Ideas to 70 533 dumps pdf

Your success in Microsoft 70 533 dumps is our sole target and we develop all our 70 533 vce braindumps in a way that facilitates the attainment of this target. Not only is our azure exam 70 533 study material the best you can find, it is also the most detailed and the most updated. exam 70 533 Practice Exams for Microsoft Windows Server microsoft azure 70 533 cbt nuggets download are written to the highest standards of technical accuracy.

2017 NEW RECOMMEND

Free VCE & PDF File for Microsoft 70-533 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 70-533 Exam Dumps (PDF & VCE):
Available on:
http://www.certleader.com/70-533-dumps.html

Q41. You manage an Azure Web Site that is running in Shared mode. 

You discover that the website is experiencing increased average response time during periods of heavy user activity. 

You need to update the website configuration to address the performance issues as they occur. 

What should you do? 

A. Set the website to Standard mode and configure automatic scaling based on CPU utilization. 

B. Configure automatic seating during specific dates. 

C. Modify the website instance size. 

D. Configure automatic scaling based on memory utilization. 

E. Set the website to Basic mode and configure automatic scaling based on CPU utilization. 

Answer:

Explanation: Scaling to Standard Plan Mode Selecting Standard expands the Capacity section to reveal the Instance Size and Instance Count options, which are also available in Basic mode. The Edit Scale Settings for Schedule and Scale by Metric options are available only in Standard mode. 

Note: 

* For increased performance and throughput for your websites on Microsoft Azure, you can use the Azure Management Portal to scale your Web Hosting Plan mode from Free to Shared, Basic, or Standard. 

* There are 2 options for scaling: 

Based on a Schedule Based on CPU usage 

Reference: Azure, How to Scale Websites 

Q42. You manage a collection of large video files that is stored in an Azure Storage account. 

A user wants access to one of your video files within the next seven days. 

You need to allow the user access only to the video file, and then revoke access once the user no longer needs it. 

What should you do? 

A. Give the user the secondary key for the storage account. 

Once the user is done with the file, regenerate the secondary key. 

B. Create an Ad-Hoc Shared Access Signature for the Blob resource. 

Set the Shared Access Signature to expire in seven days. 

C. Create an access policy on the container. 

Give the external user a Shared Access Signature for the blob by using the policy. 

Once the user is done with the file, delete the policy. 

D. Create an access policy on the blob. 

Give the external user access by using the policy. 

Once the user is done with the file, delete the policy. 

Answer:

Explanation: See 3) below. By default, only the owner of the storage account may access blobs, tables, and queues within that account. If your service or application needs to make these resources available to other clients without sharing your access key, you have the following options for permitting access: 

1.You can set a container's permissions to permit anonymous read access to the container and its blobs. This is not allowed for tables or queues. 

2. You can expose a resource via a shared access signature, which enables you to delegate restricted access to a container, blob, table or queue resource by specifying the interval for which the resources are available and the permissions that a client will have to it. 

3. You can use a stored access policy to manage shared access signatures for a container or its blobs, for a queue, or for a table. The stored access policy gives you an additional measure of control over your shared access signatures and also provides a straightforward means to revoke them. 

Reference: Manage Access to Azure Storage Resources 

Q43. You manage an Azure Web Site named contosoweb. Logging is enabled for contosoweb. 

You need to view only errors from your log files in a continuous stream as they occur. 

Which Windows Power Shell command should you execute? 

A. Get-AzureWebSiteLog -Name contosoweb -OutBuffer Error 

B. Save-AzureWebSiteLog -Name contosoweb -Output Errors 

C. Get-AzureWebSiteLog -Name contosoweb -Tail –Message Error 

D. Get-Azure WebSiteLog -Name contosoweb -Message Error 

Answer:

Explanation: Example 

This example starts log streaming and show error logs only. 

Windows PowerShell 

C:\\PS>Get-AzureWebsiteLog -Tail -Message Error 

Reference: Get-AzureWebsiteLog 

URL: http://msdn.microsoft.com/en-us/library/dn495187.aspx 

Q44. DRAG DROP 

You plan to deploy a cloud service named contosoapp. The service includes a web role named contosowebrole. The web role has an endpoint named restrictedEndpoint. 

You need to allow access to restricted Endpoint only from your office machine using the IP address 145.34.67.82. 

Which values should you use within the service configuration file? To answer, drag the appropriate value to the correct location in the service configuration file. Each value may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 

Q45. You administer an Azure Active Directory (Azure AD) tenant that has a SharePoint web application named TeamSite1. TeamSite1 accesses your Azure AD tenant for user information. 

The application access key for TeamSite1 has been compromised. 

You need to ensure that users can continue to use TeamSite1 and that the compromised key does not allow access to the data in your Azure AD tenant. 

Which two actions should you perform? Each correct answer presents part of the solution. 

