AZ-900 Practice Test

โ–ถ

AZ-900 Identity and Security โ€” Azure Entra ID and Zero Trust Guide 2026

Microsoft Entra ID (formerly Azure Active Directory)

Microsoft Entra ID is Microsoft's cloud-based identity and access management (IAM) service. Previously known as Azure Active Directory (Azure AD), it was rebranded to Microsoft Entra ID in 2026. For the AZ-900 exam, you may see both names โ€” they refer to the same service.

Entra ID is the backbone of identity in Azure. It provides a central directory for managing users, groups, and applications. Unlike traditional on-premises Active Directory (which manages domain-joined machines on a local network), Entra ID is designed for cloud and hybrid environments, controlling access to cloud resources like Microsoft 365, Azure portal, and thousands of third-party SaaS applications.

Authentication vs Authorization

These two concepts appear repeatedly on the AZ-900 exam โ€” understand the distinction clearly:

Entra ID handles both: it authenticates users with protocols like OAuth 2.0 and OpenID Connect, then uses RBAC to authorize resource access. Single Sign-On (SSO) is a key Entra ID feature โ€” authenticate once and access multiple applications without re-entering credentials.

Role-Based Access Control (RBAC)

RBAC is the authorization system used across Azure to manage who has access to Azure resources, what they can do with those resources, and what areas they have access to. RBAC is built on three key concepts:

Common built-in roles to know for AZ-900: Owner (full access, can assign roles), Contributor (can create/manage resources, cannot assign roles), Reader (view-only access), User Access Administrator (manages user access to Azure resources).

RBAC uses an additive permissions model โ€” if a user has Reader on a subscription but Contributor on a specific resource group, they get the higher permission at that scope. Deny assignments override allows. See the Azure governance guide for how RBAC fits into the broader policy and management hierarchy.

Conditional Access and Multi-Factor Authentication (MFA)

Conditional Access is an Entra ID feature that enforces policies based on conditions โ€” it's Azure's "if-then" engine for identity security. For example: if a user signs in from an unrecognized device in a foreign country, then require MFA or block access.

Common Conditional Access signals include: user or group membership, IP location, device compliance state, application being accessed, and real-time risk detection. Conditional Access is available in Entra ID P1 and P2 licenses.

Multi-Factor Authentication (MFA) adds a second verification factor beyond username and password. The three MFA factor categories are: something you know (password, PIN), something you have (authenticator app, SMS code, hardware token), and something you are (fingerprint, face recognition). Requiring MFA dramatically reduces account compromise risk โ€” Microsoft reports MFA blocks over 99.9% of automated attacks.

shield Microsoft Entra ID

Cloud identity and access management service (formerly Azure AD). Manages users, groups, SSO, and application access across cloud and hybrid environments. Supports OAuth 2.0, OpenID Connect, and SAML.

lock Zero Trust Model

Security framework based on three principles: Verify Explicitly (always authenticate and authorize), Use Least Privilege Access (just-in-time, just-enough-access), and Assume Breach (minimize blast radius, segment access).

eye Azure Security Tools

Microsoft Defender for Cloud (threat protection and security posture), Microsoft Sentinel (cloud-native SIEM/SOAR), Azure Key Vault (secrets/keys/certificates), Azure DDoS Protection (network attack mitigation).

layers Defense in Depth

7-layer security model: Physical โ†’ Identity & Access โ†’ Perimeter โ†’ Network โ†’ Compute โ†’ Application โ†’ Data. Each layer is independently secured; breaching one does not compromise all others.

How Identity and Security Appear on the AZ-900 Exam

Identity, security, and compliance make up 35โ€“40% of the AZ-900 exam โ€” the largest single domain. Questions in this domain test conceptual understanding, not hands-on configuration. Expect scenario-based questions where you must pick the right tool or explain the right concept.

Common question patterns:

Study tip: Learn the purpose of each tool, not just its name. The exam frequently asks you to select the right service for a given scenario. Practice with the AZ-900 practice tests to build pattern recognition for these question types. Also review the AZ-900 complete guide for the full exam breakdown and the exam tips for time management strategies.

Identity and security questions often pair with governance topics. Review the Azure governance guide to understand how Azure Policy, Blueprints, and management groups layer on top of RBAC. For service-level understanding, the Azure services guide covers how Entra ID integrates across compute, storage, and networking resources.

