Skip to content

Desi banjara

learn and grow together

  • Azure
    • Azure Compute
      • Azure Logic Apps
      • Azure Mobile Apps
      • Azure App Service
      • Azure Serverless Computing
        • Azure Functions
    • Azure Networking services
      • Azure Networking – VNET
    • Azure Database Services
      • Azure SQL
      • Azure Data Factory
      • Azure Databricks
    • Azure Analytics Services
    • Azure Cognitive Services
    • Azure Data and Storage
    • Azure Devops
    • Azure landing zone
    • Azure IaaS
    • Azure Internet of Things (IoT)
      • Azure Machine Learning
      • Azure AI and ML services
    • Azure Migration
    • Microsoft Azure Log Analytics
  • Azure Security
    • Azure Identity and Access Management
    • Azure Active Directory
    • Azure Defender
    • Azure security tools for logging and monitoring
    • Azure Sentinel
    • Azure Sentinel – Data connectors
  • Agile Software development
    • Atlassian Jira
  • Amazon Web Services (AWS)
    • Amazon EC2
    • Amazon ECS
    • AWS Lambda
  • Google
    • Google Cloud Platform (GCP)
    • gmail api
    • Google Ads
    • Google AdSense
    • Google Analytics
    • Google Docs
    • Google Drive
    • Google Maps
    • Google search console
  • Software architecture
    • Service-oriented architecture (SOA)
    • Domain-Driven Design (DDD)
    • Microservices
    • Event-Driven Architecture
    • Command Query Responsibility Segregation (CQRS) Pattern
    • Layered Pattern
    • Model-View-Controller (MVC) Pattern
    • Hexagonal Architecture Pattern
    • Peer-to-Peer (P2P) pattern
    • Pipeline Pattern
  • Enterprise application architecture
  • IT/Software development
    • API development
    • ASP.Net MVC
    • ASP.NET Web API
    • C# development
    • RESTful APIs
  • Cybersecurity
    • Cross Site Scripting (XSS)
    • Reflected XSS
    • DOM-based XSS
    • Stored XSS attacks
    • Ransomware
    • cyber breaches
    • Static Application Security Testing (SAST)
  • Interview questions
    • Microsoft Azure Interview Questions
    • Amazon Web Services (AWS) Interview Questions
    • Agile Software development interview questions
    • C# interview questions with answers
    • Google analytics interview questions with answers
    • Javascript interview questions with answers
    • Python interview questions with answers
    • WordPress developer interview questions and answers
  • Cloud
    • Cloud computing
    • Infrastructure as a Service (IaaS)
    • Platform as a Service (PaaS)
    • Software as a Service (SaaS)
    • Zero Trust strategy
  • Toggle search form
  • How to take a screenshot on Google (Android) phones? Google
  • ASP.NET Core – How to show total number of users in each country on google map? ASP.NET Core
  • Interview question: Which class acts as a base class for all arrays in C#? C# development
  • What is Cyber Security? Definition, Challenges & Best Practices Cybersecurity
  • Azure App Service Azure
  • Microsoft AZ-900 Certification Exam Practice Questions – 8 Microsoft AZ-900 Certification Exam
  • Azure Data Lake Azure
  • AWS DevOps Engineer Professional Exam Practice Questions – 6 AWS DevOps Engineer Professional Exam

Microsoft AZ-220 Certification Exam Practice Questions – Part 4

Posted on October 18, 2020 By DesiBanjara No Comments on Microsoft AZ-220 Certification Exam Practice Questions – Part 4

Microsoft AZ-220 Certification: Microsoft Azure IoT Developer Certification Exam Practice Questions and Answers

Question -19

You have an Azure IoT solution that includes an Azure IoT Hub named Hub1 and an Azure IoT Edge device named Edge1. Edge1 connects to Hub1.
You need to deploy a temperature module to Edge1.
What should you do?

