Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam AZ-103 topic 2 question 4 discussion

Actual exam question from Microsoft's AZ-103
Question #: 4
Topic #: 2
[All AZ-103 Questions]

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g, copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may have more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
You may now click next to proceed to the lab.
Use the following login credentials as needed:

Azure Username: XXXXXXX -

Azure Password: XXXXXXX -
The following information is for technical support purposes only:

Lab Instance: 9172796 -

You plan to prevent users from accidentally deleting blob data from Azure.
You need to ensure that administrators can recover any blob data that is deleted accidentally from the storagelod9272261 storage account for 14 days after the deletion occurred.
What should you do from the Azure portal?

Show Suggested Answer Hide Answer
Suggested Answer: See solution below.
Task A: Create a Recovery Services vault (if a vault already exists skip this task, go to Task B below)
A1. From Azure Portal, On the Hub menu, click All services and in the list of resources, type Recovery Services and click Recovery Services vaults.

If there are recovery services vaults in the subscription, the vaults are listed.
A2. On the Recovery Services vaults menu, click Add.

A3. The Recovery Services vault blade opens, prompting you to provide a Name, Subscription, Resource group, and Location

Task B. Create a backup goal -
B1. On the Recovery Services vault blade (for the vault you just created), in the Getting Started section, click Backup, then on the Getting Started with Backup blade, select Backup goal.

The Backup Goal blade opens. If the Recovery Services vault has been previously configured, then the Backup Goal blades opens when you click Backup on the
Recovery Services vault blade.
B2. From the Where is your workload running? drop-down menu, select Azure.

B3. From the What do you want to backup? menu, select Blob Storage, and click OK.
B4. Finish the Wizard.
Task C. create a backup schedule
C1. Open the Microsoft Azure Backup agent. You can find it by searching your machine for Microsoft Azure Backup.

C2. In the Backup agent's Actions pane, click Schedule Backup to launch the Schedule Backup Wizard.

C3. On the Getting started page of the Schedule Backup Wizard, click Next.
C4. On the Select Items to Backup page, click Add Items.
The Select Items dialog opens.
C5. Select Blob Storage you want to protect, and then click OK.
C6. In the Select Items to Backup page, click Next.
On the Specify Backup Schedule page, specify Schedule a backup every day, and click Next.

C7. On the Select Retention Policy page, set it to 14 days, and click Next.

C8. Finish the Wizard.
References:
https://docs.microsoft.com/en-us/azure/backup/backup-configure-vault

