AZ-900 Exam Prep #4
You need to create a network drive in Azure Storage. The drive needs to be accessible from several computers that run Windows 8.1. What storage solution should you create? A virtual machine data disk A Blob service in a storage account A Queue service in a storage account A File service in a storage account
A File service in a storage account - Azure Files offers fully managed file shares in the cloud that are accessible via the industry standard Server Message Block (SMB) protocol. Azure file shares can be mounted concurrently by cloud or on-premises deployments of Windows, Linux, and macOS.
You need to create an Azure storage solution that will store messages created by an Azure web role. The messages will then be processed by an Azure worker role. What type of storage solution should you create? A virtual machine data disk A Blob service in a storage account A File service in a storage account A Queue service in a storage account
A Queue service in a storage account - Azure Queue storage is a service for storing large numbers of messages that can be accessed from anywhere in the world via authenticated calls using HTTP or HTTPS.
Define the concept of "dynamic elasticity." A cloud service that remains available after a failure occurs. A cloud service that responds quickly when demand increases and needs to be manually scaled-down when demand decreases. The ability of a cloud service to be accessed quickly from any location via the internet. A cloud service that responds quickly when demand increases and scales down when demand decreases.
A cloud service that responds quickly when demand increases and scales down when demand decreases. - Dynamic elasticity is defined as a cloud service that both quickly scales up and also back down in order to serve your changing workload patterns for the lowest cost.
What are security policies used for in Azure? Rules used to restrict and validate access to files and documents hosted on Azure. To connect to outside security services that aren't part of the Azure Trusted Providers program. A set of rules that Azure uses to validate user access and permissions to Azure resources. A set of rules that Azure can use to evaluate if your configuration of a service is secure and complies with your organization's security guidelines.
A set of rules that Azure can use to evaluate if your configuration of a service is secure and complies with your organization's security guidelines. - Security policies in Azure define the desired configuration of your services and workloads. They help ensure you're complying with your company's security requirements. User access and permissions are done through Azure Active Directory. Restricting access to files can be done with Azure Information Protection.
What is the purpose of Azure Blueprints? Automated and repeatable resource deployment in Azure. Collect security data from across all your Azure and non-Azure resources, providing a single pane of glass for security monitoring and management. Automated and repeatable environment setup in Azure. Synchronize on-premises AD with Azure AD.
Automated and repeatable environment setup in Azure. - Azure Blueprints provides automated and repeatable environment setup in Azure. It is able to implement: - Role assignments - Policy assignments - Azure Resource Manager templates (ARM templates) - Resource groups
Which Azure service can host your web apps without you having to manage underlying infrastructure? Azure WebJobs Application Insights Azure App Service Azure DataBricks
Azure App Service - Azure App Service enables you to build and host web apps, mobile back-ends, and RESTful APIs in the programming language of your choice without managing infrastructure.
Which of the following Azure offerings provide a platform for serverless computing? (Choose 2) Azure App Service Azure Service Bus Azure WebJobs Azure Functions
Azure App Service - Azure App Service enables you to build and host web apps, mobile back-ends, and RESTful APIs in the programming language of your choice without managing infrastructure. Azure Functions - Azure Functions is a serverless compute service that enables you to run code-on-demand without having to explicitly provision or manage infrastructure. Use Azure Functions to run a script or piece of code in response to a variety of events.
Which of the following tools can be used to manage Azure resources on a Google Chromebook? (Choose 2) Azure Cloud Shell Azure CLI PowerShell Azure portal
Azure Cloud Shell - Azure Cloud Shell is an interactive, browser-accessible shell for managing Azure resources. It provides the flexibility of choosing the shell experience that best suits the way you work. Linux users can opt for a Bash experience, while Windows users can opt for PowerShell. At this time, there is no native PowerShell Core distribution for Google OS, and the current version of the CLI cannot be installed on Google OS. Azure portal - Azure portal is a web application that is accessible on all modern desktop, tablet devices, and browsers. As long as your device can run a modern web browser, you can generally use the Azure Portal.
Which Azure offering refers to a set of development, testing, and automation tools? Azure Cognitive Services Azure Boards Azure DevOps GitHub
Azure DevOps - Azure DevOps Services provides development collaboration tools, including high-performance pipelines, free private Git repositories, configurable Kanban boards, and extensive automated and continuous testing capabilities.
