AZ-204 · Question #70
AZ-204 Question #70: Real Exam Question with Answer & Explanation
The correct answer is B: -PermissionsToKeys wrapkey, unwrapkey, get. The policy should belong to a key. In the case study the code retrieve the key so the GET access policy is mandatory. The wrap/unwrap is used for symmetric encryption and in this case study the task is to encrypt the blobs. https://docs.microsoft.com/en-us/azure/key-vault/keys/ab
Question
Case Study 1 - Litware Inc Background You are a developer for Litware Inc., a SaaS company that provides a solution for managing employee expenses. The solution consists of an ASP.NET Core Web API project that is deployed as an Azure Web App. Overall architecture Employees upload receipts for the system to process. When processing is complete, the employee receives a summary report email that details the processing results. Employees then use a web application to manage their receipts and perform any additional tasks needed for reimbursement. Receipt processing Employees may upload receipts in two ways: Uploading using an Azure Files mounted folder Uploading using the web application Data Storage Receipt and employee information is stored in an Azure SQL database. Documentation Employees are provided with a getting started document when they first use the solution. The documentation includes details on supported operating systems for Azure File upload, and instructions on how to configure the mounted folder. Solution details Users table Web Application You enable MSI for the Web App and configure the Web App to use the security principal name WebAppIdentity. Processing Processing is performed by an Azure Function that uses version 2 of the Azure Function runtime. Once processing is completed, results are stored in Azure Blob Storage and an Azure SQL database. Then, an email summary is sent to the user with a link to the processing report. The link to the report must remain valid if the email is forwarded to another user. Logging Azure Application Insights is used for telemetry and logging in both the processor and the web application. The processor also has TraceWriter logging enabled. Application Insights must always contain all log messages. Requirements Receipt processing Concurrent processing of a receipt must be prevented. Disaster recovery Regional outage must not impact application availability. All DR operations must not be dependent on application running and must ensure that data in the DR region is up to date. Security Users' SecurityPin must be stored in such a way that access to the database does not allow the viewing of SecurityPins. The web application is the only system that should have access to SecurityPins. All certificates and secrets used to secure data must be stored in Azure Key Vault. You must adhere to the principle of least privilege and provide privileges which are essential to perform the intended function. All access to Azure Storage and Azure SQL database must use the application's Managed Service Identity (MSI) Receipt data must always be encrypted at rest. All data must be protected in transit User's expense account number must be visible only to logged in users. All other views of the expense account number should include only the last segment, with the remaining parts obscured. In the case of a security breach access to all summary reports must be revoked without impacting other parts of the system. Issues Upload format issue Employees occasionally report an issue with uploading a receipt using the web application. They report that when they upload a receipt using the Azure File Share, the receipt does not appear in their profile. When this occurs, they delete the file in the file share and use the web application, which returns a 500 Internal Server error page. Capacity issue During busy periods, employees report long delays between the time they upload the receipt and when it appears in the web application. Log capacity issue Developers report that the number of log message in the trace output for the processor is too high, resulting in lost log messages. Application code Processing.cs Database.cs ReceiptUploader.cs ConfigureSSE.ps1 You need to ensure the security policies are met. What code do you add at line CS07 of ConfigureSSE.ps1?
Options
- A-PermissionsToCertificates create, encrypt, decrypt
- B-PermissionsToKeys wrapkey, unwrapkey, get
- C-PermissionsToCertificates wrapkey, unwrapkey, get
- D-PermissionsToKeys create, encrypt, decrypt
Explanation
The policy should belong to a key. In the case study the code retrieve the key so the GET access policy is mandatory. The wrap/unwrap is used for symmetric encryption and in this case study the task is to encrypt the blobs. https://docs.microsoft.com/en-us/azure/key-vault/keys/about-keys-details#key-access-control
Community Discussion
No community discussion yet for this question.