AZ-202 PDF Dumps

How to use our free microsoft AZ-202 PDF Dumps

Our Free AZ-202 PDF dumps are based on the full AZ-202 mock exams which are available on our Web Site. The microsoft AZ-202 PDF consists in questions and answers with detailed explanations.
You can use the PDF AZ-202 practice exam as a study material to pass the AZ-202 exam, and don't forget to try also our AZ-202 testing engine Web Simulator.

On-Line Users: {{voteInfo.result.viewUsers}}
Subscribed Users: {{voteInfo.result.subscribedUsers}}
Thank you for your vote {{voteInfo.result.stars}} Your vote has already been submitted ({{voteInfo.result.votingPeople}} votes)

Follow us on SlideShare to see the latest available AZ-202 tests pdf.

										
											Q1.Members of the finance department for a company review and make changes to a Microsoft Excel workbook
that is hosted on OneDrive. The workbook contains projected costs and revenue for a project.
You need to develop an Azure Function that ingests data from the modified workbook and places it into a
Microsoft Word document.
Which two objects should you implement? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
 - A:   A group conversation subscription
 - B:   An Excel table input binding
 - C:   A group subscription
 - D:   An Excel table output binding
 - E:   An auth token input binding

 solution: B, C

Explanation:
B: Azure Functions supports trigger, input, and output bindings for external files. These bindings create API
connections to SaaS providers, or use existing API connections from your Function App's resource group.
References:
https://docs.microsoft.com/en-us/azure/azure-functions/functions-bindings-external-file


Q2.You need to troubleshoot the order workflow.
What should you do? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
 - A:   Review the run history.
 - B:   Review the activity log.
 - C:   Review the API connections.
 - D:   Review the trigger history.

 solution: B, D

Explanation:
Scenario: The order workflow fails to run upon initial deployment to Azure.
Deployment errors arise from conditions that occur during the deployment process. They appear in the activity
log.
References:
https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-group-audit
Question Set 2


Q3.You are developing a software solution for an autonomous transportation system. The solution uses large data
sets and Azure Batch processing to simulate navigation sets for entire fleets of vehicles.
You need to create compute nodes for the solution on Azure Batch.
What should you do?
 - A:   In Python, implement the class: TaskAddParameter
 - B:   In Python, implement the class: JobAddParameter
 - C:   In the Azure portal, create a Batch account.
 - D:   In Azure CLI, run the command: az batch pool create

 solution: D

Explanation:
You can create a pool of compute nodes using the az batch pool create command. The following example
creates a pool named mypool of 2 size Standard_A1_v2 nodes running Ubuntu 16.04 LTS. The suggested
node size offers a good balance of performance versus cost for this quick example.
az batch pool create \
 --id mypool --vm-size Standard_A1_v2 \
 --target-dedicated-nodes 2 \
 --image canonical:ubuntuserver:16.04-LTS \
 --node-agent-sku-id "batch.node.ubuntu 16.04"
References:
https://docs.microsoft.com/en-us/azure/batch/quick-create-cli


Q4.You maintain an Azure Web App that runs in a container. The container is using a DockerFile that is copied to
numerous places and consumes a large amount of storage.
You need to optimize the Dockerfile.
What should you do?
 - A:   Minimize layers by concatenating all RUN instructions on one line.
 - B:   Configure the CLI with a .dockerignore file.
 - C:   Minimize layers by grouping actions in as few RUN instructions as possible.
 - D:   Use multiple RUN instructions for cached operation.

 solution: C

Explanation:
Minimize the number of layers.
Prior to Docker 17.05, and even more, prior to Docker 1.10, it was important to minimize the number of layers
in your image.C
In Docker 1.10 and higher, only RUN, COPY, and ADD instructions create layers.
References:
https://docs.docker.com/v17.09/engine/userguide/eng-image/dockerfile_best-practices


