You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" AZ-400 Practic Test 12 "
0 of 55 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
AZ-400
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking view questions. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
Answered
Review
Question 1 of 55
1. Question
Your company currently has an Azure DevOps project. You have to implement Azure pipelines for the build and deployment of various web-based applications. You have to ensure that monitoring data from Application Insights is incorporated in the release pipeline. Which of the following would you implement for this?
Correct
Answer D
To enable monitoring data to be available in the DevOps pipeline, you can use Continuous monitoring. Here monitoring can be incorporated into the DevOps Pipeline from Application Insights.
Option A is incorrect because Release Annotations is used to check if the changes you made to your application impact the performance of the application.
Option B is incorrect because this is used to take a debug snapshot of your web application.
Option C is incorrect because this is used to check the users usage within your application.
For more information on continuous monitoring, one can browse to the following URL-
To enable monitoring data to be available in the DevOps pipeline, you can use Continuous monitoring. Here monitoring can be incorporated into the DevOps Pipeline from Application Insights.
Option A is incorrect because Release Annotations is used to check if the changes you made to your application impact the performance of the application.
Option B is incorrect because this is used to take a debug snapshot of your web application.
Option C is incorrect because this is used to check the users usage within your application.
For more information on continuous monitoring, one can browse to the following URL-
To enable monitoring data to be available in the DevOps pipeline, you can use Continuous monitoring. Here monitoring can be incorporated into the DevOps Pipeline from Application Insights.
Option A is incorrect because Release Annotations is used to check if the changes you made to your application impact the performance of the application.
Option B is incorrect because this is used to take a debug snapshot of your web application.
Option C is incorrect because this is used to check the users usage within your application.
For more information on continuous monitoring, one can browse to the following URL-
Your company currently has an Azure DevOps organization and an Azure subscription. They want to implement various security practices when it comes to managing resources in their Azure subscription. The requirements for security implementation are given below.
> Be able to provide just-in-time access to Azure resources.
> Provide time-bound access to resources.
You decide to implement Conditional Access.
Would this fulfill the requirement?
Correct
Answer B
To meet all of these requirements, you have to use Privileged Identity Management. Conditional Access is used to allow access based on certain conditions.
For more information on Privileged Identity Management, one can browse to the following URL-
To meet all of these requirements, you have to use Privileged Identity Management. Conditional Access is used to allow access based on certain conditions.
For more information on Privileged Identity Management, one can browse to the following URL-
To meet all of these requirements, you have to use Privileged Identity Management. Conditional Access is used to allow access based on certain conditions.
For more information on Privileged Identity Management, one can browse to the following URL-
Your company currently has an Azure DevOps organization and an Azure subscription. They want to implement various security practices when it comes to managing resources in their Azure subscription. The requirements for security implementation are given below.
> Be able to provide just-in-time access to Azure resources.
> Provide time-bound access to resources.
You decide to implement Azure Privileged Identity Management.
Would this fulfill the requirement?
Correct
Answer A
Yes, this is the right approach.
Privileged Identity Management will meet all of the requirements. Here you can provide Just-In-Time access to your resources. You can also mark the access as time-bound.
For more information on Privileged Identity Management, one can browse to the following URL-
Privileged Identity Management will meet all of the requirements. Here you can provide Just-In-Time access to your resources. You can also mark the access as time-bound.
For more information on Privileged Identity Management, one can browse to the following URL-
Privileged Identity Management will meet all of the requirements. Here you can provide Just-In-Time access to your resources. You can also mark the access as time-bound.
For more information on Privileged Identity Management, one can browse to the following URL-
Your company currently has an Azure DevOps organization and an Azure subscription. They want to implement various security practices when it comes to managing resources in their Azure subscription. The requirements for security implementation are given below.
> Be able to provide just-in-time access to Azure resources.
> Provide time-bound access to resources.
You decide to implement Azure Security Center.
Would this fulfill the requirement?
Correct
Answer B
To meet all of these requirements, you have to make use of Privileged Identity Management. Azure Security Center is used as a security monitoring solution in Azure.
For more information on Privileged Identity Management, one can browse to the following URL-
To meet all of these requirements, you have to make use of Privileged Identity Management. Azure Security Center is used as a security monitoring solution in Azure.
For more information on Privileged Identity Management, one can browse to the following URL-
To meet all of these requirements, you have to make use of Privileged Identity Management. Azure Security Center is used as a security monitoring solution in Azure.
For more information on Privileged Identity Management, one can browse to the following URL-
Your company is planning to use Git for source control. It would be used for the development of a complex application. You have to decide the right-branching model when it comes to adding new functionality to the application.
Which of the following should be used as the Branch lifetime?
Correct
Answer B
When adding new features to an application, the best practice is to create short-lived feature branches. This would reduce the complication when it comes to merging the branch onto the main master branch.
Options A, C and D are incorrect because this is the correct design practice for feature branches.
For more information on git branching, one can browse to the following URL-
When adding new features to an application, the best practice is to create short-lived feature branches. This would reduce the complication when it comes to merging the branch onto the main master branch.
Options A, C and D are incorrect because this is the correct design practice for feature branches.
For more information on git branching, one can browse to the following URL-
When adding new features to an application, the best practice is to create short-lived feature branches. This would reduce the complication when it comes to merging the branch onto the main master branch.
