Proper study guides for Update Microsoft Implementing Microsoft Azure Infrastructure Solutions certified begins with Microsoft exam ref 70 533 preparation products which designed to deliver the Top Quality 70 533 dumps questions by making you pass the 70 533 study guide pdf test at your first time. Try the free microsoft 70 533 demo right now.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-533 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-533 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-533-exam-dumps.html

Q1. DRAG DROP 

You manage an application hosted on cloud services. The development team creates a new version of the application. The updated application has been packaged and stored in an Azure Storage account. 

You have the following requirements: 

. Deploy the latest version of the application to production with the least amount of downtime. . Ensure that the updated application can be tested prior to deploying to the Production site. . Ensure that the original version of the application can be restored until the new version is verified. 

Which four steps should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Q2. You manage a cloud service named fabrikamReports that is deployed in an Azure data center. 

You deploy a virtual machine (VM) named fabrikamSQL into a virtual network named fabrikamVNet. 

FabrikamReports must communicate with fabrikamSQL. 

You need to add fabrikam Reports to fabrikamVNet. 

Which file should you modify? 

A. the network configuration file for fabrikamVNet 

B. the service definition file (.csdef) for fabrikamReports 

C. the service definition file (.csdef) for fabrikamSQL 

D. the service configuration file (.cscfg) for fabrikamReports 

E. the service configuration file (.cscfg) fabrikamSQL 

Answer:

Explanation: Azure Service Definition Schema (.csdef File) 

The service definition file defines the service model for an application. The file contains the 

definitions for the roles that are available to a cloud service, specifies the service 

endpoints, and establishes configuration settings for the service. 

Incorrect: 

not D, not E: The service configuration file (.cscfg) specifies the number of role instances to 

deploy for each role in the service, the values of any configuration settings, and the 

thumbprints for any certificates associated with a role. 

Reference: Azure Service Definition Schema (.csdef File) 

http://msdn.microsoft.com/en-us/library/azure/ee758711.aspx 


Q3. Your company has two cloud services named CS01 and CS02. You create a virtual machine (VM) in CS02 named Accounts. 

You need to ensure that users in CS01 can access the Accounts VM by using port 8080. 

What should you do? 

A. Create a firewall rule. 

B. Configure load balancing. 

C. Configure port redirection. 

D. Configure port forwarding. 

E. Create an end point. 

Answer:

Explanation: All virtual machines that you create in Azure can automatically communicate using a private network channel with other virtual machines in the same cloud service or virtual network. However, other resources on the Internet or other virtual networks require endpoints to handle the inbound network traffic to the virtual machine. 

Reference: How to Set Up Endpoints to a Virtual Machine 

URL: http://azure.microsoft.com/en-us/documentation/articles/virtual-machines-set-up-endpoints/ 


Q4. You manage a software-as-a-service application named SaasApp1 that provides user management features in a multi-directory environment. 

You plan to offer SaasApp1 to other organizations that use Azure Active Directory. 

You need to ensure that SaasApp1 can access directory objects. 

What should you do? 

A. Configure the Federation Metadata URL 

B. Register SaasApp1 as a native client application. 

C. Register SaasApp1 as a web application. 

D. Configure the Graph API. 

Answer:

Explanation: The Azure Active Directory Graph API provides programmatic access to Azure AD through REST API endpoints. Applications can use the Graph API to perform create, read, update, and delete (CRUD) operations on directory data and objects. For example, the Graph API supports the following common operations for a user object: / Create a new user in a directory / Get a user’s detailed properties, such as their groups / Update a user’s properties, such as their location and phone number, or change their password / Check a user’s group membership for role-based access / Disable a user’s account or delete it entirely 

Reference: Azure AD Graph API 

URL: http://msdn.microsoft.com/en-us/library/azure/hh974476.aspx 


Q5. HOTSPOT 

You manage two cloud services named Service1 and Service2. The development team updates the code for each application and notifies you that the services are packaged and ready for deployment. 

Each cloud service has specific requirements for deployment according to the following table. 

In the table below, identify the deployment method for each service. Make only one selection in each column. 

Answer: 


Q6. You administer of a set of virtual machine (VM) guests hosted in Hyper-V on Windows Server 2012 R2. 

The virtual machines run the following operating systems: 

Windows Server 2008 Windows Server 2008 R2 Linux (openSUSE 13.1) 

All guests currently are provisioned with one or more network interfaces with static bindings and VHDX disks. You need to move the VMs to Azure Virtual Machines hosted in an Azure subscription. 

Which three actions should you perform? Each correct answer presents part of the solution. 

A. Install the WALinuxAgent on Linux servers. 

B. Ensure that all servers can acquire an IP by means of Dynamic Host Configuration Protocol (DHCP). 

C. Upgrade all Windows VMs to Windows Server 2008 R2 or higher. 

D. Sysprep all Windows servers. 

E. Convert the existing virtual disks to the virtual hard disk (VHD) format. 

Answer: A,C,D 

Explanation: * A: Azure Linux Agent 

This agent is installed on the Linux VM and is responsible to communicate with the Azure Frabric Controller. 

* UPLOADING A VIRTUAL MACHINE TO WINDOWS AZURE 

Assumption: A Windows Server (2008 R2 or 2012) is created and running as a virtual machine in Hyper-V. (C) Log onto the Windows Server hosted in Hyper-V you’d like to upload to Windows Azure 

and open and command prompt (I’m using Windows Server 2012 R2). 

Navigate to c:\Windows\System32\Sysprep 

Type in sysprep.exe and select enter: (D) 


Q7. You manage a cloud service that utilizes data encryption. 

You need to ensure that the certificate used to encrypt data can be accessed by the cloud service application. 

What should you do? 

A. Upload the certificate referenced in the application package. 

B. Deploy the certificate as part of the application package. 

C. Upload the certificate's public key referenced in the application package. 

D. Use RDP to install the certificate. 

Answer:

Explanation: The developer must deploy the public key with their application so that, when Windows Azure spins up role instances, it will match up the thumbprint in the service definition with the uploaded service certificate and deploy the private key to the role instance. The private key is intentionally non-exportable to the .pfx format, so you won’t be able to grab the private key through an RDC connection into a role instance. 

Reference: Field Note: Using Certificate-Based Encryption in Windows Azure Applications 


Q8. Click OK on the SourceAD Properties page. 

12. Perform a full sync: on the Management Agent tab, right-click SourceAD, click Run, 

click Full Import Full Sync, and then click OK. 

Etc. Reference: Installing and Configure DirSync with OU level filtering for Office365 

URL: http://blogs.msdn.com/b/denotation/archive/2012/11/21/installing-and-configure-dirsync-with-ou-level-filtering-for-office365.aspx 


Q9. You administer an Azure Storage account named contoso storage. The account has queue containers with logging enabled. 

You need to view all log files generated during the month of July 2014. 

Which URL should you use to access the list? 

A. 

http://contosostorage.queue.core.windows.net/$logs? restype=container&comp=list&prefix=queue/2014/07 

B. 

http://contosostorage.queue.core.windows.net/$files? restype=container&comp=list&prefix=queue/2014/07 

C. http://contosostorage.blob.core.windows.net/$files? 

restype=container&comp=list&prefix=blob/2014/07 

D. http://contosostorage.blob.core.windows.net/$logs? restype=container&comp=list&prefix=blob/2014/07 

Answer:

Explanation: http://msdn.microsoft.com/library/azure/hh343262.aspx 


Q10. You administer an Azure solution that uses a virtual network named fabVNet. FabVNet has a single subnet named Subnet-1. 

You discover a high volume of network traffic among four virtual machines (VMs) that are part of Subnet-1. 

You need to isolate the network traffic among the four VMs. You want to achieve this goal with the least amount of downtime and impact on users. 

What should you do? 

A. Create a new subnet in the existing virtual network and move the four VMs to the new subnet. 

B. Create a site-to-site virtual network and move the four VMs to your datacenter. 

C. Create a new virtual network and move the VMs to the new network. 

D. Create an availability set and associate the four VMs with that availability set. 

Answer:

Explanation: Machine Isolation Options 

There are three basic options where machine isolation may be implemented on the Windows Azure platform: 

* Between machines deployed to a single virtual network Subnets within a Single Virtual Network 

* Between machines deployed to distinct virtual networks 

* Between machines deployed to distinct virtual networks where a VPN connection has been established from on-premises with both virtual networks 

Windows Azure provides routing across subnets within a single virtual network. 

Reference: Network Isolation Options for Machines in Windows Azure Virtual Networks 

Incorrect: 

not B: A site-to-site VPN allows you to create a secure connection between your on-premises site and your virtual network. 

Use a site-to-site connection when: 

* You want to create a branch office solution. 

* You want a connection between your on-premises location and your virtual network that’s available without requiring additional client-side configurations.