AZ-900 Microsoft Azure Fundamentals Test 4

AZ-900 Microsoft Azure Fundamentals Test 4

Google Ads:

Complete the sentence: From .................. you can view which user turned off specific virtual machine during the last 14 days

Correct! Wrong!

You plan to deploy several Azure virtual machines. You need to control the ports that devices on the Internet can use to access the virtual machines. What should you use?

Correct! Wrong!

Which service provides network traffic filtering across multiple Azure subscriptions and virtual networks?

Correct! Wrong!

Complete the sentence: After you create the vitual machine, you need to modify the.....................

Correct! Wrong!

Advertisement

Your Azure environment contains multiple Azure virtual machines. You need to ensure that a virtual machine named VM1 is accessible from the Internet over HTTP. What is possible solutions?

Correct! Wrong!

You need to configure an Azure solution that meets the following requirements: Secures websites from attacks Generates reports that contain details of attempted attacks. What should you include in the solution?

Correct! Wrong!

Complete the sentence: You can enable just in time (JIT) VM access by using ...............

Correct! Wrong!

Your company plans to automate the deployment of servers to Azure. Your manager is concerned that you may expose administrative credentials during the deployment. You need to recommend an Azure solution that encrypts the administrative credentials during the deployment. What should you include in the recommendation?

Correct! Wrong!

Azure Key Vault is a secure store for storage various types of sensitive information. In this question, we would store the administrative credentials in the Key Vault. With this solution, there is no need to store the administrative credentials as plain text in the deployment scripts. All information stored in the Key Vault is encrypted. Azure Key Vault can be used to Securely store and tightly control access to tokens, passwords, certificates, API keys, and other secrets. Secrets and keys are safeguarded by Azure, using industry-standard algorithms, key lengths, and hardware security modules (HSMs). The HSMs used are Federal Information Processing Standards (FIPS) 140-2 Level 2 validated. Access to a key vault requires proper authentication and authorization before a caller (user or application) can get access. Authentication establishes the identity of the caller, while authorization determines the operations that they are allowed to perform.

Advertisement

Which Azure service should you use to store certificates?

Correct! Wrong!

Your company plans to deploy several web servers and several database servers to Azure. You need to recommend an Azure solution to limit the types of connections from the web servers to the database servers. What should you include in the recommendation?

Correct! Wrong!

A network security group works like a firewall. You can attach a network security group to a virtual network and/or individual subnets within the virtual network. You can also attach a network security group to a network interface assigned to a virtual machine. You can use multiple network security groups within a virtual network to restrict traffic between resources such as virtual machines and subnets. You can filter network traffic to and from Azure resources in an Azure virtual network with a network security group. A network security group contains security rules that allow or deny inbound network traffic to, or outbound network traffic from, several types of Azure resources.

Click Next Button or HERE for more Questions

Check Also

Entrepreneurship MCQs with Answers Part # 3

Entrepreneurship MCQs with Answers Part 3 Question 101 to 120 Questions 121 to 150 For …

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

You cannot copy content of this page

Social Media Auto Publish Powered By : XYZScripts.com
error: Content is protected !!