Options A, C and D are incorrect because this is the correct design practice for feature branches.
For more information on git branching, one can browse to the following URL-
Your company is planning to use Git for source control. It would be used for the development of a complex application. You have to decide the right-branching model when it comes to adding new functionality to the application.
Which of the following should be used as the Branch type?
Correct
Answer B
When adding new features to an application, you should consider creating Feature branches.
Options A, C and D are incorrect because the correct adopted design practice is to create feature branches for your features.
For more information on git branching, one can browse to the following URL-
You have an Azure DevOps project. Currently, you are using Azure Repos Git for source code version control. You are planning on using a third-party continuous integration tool to control the builds. Which of the following in Azure DevOps would you use for authentication?
Correct
Answer B
If you need to integrate with external tools, you need to use Personal Access Tokens. Personal Access Tokens can be used to authorize external services into Azure DevOps.
Options A, C and D are incorrect because the supported authentication method for external services is Personal Access Tokens.
For more information on authenticating with Personal Access Tokens, one can browse to the following URL-
If you need to integrate with external tools, you need to use Personal Access Tokens. Personal Access Tokens can be used to authorize external services into Azure DevOps.
Options A, C and D are incorrect because the supported authentication method for external services is Personal Access Tokens.
For more information on authenticating with Personal Access Tokens, one can browse to the following URL-
If you need to integrate with external tools, you need to use Personal Access Tokens. Personal Access Tokens can be used to authorize external services into Azure DevOps.
Options A, C and D are incorrect because the supported authentication method for external services is Personal Access Tokens.
For more information on authenticating with Personal Access Tokens, one can browse to the following URL-
Your company is planning to use Azure DevOps. They want to use Azure DevOps for spring planning. Here they also want to visualize the flow of work by using agile methodology. Which of the following should they use in Azure DevOps?
Correct
Answer A
This can be achieved with the use of Kanban boards. With Kanban boards, you can get a visualization of the different work items in your project.
Option B is incorrect since this is only used for planning your sprints.
Option C is incorrect since Delivery plans cannot be used for visualization.
Option D is incorrect since this is used to host your work items.
For more information on Kanban boards, one can browse to the following URL-
Your team is working on an application with its code hosted in a git repository in Azure Repos. The application source is made up of multiple branches. You want to ensure that when the main branch is updated with the feature branch, it overrides the Git repository history. Which of the following would you use as a Git option for this?
Correct
Answer A
For this, you can use the Rebase option. This just takes the commits on your branch and just replays them on an existing branch.
Option B is incorrect since this is used to fetch the latest changes.
Option C is incorrect since this is used for plain merging.
Option D is incorrect since this is used for pushing your changes onto the repository.
For more information on the rebase option, one can browse to the following URL-
Your company currently has a set of applications deployed to Azure. All of the changes are managed via Azure DevOps. The requirements of each application, when it comes to feature releases, are given below.
Which of the following is the release strategy you would opt for contosoapp1?
Correct
Answer – B
You can achieve this type of deployment with Canary deployments. Canary deployments are used to deploy changes to a set of users first. Once the users confirm that the application changes are fine, then the complete rollout can be carried out.
Option A is incorrect because this involves having two environments when it comes to application deployments.
Option C is incorrect because this involves making rolling deployments to infrastructure.
Option D is incorrect because this is not a valid deployment model.
For more information on an example on Canary deployments, one can browse to the following URL-
You can achieve this type of deployment with Canary deployments. Canary deployments are used to deploy changes to a set of users first. Once the users confirm that the application changes are fine, then the complete rollout can be carried out.
Option A is incorrect because this involves having two environments when it comes to application deployments.
Option C is incorrect because this involves making rolling deployments to infrastructure.
Option D is incorrect because this is not a valid deployment model.
For more information on an example on Canary deployments, one can browse to the following URL-
You can achieve this type of deployment with Canary deployments. Canary deployments are used to deploy changes to a set of users first. Once the users confirm that the application changes are fine, then the complete rollout can be carried out.
Option A is incorrect because this involves having two environments when it comes to application deployments.
Option C is incorrect because this involves making rolling deployments to infrastructure.
Option D is incorrect because this is not a valid deployment model.
For more information on an example on Canary deployments, one can browse to the following URL-
Your company currently has a set of applications deployed to Azure. All of the changes are managed via Azure DevOps. The requirements of each application, when it comes to feature releases, are given below.
Which of the following is the release strategy you would opt for contosoapp2?
Correct
Answer – A
You can achieve this type of deployment with Blue/Green deployments. With this type of deployment, you can have two environments in place. When you are ready for the new version deployment, you can switch to the new environment. Then it allows you to switch back to the older environment at any point in time.
Option B is incorrect because this involves rolling out changes to a subset of users at a time.
Option C is incorrect because this involves making rolling deployments to infrastructure.
Option D is incorrect because this is not a valid deployment model.
For more information on an example on Blue/Green deployments, one can browse to the following URL-
You can achieve this type of deployment with Blue/Green deployments. With this type of deployment, you can have two environments in place. When you are ready for the new version deployment, you can switch to the new environment. Then it allows you to switch back to the older environment at any point in time.
