ExamGecko

Microsoft AZ-900 Practice Test - Questions Answers, Page 11

Question list
Search
Search

Related questions











HOTSPOT

To complete the sentence, select the appropriate option in the answer area.


Question 101
Correct answer: Question 101

Explanation:

You can configure a lock on a resource group to prevent the accidental deletion of the resource group. The lock applies to everyone, including global administrators. If you want to delete the resource group, the lock must be removed first.

As an administrator, you may need to lock a subscription, resource group, or resource to prevent other users in your organization from accidentally deleting or modifying critical resources. You can set the lock level to CanNotDelete or ReadOnly. In the portal, the locks are called Delete and Read-only respectively.

CanNotDelete means authorized users can still read and modify a resource, but they can't delete the resource. ReadOnly means authorized users can read a resource, but they can't delete or update the resource. Applying this lock is similar to restricting all authorized users to the permissions granted by the Reader role.

Reference:

https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-group-lock-resources

HOTSPOT

To complete the sentence, select the appropriate option in the answer area.


Question 102
Correct answer: Question 102

Explanation:

You would use the Azure Activity Log, not Access Control to view which user turned off a specific virtual machine during the last 14 days.

Activity logs are kept for 90 days. You can query for any range of dates, as long as the starting date isn't more than 90 days in the past.

In this question, we would create a filter to display shutdown operations on the virtual machine in the last 14 days.

Reference:

https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-group-audit

HOTSPOT

To complete the sentence, select the appropriate option in the answer area.


Question 103
Correct answer: Question 103

Explanation:

Azure Information Protection is used to automatically add a watermark to Microsoft Word documents that contain credit card information.

You use Azure Information Protection labels to apply classification to documents and emails. When you do this, the classification is identifiable regardless of where the data is stored or with whom it’s shared. The labels can include visual markings such as a header, footer, or watermark.

Labels can be applied automatically by administrators who define rules and conditions, manually by users, or a combination where users are given recommendations. In this question, we would configure a label to be automatically applied to Microsoft Word documents that contain credit card information. The label would then add the watermark to the documents.

Reference:

https://docs.microsoft.com/en-us/azure/information-protection/what-is-information-protection

https://docs.microsoft.com/en-us/azure/information-protection/infoprotect-quick-start-tutorial

HOTSPOT

To complete the sentence, select the appropriate option in the answer area.


Question 104
Correct answer: Question 104

Explanation:

The VNet will be marked as ‘Non-compliant’ when the policy is assigned. However, it will not be deleted and will continue to function normally. Azure Policy is a service in Azure that you use to create, assign, and manage policies. These policies enforce different rules and effects over your resources, so those resources stay compliant with your corporate standards and service level agreements.

If there are any existing resources that aren't compliant with a new policy assignment, they appear under Non-compliant resources.

References:

https://docs.microsoft.com/en-us/azure/governance/policy/overview

https://docs.microsoft.com/en-us/azure/governance/policy/assign-policy-portal

HOTSPOT

To complete the sentence, select the appropriate option in the answer area.


Question 105
Correct answer: Question 105

Explanation:

Authentication, not authorization is the process of verifying a user’s credentials.

The difference between authentication and authorization is:

Authentication is proving your identity, proving that you are who you say you are. The most common example of this is logging in to a system by providing credentials such as a username and password. Authorization is what you’re allowed to do once you’ve been authenticated. For example, what resources you’re allowed to access and what you can do with those resources.

HOTSPOT

To complete the sentence, select the appropriate option in the answer area.


Question 106
Correct answer: Question 106

Explanation:

If the SLA for an Azure service is not met, you receive credits for that service and that service only. The credits are deducted from your monthly bill for that service. If you stopped using the service where the SLA was not met, your account would remain in credit for that service. The credits would not be applied to any other services that you may be using.

Service Credits apply only to fees paid for the particular Service, Service Resource, or Service tier for which a Service Level has not been met. In cases where Service Levels apply to individual Service Resources or to separate Service tiers, Service Credits apply only to fees paid for the affected Service Resource or Service tier, as applicable. The Service Credits awarded in any billing month for a particular Service or Service Resource will not, under any circumstance, exceed your monthly service fees for that Service or Service Resource, as applicable, in the billing month.

References:

https://azure.microsoft.com/en-gb/support/legal/sla/analysis-services/v1_0/

HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Question 107
Correct answer: Question 107

HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Question 108
Correct answer: Question 108

HOTSPOT

Several support engineers plan to manage Azure by using the computers shown in the following table:

You need to identify which Azure management tools can be used from each computer. What should you identify for each computer? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point


Question 109
Correct answer: Question 109

HOTSPOT

To complete the sentence, select the appropriate option in the answer area.


Question 110
Correct answer: Question 110

Explanation:

Azure Site Recovery helps ensure business continuity by keeping business apps and workloads running during outages. Site Recovery replicates workloads running on physical and virtual machines (VMs) from a primary site to a secondary location.

Reference:

https://docs.microsoft.com/en-us/azure/site-recovery/site-recovery-overview

Total 478 questions
Go to page: of 48