Time: 60 minutes | No of Qs: 53 | Passing Score: 700
Question 1:
Whether a person is suffering from a particular disease or not can be termed as a ______________.
regression
classification
clustering
All of the above
Answer: B.
Explanation
Whether a person is suffering from a disease or Not can be termed as a classification problem.
Question 2:
Azure Machine Learning provides the following features. Choose the correct option.
Automated machine learning
Analytical Machine Learning
Data and compute management
Azure Machine Learning designer
Answer: A, C, D.
Explanation
Azure Machine Learning provides the following features and capabilities:
Automated machine learning,
Azure Machine Learning designer,
Data and compute management,
Pipelines.
Question 3:
What is the foundation for most AI solutions?
Machine Learning
Deep Learning
Data Analysis
All of the above
Answer: A.
Explanation
Machine Learning is the foundation for most AI solutions.
Question 4:
A graphical interface enabling no-code development of machine learning solutions. Choose the correct option.
Automated machine learning
ML Studio
Azure Machine Learning designer
Machine Learning Dashboard
Answer: C.
Explanation
Azure Machine Learning designer is a graphical interface enabling no-code development of machine learning solutions.
Question 5:
Microsoft Azure provides the ___________ service - a cloud-based platform for creating, managing, and publishing machine learning models.
Azure Machine Learning
Azure Deep Learning
Azure AI Learning
Azure Cognitive Learning
Answer: A.
Explanation
Microsoft Azure provides the Azure Machine Learning service - a cloud-based platform for creating, managing, and publishing machine learning models.
Question 6:
What is used to orchestrate model training, deployment, and management tasks?
Notebooks
Python script
Bash Script
Pipelines
Answer: D.
Explanation
Data scientists, software engineers, and IT operations professionals can define pipelines to orchestrate model training, deployment, and management tasks.
Question 7:
Which feature enables non-experts to quickly create an effective machine learning model from data?
ML Studio
Automated machine learning
Azure Machine Learning designer
Machine Learning Dashboard
Answer: B.
Explanation
Automated machine learning features enable non-experts to quickly create an effective machine learning model from data.
Question 8:
A racing car telemetry system that uses sensors to proactively warn engineers about potential mechanical failures before they happen. Choose the correct option.
Anomaly detection
Classification
Clustering
Regression
Answer: A.
Explanation
By using anomaly detection - a machine learning based technique that analyzes data over time and identifies unusual changes.
Question 9:
What is AI?
Software that imitates human behaviors and capabilities
It has machine learning technology to make predictions and draw conclusions from data.
It is used to automatically detect errors or unusual activity in a system
AI! of the above
Answer: D.
Explanation
AI is the creation of software that imitates human behaviors and capabilities. Key elements include:
Machine learning - This is often the foundation for an AI system, and is the way we "teach" a computer model to make predictions and draw conclusions from data.
Anomaly detection - The capability to automatically detect errors or unusual activity in a system.
Computer vision - The capability of software to interpret the world visually through cameras, video, and images.
Natural language processing - The capability for a computer to interpret written or spoken language, and respond in kind.
Conversational AI - The capability of a software "agent" to participate in a conversation.
Question 10:
Which service provides an application programming interface (API) that developers can use to create anomaly detection solutions?
Anomaly Detector
Binary classification
Regression
None of the above
Answer: A.
Explanation
In Microsoft Azure, the Anomaly Detector service provides an application programming interface (API) that developers can use to create anomaly detection solutions.
Question 11:
You want to create a model to predict sales of ice cream based on historic data that includes daily ice cream sales totals and weather measurements. Which Azure service should you use?
Azure Machine Learning
QnA Maker
Text Analytics
None of the above
Answer: A.
Explanation
Azure Machine Learning enables you to train a predictive model from the existing data. Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/2-understand-machine-learn
Question 12:
You want to train a model that classifies images of dogs and cats based on a collection of your own digital photographs. Which Azure service should you use?
Azure Bot Service
Custom Vision
Computer Vision
None of the above
Answer: B.
Explanation
Custom Vision enables you to train an image classification model based on your own images. Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision
Question 13:
You are designing an AI application that uses computer vision to detect cracks in car windshields, and warns drivers when a windshield should be repaired or replaced. When tested in good lighting conditions, the application successfully detects 99% of dangerously damaged glass. Which of the following statements should you include in the application's user interface?
When used in good lighting conditions, this application can be used to identify potentially dangerous cracks and defects in windshields. If you suspect your windshield is damaged, even if the application does not detect any defects, you should have it inspected by a professional.
This application detects damage in your windshield. If the application detects a defect, have the windshield replaced or repaired. If no defect is detected, you’re good to go!
This application detects damage in any glass surface, but you must accept responsibility for using it only in appropriate lighting conditions.
All of the above
Answer: A.
Explanation
You should be transparent about the limitations of the application.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision
Question 14:
Define the sequence of steps performed by Azure Machine Learning. Choose the correct options from the following.
Prepare the data
Train a model
Deploy a predictive service
None of the above
Answer: A, B, C.
Explanation
Azure Machine Learning is a cloud-based service that helps simplify some of the tasks and reduce the time it takes to prepare data, train a model, and deploy a predictive service. Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/what-is-ml
Question 15:
A cloud service that you can use to train and manage machine learning models. Choose the correct option.
Azure Deep Learning
Azure Automated Learning
Azure Machine Learning
Azure AI Learning
Answer: C.
Explanation
Azure Machine Learning is a cloud service that you can use to train and manage machine learning models.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/introduction
Question 16:
To use Azure Machine Learning, you create ___________ in your Azure subscription. Choose the correct option.
a workspace
a workarea
a workground
a playground
Answer: A.
Explanation
To use Azure Machine Learning, you create a workspace in your Azure subscription.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-workspace
Question 17:
True or False. Your Azure subscription will never be charged any amount for data storage as long as the Azure Machine Learning workspace exists in your subscription.
True
False
Answer: B.
Explanation
Your Azure subscription will be charged a small amount for data storage as long as the Azure Machine Learning workspace exists in your subscription.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-workspace
Question 18:
Cloud-based resources on which you can run model training and data exploration processes. Choose the correct option.
Compute targets
Resource targets
Storage targets
Artifacts
Answer: A.
Explanation
Compute targets are cloud-based resources on which you can run model training and data exploration processes.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-compute
Question 19:
Where do you manage the compute targets? Choose the correct option.
Azure Machine Learning Designer
Azure Machine Learning Dashboard
Azure Machine Learning studio
Azure Machine Learning service
Answer: C.
Explanation
In Azure Machine Learning studio, view the Compute page (under Manage). This is where you manage the compute targets for your data science activities.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-compute
Question 20:
Which compute resources are development workstations that data scientists can use to work with data and models?
Compute Instances
Attached Compute
Compute Clusters
Inference Clusters
Answer: A.
Explanation
Compute Instances: Development workstations that data scientists can use to work with data and models.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-compute
Question 21:
A User can use the workspace to manage data, _________, code, __________, and other artifacts related to your machine learning workloads. Choose the correct option.
generic resources
models
logs
compute resources
Answer: B, D.
Explanation
A User can use this workspace to manage data, compute resources, code, models, and other artifacts related to your machine learning workloads.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-workspace
Question 22:
Which compute resources are scalable clusters of virtual machines for on-demand processing of experiment code?
Kubernetes Clusters
Managed Cluster
Compute Clusters
Inference Clusters
Answer: C.
Explanation
Compute Clusters: Scalable clusters of virtual machines for on-demand processing of experiment code.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-compute
Question 23:
Which compute resources are deployment targets for predictive services that use your trained model?
Compute Instances
Compute Clusters
Attached Compute
Inference Clusters
Answer: D.
Explanation
Inference Clusters: Deployment targets for predictive services that use your trained models. Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-compute
Question 24:
What are the compute resources you can create in Azure ML Studio? Choose the correct options.
Compute Clusters
Interface Clusters
Compute Instances
Attached Cluster
Answer: A, C.
Explanation
There are four kinds of compute resources you can create: Compute Instances, Attached Compute, Compute Clusters, Inference Clusters.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-compute
Question 25:
What all details are required for creating a new Machine Learning resource? Choose the correct options.
Subscription
Password vault
Resource group
Key vault
Answer: A, C, D.
Explanation
Subscription, Resource group, Key vault are required for creating a new Machine Learning resource.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-workspace
Time: 60 minutes | No of Qs: 53 | Passing Score: 700
Question 1:
To classify images based on the type of vehicle they contain, such as taxis, buses, cyclists, and so on is an example of _____________.
Image analysis
Semantic segmentation
Object detection
Image classification
Answer: D.
Explanation
In a traffic monitoring solution you might use an image classification model to classify images based on the type of vehicle they contain, such as taxis, buses, cyclists, and so on.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision
Question 2:
Which solution will be used to identify the location of different classes of vehicle in a traffic monitoring?
Image analysis
Object detection
Image classification
Semantic segmentation
Answer: B.
Explanation
A traffic monitoring solution might use object detection to identify the location of different classes of vehicle.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision
Question 3:
An advanced machine learning technique in which individual pixels in the image are classified according to the object to which they belong.
Semantic segmentation
Image classification
Image analysis
Object detection
Answer: A.
Explanation
Semantic segmentation is an advanced machine learning technique in which individual pixels in the image are classified according to the object to which they belong.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision
Question 4:
Machine learning models are trained to classify individual objects within an image, and identify their location with a bounding box. Choose the correct option.
Image analysis
Object detection
Semantic segmentation
Image classification
Answer: B.
Explanation
Object detection machine learning models are trained to classify individual objects within an image, and identify their location with a bounding box.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision
Question 5:
Most computer vision solutions are based on machine learning models that can be applied to __________ from cameras, videos, or images.
Text input
Object input
Raw input
Visual input
Answer: D.
Explanation
Most computer vision solutions are based on machine learning models that can be applied to visual input from cameras, videos, or images.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision
Question 6:
Which compute resources link to existing Azure compute resources, such as Virtual Machines or Azure Databricks clusters?
Kubernetes Clusters
Attached Compute
Compute Clusters
Inference Clusters
Answer: B.
Explanation
Attached Compute: Links to existing Azure compute resources, such as Virtual Machines or Azure Databricks clusters.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-compute
Question 7:
In automated ML, which virtual machine image is recommended to achieve the optimal balance of cost and performance?
Standard_DS11_v2
Standard_D15_v2
Standard_DS13_v2
None of the above
Answer: A.
Explanation
In automated ML, the Standard_DS11_v2 image is recommended to achieve the optimal balance of cost and performance.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-compute
Question 8:
True or False. Machine learning models must be trained with live data.
True
False
Answer: B.
Explanation
Machine learning models must be trained with existing data.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data
Question 9:
A User can use automated machine learning to train models for below problems. Choose the correct option.
Time series forecasting
Clustering
Classification
Regression
Answer: A, C, D.
Explanation
A User can use automated machine learning to train models for: Classification (predicting categories or classes) Regression (predicting numeric values) Time series forecasting (regression with a time-series element, enabling you to predict numeric values at a future point in time).
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data
Question 10:
In Azure Machine Learning, data for model training and other operations is usually encapsulated in an object called a __________.
database
dataset
file
All of the above
Answer: B.
Explanation
In Azure Machine Learning, data for model training and other operations is usually encapsulated in an object called a dataset.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data
Question 11:
Which machine learning model is suitable for predicting categories or classes?
Time series forecasting
Clustering
Classification
Regression
Answer: C.
Explanation
Classification is used for predicting categories or classes.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data
Question 12:
Which option in Automated ML can calculate feature importance for the best model? Choose the correct option.
Get best model
Blocked algorithms
Primary metric
Explain best model
Answer: D.
Explanation
Option D: This option causes automated machine learning to calculate feature importance for the best model; making it possible to determine the influence of each feature on the predicted label.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data
Question 13:
This causes Azure Machine Learning to automatically preprocess the features before training in Automated ML. Choose the correct option.
Enable featurization
Activate featurization
Enable Primary metric
All of the above
Answer: A.
Explanation
In Featurization settings. Enable featurization must be Selected which causes Azure Machine Learning to automatically preprocess the features before training.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data
Question 14:
A machine learning based technique that analyzes data over time and identifies unusual changes. Choose the correct option.
Outlier detection
Anomaly detection
Novelty detection
Intrusion detection
Answer: B.
Explanation
By using anomaly detection - a machine learning based technique that analyzes data over time and identifies unusual changes.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/3-understand-anomaly-detection
Question 15:
Sensors in the car collect _________, such as engine revolutions, brake temperature, and so on.
Metrics
Telemetry
Logs
Objects
Answer: B.
Explanation
Sensors in the car collect telemetry, such as engine revolutions, brake temperature, and so on. Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/3-understand-anomaly-detection
Question 16:
The _____________ app is a great example of the power of computer vision.
Seeing ML
Seeing Algo
Seeing AI
Seeing Vision
Answer: C.
Explanation
The Seeing AI app is a great example of the power of computer vision.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision
Question 17:
Seeing AI apps harnesses the power of AI to open up the visual world and describe nearby ___________, ___________and __________.
People
Text
Object
None of the above
Answer: A, B, C.
Explanation
The Seeing AI app is a great example of the power of computer vision. Designed for the blind and low vision community, the Seeing AI app harnesses the power of AI to open up the visual world and describe nearby people, text and objects.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision
Question 18:
Which classification involves training a machine learning model to classify images based on their contents?
Image classification
Object detection
Semantic segmentation
Image analysis
Answer: A.
Explanation
Image classification involves training a machine learning model to classify images based on their contents.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/get-started-ai-fundamentals/4-understand-computer-vision
Question 19:
Normalized root mean squared error metric is a part of _______________.
Time series forecasting
Clustering
Classification
Regression
Answer: D.
Explanation
Normalized root mean squared error metric is a part of Regression.
Question 20:
To identify the best model, the training process used some of the data to train the model, and applied a technique called __________ to iteratively test the trained model with data it wasn't trained with and compare the predicted value with the actual known value.
validation
cross-validation
inversion
None of the above
Answer: B.
Explanation
The best model is identified based on the evaluation metric you specified (Normalized root mean squared error). To calculate this metric, the training process used some of the data to train the model, and applied a technique called cross-validation to iteratively test the trained model with data it wasn't trained with and compare the predicted value with the actual known value.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data
Question 21:
What compute resources are based on standard Azure virtual machine images? Choose the correct option.
Compute Clusters
Interface Clusters
Compute Instances
Attached Cluster
Answer: A, C.
Explanation
Compute instances and clusters are based on standard Azure virtual machine images. Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/create-compute
Question 22:
The difference between the predicted and actual value is known as __________ in the model.
accuracy
prediction
error
precisiob
Answer: C.