A. Remove the compromised key from the application definition for TeamSite1. 

B. Delete the application definition for TeamSite1. 

C. Generate a new application key for TeamSite1. 

D. Generate a new application definition for TeamSite1. 

E. Update the existing application key. 

Answer: A,C 

Explanation: One of the security aspects of Windows Azure storage is that all access is protected by access keys. 

It is possible to change the access keys (e.g. if the keys become compromised), and if changed, we’d need to update the application to have the new key. 

Q46. You manage a cloud service that has a web application named WebRole1. WebRole1 writes error messages to the Windows Event Log. 

Users report receiving an error page with the following message: "Event 26 has occurred. Contact your system administrator." 

You need to access the WebRole1 event log. 

Which three actions should you perform? Each correct answer presents part of the solution. 

A. Enable verbose monitoring. 

B. Update the WebRole1 web.config file. 

C. Update the cloud service definition file and the service configuration file. 

D. Run the Set-AzureVMDiagnosticsExtension PowerShell cmdlet. 

E. Run the Enable-AzureWebsiteApplicationDiagnostic PowerShell cmdlet. 

F. Create a storage account. 

Answer: A,C,F 

Explanation: AF: You can monitor key performance metrics for your cloud services in the Azure Management Portal. You can set the level of monitoring to minimal and verbose for each service role, and can customize the monitoring displays. Verbose monitoring data is stored in a storage account, which you can access outside the portal. 

* The service configuration file specifies the number of role instances to deploy for each role in the service, the values of any configuration settings, and the thumbprints for any certificates associated with a role. If the service is part of a Virtual Network, configuration information for the network must be provided in the service configuration file, as well as in the virtual networking configuration file. The default extension for the service configuration file is .cscfg. 

* The service definition file defines the service model for an application. The file contains the definitions for the roles that are available to a cloud service, specifies the service endpoints, and establishes configuration settings for the service. 

URLs: 

http://azure.microsoft.com/en-us/documentation/articles/cloud-services-how-to-monitor/ http://msdn.microsoft.com/en-us/library/azure/ee758710.aspx http://msdn.microsoft.com/en-us/library/azure/ee758711.aspx 

Q47. DRAG DROP 

You manage two solutions in separate Azure subscriptions. 

You need to ensure that the two solutions can communicate on a private network. 

Which three actions should you perform in sequence? To answer, move the appropriate 

actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 

Q48. You manage a large datacenter that has limited physical space. 

You plan to extend your datacenter to Azure. 

You need to create a connection that supports a multiprotocol label switching (MPLS) virtual private network. 

Which connection type should you use? 

A. Site-to-site 

B. VNet-VNet 

C. ExpressRoute. 

D. Site-to-peer 

Answer:

Explanation: 

ExpressRoute provides even richer capabilities by allowing a dedicated MPLS connection to Azure. Reference: 

ExpressRoute: 

An MPLS Connection to Microsoft Azure 

http://azure.microsoft.com/en-us/services/expressroute/ 

Q49. You develop a Windows Store application that has a web service backend. 

You plan to use the Azure Active Directory Authentication Library to authenticate users to Azure Active Directory (Azure AD) and access directory data on behalf of the user. 

You need to ensure that users can log in to the application by using their Azure AD credentials. 

Which two actions should you perform? Each correct answer presents part of the solution. 

A. Create a native client application in Azure AD. 

B. Configure directory integration. 

C. Create a web application in Azure AD. 

D. Enable workspace join. 

E. Configure an Access Control namespace. 

Answer: B,C 

Explanation: B: An application that wants to outsource authentication to Azure AD must be 

registered in Azure AD, which registers and uniquely identifies the app in the directory. 

C (not A): NativeClient-WindowsStore 

A Windows Store application that calls a web API that is secured with Azure AD. 

Reference: AzureADSamples/NativeClient-WindowsStore Authentication Scenarios for Azure AD, Basics of Authentication in Azure AD http://msdn.microsoft.com/en-us/library/azure/dn499820.aspx#BKMK_Auth https://github.com/AzureADSamples/NativeClient-WindowsStore 

Q50. You manage a cloud service that is running in two small instances. The cloud service hosts a help desk application. The application utilizes a virtual network connection to synchronize data to the company's internal accounting system. 

You need to reduce the amount of time required for data synchronization. 

What should you do? 

A. Configure the servers as large instances and re-deploy. 

B. Increase the instance count to three. 

C. Deploy the application to Azure Web Sites. 

D. Increase the processors allocated to the instances. 

Answer:

Explanation: 

Note: When you create your service model, you can specify the size to which to deploy an instance of your role, depending on its resource requirements. The size of the role determines the number of CPU cores, the memory capacity, and the local file system size that is allocated to a running instance. 

Reference: Virtual Machine and Cloud Service Sizes for Azure 

URL : http://msdn.microsoft.com/en-us/library/azure/dn197896.aspx 

Certleader Dumps
Certleader is a company specialized on providing high quality IT exam materials and fully committed to assist our respected clients crack any IT certification tests on their 1st efforts.