Option B is incorrect because this involves rolling out changes to a subset of users at a time.
Option C is incorrect because this involves making rolling deployments to infrastructure.
Option D is incorrect because this is not a valid deployment model.
For more information on an example on Blue/Green deployments, one can browse to the following URL-
You can achieve this type of deployment with Blue/Green deployments. With this type of deployment, you can have two environments in place. When you are ready for the new version deployment, you can switch to the new environment. Then it allows you to switch back to the older environment at any point in time.
Option B is incorrect because this involves rolling out changes to a subset of users at a time.
Option C is incorrect because this involves making rolling deployments to infrastructure.
Option D is incorrect because this is not a valid deployment model.
For more information on an example on Blue/Green deployments, one can browse to the following URL-
A company is planning to deploy a server application to an Azure virtual machine. This will be running Windows Server 2019. The company also has an Azure Key Vault that stores secrets. You have to secure the key vault to secure API secrets for third-party integrations. Which of the following would you implement for this requirement? Choose three answers from the options given below.
Correct
Here are the three best options to secure the key vault and API secrets for third-party integrations in this scenario:
Configure Role-based Access Control (RBAC) for the vault:
This is fundamental for security. RBAC allows you to define fine-grained permissions for who can access the key vault and what actions they can perform.
You can create roles that grant specific permissions (read, write, delete, etc.) to different users, groups, or service principals. This ensures that only authorized entities can access the secrets they need.
Implement a Key Vault Access Policy:
Key Vault Access Policies define which entities (users, applications, services) can access the key vault and what permissions they have.
For your virtual machine, you’ll create an access policy that grants it the necessary permissions to retrieve the API secrets.
Configure a system-assigned managed identity for the virtual machine:
A system-assigned managed identity is an Azure identity that’s directly associated with your virtual machine.
This eliminates the need to manage and rotate credentials within the application code.
The virtual machine can use this identity to authenticate with the key vault and retrieve secrets securely.
Why the other options are less relevant:
Change the application code to access the key vault: While necessary to some extent, this is not the primary security measure. The focus should be on secure access control and authentication.
Configure Azure Desired State Configuration (DSC): DSC is excellent for managing and automating the configuration of your virtual machines. However, it’s not directly related to securing access to the key vault.
By implementing these three measures, you establish a robust security framework for accessing API secrets from the key vault within your Azure environment.
Here are the three best options to secure the key vault and API secrets for third-party integrations in this scenario:
Configure Role-based Access Control (RBAC) for the vault:
This is fundamental for security. RBAC allows you to define fine-grained permissions for who can access the key vault and what actions they can perform.
You can create roles that grant specific permissions (read, write, delete, etc.) to different users, groups, or service principals. This ensures that only authorized entities can access the secrets they need.
Implement a Key Vault Access Policy:
Key Vault Access Policies define which entities (users, applications, services) can access the key vault and what permissions they have.
For your virtual machine, you’ll create an access policy that grants it the necessary permissions to retrieve the API secrets.
Configure a system-assigned managed identity for the virtual machine:
A system-assigned managed identity is an Azure identity that’s directly associated with your virtual machine.
This eliminates the need to manage and rotate credentials within the application code.
The virtual machine can use this identity to authenticate with the key vault and retrieve secrets securely.
Why the other options are less relevant:
Change the application code to access the key vault: While necessary to some extent, this is not the primary security measure. The focus should be on secure access control and authentication.
Configure Azure Desired State Configuration (DSC): DSC is excellent for managing and automating the configuration of your virtual machines. However, it’s not directly related to securing access to the key vault.
By implementing these three measures, you establish a robust security framework for accessing API secrets from the key vault within your Azure environment.
Here are the three best options to secure the key vault and API secrets for third-party integrations in this scenario:
Configure Role-based Access Control (RBAC) for the vault:
This is fundamental for security. RBAC allows you to define fine-grained permissions for who can access the key vault and what actions they can perform.
You can create roles that grant specific permissions (read, write, delete, etc.) to different users, groups, or service principals. This ensures that only authorized entities can access the secrets they need.
Implement a Key Vault Access Policy:
Key Vault Access Policies define which entities (users, applications, services) can access the key vault and what permissions they have.
For your virtual machine, you’ll create an access policy that grants it the necessary permissions to retrieve the API secrets.
Configure a system-assigned managed identity for the virtual machine:
A system-assigned managed identity is an Azure identity that’s directly associated with your virtual machine.
This eliminates the need to manage and rotate credentials within the application code.
The virtual machine can use this identity to authenticate with the key vault and retrieve secrets securely.
Why the other options are less relevant:
Change the application code to access the key vault: While necessary to some extent, this is not the primary security measure. The focus should be on secure access control and authentication.
Configure Azure Desired State Configuration (DSC): DSC is excellent for managing and automating the configuration of your virtual machines. However, it’s not directly related to securing access to the key vault.
By implementing these three measures, you establish a robust security framework for accessing API secrets from the key vault within your Azure environment.
A company has an Azure subscription. They want to deploy a set of applications to a set of Azure virtual machines. Each application has different requirements when it comes to reliability.
Which of the following would you recommend for contosoapp1?
Correct
Answer – C
For this requirement, you can make use of Virtual Machine Scale Sets. With Virtual machine scale sets, the underlying virtual machines can scale out or in based on demand.