Explanation
The difference between the predicted and actual value (known as the residuals) indicates the amount of error in the model.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data
Question 23:
In Azure Machine Learning, operations that you run are called ___________.
experiments
jobs
runs
None of the above
Answer: A.
Explanation
In Azure Machine Learning, operations that you run are called experiments.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data
Question 24:
In Azure Machine Learning, you can deploy a service as an __________ or to an _____________ cluster.
Azure Container Instances (ACI)
Azure Compute Instances (ACI)
Azure Inference Service (AIS) cluster.
Azure Kubernetes Service (AKS) cluster.
Answer: A, D.
Explanation
In Azure Machine Learning, you can deploy a service as an Azure Container Instances (ACI) or to an Azure Kubernetes Service (AKS) cluster.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/data
Question 25:
What information is required to connect to your deployed service from a client application? Choose the correct option.
Endpoint URL
Primary Key for your service
REST endpoint for your service
Access Key for your service
Answer: B, C.
Explanation
You need below information to connect to your deployed service from a client application. The REST endpoint for your service is the Primary Key for your service.
Reference Link: https://docs.microsoft.com/en-us/learn/modules/use-automated-machine-learning/deploy-model
Question 1:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. A platform as a service (PaaS) solution that hosts web apps in Azure provides the ability to scale the platform automatically.
Yes
No.
Answer: A.
Question 2:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. A platform as a service (PaaS) solution that hosts web apps in Azure provides full control over the operating system that hosts applications.
Yes
No.
Answer: B.
Question 3:
You are running Windows Server VM-01 in Azure, located in the West Europe region. Which Azure service should you use from the Azure portal to view service failure notifications that can affect the availability of VM-01?
Azure Service Fabric
Azure Monitor
Azure virtual machines
Azure Advisor
Answer: C.
Question 4:
You plan to extend your company’s network to Azure. The network contains a VPN appliance that uses an IP address of 128.8.8.8. You need to create an Azure resource that identifies the VPN appliance in Azure. Which Azure resource should you create?
Application gateway
Local Network Gateway
Virtual Network
Network interface
Answer: B.
Question 5:
An Azure availability zone can be used to protect the availability of your services running in Azure. Which of the following types of failures can you avoid by using availability zones?
a physical server failure
an Azure region failure
a storage failure
an Azure data center failure
Answer: D.
Question 6:
Which URL should you use to connect to Azure cloud and manage your Azure resources?
Answer: C.
Question 7:
You plan to store 20 TB of data in Azure. The data will be accessed infrequently and visualized by using Microsoft Power BI. You need to recommend a storage solution for the data. Which two solutions should you recommend? (SELECT TWO)
Azure Data Lake
Azure Cosmos DB
Azure SQL Data Warehouse
Azure SQL Database
Azure Database for PostgreSQL
Answer: A,C.
Question 8:
This question requires that you evaluate the italic text to determine if it is correct.
One of the benefits of Azure Synapse Analytics is that high availability is built into the platform.
Please review the italic text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice that makes the statement correct.
No change is needed
automatic scaling
data compression
versioning
Answer: A.
Question 9:
A team of developers at your company plans to deploy, and then remove, 50 customized virtual machines each week. Thirty of the virtual machines run Windows Server 2016 and 20 of the virtual machines run Ubuntu Linux.
You need to recommend which Azure service will minimize the administrative effort required to deploy and remove the virtual machines. What should you recommend?
Azure Reserved Virtual Machines (VM) Instances
Azure virtual machine scale sets
Azure DevTest Labs
Microsoft Managed Desktop
Answer: C.
Question 10:
You received a new task to delegate permissions to several Azure virtual machines simultaneously. What should you do?
Deploy the Azure virtual machines to the same Azure region
Deploy the Azure virtual machines by using the same Azure Resource Manager template
Deploy the Azure virtual machines to the same resource group
Deploy the Azure virtual machines to the same availability zone
Answer: C.
Question 11:
You plan to deploy 35 virtual machines to an Azure environment. You need to ensure that a virtual machine named VM-01 can't connect to the other virtual machines. What should you do in this case?
VM-01 must be deployed to a separate virtual network
VM-01 must run a different operating system than the other virtual machines
VM-01 must be deployed to a separate resource group
VM-01 must have two network interfaces
Answer: A.
Question 12:
Which of the following statements is true regarding Azure regions?
An Azure region contains one or more data centers that are connected by using a low-latency network
An Azure region is found in each country where Microsoft has a subsidiary office
An Azure region can be found in every country in Europe and the Americas only
An Azure region contains one or more data centers that are connected by using a high- latency network
Answer: A.
Question 13:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Azure availability zones are available to be configured in each and every Azure region.
Yes
No.
Answer: B.
Question 14:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Only virtual machines that run Ubuntu Linux operating systems can be created in availability zones.
Yes
No.
Answer: B.
Question 15:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Availability zones are used to replicate data and applications to multiple regions.
Yes
No.
Answer: B.
Question 16:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Data that is copied to an Azure Storage account is maintained automatically in at least three copies.
