Cloud
shalla
Home
Learn
Certifications
Jobs
Roadmap
Interviews
AWS Interviews
Azure Interviews
GCP Interviews
DevOps Interviews
Cloud Engineer
Linux Interviews
Sign In
Get Started
Home
/
Directory
/
az 305
az 305 Practice Questions
Page 2 of 3 (240 total questions)
Your data science team needs a fully managed environment to build, train, and deploy custom machine learning models using TensorFlow. Which platform provides these end-to-end MLOps capabilities?
View Question & Answer ➔
You are building a real-time collaborative workspace. You need a way to push updates to millions of web and mobile clients instantly whenever a change occurs in your database. Which Azure service provides managed WebSocket support at global scale for this purpose?
View Question & Answer ➔
To protect against an entire regional outage, an architect decides to maintain a 'Multi-Region Active-Active' architecture for their web application. Which service is essential for globally distributing and load-balancing traffic across regions?
View Question & Answer ➔
Scenario: To minimize the latency of a critical database for users globally, you want to use a NoSQL database that automatically replicates data across multiple regions with a 'Multi-Region Write' capability. Solution ?
View Question & Answer ➔
An enterprise wants to run a massive batch processing workload that requires thousands of CPU cores for a few hours. They want to minimize cost by using the lowest possible VM pricing and are comfortable with the instances being reclaimed. Which service should they use?
View Question & Answer ➔
Which Azure service provides a unified data governance solution that helps you create a 'Data Map' and track 'Data Lineage' across your entire data estate, including on-premises and multi-cloud sources?
View Question & Answer ➔
An organization is migrating their massive Oracle database to Azure. They require a high-performance environment that fully supports Oracle's RAC (Real Application Clusters) and is co-located with Azure regions for low latency. Which service should they choose?
View Question & Answer ➔
You are hosting a very large dataset in Azure Blob storage and want to provide a way for your business analysts to query this data using SQL without needing to manage a database cluster or move the data into a data warehouse. Which service fits?
View Question & Answer ➔
Which Azure service provides a 'No-Code' experience for building, training, and deploying machine learning models using a drag-and-drop designer?
View Question & Answer ➔
An organization wants to analyze the cost and usage of their Azure environment for the last 12 months with the ability to forecast future spending. Which tool should they use?
View Question & Answer ➔
You are designing a CI/CD pipeline. You need a service to compile source code, run tests, and produce software packages that are ready to deploy. Which service handles the build phase?
View Question & Answer ➔
An organization building a data lake wants to store their data in the 'Delta Lake' format to provide ACID transactions. Where is this data physically stored in Azure?
View Question & Answer ➔
An organization wants to run their massive Big Data analytics workload using Azure Synapse Analytics. They want to ensure that they are not over-paying for capacity during periods of low activity. Which Synapse feature automatically adjusts the number of Data Warehouse Units (DWUs)?
View Question & Answer ➔
You are hosting a globally distributed application that requires a single static entry point to route users to the closest healthy region. The application uses HTTP/HTTPS traffic and requires SSL termination and WAF protection. Solution ?
View Question & Answer ➔
To reduce the cost of an Azure environment that is only used during business hours, which Azure service can you use to automatically start and stop your instances on a schedule?
View Question & Answer ➔
An enterprise wants to ensure that all their Azure Activity logs are protected from being tampered with or deleted, even if their subscription administrative accounts are compromised. Which feature provides the strongest protection for log integrity?
View Question & Answer ➔
An organization wants to analyze the cost and usage of their Azure environment for the last 12 months with the ability to forecast future spending for the next 12 months. Which tool should they use?
View Question & Answer ➔
An organization is migrating their legacy on-premises Windows workload to Azure and needs a managed file storage service that supports the NTFS protocol and integrates with their Azure Managed Microsoft AD. Which service should they choose?
View Question & Answer ➔
An organization wants to run their massive Big Data analytics workload using Azure Synapse Analytics and wants a solution that provides low latency and high availability across three availability zones. Which tier should they choose?
View Question & Answer ➔
Scenario: To minimize the risk of a single point of failure in your global application, you want to route users to the healthiest and closest region using Anycast technology. Solution ?
View Question & Answer ➔
Your team wants to automate the provisioning of infrastructure to ensure consistency across environments. You need to define your infrastructure as code (IaC) using declarative templates. Which service should you use?
View Question & Answer ➔
A financial firm requires that all their Azure resources follow a strict binary-level security baseline. They want to create a package that includes Resource Groups, Policies, RBAC assignments, and ARM templates to ensure consistent deployment of new environments. What should they use?
View Question & Answer ➔
An organization wants to implement 'Governance as Code' and wants to ensure that any new subscription created under their enterprise agreement automatically has a specific set of security policies and RBAC assignments applied. Which feature handles this automated setup?
View Question & Answer ➔
Scenario: You are deploying a mission-critical application and want to ensure that any change to the production subscription is fully audited and can be 'undone' to a specific point in time. Solution ?
View Question & Answer ➔
Which Azure feature allows you to query your entire Azure resource inventory (across subscriptions and regions) using a SQL-like language to identify resources that are missing specific tags or have certain configurations?
View Question & Answer ➔
Scenario: To minimize the risk of an admin accidentally deleting a production resource group, you want to ensure that no one can perform a 'Delete' operation without first removing a specific 'lock' from the resource. Solution ?
View Question & Answer ➔
An organization wants to implement 'Infrastructure as Code' (IaC) to manage their complex Azure environments. They want to use a tool that is cloud-native, provides better modularity than ARM templates, and includes 'linting' and 'static analysis'. Which tool is best?
View Question & Answer ➔
Your organization is migrating a complex multi-tier application to Azure. You need to ensure that the web tier can only communicate with the app tier, and the app tier can only communicate with the database tier. All other traffic should be denied. What is the most granular and efficient way to implement this within a VNet?
View Question & Answer ➔
A global company needs to provide high-performance access to their web applications for users distributed across the world. They require SSL termination, path-based routing, and protection against common web exploits (WAF). Which global load balancing service should they choose?
View Question & Answer ➔
An organization wants to improve their application's performance for users in South America. They want a solution that provides content caching at the edge and can protect against DDoS attacks. Which service should they choose?
View Question & Answer ➔
Which Azure load balancing service operates at Layer 7 (HTTP/HTTPS) and is best suited for scenarios where you need to perform URL path-based routing and SSL offloading within a single region?
View Question & Answer ➔
Your organization has multiple cloud accounts. Users in Account A need temporary access to resources in Account B. What Azure Active Directory (Entra ID) feature should you use?
View Question & Answer ➔
An organization wants to ensure that all their Azure App Service web apps are only accessible via their centralized Azure Front Door instance. What is the most secure way to enforce this restricted access?
View Question & Answer ➔
A media company is streaming high-definition video globally using Azure Front Door. They want to prevent 'Link Leeches' from downloading their videos by ensuring that every request originates from their official domain. Which WAF feature should they use?
View Question & Answer ➔
To protect a mission-critical web application from 'Botnets' and 'L7 DDoS' attacks, you want to implement a solution that identifies sophisticated bot traffic patterns and blocks them before they reach your origin. Which service should you choose?
View Question & Answer ➔
An organization wants to use Azure AD (now Microsoft Entra ID) to manage access to their on-premises applications without using a VPN or opening firewall ports. Which feature enables this secure remote access?
View Question & Answer ➔
Which Azure service provides an automated way to discover, classify, and protect sensitive data (like credit card numbers) in your Azure SQL databases and Blob storage?
View Question & Answer ➔
Which identity feature allows an organization to provide access to their Azure resources for external contractors who use their own corporate or social identities (like Google or Microsoft accounts)?
View Question & Answer ➔
An organization wants to analyze their Azure environment's security posture and receive a 'Secure Score' with actionable recommendations to improve their compliance with the Azure Security Benchmark. Which tool provides this?
View Question & Answer ➔
To secure access to an Azure Key Vault so that only a specific Azure Virtual Machine can retrieve secrets, without using a password or service account secret, which identity feature should you use?
View Question & Answer ➔
Your application requires high CPU performance for compute-intensive workloads like video encoding. Which Azure Virtual Machines instance type is optimized for this?
View Question & Answer ➔
To protect your virtual machines from brute-force RDP and SSH attacks, which feature of Microsoft Defender for Cloud should you implement to provide 'Just-In-Time' (JIT) network access?
View Question & Answer ➔
You are designing a high-scale microservices application. You want to use a serverless container platform that handles scaling, traffic splitting (for blue/green deployments), and Dapr integration without managing Kubernetes clusters. Which service should you choose?
View Question & Answer ➔
Which Azure security feature provides a way to 'Shadow' or proxy your on-premises SSH and RDP management traffic through the Azure portal, eliminating the need for public IP addresses on your VMs?
View Question & Answer ➔
To increase the availability of your application, you want to deploy your virtual machines across different data centers within an Azure region that have independent power, cooling, and networking. What is this concept called?
View Question & Answer ➔
Your organization wants to optimize the cost of their high-performance computing (HPC) cluster in Azure. The workload can tolerate interruptions and can be restarted from checkpoints. Which VM purchasing option provides the highest discount for this scenario?
View Question & Answer ➔
Which Azure feature allows you to ensure that your virtual machines are physically located as close to each other as possible within a data center to minimize network latency for a low-latency application?
View Question & Answer ➔
Which Azure networking service allows you to create a secure entrance into your Azure Virtual Network to manage your VMs over the internet using SSH or RDP, without exposing the VMs' public IP addresses?
View Question & Answer ➔
To provide high-availability for a stateful web application within a single region, you want to ensure that your virtual machine instances are distributed across multiple racks with independent power and networking. What should you use?
View Question & Answer ➔
To protect your Azure virtual machines from malware and other advanced threats, which centralized security service provides behavioral analysis and vulnerability scanning across your hybrid cloud environment?
View Question & Answer ➔
Your application requires persistent block storage that survives Azure Virtual Machines instance termination. Which service should you use?
View Question & Answer ➔
You need to create a backup of your Azure Managed Disks volume for disaster recovery. What feature should you use?
View Question & Answer ➔
Your organization is running a high-performance database that requires sub-millisecond latency and the ability to dynamically scale IOPS and throughput up to 160,000 IOPS without restarting the VM. Which Azure Managed Disk type should you choose?
View Question & Answer ➔
Which Azure storage service provides a cloud-native, fully managed SAN (Storage Area Network) solution that can be shared across multiple virtual machines to provide high-performance block storage for SQL Server or SAP Hana?
View Question & Answer ➔
Which Azure storage feature allows you to create a high-performance cluster of virtual machines that can access the same NTFS-formatted disk volume simultaneously for a failover cluster application?
View Question & Answer ➔
Which identity feature allow an organization to implement 'Just-In-Time' (JIT) administrative access, so developers only have 'Contributor' access to production subscriptions for 2 hours after getting approval?
View Question & Answer ➔
Scenario: To secure your Azure resources, you want to ensure that all developers must use Multi-Factor Authentication (MFA) and must be on a company-managed device to access the Azure portal. Which identity feature should you use?
View Question & Answer ➔
How can you securely store and retrieve connection strings and passwords in Azure so they are not hardcoded in your application's source code or configuration files?
View Question & Answer ➔
Which Azure service provides a cloud-native Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) solution for the entire enterprise?
View Question & Answer ➔
An organization is using Azure Key Vault to store encryption keys. They must ensure that the keys are stored in a physical Hardware Security Module (HSM) that is FIPS 140-2 Level 3 compliant and that Azure administrators cannot access the key material. Which Key Vault tier or service should they use?
View Question & Answer ➔
You need to create a logically isolated section of your cloud environment where you can launch resources in a virtual network that you define. Which service provides this?
View Question & Answer ➔
An organization wants to connect their on-premises data center to Azure using a dedicated, high-performance physical connection that does NOT go over the public internet. Which service provides this?
View Question & Answer ➔
To connect your on-premises offices to Azure in a 'Hub-and-Spoke' model where Azure acts as the central router for all your office-to-office and office-to-VNet traffic, which service should you use?
View Question & Answer ➔
Which Azure networking service allows you to create a secure, private connection between your Azure VNet and a 3rd-party SaaS provider (like Snowflake) without the traffic ever touching the public internet?
View Question & Answer ➔
An organization wants to connect two Azure Virtual Networks (VNets) in different regions so that resources in one VNet can communicate with resources in the other using private IP addresses. What is the most efficient way to achieve this?
View Question & Answer ➔
Which Azure networking service allows you to create a secure, private connection from your VNet to a specific Azure PaaS service (like Azure SQL Database) without using a public IP address or Service Endpoints?
View Question & Answer ➔
Your organization wants to simplify its global branch connectivity by using Azure as a central hub. They want to interconnect multiple ExpressRoute sites, VPN sites, and VNets while providing automated, optimized routing. Which Azure service is designed for this large-scale hub-and-spoke networking?
View Question & Answer ➔
An enterprise wants to secure their DNS traffic for their hybrid cloud environment. They need to resolve Azure private DNS zones from on-premises and on-premises domains from Azure VNets without managing custom DNS servers on VMs. Which service should they use?
View Question & Answer ➔
Which Azure networking service allows you to create a secure, private connection between your on-premises network and Azure over the internet with the ability to dynamically route traffic using BGP?
View Question & Answer ➔
An organization wants to analyze their network traffic to identify security threats like data exfiltration or connections to known malicious IP addresses. They need a tool that can analyze NSG flow logs and provide threat intelligence. Which tool should they use?
View Question & Answer ➔
You need stateful firewall rules at the Azure Virtual Machines instance level. What should you configure?
View Question & Answer ➔
To protect your Azure virtual machines from being accessed by unauthorized users from the internet, you want to implement a solution that requires a second factor of authentication (MFA) and restricts access based on the user's location. Which service should you use?
View Question & Answer ➔
Scenario: To minimize the blast radius of a potential compromise, you want to ensure that your developers can only access the production environment from machines that are compliant with your organization's security policy. Which identity feature enables this?
View Question & Answer ➔
Which Azure identity feature allow you to provide access to your Azure resources for external 'Customers' (like users of your mobile app) using their own social identities without them being added as 'Guests' in your corporate Entra ID tenant?
View Question & Answer ➔
Which Azure security service uses machine learning to identify lateral movement and other post-compromise activity by analyzing your on-premises Active Directory Domain Services (AD DS) signals?
View Question & Answer ➔
To protect your enterprise from a large-scale data leak, you want to ensure that any document stored in Azure that contains a 'Secret' tag is automatically blocked from being shared with external guest users. Which service provides this data loss prevention?
View Question & Answer ➔
An enterprise wants to secure their cloud-native applications by eliminating the need for long-lived secrets when their workloads (running in AKS or GitHub Actions) access Azure resources. Which identity feature should they implement?
View Question & Answer ➔
An organization wants to analyze their Entra ID (Azure AD) permissions to identify 'over-privileged' users and service principals across their entire multi-cloud estate (Azure, AWS, GCP). Which Microsoft Entra service provides this Cloud Infrastructure Entitlement Management (CIEM) capability?
View Question & Answer ➔
How can you securely provide temporary access to a specific Azure Resource Group for an external consultant without adding them as a permanent guest in your tenant or sharing passwords?
View Question & Answer ➔
Your organization wants to implement 'Attribute-based Access Control' (ABAC) in Azure to simplify permission management. They want to ensure that developers can only start/stop virtual machines that have a 'ProjectID' tag matching the 'ProjectID' tag on the developer's Entra ID user profile. Which Azure feature enables this dynamic comparison?
View Question & Answer ➔
You need to explicitly deny traffic from a specific IP address to your Azure Virtual Machines instances. Can Network Security Groups (NSG) natively handle explicit deny rules?
View Question & Answer ➔
You need stateless firewall rules at the subnet level in your Azure Virtual Network. What should you configure?
View Question & Answer ➔
To inspect and filter all East-West traffic between your Azure VNets and North-South traffic from your VNet to the internet, which centralized security service should you deploy?
View Question & Answer ➔
To protect your public-facing web applications from DDoS attacks that target the application layer (Layer 7), which feature of Azure Front Door or Application Gateway should you enable?
View Question & Answer ➔
Which Azure security service allows you to centrally manage and deploy firewall rules across multiple virtual networks and regions using a single management policy?
View Question & Answer ➔
An organization wants to implement 'Zero Trust' networking and wants to ensure that all internal API traffic is inspected by a central firewall without needing to manage complex 'User Defined Routes' (UDR) for every subnet. Which feature helps automate the routing to the firewall?
View Question & Answer ➔
Which Azure networking feature allows you to connect multiple VNets in different subscriptions to a central 'Firewall VNet' for traffic inspection without needing to create manual 'User Defined Routes' (UDR) for every subnet?
View Question & Answer ➔
Whcih Azure security service provides 'Threat Intelligence' to protect your Azure accounts from compromised identities by analyzing billions of signals daily to detect 'Impossible Travel' and 'Leaked Credentials'?
View Question & Answer ➔
Which Azure security service allows you to automatically rotate your database passwords every 30 days and provides a managed way to inject these secrets into your Azure Functions without human intervention?
View Question & Answer ➔
How can you analyze the 'Blast Radius' of a potential identity compromise by identifying exactly which resources that user has permission to access across your entire Azure Organization?
View Question & Answer ➔
You need to monitor CPU utilization of your Azure Virtual Machines instances and set up alarms for automated actions. Which service should you use?
View Question & Answer ➔
Your application running on Azure Virtual Machines needs a central location for log aggregation and real-time analysis. Which Azure Monitor capability should you use?
View Question & Answer ➔
Which Azure monitoring tool allows you to perform complex, interactive analytics and kusto-based queries across millions of log records from various sources like VMs, containers, and web apps?
View Question & Answer ➔
An organization wants to analyze the performance of their web application down to the individual line of code and see detailed telemetry like exception stack traces and SQL query performance. Which Azure Monitor feature provides this deep application-level observability?
View Question & Answer ➔
Which Azure monitoring feature allows you to set up 'Availability Tests' to periodically check the responsiveness and performance of your web application from multiple global locations?
View Question & Answer ➔
Which Azure monitoring service allows you to create 'Workbooks' to build interactive, visual reports that combine data from Log Analytics, Metrics, and other sources for a unified view of your application's health?
View Question & Answer ➔
An organization wants to implement 'Operational Excellence' by automatically receiving recommendations on how to optimize their Azure resources for cost, security, performance, and reliability. Which tool provides these integrated best-practice checks?
View Question & Answer ➔
Which Azure monitoring service provides a health dashboard specifically for the Azure platform itself, notifying you of service outages, planned maintenance, and health advisories that affect your resources?
View Question & Answer ➔
An organization is using Azure monitor to collect logs from thousands of VMs. They want to set up an alert that triggers whenever the 'CPU percentage' of any VM stays above 90% for more than 5 minutes. What type of alert should they create?
View Question & Answer ➔
An enterprise wants to monitor their containerized applications in AKS and needs to collect Prometheus-compatible metrics without managing a separate Prometheus server or Grafana instance. Which Azure Monitor feature provides this managed experience?
View Question & Answer ➔
← Previous
Page 2 of 3
Next →