AZ-900 Exam Overview
Prepare for the Microsoft AZ-900 certification exam
with our comprehensive study guide. This study material contains 428 practice questions
sourced from real exams and expert-verified for accuracy. Each question includes the correct answer
and a detailed explanation to help you understand the material thoroughly.
The AZ-900 exam — Microsoft Azure Fundamentals — is offered by Microsoft.
Passing this exam earns you the Microsoft Certified: Azure Fundamentals credential,
an industry-recognized certification that validates your expertise.
Our study materials were last updated on 2026-02-14 to reflect the
most recent exam objectives and content.
About the Microsoft Certified: Azure Fundamentals
The Microsoft Certified: Azure Fundamentals is awarded by Microsoft
to professionals who demonstrate competence in the skills measured by the AZ-900 exam.
According to the
official Microsoft certification page,
this certification validates your ability to work with the technologies covered in the exam objectives.
According to the
Global Knowledge IT Skills and Salary Report,
certified IT professionals earn 15-25% more than their non-certified peers.
Certifications from Microsoft are among the most recognized credentials in the IT industry,
with strong demand across enterprise organizations worldwide.
Free Sample — 15 Practice Questions
Preview 15 of 428 questions from the AZ-900 exam.
Try before you buy — purchase the full study guide for all 428 questions with answers and explanations.
Question 278
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Show Answer
Correct Answer: No
No
Yes
Explanation:
1) Session hosts are not limited to Windows 10 only; multiple Windows client and server OS versions are supported.
2) Host pool size does not cap total concurrent users; session limits are per session host and depend on configuration and VM sizing.
3) The service supports both full desktop virtualization and app virtualization (RemoteApps).
Question 302
To which cloud models can you deploy physical servers?
A. private cloud and hybrid cloud only
B. private cloud only
C. private cloud, hybrid cloud and public cloud
D. hybrid cloud only
Show Answer
Correct Answer: A
Explanation:
Deploying physical servers implies you are responsible for procuring, racking, and managing the hardware. This is possible in a private cloud, where an organization owns or exclusively controls the infrastructure, and in a hybrid cloud, which includes a private cloud component alongside public cloud resources. In a public cloud, customers do not deploy their own physical servers; they consume provider-managed hardware. Therefore, the correct answer is A.
Question 66
What provides a unified way to project and manage non-Azure resources in Azure Resource Manager (ARM)?
A. Azure Migrate
B. Azure AD Connect
C. Azure Arc
D. Azure Front Door
Show Answer
Correct Answer: C
Explanation:
Azure Arc provides a unified way to project and manage non-Azure and on‑premises resources within Azure Resource Manager, allowing them to be governed, managed, and monitored as if they were native Azure resources.
Question 343
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have an Azure environment. You need to create a new Azure virtual machine from a tablet that runs the Android operating system.
Solution: You use Bash in Azure Cloud Shell.
Does this meet the goal?
Show Answer
Correct Answer: A
Explanation:
Yes. Azure Cloud Shell is a browser-based service that can be accessed from any device with a supported web browser, including an Android tablet. Using Bash in Azure Cloud Shell, you can run Azure CLI commands to create and manage Azure virtual machines, so this solution meets the goal.
Question 10
DRAG DROP
-
In which order should you arrange the Azure resources from the highest parent object (top) to the lowest child object? To answer, move all resources from the list of resources to the answer area and arrange them in the correct order.
Show Answer
Correct Answer: Management group
Azure subscription
Resource group
Azure virtual machine
Explanation:
Azure uses a hierarchical structure: management groups contain subscriptions, subscriptions contain resource groups, and resource groups contain individual resources such as virtual machines.
Question 461
You have an on-premises network that contains several servers.
You plan to migrate all the servers to Azure.
You need to recommend a solution to ensure that some of the servers are available if a single Azure data center goes offline for an extended period.
What should you include in the recommendation?
A. fault tolerance
B. elasticity
C. scalability
D. low latency
Show Answer
Correct Answer: A
Explanation:
The requirement is to keep servers available even if a single Azure data center goes offline for an extended period. This requires designing for continued operation despite failures, which is fault tolerance. Fault tolerance is achieved in Azure by using redundancy such as Availability Zones or replicated services. Elasticity and scalability deal with resource adjustment, and low latency concerns performance, not availability during failures.