Yes
No.
Answer: A.
Question 17:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. All data copied to an Azure Storage account is backed up automatically to another Azure data center.
Yes
No.
Answer: B.
Question 18:
Your company plans to automate the deployment of servers to Azure. The company Chief Technology Officer(CTO) is concerned that administrative credentials may get exposed during the deployment. You need to recommend an Azure solution that encrypts the administrative credentials during the deployment. What should you include in the recommendation?
Azure Key Vault
Azure Information Protection
Azure Security Center
Azure Multi-Factor Authentication (MFA)
Answer: A.
Question 19:
Azure Key Vault is used to store secrets for __________ . Which of the following options completes the statement correctly?
Azure Active Directory (Azure AD) user accounts
Azure Active Directory (Azure AD) administrative accounts
Personally Identifiable Information (PlI)
Server applications
Answer: D.
Question 20:
Your manager has asked you to identify whether Azure complies with the company’s regional requirements. What should you use to fulfill this request?
The Knowledge Center
Azure Marketplace
The Azure portal
The Trust Center
Answer: D.
Question 21:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. From Azure Service Health, you can view the health of all the services deployed in your Azure environment and all the other services available in Azure.
Yes
No
Answer: A.
Question 22:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. From Azure Service Health, an administrator can create a rule to be alerted if an Azure service fails.
Yes
No.
Answer: A.
Question 23:
Which Azure service would you use to monitor threats in your Azure environment by using sensors?
Azure Monitor
Azure Security Center
Azure AD Identity Protection
Azure Advanced Threat Protection (ATP)
Answer: D.
Question 24:
Which Azure service would you use to enforce Azure MFA based on a condition?
Azure Monitor
Azure Security Center
Azure AD Identity Protection
Azure Advanced Threat Protection (ATP)
Answer: C.
Question 25:
You need to configure an Azure solution that is able to secure your websites from attacks and generate reports that contain details of attempted attacks. What should you include in your architecture?
Azure Firewall
a network security group (NSG)
Azure Information Protection
DDOS protection
Answer: D.
Question 1:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. An Azure service is fault tolerant if it remains available after a failure occurs.
Yes
No
Answer: A.
Question 2:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. An Azure service has disaster recovery capabilities if it can recover after a failure occurs.
Yes
No
Answer: A.
Quick Preview:
Question 3:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. An Azure service is scalable if it can't adapt to traffic demand changes, up or down.
Yes
No
Answer: B.
Question 4:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Azure provides low latency access to its services, which means services can be accessed quickly from the Internet.
Yes
No
Answer: A.
Question 5:
You are preparing to migrate all your company's virtual machines to a pay-as-you-go subscription in Azure cloud. The company CFO asks you what expenditure model Azure uses. What will you answer?
operational expenditure
elastic expenditure
capital expenditure
scalable expenditure
Answer: A.
Question 6:
Your company is running the business on an on-premises network that contains around 80 servers. You need to identify a solution to provide more resources to your users, but also to minimize capital and operational expenditure costs. What should you recommend?
a complete migration to the public cloud
an additional data center
a private cloud
a hybrid cloud
Answer: D.
Question 7:
Which cloud deployment solution is used for Azure virtual machines and Azure SQL databases? (SELECT TWO)
Azure virtual machines are Infrastructure as a Service (laaS)
Azure virtual machines are Platform as a Service (PaaS)
Azure virtual machines are Software as a Service (SaaS)
Azure SQL Databases are Infrastructure as a Service (laaS)
Azure SQL Databases are Platform as a Service (PaaS)
Answer: A,E.
Question 8:
You plan to migrate a web application to Azure. The web application is accessed by external users. You need to recommend a cloud deployment solution to minimize the amount of administrative effort used to manage the web application. What should you include in the recommendation?
Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (laaS)
Database as a Service (DaaS)
Answer: B.
Question 9:
The company’s compliance policy states that a server named Azure_on_Udemy_Server must be on a separate network segment. Which Azure solution should you recommend?
a resource group for Azure_on_Udemy_Server and another resource group for all the other servers
a virtual network for Azure on Udemy Server and another virtual network for all the other servers
a VPN for Azure_on_Udemy_Server and a virtual network gateway for each other server
one resource group for all the servers and a resource lock for Azure_on_Udemy_Server
Answer: B.
Question 10:
Which of the following Azure storage services must be used to store the unmanaged data disks of a virtual machine?
Azure Blobs
Azure Files
Azure Queues
Azure Tables
Answer: A.
Question 11:
You want to monitor the health of your Azure services. Which of the following Azure blades (menus) would you navigate to for this task?
Monitor blade
Subscriptions blade
Marketplace blade
Advisor blade
Answer: A.
Question 12:
You want to search and browse the available virtual machine images. Which of the following Azure blades (menus) would you navigate to for this task?
Monitor blade
Subscriptions blade
Marketplace blade
Advisor blade
Answer: C.
Question 13:
You want to view the available Azure security recommendations. Which of the following Azure blades (menus) would you navigate to for this task?
