Microsoft Exam AZ-801: Configuring Windows Server Hybrid Advanced Services Interview Questions

  1. Home
  2. Microsoft Exam AZ-801: Configuring Windows Server Hybrid Advanced Services Interview Questions
Microsoft Exam AZ-801 Interview Questions

Microsoft Azure is one of the most recognized cloud providers in the Technology industry. One of the assets that sets Microsoft Azure apart from other cloud providers is its Hybrid offerings. One of them is the Microsoft Exam AZ-801: Configuring Windows Server Hybrid Advanced Services certification. This certification proves your dedicated knowledge in configuring, managing, and using this advanced service.  

So, to do well in the Microsoft Exam AZ-801 interview requires deep knowledge of the best practices for configuring Windows Server 2016 using Azure AD hybrid identity capabilities to onboard users from your local Active Directory environment into Azure AD with the help of DirSync or AADconnect tools. Further, aspirants must have an advanced understanding of the below-listed domains, in order to pass the interview round. These are:

  • First and most importantly, securing Windows Server on-premises and hybrid infrastructures 
  • Then, implementing and managing Windows Server high availability
  • Implementing disaster recovery 
  • Also, migrating servers and workloads
  • Finally, monitoring and troubleshooting the Windows Server environments

As you prepare for your Microsoft Exam AZ-801 interview, take a moment to consider what may await you. By knowing some of the topics that are likely to come up in the course of the interview, you’ll have a leg up on the competition. We’ve created a list of the most common questions asked in Microsoft Exam AZ-801 interviews. Let’s get started!

1. Can you explain Microsoft exploit protection in your own words?

Microsoft exploits protection is a security framework that helps protect your devices and software from threats that use vulnerabilities, or “exploits.” It complements the mitigations built into the operating system (OS) and many apps to help protect them from threats. Exploit protection helps keep you safe from malware that relies on specific vulnerabilities to gain access to your devices, protecting your data and apps from hackers.

2. If SmartScreen warns me about a site I visit that is entirely safe, what can I do?

Whenever you navigate to a Web page, SmartScreen will check the page against a list of reported phishing and malicious software sites and warn you if the page appears to be a threat. From the warning page, you can choose to report that site as a safe site by selecting More information and then selecting Report that this site does not contain threats from the Microsoft feedback site. Also, if you happen to visit a site that SmartScreen should warn you about in the future, report the site to Microsoft.

3. When it comes to Active Directory, what is the default password policy?

Active Directory is configured by default with a default password policy that defines requirements for making sure your Active Directory user accounts are secure. You can turn on the default domain password policy for a domain controller by configuring one or more of the following settings: Password Length, Minimum Password Length, Password Complexity, and Maximum Password Age.

4. What are some of the security risks affecting domain controllers?

Attacks on the Active Directory database and log files stored in the default location can result in denial of service attacks against a domain controller resulting in unavailability. Interference with directory replication can also result in buffer overrun attacks.

5. How is a delegated administration of an object accomplished?

A user can easily delegate the administration of objects, like users or computers, within the OU to a designated individual or group. Active Directory Domain Services (AD DS) lets you control the administrative tasks that can be delegated at a very detailed level.

6. Can you explain the OU administration?

An OU administrator is the person who is ultimately responsible for the OU/unit. The OU admin will have rights and permissions assigned to them that a domain admin or application admin, does not have. This includes rights and permissions set under the properties of groups and security policies. 

OU Administrators perform the usual responsibilities of an AD Administrator (creating policies, setting up users and computers, etc.), but they also are accountable for ensuring OU-level assets (computers, printers, software, etc.) are up to date with BYOD standards.

7. Can you explain the Microsoft Defender for Identity to me?

Microsoft Defender for Identity (formerly Azure Advanced Threat Protection) alerts you if an attacker or compromised identity tries to access your network or organization. It basically makes use of your on-premises Active Directory signals for identifying, detecting and investigating advanced threats, compromised identities, and malicious insider actions directed at your organization.

The Microsoft Defender for Identity aids the Security Operations (SecOps) analysts and also security professionals in detecting advanced attacks in hybrid environments for:

  • Monitoring users, entity behavior, and activities by the learning-based analytics
  • Then, protecting user identities and credentials that are stored in the Active Directory
  • Also, identifying and investigating any suspicious user activities or advanced attacks within the kill chain
  • Finally, providing clear incident information on a simple timeline for a fast triage

8. How would you explain Azure monitoring?

Azure Monitor makes it easier for you to keep track of your applications and services so you can more easily maximize their availability and performance. By collecting, analyzing, and acting on data from your cloud and on-premises environments, delivers a comprehensive solution for maximizing your application performance and uptime. 

9. Can you distinguish between Azure monitor an Azure service health?

  • Azure Monitor helps you keep your applications running smoothly by monitoring their performance and alerting you to any issues affecting them. 
  • On the other hand, the Azure Service Health helps keep the customers informed about thef Azure service events affecting them and enables them to take action when necessary.

10. Why should I use Windows Defender Firewall with Advanced Security?

Windows Defender Firewall with Advanced Security is a security feature for endpoints on the network. It successfully filters the incoming and outgoing network traffics to protect your device from possible attacks such as malware spread through email or malicious websites, by providing host-based, two-way network traffic filtering for a device.

11. Can you differentiate between the inbound and outbound rules in Windows Defender?

  • Inbound rules allow you to control traffic that comes into your Windows computer or device from the network or Internet.
  • Outbound Rules are applied to traffic originating from your computer and destined for the network.

