The Microsoft 70-533 certification can be now staying regarded very essential, and the major reason is the universal recognition in the IT certification. It really is one of the passports in your case to enter your IT entire world. Its challenging for you for you to hunt for a very good job without the Microsoft 70-533 certification but have practical encounter.

2021 Sep 70-533 exam prep

Q1. You administer an Azure Active Directory (Azure AD) tenant that has a SharePoint web application named TeamSite1. TeamSite1 accesses your Azure AD tenant for user information. 

The application access key for TeamSite1 has been compromised. 

You need to ensure that users can continue to use TeamSite1 and that the compromised key does not allow access to the data in your Azure AD tenant. 

Which two actions should you perform? Each correct answer presents part of the solution. 

A. Remove the compromised key from the application definition for TeamSite1. 

B. Delete the application definition for TeamSite1. 

C. Generate a new application key for TeamSite1. 

D. Generate a new application definition for TeamSite1. 

E. Update the existing application key. 

Answer: A,C 

Explanation: One of the security aspects of Windows Azure storage is that all access is protected by access keys. 

It is possible to change the access keys (e.g. if the keys become compromised), and if changed, we’d need to update the application to have the new key. 


Q2. You develop a Windows Store application that has a web service backend. 

You plan to use the Azure Active Directory Authentication Library to authenticate users to Azure Active Directory (Azure AD) and access directory data on behalf of the user. 

You need to ensure that users can log in to the application by using their Azure AD credentials. 

Which two actions should you perform? Each correct answer presents part of the solution. 

A. Create a native client application in Azure AD. 

B. Configure directory integration. 

C. Create a web application in Azure AD. 

D. Enable workspace join. 

E. Configure an Access Control namespace. 

Answer: B,C 

Explanation: B: An application that wants to outsource authentication to Azure AD must be 

registered in Azure AD, which registers and uniquely identifies the app in the directory. 

C (not A): NativeClient-WindowsStore 

A Windows Store application that calls a web API that is secured with Azure AD. 


Reference: AzureADSamples/NativeClient-WindowsStore Authentication Scenarios for Azure AD, Basics of Authentication in Azure AD http://msdn.microsoft.com/en-us/library/azure/dn499820.aspx#BKMK_Auth https://github.com/AzureADSamples/NativeClient-WindowsStore 


Q3. DRAG DROP 

You administer an Azure Virtual Machine (VM) named CON-CL1. CON-CL1 is in a cloud service named ContosoService1. 

You want to create a new VM named MyApp that will have a fixed IP address and be hosted by an Azure Datacenter in the US West region. 

You need to assign a fixed IP address to the MyApp VM. 

Which Azure Power Shell cmdlets and values should you use? To answer, drag the appropriate cmdlet or value to the correct location in the PowerShell command. Each cmdlet or value may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content 


Answer: 



Q4. You administer an Azure Storage account named contoso storage. The account has queue containers with logging enabled. 

You need to view all log files generated during the month of July 2014. 

Which URL should you use to access the list? 

A. 

http://contosostorage.queue.core.windows.net/$logs? restype=container&comp=list&prefix=queue/2014/07 

B. 

http://contosostorage.queue.core.windows.net/$files? restype=container&comp=list&prefix=queue/2014/07 

C. http://contosostorage.blob.core.windows.net/$files? 

restype=container&comp=list&prefix=blob/2014/07 

D. http://contosostorage.blob.core.windows.net/$logs? restype=container&comp=list&prefix=blob/2014/07 

Answer: A 

Explanation: http://msdn.microsoft.com/library/azure/hh343262.aspx 


Q5. DRAG DROP 

You have a solution deployed into a virtual network in Azure named fabVNet. The fabVNet virtual network has three subnets named Apps, Web, and DB that are configured as shown in the exhibit. (Click the Exhibits button.) 



You want to deploy two new VMs to the DB subnet. 

You need to modify the virtual network to expand the size of the DB subnet to allow more IP addresses. 

Which three steps should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 


Answer: 



70-533 exam engine

Replace 70-533 practice test:

Q6. You administer an Azure solution that uses a virtual network named fabVNet. FabVNet has a single subnet named Subnet-1. 

You discover a high volume of network traffic among four virtual machines (VMs) that are part of Subnet-1. 

You need to isolate the network traffic among the four VMs. You want to achieve this goal with the least amount of downtime and impact on users. 

What should you do? 

A. Create a new subnet in the existing virtual network and move the four VMs to the new subnet. 

B. Create a site-to-site virtual network and move the four VMs to your datacenter. 

C. Create a new virtual network and move the VMs to the new network. 

D. Create an availability set and associate the four VMs with that availability set. 

Answer: A 

Explanation: Machine Isolation Options 

There are three basic options where machine isolation may be implemented on the Windows Azure platform: 

* Between machines deployed to a single virtual network Subnets within a Single Virtual Network 

* Between machines deployed to distinct virtual networks 

* Between machines deployed to distinct virtual networks where a VPN connection has been established from on-premises with both virtual networks 

Windows Azure provides routing across subnets within a single virtual network. 

Reference: Network Isolation Options for Machines in Windows Azure Virtual Networks 

Incorrect: 

not B: A site-to-site VPN allows you to create a secure connection between your on-premises site and your virtual network. 

Use a site-to-site connection when: 

* You want to create a branch office solution. 

* You want a connection between your on-premises location and your virtual network that’s available without requiring additional client-side configurations. 


Q7. You are migrating a local virtual machine (VM) to an Azure VM. You upload the virtual hard disk (VHD) file to Azure Blob storage as a Block Blob. 

You need to change the Block blob to a page blob. 

What should you do? 

A. Delete the Block Blob and re-upload the VHD as a page blob. 

B. Update the type of the blob programmatically by using the Azure Storage .NET SDK. 

C. Update the metadata of the current blob and set the Blob-Type key to Page. 

D. Create a new empty page blob and use the Azure Blob Copy Power Shell cmdlet to copy the current data to the new blob. 

Answer: A 

Explanation: * To copy the data files to Windows Azure Storage by using one of the following methods: AzCopy Tool, Put Blob (REST API) and Put Page (REST API), or Windows Azure Storage Client Library for .NET or a third-party storage explorer tool. Important: When using this new enhancement, always make sure that you create a page blob not a block blob. 

* Azure has two main files storage format: Page blob : mainly used for vhd’s (CloudPageBlob) Block Blob : for other files (CloudBlockBlob) 

ference: Move your data files to Windows Azure Storage 

http://msdn.microsoft.com/en-us/library/dn466429.aspx 


Q8. You manage a software-as-a-service application named SaasApp1 that provides user management features in a multi-directory environment. 

You plan to offer SaasApp1 to other organizations that use Azure Active Directory. 

You need to ensure that SaasApp1 can access directory objects. 

What should you do? 

A. Configure the Federation Metadata URL 

B. Register SaasApp1 as a native client application. 

C. Register SaasApp1 as a web application. 

D. Configure the Graph API. 

Answer: D 

Explanation: The Azure Active Directory Graph API provides programmatic access to Azure AD through REST API endpoints. Applications can use the Graph API to perform create, read, update, and delete (CRUD) operations on directory data and objects. For example, the Graph API supports the following common operations for a user object: / Create a new user in a directory / Get a user’s detailed properties, such as their groups / Update a user’s properties, such as their location and phone number, or change their password / Check a user’s group membership for role-based access / Disable a user’s account or delete it entirely 

Reference: Azure AD Graph API 

URL: http://msdn.microsoft.com/en-us/library/azure/hh974476.aspx 


Q9. DRAG DROP 

Your company network includes a single forest with multiple domains. You plan to migrate from On-Premises Exchange to Exchange Online. 

You want to provision the On-Premises Windows Active Directory (AD) and Azure Active Directory (Azure AD) service accounts. 

You need to set the required permissions for the Azure AD service account. 

Which settings should you use? To answer, drag the appropriate permission to the service account. Each permission may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 


Answer: 



Q10. You administer an Azure Web Site named contosoweb that is used to sell various products. Contosoweb experiences heavy traffic during weekends. 

You need to analyze the response time of the product catalog page during peak times, from different locations. 

What should you do? 

A. Configure endpoint monitoring. 

B. Add the Requests metric. 

C. Turn on Failed Request Tracing. 

D. Turn on Detailed Error Messages. 

Answer: A 

Explanation: Endpoint monitoring configures web tests from geo-distributed locations that test response time and uptime of web URLs. The test performs an HTTP get operation on the web URL to determine the response time and uptime from each location. Each configured location runs a test every five minutes. After you configure endpoint monitoring, you can drill down into the individual endpoints to view details response time and uptime status over the monitoring interval from each of the test location 

Reference: Azure, How to Monitor Websites 

http://azure.microsoft.com/en-us/documentation/articles/web-sites-monitor/#webendpointstatus