Common Pitfalls to Avoid
-
Blob vs File vs Disk
-
Blob = unstructured object storage (docs, media, backups).
-
File = SMB/NFS file shares, “lift-and-shift” file servers.
-
Disk = persistent VM storage.
-
Exam trick: If the question says “mount like a drive”, the answer is Azure Files, not Blob.
-
-
Snapshots vs Images
-
Snapshot = point-in-time backup of a single disk.
-
Image = reusable VM template with OS + configuration.
-
Exam trick: You cannot deploy multiple VMs from a snapshot — you need an image.
-
-
Redundancy Confusion
-
LRS = 3 copies in one datacenter.
-
ZRS = across zones in one region.
-
GRS = primary + paired region (geo redundancy).
-
RA-GRS = same as GRS + read access to secondary.
-
Exam trick: ZRS does not provide geo redundancy.
-
-
Soft Delete vs Immutability
-
Soft Delete = protection against accidental deletion (can restore).
-
Immutability = prevents deletion or modification for compliance/WORM.
-
Exam trick: “Must not allow deletion at all” → Immutability, not Soft Delete.
-
-
SAS vs Account Keys
-
Keys = full admin access to storage account.
-
SAS = temporary, scoped, time-limited permissions.
-
Exam trick: “Provide temporary access to a partner” → SAS, not keys.
-
Quick Recall Hacks
-
“Unstructured data” → Blob Storage
-
“Lift-and-shift SMB/NFS shares” → Azure Files
-
“VM persistence” → Disk Storage
-
“Recover accidental deletions” → Soft Delete
-
“Data must not be deleted for X years” → Immutability Policy
-
“Temporary access” → SAS
-
“No public internet exposure” → Private Endpoint
What to Expect in the Exam
-
Direct questions about redundancy types (LRS, GRS, ZRS, RA-GRS).
-
Scenario questions comparing Blob, File, and Disk usage.
-
Performance/cost traps around Premium vs Standard SSD.
-
Security questions on SAS tokens, firewalls, and RBAC.
-
Compliance-style questions involving immutability or legal hold.
Final Exam Strategy
When solving storage questions:
-
Identify the data type: Blob, File, or Disk.
-
Match the scenario: Hot/Cool/Archive tier, lift-and-shift, or VM persistence.
-
Check replication needs: LRS, ZRS, GRS, RA-GRS.
-
Look for protection requirements: Soft Delete vs Immutability.
-
Decide the access method: SAS, Keys, RBAC, or Private Endpoint.