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
bellapupa
Highly Voted 4 years ago
Enable soft delete with 14 days retention.
upvoted 49 times
praveen97
3 years, 8 months ago
Yes, Soft delete can be set to 14 days to recover the deleted blobs. Recovery Services Vault will not support Blob storage.
upvoted 4 times
...
...
FrancisFerreira
Highly Voted 4 years ago
We can't backup blob data in a recovery services vault. That's only for VMs, File Shares, SQL Server on VM, and SAP HANA on VM. Correct way to go is to enable soft delete with 14 days of retention period.
upvoted 16 times
gresina
3 years, 11 months ago
If you set up just 14 days, the data will be available for retention just for 13 days. You have to set up 15 days as the length of the soft delete.
upvoted 1 times
...
...
Ozguraydin
Most Recent 3 years, 2 months ago
Account of my opinion, answer is totally wrong. Go to blop storage account. Then click Data Protection under the Blob Service. Click the Turn on soft delete for blobs and configure for 15 days.
upvoted 5 times
...
arshadnazir
3 years, 5 months ago
Under the Data protection go Blob and enable Turn on soft delete for blobs and set to 14 days
upvoted 4 times
...
Saman2020
3 years, 7 months ago
We have two Soft Delete options in Storage accounts. 1. File share soft delete (File Service) 2. Soft delete for Blobs (from Data Protection)
upvoted 1 times
...
cl_pra
3 years, 7 months ago
Now Soft delete is under File Service not under Blob Service, which means Soft delete will work only on File Share if enabled not on blobs. To enable soft delete on blob it has to be enabled during the creation of storage account itself. There is no options under configuration blade also to enable once storage account is created, It has to be enabled during the storage account creation.
upvoted 1 times
pouya1
3 years, 7 months ago
You can find the soft delete under the Data Protection
upvoted 1 times
...
paulie
3 years, 7 months ago
soft delete for blobs is under data protection
upvoted 1 times
...
...
cl_pra
3 years, 7 months ago
Soft delete is available only for file shares and not on containers, The best option for this is using a legal hold on the container which will set it indefinitely and nobody can delete the container. To use this go to access policy within the container blade and under immutable blob storage add legal hold.
upvoted 1 times
...
B1T3X
3 years, 7 months ago
What does Azure Backup even have to do with this question? Can't you apply a resource lock to the blob/container?
upvoted 1 times
...
Joby_Francis
3 years, 7 months ago
Not sure why the solution refers to creating a recovery services vault and enable backup. I think part a) asks to prevent users from accidentally deleting blob data - can be accomplished using "Delete" Lock type (since we need to PREVENT) b)recover any blob data that is accidentally deleted to be recovered within 14 days - can be accomplished by enabling Blob soft delete and setting retention policies (Storage account -> Blob service -> Data protection) - https://docs.microsoft.com/en-us/azure/storage/blobs/soft-delete-enable?tabs=azure-portal I believe, it's the 14 days in the question that causes a confusion and makes people think that it has to do with the soft delete (14 days) for recovery services vault that is enabled by default when the vault is created. However, the fact is that the storage account itself has Blob soft delete that when enabled protects data and allows us to recover it. https://docs.microsoft.com/en-us/azure/storage/blobs/soft-delete-overview = has a clear line that states "If there is a possibility that your data may accidentally be modified or deleted by an application or another storage account user, Microsoft recommends turning on soft delete"
upvoted 3 times
sjccde
3 years, 5 months ago
To question 1: The Lock would also prevent administrators from deleting, but it is only asked for users. I guess you need a policy to accomplish what is asked - or am I wrong?
upvoted 1 times
...
...
Atilgen
3 years, 8 months ago
You have to enable Soft delete. You can't use a backup solution in this case, because it is Blob data
upvoted 1 times
...
_syamantak
3 years, 8 months ago
For the first part the question (Prevent users from accidentally deleting blob data from Azure), shouldn't we use NoDelete locks? Soft delete is not stopping the users from deleting and is rather providing a way to restore what is deleted. for the second half of the question , enabling soft delete is the option
upvoted 4 times
...
JorgeM77
3 years, 9 months ago
Recovery Services Vault only allow backup virtual machines, fileshare,SQL VM and SAP VM in AZURE option, so this answer is not correct. I think when you create a storage account can configure Soft Delete and after configure a lock for read only to prevent accidental delete from users
upvoted 3 times
...
paulosrsf
3 years, 9 months ago
Go to Data Protection blade and enable soft delete. Thats the answer. To recover blobs deleted after the data protection is enabled, we just need to enable the option "Show deleted blobs" aside from the search bar, inside a container. The deleted blob file will appear as deleted and the option to Undelete will be available.
upvoted 1 times
paulosrsf
3 years, 9 months ago
Here is a step-by-step procedure. https://www.sqlshack.com/how-to-recover-accidental-deletes-in-azure-blob-storage/
upvoted 1 times
...
...
CaptainObyus
3 years, 9 months ago
Soft delete with 14 day retention is the way to go. If there is a chance that your data is accidentally modified or deleted by an application or other storage account user, we recommend turning on soft delete. Soft delete is one part of a data protection strategy and can help prevent inadvertent data loss. Soft delete helps ensure that you can recover accidentally deleted or modified blob data. Soft delete is a key part of an overall data protection strategy that includes Azure Resource Manager locks as well as the ZRS, GRS, and RA-GRS replication tiers. We look forward to hearing feedback about this feature on this post or at Azure Feedback. References: https://azure.microsoft.com/en-us/blog/soft-delete-for-azure-storage-blobs-ga/#:~:text=To%20enable%20soft%20delete%20using,this%20soft%20delete%20code%20sample.
upvoted 1 times
...
macco455
3 years, 9 months ago
Since blobs cannot be backup up using Azure Backup, soft delete with 14 day retention is the only option here. Some are saying put a resource lock on it as well to which I disagree given the question does not state it want the user to not be allowed to modify the file, just delete it. Therefor just configure soft delete for the blob and you are good
upvoted 2 times
exammood15
3 years, 9 months ago
soft delete for blob only helps to recover the data from container after its been enabled but container itself can be removed which I tried now. So, option is to enable the delete lock on storage account and enable soft delete for blob so we can save container and blob data. https://docs.microsoft.com/en-us/azure/storage/blobs/soft-delete-enable?tabs=azure-portal
upvoted 3 times
...
...
JhonyTrujillo
3 years, 9 months ago
https://www.youtube.com/watch?v=sHyvplezaMU
upvoted 1 times
...
GC2020
3 years, 9 months ago
Enable soft delete which supports max 14 days retention, provided answer is for VM backup hence not correct.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...