  • From the Azure portal, navigate to Hub1 and select IoT Edge. Select Edge1, and then select Manage Child Devices. From a Bash prompt, run the following command: az iot edge set-modules -device-id Edge1 -hub-name Hub1 -content C:\deploymentMan1.json
  • Create an IoT Edge deployment manifest that specifies the temperature module and the route to $upstream. From a Bush prompt, run the following command: az iot hub monitor-events-device-id Edge1 -hub-name Hub1
  • From the Azure portal, navigate to Hub1 and select IoT Edge. Select Edge1, select Device Twin, and then set the deployment manifest as a desired property. From a Bash prompt, run the following command az iot hub monitor-events-device-id Edge1 -hub-name Hub1
  • Create an IoT Edge deployment manifest that specifies the temperature module and the route to $upstream. From a Bush prompt, run the following command: az iot edge set-modules -device-id Edge1 -hub-name Hub1 -content C:\deploymentMan1.json

Correct Answer: D
You deploy modules to your device by applying the deployment manifest that you configured with the module information.
Change directories into the folder where your deployment manifest is saved. If you used one of the VS Code IoT Edge templates, use the deployment.json file in the config folder of your solution directory and not the deployment.template.json file.
Use the following command to apply the configuration to an IoT Edge device: az iot edge set-modules –device-id [device id] –hub-name [hub name] –content [file path]
Reference:
https://docs.microsoft.com/en-us/azure/iot-edge/how-to-deploy-modules-cli



Question -20

You have 1,000 devices that connect to a standard tier Azure IoT hub.
All the devices are commissioned and send telemetry events to the built-in IoT Hub endpoint.
You configure message enrichment on the events endpoint and set the enrichment value to $twin.tags.ipV4.
When you inspect messages on the events endpoint, you discover that all the messages are stamped with a string of “$twin.tags.ipV4”.
What are two possible causes of the issue? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

  • The ipV4 tag is a restricted twin property that is unavailable for message enrichment.
  • A standard tier IoT hub does not support device twin properties in message enrichments.
  • The device sending the message has no device twin.
  • Message enrichment cannot be added to messages going to a built-in endpoint.
  • The device twin path used for the value of the enrichment does not exist.
  • The device twin property value used for message enrichment is set to “$twin.tags.ipV4”.

Correct Answer: CE
In some cases, if you are applying an enrichment with a value set to a tag or property in the device twin, the value will be stamped as a string value. For example, if an enrichment value is set to $twin.tags.field, the messages will be stamped with the string “$twin.tags.field” rather than the value of that field from the twin. This happens in the following cases:
✑ (C) Your IoT Hub is in the standard tier, but the device sending the message has no device twin.
✑ (E) Your IoT Hub is in the standard tier, but the device twin path used for the value of the enrichment does not exist. For example, if the enrichment value is set to $twin.tags.location, and the device twin does not have a location property under tags, the message is stamped with the string “$twin.tags.location”.
✑ Your IoT Hub is in the basic tier. Basic tier IoT hubs do not support device twins.
Reference:
https://docs.microsoft.com/en-us/azure/iot-hub/iot-hub-message-enrichments-overview



Question -21

You have 10 IoT devices that connect to an Azure IoT hub named Hub1.
From Azure Cloud Shell, you run az iot hub monitor-events –hub-name Hub1 and receive the following error message: “az iot hub: ‘monitor-events’ is not in the ‘az iot hub’ command group. See ‘az iot hub –help’.”
You need to ensure that you can run the command successfully.
What should you run first?

  • az iot hub monitor-feedback –hub-name Hub1
  • az iot hub generate-sas-token –hub-name Hub1
  • az iot hub configuration list –hub-name Hub1
  • az extension add -name azure-cli-iot-ext

Correct Answer: D
Execute az extension add –name azure-cli-iot-ext once and try again.
In order to read the telemetry from your hub by CLI, you have to enable IoT Extension with the following commands:
Add: az extension add –name azure-cli-iot-ext
Reference:
https://github.com/MicrosoftDocs/azure-docs/issues/20843



Question -22

You are troubleshooting an Azure IoT hub.
You discover that some telemetry messages are dropped before they reach downstream processing.
You suspect that IoT Hub throttling is the root cause.
Which log in the Diagnostics settings of the IoT hub should you use to capture the throttling error events?

  • Routes
  • DeviceTelemetry
  • Connections
  • C2DCommands

Correct Answer: B
The device telemetry category tracks errors that occur at the IoT hub and are related to the telemetry pipeline. This category includes errors that occur when sending telemetry events (such as throttling) and receiving telemetry events (such as unauthorized reader). This category cannot catch errors caused by code running on the device itself.
Note: The metric d2c.telemetry.ingress.sendThrottle is the number of throttling errors due to device throughput throttles.
Reference:
https://docs.microsoft.com/en-us/azure/iot-hub/iot-hub-monitor-resource-health



Question -23

You have 1,000 devices that connect to an Azure IoT hub.
You are performing a scheduled check of deployed IoT devices.
You plan to run the following command from the Azure CLI prompt. az iot hub query –hub-name hub1 –query-command “SELECT * FROM devices WHERE connectionState = ‘Disconnected'”
What does the command return?

