Users Online

· Guests Online: 103

· Members Online: 0

· Total Members: 188
· Newest Member: meenachowdary055

Forum Threads

Newest Threads
No Threads created
Hottest Threads
No Threads created

Latest Articles

Exam 70-533: Implementing Microsoft Azure Infrastructure Solutions Part 2

 

 

 

Question ID 13733

Your company has a subscription to Azure.
You configure your contoso.com domain to use a private Certificate Authority. You deploy a
web site named MyApp by using the Shared (Preview) web hosting plan.
You need to ensure that clients are able to access the MyApp website by using https.
What should you do?

Option A

Back up the Site and import into a new website.

Option B

Use the internal Certificate Authority and ensure that clients download the certificate chain.

Option C

Add custom domain SSL support to your current web hosting plan.

Option D

Change the web hosting plan to Standard.

Correct Answer D
Description Explanation: Enabling HTTPS for a custom domain is only available for the Standard web hosting plan mode of Azure websites. References:
Update Date and Time 2017-10-21 09:21:05

 

Question ID 13734

You administer an Azure Active Directory (Azure AD) tenant that has a SharePoint web
application named TeamSite1. TeamSite1 accesses your Azure AD tenant for user
information.
The application access key for TeamSite1 has been compromised.
You need to ensure that users can continue to use TeamSite1 and that the compromised
key does not allow access to the data in your Azure AD tenant.
Which two actions should you perform? Each correct answer presents part of the solution.

Option A

Remove the compromised key from the application definition for TeamSite1.

Option B

Delete the application definition for TeamSite1.

Option C

Generate a new application key for TeamSite1.

Option D

Generate a new application definition for TeamSite1.

Option E

Update the existing application key.

Correct Answer A,C

Description Explanation: One of the security aspects of Windows Azure storage is that all access is protected by access keys. It is possible to change the access keys (e.g. if the keys become compromised), and if changed, wed need to update the application to have the new key.
Update Date and Time 2017-10-21 09:27:58

 

 

 

Comments

No Comments have been Posted.

Post Comment

Please Login to Post a Comment.

Ratings

Rating is available to Members only.

Please login or register to vote.

No Ratings have been Posted.
Render time: 0.76 seconds
10,829,520 unique visits