AZ-900 : Microsoft Azure Fundamentals Practice Tests 2025 3 Flashcards
(85 cards)
The concept of sharing resources among multiple users or tenants, allowing for cost savings and increased efficiency, is known as _______.
Multi-Tenancy
Redundancy
Autonomy
Monolithic architecture
Multi-Tenancy
Explanation:
The concept of sharing resources among multiple users or tenants, allowing for cost savings and increased efficiency, is known as “multi-tenancy”.
Other options -
Redundancy: It refers to the duplication of critical system components to ensure continued operation in case of a failure. While redundancy is an important attribute of many cloud systems, it is not specifically related to the concept of sharing resources among multiple users.
Autonomy: It refers to the ability of a system or organization to operate independently, with minimal external control or interference. While autonomy can be an important attribute of cloud systems, it is not specifically related to the concept of multi-tenancy.
Monolithic architecture: It architecture refers to a software architecture pattern in which all components of an application are tightly integrated and deployed as a single unit. While monolithic architecture can be used in cloud systems, it is not specifically related to the concept of multi-tenancy, which involves the sharing of resources among multiple users or tenants.
_____________ devices can easily move data to Azure when busy networks aren’t an option.
Azure File Sync
Azure Storage Explorer
Azure Migrate
Azure Data Box
Azure Data Box
Explanation:
Azure Data Box devices easily move data to Azure when busy networks aren’t an option. Move large amounts of data to Azure when you’re limited by time, network availability, or costs, using common copy tools such as Robocopy. All data is AES-encrypted, and the devices are wiped clean after upload, in accordance with NIST Special Publication 800-88 revision 1 standards.
It’s possible to deploy a new Azure VM from a Google Chromebook by using PowerAutomate.
No
Yes
No
Explanation:
Tricky question! PowerAutomate is not the same as PowerShell.
PowerAutomate moreover isn’t a part of Azure! It falls under the Microsoft umbrella of offerings, just like PowerApps.
Hence, this statement is definitely False. You can use the Azure portal to provision Virtual Machines, or even the CLI.
What is the maximum allowed number of tags per Azure resource?
50
15
10
30
50
Explanation:
Azure allows users to assign name-value pairs, called tags, to each resource, resource group, and subscription. The maximum number of tag name-value pairs that can be assigned to each of these entities is 50. If you need to apply more tags than the allowed number, you can use a JSON string to include multiple values for a single tag name. Each resource group or subscription can contain numerous resources, each with their own set of 50 tag name-value pairs.
The members of your organization have been complaining about having to enter their password too many times which is frustrating. Moreover, users also tend to forget their passwords which leads to reset overhead. Which of the following services in Azure can help with this?
Azure Active Directory SeamlessAuth
Azure Active Directory Passwordless
Azure ExpressRoute
Azure Arc
Azure Active Directory Passwordless
Explanation:
Features like multifactor authentication (MFA) are a great way to secure your organization, but users often get frustrated with the additional security layer on top of having to remember their passwords. Passwordless authentication methods are more convenient because the password is removed and replaced with something you have, plus something you are or something you know.
What is the maximum number of virtual network rules and IP network rules allowed per storage account in Azure?
500
200
150
300
500
Explanation;
The current maximum number of virtual networks per storage account are 200!
What is the primary objective of the “Secure” aspect of Defender for Cloud?
To focus on Azure Security Benchmark compliance.
To provide protection against physical attacks on datacenters.
To deploy Log Analytics agents on all virtual machines.
To ensure secure configurations of workloads and resources.
To ensure secure configurations of workloads and resources.
Explanation:
The “Secure” aspect of Defender for Cloud aims to ensure that workloads and resources are securely configured. It provides policies and guidelines to help achieve Azure Security Benchmark compliance and secure configurations.
How does the syntax of commands differ between Azure PowerShell and the Azure CLI?
Azure PowerShell uses PowerShell commands, while the Azure CLI uses Bash commands.
Azure PowerShell uses Python scripts, while the Azure CLI uses Ruby scripts.
There is no difference in command syntax between Azure PowerShell and the Azure CLI.
Azure PowerShell uses Bash scripts, while the Azure CLI uses JSON configuration files.
Azure PowerShell uses PowerShell commands, while the Azure CLI uses Bash commands.
Explanation:
The Azure CLI is functionally equivalent to Azure PowerShell, with the primary difference being the syntax of commands. While Azure PowerShell uses PowerShell commands, the Azure CLI uses Bash commands.
The Azure CLI provides the same benefits of handling discrete tasks or orchestrating complex operations through code. It’s also installable on Windows, Linux, and Mac platforms, as well as through Azure Cloud Shell.
Due to the similarities in capabilities and access between Azure PowerShell and the Bash based Azure CLI, it mainly comes down to which language you’re most familiar with.
Which of the following are valid Azure purchasing options?
Github website
Microsoft Partner
Azure website
Microsoft representative
Microsoft Partner
Azure website
Microsoft representative
Explanation:
You can choose the purchasing option that works best for your organisation. Or, use any of the options simultaneously.
What is the primary purpose of applying resource locks in Azure?
To prevent accidental deletion or modification of critical resources.
To restrict access to Azure resources to a specific user.
To prevent any modifications to resources, including read access.
To ensure resources are automatically deleted after a specific time period.
To prevent accidental deletion or modification of critical resources.
Explanation:
As an administrator, you can lock an Azure subscription, resource group, or resource to protect them from accidental user deletions and modifications. The lock overrides any user permissions.
You can set locks that prevent either deletions or modifications. In the portal, these locks are called Delete and Read-only. In the command line, these locks are called CanNotDelete and ReadOnly.
CanNotDelete means authorized users can read and modify a resource, but they can’t delete it.
ReadOnly means authorized users can read a resource, but they can’t delete or update it. Applying this lock is similar to restricting all authorized users to the permissions that the Reader role provides.
Unlike role-based access control (RBAC), you use management locks to apply a restriction across all users and roles. To learn about setting permissions for users and roles, see Azure RBAC.
Therefore, Resource locks in Azure are used to prevent accidental deletion or modification of important resources. They help maintain the integrity of critical resources by preventing unwanted changes.
______________ is a set of capabilities in Azure Active Directory (AAD) that enables organizations to secure and manage any outside user, including customers and partners.
Sentinel
External Identities
External Profiles
External User Management
External Identities
Explanation:
External Identities is a set of capabilities that enables organizations to secure and manage any external user, including customers and partners. Building on B2B collaboration, External Identities gives you more ways to interact and connect with users outside your organization.
The ability to provision and deprovision cloud resources quickly, with minimal management effort, is known as _______.
Resiliency
Scalability
Sustainability
Elasticity
Scalability
Explanation:
The correct answer is Scalability. It specifically refers to the ability to provision and deprovision cloud resources quickly and with minimal management effort.
Yes or No: Azure Site Recovery can only be used to replicate and recover virtual machines within Azure.
Yes
No
No
Explanation:
The answer is No. Azure Site Recovery can be used to replicate and recover virtual machines not only within Azure, but also from on-premises datacenters to Azure, and between different datacenters or regions.
Azure Site Recovery is a disaster recovery solution that provides continuous replication of virtual machines and physical servers to a secondary site, allowing for rapid recovery in case of a disaster. It supports a wide range of scenarios, including replication from VMware, Hyper-V, and physical servers to Azure, as well as replication between Azure regions or datacenters.
Which of the following is a good usage of tags?
Using tags for data classification
Making business groups aware of cloud resource consumption requires IT to understand the resources and workloads each team is using
Using Tags to quickly locate resources associated with specific workloads, environments, ownership groups, or other important information.
To help identify the assets required to support a single workload.
All of these
All of these
Overall explanation
All of the above can help leverage the power of tags in one way or the other.
From the official Azure docs:
Organizing cloud-based resources is a crucial task for IT, unless you only have simple deployments. Use naming and tagging standards to organize your resources for the following reasons:
Resource management: Your IT teams need to quickly locate resources associated with specific workloads, environments, ownership groups, or other important information. Organizing resources is critical to assigning organizational roles and access permissions for resource management.
Cost management and optimization: Making business groups aware of cloud resource consumption requires IT to understand the resources and workloads each team is using.
Operations management: Visibility for the operations management team about business commitments and SLAs is an important aspect of ongoing operations. For operations to be managed well, tagging for mission criticality is required.
Security: Classification of data and security impact is a vital data point for the team, when breaches or other security issues arise. To operate securely, tagging for data classification is required.
Governance and regulatory compliance: Maintaining consistency across resources helps identify changes from agreed-upon policies. Prescriptive guidance for resource tagging demonstrates how one of the following patterns can help when deploying governance practices. Similar patterns are available to evaluate regulatory compliance using tags.
Automation: A proper organizational scheme allows you to take advantage of automation as part of resource creation, operational monitoring, and the creation of DevOps processes. It also makes resources easier for IT to manage.
Workload optimization: Tagging can help identify patterns and resolve broad issues. Tag can also help identify the assets required to support a single workload. Tagging all assets associated with each workload enables deeper analysis of your mission-critical workloads to make sound architectural decisions.
What is network latency?
The cost incurred by the data travelling over the network
The maximum amount of data that can travel over the network
The distance the data travel over the network
The time it takes for data to travel over the network
The time it takes for data to travel over the network
Explanation:
Network latency is the time it takes for data or a request to go from the source to the destination. Latency in networks is measured in milliseconds.
Which of the following services allows you to easily run popular open source frameworks including Apache Hadoop, Spark, and Kafka for open source analytics?
