Skip to Content

AZ-104: Optimizing Virtual Machine Configuration for Diverse Workloads Best Practices

Explore best practices for configuring virtual machines in Azure to support diverse requirements, from running network appliances to enforcing strict security policies, ensuring robust performance and compliance across your organization’s infrastructure.

Your organization has diverse requirements for the configuration of their virtual machines. You’re responsible for designing a plan to fulfill the various requests.

  • The plan must support virtual machines that run various network appliances.
  • You have an established security policy for specific data that prohibits exposing SSH ports to external connections.
  • The admin team needs to be able to modify network security settings for inbound and outbound traffic on Windows and Linux virtual machines.

Question 1

Which virtual machine is best for running a network appliance?

A. Memory-optimized virtual machine
B. Compute-optimized virtual machine
C. Storage-optimized virtual machine

Answer

B. Compute-optimized virtual machine

Explanation

Compute-optimized virtual machines are designed to have a high CPU-to-memory ratio. These virtual machines are suitable for medium traffic web servers, network appliances, batch processes, and application servers.

A is incorrect. Memory-optimized virtual machines are better for large in-memory business critical workloads that require massive parallel compute power.
C is incorrect. Storage-optimized virtual machines are better for data warehousing applications and large transactional databases.

Question 2

For the security requirements, how can you connect to Azure Linux virtual machines and install software?

A. Configure a guest configuration on the virtual machine.
B. Create a custom script extension.
C. Configure Azure Bastion.

Answer

C. Configure Azure Bastion.

Explanation

Azure Bastion is a fully platform-managed PaaS service provisioned inside a virtual network. Azure Bastion provides secure and seamless RDP and SSH connectivity to virtual machines. The access uses the Azure portal and SSL.

A is incorrect. The guest configuration isn’t a valid solution. Is there a better answer?
B is incorrect. Custom script extensions are for post-deployment configuration, software installation, or any other configuration or management task.

Question 3

What effect do the default network security settings have on a new virtual machine?

A. Outbound requests are allowed. Inbound traffic is allowed only from within the virtual network.
B. No outbound and inbound requests are allowed.
C. There are no restrictions. All outbound and inbound requests are allowed.

Answer

A. Outbound requests are allowed. Inbound traffic is allowed only from within the virtual network.

Explanation

Outbound requests are considered low risk, so they’re allowed by default. Inbound traffic from within the virtual network is allowed.

B is incorrect. Outbound requests are allowed by default.
C is incorrect. There are restrictions on inbound traffic.

Microsoft Azure Administrator AZ-104 certification exam practice question and answer (Q&A) dump with detail explanation and reference available free, helpful to pass the Microsoft Azure Administrator AZ-104 exam and earn Microsoft Azure Administrator AZ-104 certification.