  • the Device Disconnected events
  • the device twins
  • the Connections logs
  • the device credentials

Correct Answer: A
The IoT Hub publishes the Microsoft.Devices.DeviceDisconnected event type, which is published when a device is disconnected from an IoT hub.
Reference:
https://docs.microsoft.com/en-us/azure/iot-hub/iot-hub-event-grid#event-types



Question -24

You have an Azure IoT solution that includes several Azure IoT hubs.
A new alerting feature was recently added to the IoT devices. The feature uses a new device twin reported property named alertCondition.
You need to send alerts to an Azure Service Bus queue named MessageAlerts. The alerts must include alertCondition and the name of the IoT hub.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

  • Configure File upload for each IoT hub. Configure the device to send a file to an Azure Storage container that contains the device name and status message.
  • Add the following message enrichments: Name = iotHubName Value = $twin.tag.location Endpoint = MessageAlert
  • Create an IoT Hub routing rule that has a data source of Device Twin Change Events and select the endpoint for MessageAlerts.
  • Add the following message enrichments: Name = iotHubName Value = $iothubname Endpoint = MessageAlert
  • Create an IoT Hub routing rule that has a data source of Device Telemetry Messages and select the endpoint for MessageAlerts.

Correct Answer: CD
B: Message enrichments is the ability of the IoT Hub to stamp messages with additional information before the messages are sent to the designated endpoint.
One reason to use message enrichments is to include data that can be used to simplify downstream processing. For example, enriching device telemetry messages with a device twin tag can reduce load on customers to make device twin API calls for this information.

D: Applying enrichments –
The messages can come from any data source supported by IoT Hub message routing, including the following examples:
✑ –>device twin change notifications — changes in the device twin
✑ device telemetry, such as temperature or pressure
✑ device life-cycle events, such as when the device is created or deleted
Reference:
https://docs.microsoft.com/en-us/azure/iot-hub/iot-hub-message-enrichments-overview



Question -25

You have an Azure IoT Edge device.
You need to modify the credentials used to access the container registry.
What should you modify?

  • A. the @edgeHub module twin
  • B. the IoT Edge module
  • C. the $edgeAgent module twin
  • D. the Azure IoT Hub device twin

Correct Answer: C
The module twin for the IoT Edge agent is called $edgeAgent and coordinates the communications between the IoT Edge agent running on a device and IoT Hub.
The desired properties are set when applying a deployment manifest on a specific device as part of a single-device or at-scale deployment.
These properties include:
✑ runtime.settings.registryCredentials.{registryId}.username
✑ runtime.settings.registryCredentials.registryId}.password
Reference:
https://docs.microsoft.com/en-us/azure/iot-edge/module-edgeagent-edgehub



Question -26

You enable Azure Security Center for IoT.
You need to onboard a device to Azure Security Center.
What should you do?

  • A. Add the azureiotsecurity module identity to the Azure IoT Hub device identity.
  • B. Open incoming TCP port 8883 on the device.
  • C. Modify the connection string of the device.
  • D. Install an X.509 certificate on the hardware security module (HSM) of the device.

Correct Answer: A
Use the following workflow to deploy and test your Azure Security Center for IoT security agents:
1. Enable Azure Security Center for IoT service to your IoT Hub
2. If your IoT Hub has no registered devices, Register a new device.
3. Create an azureiotsecurity security module for your devices.
Azure Security Center for IoT makes use of the module twin mechanism and maintains a security module twin named azureiotsecurity for each of your devices.
Note: To manually create a new azureiotsecurity module twin for a device use the following instructions:
1. In your IoT Hub, locate and select the device you wish to create a security module twin for.
2. Click on your device, and then on Add module identity.
3. In the Module Identity Name field, enter azureiotsecurity.
4. Click Save.
Reference:
https://docs.microsoft.com/en-us/azure/asc-for-iot/quickstart-create-security-twin



Question -27

You have an Azure IoT solution that includes an Azure IoT hub, 100 Azure IoT Edge devices, and 500 leaf devices.
You need to perform a key rotation across the devices.
Which three types of entities should you update? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

