Sunday 2 September 2018

Microsoft 70-533 Question Answer

Your network environment includes remote employees.
You need to create a secure connection for the remote employees who require access to your Azure virtual network. What should you do?

A. Deploy Windows Server 2012 RRAS.
B. Configure a point-to-site VPN.
C. Configure an ExpressRoute.
D. Configure a site-to-site VPN.

Answer: B
                                                                         70-533 Dumps Questions

You manage a cloud service that has a web role named fabWeb. You create a virtual network named fabVNet that has two subnets defined as Web and Apps. You need to be able to deploy fabWeb into the Web subnet. What should you do?

A. Modify the service definition(csdef) for the cloud service.
B. Run the Set-AzureSubnet PowerShell cmdlet.
C. Run the Set-AzureVNetConfig PowerShell cmdlet.
D. Modify the network configuration file.
E. Modify the service configuration (cscfg) for the fabWeb web role.

Answer: E

Friday 23 February 2018

Microsoft 70-533 Question Answer

Your company network includes two branch offices. Users at the company access internal virtual machines (VMs). You want to ensure secure communications between the branch offices and the internal VMs and network. You need to create a site-to-site VPN connection.
What are two possible ways to achieve this goal? Each answer presents a complete solution.


A. a private IPv4 IP address and a compatible VPN device
B. a private IPv4IP address and a RRAS running on Windows Server 2012
C. a public-facing IPv4 IP address and a compatible VPN device
D. a public-facing IPv4 IP address and a RRAS running on Windows Server 2012

Answer: CD



DRAG DROP
Your development team has created a new solution that is deployed in a virtual network named fabDevVNet. Your testing team wants to begin testing the solution in a second Azure subscription. You need to create a virtual network named fabTestVNet that is identical to fabDevVNet. You want to achieve this goal by using the least amount of administrative effort.
Which three steps should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the order.
Select and Place:




Answer:

 

Thursday 21 December 2017

Microsoft welcomes Google to build a compliant browser app as it removes Chrome Installer from Windows Store



Well, that did not last long. It was interesting to see how long Microsoft would wait before intervening and putting the gimmick on Google's possibly lazy effort to get more conversions from Chrome by circumventing the purpose of the Microsoft store.

Just twelve hours after the web container touched the Microsoft store, the publishers of the Store are removing the installation tool, since the company considers that it violates the policies of the Store. The policies of the Microsoft Store, as with most application stores, are quite basic and seek to ensure that users obtain at least a minimal minimum utility from their aggregation.


 In a statement given to The Verge, Microsoft cited that the new Google application had been removed due to its failure to provide users with a "unique and distinct value".

Microsoft invited Google to retry its efforts, "We welcome Google to create a Microsoft Store browser application that complies with our Microsoft Store policies."

It is doubtful that Google accepts Microsoft in its offer. Lately, it would seem that Google is making fun of the value proposition of unique and distinctive experiences for Windows users as the company seeks to defend its own growth platform and service portfolio.

To date, Google has developed a unique search application for Windows 8 and Windows 8 phones. That was more than five years ago.


 Despite a growing audience of more than 500 million, Google has remained adamant not to develop any of its most popular applications for the Microsoft Store or Windows 10 platform, nor to update or support its previous search application for Windows 8.

Another obstacle on the way to a more user-friendly relationship between Google and Microsoft is the restriction of the platform established by the development requirements of the Microsoft Store. Similar to Apple, Microsoft is strictly implementing an HTML and JavaScript engine development for any company that seeks to build and launch a browser from the Microsoft store. The restriction is implemented to ensure better performance in Windows 10. Unfortunately, Google uses its Blink rendering engine, which is a fork of WebKit, none of which will run as a new Microsoft Store application at this time.

As many points of sale (including ours) were quick to post about the new Google Chrome installer, I sat there wondering what the problem was and why a link disguised as a web wrap was receiving so much attention from people.

This type of application / client saga between Microsoft and Google will continue as long as the two companies compete vertically in the same space. However, despite some high-profile conflicts in the platform wars, Microsoft and Google are working together to seemingly get rid of user applications.

The progressive web applications seem to be a position in which both Google and Microsoft agree and could present a double opportunity for Microsoft. PWAs will help strengthen the number of useful and relevant applications in the Microsoft store, as well as transitioning users to use more of the Edge browser for their workloads.

While actions like the current one help feed the finger-tip of the partisan platform, we should all expect these two to move forward with more interoperability and accessibility to the service to help drive the growing number of devices we use to help manage our daily lives. .

Wednesday 8 November 2017

Microsoft 70-533 Question Answer

DRAG DROP

You manage an Azure virtual machine (VM) named AppVM. The application hosted on AppVM continuously writes small files to disk. Recently the usage of applications on
AppVM has increased greatly.
You need to improve disk performance on AppVM.
Which Microsoft Azure Power Shell cmdlet should you use with each Power Shell
command line? To answer, drag the appropriate Microsoft Azure Power Shell cmdlet to the
correct location in the Power Shell code. Each Power Shell cmdlet may be used once,
more than once, or not at all. You may need to drag the split bar between panes or scroll to
view content.



Answer:



Tuesday 12 September 2017

Microsoft 70-533 Question Answer

You administer an Azure Active Directory (Azure AD) tenant that has a SharePoint web application named TeamSite1. TeamSite1 accesses your Azure AD tenant for user information. The application access key for TeamSite1 has been compromised. You need to ensure that users can continue to use TeamSite1 and that the compromised key does not allow access to the data in your Azure AD tenant. Which two actions should you perform? Each correct answer presents part of the solution.

A. Remove the compromised key from the application definition for TeamSite1.
B. Delete the application definition for TeamSite1.
C. Generate a new application key for TeamSite1.
D. Generate a new application definition for TeamSite1.
E. Update the existing application key.

Answer: A,C


You manage an Azure virtual network that hosts 15 virtual machines (VMs) on a single subnet, which is used for testing a line of business (LOB) application. The application is deployed to a VM named TestWebServiceVM. You need to ensure that TestWebServiceVM always starts by using the same IP address. You need to achieve this goal by using the least amount of administrative effort. What are two possible ways to achieve the goal? Each correct answer presents a complete solution.

A. Run the following Azure PowerShell cmdlet: Set-AzureStaticVNetIP
B. Use the Azure portal to configure TestWebServiceVM.
C. Run the following Azure PowerShell cmdlet: Get-AzureReservedIP
D. Use RDP to configure TestWebServiceVM.

Answer: A,B

Monday 12 June 2017

Indian Banks Select Microsoft As Exclusive Cloud Blockchain Provider


A consortium of Indian-based banking firms, including State Bank of India, ICICI Bank and DCB Bank, has formally selected Microsoft Azure as its exclusive partner in the cloud.

As part of this partnership, the 20 members of the BankChain consortium, which was made public with its R & D efforts last month, will use Microsoft's Azure chain to house nodes that will relay transactions in their distributed accounting systems.

According to a press release, the first active project to use Azure will be Primechain-KYC, a closed, authorized chain built by Mumbai-based Primechain Technologies. The tool seeks to help clients share KYC information, anti-money laundering and anti-terrorist financing information.

Since adding blockchain to its Azure cloud computing platform in October 2015, Microsoft has added a steady stream of partners, including JP Morgan, Emercoin and Bitshares, to its BaaS - a product called a Type Of "sandbox" where partners can interact with different technologies in a low risk environment.

As such, the association claims how to bring blockchain to banking, financial services and the insurance industry has been a focus for Microsoft.