Family 3. 

Answer: B,C 

Explanation: Guest OS Family 1 and Guest OS Family 2 supports .NET 3.5 and .Net 4.0. Guest OS Family 3 and Guest OS Family 4 supports .NET 4.0 and .Net 4.5. 

Reference: Azure Guest OS Releases and SDK Compatibility Matrix 

URL: http://msdn.microsoft.com/en-us/library/azure/ee924680.aspx 

Q2. DRAG DROP 

Your company manages several Azure Web Sites that are running in an existing web-hosting plan named plan1. 

You need to move one of the websites, named contoso, to a new web-hosting plan named plan2. 

Which Azure PowerShell cmdlet should you use with each PowerShell command line? To answer, drag the appropriate Azure PowerShell cmdlet to the correct location in the PowerShell code. Each PowerShell cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q3. HOTSPOT 

You manage a public-facing web application which allows authenticated users to upload and download large files. On the initial public page there is a promotional video. 

You plan to give users access to the site content and promotional video. 

In the table below, identify the access method that should be used for the anonymous and authenticated parts of the application. Make only one selection in each column. 

Answer:  

Q4. You administer an Azure Storage account with a blob container. You enable Storage account logging for read, write and delete requests. 

You need to reduce the costs associated with storing the logs. 

What should you do? 

A. Execute Delete Blob requests over https. 

B. Create an export job for your container. 

C. Set up a retention policy. 

D. Execute Delete Blob requests over http. 

Answer:

Explanation: To ease the management of your logs, we have provided the functionality of retention policy which will automatically cleanup ‘old’ logs without you being charged for the cleanup. It is recommended that you set a retention policy for logs such that your analytics data will be within the 20TB limit allowed for analytics data (logs and metrics combined). 

Reference: Windows Azure Storage Logging: Using Logs to Track Storage Requests, How do I cleanup my logs? 

URL: http://blogs.msdn.com/b/windowsazurestorage/archive/2011/08/03/windows-azure-storage-logging-using-logs-to-track-storage-requests.aspx 

Q5. You administer a virtual machine (VM) that is deployed to Azure. You configure a rule to generate an alert when the average availability of a web service on your VM drops below 95 percent for 15 minutes. 

The development team schedules a one-hour maintenance period. 

You have the following requirements: 

. No alerts are created during the maintenance period. 

. Alerts can be restored when the maintenance is complete. You want to achieve this goal by using the least amount of administrative effort. 

What should you do from the Management Portal? 

A. Select and disable the rule from the Dashboard page of the virtual machine. 

B. Select and delete the rule from the Configure page of the virtual machine. 

C. Select and disable the rule from the Monitor page of the virtual machine. 

D. Select and disable the rule on the Configure page of the virtual machine. 

Answer:

Explanation: * Example: 

* Virtual Machines 

You can configure virtual machine alert rules on: / Monitoring metrics from the virtual machine host operating system / Web endpoint status metrics 

Reference: Understanding Monitoring Alerts and Notifications in Azure 

Q6. You administer a Windows Server virtual machine (VM). 

You upload the VM to Azure. 

You need to ensure that you are able to deploy the BGInfo and VMAccess extensions. 

What should you do? 

A. Select the Install the VM Agent checkbox while provisioning a VM based on your uploaded VHD. 

B. Select the Enable the VM Extensions checkbox while provisioning a VM based on your uploaded VHD. 

C. Install the VM Agent MSI and execute the following Power Shell commands: $vm = Get-AzureVM -serviceName $svc -Name $name $vm.VM.ProvisionGuestAgent = $true Update-AzureVM -Name Sname -VM $vm.VM -ServiceName $svc 

D. Install the VM Agent MSI and execute the following Power Shell commands: $vm = Get-AzureVM -serviceName $svc -Name $name Set-AzureVMBGInfoExtension -VM $vm.VM Set-AzureVM Access Extension -VM $vm.VM Update-AzureVM -Name Sname -VM $vm.VM -ServiceName $svc 

Answer:

Explanation: The VM Agent can be enabled by manually downloading and installing the VM Agent (either the Windows or Linux version) on an existing VM instance and then setting the ProvisionGuestAgent value to true using Powershell or a REST call. (If you do not set this value after manually installing the VM Agent, the addition of the VM Agent is not detected properly.) The following code example shows how to do this using PowerShell where the $svc and $name arguments have already been determined. 

$vm = Get-AzureVM –serviceName $svc –Name $name $vm.VM.ProvisionGuestAgent = $TRUE Update-AzureVM –Name $name –VM $vm.VM –ServiceName $svc 

Reference: VM Agent and VM Extensions Overview 

Q7. DRAG DROP 

You manage a solution deployed in two Azure subscriptions for testing and production. Both subscriptions have virtual networks named fabVNet. 

You plan to add two new virtual machines (VMs) in a new subnet. 

You have the following requirements: 

... 

Deploy the new VMs to the virtual network in the testing subscription. 

Minimize any errors in defining the network changes. 

Minimize the work that will be required when the change is made to the production 

virtual network. 

Which three steps should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer:  

Q8. You administer an Azure Active Directory (Azure AD) tenant that has a SharePoint web application named TeamSite1. TeamSite1 accesses your Azure AD tenant for user information. 

The application access key for TeamSite1 has been compromised. 

You need to ensure that users can continue to use TeamSite1 and that the compromised key does not allow access to the data in your Azure AD tenant. 

Which two actions should you perform? Each correct answer presents part of the solution. 

A. Remove the compromised key from the application definition for TeamSite1. 

B. Delete the application definition for TeamSite1. 

C. Generate a new application key for TeamSite1. 

D. Generate a new application definition for TeamSite1. 

E. Update the existing application key. 

Answer: A,C 

Explanation: One of the security aspects of Windows Azure storage is that all access is protected by access keys. 

It is possible to change the access keys (e.g. if the keys become compromised), and if changed, we’d need to update the application to have the new key. 

Q9. You develop a Windows Store application that has a web service backend. 

You plan to use the Azure Active Directory Authentication Library to authenticate users to Azure Active Directory (Azure AD) and access directory data on behalf of the user. 

You need to ensure that users can log in to the application by using their Azure AD credentials. 

Which two actions should you perform? Each correct answer presents part of the solution. 

A. Create a native client application in Azure AD. 

B. Configure directory integration. 

C. Create a web application in Azure AD. 

D. Enable workspace join. 

E. Configure an Access Control namespace. 

Answer: B,C 

Explanation: B: An application that wants to outsource authentication to Azure AD must be 

registered in Azure AD, which registers and uniquely identifies the app in the directory. 

C (not A): NativeClient-WindowsStore 

A Windows Store application that calls a web API that is secured with Azure AD. 

Reference: AzureADSamples/NativeClient-WindowsStore Authentication Scenarios for Azure AD, Basics of Authentication in Azure AD http://msdn.microsoft.com/en-us/library/azure/dn499820.aspx#BKMK_Auth https://github.com/AzureADSamples/NativeClient-WindowsStore 

Q10. DRAG DROP 

You manage two solutions in separate Azure subscriptions. 

You need to ensure that the two solutions can communicate on a private network. 

Which three actions should you perform in sequence? To answer, move the appropriate 

actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: