AZ-104: Microsoft Azure Administrator Full Course - Using Azure Portal

AZ-104: Microsoft Azure Administrator Full Course - Using Azure Portal

Assessment

Interactive Video

Information Technology (IT), Architecture, Other

University

Hard

Created by

Wayground Content

FREE Resource

The video tutorial provides a comprehensive guide on migrating server applications to Azure, focusing on creating and configuring virtual machines (VMs) using the Azure Portal. It covers the use of Azure CLI, PowerShell, and SDK for interaction, and explains the importance of subscriptions and resource groups. The tutorial details the steps to create a VM, including selecting regions, images, and sizes, and configuring advanced options like networking and monitoring. It concludes with instructions on managing and deleting resources to avoid unnecessary charges.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a method to interact with Azure?

Azure Desktop

Azure PowerShell

Azure CLI

Azure Portal

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a subscription in Azure?

To create virtual networks

To group resources for billing

To manage user accounts

To provide security settings

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why might an organization choose to have multiple subscriptions in Azure?

To increase storage capacity

To separate billing and resources by department

To enhance network speed

To simplify user management

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the benefit of using availability zones in Azure?

To reduce costs

To ensure application availability during data center outages

To simplify user access

To increase storage space

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which operating system is NOT mentioned as an option for Azure VM images?

Ubuntu

Windows

Red Hat

MacOS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential risk of opening the SSH port to all internet addresses?

Increased cost

Reduced performance

Security vulnerability

Limited access

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication method is NOT recommended for production environments?

Biometric authentication

SSH public key

Password-based authentication

Two-factor authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?