Microsoft (AZ-220) Exam Questions And Answers page 6
You have an Azure IoT Edge solution.
You plan to deploy an Azure Security Center for IoT security agent. You need to configure the security agent to meet the following requirements:
• Connection events must be reported as high priority.
• High priority events must be collected every seven minutes.
How should you configure the azureiotsecurity module twin? To answer, drag the appropriate values to the correct locations. Each value may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
You plan to deploy an Azure Security Center for IoT security agent. You need to configure the security agent to meet the following requirements:
• Connection events must be reported as high priority.
• High priority events must be collected every seven minutes.
How should you configure the azureiotsecurity module twin? To answer, drag the appropriate values to the correct locations. Each value may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Introduction to Azure IoT
IoT Security and Compliance
You have an Azure IoT hub.
You plan to attach three types of IoT devices as shown in the following table.
You need to select the appropriate communication protocol for each device.
What should you select? To answer, drag the appropriate protocols to the correct devices. Each protocol may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
You plan to attach three types of IoT devices as shown in the following table.
You need to select the appropriate communication protocol for each device.
What should you select? To answer, drag the appropriate protocols to the correct devices. Each protocol may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Introduction to Azure IoT
IoT Security and Compliance
You have an Azure Stream Analytics job that connects to an Azure IoT hub named Hub1445 as a streaming data source. Hub1445 is configured as shown in the exhibit.
The Stream Analytics job fails to receive any messages from the IoT hub.
What should you do to resolve the issue?
The Stream Analytics job fails to receive any messages from the IoT hub.
What should you do to resolve the issue?
Enable the Route3 route.
Disable the Route2 route.
Enable the fallback route.
Device Provisioning and Management
Data Ingestion and Processing
You have an existing Azure IoT hub.
You need to connect physical IoT devices to the IoT hub.
You are connecting the devices through a firewall that allows only port 443 and port 80.
Which three communication protocols can you use? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
You need to connect physical IoT devices to the IoT hub.
You are connecting the devices through a firewall that allows only port 443 and port 80.
Which three communication protocols can you use? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
MQTT over WebSocket
AMQP
AMQP over WebSocket
MQTT
HTTPS
Introduction to Azure IoT
Data Ingestion and Processing
You have an Azure IoT hub that is being taken from prototype to production.
You plan to connect IoT devices to the IoT hub. The devices have hardware security modules (HSMs).
You need to use the most secure authentication method between the devices and the IoT hub. Company policy prohibits the use of internally generated certificates.
Which authentication method should you use?
You plan to connect IoT devices to the IoT hub. The devices have hardware security modules (HSMs).
You need to use the most secure authentication method between the devices and the IoT hub. Company policy prohibits the use of internally generated certificates.
Which authentication method should you use?
an X.509 self-signed certificate
a certificate thumbprint
a symmetric key
An X.509 certificate signed by a root certification authority (CA).
Device Provisioning and Management
IoT Security and Compliance
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have an Azure Stream Analytics job that receives input from an Azure IoT hub and sends the outputs to Azure Blob storage. The job has compatibility level 1.1 and six streaming units.
You have the following query for the job.
You plan to increase the streaming unit count to 12.
You need to optimize the job to take advantage of the additional streaming units and increase the throughput.
Solution: You change the query to the following.
Does this meet the goal?
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have an Azure Stream Analytics job that receives input from an Azure IoT hub and sends the outputs to Azure Blob storage. The job has compatibility level 1.1 and six streaming units.
You have the following query for the job.
You plan to increase the streaming unit count to 12.
You need to optimize the job to take advantage of the additional streaming units and increase the throughput.
Solution: You change the query to the following.
Does this meet the goal?
Yes
No
Data Ingestion and Processing
Developing IoT Solutions
During the POV phase, you connect a device to IoT Hub and start sending telemetry messages.
You need to verify the content of the messages received by IoT Hub during the POV phase.
What should you use?
You need to verify the content of the messages received by IoT Hub during the POV phase.
What should you use?
the Monitoring settings of IoT Hub or a Postman call to the IoT Hub REST API
Azure Monitor or Azure Log Analytics
Microsoft Visual Studio Code that uses the IoT Hub Toolkit or Azure CLI that uses the IoT Hub extension
Splunk or Grafana
Introduction to Azure IoT
Data Ingestion and Processing
You have an Azure IoT solution that includes an Azure IoT hub.
You receive a root certification authority (CA) certificate from the security department at your company.
You need to configure the IoT hub to use the root CA certificate.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
You receive a root certification authority (CA) certificate from the security department at your company.
You need to configure the IoT hub to use the root CA certificate.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Device Provisioning and Management
IoT Security and Compliance
You have three Azure IoT hubs named Hub1, Hub2, and Hub3, a Device Provisioning Service instance, and an IoT device named Device1.
Each IoT hub is deployed to a separate Azure region.
Device enrollment uses the Lowest latency allocation policy.
The Device Provisioning Service uses the Lowest latency allocation policy.
Device1 is auto-provisioned to Hub1 by using the Device Provisioning Service.
Device1 regularly moves between regions.
You need to ensure that Device1 always connects to the IoT hub that has the lowest latency.
What should you do?
Each IoT hub is deployed to a separate Azure region.
Device enrollment uses the Lowest latency allocation policy.
The Device Provisioning Service uses the Lowest latency allocation policy.
Device1 is auto-provisioned to Hub1 by using the Device Provisioning Service.
Device1 regularly moves between regions.
You need to ensure that Device1 always connects to the IoT hub that has the lowest latency.
What should you do?
Configure device attestation that uses X.509 certificates.
Implement device certificate rolling.
Disenroll and reenroll Device1.
Configure the re-provisioning policy.
Device Provisioning and Management
IoT Security and Compliance
You have an Azure IoT solution that includes an Azure IoT Hub named Hub1 and an Azure IoT Edge device named Edge1. Edge1 connects to Hub1.
You need to deploy a temperature module to Edge1.
What should you do?
You need to deploy a temperature module to Edge1.
What should you do?
From the Azure portal, navigate to Hub1 and select IoT Edge. Select Edge1, and then select Manage Child Devices. From a Bash prompt, run the following command:
az iot edge set-modules -device-id Edge1 -hub-name Hub1 -content C:\deploymentMan1.json
az iot edge set-modules -device-id Edge1 -hub-name Hub1 -content C:\deploymentMan1.json
Create an IoT Edge deployment manifest that specifies the temperature module and the route to $upstream. From a Bash prompt, run the following command:
az iot hub monitor-events-device-id Edge1 -hub-name Hub1
az iot hub monitor-events-device-id Edge1 -hub-name Hub1
From the Azure portal, navigate to Hub1 and select IoT Edge. Select Edge1, select Device Twin, and then set the deployment manifest as a desired property. From a Bash prompt, run the following command:
az iot hub monitor-events-device-id Edge1 -hub-name Hub1
az iot hub monitor-events-device-id Edge1 -hub-name Hub1
Create an IoT Edge deployment manifest that specifies the temperature module and the route to $upstream. From a Bash prompt, run the following command:
az iot edge set-modules -device-id Edge1 -hub-name Hub1 -content C:\deploymentMan1.json
az iot edge set-modules -device-id Edge1 -hub-name Hub1 -content C:\deploymentMan1.json
Data Ingestion and Processing
Developing IoT Solutions
Comments