Unit 4 - Practice Quiz

INT327 60 Questions
0 Correct 0 Wrong 60 Left
0/60

1 What is the primary function of an Azure Storage Account?

Azure storage accounts Easy
A. To manage user identities and access
B. To run virtual machines
C. To host a web application's code
D. To act as a unique, top-level namespace for all your Azure Storage data objects

2 Azure Blob Storage is primarily designed to store what kind of data?

Azure Blob Storage Easy
A. Messaging data for asynchronous communication
B. Unstructured data like images, documents, and videos
C. Structured data in rows and columns, like a relational database
D. User login credentials

3 What does LRS stand for in the context of Azure Storage redundancy?

Data Redundancy Options (LRS, ZRS, GRS) Easy
A. Low-risk storage
B. Location-replicated storage
C. Large-region storage
D. Locally-redundant storage

4 What is Azure Storage Explorer?

Azure Storage Explorer Easy
A. A type of data redundancy
B. A command-line tool for deploying Azure resources
C. A standalone desktop application for managing Azure Storage data
D. A web-based portal for monitoring Azure service health

5 What is the primary purpose of a Shared Access Signature (SAS) in Azure Storage?

Control access to Azure Storage with shared access signatures Easy
A. To provide secure, delegated, and limited access to resources in your storage account
B. To permanently delete a storage account
C. To create a new storage account
D. To encrypt all data within a storage account

6 What are the two primary credentials provided with every Azure Storage Account for programmatic access?

Azure Storage security Easy
A. Access keys
B. Digital certificates
C. Usernames and passwords
D. SSH keys

7 Which redundancy option copies your data to a secondary region, hundreds of miles away from the primary region, to protect against regional outages?

Data Redundancy Options (LRS, ZRS, GRS) Easy
A. Single-instance storage (SIS)
B. Zone-redundant storage (ZRS)
C. Geo-redundant storage (GRS)
D. Locally-redundant storage (LRS)

8 In Azure Blob Storage, what is the name for a directory-like structure that is used to group a set of blobs?

Azure Blob Storage Easy
A. File Share
B. Table
C. Queue
D. Container

9 What is the main role of a Recovery Services vault in Azure?

Backup Vaults Easy
A. To store and manage TLS/SSL certificates
B. To store unstructured blob data for applications
C. To manage and store backups and recovery points of various Azure services
D. To act as a high-performance cache for web apps

10 Which of the following must be globally unique across all of Azure?

Azure storage accounts Easy
A. Storage account name
B. Resource group name
C. Virtual network name
D. Blob container name

11 Which redundancy option protects against a datacenter-level failure by synchronously replicating data across three different datacenters (Availability Zones) within a single region?

Data Redundancy Options (LRS, ZRS, GRS) Easy
A. Read-access geo-redundant storage (RA-GRS)
B. Locally-redundant storage (LRS)
C. Zone-redundant storage (ZRS)
D. Geo-redundant storage (GRS)

12 A SAS token is appended to a URI. What does it consist of?

Control access to Azure Storage with shared access signatures Easy
A. A set of HTTP headers
B. A username and password
C. An encrypted file
D. A special set of query parameters

13 If a storage account's access key is compromised, what is the recommended immediate security action?

Azure Storage security Easy
A. Regenerate the compromised key
B. Delete the storage account
C. Contact Azure support
D. Disable public access

14 Which of the following is a valid type of blob in Azure Blob Storage?

Azure Blob Storage Easy
A. Block blob
B. Queue blob
C. Table blob
D. File blob

15 Which of the following tasks can be performed using Azure Storage Explorer?

Azure Storage Explorer Easy
A. Upload, download, and manage blobs and files
B. Write and debug C# code
C. Create a new Azure subscription
D. Configure virtual network peering

16 What are the two main performance tiers available for Azure Storage Accounts?

Azure storage accounts Easy
A. Hot and Cold
B. Standard and Premium
C. Basic and Enterprise
D. Shared and Dedicated

17 When creating a SAS, which of the following can you specify to limit its use?

Control access to Azure Storage with shared access signatures Easy
A. A specific MAC address
B. The type of computer accessing the resource
C. The user's geographic location
D. An expiration date and time

18 Which Azure Storage redundancy option is generally the lowest-cost?

Data Redundancy Options (LRS, ZRS, GRS) Easy
A. Geo-redundant storage (GRS)
B. Locally-redundant storage (LRS)
C. Geo-zone-redundant storage (GZRS)
D. Zone-redundant storage (ZRS)

19 A single file, such as a JPEG image, that is uploaded to a container in Azure Blob Storage is referred to as a what?

Azure Blob Storage Easy
A. Item
B. Blob
C. Table
D. Record

20 What modern authorization method is recommended by Microsoft over using shared account keys for securing Azure Storage?

Azure Storage security Easy
A. Storing access keys directly in application code
B. Using only SAS tokens for all access
C. Disabling all security features for better performance
D. Azure Role-Based Access Control (RBAC) with Azure Active Directory

21 A company is planning to store virtual machine disks (VHDs) for their IaaS VMs and also host a static website with high transaction rates. They want to use a single storage account for both workloads to simplify management. Which storage account kind and performance tier combination would be most appropriate?

Azure storage accounts Medium
A. FileStorage account with Premium performance.
B. General-purpose v2 account with Premium performance.
C. General-purpose v2 account with Standard performance.
D. BlobStorage account with Standard performance.

22 An organization is deploying a critical application in the East US Azure region. They require a storage solution that can withstand a complete datacenter failure within that region without any data loss and with automatic failover of the storage endpoint. Cost is a secondary concern to regional availability. Which redundancy option should be selected?

Data Redundancy Options (LRS, ZRS, GRS) Medium
A. Geo-Redundant Storage (GRS)
B. Zone-Redundant Storage (ZRS)
C. Read-Access Geo-Redundant Storage (RA-GRS)
D. Locally-Redundant Storage (LRS)

23 A media company uploads large video files (50-100 GB each) for a video processing workflow. The workflow application needs to read and write to specific byte ranges within these files without rewriting the entire file. Which type of blob is specifically designed for this 'random access' read/write workload?

Azure Blob Storage Medium
A. Archive Blobs
B. Block Blobs
C. Page Blobs
D. Append Blobs

24 A developer needs to provide a third-party application with temporary, delegated access to upload new blobs into a specific container named uploads. The access should be valid for only 48 hours and should not grant permissions to read, delete, or list any blobs. Which type of Shared Access Signature (SAS) is the most secure and appropriate for this requirement?

Control access to Azure Storage with shared access signatures Medium
A. A User Delegation SAS with full permissions for the container.
B. A Service SAS for the uploads container with only write and create permissions.
C. An Account SAS with write and create permissions for the Blob service.
D. A Stored Access Policy with read, write, and list permissions.

25 A company has a storage account containing sensitive financial data. The security policy mandates that all data must be encrypted at rest using keys that are managed and rotated by the company's internal security team, not by Microsoft. Which Azure Storage encryption feature must be configured to meet this requirement?

Azure Storage security Medium
A. Configuring a virtual network service endpoint for the storage account.
B. Enforcing HTTPS for data in transit.
C. Storage Service Encryption (SSE) with customer-managed keys (CMK) stored in Azure Key Vault.
D. Storage Service Encryption (SSE) with Microsoft-managed keys.

26 Your company stores monthly transaction logs in Azure Blob Storage. These logs are frequently accessed for reporting during the first 30 days. After 30 days, they are rarely accessed but must be retained for one year for compliance. After one year, they can be deleted. What is the most cost-effective way to automate this data lifecycle?

Azure Blob Storage Medium
A. Manually move blobs from Hot to Cool tier after 30 days and delete after one year.
B. Create a lifecycle management policy to transition blobs to Cool tier after 30 days and delete blobs older than 365 days.
C. Store all data in the Archive tier and rehydrate it when needed for reporting.
D. Write a custom script using Azure Functions to check blob ages and move them between tiers.

27 A company has a storage account configured with Geo-Redundant Storage (GRS). The primary region experiences a major outage. The company needs to access their data from the secondary region for read-only operations while waiting for the primary region to recover. What must they have configured to enable this capability?

Data Redundancy Options (LRS, ZRS, GRS) Medium
A. They must initiate a manual account failover.
B. They must have configured the account as Read-Access Geo-Redundant Storage (RA-GRS).
C. They must have configured the account as Zone-Redundant Storage (ZRS).
D. Nothing, GRS provides read access to the secondary region by default.

28 A data analyst needs to manage files in an Azure Data Lake Storage Gen2 account and blobs in a standard storage account from their desktop computer. They need a graphical tool that allows them to upload/download data, manage access control lists (ACLs) on the ADLS Gen2 directories, and connect using different Azure AD accounts for different subscriptions. Which tool is best suited for this?

