AZ-900 Practice Exam

Ace your homework & exams now with Quizwiz!

What can you use to sync identities from an on-premises Active Directory Domain Services (AD DS) domain to Azure AD? Select only one answer. Azure AD Connect Azure Resource Manager (ARM) Conditional Access Azure Key Vault

Azure AD Connect

What provides recommendations to reduce the cost of Azure resources? Select only one answer. Azure Advisor Microsoft Defender for Cloud Azure Dashboard Azure Service Health

Azure Advisor

You need to be notified when there are new recommendations for reducing Azure costs. Which tool should you use? Select only one answer. Azure Service Health Azure Advisor Azure Monitor Log Analytics

Azure Advisor

Which Azure Storage service should you use to store unstructured files, such as images, that will be served on webpages? Azure Blob storage Azure Queue Storage Azure Disk Storage Azure Table storage

Azure Blob storage

What allows you to orchestrate the deployment of resource templates, Azure Policy assignments, and resource groups? Select only one answer. Azure Blueprints Azure Functions Azure App Services Azure Cognitive Services

Azure Blueprints

What can you use to execute code in a serverless environment? Azure Logic Apps Azure Functions Azure Virtual Desktop Azure Container Instances

Azure Functions

What can you use to ensure that a development team can only create virtual machines of a certain size? Select only one answer. Azure Blueprints Azure Policy Cloud Adoption Framework Conditional Access

Azure Policy

What can you use to ensure that new and existing Azure resources stay in compliance with corporate standards? Select only one answer. Azure Policy resource locks resource tags Azure Advisor

Azure Policy

What can you use to restrict the deployment of a virtual machine to a specific location? Select only one answer. Azure AD resource locks Azure Policy resource groups

Azure Policy

You need to ensure that multi-factor authentication (MFA) is enabled on accounts with write permissions in an Azure subscription. What should you implement? Select only one answer. resource tags Cloud Adoption Framework resource locks Azure Policy

Azure Policy

Which two tools are accessible via Azure Cloud Shell and allows you to write Bash scripts to manage an Azure environment? Select all answers that apply. Azure PowerShell Azure Resource Manager (ARM) templates Azure Repos Azure CLI

Azure PowerShell Azure CLI

Select the answer that correctly completes the sentence. [Answer choice] is the deployment and management service for Azure. Select only one answer. Azure AD Azure API Management Azure Monitor Azure Resource Manager (ARM)

Azure Resource Manager (ARM)

Which management layer accepts requests from any Azure tool or API and enables you to create, update, and delete resources in an Azure account? Select only one answer. Azure Resource Manager (ARM) Azure management groups Azure CLI Azure Sphere

Azure Resource Manager (ARM)

What can you use to define the resources you want to provision in a declarative JSON format? Select only one answer. Azure PowerShell Azure CLI Azure Resource Manager (ARM) templates Azure Repos

Azure Resource Manager (ARM) templates

What can you use to find information about planned maintenance for Azure services that are critical to your organization? Select only one answer. Azure Service Health Azure Advisor Azure Monitor Log Analytics

Azure Service Health

You need to review the root cause analysis (RCA) report for a service outage that occurred last week. Where should you look for the report? Select only one answer. Azure Service Health Azure Advisor Azure Monitor Log Analytics

Azure Service Health

What can you use to provide Mac and Android users with access to a Windows environment that will run Windows-based applications? Select only one answer. Azure Logic Apps Azure Functions Azure Virtual Desktop Azure Container Instances

Azure Virtual Desktop

Which Azure compute service can you use to deploy and manage a set of identical virtual machines? availability sets availability zones Azure Container Instances Azure Virtual Machine Scale Sets

Azure Virtual Machine Scale Sets

What uses the infrastructure as a service (IaaS) cloud service model? Azure virtual machines Azure App Services Microsoft Office 365 Azure Cosmos DB

Azure virtual machines

What Azure AD feature can you use to ensure that users can only access Microsoft Office 365 applications from approved client applications? Select only one answer. Azure role-based access control (RBAC) single sign-on (SSO) Conditional Access multi-factor authentication (MFA)

Conditional Access

What can you use to ensure that a user can only access applications from compliant devices? Select only one answer. single sign-on (SSO) multi-factor authentication (MFA) hybrid identity Conditional Access

Conditional Access

Which two actions can be performed by using the graphical user interface (GUI) in the Azure portal? Each correct answer presents a complete solution. Select all answers that apply. Create new resources. Review a graphical view of all the services you are using. Change the availability zone of a virtual machine. Repeatedly set up one or more resources and ensure that all the dependencies are created in the proper order.

Create new resources. Review a graphical view of all the services you are using.

You have an Azure virtual machine that is accessed only between 9:00 and 17:00 each day. What should you do to minimize costs but preserve the associated hard disks and data? Select only one answer. Deallocate the virtual machine. Delete the virtual machine. Resize the virtual machine. Implement Privileged Identity Management.

Deallocate the virtual machine.

