Practice Assessment for Exam AZ-900: Microsoft Azure Fundamentals Flashcards
Which two factors affect Azure costs? Each correct answer presents a complete solution.
Select all answers that apply.
availability zone selection
date and time of use
resource location
resource usage
resource location
resource usage
Explanation:
Usage meters, such as CPU time, disk size, and write operations, are used to calculate your bill for an Azure resource. Deleting or deallocating a resource means that you will no longer be billed for it. Different regions can have different associated prices. Resources cost the same no matter the time of day or the day of the week.
Which are two common scenarios for using resource tags? Each correct answer presents a complete solution.
Select all answers that apply.
associating costs with different environments
categorizing costs by department
identifying lower cost regions
resizing underutilized virtual machines
associating costs with different environments
categorizing costs by department
Explanation:
You can use tags to categorize costs by department, such as human resources, marketing, or finance, or by environment, such as test or production. Resizing underutilized virtual machines is a good cost saving measure and provisioning resources in lower cost regions is a good practice, but resource tags do not help with this.
What can you use to ensure that new and existing Azure resources stay in compliance with corporate standards?
Select only one answer.
Azure Advisor
Azure Policy
resource locks
resource tags
Azure Policy
Explanation:
Azure Policy is a service in Azure that enables you to create, assign, and manage policies that control or audit resources. These policies enforce different rules across all resource configurations so that the configurations stay compliant with corporate standards.
You need to recommend a solution for Azure virtual machine deployments. The solution must enforce company standards on the virtual machines.
What should you include in the recommendation?
Select only one answer.
Microsoft Intune compliance policy
Azure Cost Management
Azure Lock
Azure Policy
Azure Policy
Explanation:
Azure policies will allow you to enforce company standards on new virtual machines when combined with Azure VM Image Builder and Azure Compute Gallery. By using Azure Policy and role-based access control (RBAC) assignments, enterprises can enforce standards on Azure resources. But on virtual machines, these mechanisms only affect the control plane or the route to the virtual machine.
You need to ensure that multi-factor authentication (MFA) is enabled on accounts with write permissions in an Azure subscription.
What should you implement?
Select only one answer.
Azure Policy
resource locks
resource tags
Cloud Adoption Framework
Azure Policy
Explanation:
Azure Policy is a service in Azure that enables you to create, assign, and manage policies that control or audit resources.
What can you use to ensure that a development team can only create virtual machines of a certain size?
Select only one answer.
Azure Blueprints
Azure Policy
Cloud Adoption Framework
Conditional Access
Azure Policy
Explanation:
Azure Policy enables you to define both individual policies and groups of related policies called initiatives. Azure Policy evaluates your resources and highlights resources that are not compliant with the policies you created. Azure Policy can also prevent noncompliant resources from being created.
Which two actions can be performed by using Azure portal? Each correct answer presents a complete solution.
Select all answers that apply.
Change the availability zone of a virtual machine.
Create new resources.
Assign deny permission on a resource group
Create Microsoft Entra user
Create new resources.
Create Microsoft Entra user
Explanation:
The Azure portal provides a GUI to view all the services you are using, create new services, configure your services, and view reports.
Which management layer accepts requests from any Azure tool or API and enables you to create, update, and delete resources in an Azure account?
Select only one answer.
Azure CLI
Azure management groups
Azure Resource Manager (ARM)
Azure Sphere
Azure Resource Manager (ARM)
Explanation:
ARM is the deployment and management service for Azure. It provides a management layer that enables you to create, update, and delete resources in an Azure account.
Which two tools are accessible via Azure Cloud Shell to manage an Azure environment?
Select all answers that apply.
Azure CLI
Azure PowerShell
Azure Repos
Azure Resource Manager (ARM) templates
Azure CLI
Azure PowerShell
Explanation:
Azure CLI is an executable program with which a user can execute commands in Bash that call the Azure REST API. Azure Cloud Shell also supports Azure PowerShell as an executable program.
What should you use to access Azure Cloud Shell?
Select only one answer.
a web browser
Azure Resource Manager (ARM)
Microsoft Visual Studio Code
the command-line on a local computer
a web browser
Explanation:
Cloud Shell is an interactive, browser-accessible shell for managing Azure resources.