  • A. the $edgeHub module identity
  • B. the $edgeAgent module identity
  • C. the leaf module identities
  • D. the IoT Edge device identities
  • E. the iothubowner policy credentials
  • F. the leaf device identities

Correct Answer: ADF
To get authorization to connect to IoT Hub, devices and services must send security tokens signed with either a shared access or symmetric key. These keys are stored with a device identity in the identity registry.
An IoT Hub identity registry can be accessed like a dictionary, by using the deviceId or moduleId as the key.
Reference:
https://docs.microsoft.com/bs-latn-ba/azure/iot-dps/how-to-control-access https://docs.microsoft.com/en-us/azure/iot-hub/iot-hub-devguide-identity-registry


Previous->Microsoft AZ-220 Certification Exam Practice Questions – Part 3

Next->Microsoft AZ-220 Certification Exam Practice Questions – Part 5

More Exam Questions:

Sample Exam Questions 6: AZ-300: Microsoft Azure Architect Technologies

Sample Exam Questions 5: AZ-300: Microsoft Azure Architect Technologies


Microsoft Exam AZ-220 Tags:IoT Edge devices, IoT Hub, IoT Hub REST API, Microsoft, Microsoft AZ-220 Certification, Microsoft Azure, Microsoft Azure IoT Developer, Microsoft Exam, Microsoft Exam AZ-220

Post navigation

Previous Post: Microsoft AZ-220 Certification Exam Practice Questions – Part 3
Next Post: Microsoft AZ-220 Certification Exam Practice Questions – Part 5

Related Posts

  • Microsoft AZ-220 Certification Exam Practice Questions- Part 2 Microsoft Exam AZ-220
  • Microsoft AZ-220 Certification Exam Practice Questions – Part 5 Microsoft Exam AZ-220
  • Microsoft AZ-220 Certification Exam Practice Questions – Part 3 Microsoft Exam AZ-220
  • Microsoft AZ-220 Certification Exam Practice Questions – Part 1 Microsoft Azure certifications

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.