You are migrating an on-premises application to the Azure Cloud. The application communicates with a file share hosted on a Windows server that no other applications have access to. Which Azure storage services could be used to migrate the file share to? (Choose 2) Azure Files Azure Data Lake Azure Virtual Machine Azure Disk Storage
Azure Files - Azure Files can be used to house the migrated Windows file share data. Azure Disk Storage - Azure Disk Storage can be used to house the migrated Windows file share data.
Which of the following Azure services is an on-demand analytics job service that can run massively parallel data transformations and processing programs across large amounts of data? (Choose 2) Azure SQL database Azure HDInsight Azure Data Lake Analytics Azure SQL Data Warehouse
Azure HDInsight - Azure Data Lake Analytics and Azure HDInsight are the correct answers. Azure Data Lake Analytics can run massively parallel data transformation and processing programs across petabytes of data. Azure HDInsight is an open-source analytics service for enterprises that makes it easy, fast, and cost-effective to process massive amounts of data. Azure Data Lake Analytics - Azure Data Lake Analytics and Azure HDInsight are the correct answers. Azure Data Lake Analytics can run massively parallel data transformation and processing programs across petabytes of data. Azure HDInsight is an open-source analytics service for enterprises that makes it easy, fast, and cost-effective to process massive amounts of data.
Which of the following is true regarding HDInsight? It is a cloud-based service that is a limitless analytics service that brings together enterprise data warehousing and Big Data analytics. Azure HDInsight is an open-source, managed, analytics service in the cloud. It is a managed relational cloud database service. It can run massively parallel data transformation and processing programs across petabytes of data.
Azure HDInsight is an open-source, managed, analytics service in the cloud. - Azure HDInsight is an open-source, managed, analytics service in the cloud. You can use open-source frameworks like: Hadoop, Apache Spark, Apache Hive, LLAP, Apache Kafka, Apache Storm, R, and others.
Which Azure service should you use to store certificates? Azure Information Protection Azure Security Center Azure Key Vault Azure storage account
Azure Key Vault - Azure Key Vault can be used to securely store and tightly control access to tokens, passwords, certificates, API keys, and other secrets.
Which Azure service can help you collect, analyze, and act on telemetry from your cloud and on-premises environments? Azure App Service Azure Monitor Azure Analyzer Azure WebJobs
Azure Monitor - Azure Monitor is a service that can help you understand how your applications are performing and proactively identify issues affecting them and the resources they depend on.
You need a service to define and enforce compliance standards in multiple Azure subscriptions. What service or feature should you use? ARM templates Azure Sentinel Azure Policy Conditional Access policy
Azure Policy - Azure Policy enforces organizational standards and compliance at scale. Examples include restricting a SKU or size of a virtual machine or defining which types of Azure resources are allowed.
You need to choose an Azure-native tool that enables you to manage, control, and monitor access to important resources in your organization. These resources include resources in Azure AD, Azure, and other Microsoft Online services such as Microsoft 365 or Microsoft Intune. What service should you choose? Azure Sentinel Azure Privileged Identity Management (PIM) Azure Firewall Azure Key Vault
Azure Privileged Identity Management (PIM) - Azure Privileged Identity Management (PIM) is a service in Azure Active Directory (Azure AD) that enables you to manage, control, and monitor access to important resources in your organization.
You are the Systems Administrator for a local university. You are deploying several sets of systems that will be used for research and development teams. Each set of systems will be uniform in nature, containing the same number and type of Azure resources. What should you recommend to automate the creation of these Azure resources? Multiple Azure Subscriptions Management groups Azure Resource Manager templates Virtual machine scale sets
Azure Resource Manager templates - An Azure Resource Manager template is the framework by which resources are created. They can be used to define and automate the creation of similar resources.
You are the system administrator for T-Bones Restaurant Group, Inc. You currently have an on-premises data center that consists of 50 Windows servers running IIS and SQL Server. IT management has dictated that all systems should be moved to Azure in the coming year. They also state that only platform-as-a-service (PaaS) solutions should be implemented. Which of the following meet these requirements? (Choose 2) Azure Virtual Network Azure SQL Database Azure App Service Azure Virtual Machines
Azure SQL Database - Azure SQL Database is a platform-as-a-service (PaaS) offering for relational database management and is a common solution for the migration of SQL. Azure App Service - Azure App Service is a platform-as-a-service (PaaS) offering for web services and is a common solution for the migration of IIS.