Monitor blade
Subscriptions blade
Marketplace blade
Advisor blade
Answer: D.
Question 14:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Azure SQL Database is a managed relational cloud database service.
Yes
No
Answer: A.
Question 15:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Azure Synapse Analytics is a cloud based service that leverages massively parallel processing (MPP) to quickly run complex queries across petabytes of data in a relational database.
Yes
No
Answer: A.
Question 16:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Azure Data Lake Analytics can run massively parallel data transformation and processing programs across petabytes of data.
Yes
No
Answer: A.
Question 17:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Azure HDInsight is an open source framework for the distributed processing and analysis of big data sets in clusters.
Yes
No
Answer: A.
Question 18:
You plan to implement a solution that allows users in your on-premises network to communicate to virtual machines in Azure cloud. Which two Azure resources should you include in your architecture?
a virtual network gateway
a load balancer
an application gateway
a virtual network
A gateway subnet
Answer: A,E.
Question 19:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Azure DevOps represents an integrated solution for the deployment of code.
Yes
No
Answer: A.
Question 20:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Azure Advisor represents an Azure tool that provides guidance and recommendations to improve an Azure environment.
Yes
No
Answer: A.
Question 21:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. Azure Cognitive Services is a simplified tool that you can use in Azure to build intelligent Artificial Intelligence (AI) applications.
Yes
No
Answer: A.
Question 22:
Please evaluate the following statement and select Yes if the statement is true, otherwise select No. You can use Azure Application Insights to monitor web applications.
Yes
No
Answer: A.
Question 23:
You want to connect through HTTPS to a brand new web server VM that you deployed to Azure. You open a browser, try to connect to the web server's Public IP, but your connection gets denied. What configuration should you modify so that you can connect to the web server?
virtual network gateway
virtual network
network security group
routing table
Answer: C.
Question 24:
Which of the following statements is true regarding Azure Germany?
Azure Germany can be used by legal citizens of Germany only.
Azure Germany can be used by only enterprises that are registered in Germany
Azure Germany can be used by only enterprises that purchase their azure licenses from a partner based in Germany
Azure Germany can be used by any user or enterprise that requires its data to stay in Germany.
Answer: D.
Question 25:
You have finished the project and you now want to delete the AZ900 resource group. It seems that you can't delete it, because a delete lock is applied to the AZ900 resource group. What should you do next in order to delete the AZ900 resource group?
ask a member of the global administrators group to delete it
first remove the lock then delete the resource group
modify an Azure policy first then delete the resource group
add an Azure tag, then delete the resource group
Answer: B.
Question 1:
For what purpose would a network administrator use the Nmap tool?
protection of the private IP addresses of internal hosts
identification of specific network anomalies
collection and analysis of security alerts and logs
detection and identification of open ports
Answer: D.
Question 2:
What network attack seeks to create a DoS for clients by preventing them from being able to obtain a DHCP lease?
DHCP starvation
IP address spoofing
DHCP spoofing
CAM table attack
Answer: A.
Question 3:
A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework?
automation
authentication
authorization
accounting
Answer: C.
Question 4:
A person coming to a cafe for the first time wants to gain wireless access to the Internet using a laptop. What is the first step the wireless client will do in order to communicate over the network using a wireless management frame?
associate with the AP
authenticate to the AP
discover the AP
agree with the AP on the payload
Answer: C.
Question 5:
A device has been assigned the IPv6 address of 2001:0db8:cafe:4500:1000:00d8:0058:00ab/64. Which is the network identifier of the device?
2001:0db8:cafe:4500:1000
2001:0db8:cafe:4500:1000:0058:00ab
1000:00d8:0058:00ab
2001:0db8:cafe:4500
2001
Answer: D.
Question 6:
An administrator wants to create four subnetworks from the network address 192.168.1.0/24. What is the network address and subnet mask of the second usable subnet?
subnetwork 192.168.1.64 subnet mask 255.255.255.192
subnetwork 192.168.1.64 subnet mask 255.255.255.240
subnetwork 192.168.1.32 subnet mask 255.255.255.240
subnetwork 192.168.1.128 subnet mask 255.255.255.192
subnetwork 192.168.1.8 subnet mask 255.255.255.224
Answer: A.
Question 7:
What term describes a set of software tools designed to increase the privileges of a user or to grant access to the user to portions of the operating system that should not normally be allowed?
compiler
rootkit
package manager
penetration testing
Answer: B.
Question 8:
The IT security personnel of an organization notice that the web server deployed in the DMZ is frequently targeted by threat actors. The decision is made to implement a patch management system to manage the server. Which risk management strategy method is being used to respond to the identified risk?
risk sharing
risk avoidance
risk reduction
risk retention
Answer: C.
Question 9:
What are three characteristics of an information security management system? (Choose three.)
It involves the implementation of systems that track the location and configuration of networked devices and software across an enterprise.
It is a systematic and multilayered approach to cybersecurity.
It addresses the inventory and control of hardware and software configurations of systems.
It consists of a set of practices that are systematically applied to ensure continuous improvement in information security.
