Book Image

Hands-On Cloud Administration in Azure

By : Mustafa Toroman
Book Image

Hands-On Cloud Administration in Azure

By: Mustafa Toroman

Overview of this book

Azure continues to dominate the public cloud market and grow rapidly thanks to a number of recent innovations. Azure's wide range of services and support has led to a large number of customers switching to Azure cloud. Hands-On Cloud Administration in Azure starts with the basics of Azure cloud fundamentals and key concepts of the cloud computing ecosystem and services. Then, you will gradually get acquainted with core services provided by Azure, including Azure VNet, types and assignments of IP addresses, and network security groups. You will also work on creating and administering Azure Virtual Machines, types of virtual machines (VMs), and design VM solutions based on computing workloads. As you make your way through the chapters, you will explore Azure App Service, discover how to host your web apps in Azure, and monitor and troubleshoot them. In the concluding chapters, you will learn more complex and abstract services, such as Azure Storage, Azure Backup, and Azure Site Recovery. You will also get to grips with Azure SQL Databases and the SQL on Azure VM concept. By the end of this book, you will have obtained practical experience of working with Azure services and Azure administration, along with maintaining, monitoring, and securing your Azure resources.
Table of Contents (13 chapters)

Questions

  1. Everything in Azure is redundant and has how many copies?
    1. One
    2. Two
    3. Three
  2. Most data breaches are caused by...
    1. Brute-force attacks
    2. Leaked credentials
    3. Viruses
  3. MFA stands for...
    1. Multi-factor authentication
    2. Multi-factor authorization
    3. Multi-factor activation
  4. MFA can be configured to use:
    1. Phone calls
    2. Text messages
    3. A mobile app
    4. All of the above
  5. Azure Firewall is...
    1. Infrastructure as a Service
    2. Firewall as a Service
    3. Both
  6. Azure resources can be encrypted using...
    1. An Azure-provided key
    2. A custom key
    3. Both
  1. To use custom keys, we must use...
    1. Azure Security Center
    2. Azure Key Vault
    3. Both
  2. Azure Security Center provides...
    1. Security management
    2. Advanced threat protection
    3. Both
  3. Azure Security Center can be used to protect...
    1. Azure resources
    2. On-premises resources
    3. Both
  4. Just-in-Time access provides...
    1. Control over management access for our VMs
    2. Live monitoring of access...