Options A and B are incorrect since this is used for managing the availability of virtual machines.
Option D is incorrect since this is a DNS routing-based service.
For more information on virtual machine scale sets, one can browse to the following URL-
For this requirement, you can make use of Virtual Machine Scale Sets. With Virtual machine scale sets, the underlying virtual machines can scale out or in based on demand.
Options A and B are incorrect since this is used for managing the availability of virtual machines.
Option D is incorrect since this is a DNS routing-based service.
For more information on virtual machine scale sets, one can browse to the following URL-
For this requirement, you can make use of Virtual Machine Scale Sets. With Virtual machine scale sets, the underlying virtual machines can scale out or in based on demand.
Options A and B are incorrect since this is used for managing the availability of virtual machines.
Option D is incorrect since this is a DNS routing-based service.
For more information on virtual machine scale sets, one can browse to the following URL-
A company has an Azure subscription. They want to deploy a set of applications to a set of Azure virtual machines. Each application has different requirements when it comes to reliability.
Which of the following would you recommend for contosoapp2?
Correct
Answer – B
Option A is incorrect since Availability Sets can’t protect against data center level failures.
Option C is incorrect since this is used for scaling in and out virtual machines in your infrastructure.
Option D is incorrect since this is a DNS routing-based service.
For this requirement, you can make use of Availability Zones. Here you can protect your resources from an Azure Data Center failure.
For more information on Availability Zones, one can browse to the following URL-
Your team has set up the following in their DevOps environment.
> An Azure DevOps project
> An Azure repo named contosorepo in the Azure DevOps project
> A Jenkins instance on an Azure virtual machine
> A project in Jenkins to carry out the build process for the application stored in Azure repo
You have to ensure that whenever a commit is made to Azure repo, it would trigger a build in Jenkins.
You create a build trigger in Jenkins.
Would this fulfill the requirement?
Correct
Answer B
To accomplish the requirement of triggering a build in Jenkins whenever a commit is made to Azure Repos, you have to create a service hook in your Azure DevOps project.
For more information on creating a service hook in Azure DevOps, please visit the below URL-
To accomplish the requirement of triggering a build in Jenkins whenever a commit is made to Azure Repos, you have to create a service hook in your Azure DevOps project.
For more information on creating a service hook in Azure DevOps, please visit the below URL-
To accomplish the requirement of triggering a build in Jenkins whenever a commit is made to Azure Repos, you have to create a service hook in your Azure DevOps project.
For more information on creating a service hook in Azure DevOps, please visit the below URL-
The following release pipeline has been defined in Azure DevOps.
The Artifacts section has been defined to pick up the artifacts from a build pipeline defined in Azure DevOps. The source code which is being build is an ASP.Net Core based solution. The application needs to be built on a Windows platform.
You have to ensure that the code released in the Staging stage is released to an Azure Web App instance named contosostagingweb. Where would you enable this setting?
Correct
Answer – C
You can implement this in the job/task section. If you go to this section, you can add a task of Deploy Azure App Service.
Here you can define the App Service Type as Web App on Windows. And then, you can define the App Service name.
Since this is clear from the implementation, all other options are incorrect.
For more information on build and release tasks, please visit the below URL-
The following release pipeline has been defined in Azure DevOps.
The Artifacts section has been defined to pick up the artifacts from a build pipeline defined in Azure DevOps. The source code which is being build is an ASP.Net Core based solution. The application needs to be built on a Windows platform.
You have to ensure that the code released in the Staging stage is released to an Azure Web App instance named contosoproductionweb. Where would you enable this setting?
Correct
Answer – C
You can implement this in the job/task section. If you go to this section, you can add a task of Deploy Azure App Service.
Here you can define the App Service Type as Web App on Windows. And then, you can define the App Service name.
Since this is clear from the implementation, all other options are incorrect.
For more information on build and release tasks, please visit the below URL-
The following release pipeline has been defined in Azure DevOps.
The Artifacts section has been defined to pick up the artifacts from a build pipeline defined in Azure DevOps. The source code which is being build is an ASP.Net Core based solution. The application needs to be built on a Windows platform.
You need to define the number of days a release can be retained. Where would you define this?
Correct
Answer – C
You would define this in the Retention section, as shown below.
The Microsoft documentation mentions the following.
Since this is clear from the implementation, all other options are incorrect.
For more information on retention policies, please visit the below URL-
A company wants to start using the Azure DevOps tools. They have set up an organization and a project. They want to set up multiple Azure repositories. Different project teams would use each repository.
Each project team has different requirements for the source code versioning system, as given below.
Which of the following would you recommend as the source code versioning system to use in Azure Repos for TeamA?
Correct
Answer – B
You can accomplish this using Git in Azure Repos.
This is also given in the Microsoft documentation.
Since this is clearly given in the Microsoft documentation, all other options are incorrect.
For more information on using Git vs Team Foundation version control, please visit the below URL-
A company wants to start using the Azure DevOps tools. They have set up an organization and a project. They want to set up multiple Azure repositories. Different project teams would use each repository.
Each project team has different requirements for the source code versioning system, as given below.
Which of the following would you recommend as the source code versioning system to use in Azure Repos for TeamB?