Azure Data Lake Analytics
Azure Cosmos DB
Azure Cognitive Services
Azure HDInsight
Azure HDInsight
Explanation:
We can easily run popular open source frameworks—including Apache Hadoop, Spark, and Kafka—using Azure HDInsight, a cost-effective, enterprise-grade service for open source analytics. Effortlessly process massive amounts of data and get all the benefits of the broad open source ecosystem with the global scale of Azure.
You are an IT manager and want to ensure that you are notified when the Azure spending reaches a certain threshold. Which feature of Azure Cost Management should you use?
Cost analysis
Department spending quota alerts
Budgets
Cost alerts
Budgets
Explanation:
Budgets is the correct answer. Budgets in Azure Cost Management allow you to set a spending limit for Azure based on a subscription, resource group, service type, or other criteria. You can also set a budget alert, which will notify you when the budget reaches the defined alert level.
How does the “compute” layer contribute to the defense-in-depth strategy?
It ensures that services are secure and free of vulnerabilities.
It focuses on securing virtual machines and access to them.
It prevents unauthorized physical access to hardware.
It secures access to physical data centers.
It focuses on securing virtual machines and access to them.
Explanation:
From the official docs: The focus in this layer is on making sure that your compute resources are secure and that you have the proper controls in place to minimize security issues.
At this layer, it’s important to:
Secure access to virtual machines.
Implement endpoint protection on devices and keep systems patched and current.
Therefore, the “compute” layer in the defense-in-depth model concentrates on securing access to virtual machines and ensuring they are properly protected. It involves implementing security controls and measures within the virtual machine environment. This is the best option out of the ones given.
A Network Security Group (NSG) has the ability to encrypt data at rest and in transit.
No
Yes
No
Explanation:
No, a Network Security Group (NSG) DOES NOT encrypt traffic.
In an Azure virtual network, which of the following is used to filter network traffic between subnets?
Azure Load Balancer
Azure Firewall
Network Security Group
Azure Application Gateway
Network Security Group
Explanation:
Network Security Group is the correct answer.
A Network Security Group (NSG) is a basic form of firewall that can be used to filter network traffic between subnets in an Azure virtual network. NSGs are used to define inbound and outbound traffic rules that control the flow of traffic to and from resources in a virtual network.
Other options -
Azure Firewall: It is a firewall service that can be used to filter network traffic, and is typically used to protect virtual networks from external threats and to enforce network security policies. However, Azure Firewall is not typically used to filter network traffic between subnets in an Azure virtual network. This is because Network Security Group (NSG) is the recommended method for filtering network traffic within a virtual network.
Azure Application Gateway: It provides application-level load balancing and routing, but is not used to filter network traffic between subnets in an Azure virtual network. It is focused on providing routing and load balancing for web traffic, rather than network traffic.
Azure Load Balancer: It can be used to distribute incoming traffic across multiple virtual machines or instances within a Virtual Network, but is not used to filter network traffic between subnets in an Azure virtual network. It provides a load balancing service, rather than a filtering service.
ExpressRoute connections go over the public Internet, and they offer more reliability, faster speeds, and lower latencies than typical Internet connections.
No
Yes
No
Explanation:
No, it is false that ExpressRoute connections go over the public Internet. However, they do offer more reliability, faster speeds, and lower latencies than typical Internet connections.
Which of the following Azure services offers a dedicated physical server to host your virtual machines?
Azure Bare Metal
Azure Virtual Dedicated Host
Azure Virtual Machines
Azure Dedicated Host
Azure Dedicated Host
Explanation:
Azure Dedicated Host is the correct answer.
Azure Dedicated Host is an Azure service that offers a dedicated physical server to host your virtual machines. With Azure Dedicated Host, you can control the underlying host infrastructure and manage host maintenance operations such as updates and reboots. You can also select the number of cores, amount of memory, and types of storage devices that best suit your workloads.
Other options -
Azure Virtual Machines: This is a cloud-based infrastructure as a service (IaaS) offering that provides virtual machines for running applications and services. However, Azure Virtual Machines do not offer dedicated physical servers.
Azure Virtual Dedicated Host: This is not a valid Azure service.
Azure Bare Metal: This is a term that generally refers to a physical server or machine without a hypervisor layer. While Azure provides access to virtual machines with a range of hardware specifications, Azure Bare Metal is not a specific service that provides dedicated physical servers.
Microsoft Azure services operated by ____________ in China.
Alibaba
Xiaomi
21Vianet
Morgan Stanley
21Vianet
Explanation:
Microsoft Azure operated by 21Vianet is the first international public cloud service that has been commercialized in China in compliance with Chinese laws and regulations.
_________________ is a hosting service for Domain Name System domains that provides name resolution by using Microsoft Azure infrastructure.
Azure ExpressRoute
Azure DNS
Azure VPN Gateway
Azure Virtual Subnets
Azure DNS
Explanation:
Azure DNS is a hosting service for DNS domains that provides name resolution by using Microsoft Azure infrastructure. By hosting your domains in Azure, you can manage your DNS records by using the same credentials, APIs, tools, and billing as your other Azure services.