Proper study guides for Replace Microsoft Architecting Microsoft Azure Solutions certified begins with Microsoft 70 534 exam questions preparation products which designed to deliver the 100% Correct 70 534 exam questions questions by making you pass the azure certification 70 534 test at your first time. Try the free 70 534 exam dumps demo right now.

Q1.  - (Topic 6)

You are planning an upgrade strategy for an existing Azure application. Multiple instances of the application run in Azure. The management team is concerned about application downtime, due to a business service level agreement (SLA).

You are evaluating which change in your environment will require downtime. You need to identify the changes to the environment that will force downtime. Which change always requires downtime?

A. Adding an HTTPS endpoint to a web role

B. Upgrading the hosted service by deploying a new package

C. Changing the value of a configuration setting

D. Changing the virtual machine size

Answer: A

Explanation: If you change the number of endpoints for your service, for example by adding a HTTPS endpoint for your existing Web Role, it will require downtime.

Reference: Re-Deploying your Windows Azure Service without Incurring Downtime http://blog.toddysm.com/2010/06/re-deploying-your-windows-azure-service-without-incurring-downtime.html


Q2. DRAG DROP - (Topic 8)

Marketing is ready to start their web application validations and is excited to be expanding globally.

You need to support the global web application requirements.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Answer:


Q3. DRAG DROP - (Topic 2)

You need to ensure that customer data is secured both in transit and at rest.

Which technologies should you recommend? To answer, drag the appropriate technology to the correct security requirement. Each technology may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

Answer:

Explanation:

* Azure Rights Management service

Azure Rights Management service uses encryption, identity, and authorization policies to help secure your files and email, and it works across multiple devices—phones, tablets, and PCs. Information can be protected both within your organization and outside your organization because that protection remains with the data, even when it leaves your organization’s boundaries.

* Transparent Data Encryption

Transparent Data Encryption (often abbreviated to TDE) is a technology employed by both Microsoft and Oracle to encrypt database files. TDE offers encryption at file level. TDE solves the problem of protecting data at rest, encrypting databases both on the hard drive and consequently on backup media.

* TLS/SSL

Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols designed to provide communications security over a computer network. They use X.509 certificates and hence asymmetric cryptography to authenticate the counterparty with whom they are communicating, and to negotiate a symmetric key.


Q4.  - (Topic 6)

You are designing a solution that will interact with non-Windows applications over unreliable network connections. You have a security token for each non-Windows application.

You need to ensure that non-Windows applications retrieve messages from the solution. Where should you retrieve messages?

A. An Azure Queue

B. The Azure Service Bus Queue

C. An Azure blob storage container that has a private access policy

D. Azure Table storage

Answer: B

Explanation: Any Microsoft or non-Microsoft applications can use a Service Bus REST API to manage and access messaging entities over HTTPS.

By using REST applications based on non-Microsoft technologies (e.g. Java, Ruby, etc.) are allowed not only to send and receive messages from the Service Bus, but also to create or delete queues, topics and subscription in a given namespace.

Reference: Service Bus Explorer https://code.msdn.microsoft.com/windowsazure/service-bus-explorer-f2abca5a


Q5.  - (Topic 6)

You are designing an Azure web application. The application uses one worker role. It does not use SQL Database. You have the following requirements:

✑ Maximize throughput and system resource availability

✑ Minimize downtime during scaling

You need to recommend an approach for scaling the application. Which approach should you recommend?

A. Increase the role instance size.

B. Set up horizontal partitioning.

C. Increase the number of role instances.

D. Set up vertical partitioning.

Answer: C

Explanation: On the Scale page of the Azure Management Portal, you can manually scale your application or you can set parameters to automatically scale it. You can scale applications that are running Web Roles, Worker Roles, or Virtual Machines. To scale an application that is running instances of Web Roles or Worker Roles, you add or remove role instances to accommodate the work load.

Reference: How to Scale an Application

http://azure.microsoft.com/en-gb/documentation/articles/cloud-services-how-to-scale/


Q6. DRAG DROP - (Topic 7)

You are implementing the new security requirements for the WGBCreditCruncher app.

You need to explain the security process flow to another developer. You start by navigating to the web app as it is presented to the user.

Which five actions must be performed in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Answer:


Q7.  - (Topic 6)

You are running a Linux guest in Azure Infrastructure-as-a-Service (IaaS).

You must run a daily maintenance task. The maintenance task requires native BASH commands.

You need to configure Azure Automation to perform this task.

Which three actions should you perform? Each correct answer presents part of the solution.

A. Create an automation account.

B. Create an Orchestrator runbook.

C. Create an asset credential.

D. Run the Invoke-Workflow Azure PowerShell cmdlet.

E. Import the SSH PowerShell Module.

Answer: A,C,E

Explanation: A: An Automation Account is a container for your Azure Automation resources: it provides a way to separate your environments or further organize your workflows.

To create An Automation Account

1. Log in to the Azure Management Portal.

2. In the Management Portal, click Create an Automation Account.

3. On the Add a New Automation Account page, enter a name and pick a region for the account.

Reference: Get started with Azure Automation

http://azure.microsoft.com/en-gb/documentation/articles/automation-create-runbook-from- samples/

C:

* Asset credentials are either a username and password combination that can be used with Windows PowerShell commands or a certificate that is uploaded to Azure Automation.

* The Assets page in Automation displays the various resources (also called “settings”) that are globally available to be used in or associated with a runbook, plus commands to import an integration module, add a new asset, or delete an asset. Assets include variables, schedules, credentials, and connections.

Reference: Getting Started with Azure Automation: Automation Assets http://azure.microsoft.com/blog/2014/07/29/getting-started-with-azure-automation-

automation-assets-2/

E:

Reference: Managing SSH enabled Linux hosts using Service Management Automation http://blogs.technet.com/b/orchestrator/archive/2014/05/01/managing-ssh-enabled-linux-hosts-using-service-management-automation.aspx


Q8.  - (Topic 6)

You are designing an Azure application that processes graphical image files. The graphical Images are processed in batches by remote applications that run on multiple servers.

You have the following requirements:

✑ The application must remain operational during batch-processing operations.

✑ Users must be able to roll back each image to a previous version.

You need to ensure that each remote application has exclusive access to an image while the application processes the image. Which type of storage should you use to store the images?

A. Table service

B. Queue service

C. Blob service

D. A single Azure VHD that is attached to the web role

Answer: C

Explanation: * Blob Leases allow you to claim ownership to a Blob. Once you have the lease you can then update the Blob or delete the Blob without worrying about another process changing it underneath you. When a Blob is leased, other processes can still read it, but any attempt to update it will fail. You can update Blobs without taking a lease first, but you do run the chance of another process also attempting to modify it at the same time.

* You can opt to use either optimistic or pessimistic concurrency models to manage access to blobs and containers in the blob service.

Reference: Azure Blob Storage Part 8: Blob Leases

http://justazure.com/azure-blob-storage-part-8-blob-leases/

Reference: Using Blob Leases to Manage Concurrency with Table Storage http://www.azurefromthetrenches.com/?p=1371