Correct
Answer – A
You can accomplish this using Team Foundation Version Control in Azure Repos.
This is also given in the Microsoft documentation.
Since this is clearly given in the Microsoft documentation, all other options are incorrect.
For more information on using Git vs Team Foundation version control, please visit the below URL-
A company wants to start using the Azure DevOps tools. They have set up an organization and a project. They want to set up multiple Azure repositories. Different project teams would use each repository.
Each project team has different requirements for the source code versioning system, as given below.
Which of the following would you recommend as the source code versioning system to use in Azure Repos for TeamC?
Correct
Answer – B
You can accomplish this using Git in Azure Repos.
This is also given in the Microsoft documentation.
Since this is clearly given in the Microsoft documentation, all other options are incorrect.
For more information on using Git vs Team Foundation version control, please visit the below URL-
You have to create a multi-stage docker image for an ASP.Net core 2.2 application. Below is the incomplete Dockerfile. The Dockerfile is located in your project directory.
FROM SLOT_1 AS build-env
WORKDIR /app
COPY *.csproj ./
RUN dotnet restore
COPY . ./
SLOT_2 dotnet publish -c Release -o out
FROM SLOT_3
WORKDIR /app
COPY –from=build-env /app/out .
SLOT_4 [“dotnet”, “aspnetapp.dll”]
Which of the following would go into SLOT_1?
Correct
Answer – B
The first stage of the Dockerfile is to go ahead and build the .Net application. For this, we need to use the .net core SDK.
An example of this is given in the Docker documentation.
Since this is clearly given in the Docker documentation, all other options are incorrect.
For more information on creating Dockerfile for .net core applications, please visit the below URL-
You have to create a multi-stage docker image for an ASP.Net core 2.2 application. Below is the incomplete Dockerfile. The Dockerfile is located in your project directory.
FROM SLOT_1 AS build-env
WORKDIR /app
COPY *.csproj ./
RUN dotnet restore
COPY . ./
SLOT_2 dotnet publish -c Release -o out
FROM SLOT_3
WORKDIR /app
COPY –from=build-env /app/out .
SLOT_4 [“dotnet”, “aspnetapp.dll”]
Which of the following would go into SLOT_2?
Correct
Answer – D
The next part is to use the ‘RUN’ command to publish a release of the application.
An example of this is given in the Docker documentation.
Since this is clearly given in the Docker documentation, all other options are incorrect.
For more information on creating Dockerfile for .net core applications, please visit the below URL-
You have to create a multi-stage docker image for an ASP.Net core 2.2 application. Below is the incomplete Dockerfile. The Dockerfile is located in your project directory.
FROM SLOT_1 AS build-env
WORKDIR /app
COPY *.csproj ./
RUN dotnet restore
COPY . ./
SLOT_2 dotnet publish -c Release -o out
FROM SLOT_3
WORKDIR /app
COPY –from=build-env /app/out .
SLOT_4 [“dotnet”, “aspnetapp.dll”]
Which of the following would go into SLOT_3?
Correct
Answer – A
Now we need to use the runtime image to run the application.
An example of this is given in the Docker documentation.
Since this is clearly given in the Docker documentation, all other options are incorrect.
For more information on creating Dockerfile for .net core applications, please visit the below URL-
You have to create a multi-stage docker image for an ASP.Net core 2.2 application. Below is the incomplete Dockerfile. The Dockerfile is located in your project directory.
FROM SLOT_1 AS build-env
WORKDIR /app
COPY *.csproj ./
RUN dotnet restore
COPY . ./
SLOT_2 dotnet publish -c Release -o out
FROM SLOT_3
WORKDIR /app
COPY –from=build-env /app/out .
SLOT_4 [“dotnet”, “aspnetapp.dll”]
Which of the following would go into SLOT_4?
mcr.microsoft.com/dotnet/core/aspnet:2.2
mcr.microsoft.com/dotnet/core/sdk:2.2
Correct
Answer – C
Finally, we use the “ENTRYPOINT” clause to specify the “dll” that needs to run our application.
An example of this is given in the Docker documentation.
Since this is clearly given in the Docker documentation, all other options are incorrect.
For more information on creating Dockerfile for .net core applications, please visit the below URL-
A company wants to implement DevOps processes for a set of applications. These applications are based on the .Net framework. They want to ensure that security validation is performed during each stage of the application lifecycle. They want to ensure the following.
Static Code Analysis is performed during the development stage.
Static Code Analysis is performed during the Continuous Integration stage.
All high severity issues are logged in a tracking tool.
You have to advise on the right tool that can be used for these requirements.
Which of the following can be used for the requirement?
Static Code Analysis is performed during the development stage.
Correct
Answer – C
SonarQube is a code analysis tool that can be used during the development and continuous integration stage.
Below is a snippet from the SonarQube documentation on what you can achieve with the tool.
Option A is incorrect since this is a collaboration-based tool.
Option B is incorrect since this is a continuous integration tool.
Option D is incorrect since this tool can be used for Java-based applications only.
Option E is incorrect since this tool is used for managing software projects.
For more information on SonarQube, please visit the below URL-
A company wants to implement DevOps processes for a set of applications. These applications are based on the .Net framework. They want to ensure that security validation is performed during each stage of the application lifecycle. They want to ensure the following.
