CS & IT

AZ-900 Microsoft Azure Fundamentals Test 4

AZ-900 Microsoft Azure Fundamentals Test 4

Google Ads:

Complete the sentence: You can enable just in time (JIT) VM access by using ...............

Correct! Wrong!

Your Azure environment contains multiple Azure virtual machines. You need to ensure that a virtual machine named VM1 is accessible from the Internet over HTTP. What is possible solutions?

Correct! Wrong!

Complete the sentence: After you create the vitual machine, you need to modify the.....................

Correct! Wrong!

You plan to deploy several Azure virtual machines. You need to control the ports that devices on the Internet can use to access the virtual machines. What should you use?

Correct! Wrong!

Advertisement

Your company plans to automate the deployment of servers to Azure. Your manager is concerned that you may expose administrative credentials during the deployment. You need to recommend an Azure solution that encrypts the administrative credentials during the deployment. What should you include in the recommendation?

Correct! Wrong!

Azure Key Vault is a secure store for storage various types of sensitive information. In this question, we would store the administrative credentials in the Key Vault. With this solution, there is no need to store the administrative credentials as plain text in the deployment scripts. All information stored in the Key Vault is encrypted. Azure Key Vault can be used to Securely store and tightly control access to tokens, passwords, certificates, API keys, and other secrets. Secrets and keys are safeguarded by Azure, using industry-standard algorithms, key lengths, and hardware security modules (HSMs). The HSMs used are Federal Information Processing Standards (FIPS) 140-2 Level 2 validated. Access to a key vault requires proper authentication and authorization before a caller (user or application) can get access. Authentication establishes the identity of the caller, while authorization determines the operations that they are allowed to perform.

Complete the sentence: From .................. you can view which user turned off specific virtual machine during the last 14 days

Correct! Wrong!

Your company plans to deploy several web servers and several database servers to Azure. You need to recommend an Azure solution to limit the types of connections from the web servers to the database servers. What should you include in the recommendation?

Correct! Wrong!

A network security group works like a firewall. You can attach a network security group to a virtual network and/or individual subnets within the virtual network. You can also attach a network security group to a network interface assigned to a virtual machine. You can use multiple network security groups within a virtual network to restrict traffic between resources such as virtual machines and subnets. You can filter network traffic to and from Azure resources in an Azure virtual network with a network security group. A network security group contains security rules that allow or deny inbound network traffic to, or outbound network traffic from, several types of Azure resources.

Which service provides network traffic filtering across multiple Azure subscriptions and virtual networks?

Correct! Wrong!

Advertisement

Which Azure service should you use to store certificates?

Correct! Wrong!

You need to configure an Azure solution that meets the following requirements: Secures websites from attacks Generates reports that contain details of attempted attacks. What should you include in the solution?

Correct! Wrong!

Click Next Button or HERE for more Questions

Related Articles

Back to top button

You cannot copy content of this page

error: Content is protected !!
Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Adblock Detected

Please consider supporting us by disabling your ad blocker