ExamGecko

Microsoft AZ-900 Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











DRAG DROP

Match the Azure service to the appropriate description.

To answer, drag the appropriate service from the column on the left to its description on the right. Each service may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.


Question 11
Correct answer: Question 11

DRAG DROP

You need to complete the defense-in-depth strategy used in a datacenter.

What should you do? To answer, drag the appropriate layers to the correct positions in the model. Each layer may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. NOTE: Each correct selection is worth one point.


Question 12
Correct answer: Question 12

Explanation:

Defence in depth layers (from bottom to top):

Data

Data

- In almost all cases attackers are after data.

- Data can be in database, stored on disk inside VMs, on a SaaS application such as Office 365 or in cloud storage. - Those storing and controlling access to data to ensures that it's properly secured

- Often regulatory requirements dictates controls & processes

- to ensure confidentiality, integrity, and availability.

Application

- Ensure applications are secure and free of vulnerabilities.

- Store sensitive application secrets in a secure storage medium.

- Make security a design requirement for all application development.

- Integrate security into the application development life cycle.

Compute

Compute

- Secure access to virtual machines.

- Implement endpoint protection and keep systems patched and current.

- Malware, unpatched systems, and improperly secured systems open your environment to attacks.

Networking

- Limit communication between resources.

- Deny by default.

- Allow only what is required

- Restrict inbound internet access and limit outbound, where appropriate.

- Implement secure connectivity to on-premises networks.

Perimeter

- Use distributed denial of service (DDoS) protection to filter large-scale attacks before they can cause a denial of service for end users. - Use perimeter firewalls to identify and alert on malicious attacks against your network.

Identity and access

- Control access to infrastructure and change control.

- Access granted is only what is needed

- Use single sign-on and multi-factor authentication.

- Audit events and changes.

Physical security

- Building security & controlling access to computing hardware.

- First line of defense.

Reference:

https://github.com/undergroundwires/Azure-in-bullet-points/blob/master/AZ-900%20Microsoft%20Azure%20Fundamentals/4.2.%20Defence%20in%20Depth.md

DRAG DROP

Match the serverless solution to the correct characteristic.

To answer, drag the appropriate serverless solution from the column on the left to its characteristic on the right. Each serverless solution may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.


Question 13
Correct answer: Question 13

Explanation:

Box 1: Azure Functions

Azure Functions allows you to implement your system's logic into readily available blocks of code called "functions". Different functions can run anytime you need to respond to critical events.

Box 2: Azure Functions

Azure Logic Apps can have multiple stateful and stateless workflows.

Box 3: Azure Logic Apps

Azure Logic Apps is a cloud-based platform for creating and running automated workflows that integrate your apps, data, services, and systems.

Reference:

https://docs.microsoft.com/en-us/azure/logic-apps/logic-apps-overview

https://docs.microsoft.com/en-us/azure/azure-functions/functions-overview

DRAG DROP

Match The cloud service models to the appropriate offerings.

To answer drag the appropriate model from the column on the left to its offering on the right. Each model may be used once, more than once, or not at all.

NOTE Each correct match is worth one point.


Question 14
Correct answer: Question 14

DRAG DROP

Match the cloud computing benefits to the correct descriptions.

To answer, drag the appropriate service from the column on the left to its description on the right. Each service may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point


Question 15
Correct answer: Question 15

DRAG DROP

Match the Azure governance feature to the correct description.

Instructions: To answer, drag the appropriate feature from the column on the left to its description on the right. Each feature may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.


Question 16
Correct answer: Question 16

DRAG DROP

Match the security components to the appropriate defense in depth layers.

To answer, drag the appropriate service from the column on the left to its description on the right. Each service may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point


Question 17
Correct answer: Question 17

DRAG DROP

Match the cloud computing benefits to the appropriate descriptions

To answer, drag the appropriate service from the column on the left to its description on the right. Each service may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point


Question 18
Correct answer: Question 18

DRAG DROP

Match the term to the appropriate description.

To answer, drag the appropriate term from the column on the left to its description on the right. Each term may be used once, more than once, or not at all. NOTE: Each correct match is worth one point.


Question 19
Correct answer: Question 19

DRAG DROP

Match the Azure storage services to the appropriate descriptions.

To answer, drag the appropriate storage service from the column on the left to its description on the right. Each service may be used once, more than once, or not at all. NOTE: Each correct match is worth one point.


Question 20
Correct answer: Question 20
Total 478 questions
Go to page: of 48