12. Can you tell me some of the Pros and Cons of BitLocker?

The pros of using BitLocker are:

  • Firstly, it encrypts the data in hard drives. This enhances the security
  • It is easy to manage
  • Also, it allows you to encrypt any removable media as well

The pros of using BitLocker are:

  • Firstly, the encryption is not resumed when suspended for sometime
  • It might take a longer time to encrypt a disk
  • Finally, encrypting the secondary drives can sometimes be tricky

13. Can Azure Backup be used to backup and restore data?

Azure Backup offers application-consistent backups to ensure that you won’t need to perform additional fixes during the restoration process. This ensures that your data is restored in the fastest way possible, allowing you to get back to running your business.

14. Can you describe a failover cluster storage?

A failover cluster is a group of servers that work together and can either achieve high availability or continuous availability. The Failover happens when either of the servers goes down, but another node in the cluster can assume its workload with minimum or no downtime.

15. How should you choose the disk type for a scale-out file server?

To deploy a cluster, you need at least two storage accounts with matching numbers and sizes of disks. It is considered ideal to use DS-series VMs with premium storage and a cloud witness for the quorum disk.

16. What does guest clustering mean?

In a guest cluster, all servers run virtual machines. These guest clusters aid higher availability for the workloads within a virtual machine. Guest clusters are an excellent way to increase the availability and manageability of your applications and services

17. When using Microsoft Windows admin center, what is the maximum number of nodes you can update with Cluster Aware Updating?

The highest number of nodes should not exceed 64, beyond which the update can fail either because the nodes fail or the Cluster service stops running.

18. What is the easiest way to update the cluster server?

Firstly, you need to start the Server Manager. Then, click on Cluster-Aware Updating on the Tools menu. Now, if one or more cluster nodes, or clusters, is added to the Server Manager, on the All Servers page, then, right-click on the name of that node (or name of the cluster). Now click on Update Cluster.

19. Azure Backup and Restore uses which Azure storage component?

Vaults are Azure storage containers that are used to hold backup data. It is a cloud-based storage component of Azure that you can use to store and manage your backup data. It makes it easier for you to organize, search, and access all of your backup information.

20. Can you tell approximately the least no:of recovery Services vaults and backup policies should you create?

Essentially, the limit of 100 VMs exists, that must be associated with the same backup policy from the portal.

21. What is the simplest way for restoring a VM from the Azure portal?

  1. Firstly, navigate to the Backup center on the Azure portal and then, click on Restore in the Overview tab
  2. Then, as the Datasource type select Azure Virtual machines. Then choose a Backup instance
  3. Now, select a VM and click on Continue
  4. Finally, you need to select the desired restore point to be used for recovery, in the subsequent screen that is displayed

22. Can you explain what Network Security Groups are?

The Network Security Group is a list of rules that lets you decide how network traffic can flow to or from an Azure Subnet, NIC, or both. When you assign a Network Security Group to a subnet, all VMs in that subnet automatically inherit those rules. You can also apply rules to individual NICs connected to a subnet. 

23. What does Hyper-V replica server do?

Hyper-V Replica is a free in-built feature that replicates Hyper-V virtual machines between hosts. It enables you to set up a virtual machine so that it can replicate itself from one Hyper-V host server to another. If one host goes down because of a disaster, you can easily recover by booting the virtual machine from the other host.

24. Is it possible to migrate Azure storage to another cloud?

Yes, it is possible in two ways:

  • Firstly, for migration of full virtual machines all together along with the underlying block-based devices, we use Azure Migrate 
  • Secondly, for migration of only block-based devices, and more complex use cases, we use the Cirrus Migrate Cloud

25. What steps should be taken to set up the appliance when using an OVA template?

  1. Firstly, you need to provide an appliance name. Then generate a project key in that portal
  2. Then, you must download an OVA template file. And import it to the vCenter Server. You must verify the security of the OVA 
  3. Now, you need to create the appliance from the OVA file, while verifying the connectivity of the appliance to Azure Migrate
  4. Then, you have to, for the first time, configure the appliance
  5. Finally, register that appliance with the project using the project key

26. What is the main distinction between the 4 types of DHCP packets?

The entire DHCP exchange consists of the given packets: 

  • Discover – for enabling your computer to locate the DHCP server
  • Offer – for allowing the server to provide an IP address
  • Request – allows your computer to request a certain address
  • Ack – for enabling the server to grant the address lease

27. Can you elaborate on the Azure App Service Hybrid connections?

Hybrid Connections enables your app to connect to an external TCP host and port, providing a way for your app to receive information from the Internet. Hybrid Connections are not a mechanism for accessing your app; instead, each Hybrid Connection correlates to an external TCP host and port combination.

28. After you have exhausted the maximum number of failed attempts to authenticate yourself via Azure AD, what happens?

In that case, a more sophisticated strategy is used for locking accounts, which is based on the IP address of the request and the passwords entered. However, it also increases the lockout duration depending upon the likelihood that it is an attack.

29. What is a VNet?

VNet is a self-contained section of the Virtual Network that you can use to deploy your cloud instances. The VNet makes it easier to protect your cloud deployments and other resources.

30. Would it be possible to add an existing VM to an availability set?

To be part of an availability set, your VM must exist within that availability set. You cannot add a VM to an availability set after it has been created.

Expert Corner

You should be ready to face a number of challenges if you want to wreck the interview. The interview questions listed above will surely prove your worth.
Last but not the least, to perform well in the Microsoft Exam AZ-801, you must be thorough with the various domains you’ll be tested in. Our Microsoft Exam AZ-801 practice tests are professionally prepared by subject specialists and they cover in detail the kind of questions that you should be able to answer in the exam. The exam has been designed to test your knowledge by comparing it with a set of answers, giving you an opportunity to evaluate how well you’ve mastered the subject.

So go take the Microsoft Exam AZ-801 practice tests Now!!

Microsoft Exam AZ-801 free practice tests
Menu