Microsoft AZ900 Exam Dumps|QAs Page -11

Last updated on October 16th, 2024 at 03:55 pm

Microsoft AZ900 Exam Dumps post contains real and latest questions for Microsoft Azure Fundamentals.

Microsoft AZ900 Exam Dumps

Microsoft AZ900 Exam Dumps – QAs 251-275

Q251. Which two types of customers are eligible to use Azure Government to develop a cloud solution? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

  1. a Canadian government contractor
  2. a European government contractor
  3. a United States government entity
  4. a United States government contractor
  5. a European government entity
Correct Answer

3. a United States government entity
4. a United States government contractor

References:
https://docs.microsoft.com/en-us/learn/modules/intro-to-azure-government/2-what-is-azure-government

Q252. HOTSPOT –
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

az-900 question 252
Correct Answer
az-900 answer 252

Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-getstarted
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-methods

Q253. HOTSPOT –
To complete the sentence, select the appropriate option in the answer area.
Hot Area:

az-900 question 253
Correct Answer
az-900 answer 253

Reference:
https://docs.microsoft.com/en-us/azure/virtual-network/security-overview

Q254. A company is evaluating Microsoft Azure Conditional Access policies.
You reed to determine which scenarios Conditional Access policies support.
Which three scenarios should you select? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

  1. Multi-factor authentication
  2. Self-service password reset capabilities
  3. Hybrid Azure Active Directory joined device
  4. Blocked access to Microsoft 365 services for unverified users
  5. BitLocker deployment
Correct Answer

1. Multi-factor authentication
3. Hybrid Azure Active Directory joined device
4. Blocked access to Microsoft 365 services for unverified users

Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-access-conditions

Q255. You have an Azure environment that contains 10 virtual networks and 100 virtual machines.
You need to limit the amount of inbound traffic to all the Azure virtual networks.
What should you create?

  1. one application security group (ASG)
  2. 10 virtual network gateways
  3. 10 Azure ExpressRoute circuits
  4. one Azure firewall
Correct Answer

4. one Azure firewall

References:
https://docs.microsoft.com/en-us/azure/firewall/overview

  1. no change is needed
  2. only enterprises that are registered in Germany
  3. only enterprises that purchase their azure licenses from a partner based in Germany
  4. any user or enterprise that requires its data to reside in Germany
Correct Answer

4. any user or enterprise that requires its data to reside in Germany

References:
https://docs.microsoft.com/en-us/azure/germany/germany-welcome?toc=%2fazure%2fgermany%2ftoc.json
https://docs.microsoft.com/en-us/azure/germany/germany-overview-data-trustee

Q257. You plan to deploy several Azure virtual machines.
You need to control the ports that devices on the Internet can use to access the virtual machines.
What should you use?

  1. a network security group (NSG)
  2. an Azure Active Directory (Azure AD) role
  3. an Azure Active Directory group
  4. an Azure key vault
Correct Answer

1. a network security group (NSG)

References:
https://docs.microsoft.com/en-us/azure/virtual-network/security-overview

Q258. HOTSPOT –
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

az-900 question 258
Correct Answer
az-900 answer 258

Q259. HOTSPOT –
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

az-900 question 259
Correct Answer
az-900 answer 259

Reference:
https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#owner

Q260. HOTSPOT –
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

az-900 question 260
Correct Answer
az-900 answer 260

Reference:
https://docs.microsoft.com/en-us/azure/virtual-network/network-security-group-how-it-works

Q261. HOTSPOT –
To complete the sentence, select the appropriate option in the answer area.
Hot Area:

az-900 question 261
Correct Answer
az-900 answer 261

Reference:
https://docs.microsoft.com/en-us/azure/information-protection/what-is-information-protection
https://docs.microsoft.com/en-us/azure/information-protection/infoprotect-quick-start-tutorial

Q262. HOTSPOT –
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

az-900 question 262
Correct Answer
az-900 answer 262

References:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-sync-whatis
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-fed
https://docs.microsoft.com/en-us/azure/active-directory/develop/authentication-scenarios

Q263. HOTSPOT –
To complete the sentence, select the appropriate option in the answer area.
Hot Area:

az-900 question 263
Correct Answer
az-900 answer 263

Reference:
https://docs.microsoft.com/en-us/azure/security-center/security-center-intro

Q264. What should you use to evaluate whether your company’s Azure environment meets regulatory requirements?

  1. Azure Service Health
  2. Azure Knowledge Center
  3. Azure Security Center
  4. Azure Advisor
Correct Answer

3. Azure Security Center

Reference:
https://docs.microsoft.com/en-us/azure/security-center/security-center-intro

Q265. You need to collect and automatically analyze security events from Azure Active Directory (Azure AD).
What should you use?