> Static Code Analysis is performed during the development stage.
> Static Code Analysis is performed during the Continuous Integration stage.
> All high severity issues are logged in a tracking tool.
You have to advise on the right tool that can be used for these requirements.
Which of the following can be used for the requirement?
Static Code Analysis is performed during the Continuous Integration stage.
Correct
Answer – C
SonarQube is a code analysis tool that can be used during the development and continuous integration stage.
Below is a snippet from the SonarQube documentation on what you can achieve with the tool.
Option A is incorrect since this is a collaboration-based tool.
Option B is incorrect since this is a continuous integration tool.
Option D is incorrect since this tool can be used for Java-based applications only.
Option E is incorrect since this tool is used for managing software projects.
For more information on SonarQube, please visit the below URL-
A company wants to implement DevOps processes for a set of applications. These applications are based on the .Net framework. They want to ensure that security validation is performed during each stage of the application lifecycle. They want to ensure the following.
> Static Code Analysis is performed during the development stage.
> Static Code Analysis is performed during the Continuous Integration stage.
> All high severity issues are logged in a tracking tool.
You have to advise on the right tool that can be used for these requirements.
Which of the following can be used for the requirement?
All high severity issues are logged in a tracking tool.
Correct
Answer – E
This is the right tool for managing your software projects. You can also log and track defects here.
An example is given below. You can create issues and track them to closure.
Option A is incorrect since this is a collaboration-based tool.
Option B is incorrect since this is a continuous integration tool.
Option C is incorrect since this is a static code analysis tool.
Option D is incorrect since this tool can be used for Java-based applications only.
For more information on tracking defects in Azure Boards, please visit the below URL-
A company currently has an organization and project defined in Azure DevOps services. For one of the projects, the company wants to gather feedback from users related to certain work items for a particular release. You have to ensure the following.
> The release team can request feedback from users.
> Users have the ability to provide feedback for the work items.
> Users have the required tools installed for giving feedback.
You have to ensure that licensing cost is kept to a minimum.
What should be installed for the users to give feedback for the work items?
Correct
Answer – C
You have to use the Test & Feedback extension.
This is also given in the Microsoft documentation.
Since this is clearly given in the Microsoft documentation, all other options are incorrect.
For more information on providing feedback, please visit the below URL-
A company is currently looking at implementing a set of tools for developing and deploying applications. The applications would run through a DevOps cycle for all change requests. The company wants to ensure that the right tool is in place for scanning the application for any open-source package security vulnerabilities.
They decide to use the WhiteSource Bolt application for this requirement.
Would this fulfill the requirement?
Correct
Answer – A
Yes, this would fulfill the requirement.
The Visual Studio Marketplace mentions the following on this tool.
For more information on the tool, please visit the below URL-
A company is currently looking at implementing a set of tools for developing and deploying applications. The applications would run through a DevOps cycle for all change requests. The company wants to ensure that the right tool is in place for scanning the application for any open-source package security vulnerabilities.
They decide to use the Jenkins application for this requirement.
Would this fulfill the requirement?
Correct
Answer B
This is a tool used for Continuous Integration.
For more information on Jenkins, please visit the below URL-
A company is currently looking at implementing a set of tools for developing and deploying applications. The applications would run through a DevOps cycle for all change requests. The company wants to ensure that the right tool is in place for scanning the application for any open-source package security vulnerabilities.
They decide to use the BlackDuck by Synopsys application for this requirement.
Would this fulfill the requirement?
Correct
Answer – A
Yes, this tool will accomplish the requirement.
The Azure Marketplace mentions the following on this tool.
For more information on the tool, please visit the below URL-
A team needs to automate the User Interface testing for a web application. They also need to integrate the testing of the application in the build lifecycle of the application. Which of the following could they use for this purpose?
Correct
Answer – C
The right tool to use for User Interface testing is Selenium.
The Microsoft documentation also has an article on this.
Option A is incorrect since this tool is used to check for application vulnerabilities.
Option B is incorrect since this tool is used for Unit testing.
Option D is incorrect since this tool is used for code Analysis.
For more information on working with Selenium, please visit the below URL-
A team is currently creating resource manager templates for building virtual machines on Azure. They have to use the Azure Key Vault service for storing the virtual machine account password. A Key Vault has been created and secrets created in the service.
The following parameter file is being created to recover the secret from the Key Vault.
{
“$schema”: “https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#”,
“contentVersion”: “1.0.0.0”,
“parameters”: {
“adminLogin”: {
“value”: “exampleadmin”
},
“adminPassword”: {
“reference”: {
SLOT_1 : {
SLOT_2 : “/subscriptions//resourceGroups//providers/Microsoft.KeyVault/vaults/”
},
SLOT_3 : “ExamplePassword”
}
},
“sqlServerName”: {
“value”: “”
}
}
}
Which of the following would go into SLOT_1?
Correct
Answer – C
Here we have to mention the reference as keyVault.
An example is also given in the Microsoft documentation.
Since this is clearly given in the Microsoft documentation, all other options are incorrect.
For more information on working with secrets in resource manager templates, please visit the below URL-
A team is currently creating resource manager templates for building virtual machines on Azure. They have to use the Azure Key Vault service for storing the virtual machine account password. A Key Vault has been created and secrets created in the service.
