1
0
mirror of https://github.com/bregman-arie/devops-exercises.git synced 2024-11-24 08:22:12 +02:00

Add Azure questions

This commit is contained in:
abregman 2020-01-03 15:56:36 +02:00
parent c263795eef
commit 04c7261f9e

View File

@ -2,7 +2,7 @@
:information_source:  This repository contains questions on various DevOps and SRE related topics
:bar_chart:  There are currently **752** questions
:bar_chart:  There are currently **761** questions
:books:  To learn more about DevOps check the resources in [DevOpsBit.com](https://devopsbit.com)
@ -4583,6 +4583,10 @@ the pseudo table to retrieve the sum of the prices spent by each customer, then
<summary>Explain availability sets and availability zones</summary><br><b>
</b></details>
<details>
<summary>What is Azure Policy?</summary><br><b>
</b></details>
<details>
<summary>What is the Azure Resource Manager? Can you describe the format for ARM templates?</summary><br><b>
</b></details>
@ -4591,6 +4595,22 @@ the pseudo table to retrieve the sum of the prices spent by each customer, then
<summary>Explain Azure managed disks</summary><br><b>
</b></details>
#### Network
<details>
<summary>What's an Azure region?</summary><br><b>
</b></details>
<details>
<summary>What is the N-tier architecture?</summary><br><b>
</b></details>
#### Storage
<details>
<summary>What storage options Azure supports?</summary><br><b>
</b></details>
#### Security
<details>
@ -4611,6 +4631,15 @@ More specifically, it:
Azure AD is a cloud-based identity service. You can use it as a standalone service or integrate it with existing Active Directory service you already running.
</b></details>
<details>
<summary>What is Azure Advanced Threat Protection?</summary><br><b>
</b></details>
<details>
<summary>What components are part of Azure ATP?</summary><br><b>
</b></details>
## GCP
<a name="gcp-beginner"></a>
@ -4767,6 +4796,18 @@ Authorization is the process of identifying what level of access the service or
<summary>Explain RBAC (Role-based Access Control)</summary><br><b>
</b></details>
<details>
<summary>Explain Symmetric encryption</summary><br><b>
</b></details>
<details>
<summary>Explain Asymmetric encryption</summary><br><b>
</b></details>
<details>
<summary>Explain RBAC (Role-based Access Control)</summary><br><b>
</b></details>
<details>
<summary>Explain the following: