All About Azure

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859
Across
  1. 3. Azure ________ Storage is often used to serve images or documents directly to a browser
  2. 7. The Azure __________ Service is an HTTP-based service for hosting web applications, REST APIs, and mobile back ends.
  3. 8. Traffic Manager is often used to deploy _____________ applications that require high availability and disaster recovery.
  4. 10. Azure __________________ storage leverages the NoSQL key-value model where data for a given item is stored as a set of fields, and the item is identified by a unique key.
  5. 12. Azure _______ allows you to implement your system's logic into readily available blocks of code
  6. 14. Can be used to provide just-in-time access to Azure AD and Azure resources.
  7. 16. The Azure _______ is Microsoft’s managed network security service in Azure that protects Azure Virtual Network resources
  8. 19. Azure _______ is used to create, assign, and manage policies that enforce different rules and effects over your resources
  9. 20. Since many apps access data through file-based APIs, Azure __________________ is often a good solution to leverage when migrating existing applications to the cloud.
  10. 22. Management ______________ can be used to manage access, policy, and compliance for multiple subscriptions.
  11. 24. The ability to react quickly. Cloud services can allocate and deallocate resources quickly
  12. 25. Azure SQL Managed Instance is an example of ____________.
  13. 28. Availability __________ are unique physical locations within an Azure region. Each one is made up of one or more datacenters equipped with independent power, cooling, and networking.
  14. 29. Azure ____________ evaluates Azure resources by comparing the properties of those resources to business rules that you define.
  15. 30. Azure Service Fabric is a ___________ systems platform that makes it easy to package, deploy, and manage scalable and reliable microservices and containers.
  16. 32. A VM _______ is a set of identically-configured virtual machines that supports true auto-scale
  17. 35. The ability to automatically or dynamically increase or decrease resources as necessary
  18. 36. Azure ____________ enables multi-tenant management with scalability, higher automation, and enhanced governance across resources.
  19. 39. A _______________ Load Balancer can be used to manage outbound connections to the internet from Azure resources.
  20. 43. Azure _______ allows you to collect, analyze, and act upon telemetry from both cloud and on-prem environments
  21. 44. The _________________ service tier is designed for most business workloads. It offers auto-scaling storage, fluid vertical and horizontal compute scaling, fast database restore, and is only available for Single Azure SQL Databases.
  22. 45. Azure _______ are used to logically organize your Azure resources
  23. 47. Allows you to extend your on-prem network into the Microsoft cloud over a private connection.
  24. 49. Microsoft Office 365 is an example of _________.
  25. 52. Azure _______________ is a service that you can deploy that allows you to connect to virtual machines via a web browser and the Azure portal.
  26. 54. A ____________________ VPN can be used to connect an on-prem network to an Azure virtual network, through an IPsec or IKE1/2 VPN tunnel over the internet.
  27. 55. When you create blob storage, the _____________ tier is the default tier.
  28. 56. An Azure _______ allows several types of Azure resources to securely communicate
  29. 57. Azure _________ is used to run large-scale parallel and high-performance computing batch jobs efficiently in Azure.
  30. 58. An Azure __________ Security Group filters network traffic to and from Azure resources connected to Azure Virtual Networks
  31. 59. Azure _______ is Microsoft's cloud-based on-demand computing service that provides computing resources such as disks, CPUs, memory, networking, and OS
Down
  1. 1. The part of Azure Monitor that monitors the availability, performance, and usage of web applications in the cloud and on-prem is called _____________ Insights.
  2. 2. Discrete markets that preserve data residency and compliance boundaries that typically contain two or more regions
  3. 4. Azure ________ are fully managed file shares in the cloud that are accessible via the industry standard Server Message Block (SMB) protocol or Network File System (NFS) protocol
  4. 5. When you deploy an Azure resource, you automatically get DDoS protection via the _________ DDoS protection plan.
  5. 6. Data that consists of numerical values that describe some aspect of a system at a specific point in time.
  6. 9. Azure _______ is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution
  7. 11. Provides fine-grained access management for Azure resources
  8. 12. To use traditional AD with Software-as-a-Service applications, you need to deploy a _____________ solution.
  9. 13. Used on Linux VMs to encrypt disks.
  10. 15. An Azure _______ Gateway provides for the management of traffic to web applications
  11. 17. Resource _______ are used to prevent accidental deletion or modification of Azure resources
  12. 18. Provides added security for user authentications by requiring two or more elements for authentication
  13. 21. The ability to increase or decrease resources for a given workload
  14. 23. Using dynamic _________________ allows a database to transparently respond to quickly-changing resource requirements. As a result, you only pay for the resources that you need when you need them.
  15. 26. When a user authenticates from an Azure ADDS-joined device, applications can use ________________ or NTLM for authentication to support legacy applications that have been migrated to VMs in the cloud.
  16. 27. Azure ____________is a serverless solution that allows you to write less code, maintain less infrastructure, and save on costs.
  17. 31. A User _________________ Policy allows Identity Protection to calculate what it believes is normal for a user's behavior. It then uses this information to determine the probability that an identity has been compromised.
  18. 33. A user who has been assigned the Global _______________ role can access Azure Identity Protection.
  19. 34. Azure _______ is used to define repeatable sets of Azure resources that implement and adhere to standards, patterns, and requirements
  20. 37. A ___________ cloud is a type of cloud computing that combines on-premises infrastructure—or a private cloud—with a public cloud.
  21. 38. Log data that gets collected by Azure Monitor is analyzed with __________.
  22. 40. A Virtual Network _______ sends encrypted traffic over the public internet between an Azure Virtual Network and an on-prem network and provides a secure connection from an on-prem environment to Azure
  23. 41. Availability _______ are physically separate locations within an Azure region
  24. 42. The Single Server deployment option of Azure Database for MySQL comes in three pricing tiers: ________________, General Purpose, and Memory Optimized.
  25. 46. provides developer services for support teams to plan work, collaborate on code development, and build and deploy applications
  26. 48. Used on Windows VMs to encrypt disks.
  27. 50. An Azure __________ Security Group allows you to configure network security as an extension of an application's structure
  28. 51. You can use Azure _____________ to create, enforce, and log application and network connectivity policies across multiple subscriptions and multiple virtual networks.
  29. 53. Used to manage Azure AD joined Windows machines.