The following parameter file is being created to recover the secret from the Key Vault.
{
“$schema”: “https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#”,
“contentVersion”: “1.0.0.0”,
“parameters”: {
“adminLogin”: {
“value”: “exampleadmin”
},
“adminPassword”: {
“reference”: {
SLOT_1 : {
SLOT_2 : “/subscriptions//resourceGroups//providers/Microsoft.KeyVault/vaults/”
},
SLOT_3 : “ExamplePassword”
}
},
“sqlServerName”: {
“value”: “”
}
}
}
Which of the following would go into SLOT_2?
Correct
Answer – D
Here we have to mention the reference as “id”.
An example is also given in the Microsoft documentation.
Since this is clearly given in the Microsoft documentation, all other options are incorrect.
For more information on working with secrets in resource manager templates, please visit the below URL-
A team is currently creating resource manager templates for building virtual machines on Azure. They have to use the Azure Key Vault service for storing the virtual machine account password. A Key Vault has been created and secrets created in the service.
The following parameter file is being created to recover the secret from the Key Vault.
{
“$schema”: “https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#”,
“contentVersion”: “1.0.0.0”,
“parameters”: {
“adminLogin”: {
“value”: “exampleadmin”
},
“adminPassword”: {
“reference”: {
SLOT_1 : {
SLOT_2 : “/subscriptions//resourceGroups//providers/Microsoft.KeyVault/vaults/”
},
SLOT_3 : “ExamplePassword”
}
},
“sqlServerName”: {
“value”: “”
}
}
}
Which of the following would go into SLOT_3?
Correct
Answer – A
Here we have to mention the “secretName”.
An example is also given in the Microsoft documentation.
Since this is clearly given in the Microsoft documentation, all other options are incorrect.
For more information on working with secrets in resource manager templates, please visit the below URL-
Your company has a DevOps organization and a project named contoso-project. You have to use Microsoft based agents to build container images that will use the complete Microsoft.Net framework in a YAML pipeline within the project.
Which of the following are possible images that can be used for the agent pool? Choose 2 answers from the options given below.
Correct
Answer : B and C
You can build containers on the Windows container image and on Ubuntu-based agents.
The other images can’t be used to build images.
For more information on Microsoft based agents, please visit the below URL-
Currently Contosos has a set of web-based applications.
Applications have been developed in both Java and in .Net
Currently Jenkins is being used to manage application builds
The source code is being hosted on an on-premise server
A GitHub Enterprise installation on a windows machine is being used to host the repository
Planned changes
The company wants to implement the below changes
Use Azure Boards for managing feature changes for the application.
Management on Azure Boards must allow for managing change and review requests
Applications are going to be containerized and deployed onto Kubernetes clusters hosted on Azure
Build Pipelines would also be used to build the applications
The Build Pipelines would be used to pick up the code from the on-premise GitHub Server
One of the Build pipelines will be used to build a .Net Core application. The application would consist of 2 projects contosoonline.csproj and contosoquiz.csproj
Packages built by the pipeline need to be pushed to an internal feed named contosolabfeed
Azure Resource Manager templates would be used to provision resources in Azure
——
A Kubernetes cluster has just been setup. Which of the following command could be used to get the status of the nodes in the cluster?
Correct
Answer – B
This can be down with the help of the “kubectl” command.
This is also given in the Microsoft documentation.
Since this is clearly given in the Microsoft documentation, all other options are incorrect.
For more information on creating and working with Kubernetes clusters, please visit the below URL-
Currently Contosos has a set of web-based applications.
Applications have been developed in both Java and in .Net
Currently Jenkins is being used to manage application builds
The source code is being hosted on an on-premise server
A GitHub Enterprise installation on a windows machine is being used to host the repository
Planned changes
The company wants to implement the below changes
Use Azure Boards for managing feature changes for the application.
Management on Azure Boards must allow for managing change and review requests
Applications are going to be containerized and deployed onto Kubernetes clusters hosted on Azure
Build Pipelines would also be used to build the applications
The Build Pipelines would be used to pick up the code from the on-premise GitHub Server
One of the Build pipelines will be used to build a .Net Core application. The application would consist of 2 projects contosoonline.csproj and contosoquiz.csproj
Packages built by the pipeline need to be pushed to an internal feed named contosolabfeed
Azure Resource Manager templates would be used to provision resources in Azure
——
You need to ensure that Azure build pipelines can connect to the on-premise GitHub Enterprise Server. Which of the following would you create for this requirement?
Correct
Answer – A
For more information on service connections, please visit the below URL-
Currently Contosos has a set of web-based applications.
Applications have been developed in both Java and in .Net
Currently Jenkins is being used to manage application builds
The source code is being hosted on an on-premise server
A GitHub Enterprise installation on a windows machine is being used to host the repository
Planned changes
The company wants to implement the below changes
Use Azure Boards for managing feature changes for the application.
Management on Azure Boards must allow for managing change and review requests
Applications are going to be containerized and deployed onto Kubernetes clusters hosted on Azure
Build Pipelines would also be used to build the applications
The Build Pipelines would be used to pick up the code from the on-premise GitHub Server
One of the Build pipelines will be used to build a .Net Core application. The application would consist of 2 projects contosoonline.csproj and contosoquiz.csproj
Packages built by the pipeline need to be pushed to an internal feed named contosolabfeed
Azure Resource Manager templates would be used to provision resources in Azure
——
You need to allocate the right process template in Azure Boards.
