Directory Image
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.

Instant Success 70-535 Exam with Valid 70-535 Questions Dumps 2018

Author: Jessica Fay
by Jessica Fay
Posted: Jan 16, 2018

Case Study: 1

Trey Research (NEW)

Background

You are an architect for Trey Research Inc., a software as a service (SaaS) company. The company is developing a new product named Tailspin for consumer and small business financial monitoring. The product will be offered as an API to banks and financial instructions. Banks and financial institutions will integrate Tailspin into their own online banking offerings.

All employees of Trey Research are members of an Active Directory Domain Services (AD DS) group named TREY.

Technical Requirement

Architecture

All application and customer data will be stored in Azure SQL Database instances.

API calls that modify data will be implemented as queue messages in an Azure Storage Queue. Queue messages must expire after 90 minutes.

Security

The solution has the following security requirements:

  • Common security issues such as SQL injection and XSS must be prevented.
  • Database-related security issues must not result in customers' data being exposed.
  • Exposure of application source code and deployment artifacts must not result in customer data being exposed.

Every 90 days, all application code must undergo a security review to ensure that new or changed code does not introduce a security risk.

Remote code execution in the Web App must not result in the loss of security secrets.

Auditing, Monitoring, Alerting

The solution has the following requirements for auditing, monitoring, and alerting:

  • Changes to administrative group membership must be auditable.
  • Operations involving encryption keys must be auditable by users in the Azure Key Vault Auditors user role.
  • Resources must have monitoring and alerting configured in Azure Security Center.

Authorization, authentication

The solution has the following authentication and authorization requirements:

  • Azure Active Directory (Azure AD) must be used to authenticate users.
  • Compromised user accounts should be disabled as quickly as possible.
  • Only employees of Trey Research Inc. should be able to address automated security recommendations.

Service Level agreement

Failure of any one Azure region must not impact service availability. Customer data must not be lost once accepted by the application.

Performance, resource utilization

The solution must meet the following performance and resource usage requirements:

  • Azure costs must be minimized.
  • Application performance must remain level, regardless of the geographic location of users.
  • All application diagnostic and activity logs must be captured without loss.
  • Compute resources must be shared across all databases used by the solution.

Question: 1

You need to ensure that authentication requirements are met.

What should you do?

A. Enable multi-factor authentication.

B. Enable Azure AD Identity Protection.

C. Require users to authenticate by using Windows Hello for Business.

D. Require users to authenticate by using certificate-based authentication.

Answer: A

https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication

Question: 2

You are developing the application security review document.

You need to ensure that application data security requirements are met.

What should you verify?

A. Azure SQL connections use an account that does have administrative access.

B. Connection strings use encryption and not trust server certificates.

C. Azure SQL connections use Azure Key Vault certificates for TLS.

D. Connection strings are not stored in application code.

Answer: B

References:

https://docs.microsoft.com/en-us/azure/sql-database/sql-database-security-tutorial

Question: 3

You need to design the multi-tenant model for storing application and customer data.

Which pattern should you recommend?

A. Shared database-single

B. Database-per-tenant with elastic pools

C. Database-per-tenant without elastic pools

D. Shared database-shared

Answer: B

References:

https://docs.microsoft.com/en-us/azure/sql-database/saas-tenancy-app-design-patterns

Question: 4

You need to ensure that the logging, monitoring, and alerting requirements are met.

What should you recommend?

A. Azure Storage Queue

B. Azure Cosmos DB

C. Azure Table storage

D. Azure Event Hub

Answer: D

Question: 5

You need to prevent security attacks based on the Tabular Data Stream (TDS) Protocol.

Solution: Use an Azure Load Balancer for All TDS traffic.

Does the solution meet the goal?

A. Yes

B. No

Answer: B

Question: 6

You need to prevent security attacks based on the Tabular Data Stream (TDS) Protocol.

Solution: Use certificate-based authentication for all Azure SQL instances.

Does the solution meet the goal?

A. Yes

B. No

Answer: B

Question: 7

You need to prevent security attacks based on the Tabular Data Stream (TDS) Protocol.

Solution: Isolate connection to Azure web Apps and Azure SQL Database instances by implementing a virtual network.

Does the solution meet the goal?

A. Yes

B. No

Answer: A

Test Information:

Total Questions: 270

Test Number: 70-535

Vendor Name: Microsoft

Cert Name: Microsoft Azure

Test Name: Architecting Microsoft Azure Solutions

Official Site: https://www.certschief.com

For More Details: https://www.certschief.com/exam/70-535/

About the Author

Certschief offers Implementing Cisco Network Security certification real exam questions answers with money back pass guarantee.

Rate this Article
Leave a Comment
Author Thumbnail
I Agree:
Comment 
Pictures
Author: Jessica Fay

Jessica Fay

Member since: Dec 17, 2017
Published articles: 36

Related Articles