Azure Storage Explorer Medium
A. Azure Storage Explorer
B. AzCopy command-line utility
C. Azure CLI
D. The Azure Portal

29 An administrator configures a storage account firewall to only allow connections from a specific VNet subnet. A virtual machine in that subnet attempts to connect to the storage account's public endpoint but fails. What is a likely reason for this connection failure?

Azure Storage security Medium
A. The administrator needs to use a private endpoint instead of a service endpoint.
B. The storage account must be set to Premium performance to use firewall rules.
C. A Network Security Group (NSG) is blocking outbound traffic from the VM to the storage service.
D. The virtual network service endpoint for Microsoft.Storage has not been enabled on the subnet.

30 A user is trying to use a SAS token to access a blob, but receives an authentication error. The administrator has verified the SAS signature, expiry time, and permissions are all correct. The storage account requires that all connections use HTTPS. What parameter in the SAS token string is most likely missing or misconfigured?

Control access to Azure Storage with shared access signatures Medium
A. The Signed Protocol (spr) parameter.
B. The Signed IP (sip) parameter.
C. The Signed Resource (sr) parameter.
D. The Signed Start (st) parameter.

31 A company uses a Recovery Services vault to back up blob data from a geo-redundant storage (GRS) account. The Recovery Services vault itself is configured with locally-redundant storage (LRS). If the primary Azure region fails, what is the state of the backup data?

Backup Vaults Medium
A. The backup data can be restored, but only to the primary region.
B. The backup data can be restored to the secondary region automatically.
C. The backup data is also geo-replicated because the source storage is GRS.
D. The backup data is unavailable until the primary region is restored.

32 A company wants to enable Azure Data Lake Storage Gen2 (ADLS Gen2) capabilities, such as hierarchical namespace and POSIX-like access controls, for their big data analytics workloads. When creating a new storage account, what specific setting must they enable?

Azure storage accounts Medium
A. Choose FileStorage as the account kind.
B. Enable the Hierarchical namespace setting in the Advanced tab.
C. Select the Premium performance tier.
D. Enable Large file shares on the account.

33 A company hosts a public-facing static website directly from Azure Storage. They have uploaded their index.html, CSS, and JavaScript files to a specific container. When users navigate to the storage account's static website endpoint, they receive a 404 error. What is the most likely misconfiguration?

Azure Blob Storage Medium
A. The redundancy option for the storage account is set to LRS.
B. The container's access level is set to Private instead of Blob or Container.
C. The special container used for static website hosting has not been named $web.
D. The storage account firewall is blocking all public traffic.

34 A developer is using Azure Storage Explorer to manage a storage account but does not have access to the subscription through Azure AD. The administrator provides them with a connection string for the storage account. What information is contained within this connection string that allows Storage Explorer to authenticate?

Azure Storage Explorer Medium
A. A client ID and secret for a service principal.
B. The storage account name and one of the account access keys.
C. A temporary Shared Access Signature (SAS) token.
D. The developer's Azure AD username and a password.

35 A compliance policy requires that all backups of an Azure Storage account's blob data be immutable and protected from accidental or malicious deletion for a minimum of 30 days. Which Recovery Services vault feature should be configured to enforce this policy?

Backup Vaults Medium
A. Configuring Geo-Redundant Storage (GRS) for the vault.
B. Enabling Multi-User Authorization (MUA) using Azure Resource Guard.
C. Enabling Soft Delete for the vault with a 30-day retention period.
D. Assigning a 'Deny' Azure Policy to the vault's resource group.

36 A team has an existing general-purpose v2 storage account configured with Locally-Redundant Storage (LRS). Due to new high-availability requirements, they need to change the redundancy to Zone-Redundant Storage (ZRS). What is the process for this change?

Data Redundancy Options (LRS, ZRS, GRS) Medium
A. The redundancy option can be changed directly in the Azure Portal, but it will cause several hours of downtime.
B. Initiate a live migration from LRS to ZRS from the 'Redundancy' blade in the Azure Portal with no downtime.
C. This change is not possible; a new ZRS account must be created and the data migrated.
D. Submit a support ticket to Microsoft to perform a backend conversion.

37 An administrator creates a stored access policy on a blob container with read permissions. They then generate two SAS tokens that reference this policy. Later, they need to immediately revoke access for both SAS tokens simultaneously without having to track the individual tokens. What is the most effective action?

Control access to Azure Storage with shared access signatures Medium
A. Modify the expiration time of the stored access policy to a time in the past.
B. Use the Azure CLI to revoke each SAS token individually by its signature.
C. Regenerate the storage account access keys.
D. Delete the blob container.