You decide to use the Agile process template.
Would this fulfill the requirement?
Correct
Answer B
This template does not contain the definitions for change or review requests.
For more information on process templates, please visit the below URL-
Currently Contosos has a set of web-based applications.
Applications have been developed in both Java and in .Net
Currently Jenkins is being used to manage application builds
The source code is being hosted on an on-premise server
A GitHub Enterprise installation on a windows machine is being used to host the repository
Planned changes
The company wants to implement the below changes
Use Azure Boards for managing feature changes for the application.
Management on Azure Boards must allow for managing change and review requests
Applications are going to be containerized and deployed onto Kubernetes clusters hosted on Azure
Build Pipelines would also be used to build the applications
The Build Pipelines would be used to pick up the code from the on-premise GitHub Server
One of the Build pipelines will be used to build a .Net Core application. The application would consist of 2 projects contosoonline.csproj and contosoquiz.csproj
Packages built by the pipeline need to be pushed to an internal feed named contosolabfeed
Azure Resource Manager templates would be used to provision resources in Azure
——
You need to allocate the right process template in Azure Boards.
You decide to use the Scrum process template.
Would this fulfill the requirement?
Correct
Answer B
This template does not contain the definitions for change or review requests.
For more information on process templates, please visit the below URL-
Currently Contosos has a set of web-based applications.
Applications have been developed in both Java and in .Net
Currently Jenkins is being used to manage application builds
The source code is being hosted on an on-premise server
A GitHub Enterprise installation on a windows machine is being used to host the repository
Planned changes
The company wants to implement the below changes
Use Azure Boards for managing feature changes for the application.
Management on Azure Boards must allow for managing change and review requests
Applications are going to be containerized and deployed onto Kubernetes clusters hosted on Azure
Build Pipelines would also be used to build the applications
The Build Pipelines would be used to pick up the code from the on-premise GitHub Server
One of the Build pipelines will be used to build a .Net Core application. The application would consist of 2 projects contosoonline.csproj and contosoquiz.csproj
Packages built by the pipeline need to be pushed to an internal feed named contosolabfeed
Azure Resource Manager templates would be used to provision resources in Azure
——
You need to allocate the right process template in Azure Boards.
You decide to use the CMMI process template.
Would this fulfill the requirement?
Correct
Answer – A
Yes, this process template has the work items for change and review requests.
This is also given in the Microsoft documentation.
For more information on process templates, please visit the below URL-
Currently Contosos has a set of web-based applications.
Applications have been developed in both Java and in .Net
Currently Jenkins is being used to manage application builds
The source code is being hosted on an on-premise server
A GitHub Enterprise installation on a windows machine is being used to host the repository
Planned changes
The company wants to implement the below changes
Use Azure Boards for managing feature changes for the application.
Management on Azure Boards must allow for managing change and review requests
Applications are going to be containerized and deployed onto Kubernetes clusters hosted on Azure
Build Pipelines would also be used to build the applications
The Build Pipelines would be used to pick up the code from the on-premise GitHub Server
One of the Build pipelines will be used to build a .Net Core application. The application would consist of 2 projects contosoonline.csproj and contosoquiz.csproj
Packages built by the pipeline need to be pushed to an internal feed named contosolabfeed
Azure Resource Manager templates would be used to provision resources in Azure
——
You need to ensure that when Resource Manager templates are deployed, the Resource Manager leaves unchanged resources that exist in the resource group that arent specified in the template. Which of the following mode in the template should be used to accomplish this requirement?
Correct
Answer – C
You need to specify the Incremental mode.
This is also given in the Microsoft documentation.
Since this is clearly given in the Microsoft documentation, all other options are incorrect.
For more information on template deployment modes, please visit the below URL-
Currently Contosos has a set of web-based applications.
Applications have been developed in both Java and in .Net
Currently Jenkins is being used to manage application builds
The source code is being hosted on an on-premise server
A GitHub Enterprise installation on a windows machine is being used to host the repository
Planned changes
The company wants to implement the below changes
Use Azure Boards for managing feature changes for the application.
Management on Azure Boards must allow for managing change and review requests
Applications are going to be containerized and deployed onto Kubernetes clusters hosted on Azure
Build Pipelines would also be used to build the applications
The Build Pipelines would be used to pick up the code from the on-premise GitHub Server
One of the Build pipelines will be used to build a .Net Core application. The application would consist of 2 projects contosoonline.csproj and contosoquiz.csproj
Packages built by the pipeline need to be pushed to an internal feed named contosolabfeed
Azure Resource Manager templates would be used to provision resources in Azure
——
The management wants to see a chart to understand whether the teams are able to complete the work allocated to a sprint. The chart should be calibrated against the work items. Which of the following would you use as the widget to use in Azure Boards for this requirement?
Correct
Answer : A
This can be accomplished with the “Velocity” widget.
This is also given in the Microsoft documentation.
Since this is clearly given in the Microsoft documentation, all other options are incorrect.
For more information on widgets in Azure Boards, please visit the below URL-