Which of the following are benefits of Azure geographies? (Choose 3) Azure has geographies throughout the world Data residency is honored within the geographical boundary They are fault tolerant and can often withstand complete region failure Any Azure geography can be used by anyone
Azure has geographies throughout the world - Azure has geographies in the Americas, Europe, Asia Pacific, the Middle East and Africa. Data residency is honored within the geographical boundary - Azure has geographies around the world providing data residency within each region to give customer peace of mind over their data sovereignty. They are fault tolerant and can often withstand complete region failure - Azure Geographies are groups of one or more Azure Region. Every region already has fault-tolerance (more than one data-center) but most Geographies have more than one Region as well, giving you multiple levels of redundancy.
You are the Azure Administrator for Radio Gaga, LTD. You have a resource group named RG-RG and need to ensure no other administrators can create virtual networks in this resource group. What can you implement to accomplish this? Access Control (IAM) Azure policy Properties Locks
Azure policy - Azure Policy is correct as it is used to enforce different rules and effects over your resources, such as limiting what actions different administrators can perform within your RG-RG resource group. The other answers are incorrect: Access Control can be used to prevent the creation of Azure resources, but improper use could prevent required system access from other administrators - this is not the best selection; Locks can be used on a resource to prevent accidental deletion or modification of a resource group - for example; Properties are typically read-only values for an Azure resource, such as its resource ID, subscription, resource group, and other information.
What is the purpose of Azure Policy? A. Security Information Event Management (SIEM) in Azure. B. Define and enforce compliance standards in an Azure scope (subscription, resource group, etc.). C. Allow or deny authentication to Azure AD and other Microsoft Cloud resources using if-then conditional statements. D. Implement role-based access control (RBAC) to multiple grouped subscriptions from a single location.
B. Define and enforce compliance standards in an Azure scope (subscription, resource group, etc.). - Azure Policy enforces organizational standards and compliance at scale. Examples include restricting a SKU or size of virtual machine or defining which types of Azure resources are allowed.
Which of the following components are required to establish communication between on-premises resources and resources in Azure? (Choose 2) A. VNet peer B. VPN Gateway C. Route tables D. Azure Virtual Network
B. VPN Gateway - A VPN Gateway defines the Azure network side of a site-to-site virtual private network. D. Azure Virtual Network - Azure Virtual Network enables many types of Azure resources, such as Azure Virtual Machines (VM), to securely communicate with each other, the internet, and on-premises networks.
A Service Level Agreement (SLA) is? A. An agreement between Microsoft and the Client detailing the schedule of new service releases B. A Microsoft agreement ensuring you the Client will pay service charges C. Microsoft's commitment for uptime and connectivity D. A document explaining Microsoft Cloud Security
C. Microsoft's commitment for uptime and connectivity - The Service Agreement by Microsoft describes the commitment to the customer on uptime and connectivity availability for Azure services. Most but not all Azure services have a financially backed guarantee.
What methods are available to connect to the Azure Public Cloud? (Choose 3) Client or Site to Site VPN Over the internet Physically at the Azure datacenter Express Route
Client or Site to Site VPN - The methods to connect to the Azure Public Cloud are over the internet to public endpoints, via site or client VPN's to devices you configure in the Cloud environment or through a dedicated connection such as Express Route. As a customer it is not possible to connect directly into the environment whilst being physically at the datacenter. Over the internet - The methods to connect to the Azure Public Cloud are over the internet to public endpoints, via site or client VPN's to devices you configure in the Cloud environment or through a dedicated connection such as Express Route. As a customer it is not possible to connect directly into the environment whilst being physically at the datacenter. Express Route - The methods to connect to the Azure Public Cloud are over the internet to public endpoints, via site or client VPN's to devices you configure in the Cloud environment or through a dedicated connection such as Express Route. As a customer it is not possible to connect directly into the environment whilst being physically at the datacenter.
What should you use to evaluate whether your company's Azure environment meets regulatory requirements? (Choose 2) Azure Advisor Compliance Manager Microsoft Defender for Cloud Knowledge Center
Compliance Manager - Compliance Manager has a regulatory compliance dashboard, and Compliance Manager enables you to track, assign, and verify your organization's regulatory compliance activities related to Microsoft Professional Services and Microsoft cloud services, such as Microsoft Office 365, Microsoft Dynamics 365, and Microsoft Azure. Microsoft Defender for Cloud -In Microsoft Defender for Cloud, under the Cloud Security topic, the Regulatory compliance blade can be found. You can view your compliance posture relative to the standards and regulations and remediate assessments.
Which of the following database solutions has the ability to add data concurrently from multiple regions simultaneously? SQL managed instances SQL Data Warehouses Cosmos DB Azure SQL Databases
Cosmos DB - Azure Cosmos DB is Microsoft's globally distributed, multi-model database service. Cosmos DB elastically and independently scales throughput and storage across any number of Azure regions worldwide.
Your subscription contains multiple resource groups used for a variety of projects. You need to restrict the creation of storage accounts, regardless of end-user access in one of your resource groups. How can you do this? Azure Sentinel Create an Azure Policy to restrict the creation of storage accounts in the affected resource group. ARM templates Resource lock
Create an Azure Policy to restrict the creation of storage accounts in the affected resource group. - Azure Policies can restrict resource types at different scopes, including resource groups.
What are region pairs? A. Two or more regions in an Availability Set B. A method to route traffic between two Availability Zones C. Two geographies working together to host an application D. A region that is linked with another region in the same geography
D. A region that is linked with another region in the same geography - Azure has the concept of region pairs, these are two or more regions that are at least 300 miles apart within a single Geography. This enables the ability to replicate certain resources such as virtual machine storage across the geography providing protection against such events as natural disasters or civil unrest.
What is the lowest-cost Azure support plan that provides access to general guidance for Architecture Support? Basic Developer Professional Direct Standard
Developer - The Developer Azure support plan is the cheapest option which includes general guidance for Architecture Support.
What kind of information does Azure Information Protection protect? (Choose 3) Email messages Virtual hard disks Office documents PDF documents Azure Blob Storage
Email messages - Azure Information Protection (sometimes referred to as AIP) helps protect: Email messages, Office documents and PDF documents. AIP is a cloud-based solution that helps an organization classify and, optionally, protect its documents and emails by applying labels. Azure Information Protection is not used to protect data in Azure Blob Storage nor can it help protect virtual hard disks. Office documents - Azure Information Protection (sometimes referred to as AIP) helps protect: Email messages, Office documents and PDF documents. AIP is a cloud-based solution that helps an organization classify and, optionally, protect its documents and emails by applying labels. Azure Information Protection is not used to protect data in Azure Blob Storage nor can it help protect virtual hard disks. PDF documents - Azure Information Protection (sometimes referred to as AIP) helps protect: Email messages, Office documents and PDF documents. AIP is a cloud-based solution that helps an organization classify and, optionally, protect its documents and emails by applying labels. Azure Information Protection is not used to protect data in Azure Blob Storage nor can it help protect virtual hard disks.
Which of the following are valid Azure storage redundancy types (Choose 3) Locally redundant storage (LRS) Zone redundant storage (ZRS) Read-access geo-zone-redundant storage (RA-GZRS) Global zone storage (GZS)
Locally redundant storage (LRS) - Azure has many redundancy options to choose from when identifying which storage option to select. The following are all valid Azure Storage redundancy options - Locally redundant storage, Zone-redundant storage, Geo-redundant storage, Read-access geo-redundant storage, Geo-zone-redundant storage and Read-access geo-zone-redundant storage. Zone redundant storage (ZRS) - Azure has many redundancy options to choose from when identifying which storage option to select. The following are all valid Azure Storage redundancy options - Locally redundant storage, Zone-redundant storage, Geo-redundant storage, Read-access geo-redundant storage, Geo-zone-redundant storage and Read-access geo-zone-redundant storage. Read-access geo-zone-redundant storage (RA-GZRS) - Azure has many redundancy options to choose from when identifying which storage option to select. The following are all valid Azure Storage redundancy options - Locally redundant storage, Zone-redundant storage, Geo-redundant storage, Read-access geo-redundant storage, Geo-zone-redundant storage and Read-access geo-zone-redundant storage.
