DDoS attacks but does not provide mitigation reporting.D. No change is needed.
1 29. Which of the following is an example of authorization?A. Providing a username and password when logging in to your deviceB. Receiving a text message on your mobile device after providing a username and password for a websiteC. Presenting a passport to enter another countryD. Presenting a visa to enter another country
1 30. Which of the following capabilities requires Azure AD Premium?A. Enabling users to reset their own Azure AD passwordsB. Enabling users to reset their own on‐premises passwordsC. Controlling access to resources in Azure through role‐based access control (RBAC)D. All of the above
1 31. Which of the following Azure services offers security recommendations for improving security in your Azure environment?A. Azure Advanced Threat Protection (ATP)B. Azure Information Protection (AIP)C. Azure Security CenterD. Azure Service Health
1 32. You are a developer and need to store security credentials for a web application in a secure store in Azure. Which of the following meets this need?A. Azure AD PremiumB. Security CenterC. Azure Credential ManagerD. Azure Key Vault
1 33. Your CIO has directed you to implement a solution that enables your organization to protect emails and documents using policies, identities, and encryption. Which of the following satisfies this requirement?A. Azure Advanced Threat Protection (ATP)B. Azure PoliciesC. Azure InitiativesD. Azure Information Protection (AIP)
1 34. Because of a recent network intrusion, you need to present a solution to your CIO that will enable your organization to identify pass‐the‐hash and reconnaissance attacks. Which of the following is an appropriate solution?A. Windows DefenderB. Advanced Threat ProtectionC. Azure Information ProtectionD. Security Center
1 35. Is the underlined portion of the following statement true, or does it need to be replaced with one of the other fragments that appear below?A honeytoken attack tests multiple passwords against a username.A. attempts authentication against an alphabetical list of usernames.B. is an attempt to log in to a fake account that you have created.C. is an example of a pass‐the‐token attack.D. No change is needed.
1 36. Which of the following would you use to ensure that the VMs added to a resource group do not exceed certain limits for the number of CPU cores and memory?A. Azure InitiativesB. Azure Configuration ManagerC. Azure PoliciesD. Resource Locks
1 37. Is the underlined portion of the following statement true, or does it need to be replaced with one of the other fragments that appear below?Azure Policies enable you to specify what actions a user can take with a resource in Azure after they have authenticated in Azure.A. apply policies to a single resource or to a resource group, with the latter causing all resources in the group to have the policy applied.B. create policies in Security Center to control access to specific Azure resources.C. deploy specific sets of RBAC permissions to new Azure users.D. No change is needed.
1 38. Which of the following would you use to prevent resources in a resource group from being deleted?A. Role‐based access control (RBAC)B. PoliciesC. Resource locksD. Azure Information Protection (AIP)
1 39. Which of the following should you use to implement a large, repeatable deployment of resources in Azure with associated role assignments and policies?A. Azure PowerShellB. Azure CLIC. Azure InitiativesD. Azure Blueprints
1 40. Which of the following accurately describes Azure Monitor?A. Azure Monitor supports only Windows operating systems and SUSE Linux.B. Azure Monitor begins monitoring a resource as soon as you create the resource.C. Azure Monitor is a component service of Azure Telemetry and Reporting.D. Azure Monitor requires you to create logs and metrics to begin monitoring resources.
1 41. Which of the following would you use to view status information about resources that your organization hosts in Azure?A. Azure PowerShellB. Azure Service HealthC. Azure portalD. Azure Security Center
1 42. Which of the following should you use to view information about planned maintenance in Azure?A. Azure AdvisorB. Azure Update CenterC. Azure Service HealthD. None of the above
1 43. Which of the following is not an example of a standards‐based, nonregulatory organization or agency?A. GDPRB. ISOC. NISTD. All of the above
1 44. Which of the following statements are not true? (Choose all that apply.)A. Microsoft can share your personal information with vendors and third parties only with your authorization.B. You must provide personal information to use some Microsoft products.C. You cannot use a work email when setting up a Microsoft account that you will then use to access Microsoft services.D. You can use a personal email account when setting up a Microsoft account that you will then use to access Microsoft services.
1 45. Which of the following provides bidirectional communication between Internet of Things (IoT) devices and other Azure services?A. IoT HubB. IoT CentralC. IoT ConnectorD. None of the above
1 46. Which of the following would enable your organization to monitor and control thousands of sensors deployed in a manufacturing facility, including analyzing telemetry from the sensors?A. IoT HubB. IoT CentralC. IoT ConnectorD. Azure Sphere
1 47. Your organization needs to implement a solution that analyzes photos and videos. Which of the following should you consider as a solution?A. Azure Machine LearningB. Machine Learning StudioC. Cognitive ServicesD. Azure Analytics
1 48. Which of the following would you choose to add natural language question and answer capabilities to a web application?A. Azure Machine LearningB. Azure Cognitive ServicesC. Azure Bot ServicesD. Logic Apps
1 49. Which of the following enables developers to create serverless workflow solutions in Azure?A. Logic AppsB. FunctionsC. Bot ServicesD. PowerShell
1 50. Is the underlined portion of the following statement true, or does it need to be replaced with one of the other fragments that appear below?Azure Functions is a solution for creating serverless, stateless functions that can be called from other Azure services to perform data processing.A. a solution for building workflow‐based functions that integrate with other Azure services to perform data processing.B. a component of Azure DevOps that helps simplify development and deployment of serverless, stateful functions for data processing. C. a library of functions you can implement in your web applications to monitor and manage Azure services.D. No change is needed.
1 51. Which of the following is a popular code repository for open source software development?A. Azure DevTest LabsB. Azure DevOpsC. GitHubD. Azure Artifacts
1 52. Your CIO has asked you to investigate Azure as an alternative to hosting resources in your on‐premises data center. What is the first action you need to take before creating resources in Azure?A. Create a storage account.B. Create an account in Azure AD.C. Create an Azure subscription.D. Create an Azure AD tenant.
1 53. Is the underlined portion of the following statement true, or does it need to be replaced with one of the other fragments that appear below?You can purchase Azure services only through an enterprise agreement (EA).A. as a component of your Unified Support agreement with Microsoft.B. directly from Microsoft through the Azure portal.C. only through a cloud solution provider (CSP).D. No change is needed.
1 54. You have been tasked by the director of infrastructure at your organization to estimate the cost of moving a data center from on‐premises to Azure. Which of the following should you use to estimate the cost?A. Azure AdvisorB. Pricing CalculatorC. TCO CalculatorD. Azure Migration Planner
1 55. Which of the following should you use to estimate the cost of storage that you will include with three new VMs that you need to deploy to Azure?A. Pricing CalculatorB. Storage CalculatorC. TCO CalculatorD. Azure Advisor
1 56. Which of the following statements is not true?A. Azure Advisor provides recommendations for cost management.B.