Updated 2025 Most Tested Questions With Detailed Answers
We are trying to apply a tag to a resource group and need the appropriate permissions using
the philosophy of least privileges. Which answer below would be the most appropriate? -
answers-You are assigned the Contributor role in RBAC.
We have reached the CPU quota in the West US 2 region. What two options do we have to
move forward when creating this virtual machine? - answers--Request a quota increase.
-Delete other running VMs.
What types of files are Azure Resource Manager (ARM) templates? - answers-JSON
Which of the following allows a user to access both cloud and on-premises applications through
an external URL or an internal application portal securely after a single sign-on to Azure AD? -
answers-Active Directory's Application Proxy
What PowerShell command prompts the user for either a password or a username and
password? - answers-Get-Credential
Which of the users below can perform domain management tasks in Azure Active Directory
(AAD)? - answers-A user account with global administrator permissions
We are adding tags to our resources to provide a taxonomy to our environments and create a
better organization. We have about 20 tags for every resource to ensure that we categorize
everything correctly. Is there anything that could go wrong when applying all 20 tags to our
storage accounts? - answers-Nothing will go wrong because we are allowed up to 50 tags for the
storage account.
,Can you add an existing VM to an availability set? - answers-No. You can only add a VM to an
availability set when creating the VM.
Which of the following would you need to configure in the virtual network? - answers-A
gateway subnet
(For the Virtual network, you need to have a gateway subnet for the Virtual network gateway)
You have to ensure that users can communicate with the virtual machine "CertGlobalapi" on
port number 80. You decide to create an Outbound rule in the Network Security Group attached
to the network interface attached to the virtual machine.
Would this fulfill the requirement? - answers-No
(You need to add an Inbound security rule and not an Outbound Security rule.)
A company has created a storage account in their Azure subscription. The name of the storage
account is CertGlobalstore. They have also created a file share named demo. They need to
access the files in the file share via a UNC path.
You need to fill in the following blocks to ensure the right UNC path is provided... - answers-To
work with UNC path format, you have to mount the Azure file share with File Explorer and the
UNC path format is:
, You are an IT Administrator, and you are concerned about protecting corporate assets and
devices meeting standards for security and compliance. What options are available to get a
device under the control of Azure AD? - answers--Registering the device to Azure AD.
-Joining a device.
Which of the following is the Kubernetes agent that processes the orchestration requests from
the cluster master, and schedules running the requested containers? - answers-Kubelet
You have a MySQL database on a Linux instance. The MySQL database is in development and
being worked on by your developers. Only the developers should have access to this database
while it is in the development stage. Which of the following actions will ensure that only the
developers can access the database? - answers-Setting the NSG rules that only allow traffic from
the developers
If we want to have an image of the operating system (OS) and all disks attached, which of the
following would be the preferred image? - answers-Vm image (specialized)
You have four different storage accounts. If you want to limit access to a team of people within
the organization to just one storage service on one storage account, with the least amount of
work, which of the following would be used to accomplish this goal? - answers-SAS service
Which series would we choose if we had a virtual machine used for Artificial Intelligence (AI)? -
answers-H-series
You are configuring networking for the Azure Kubernetes service. Which of the following maps
incoming direct traffic to the pods? - answers-NodePort