All About Azure
Across
- 3. Azure ________ Storage is often used to serve images or documents directly to a browser
- 7. The Azure __________ Service is an HTTP-based service for hosting web applications, REST APIs, and mobile back ends.
- 8. Traffic Manager is often used to deploy _____________ applications that require high availability and disaster recovery.
- 10. Azure __________________ storage leverages the NoSQL key-value model where data for a given item is stored as a set of fields, and the item is identified by a unique key.
- 12. Azure _______ allows you to implement your system's logic into readily available blocks of code
- 14. Can be used to provide just-in-time access to Azure AD and Azure resources.
- 16. The Azure _______ is Microsoft’s managed network security service in Azure that protects Azure Virtual Network resources
- 19. Azure _______ is used to create, assign, and manage policies that enforce different rules and effects over your resources
- 20. Since many apps access data through file-based APIs, Azure __________________ is often a good solution to leverage when migrating existing applications to the cloud.
- 22. Management ______________ can be used to manage access, policy, and compliance for multiple subscriptions.
- 24. The ability to react quickly. Cloud services can allocate and deallocate resources quickly
- 25. Azure SQL Managed Instance is an example of ____________.
- 28. Availability __________ are unique physical locations within an Azure region. Each one is made up of one or more datacenters equipped with independent power, cooling, and networking.
- 29. Azure ____________ evaluates Azure resources by comparing the properties of those resources to business rules that you define.
- 30. Azure Service Fabric is a ___________ systems platform that makes it easy to package, deploy, and manage scalable and reliable microservices and containers.
- 32. A VM _______ is a set of identically-configured virtual machines that supports true auto-scale
- 35. The ability to automatically or dynamically increase or decrease resources as necessary
- 36. Azure ____________ enables multi-tenant management with scalability, higher automation, and enhanced governance across resources.
- 39. A _______________ Load Balancer can be used to manage outbound connections to the internet from Azure resources.
- 43. Azure _______ allows you to collect, analyze, and act upon telemetry from both cloud and on-prem environments
- 44. The _________________ service tier is designed for most business workloads. It offers auto-scaling storage, fluid vertical and horizontal compute scaling, fast database restore, and is only available for Single Azure SQL Databases.
- 45. Azure _______ are used to logically organize your Azure resources
- 47. Allows you to extend your on-prem network into the Microsoft cloud over a private connection.
- 49. Microsoft Office 365 is an example of _________.
- 52. Azure _______________ is a service that you can deploy that allows you to connect to virtual machines via a web browser and the Azure portal.
- 54. A ____________________ VPN can be used to connect an on-prem network to an Azure virtual network, through an IPsec or IKE1/2 VPN tunnel over the internet.
- 55. When you create blob storage, the _____________ tier is the default tier.
- 56. An Azure _______ allows several types of Azure resources to securely communicate
- 57. Azure _________ is used to run large-scale parallel and high-performance computing batch jobs efficiently in Azure.
- 58. An Azure __________ Security Group filters network traffic to and from Azure resources connected to Azure Virtual Networks
- 59. Azure _______ is Microsoft's cloud-based on-demand computing service that provides computing resources such as disks, CPUs, memory, networking, and OS
Down
- 1. The part of Azure Monitor that monitors the availability, performance, and usage of web applications in the cloud and on-prem is called _____________ Insights.
- 2. Discrete markets that preserve data residency and compliance boundaries that typically contain two or more regions
- 4. Azure ________ are fully managed file shares in the cloud that are accessible via the industry standard Server Message Block (SMB) protocol or Network File System (NFS) protocol
- 5. When you deploy an Azure resource, you automatically get DDoS protection via the _________ DDoS protection plan.
- 6. Data that consists of numerical values that describe some aspect of a system at a specific point in time.
- 9. Azure _______ is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution
- 11. Provides fine-grained access management for Azure resources
- 12. To use traditional AD with Software-as-a-Service applications, you need to deploy a _____________ solution.
- 13. Used on Linux VMs to encrypt disks.
- 15. An Azure _______ Gateway provides for the management of traffic to web applications
- 17. Resource _______ are used to prevent accidental deletion or modification of Azure resources
- 18. Provides added security for user authentications by requiring two or more elements for authentication
- 21. The ability to increase or decrease resources for a given workload
- 23. Using dynamic _________________ allows a database to transparently respond to quickly-changing resource requirements. As a result, you only pay for the resources that you need when you need them.
- 26. When a user authenticates from an Azure ADDS-joined device, applications can use ________________ or NTLM for authentication to support legacy applications that have been migrated to VMs in the cloud.
- 27. Azure ____________is a serverless solution that allows you to write less code, maintain less infrastructure, and save on costs.
- 31. A User _________________ Policy allows Identity Protection to calculate what it believes is normal for a user's behavior. It then uses this information to determine the probability that an identity has been compromised.
- 33. A user who has been assigned the Global _______________ role can access Azure Identity Protection.
- 34. Azure _______ is used to define repeatable sets of Azure resources that implement and adhere to standards, patterns, and requirements
- 37. A ___________ cloud is a type of cloud computing that combines on-premises infrastructure—or a private cloud—with a public cloud.
- 38. Log data that gets collected by Azure Monitor is analyzed with __________.
- 40. A Virtual Network _______ sends encrypted traffic over the public internet between an Azure Virtual Network and an on-prem network and provides a secure connection from an on-prem environment to Azure
- 41. Availability _______ are physically separate locations within an Azure region
- 42. The Single Server deployment option of Azure Database for MySQL comes in three pricing tiers: ________________, General Purpose, and Memory Optimized.
- 46. provides developer services for support teams to plan work, collaborate on code development, and build and deploy applications
- 48. Used on Windows VMs to encrypt disks.
- 50. An Azure __________ Security Group allows you to configure network security as an extension of an application's structure
- 51. You can use Azure _____________ to create, enforce, and log application and network connectivity policies across multiple subscriptions and multiple virtual networks.
- 53. Used to manage Azure AD joined Windows machines.