It consists of a management framework through which an organization identifies, analyzes, and addresses information security risks.
It is based on the application of servers and security devices.
Answer: B, D, E.
Question 10:
Which three technologies should be included in a SOC security information and event management system? (Choose three.)
event collection, correlation, and analysis
security monitoring
user authentication
proxy service
intrusion prevention
threat intelligence
Answer: A, B, F.
Question 11:
What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?
http
www
.com
index
Answer: C.
Question 12:
What best describes the security threat of spoofing?
sending bulk email to individuals, lists, or domains with the intention to prevent users from accessing email
sending abnormally large amounts of data to a remote server to prevent user access to the server services
intercepting traffic between two hosts or inserting false information into traffic between two hosts
making data appear to come from a source that is not the actual source
Answer: D.
Question 13:
A newly created company has fifteen Windows 10 computers that need to be installed before the company can open for business. What is a best practice that the technician should implement when configuring the Windows Firewall?
The technician should remove all default firewall rules and selectively deny traffic from reaching the company network.
After implementing third party security software for the company, the technician should verify that the Windows Firewall is disabled.
The technician should enable all firewall profiles (domain, private, and public) to provide protection for different network scenarios. Use network location awareness to automatically apply the appropriate profile based on the network type.
The technician should enable the Windows Firewall for inbound traffic and install other firewall software for outbound traffic control.
Answer: C.
Question 14:
Which statement defines the difference between session data and transaction data in logs?
Session data analyzes network traffic and predicts network behavior, whereas transaction data records network sessions.
Session data is used to make predictions on network behaviors, whereas transaction data is used to detect network anomalies.
Session data records a conversation between hosts, whereas transaction data focuses on the result of network sessions.
Session data shows the result of a network session, whereas transaction data is in response to network threat traffic.
Answer: C.
Question 15:
Which device supports the use of SPAN to enable monitoring of malicious activity?
Cisco Catalyst switch
Cisco IronPort
Cisco NAC
Cisco Security Agent
Answer: A.
Question 16:
Which term is used for describing automated queries that are useful for adding efficiency to the cyberoperations workflow?
cyber kill chain
playbook
chain of custody
rootkit
Answer: B.
Question 17:
When ACLs are configured to block IP address spoofing and DoS flood attacks, which ICMP message should be allowed both inbound and outbound?
echo reply
unreachable
source quench
echo
Answer: C.
Question 18:
After a security monitoring tool identifies a malware attachment entering the network, what is the benefit of performing a retrospective analysis?
It can identify how the malware originally entered the network.
A retrospective analysis can help in tracking the behavior of the malware from the identification point forward.
It can calculate the probability of a future incident.
It can determine which network host was first affected.
Answer: B.
Question 19:
Which two data types would be classified as personally identifiable information (PII)? (Choose two.)
house thermostat reading
average number of cattle per region
vehicle identification number
hospital emergency use per region
Facebook photographs
Answer: C, E.
Question 20:
A help desk technician notices an increased number of calls relating to the performance of computers located at the manufacturing plant. The technician believes that botnets are causing the issue. What are the two purposes of botnets? (Choose two.)
to transmit viruses or spam to computers on the same network
to record any and all keystrokes
to attack other computers
to withhold access to a computer or files until money has been paid
to gain access to the restricted part of the operating system
Answer: A, C.
Question 21:
Which meta-feature element in the Diamond Model classifies the general type of intrusion event?
phase
results
methodology
direction
Answer: A.
Question 22:
Which Linux command is used to manage processes?
chrootkit
Is
grep
kill
Answer: D.
Question 23:
What Cisco management system is used to analyze application analysis data into dashboard reports?
NetFlow
NBAR2
Prime
IPFIX
Answer: C.
Question 24:
Which Windows Event Viewer log includes events regarding the operation of drivers, processes, and hardware?
system logs
application logs
security logs
setup logs
Answer: A.
Question 25:
Which method is used to make data unreadable to unauthorized users?
Encrypt the data.
Fragment the data.
Add a checksum to the end of the data.
Assign it a username and password.
Answer: A.
Question 1:
What is the purpose of entering the nslookup cisco.com command on a Windows PC?
to check if the DNS service is running
to connect to the Cisco server
to test if the Cisco server is reachable
to discover the transmission time needed to reach the Cisco server
Answer: C.
Question 2:
How is the event ID assigned in Sguil?
All events in the series of correlated events are assigned the same event ID.
Only the first event in the series of correlated events is assigned a unique ID.
All events in the series of correlated events are assigned the same event group ID.
Each event in the series of correlated events is assigned a unique ID.
Answer: D.
Question 3:
Which two types of network traffic are from protocols that generate a lot of routine traffic? (Choose two.)
routing updates traffic
Windows security auditing alert traffic
IPsec traffic
STP traffic
SSLtraffic
Answer: A, D.
Question 4:
What are two elements that form the PRI value in a syslog message? (Choose two.)
facility
timestamp
severity
header
host name
Answer: A, C.