Categories

  • Agile Software development
  • Amazon AWS Certification Exam
  • Amazon EC2
  • Amazon ECS
  • Amazon Web Services (AWS)
  • Apache Kafka
  • API development
  • API development
  • Apple Mac
  • ASP.NET Core
  • ASP.Net MVC
  • ASP.NET Web API
  • Atlassian Jira
  • AWS DevOps Engineer Professional Exam
  • AWS Lambda
  • AZ-300: Microsoft Azure Architect Technologies Exam
  • Azure
  • Azure Active Directory
  • Azure AI and ML services
  • Azure Analytics Services
  • Azure App Service
  • Azure Application Gateway
  • Azure Archive Storage
  • Azure Blob Storage
  • Azure Cognitive Services
  • Azure Compute
  • Azure Container Instances (ACI)
  • Azure Core Services
  • Azure Cosmos DB
  • Azure Data and Storage
  • Azure Data Factory
  • Azure Data Lake Storage
  • Azure Database Services
  • Azure Databricks
  • Azure DDoS Protection
  • Azure Defender
  • Azure Devops
  • Azure Disk Storage
  • Azure File Storage
  • Azure Functions
  • Azure IaaS
  • Azure Identity and Access Management
  • Azure Internet of Things (IoT)
  • Azure Key Vault
  • Azure Kubernetes Service (AKS)
  • Azure landing zone
  • Azure Load Balancer
  • Azure Logic Apps
  • Azure Machine Learning
  • Azure Machine Learning
  • Azure Migration
  • Azure Mobile Apps
  • Azure Networking – VNET
  • Azure Networking services
  • Azure Pricing and Support
  • Azure Queue Storage
  • Azure Resource Manager
  • Azure Security
  • Azure Security Center
  • Azure Security Information and Event Management (SIEM)
  • Azure security tools for logging and monitoring
  • Azure Security, Privacy, Compliance, and Trust
  • Azure Sentinel
  • Azure Sentinel – Data connectors
  • Azure Serverless Computing
  • Azure Service Level Agreement (SLA)
  • Azure SLA calculation
  • Azure SQL
  • Azure SQL Database
  • Azure Storage
  • Azure Stream Analytics
  • Azure Synapse Analytics
  • Azure Table Storage
  • Azure Virtual Machine
  • Azure VNET
  • Business
  • C# development
  • C# interview questions with answers
  • CDA (Clinical Document Architecture)
  • ChatGPT
  • CI/CD pipeline
  • CISSP certification
  • CKEditor
  • Cloud
  • Cloud computing
  • Cloud Computing Concepts
  • Cloud services
  • COBIT
  • Command Query Responsibility Segregation (CQRS) Pattern
  • Configure SSL offloading
  • Content management system
  • Continuous Integration
  • conversational AI
  • Cross Site Scripting (XSS)
  • cyber breaches
  • Cybersecurity
  • Data Analysis
  • Database
  • DevOps
  • DevSecOps
  • Docker
  • DOM-based XSS
  • Domain-Driven Design (DDD)
  • Dynamic Application Security Testing (DAST)
  • Enterprise application architecture
  • Event-Driven Architecture
  • git
  • GIT
  • gmail api
  • Google
  • Google Ads
  • Google AdSense
  • Google Analytics
  • Google analytics interview questions with answers
  • Google Cloud Platform (GCP)
  • Google Docs
  • Google Drive
  • Google Maps
  • Google search console
  • Healthcare Interoperability Resources
  • Hexagonal Architecture Pattern
  • HL7 vs FHIR
  • HTML
  • Information security
  • Infrastructure as a Service (IaaS)
  • Internet of Things (IoT)
  • Interview questions
  • Introduction to DICOM
  • Introduction to FHIR
  • Introduction to HL7
  • IT governance
  • IT Infrastructure networking
  • IT/Software development
  • Javascript interview questions with answers
  • Kubernetes
  • Layered Pattern
  • Leadership Quote
  • Life lessons
  • Load Balancing Algorithms
  • Low-code development platform
  • Microservices
  • Microservices
  • Microsoft
  • Microsoft 365 Defender
  • Microsoft AI-900 Certification Exam
  • Microsoft AZ-104 Certification Exam
  • Microsoft AZ-204 Certification Exam
  • Microsoft AZ-900 Certification Exam
  • Microsoft Azure
  • Microsoft Azure certifications
  • Microsoft Azure Log Analytics
  • Microsoft Cloud Adoption Framework
  • Microsoft Exam AZ-220
  • Microsoft Exam AZ-400
  • Microsoft Excel
  • Microsoft Office
  • Microsoft Teams
  • Microsoft Teams
  • Microsoft word
  • Model-View-Controller (MVC) Pattern
  • Monitoring and analytics
  • NoSQL
  • OpenAI
  • OutSystems
  • Peer-to-Peer (P2P) pattern
  • Pipeline Pattern
  • PL-100: Microsoft Power Platform App Maker
  • PL-200: Microsoft Power Platform Functional Consultant Certification
  • PL-900: Microsoft Power Platform Fundamentals
  • Platform as a Service (PaaS)
  • postman
  • Postman
  • Postman
  • Project management
  • Python interview questions with answers
  • Ransomware
  • Reflected XSS
  • RESTful APIs
  • Rich Text Editor
  • SC-100: Microsoft Cybersecurity Architect
  • Scrum Master Certification
  • Service-oriented architecture (SOA)
  • Software architecture
  • Software as a Service (SaaS)
  • SonarQube
  • Splunk
  • SQL
  • SQL Azure Table
  • SQL Server
  • Static Application Security Testing (SAST)
  • Stored XSS attacks
  • Table Storage
  • Test Driven Development (TDD)
  • TinyMCE
  • Top technology trends for 2023
  • Uncategorized
  • User Experience (UX) design
  • Version control system
  • visual studio
  • WCF (Windows Communication Foundation)
  • Web development
  • WordPress
  • WordPress developer interview questions and answers
  • Zero Trust strategy



Recent Posts

  • Get started with Azure Cosmos DB
  • Azure Cosmos DB
  • How can I run web and api projects together in visual studio
  • Azure DDoS Protection
  • Azure Security Information and Event Management (SIEM)
  • Azure Web Apps Azure
  • Microsoft AZ-104 Certification Exam Practice Questions – 3 Microsoft AZ-104 Certification Exam
  • Common patterns used in Enterprise application architecture Enterprise application architecture
  • Top Amazon Web Services (AWS) Interview Questions Amazon Web Services (AWS)
  • Event-Driven Architecture Event-Driven Architecture
  • Google Docs Google
  • Interview question: What is the purpose of “as” operator in C#? C# development
  • How to send outlook email to Microsoft Teams channel? Microsoft Teams

Copyright © 2023 Desi banjara.

Powered by PressBook News WordPress theme