SIMULATION
Task 12
You need to create a personal access token (PAT) named Token! that has only the following capabilities
* Read write, and manage code
* Read and execute builds
* Read releases
Token1 must expire in 60 days.
Step 1: Navigate to Personal Access Tokens
Sign in to Azure DevOps:
Go toAzure DevOpsand sign in with your credentials.
Access User Settings:
Click on your profile picture in the top right corner.
SelectUser settings.
Open Personal Access Tokens:
In the user settings menu, selectPersonal access tokens.
Step 2: Create a New Personal Access Token
Create a New Token:
Click on+ New Token.
Configure the Token:
Name: EnterToken1.
Organization: Select the organization where you want to use the token.
Expiration: Set the expiration to60 days.
Set Scopes:
Code: SelectRead, Write, & Manage.
Build: SelectRead & Execute.
Release: SelectRead.
Create the Token:
Click onCreate.
Step 3: Save the Token
Copy the Token:
Once the token is created, copy it immediately as it will not be displayed again.
Store the token in a secure location.
You have an Azure subscription that contains an Azure Pipelines pipeline named Pipeline1 and a user named User1. Pipeline1 is used to build and test an app named Appl. User1 is assigned the Contributors role for Pipeline1.
You plan to test App1 by using an Azure Deployment Environments environment.
You need to ensure that User1 can provision the environment. The solution must follow the principle of least privilege.
Which role should you assign to User1?
SIMULATION
Task 7
Initialize the default main branch, if it does not exist already
In the User 1-42147509 organization, you need to install the Microsoft Security DevOps extension.
Next, create a new starter pipeline named starter1 that will use the following starter code.
Ensure that starter! includes a task that executes the extension and uses the following input*:
* Command: run
* Policy aruredevops
* Publish: true
Save the pipeline to a new branch named starter
Step 1: Initialize the Default Main Branch
Navigate to Azure DevOps:
Go toAzure DevOpsand sign in with your credentials.
Select Your Project:
ChooseProject1from your list of projects.
Initialize the Main Branch:
Go toRepos>Files.
Step 2: Install the Microsoft Security DevOps Extension
Navigate to Extensions:
In Azure DevOps, click on theShopping Bagicon in the top right corner and selectBrowse Marketplace.
Search for the Extension:
Search forMicrosoft Security DevOps.
Install the Extension:
Click onGet it free.
Select your organization (User1-42147509) and clickInstall.
Follow the prompts to complete the installation2.
Step 3: Create a New Starter Pipeline
Navigate to Pipelines:
Go toPipelines>New pipeline.
Select the Repository:
ChooseAzure Repos Gitand select the relevant repository.
Configure the Pipeline:
SelectStarter pipelineand replace the default YAML with the following starter code:
trigger:
- starter
pool:
vmImage: 'windows-latest'
steps:
- task: MicrosoftSecurityDevOps@1
inputs:
command: 'run'
policy: 'azuredevops'
publish: true
Save the Pipeline:
Click onSaveand enterstarteras the branch name.
Click onSave and runto save the pipeline to the new branch namedstarter3.
SIMULATION
Task 3
You need to ensure that an Azure Web App named az400-38443478-matn supports rolling upgrades The solution must ensure that only 10 percent of users who connect to az400-38443478 main use updated versions of the app. The solution must minimize administrative effort.
To ensure that your Azure Web App named az400-38443478-main supports rolling upgrades and only 10 percent of users connect to the updated version of the app, you can use deployment slots with the following steps:
Create a Deployment Slot:
Navigate to the Azure Portal.
Go to your Web App az400-38443478-main.
Select Deployment slots in the menu.
Click on Add Slot.
Name the slot (e.g., staging) and if needed, clone settings from the production slot.
Configure the Traffic Percentage:
In the Deployment Slots menu, you will see a column for Traffic %.
Set the traffic percentage to 10% for the staging slot1.
This will route only 10% of the traffic to the updated version of the app in the staging slot.
Deploy the Updated App to the Staging Slot:
Deploy your updated application to the staging slot.
Test the application in the staging slot to ensure it's working as expected.
Complete the Rolling Upgrade:
Once you're satisfied with the performance and stability of the app in the staging slot, you can gradually increase the percentage of traffic until you're ready to swap with the production slot.
To swap slots, go to the Deployment slots menu and click on Swap with the production slot.
By using deployment slots, you can achieve rolling upgrades with minimal administrative effort, as it allows you to test the new version on a subset of users before fully releasing it. Remember to adjust the traffic percentage and monitor the application's performance throughout the process.
SIMULATION
Task 4
You need to configure a virtual machine template in a DevTest Labs environment named az400-38443478-dtl1. The operating system must be based on Windows Server 2016 Datacenter. Virtual machines created from the DevTest Lab must include the Selenium tool and the Google Chrome browser.
To configure a virtual machine template in your DevTest Labs environment named az400-38443478-dtl1 with Windows Server 2016 Datacenter that includes the Selenium tool and the Google Chrome browser, follow these steps:
Create a Custom Image with Windows Server 2016 Datacenter:
In the Azure Portal, go to your DevTest Lab az400-38443478-dtl1.
Navigate to Configuration and policies > Custom images.
Use an existing VM or create a new one with Windows Server 2016 Datacenter.
After setting up the VM, capture it to create a custom image1.
Install Selenium and Google Chrome on the VM:
Connect to the VM via RDP.
Generalize the VM:
Run the sysprep command to generalize the VM, which prepares it to be used as a template.
Shut down the VM after sysprep completes.
Capture the Generalized VM to Create a Template:
In the Azure Portal, navigate to the VM and select Capture.
Provide the required details and create the image.
Add Selenium and Google Chrome Artifacts to the Template:
Go back to the DevTest Lab az400-38443478-dtl1.
Select Artifacts and add Selenium and Google Chrome artifacts to the template.
Ensure these artifacts are configured to install during the VM creation process.
Create VMs from the Template:
Now, when you create a new VM in the DevTest Lab, select the custom image you created.
The VM will be provisioned with Windows Server 2016 Datacenter, and the Selenium tool and Google Chrome browser will be installed automatically.
By following these steps, you can ensure that all virtual machines created from this template in your DevTest Lab will have the required operating system, tools, and browser installed. Remember to replace placeholder names with the actual names of your resources where necessary.
Geoffrey
1 days agoDulce
8 days agoCherelle
15 days agoBillye
22 days agoAmber
25 days agoTula
1 months agoThea
1 months agoBrittani
2 months agoRoy
2 months agoEttie
2 months agoJannette
2 months agoLindsay
2 months agoBev
3 months agoGwenn
3 months agoGlendora
3 months agoVernell
3 months agoAlison
3 months agoMarguerita
4 months agoLacresha
4 months agoSalley
5 months agoJanae
5 months agoYoulanda
6 months agoAmber
6 months agoTyisha
6 months ago