Question 5:
Which three pieces of information are found in session data? (Choose three.)
default gateway IP address
source and destination port numbers
Layer 4 transport protocol
source and destination MAC addresses
user name
source and destination IP addresses
Answer: B, C, F.
Question 6:
What kind of ICMP message can be used by threat actors to perform network reconnaissance and scanning attacks?
ICMP mask reply
ICMP router discovery
ICMP unreachable
ICMP redirects
Answer: C.
Question 7:
A flood of packets with invalid source IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack has occurred?
TCP session hijacking
TCP SYN flood
TCP reset
UDP flood
Answer: B.
Question 8:
An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this?
DNS tunneling
TCP SYN flood
DHCP spoofing
ARP cache poisoning
Answer: C.
Question 9:
What is the most common goal of search engine optimization (SEO) poisoning?
to increase web traffic to malicious sites
to build a botnet of zombies
to trick someone into installing malware or divulging personal information
to overwhelm a network device with maliciously formed packets
Answer: A.
Question 10:
Users report that a database file on the main server cannot be accessed. A database administrator verifies the issue and notices that the database file is now encrypted. The organization receives a threatening email demanding payment for the decryption of the database file. What type of attack has the organization experienced?
man-in-the-middle attack
DoS attack
ransomware
Trojan horse
Answer: C.
Question 11:
What two kinds of personal information can be sold on the dark web by cybercriminals? (Choose two.)
city of residence
Facebook photos
name of a bank
name of a pet
street address
Answer: C, E.
Question 12:
What three services are offered by FireEye? (Choose three.)
blocks attacks across the web
creates firewall rules dynamically
identifies and stops latent malware on files
subjects all traffic to deep packet inspection analysis
deploys incident detection rule sets to network security tools
identifies and stops email threat vectors
Answer: C, D, F.
Question 13:
After containment, what is the first step of eradicating an attack?
Change all passwords.
Patch all vulnerabilities.
Hold meetings on lessons learned.
Identify all hosts that need remediation.
Answer: D.
Question 14:
Which activity is typically performed by a threat actor in the installation phase of the Cyber Kill Chain?
Install a web shell on the target web server for persistent access.
Harvest email addresses of user accounts.
Open a two-way communication channel to the CnC infrastructure.
Obtain an automated tool to deliver the malware payload.
Answer: A.
Question 15:
When dealing with a security threat and using the Cyber Kill Chain model, which two approaches can an organization use to help block potential exploitations on a system? (Choose two.)
Collect email and web logs for forensic reconstruction.
Conduct full malware analysis.
Train web developers for securing code.
Build detections for the behavior of known weaponizers.
Perform regular vulnerability scanning and penetration testing.
Answer: C, E.
Question 16:
How might corporate IT professionals deal with DNS-based cyber threats?
Limit the number of simultaneously opened browsers or browser tabs.
Monitor DNS proxy server logs and look for unusual DNS queries.
Use IPS/IDS devices to scan internal corporate traffic.
Limit the number of DNS queries permitted within the organization.
Answer: B.
Question 17:
How does using HTTPS complicate network security monitoring?
HTTPS adds complexity to captured packets.
HTTPS cannot protect visitors to a company-provided web site.
Web browser traffic is directed to infected servers.
HTTPS can be used to infiltrate DNS queries.
Answer: A.
Question 18:
What are the two important components of a public key infrastructure (PKI) used in network security? (Choose two.)
intrusion prevention system
digital certificates
symmetric encryption algorithms
certificate authority
pre-shared key generation
Answer: B, D.
Question 19:
Which three algorithms are designed to generate and verify digital signatures? (Choose three.)
3DES
IKE
DSA
AES
ECDSA
RSA
Answer: C, E, F.
Question 20:
Which section of a security policy is used to specify that only authorized individuals should have access to enterprise data?
statement of authority
identification and authentication policy
campus access policy
Internet access policy
statement of scope
acceptable use policy
Answer: B.
Question 21:
What kind of message is sent by a DHCPv4 client requesting an IP address?
DHCPDISCOVER broadcast message
DHCPDISCOVER unicast message
DHCPOFFER unicast message
DHCPACK unicast message
Answer: A.
Question 22:
What is the responsibility of the human resources department when handling a security incident?
Coordinate the incident response with other stakeholders and minimize the damage of the incident.
Perform actions to minimize the effectiveness of the attack and preserve evidence.
Apply disciplinary measures if an incident is caused by an employee.
Review the incident policies, plans, and procedures for local or federal guideline violations.
Answer: A.
Question 23:
How does a security information and event management system (SIEM) in a SOC help the personnel fight against security threats?
by integrating all security devices and appliances in an organization
by analyzing logging data in real time
by combining data from multiple technologies
by dynamically implementing firewall rules
Answer: C.
Question 24:
At which OSI layer is a source IP address added to a PDU during the encapsulation process?
network layer
transport layer
data link layer
application layer
Answer: A.
Question 25:
What is the purpose of CSMA/CA?
to prevent loops
to isolate traffic
to filter traffic
to prevent collisions
Answer: D.