Free AZ-400 Exam Braindumps (page: 33)

Page 32 of 128

SIMULATION
You need to configure a virtual machine named VM1 to securely access stored secrets in an Azure Key Vault named az400-11566895-kv.
To complete this task, sign in to the Microsoft Azure portal.

  1. See Explanation section for answer.

Answer(s): A

Explanation:

You can use a system-assigned managed identity for a Windows virtual machine (VM) to access Azure Key Vault.

Sign in to Azure portal Locate virtual machine VM1. Select Identity
Enable the system-assigned identity for VM1 by setting the Status to On.


Note: Enabling a system-assigned managed identity is a one-click experience. You can either enable it during the creation of a VM or in the properties of an existing VM.


Reference:

https://docs.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-nonaad



DRAG DROP (Drag and Drop is not supported)
Your company has an Azure subscription named Subscription1. Subscription1 is associated to an Azure Active Directory tenant named contoso.com.

You need to provision an Azure Kubernetes Services (AKS) cluster in Subscription1 and set the permissions for the cluster by using RBAC roles that reference the identities in contoso.com.

Which three objects should you create in sequence? To answer, move the appropriate objects from the list of objects to the answer area and arrange them in the correct order.

Select and Place:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Step 1: Create an AKS cluster

Step 2: a system-assigned managed identity
To create an RBAC binding, you first need to get the Azure AD Object ID.

1.Sign in to the Azure portal.
2.In the search field at the top of the page, enter Azure Active Directory.
3.Click Enter.
4.In the Manage menu, select Users.
5.In the name field, search for your account.
6.In the Name column, select the link to your account.
7.In the Identity section, copy the Object ID.


Step 3: a RBAC binding


Reference:

https://docs.microsoft.com/en-us/azure/developer/ansible/aks-configure-rbac



HOTSPOT (Drag and Drop is not supported)
You manage build and release pipelines by using Azure DevOps. Your entire managed environment resides in Azure.
You need to configure a service endpoint for accessing Azure Key Vault secrets. The solution must meet the following requirements:
-Ensure that the secrets are retrieved by Azure DevOps.
-Avoid persisting credentials and tokens in Azure DevOps.

How should you configure the service endpoint? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.
Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:




Box 1: Azure Pipelines service connection

Box 2: Managed Service Identity Authentication
The managed identities for Azure resources feature in Azure Active Directory (Azure AD) provides Azure services with an automatically managed identity in Azure AD. You can use the identity to authenticate to any service that supports Azure AD authentication, including Key Vault, without any credentials in your code.


Reference:

https://docs.microsoft.com/en-us/azure/devops/pipelines/tasks/deploy/azure-key-vault https://docs.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/overview



You are deploying a server application that will run on a Server Core installation of Windows Server 2019. You create an Azure key vault and a secret.
You need to use the key vault to secure API secrets for third-party integrations.

Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

  1. Configure RBAC for the key vault.
  2. Modify the application to access the key vault.
  3. Configure a Key Vault access policy.
  4. Deploy an Azure Desired State Configuration (DSC) extension.
  5. Deploy a virtual machine that uses a system-assigned managed identity.

Answer(s): B,C,E

Explanation:

BE: An app deployed to Azure can take advantage of Managed identities for Azure resources, which allows the app to authenticate with Azure Key Vault using Azure AD authentication without credentials (Application ID and Password/Client Secret) stored in the app.

C:
1.Select Add Access Policy.
2.Open Secret permissions and provide the app with Get and List permissions.
3.Select Select principal and select the registered app by name. Select the Select button.
4.Select OK.
5.Select Save.
6.Deploy the app.


Reference:

https://docs.microsoft.com/en-us/aspnet/core/security/key-vault-configuration






Post your Comments and Discuss Microsoft AZ-400 exam with other Community members:

AZ-400 Exam Discussions & Posts