Question 127
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Show Answer
Correct Answer: Single sign-on (SSO) requires Microsoft Authenticator: No
Authentication establishes access level: No
Conditional Access uses sign-in signals to allow or deny access: Yes
Explanation:
SSO does not require Microsoft Authenticator; it uses one set of credentials across apps. Authentication verifies identity, while authorization determines access level. Conditional Access evaluates sign-in signals (user, device, location, risk) to allow, deny, or challenge access.
Question 470
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
An Azure administrator plans to run a PowerShell script that creates Azure resources.
You need to recommend which computer configuration to use to run the script.
Solution: Run the script from a computer that runs Linux and has the Azure CLI tools installed.
Does this meet the goal?
Show Answer
Correct Answer: B
Explanation:
The goal is to run a PowerShell script that creates Azure resources. Installing only the Azure CLI on a Linux computer is insufficient to run PowerShell scripts. PowerShell (PowerShell Core/PowerShell 6+ or 7+) and the Azure PowerShell module must be installed to execute such scripts. Since the solution specifies only Linux with Azure CLI tools installed, it does not meet the goal.
Question 247
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
You are tasked with deploying a critical LOB application, which will be installed on a virtual machine, to Azure.
You are informed that the application deployment strategy should allow for a guaranteed availability of 99.99 percent. You need to make sure that the strategy requires as little virtual machines and availability zones as possible.
Solution: You include two virtual machines and two availability zones in your strategy.
Does the solution meet the goal?
Show Answer
Correct Answer: A
Explanation:
Azure’s VM SLA guarantees 99.99% availability when two or more VM instances are deployed across two or more Availability Zones in the same region. Using exactly two virtual machines spread across two availability zones is the minimum configuration that meets the 99.99% availability requirement while minimizing both VM count and zones. Therefore, the solution satisfies the goal.
Question 6
HOTSPOT
-
Select the answer that correctly completes the sentence.
Show Answer
Correct Answer: the cool access tier of Azure Blob Storage
Explanation:
Azure Blob Storage cool access tier has a minimum storage duration of 30 days. Deleting or moving data before 30 days incurs an early deletion fee, unlike the hot tier, Azure SQL Database, or Azure Cosmos DB.
Question 318
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You plan to deploy several Azure virtual machines.
You need to ensure that the services running on the virtual machines are available if a single data center fails.
Solution: You deploy the virtual machines to a scale set.
Does this meet the goal?
Show Answer
Correct Answer: B
Explanation:
A virtual machine scale set by itself does not guarantee availability if a single datacenter fails. Unless the scale set is explicitly configured to use Availability Zones or zone redundancy, all instances can reside in the same datacenter. Therefore, simply deploying VMs to a scale set does not meet the requirement.
Question 222
DRAG DROP -
Match the Azure service to the appropriate description.
To answer, drag the appropriate service from the column on the left to its description on the right. Each service may be used once, more than once, or not at all.
NOTE: Each correct match is worth one point.
Select and Place:
Show Answer
Correct Answer: Azure Synapse Analytics
Azure Cosmos DB
Azure HDInsight
Explanation:
Azure Synapse Analytics is a fully managed data warehouse with built-in security. Azure Cosmos DB is a globally distributed database that supports NoSQL. Azure HDInsight provides managed Apache Hadoop clusters for large-scale data processing.
Question 60
DRAG DROP
-
Match the cloud computing benefits to the appropriate requirements.
To answer, drag the appropriate benefit from the column on the left to its requirement on the right. Each benefit may be used once, more than once, or not at all.
NOTE: Each correct match is worth one point.
Show Answer
Correct Answer: Elasticity
Disaster recovery
Agility
Explanation:
Dynamic scaling of resources maps to elasticity.
Restoring resources after an outage uses disaster recovery.
Quick deployment and configuration as requirements change is agility.
Question 220
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Show Answer
Correct Answer: Yes
Yes
Yes
Explanation:
Cloud computing offers elastic (on‑demand) scalability.
Public cloud shifts infrastructure costs from CapEx to OpEx, minimizing CapEx.
Virtualization enables multi‑tenancy, allowing multiple customers to share resources securely.
Question 280
You need to collect and automatically analyze security events from Azure Active Directory (Azure AD).
What should you use?
A. Azure Sentinel
B. Azure Synapse Analytics
C. Azure AD Connect
D. Azure Key Vault
Show Answer
Correct Answer: A
Explanation:
To collect and automatically analyze security events from Azure Active Directory, you need a SIEM/SOAR solution with native Azure AD connectors and analytics. Azure Sentinel (now Microsoft Sentinel) is designed for this purpose, providing built-in integration with Azure AD for log collection, security analytics, threat detection, and automated response. The other options do not provide centralized security event analysis.