Which two services can you use to establish network connectivity between an on-premises network and Azure resources? Each correct answer presents a complete solution. Select all answers that apply. ExpressRoute Azure VPN Gateway Azure Bastion Azure Firewall

ExpressRoute Azure VPN Gateway

Which Azure Blob storage service tier has the highest storage costs and the fastest access times for reading and writing data? Select only one answer. Hot Cool Archive

Hot

You need to identify which Azure services are compliant with ISO 27001 Information Security Management Standards. Where should you go to locate the information? Select only one answer. Microsoft Trust Center Microsoft Privacy Statement the Data Protection Addendum of Microsoft Microsoft Online Services Terms

Microsoft Trust Center

Which two protocols are used to access Azure file shares? Each correct answer presents a complete solution. Select all answers that apply. FTP HTTP Network File System (NFS) Server Message Block (SMB)

Network File System (NFS) Server Message Block (SMB)

What is an advantage of cloud computing compared to on-premises deployments? You can scale more quickly. You own your CPUs. You have full access in case of internet outage. You can work from multiple workstations.

You can scale more quickly.

What is an Azure Storage account named storage001 an example of? a resource a resource group a subscription a resource manager

a resource

Which Azure resource is a software emulation of a physical computer that includes a virtual processor, memory, storage, and networking resources? a virtual machine an App Service a function a container

a virtual machine

What is the customer responsible for in a software as a service (SaaS) model? Select only one answer. storage data and access virtual machines runtime

data and access

Which type of strategy uses a series of mechanisms to slow the advancement of an attack that aims to gain unauthorized access to data? Select only one answer. defense in depth least privileged access distributed denial-of-service (DDoS) perimeter

defense in depth

Select the answer that correctly completes the sentence. An example of [answer choice] is automatically scaling an application to ensure that the application has the resources needed to meet customer demands. Select only one answer. agility high availability geo-distribution elasticity

elasticity

Select the answer that correctly completes the sentence. In cloud computing, [answer choice] allows you to deploy applications to regional datacenters around the world. Select only one answer. high availability disaster recovery geo-location elasticity

geo-location

Select the answer that correctly completes the sentence. In a region pair, a region is paired with another region in the same [answer choice]. Select only one answer. geography availability zone resource group datacenter

geography

Select the answer that correctly completes the sentence. Increasing the capacity of an application by adding additional virtual machine is called [answer choice]. Select only one answer. vertical scaling horizontal scaling high availability agility

horizontal scaling

Which cloud deployment model are you using if you have servers physically located at your organization's on-site datacenter, and you migrate a few of the servers to the cloud? private cloud public cloud hybrid cloud

hybrid cloud

Which cloud service model provides you with the most control over the hardware that runs applications? Select only one answer. infrastructure as a service (IaaS) platform as a service (PaaS) software as a service (SaaS)

infrastructure as a service (IaaS)

Which type of cloud service are virtual networks? infrastructure as a service (IaaS) platform as a service (PaaS) software as a service (SaaS)

infrastructure as a service (IaaS)

What Azure AD feature can you use to configure security authentication that requires users to use their mobile phone to sign in? Select only one answer. Microsoft Defender for Cloud Microsoft Entra Verified ID Azure Information Protection (AIP) multi-factor authentication (MFA)

multi-factor authentication (MFA)

In a platform as a service (PaaS) model, which two components are the responsibility of the cloud service provider? Each correct answer presents a complete solution. operating system physical network user access information and data

operating system physical network

You need to allow resources on two different Azure virtual networks to communicate with each other. What should you configure? Select only one answer. a network security group (NSG) a point-to-site VPN peering service endpoints

peering

Your organization is building a custom application. You need to focus on application development rather than configuration and management of servers. Which cloud service model should you use? infrastructure as a service (IaaS) platform as a service (PaaS) software as a service (SaaS)

platform as a service (PaaS)

Which Azure component allows you to replicate resources across a geography to ensure business continuity during a natural disaster at the primary site? region pairs availability zones availability sets Azure Virtual Machine Scale Sets

region pairs

You need to associate the costs of resources to different groups within an organization without changing the location of the resources. What should you use? Select only one answer. resource tags resource groups subscriptions administrative units

resource tags

Which two factors affect Azure costs? Each correct answer presents a complete solution. Select all answers that apply. availability zone selection resource usage resource location date and time of use

resource usage resource location

Which type of cloud service model is typically licensed through a monthly or annual subscription? Infrastructure as a service (IaaS) platform as a service (PaaS) software as a service (SaaS)

software as a service (SaaS)

What is high availability in a public cloud environment dependent on? Select only one answer. the service-level agreement (SLA) that you choose the vertical scalability of an app cloud-based backup retention limits capital expenditures

the service-level agreement (SLA) that you choose

What is the purpose of defense in depth? Select only one answer. to enable you to locate and act on resources that are associated with specific workloads, environments, business units, and owners to manage policies that control or audit resources so that the configurations stay compliant with corporate standards to use several layers of protection to prevent information from being accessed by unauthorized users to evaluate resources and make recommendations to help improve reliability and performance

to use several layers of protection to prevent information from being accessed by unauthorized users

Select the answer that correctly completes the sentence. Increasing compute capacity for an app by adding RAM or CPUs to a virtual machine is called [answer choice]. Select only one answer. vertical scaling horizontal scaling disaster recovery high availability

vertical scaling


Related study sets

Chapter 1 - Homeostasis / Language of Anatomy

View Set

Ch. 9 Income Capitalization Approach

View Set