Q5.Note: In this section you will see one or more sets of questions with the same scenario and problem.
Each question presents a unique solution to the problem, and you must determine whether the solution
meets the stated goals. More than one solution might solve the problem. It is also possible that none of
the solutions solve the problem.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution. Determine whether the solution meets the stated goals.
You need to meet the LabelMaker application security requirement.
Solution: Place the Azure Active Directory account into an Azure AD group. Create a ClusterRoleBinding and
assign it to the group.
Does the solution meet the goal?
 - A:   Yes
 - B:   No

 solution: A

Explanation:
Scenario: The LabelMaker applications must be secured by using an AAD account that has full access to all
namespaces of the Azure Kubernetes Service (AKS) cluster.
Permissions can be granted within a namespace with a RoleBinding, or cluster-wide with a ClusterRoleBinding.
References:
https://kubernetes.io/docs/reference/access-authn-authz/rbac/


Q6.Note: In this section you will see one or more sets of questions with the same scenario and problem.
Each question presents a unique solution to the problem, and you must determine whether the solution
meets the stated goals. More than one solution might solve the problem. It is also possible that none of
the solutions solve the problem.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution. Determine whether the solution meets the stated goals.
You need to meet the LabelMaker application security requirement.
Solution: Create a conditional access policy and assign it to the Azure Kubernetes Service cluster.
Does the solution meet the goal?
 - A:   Yes
 - B:   No

 solution: B

Explanation:
Scenario: The LabelMaker applications must be secured by using an AAD account that has full access to all
namespaces of the Azure Kubernetes Service (AKS) cluster.
Before an Azure Active Directory account can be used with the AKS cluster, a role binding or cluster role
binding needs to be created.
References:
https://docs.microsoft.com/en-us/azure/aks/aad-integration


Q7.Note: In this section you will see one or more sets of questions with the same scenario and problem.
Each question presents a unique solution to the problem, and you must determine whether the solution
meets the stated goals. More than one solution might solve the problem. It is also possible that none of
the solutions solve the problem.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution. Determine whether the solution meets the stated goals.
You need to meet the LabelMaker application security requirement.
Solution: Create a RoleBinding and assign it to the Azure AD account.
Does the solution meet the goal?
 - A:   Yes
 - B:   No

 solution: B

Explanation:
Scenario: The LabelMaker applications must be secured by using an AAD account that has full access to all
namespaces of the Azure Kubernetes Service (AKS) cluster.
Permissions can be granted within a namespace with a RoleBinding, or cluster-wide with a ClusterRoleBinding.
References:
https://kubernetes.io/docs/reference/access-authn-authz/rbac/


Q8.Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution. Determine whether the solution meets the stated goals.
You need to ensure that authentication events are triggered and processed according to the policy.
Solution: Create a new Azure Event Grid topic and add a subscription for the events.
Does the solution meet the goal?
 - A:   Yes
 - B:   No

 solution: B

Explanation:
Use a separate Azure Event Grid topics and subscriptions for sign-in and sign-out events.
Scenario: Authentication events are used to monitor users signing in and signing out. All authentication events
must be processed by Policy service. Sign outs must be processed as quickly as possible.


Q9.Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution. Determine whether the solution meets the stated goals.
You need to ensure that authentication events are triggered and processed according to the policy.
Solution: Create a new Azure Event Grid subscription for all authentication that delivers messages to an Azure
Event Hub. Use the subscription to process signout events.
Does the solution meet the goal?
 - A:   Yes
 - B:   No

 solution: B

Explanation:
Use a separate Azure Event Grid topics and subscriptions for sign-in and sign-out events.
Scenario: Authentication events are used to monitor users signing in and signing out. All authentication events
must be processed by Policy service. Sign outs must be processed as quickly as possible.


Q10.Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution. Determine whether the solution meets the stated goals.
You need to ensure that authentication events are triggered and processed according to the policy.
Solution: Create separate Azure Event Grid topics and subscriptions for sign-in and sign-out events.
Does the solution meet the goal?
 - A:   Yes
 - B:   No

 solution: A

Explanation:
Scenario: Authentication events are used to monitor users signing in and signing out. All authentication events
must be processed by Policy service. Sign outs must be processed as quickly as possible.
Question Set 3