Microsoft Azure Interview Questions and Answers Set 3

21.What are Fault Domains?

A fault domain is a logical group of underlying hardware that share a common power source and network switch, similar to a rack within an on-premise data-centers. As you create VMs within an availability set, the Azure platform automatically distributes your VMs across these fault domains. This approach limits the impact of potential physical hardware failures, network outages, or power interruptions.

22. What are Update Domains?

An update domain is a logical group of underlying hardware that can undergo maintenance or can be rebooted at the same time. As you create VMs within an availability set, the Azure platform automatically distributes your VMs across these update domains. This approach ensures that at least one instance of your application always remains running as the Azure platform undergoes periodic maintenance. The order of update domains being rebooted may not proceed sequentially during planned maintenance, but only one update domain is rebooted at a time.

23. What are Network Security Groups?

A network security group (NSG) contains a list of Access Control List (ACL) rules that allow or deny network traffic to subnets, NICs, or both. NSGs can be associated with either subnets or individual NICs connected to a subnet. When an NSG is associated with a subnet, the ACL rules apply to all the VMs in that subnet. In addition, traffic to an individual NIC can be restricted by associating an NSG directly to a NIC.

24. Do scale sets work with Azure availability sets?

Yes. A scale set is an implicit availability set with 5 fault domains and 5 update domains. Scale sets of more than 100 VMs span multiple placement groups, which are equivalent to multiple availability sets. An availability set of VMs can exist in the same virtual network as a scale set of VMs. A common configuration is to put control node VMs (which often require unique configuration) in an availability set and put data nodes in the scale set.

25.What is a Storage keys?

Storage keys or Access Keys are utilized as a validation mode for accessing to the storage services account to control data based on our prerequisites. In Windows Azure we have an alternative to give a Primary Access Key and a Secondary Access Key, despite the fact that we will utilize a solitary access key to confirm our application to the storage. The primary reason to give the secondary access key is to avoid downtime to the application.

MICROSOFT AZURE TRAINING
Weekend / Weekday Batch

26. What is Azure Data Factory?

Azure Data Factory is a serverless and cloud-based data integration service and platform used for the creation of ETL and ELT pipelines. It helps in the creation of data-driven workflows for the planning and execution of data movements and data transformation at scale.

27.What is Windows Azure Traffic Manager?

It enables Users to control the distribution of user traffic of installed Azure cloud services.There are 3 distinctive load balancing strategies provided by Azure. The Manager who works on traffic apply’s a routing policy to the Domain Name Service (DNS) questions on your domain names and maps the DNS courses to the apt instances of your applications.

28. Why is Azure Active Directory used?

Azure Active Directory is an Identity and Access Management system. It is used to grant access to your employees to specific products and services in your network. For example: Salesforce.com, twitter etc. Azure AD has some in-built support for applications in its gallery which can be added directly.

29.What is Federation in SQL Azure?

Organization in SQL Azure is introduced for scalability. federation helps both managers and developers to scale information. It helps managers by making repartitioning and redistributing of information simpler. It enables developers in the layer of routing and sharing of information. It helps in routing without application downtime.

30. What happens when you exhaust the maximum failed attempts for authenticating yourself via Azure AD?

We use a more sophisticated strategy to lock accounts. This is based on the IP address of the request and the passwords entered. The duration of the lockout also increases based on the likelihood that it is an attack.

Read More: Microsoft Azure Interview Questions for experienced




Search Tags