70-533 Exam - Implementing Microsoft Azure Infrastructure Solutions

certleader.com

Q1. You manage two datacenters in different geographic regions and one branch office. 

You plan to implement a geo-redundant backup solution. 

You need to ensure that each datacenter is a cold site for the other. 

You create a recovery vault. What should you do next? 

A. Install the provider. 

B. Upload a certificate to the vault. 

C. Generate a vault key. 

D. Set all virtual machines to DHCP. 

E. Prepare System Center Virtual Machine Manager (SCVMM) servers. 

F. Create mappings between the virtual machine (VM) networks. 

Answer:

Explanation: . Within the Azure Portal screen, scroll down to Recovery Services (on the left menu), and click on “Create a New Vault” (this is where your VMs will be replicated to) which will bring up a Data Services / Recovery Services / Site Recovery Vault option, select Quick Create . For the name of the Vault, give it something you’d remember, in my case, I’ll call it RandsVault, and I’ll choose the Region West US since I’m in the Western United States, then click Create Vault . Once the Vault has been created, click on the Right Arrow next to the name of your vault. Under Setup Recovery, choose “Between an on-premise site and Microsoft Azure” so that you are telling the configuration settings that you are going to be replicating between your on-premise datacenter and Azure in the cloud. . You will now see a list of things you need to do which the first thing is to create a key exchange of certificates between Microsoft Azure and your VMM server. 

Reference: Leveraging Microsoft Azure as your disaster recovery/failover data center 

Q2. You manage a large datacenter that has limited physical space. 

You plan to extend your datacenter to Azure. 

You need to create a connection that supports a multiprotocol label switching (MPLS) virtual private network. 

Which connection type should you use? 

A. Site-to-site 

B. VNet-VNet 

C. ExpressRoute. 

D. Site-to-peer 

Answer:

Explanation: 

ExpressRoute provides even richer capabilities by allowing a dedicated MPLS connection to Azure. Reference: 

ExpressRoute: 

An MPLS Connection to Microsoft Azure 

http://azure.microsoft.com/en-us/services/expressroute/ 

Q3. Your company network includes an On-Premises Windows Active Directory (AD) that has a DNS domain named contoso.local and an email domain named contoso.com. You plan to migrate from On-Premises Exchange to Office 365. 

You configure DirSync and set all Azure Active Directory {Azure AD) 

usernames as %username%@contoso.com 

You need to ensure that each user is able to log on by using the email domain as the username. 

Which two actions should you perform? Each correct answer presents part of the solution. 

A. Verify the email domain in Azure AD domains. 

B. Run the Set-MsolUserPnncipalName -UserPnncipalName %username%@co ntoso.onmicrosoft.com -NewUserPrincipalName %usemame %@contoso.com Power Shell cmdlet. 

C. Edit the ProxyAddress attribute on the On-Premises Windows AD user account. 

D. Verify the Windows AD DNS domain in Azure AD domains. 

E. Update the On-Premises Windows AD user account UPN to match the email address. 

Answer: C,D 

Explanation: * There are two main traffic flows originating from the server hosting the Azure Active Directory Sync tool: The Azure Active Directory Sync tool queries a domain controller on the on-premises network for changes to accounts and passwords. The Azure Active Directory Sync tool sends the changes to accounts and passwords to the Azure AD instance of your Office 365 subscription. These changes are sent through the on-premises network’s proxy server. 

* Verify that your virtual machine is joined to the domain by checking your internal DNS to make sure that an Address (A) record was added for the virtual machine with the correct IP address from Azure. For the Azure Active Directory Sync tool to gain access to Internet resources, you must configure the server that runs the Azure Active Directory Sync tool to use the on-premises network's proxy server. 

Reference: Deploy Office 365 Directory Synchronization in Microsoft Azure 

Q4. DRAG DROP 

You administer an Azure Virtual Machine (VM) named CON-CL1. CON-CL1 is in a cloud service named ContosoService1. 

You discover unauthorized traffic to CON-CL1. You need to: 

. Create a rule to limit access to CON-CL1. 

. Ensure that the new rule has the highest precedence. 

Which Azure Power Shell cmdlets and values should you use? To answer, drag the appropriate cmdlet or value to the correct location in the Power Shell command. Each cmdlet or value may be used once, more than once, or not at all. You may need to drag the split bat between panes or scroll to view content. 

Answer:  

Q5. DRAG DROP 

Your company manages several Azure Web Sites that are running in an existing web-hosting plan named plan1. 

You need to move one of the websites, named contoso, to a new web-hosting plan named plan2. 

Which Azure PowerShell cmdlet should you use with each PowerShell command line? To answer, drag the appropriate Azure PowerShell cmdlet to the correct location in the PowerShell code. Each PowerShell cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q6. You administer an Azure Active Directory (Azure AD) tenant that has a SharePoint web application named TeamSite1. TeamSite1 accesses your Azure AD tenant for user information. 

The application access key for TeamSite1 has been compromised. 

You need to ensure that users can continue to use TeamSite1 and that the compromised key does not allow access to the data in your Azure AD tenant. 

Which two actions should you perform? Each correct answer presents part of the solution. 

A. Remove the compromised key from the application definition for TeamSite1. 

B. Delete the application definition for TeamSite1. 

C. Generate a new application key for TeamSite1. 

D. Generate a new application definition for TeamSite1. 

E. Update the existing application key. 

Answer: A,C 

Explanation: One of the security aspects of Windows Azure storage is that all access is protected by access keys. 

It is possible to change the access keys (e.g. if the keys become compromised), and if changed, we’d need to update the application to have the new key. 

Q7. HOTSPOT 

You manage an Internet Information Services (IIS) 6 website named contososite1. Contososite1 runs a legacy ASP.NET 1.1 application named LegacyApp1. LegacyApp1 does not contain any integration with any other systems or programming languages. 

You deploy contososite1 to Azure Web Sites. 

You need to configure Azure Web Sites. You have the following requirements: 

LegacyApp1 runs correctly. 

The application pool does not recycle. 

Which settings should you configure to meet the requirements? To answer, select the appropriate settings in the answer area. 

Answer:  

Q8. Your company network includes two branch offices. Users at the company access internal virtual machines (VMs). 

You want to ensure secure communications between the branch offices and the internal VMs and network. 

You need to create a site-to-site VPN connection. 

What are two possible ways to achieve this goal? Each correct answer presents a complete solution. 

A. a private IPv4 IP address and a compatible VPN device 

B. a private IPv4 IP address and a RRAS running on Windows Server 2012 

C. a public-facing IPv4 IP address and a compatible VPN device 

D. a public-facing IPv4 IP address and a RRAS running on Windows Server 2012 

Answer: C,D 

Explanation: C (not A): VPN Device IP Address.- This is public facing IPv4 address of your on-premises VPN device that you’ll use to connect to Azure. The VPN device cannot be located behind a NAT. D (Not B): At least one or preferably two publicly visible IP addresses: One of the IP addresses is used on the Windows Server 2012 machine that acts as the VPN device by using RRAS. The other optional IP address is to be used as the Default gateway for out-bound traffic from the on-premises network. If the second IP address is not available, it is possible to configure network address translation (NAT) on the RRAS machine itself, to be discussed in the following sections. It is important to note that the IP addresses must be public. They cannot be behind NAT and/or a firewall. 

Reference: Configure a Site-to-Site VPN in the Management Portal 

Site-to-Site VPN in Azure Virtual Network using Windows Server 2012 Routing and Remote Access Service (RRAS) 

Q9. DRAG DROP 

You publish a multi-tenant application named MyApp to Azure Active Directory (Azure AD). 

You need to ensure that only directory administrators from the other organizations can access MyApp's web API. 

How should you configure MyApp's manifest JSON file? To answer, drag the appropriate PowerShell command to the correct location in the application's manifest JSON file. Each value may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer:  

Q10. HOTSPOT 

You administer an Azure Active Directory (Azure AD) tenant. 

You add a custom application to the tenant. 

The application must be able to: 

. Read data from the tenant directly. 

. Write data to the tenant on behalf of a user. In the table below, identify the permission that must be granted to the application. Make only one selection in each column. 

Answer: