AZ-900 Practice Exam
What can you use to sync identities from an on-premises Active Directory Domain Services (AD DS) domain to Azure AD? Select only one answer. Azure AD Connect Azure Resource Manager (ARM) Conditional Access Azure Key Vault
Azure AD Connect
What provides recommendations to reduce the cost of Azure resources? Select only one answer. Azure Advisor Microsoft Defender for Cloud Azure Dashboard Azure Service Health
Azure Advisor
You need to be notified when there are new recommendations for reducing Azure costs. Which tool should you use? Select only one answer. Azure Service Health Azure Advisor Azure Monitor Log Analytics
Azure Advisor
Which Azure Storage service should you use to store unstructured files, such as images, that will be served on webpages? Azure Blob storage Azure Queue Storage Azure Disk Storage Azure Table storage
Azure Blob storage
What allows you to orchestrate the deployment of resource templates, Azure Policy assignments, and resource groups? Select only one answer. Azure Blueprints Azure Functions Azure App Services Azure Cognitive Services
Azure Blueprints
What can you use to execute code in a serverless environment? Azure Logic Apps Azure Functions Azure Virtual Desktop Azure Container Instances
Azure Functions
What can you use to ensure that a development team can only create virtual machines of a certain size? Select only one answer. Azure Blueprints Azure Policy Cloud Adoption Framework Conditional Access
Azure Policy
What can you use to ensure that new and existing Azure resources stay in compliance with corporate standards? Select only one answer. Azure Policy resource locks resource tags Azure Advisor
Azure Policy
What can you use to restrict the deployment of a virtual machine to a specific location? Select only one answer. Azure AD resource locks Azure Policy resource groups
Azure Policy
You need to ensure that multi-factor authentication (MFA) is enabled on accounts with write permissions in an Azure subscription. What should you implement? Select only one answer. resource tags Cloud Adoption Framework resource locks Azure Policy
Azure Policy
Which two tools are accessible via Azure Cloud Shell and allows you to write Bash scripts to manage an Azure environment? Select all answers that apply. Azure PowerShell Azure Resource Manager (ARM) templates Azure Repos Azure CLI
Azure PowerShell Azure CLI
Select the answer that correctly completes the sentence. [Answer choice] is the deployment and management service for Azure. Select only one answer. Azure AD Azure API Management Azure Monitor Azure Resource Manager (ARM)
Azure Resource Manager (ARM)
Which management layer accepts requests from any Azure tool or API and enables you to create, update, and delete resources in an Azure account? Select only one answer. Azure Resource Manager (ARM) Azure management groups Azure CLI Azure Sphere
Azure Resource Manager (ARM)
What can you use to define the resources you want to provision in a declarative JSON format? Select only one answer. Azure PowerShell Azure CLI Azure Resource Manager (ARM) templates Azure Repos
Azure Resource Manager (ARM) templates
What can you use to find information about planned maintenance for Azure services that are critical to your organization? Select only one answer. Azure Service Health Azure Advisor Azure Monitor Log Analytics
Azure Service Health
You need to review the root cause analysis (RCA) report for a service outage that occurred last week. Where should you look for the report? Select only one answer. Azure Service Health Azure Advisor Azure Monitor Log Analytics
Azure Service Health
What can you use to provide Mac and Android users with access to a Windows environment that will run Windows-based applications? Select only one answer. Azure Logic Apps Azure Functions Azure Virtual Desktop Azure Container Instances
Azure Virtual Desktop
Which Azure compute service can you use to deploy and manage a set of identical virtual machines? availability sets availability zones Azure Container Instances Azure Virtual Machine Scale Sets
Azure Virtual Machine Scale Sets
What uses the infrastructure as a service (IaaS) cloud service model? Azure virtual machines Azure App Services Microsoft Office 365 Azure Cosmos DB
Azure virtual machines
What Azure AD feature can you use to ensure that users can only access Microsoft Office 365 applications from approved client applications? Select only one answer. Azure role-based access control (RBAC) single sign-on (SSO) Conditional Access multi-factor authentication (MFA)
Conditional Access
What can you use to ensure that a user can only access applications from compliant devices? Select only one answer. single sign-on (SSO) multi-factor authentication (MFA) hybrid identity Conditional Access
Conditional Access
Which two actions can be performed by using the graphical user interface (GUI) in the Azure portal? Each correct answer presents a complete solution. Select all answers that apply. Create new resources. Review a graphical view of all the services you are using. Change the availability zone of a virtual machine. Repeatedly set up one or more resources and ensure that all the dependencies are created in the proper order.
Create new resources. Review a graphical view of all the services you are using.
You have an Azure virtual machine that is accessed only between 9:00 and 17:00 each day. What should you do to minimize costs but preserve the associated hard disks and data? Select only one answer. Deallocate the virtual machine. Delete the virtual machine. Resize the virtual machine. Implement Privileged Identity Management.
Deallocate the virtual machine.
Which two services can you use to establish network connectivity between an on-premises network and Azure resources? Each correct answer presents a complete solution. Select all answers that apply. ExpressRoute Azure VPN Gateway Azure Bastion Azure Firewall
ExpressRoute Azure VPN Gateway
Which Azure Blob storage service tier has the highest storage costs and the fastest access times for reading and writing data? Select only one answer. Hot Cool Archive
Hot
You need to identify which Azure services are compliant with ISO 27001 Information Security Management Standards. Where should you go to locate the information? Select only one answer. Microsoft Trust Center Microsoft Privacy Statement the Data Protection Addendum of Microsoft Microsoft Online Services Terms
Microsoft Trust Center
Which two protocols are used to access Azure file shares? Each correct answer presents a complete solution. Select all answers that apply. FTP HTTP Network File System (NFS) Server Message Block (SMB)
Network File System (NFS) Server Message Block (SMB)
What is an advantage of cloud computing compared to on-premises deployments? You can scale more quickly. You own your CPUs. You have full access in case of internet outage. You can work from multiple workstations.
You can scale more quickly.
What is an Azure Storage account named storage001 an example of? a resource a resource group a subscription a resource manager
a resource
Which Azure resource is a software emulation of a physical computer that includes a virtual processor, memory, storage, and networking resources? a virtual machine an App Service a function a container
a virtual machine
What is the customer responsible for in a software as a service (SaaS) model? Select only one answer. storage data and access virtual machines runtime
data and access
Which type of strategy uses a series of mechanisms to slow the advancement of an attack that aims to gain unauthorized access to data? Select only one answer. defense in depth least privileged access distributed denial-of-service (DDoS) perimeter
defense in depth
Select the answer that correctly completes the sentence. An example of [answer choice] is automatically scaling an application to ensure that the application has the resources needed to meet customer demands. Select only one answer. agility high availability geo-distribution elasticity
elasticity
Select the answer that correctly completes the sentence. In cloud computing, [answer choice] allows you to deploy applications to regional datacenters around the world. Select only one answer. high availability disaster recovery geo-location elasticity
geo-location
Select the answer that correctly completes the sentence. In a region pair, a region is paired with another region in the same [answer choice]. Select only one answer. geography availability zone resource group datacenter
geography
Select the answer that correctly completes the sentence. Increasing the capacity of an application by adding additional virtual machine is called [answer choice]. Select only one answer. vertical scaling horizontal scaling high availability agility
horizontal scaling
Which cloud deployment model are you using if you have servers physically located at your organization's on-site datacenter, and you migrate a few of the servers to the cloud? private cloud public cloud hybrid cloud
hybrid cloud
Which cloud service model provides you with the most control over the hardware that runs applications? Select only one answer. infrastructure as a service (IaaS) platform as a service (PaaS) software as a service (SaaS)
infrastructure as a service (IaaS)
Which type of cloud service are virtual networks? infrastructure as a service (IaaS) platform as a service (PaaS) software as a service (SaaS)
infrastructure as a service (IaaS)
What Azure AD feature can you use to configure security authentication that requires users to use their mobile phone to sign in? Select only one answer. Microsoft Defender for Cloud Microsoft Entra Verified ID Azure Information Protection (AIP) multi-factor authentication (MFA)
multi-factor authentication (MFA)
In a platform as a service (PaaS) model, which two components are the responsibility of the cloud service provider? Each correct answer presents a complete solution. operating system physical network user access information and data
operating system physical network
You need to allow resources on two different Azure virtual networks to communicate with each other. What should you configure? Select only one answer. a network security group (NSG) a point-to-site VPN peering service endpoints
peering
Your organization is building a custom application. You need to focus on application development rather than configuration and management of servers. Which cloud service model should you use? infrastructure as a service (IaaS) platform as a service (PaaS) software as a service (SaaS)
platform as a service (PaaS)
Which Azure component allows you to replicate resources across a geography to ensure business continuity during a natural disaster at the primary site? region pairs availability zones availability sets Azure Virtual Machine Scale Sets
region pairs
You need to associate the costs of resources to different groups within an organization without changing the location of the resources. What should you use? Select only one answer. resource tags resource groups subscriptions administrative units
resource tags
Which two factors affect Azure costs? Each correct answer presents a complete solution. Select all answers that apply. availability zone selection resource usage resource location date and time of use
resource usage resource location
Which type of cloud service model is typically licensed through a monthly or annual subscription? Infrastructure as a service (IaaS) platform as a service (PaaS) software as a service (SaaS)
software as a service (SaaS)
What is high availability in a public cloud environment dependent on? Select only one answer. the service-level agreement (SLA) that you choose the vertical scalability of an app cloud-based backup retention limits capital expenditures
the service-level agreement (SLA) that you choose
What is the purpose of defense in depth? Select only one answer. to enable you to locate and act on resources that are associated with specific workloads, environments, business units, and owners to manage policies that control or audit resources so that the configurations stay compliant with corporate standards to use several layers of protection to prevent information from being accessed by unauthorized users to evaluate resources and make recommendations to help improve reliability and performance
to use several layers of protection to prevent information from being accessed by unauthorized users
Select the answer that correctly completes the sentence. Increasing compute capacity for an app by adding RAM or CPUs to a virtual machine is called [answer choice]. Select only one answer. vertical scaling horizontal scaling disaster recovery high availability
vertical scaling