38 A developer is using the Azure CLI to create a new storage account. They want to ensure that unencrypted, HTTP requests to the storage account are automatically rejected. Which command-line flag should they include in their az storage account create command?

Azure storage accounts Medium
A. --kind StorageV2
B. --https-only true
C. --allow-blob-public-access false
D. --encryption-services blob

39 A security audit reveals that several storage accounts allow anonymous public read access to some blob containers. The company wants to implement a preventative policy at the subscription level to block the creation of any new storage accounts that permit public access and flag existing ones. Which Azure service is best suited for this?

Azure Storage security Medium
A. Network Security Groups (NSGs)
B. Azure Policy
C. Azure Active Directory Conditional Access
D. Azure Key Vault

40 You are using Azure Storage Explorer to troubleshoot an application that writes to an Azure Queue. You need to view the contents of messages in the queue without removing them, as the application needs to process them later. Which Storage Explorer operation allows you to do this?

Azure Storage Explorer Medium
A. Peek Messages
B. Dequeue Messages
C. Clear Queue
D. Get Messages

41 A company deploys a critical application using an Azure Storage Account in the "East US" region. The requirements are:
1. Withstand a complete zonal failure within "East US".
2. Maintain a disaster recovery copy in "West US".
3. Allow read access to the secondary location for performance reasons without initiating a failover.

What is the most cost-effective storage redundancy option that meets all these requirements?

Data Redundancy Options (LRS, ZRS, GRS) Hard
A. Read-access geo-zone-redundant storage (RA-GZRS)
B. Geo-redundant storage (GRS)
C. Geo-zone-redundant storage (GZRS)
D. Read-access geo-redundant storage (RA-GRS)

42 A storage account has a VNet service endpoint enabled for SubnetA. It also has a firewall rule allowing traffic from a specific public IP address. A private endpoint for the same storage account is created in SubnetB within the same VNet. A VM in SubnetB (the subnet with the private endpoint) attempts to access the storage account using its public endpoint FQDN (mystorage.blob.core.windows.net). What is the expected outcome?

Azure Storage security Hard
A. Access is granted if the VM's public IP matches the firewall rule.
B. Access is granted and routed through the private endpoint.
C. Access is granted through the VNet service endpoint in SubnetA.
D. Access is denied because network policies are not disabled for private endpoints on the subnet.

43 A stored access policy named read-policy is created for a blob container, granting read permissions with a 24-hour expiry. A developer generates a Service SAS token for a specific blob in that container, referencing read-policy. Two hours later, an administrator deletes read-policy from the container. What happens when the developer tries to use the original SAS token to read the blob?

Control access to Azure Storage with shared access signatures Hard
A. The token is still valid for reading for the original 24-hour period.
B. The token will work, but a warning will be logged in Azure Monitor about the missing policy.
C. The token is immediately invalidated and access is denied.
D. The token's permissions are dynamically updated to be read-only at the container level.

44 A legal department requires that certain financial documents in a blob container cannot be deleted or modified for 7 years. New documents must be continuously added. During the 7-year period, a specific document is part of a lawsuit and its retention must be extended indefinitely, without affecting other documents. Which combination of features achieves this with the most administrative efficiency?

Azure Blob Storage Hard
A. Create a 7-year time-based immutability policy on the container, and then add a blob-level legal hold to the specific document.
B. Enable versioning and a 7-year time-based immutability policy.
C. Enable a container-level legal hold and manually track the 7-year retention for other documents.
D. Enable soft delete with a 7-year retention and use Azure AD RBAC to prevent deletion.

45 A company is migrating an HPC workload to Azure that requires extremely low-latency, high-throughput access to millions of small files. The data must be accessible via both the NFS v3 protocol and the native Blob REST API. Which storage account configuration is required to meet all these conditions?

Azure storage accounts Hard
A. Premium File Shares account with NFS protocol enabled.
B. General-purpose v2, Standard performance, Hot tier, with hierarchical namespace enabled.
C. Premium Block Blobs account with hierarchical namespace enabled.
D. Premium Page Blobs account.

46 A storage account is configured with Geo-Redundant Storage (GRS). A regional outage occurs in the primary region. An administrator successfully initiates a customer-managed failover to the secondary region. After the failover completes, what is the redundancy level of the storage account in the new primary region (the old secondary)?