What types of data does Azure Monitor collect? (Choose 2) Metrics and logs Subscription monitoring data Physical hardware data Only metrics Only logs
Metrics and logs - All data collected by Azure Monitor fits into one of two fundamental types, metrics and logs. Metrics are numerical values that describe some aspect of a system at a particular point in time. They are lightweight and capable of supporting near real-time scenarios. Logs contain different kinds of data organized into records with different sets of properties for each type. Telemetry such as events and traces are stored as logs in addition to performance data so that it can all be combined for analysis. Subscription monitoring data - Azure Monitor collects two broad types of data: metrics and logs. Within these data types sits subscription monitoring data.
You are looking to restrict internet traffic to a Windows virtual machine - what Azure functionality would you choose to accomplish this? Network Security Groups Public IP Address Redis Resource Group
Network Security Groups - Appropriately configured Network Security groups allow you to control all inbound and outbound traffic for your virtual machines.
You need an Azure support plan with the overall fastest possible response time. Which support plan meets this requirement? Free Standard Professional Direct Developer
Professional Direct - Of the available options, the Professional Direct support plan provides the quickest response time when cases are raised.
Which of the following Azure support plans provide phone 24/7 access for technical support queries? (Choose 2) Professional Direct Basic Developer Standard
Professional Direct - Provides 24/7 access to technical support via phone and email. Standard - The Developer support plan only provides access to technical support via email in business hours. Both the Standard and Professional Direct support plans provide 24/7 access to technical support via phone and email.
Which Azure Support Plans offer 24x7 access to technical support engineers? (Choose 2) Professional Direct Developer Standard Basic
Professional Direct - The Professional direct (being the most expensive of the plans) offers access to 24/7 access to technical support by email and phone after a support request is submitted. Standard - The standard plan offers access to 24/7 access to technical support by email and phone after a support request is submitted.
What is the purpose of Azure DevTest Labs? Globally available transactional database that supports NoSQL APIs Provides a repeatable environment for deploying configured VMs that can set limits on costs Azure-native version control tools for your code Provides web-based command-line environment built into the Azure Portal
Provides a repeatable environment for deploying configured VMs that can set limits on costs - Azure DevTest Labs enables the creation of repeatable VM-based test environments using ARM templates and the ability to set limits on the number and size of VMs to control costs.
What are the 3 components necessary for any role-based access control (RBAC) assignment? (Choose 3) Scope Security principal Role definition Conditional Access policy
Scope - Scope determines which set of resources (subscription, resource group, individual VM, etc.) a user or other identity has access to. Security principal - Security principal is the identity, or the "who," that needs access. Role definition - Role definition defines what level of access is granted to an identity (security principal).
Which Azure Support Plan offers a response time for critical business impact events of less than 1 hour, at the lowest cost? Developer Standard Professional Direct Basic
Standard - The Standard support plan includes 24x7 access to Support Engineers via email and phone. The Standard support plan is recommended for customers running Production workloads (meaning, things that are in use by the business as part of their daily processes). When these workloads are critically impacted, it's often important that Azure Support is engaged as soon as possible.
Which of the following are considered capital expenditures (CapEx)? (Choose 2) Storage area network Hyper-V host server Office 365 licenses Cloud-based virtual machine
Storage area network - Storage costs are typically considered CapEx and include storage hardware components and the cost of supporting them. Depending on the application and level of fault tolerance, centralized storage can be expensive. Server costs are considered CapEx and include all server hardware components and the cost of supporting them. Hyper-V host server - Physical server costs are considered CapEx and include all server hardware components and the cost of supporting them. When purchasing servers, make sure to design for fault tolerance and redundancy (e.g., server clustering, redundant power supplies, and uninterruptible power supplies). When a server needs to be replaced or added to a data center, you need to pay for the computer. This can affect your immediate cash flow because you must pay for the server upfront.
Define "economy of scale". Spending money on physical infrastructure up front, and then deducting that expense from your tax bill over time. The ability to do things more efficiently or at a lower cost per unit when operating at a larger scale. Prices for individual resources and services are provided so you can predict how much you will spend in a given billing period based on your expected usage. Spending money on products or services now and being billed for them now. You can deduct this expense from your tax bill in the same year.
The ability to do things more efficiently or at a lower cost per unit when operating at a larger scale. - Cloud providers such as Microsoft, Google, and Amazon are large businesses that leverage the benefits of economies of scale and then pass the savings on to their customers.
Which of the following statements about SaaS cloud services is correct? The client is responsible for purchasing all client software. The cloud service provider is responsible for all application upgrades. Applications must be accessed from a secure network (aka VPN) The client has complete control over the application.