  1. Azure Sentinel
  2. Azure Synapse Analytics
  3. Azure AD Connect
  4. Azure Key Vault
Correct Answer

1. Azure Sentinel

Reference:
https://docs.microsoft.com/en-us/azure/sentinel/overview

Q266. Your company plans to automate the deployment of servers to Azure.
Your manager is concerned that you may expose administrative credentials during the deployment.
You need to recommend an Azure solution that encrypts the administrative credentials during the deployment.
What should you include in the recommendation?

  1. Azure Multi-Factor Authentication (MFA)
  2. Azure Information Protection
  3. Azure Security Center
  4. Azure Multi-Factor Authentication (MFA)
Correct Answer

1. Azure Multi-Factor Authentication (MFA)

References:
https://docs.microsoft.com/en-us/azure/key-vault/key-vault-overview

Q267. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your Azure environment contains multiple Azure virtual machines.
You need to ensure that a virtual machine named VM1 is accessible from the Internet over HTTP.
Solution: You modify a network security group (NSG).
Does this meet the goal?

  1. Yes
  2. No
Correct Answer

1. Yes

References:
https://docs.microsoft.com/en-us/azure/virtual-network/security-overview

Q268. This question requires that you evaluate the underlined text to determine if it is correct.
Azure Key Vault is used to store secrets for Azure Active Directory (Azure AD) user accounts.
Instructions: Review the underlined text. If it makes the statement correct, select `No change is needed`. If the statement is incorrect, select the answer choice that makes the statement correct.

  1. No change is needed
  2. Azure Active Directory (Azure AD) administrative accounts
  3. Personally Identifiable Information (PII)
  4. server applications
Correct Answer

4. server applications

Reference:
https://docs.microsoft.com/en-us/learn/modules/manage-secrets-with-azure-key-vault/2-what-is-key-vault
https://docs.microsoft.com/en-us/azure/key-vault/key-vault-overview
https://docs.microsoft.com/en-us/learn/modules/manage-secrets-with-azure-key-vault/

Q269. HOTSPOT –
To complete the sentence, select the appropriate option in the answer area.
Hot Area:

az-900 question 269
Correct Answer
az-900 answer 269

Reference:
https://docs.microsoft.com/en-us/azure/security-center/security-center-just-in-time?tabs=jit-config-asc%2Cjit-request-asc

Q270. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your Azure environment contains multiple Azure virtual machines.
You need to ensure that a virtual machine named VM1 is accessible from the Internet over HTTP.
Solution: You modify a DDoS protection plan.
Does this meet the goal?

  1. Yes
  2. No
Correct Answer

2. No

References:
https://docs.microsoft.com/en-us/azure/virtual-network/ddos-protection-overview

Q271. HOTSPOT –
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

az-900 question 271
Correct Answer
az-900 answer 271

References:
https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-activity-logs-azure-monitor
https://docs.microsoft.com/en-us/azure/azure-monitor/overview

Q272. HOTSPOT –
You create a resource group named RG1 in Azure Resource Manager.
You need to prevent the accidental deletion of the resources in RG1.
Which setting should you use? To answer, select the appropriate setting in the answer area.
Hot Area:

az-900 question 272
Correct Answer
az-900 answer 272

Reference:
https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-group-lock-resources

Q273. To what should an application connect to retrieve security tokens?

  1. an Azure Storage account
  2. Azure Active Directory (Azure AD)
  3. a certificate store
  4. an Azure key vault
Correct Answer

4. an Azure key vault

Reference:
https://docs.microsoft.com/en-us/learn/modules/manage-secrets-with-azure-key-vault/2-what-is-key-vault
https://docs.microsoft.com/en-us/azure/key-vault/key-vault-overview

Q274. You need to ensure that when Azure Active Directory (Azure AD) users connect to Azure AD from the Internet by using an anonymous IP address, the users are prompted automatically to change their password.
Which Azure service should you use?

  1. Azure AD Connect Health
  2. Azure AD Privileged Identity Management
  3. Azure Advanced Threat Protection (ATP)
  4. Azure AD Identity Protection
Correct Answer

4. Azure AD Identity Protection

References:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-sign-in-risk-policy

Q275. What should you use to evaluate whether your company’s Azure environment meets regulatory requirements?

  1. Azure Service Health
  2. Azure Knowledge Center
  3. Microsoft Defender for Cloud
  4. Azure Advisor
Correct Answer

3. Microsoft Defender for Cloud

Reference:
https://docs.microsoft.com/en-us/azure/defender-for-cloud/regulatory-compliance-dashboard

Scroll to Top