What can you use to create resources in Azure and includes a validation step to ensure all resources are created in a specific order based on dependencies, in parallel and idempotent?
Select only one answer.
Azure CLI
Azure PowerShell
Azure Resource Manager (ARM) templates
Azure REST API
Azure Resource Manager (ARM) templates
Explanation:
ARM templates define an application’s infrastructure requirements for a repeatable deployment that is done in a consistent manner. A validation step ensures that all resources can be created in the proper order based on dependencies, in parallel and idempotent.
Which two tools can you use to create a new Azure virtual machine from a mobile device that runs Android? Each correct answer presents complete solution.
Select all answers that apply.
PowerShell in Azure Cloud Shell
Remote Desktop
SSH
the Azure portal
PowerShell in Azure Cloud Shell
the Azure portal
Explanation:
The Azure portal can run on devices that have the Android operating system installed. The browser can be any type, such as Internet Explorer 11, Chrome, Firefox, or Safari (all the latest versions). When you visit the portal, you will see Cloud Shell. Users can then access Bash and PowerShell from within Cloud Shell. You can use Bash and PowerShell to create Azure virtual machines.
You have a team of Linux administrators that need to manage the resources in Azure. The team wants to use the Bash shell to perform the administration.
What should you recommend?
Select only one answer.
Azure Blueprint
Azure CLI
Azure Powershell
Azure Resource Manager (ARM) template
Azure CLI
Explanation:
Azure CLI allows you to use the Bash shell to perform administrative tasks. Bash is used in Linux environments, so a Linux administrator will probably be more comfortable performing command-line administration from Azure CLI.
You need to create a custom solution that uses thresholds to trigger autoscaling functionality to scale an app up or down to meet user demand.
What should you include in the solution?
Select only one answer.
Application insights
Azure Advisor
Azure Monitor
Azure Service Health
Azure Monitor
Explanation:
Azure Monitor is a platform that collects metric and logging data, such as CPU percentages. The data can be used to trigger autoscaling.
What should you proactively review and act on to avoid service interruptions, such as service retirements and breaking changes?
Select only one answer.
application insights
Azure Monitor
health advisories
service issues
health advisories
Explanation:
Health advisories are issues that require that you take proactive action to avoid service interruptions, such as service retirements and breaking changes. Service issues are problems such as outages that require immediate actions.
What can you use to find information about planned maintenance for Azure services that are critical to your organization?
Select only one answer.
Azure Advisor
Azure Monitor
Azure Service Health
Log Analytics
Azure Service Health
Explanation:
You can drill down to the affected services, regions, and details to show how an event will affect you and what you must do. Most of these events occur without any impact to you and will not be shown. In a rare case that a reboot is required, Service Health allows you to choose when to perform the maintenance to minimize the downtime
Which two attributes are characteristics of the private cloud deployment model? Each correct answer presents a complete solution.
Select all answers that apply.
Applications can be provisioned and deprovisioned quickly.
Hardware must be purchased.
Organizations only pay for what they use.
The company has complete control over physical resources and security.
Hardware must be purchased.
The company has complete control over physical resources and security.
Explanation:
In a private cloud, hardware must be purchased for start up and maintenance. In a private cloud, organizations control resources and security. Quick provisioning is a characteristic of the public cloud deployment model. Paying only for what is used is a characteristic of the public cloud deployment model.
What are two characteristics of the public cloud deployment model? Each correct answer presents a complete solution.
Select all answers that apply.
Computing resources are used exclusively by users from one organization.
Hardware is physically located in an organization’s on-site datacenter.
Servers and storage are owned and operated by a third-party cloud service provider.
Services are offered over the internet and are available to anyone who wants to purchase them.
Servers and storage are owned and operated by a third-party cloud service provider.
Services are offered over the internet and are available to anyone who wants to purchase them.
Explanation:
In a public cloud, services are offered over the internet and are available to anyone who wants to purchase them. A private cloud is limited to a single organization. Cloud resources, such as servers and storage, are owned and operated by a third-party cloud service provider and delivered over the internet. A private cloud consists of computing resources used exclusively by users from one business or organization.