The cloud service provider is responsible for all application upgrades. - The cloud service provider performs all underlying hardware, OS, and middleware updates. With data stored in the cloud, users can access their information from any internet-connected computer or mobile device. And when app data is stored in the cloud, no data is lost if a user's computer or device fails.
What is the preferred method to synchronize user identities on an on-premises Active Directory server with Azure AD? Use Azure Identity Protection in your on-premises environment to synchronize on-premises and Azure AD accounts. Use Azure AD Connect in your Azure environment to synchronize on-premises and Azure AD accounts. Use Azure AD Connect in your on-premises environment to synchronize on-premises and Azure AD accounts. It is not possible to synchronize an on-premises Active Directory server with Azure AD. For security reasons, they must be maintained separately.
Use Azure AD Connect in your on-premises environment to synchronize on-premises and Azure AD accounts. - Azure AD Connect in an on-premises environment is capable of synchronizing on-premises and Azure AD accounts, so users can be signed in and be managed in both locations without having to maintain 2 separate Active Directory environments.
You need to implement multi-factor authentication (MFA) for Microsoft Cloud apps across your entire organization. The requirement for MFA needs to be centrally rolled out and enforced. What Azure functionality should you use to accomplish this task? Use a Conditional Access policy to roll out MFA to the entire organization Azure Information Protection Network Security Groups (NSG) Azure AD Connect
Use a Conditional Access policy to roll out MFA to the entire organization - Conditional Access policies are a component of Azure Active Directory that let you create if-then statements for allowing/denying authentication to different applications, including conditions to require multi-factor authentication. They provide centralized conditional access that can be enforced company-wide.
Your company uses a single, critical virtual machine that will be in place for years. You want to save costs on long-running virtual machines. What should you do? Use an Azure Reserved Virtual Machine Instance Use an Azure Spot Virtual Machine Management groups Azure Scale Sets
Use an Azure Reserved Virtual Machine Instance - Azure Reserved Virtual Machine Instances allow you to sign on for a 1- or 3-year commitment for a long-running virtual machine that can save up to 70% compared to month-to-month pricing.
Which statement best describes a Hybrid Cloud architecture? Does not require any on-premise hardware Utilizes services of both Public and Private Clouds Special use case for secure Government workloads Cannot be used with Microsoft Azure
Utilizes services of both Public and Private Clouds - A Hybrid Cloud architecture describes a solution that utilizes both Public and Private Cloud offerings, including private on-premise systems. This is useful, because it allows companies the flexibility of the cloud, but can also manage tight governance requirements which may not allow certain data to be held in the Public Cloud. This can require on-premise hardware. This approach is possible with Microsoft Azure, and is not specific to any type of workloads, although Governments may find this especially useful.
Which of the following are available in the Azure Marketplace? (Choose 3) Virtual machine images Sample application code SaaS applications Solution templates
Virtual machine images - Virtual machine images are available in the Azure Marketplace. Images are available for Windows and Linux. Stock operating system images, as well as custom images with pre-installed applications, are also available. SaaS applications - SaaS applications make up the majority of the Azure Marketplace. One click allows you to install and use many popular applications; such as Office365, Salesforce, Zoom, and others seamlessly with your Azure subscription. Solution templates - Solution templates allow you to deploy entire IaaS solutions with a simple click. Examples include complete SharePoint farms as well as SQL Always Available clusters.
From a pricing perspective, select the 2 statements that are true regarding infrastructure as a service virtual machines (VMs) and serverless resources such as Azure Functions. (Choose 2) Serverless resources, such as Azure Functions, are only billed for the entire time the function is created and ready to use. Virtual machines are billed for the time they are running, whether or not they are in use. Serverless resources, such as Azure, Functions are only billed when a function is executed (or run), and no longer billed once the function is no longer active. Virtual machines are billed only when actively in use, such as when remoting into the machine.
Virtual machines are billed for the time they are running, whether or not they are in use. - Virtual machines (IaaS) are billed for compute and storage while they are turned on and running, regardless of whether they are actively in use. Serverless resources, such as Azure, Functions are only billed when a function is executed (or run), and no longer billed once the function is no longer active. - Serverless cloud resources use a pay per consumption model. Billing does not occur when it is not in use.