AZ 900 Flashcards
Which Azure compute resource can be deployed to manage a set of identical virtual machines?
A) Virtual machine scale sets
B) Virtual machine availability sets
C) Virtual machine availability zones
A) Virtual machine scale sets
Which of the following services should be used when the primary concern is to perform work in response to an event (often via a REST command) that needs a response in a few seconds?
A) Azure Functions
B) Azure App Service
C) Azure Container Instances
A) Azure Functions
Your company has a team of remote workers that need to use Windows-based software to develop your company’s applications, but your team members are using various operating systems like MacOS, Linux, and Windows. Which Azure compute service would help resolve this scenario?
A) Azure App Service
B) Windows Virtual Desktop
C) Azure Container Instances
B) Windows Virtual Desktop
_____ is a managed service that’s hosted in the cloud and that acts as a central message hub for bi-directional communication between your IoT application and the devices it manages.
Azure IoT Hub
_____ builds on top of IoT Hub by adding a dashboard that allows you to connect, monitor, and manage your IoT devices.
Azure IoT Central
These are all functions of what Azure service?
- Connect new devices.
- Watch devices send telemetry or error messages.
- Watch overall performance across all devices in aggregate.
- Set up alerts that send notifications when a specific device needs maintenance.
- Push firmware updates to devices.
Azure IoT Central
_____ creates an end-to-end, highly secure IoT solution for customers that encompasses everything from the hardware and operating system on the device to the secure method of sending messages from the device to the message hub.
Azure Sphere
_____ has built-in communication and security features for internet-connected devices.
Azure Sphere
What three parts make Azure Sphere?
- Micro-Controller Unit
- Customized Linux Operating System
- Security Service (also known as AS3).
Which Azure service provides a preconfigured dashboard?
A) Azure Sphere
B) IoT Hub
C) IoT Central
C) IoT Central
A company wants to build a new voting kiosk for sales to governments around the world. Which IoT technologies should the company choose to ensure the highest degree of security?
A) Azure Sphere
B) IoT Hub
C) IoT Central
A) Azure Sphere
A company wants to quickly manage its individual IoT devices by using a web-based user interface. Which IoT technology should it choose?
A) Azure Sphere
B) Azure Hub
C) IoT Central
C) IoT Central
You want to send messages from the IoT device to the cloud and vice versa. Which IoT technology can send and receive messages?
A) Azure Sphere
B) IoT Hub
C) IoT Central
B) IoT Hub
_____ is a monitoring service that provides visibility of your security posture across all of your services, both on Azure and on-premises.
Azure Security Center
_____ is a measurement of an organization’s security posture.
Secure Score
The following solutions come with what Azure service?
- Just-in-time VM access
- Adaptive application controls
- Adaptive network hardening
- File integrity monitoring
Azure Security Center
_____ is Microsoft’s cloud-based SIEM system.
Azure Sentinel
_____ is a centralized cloud service for storing an application’s secrets in a single, central location. It provides secure access to sensitive information by providing access control and logging capabilities.
Azure Key Vault
What Azure service can provide the following solutions?
- Manage secrets
- Manage encryption keys
- Manage SSL/TLS certificates
- Store secrets backed by hardware security modules (HSMs)
Azure Key Vault
What Azure service provides the following solutions?
- Authentication
- Single sign-on
- Application management
- Device management
Azure AD
Azure AD _____ synchronizes user identities between on-premises Active Directory and Azure AD.
Connect
_____ is a tool that Azure Active Directory uses to allow (or deny) access to resources based on identity signals. These signals include who the user is, where the user is, and what device the user is requesting access from.
Conditional Access
_____ also provides a more granular multifactor authentication experience for users. For example, a user might not be challenged for second authentication factor if they’re at a known location. However, they might be challenged for a second authentication factor if their sign-in signals are unusual or they’re at an unexpected location.
Conditional Access