70-532 Exam - Developing Microsoft Azure Solutions

certleader.com

Q1. DRAG DROP - (Topic 2) 

Contoso, Ltd. reports that hackers have compromised a computer on its network. 

You need to prevent access to the site from all Contoso, Ltd. computers. 

How should you complete the relevant Windows PowerShell script? To answer, drag the appropriate Windows PowerShell segment to the correct location. Each Windows PowerShell segment may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q2. - (Topic 2) 

You create a VM named cVM_005 for a newly hired contractor. 

The contractor reports that the VM runs out of memory when the contractor attempts to test 

the mobile applications. 

You need to double the memory that is available for the VM. 

Which Windows PowerShell command should you use? 

A. Option A 

B. Option B 

C. Option C 

D. Option D 

Answer:

Q3. DRAG DROP - (Topic 5) 

You deploy an application as a cloud service to Azure. The application contains a web role to convert temperatures between Celsius and Fahrenheit. 

The application does not correctly convert temperatures. You must use Microsoft Visual Studio to determine why the application does not correctly convert temperatures. 

You need to debug the source code in Azure. 

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer:  

Q4. HOTSPOT - (Topic 1) 

You need to configure scaling for the plagiarism detection service. 

What should you do? To answer, select the appropriate values in the dialog box in the answer area. 

Answer:  

Q5. - (Topic 5) 

You are creating virtual machines (VMs) that are hosted on Azure. 

You must be able to change the Remote Desktop access settings for the VMs. You must also be able to change the password for the built-in administrator account on all VMs. You identify the VMAccess VM extensions that have the required capabilities. 

You need to enable the VMAccess VM extensions. 

Which approach should you use? 

A. Download and install the Microsoft Installer file to enable the VM Agent on each VM. 

B. Use the Azure management portal to restart each VM. 

C. When you configure the new VMs, use the Azure management portal to install the VM Agent. 

D. For each VM, use Windows PowerShell cmdlets to enable the VM Agent and the VMAccess VM extensions. 

Answer:

Q6. - (Topic 5) 

You are maintaining an application that uses the Azure Content Delivery Network (CDN) to serve terabytes of content that is stored in page blobs. 

Your bill for CDN services is higher than you expect. 

You need to monitor the application to find issues that increase costs. 

Which two operations should you monitor? Each correct answer presents part of the solution. 

A. The Time-To-Live (TTL) of the blobs. 

B. The country of origin for the client computer and the CDN region. 

C. The number of requests that result in an HTTP status code over 400. 

D. The allocated size of page blobs. 

E. The expiration date of the blobs. 

Answer: B,D 

Q7. - (Topic 5) 

You maintain an application that is used by local food delivery companies. When a customer requests a delivery, the application sends a message to all of the delivery companies. One company accepts the request and fulfills the order. 

The application currently supports orders of 100 products or fewer. Some of the delivery companies can now deliver large orders that contain up to 500 products. 

You must modify the application so that it supports both small orders and large orders. Messages about large orders should be sent to only delivery companies that can fulfill them. Messages about small orders should be sent to all delivery companies. 

Which service should you use? 

A. Azure Service Bus Queue 

B. Azure Service Bus Relay 

C. Azure Service Bus Topics 

D. Azure Service Bus Namespace 

Answer:

Q8. DRAG DROP - (Topic 2) 

You need to configure a VM for a new contractor. 

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer:  

Q9. HOTSPOT - (Topic 5) 

You store JSON data in a blob by using the Azure Blob service. Web applications access the JSON data by using client-side JavaScript calls. 

JSON data is stored in a container that is configured to allow anonymous access. Web applications that are allowed to make updates to the data have access to any necessary shared access signatures (SASs) and storage keys. 

You configure one Cross-Origin Resource Sharing (CORS) rule for the https://fabrikam.com domain and then run the following method. Line numbers are provided for reference only. 

For each of the following statements, select Yes if the statement is true. Otherwise, select No. 

Answer:  

Q10. - (Topic 5) 

A company maintains an Azure storage account. The storage account uses blobs and tables. 

Customers access the storage account by using shared access signatures (SASs). 

You need to monitor the usage of the storage services. You need to do the following: 

Understand which storage areas perform operations that incur a fee. Understand which requests are denied because of insufficient permissions. Validate that the performance of the storage account meets the service level agreement (SLA) for the Azure Storage service. 

Which three data analysis tasks should you perform? Each correct answer presents part of the solution. 

A. Use data from the logs of the storage services to find individual storage access attempts that do not comply with the SLA. 

B. Use data from the logs of the storage services to calculate aggregate server latency across individual requests. Determine whether the results of this calculation indicate that the Azure Storage service is in compliance with the SLA. 

C. Analyze the logs of the storage services to determine which storage services were inaccessible because of permissions issues. 

D. Review the Azure documentation to determine which storage operations are billable. Then find records of those operations in the logs of the storage services. 

E. Analyze the logs of the storage services to find records of operations that are marked as billable. 

F. Correlate the data logged from the storage service with the permissions to store data in the individual blobs and containers. Determine which storage services were inaccessible because of permissions issues. 

Answer: B,C,D