Data Redundancy Options (LRS, ZRS, GRS) Hard
A. The account is automatically converted to Locally-Redundant Storage (LRS) and must be manually reconfigured back to GRS.
B. The account remains GRS, automatically replicating back to the original primary region once it's available.
C. The account is automatically converted to Zone-Redundant Storage (ZRS) to protect against failures in the new primary.
D. The account enters a permanent read-only state until the original primary region is restored.

47 A developer needs to provide a client application with temporary access to upload blobs to a container. For maximum security, the SAS must be tied to an Azure AD identity, be revokable through Azure AD permissions, and must not rely on storage account keys. The client application will use the Azure Identity library to authenticate. Which type of SAS must be used?

Control access to Azure Storage with shared access signatures Hard
A. Account SAS signed with an account key.
B. User Delegation SAS.
C. A Service SAS combined with a stored access policy.
D. Service SAS signed with an account key.

48 A storage account is configured with a default network access rule of "Deny". A VNet service endpoint for Microsoft.Storage is enabled on SubnetA. A private endpoint for the storage account is created in SubnetB. A firewall rule allows access from the on-premises corporate IP range. A user is on-premises, connected via an ExpressRoute circuit with private peering to the VNet. From a VM in SubnetB, what is the primary mechanism through which the storage account will be accessed?

Azure Storage security Hard
A. Access is denied.
B. Through the public endpoint via the ExpressRoute circuit.
C. Through the VNet service endpoint.
D. Through the private endpoint.

49 A lifecycle management policy is configured with two rules on a container with versioning enabled:
Rule 1: If blob index tag "status" = "archive_ready", move the current version to Archive after 30 days of creation.
Rule 2: Delete previous versions 90 days after they become a previous version.

A blob is created with the tag status = "archive_ready". 45 days later, the blob is modified, creating a new current version. 100 days after the modification (145 days total), what is the state of the original (first) version of the blob?

Azure Blob Storage Hard
A. It was archived at day 30 and then deleted at day 135.
B. It was moved to the Archive tier.
C. It has been deleted.
D. It exists in the Hot/Cool tier as a previous version.

50 A storage account has operational backup configured via a Backup Vault with a 30-day retention policy. The storage account also has blob soft delete enabled for 14 days and versioning enabled. An attacker on Day 1 deletes a critical blob, report.docx. On Day 10, the attacker deletes the entire container. On Day 20, the security team discovers the breach. What is the most effective method to recover report.docx?

Backup Vaults Hard
A. Use the versioning feature to restore the previous version of the blob.
B. Restore the container from the Backup Vault to a point in time before the Day 1 deletion.
C. Undelete the blob from the container using the soft delete feature.
D. Undelete the container using container soft delete, then undelete the blob.

51 You have a General-purpose v2 (GPv2) storage account with LRS redundancy containing 100 TB of data. You need to change the account's redundancy to GZRS to meet new compliance requirements. What is the most accurate description of the process?

Azure storage accounts Hard
A. You must first convert to ZRS, then to GZRS. This is a live migration that can take hours or days.
B. The change can be initiated in the Azure portal and happens instantly with no downtime.
C. The change is not possible because a storage account with existing data cannot be converted to a zone-redundant option.
D. You must create a new GZRS account and manually copy the data using a tool like AzCopy, which will incur data transfer and transaction costs.

52 A developer is using Azure Storage Explorer to manage a storage account that is secured with a private endpoint and has public network access disabled. The developer's machine is in an on-premises network connected to the Azure VNet via a Site-to-Site VPN. They can ping the private IP of the storage endpoint successfully but cannot browse it in Storage Explorer, receiving an authentication error. What is the most likely misconfiguration?

Azure Storage Explorer Hard
A. The developer is trying to connect using the standard account.blob.core.windows.net FQDN without proper on-premises DNS forwarding.
B. The developer's Azure AD account lacks the Storage Blob Data Contributor role.
C. The VPN gateway's Network Security Group is blocking HTTPS traffic on port 443.
D. Azure Storage Explorer does not support connections over VPN.

53 An Account SAS is generated with the following parameters:
Allowed Services: Blob, File
Allowed Resource Types: Service, Container
Allowed Permissions: Read, List
Expiry: 24 hours

A user attempts to use this SAS to: 1) List all blobs in a specific container, and 2) Get the properties of the File service. Which statement is correct?

Control access to Azure Storage with shared access signatures Hard
A. Operation 1 will fail, but operation 2 will succeed.
B. Both operations will succeed.
C. Operation 1 will succeed, but operation 2 will fail.
D. Both operations will fail.

54 A financial services company needs to deploy a solution on Azure using Premium File Shares (FileStorage account type). Their primary goal is the highest possible availability within a single region, capable of surviving a datacenter-level failure. Cost is a secondary concern. Which redundancy option must they choose for their FileStorage account?

Data Redundancy Options (LRS, ZRS, GRS) Hard
A. Zone-Redundant Storage (ZRS)
B. Geo-Zone-Redundant Storage (GZRS)
C. Locally-Redundant Storage (LRS)
D. Read-Access Geo-Redundant Storage (RA-GRS)

55 A storage account is configured for encryption using a Customer-Managed Key (CMK) from an Azure Key Vault. The Key Vault is protected by a VNet service endpoint and has a default 'Deny' network rule. The storage account's system-assigned managed identity has been given Get, Wrap Key, and Unwrap Key permissions on the Key Vault. However, the storage account itself is not in the Key Vault's VNet. What additional configuration is required for the storage account to access the key for encryption/decryption?

Azure Storage security Hard
A. Add the storage account's public IP address to the Key Vault's firewall.
B. Grant the managed identity the Key Vault Crypto Service Encryption User role.
C. Enable the 'Allow trusted Microsoft services to bypass this firewall' option on the Key Vault's networking settings.
D. Create a private endpoint for the Key Vault in the storage account's VNet.

56 A company uses an Azure Storage Account with the hierarchical namespace enabled (ADLS Gen2). They have a directory structure /raw/YYYY/MM/DD/. An analyst needs to process all data for June 2023. They are using an application that leverages the Blob REST API (blob.core.windows.net), not the ADLS Gen2 DFS endpoint (dfs.core.windows.net). What is the most significant performance challenge they will face when trying to list the necessary files?

Azure Blob Storage Hard
A. The Blob API's flat namespace emulation will require an expensive, non-hierarchical listing of all blobs with the prefix /raw/2023/06/.
B. The hierarchical namespace is completely inaccessible via the Blob REST API, so the operation will fail.
C. The Blob REST API cannot handle path depths greater than 3, so the query is invalid.
D. Throttling will occur because list operations are more intensive on ADLS Gen2 accounts via the Blob API.

57 A Backup Vault is configured to protect a storage account. The backup policy has a 30-day retention. A legal hold (a type of immutability policy) is applied to a container within the storage account. An administrator attempts to perform a point-in-time restore from the Backup Vault to a time before the legal hold was applied, choosing the "overwrite existing blobs" option. What will be the outcome?

Backup Vaults Hard
A. The restore will partially succeed, skipping any blobs that are protected by the legal hold.
B. The restore operation will succeed, and the blobs under legal hold will be overwritten.
C. The restore operation will succeed, but it will create new versions of the blobs instead of overwriting them.
D. The entire restore operation will fail because the container has an active immutability policy.

58 A workload requires writing large amounts of telemetry data as a continuous stream from thousands of devices. Data must be added to existing blobs without modifying previous writes. The primary access pattern is appending new data blocks; full-blob reads are secondary. Which Storage Account type and Blob type combination provides the most optimized performance and API support for this specific workload?

Azure storage accounts Hard
A. General-purpose v2 account; using Page Blobs with the Put Page operation.
B. Premium BlockBlobStorage account; using Append Blobs with the Append Block operation.
C. Premium FileStorage account; using Files with the Put Range operation.
D. General-purpose v2 account; using Block Blobs with Put Block and Put Block List.

59 A security audit requires that all SAS tokens used to access a storage account must be logged with the principal's Azure AD Object ID (OID). An application running on an Azure VM with a system-assigned managed identity needs to generate such a SAS to grant a client read access to a blob for one hour. Which sequence of actions must the application perform?

Control access to Azure Storage with shared access signatures Hard
A. Request an OAuth 2.0 token for the managed identity, use it to get a user delegation key from the storage service, then create a User Delegation SAS.
B. Use the managed identity to get the storage account key, then create a Service SAS.
C. Use the managed identity to create a stored access policy, then generate a Service SAS referring to that policy.
D. Use an Account SAS signed with the storage account key, and add the managed identity's OID as a custom parameter.

60 A container has blob versioning and a lifecycle management rule to transition previous versions to the Archive tier 30 days after they become a previous version. A blob named config.json is in the Hot tier.
Day 1: config.json (Version A) is created.
Day 10: config.json is updated, creating a new current version (Version B) and making Version A a previous version.

On which day will Version A complete its transition to the Archive tier?

Azure Blob Storage Hard
A. Day 30
B. Day 10
C. Day 40
D. Day 31