Topic 4: Mix Questions Set
You have a GitHub repository that is integrated with Azure Boards Azure Boards has a work item that has the number 715. You need to ensure that when you commit source code in GitHub, the work item is updated automatically. What should you include in the commit comments?
A. @714
B. =715
C. the URL of the work item
D. AB#715
You have an Azure Resource Manager template that deploys a multi-tier application. You need to prevent the user who performs the deployment from viewing the account credentials and connection strings used by the application. What should you use?
A. an Azure Resource Manager parameter file
B. an Azure Storage table
C. an Appsettings.json files
D. Azure Key Vault
E. a Web.config file
Explanation:
When you need to pass a secure value (like a password) as a parameter during
deployment, you can retrieve the value from an Azure Key Vault. You retrieve the value by
referencing the key vault and secret in your parameter file. The value is never exposed
because you only reference its key vault ID. The key vault can exist in a different
subscription than the resource group you are deploying to.
You have a project in Azure DevOps named Project1. You implement a Continuous Integration/Continuous Deployment (CI/CD) pipeline that uses PowerShell Desired State Configuration (DSC) to configure the application infrastructure. You need to perform a unit test and an integration test of the configuration before Project1 is deployed. What should you use?
A. the PS Script Analyzer too
B. the Pester test framework
C. the PS Code Health module
D. the Test-Ds Configuration cmdlet
You should use the Pester test framework to perform a unit test and an integration test of the configuration before Project1 is deployed. The Pester test framework is a PowerShell testing framework that can be used to validate PowerShell DSC configurations.
You are deploying a server application that will run on a Server Core installation of
Windows Server 2019.
You create an Azure key vault and a secret.
You need to use the key vault to secure API secrets for third-party integrations.
Which three actions should you perform? Each correct answer presents part of the
solution.
NOTE: Each correct selection is worth one point.
D18912E1457D5D1DDCBD40AB3BF70D5D
A. Configure RBAC for the key vault
B. Modify the application to access the key vault.
C. Configure a Key Vault access policy.
D. Deploy an Azure Desired State Configuration (DSC) extension.
E. Deploy a virtual machine that uses a system-assigned managed identity.
BE: An app deployed to Azure can take advantage of Managed identities for Azure
resources, which allows the app to authenticate with Azure Key Vault using Azure AD
authentication without credentials (Application ID and Password/Client Secret) stored in the
app.
You manage build pipelines and deployment pipelines by using Azure DevOps. Your company has a team of 500 developers. New members are added continual lo the team. You need to automate me management of users and licenses whenever possible Which task must you perform manually?
A. modifying group memberships
B. procuring licenses
C. adding users
D. assigning entitlements
Page 2 out of 98 Pages |
Previous |