Book Image

Microsoft Azure Architect Technologies: Exam Guide AZ-300

By : Sjoukje Zaal
Book Image

Microsoft Azure Architect Technologies: Exam Guide AZ-300

By: Sjoukje Zaal

Overview of this book

From designing solutions on Azure to configuring and managing virtual networks, AZ-300 certification can help you achieve all this and more. Whether you want to get certified or gain hands-on experience in administering, developing, and architecting Azure solutions, this study guide will help you get started. The book features not only the different exam objectives, but also guides you through configuring, managing, securing, and architecting Azure resources. Divided into five modules, this book will systematically take you through the different concepts and features as you advance through the sections. The first module demonstrates how to deploy and configure infrastructure. You will cover techniques related to implementing workloads and security, before learning how to create and deploy apps in the next module. To build on your knowledge, the final two modules will get you up to speed with implementing authentication, data security, and application and platform monitoring, along with covering Azure storage, alerting, and automation strategies. Finally, you’ll work through exam-based mock tests with answers to boost your confidence in passing the exam. By the end of this book, you’ll have learned the concepts and techniques you need to know in order to prepare for the AZ-300 exam, along with the skills to design effective solutions on Microsoft Azure.
Table of Contents (30 chapters)
1
Section 1: Deploying and Configuring Infrastructure
9
Section 2: Implementing Workloads and Security
16
Section 3: Creating and Deploying Apps
19
Section 4: Implementing Authentication and Secure Data
22
Section 5: Developing for the Cloud and for Azure Storage
26
Mock Questions
27
Mock Answers

Encrypting data with Always Encrypted

Always Encrypted is a database encryption technology that can secure sensitive data stored in an Azure SQL Database and SQL Server on-premises, such as credit card numbers or national identification numbers (for example, U.S. social security numbers). It helps protect data at rest on the server, during movement between the client and the server. While this data is in use, it can ensure sensitive data never appears as plaintext inside the database system.

The client encrypts the data inside the application and the encryption keys are never revealed to the Database Engine (SQL Database or SQL Server). This results in Always Encrypted separating the data into who owns the data (and can view it), and who stores and manages the data (but should not have access to it). This way, organizations can confidently store sensitive data securely without having control over it, ensuring that on-premises database administrators, cloud database operators, and other...