Zero Trust: 3 Principles to Memorize for the Exam
  1. Verify Explicitly โ€” Always authenticate and authorize based on all available data points: identity, location, device health, service or workload, data classification, and anomalies. Never grant access based on network location alone.
  2. Use Least Privilege Access โ€” Limit user access with just-in-time (JIT) and just-enough-access (JEA). Apply risk-based adaptive policies and data protection to secure both data and productivity. Users get only the minimum permissions needed.
  3. Assume Breach โ€” Minimize blast radius and segment access. Verify end-to-end encryption. Use analytics to get visibility, drive threat detection, and improve defenses. Operate as if a breach has already occurred.

Memory trick: VLA โ€” Verify, Least privilege, Assume breach. Zero Trust flips the old "trust but verify" model to "never trust, always verify."

Azure Security Tools

Microsoft Defender for Cloud

Microsoft Defender for Cloud (formerly Azure Security Center + Azure Defender) is a unified security management and threat protection platform. It provides two main capabilities: Cloud Security Posture Management (CSPM) โ€” continuously assesses your Azure environment and provides a Secure Score with prioritized recommendations โ€” and Cloud Workload Protection Platform (CWPP) โ€” detects and responds to threats across VMs, containers, databases, and storage accounts.

Defender for Cloud works across Azure, on-premises, and other cloud providers (AWS, GCP). Key metric to know: the Secure Score, a percentage that represents your security posture. Higher score = better security.

Microsoft Sentinel

Microsoft Sentinel is a cloud-native Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) solution. It collects security data at cloud scale across users, devices, applications, and infrastructure โ€” both on-premises and in multiple clouds. Sentinel uses AI and machine learning to detect threats, investigate them with built-in hunting tools, and respond with automated playbooks (using Azure Logic Apps).

Azure Key Vault

Azure Key Vault is a cloud service for securely storing and accessing secrets โ€” API keys, passwords, certificates, cryptographic keys, and other sensitive configuration values. Applications retrieve secrets from Key Vault at runtime rather than storing them in code or config files. This centralizes secret management, enables rotation, and provides an audit log of all access. Key Vault integrates with Azure RBAC and Entra ID for fine-grained access control.

Azure DDoS Protection and Defense in Depth

Azure DDoS (Distributed Denial of Service) Protection defends Azure resources against volumetric network attacks. The Basic tier is enabled automatically for all Azure customers at no extra cost. The Standard tier (now called DDoS Network Protection) adds adaptive tuning, attack analytics, rapid response support, and SLA guarantees.

The Defense in Depth model describes a layered security approach where multiple independent security controls protect resources:

  1. Physical โ€” Microsoft datacenter physical security (guards, badge access, cameras)
  2. Identity & Access โ€” Entra ID, MFA, Conditional Access, RBAC
  3. Perimeter โ€” DDoS protection, Azure Firewall, perimeter firewalls
  4. Network โ€” Network segmentation, NSGs, VPN, ExpressRoute encryption
  5. Compute โ€” VM endpoint protection, patch management, Defender for Servers
  6. Application โ€” Secure application development, WAF, no stored secrets in code
  7. Data โ€” Data encryption at rest and in transit, Key Vault, database access controls

On the exam, you may be asked to identify which layer a specific control belongs to, or to explain why defense in depth is better than relying on a single security measure.

Explain what Microsoft Entra ID is and how it differs from on-premises Active Directory
Define authentication (AuthN) vs authorization (AuthZ) with examples
Describe the three components of RBAC: security principal, role definition, and scope
Name the four common built-in Azure roles and their permission levels
Explain Conditional Access and give two examples of conditions that can trigger a policy
List the three factors of MFA and give an example of each
State the three Zero Trust principles and explain what each means in practice
Describe what Microsoft Defender for Cloud does and what the Secure Score measures
Explain the difference between Microsoft Sentinel and Defender for Cloud
Describe what Azure Key Vault stores and why applications should use it
List all 7 layers of the Defense in Depth model in order
Explain the difference between DDoS Basic and DDoS Standard (Network Protection)
Practice at least 2 full AZ-900 practice tests focused on security questions
Start Free AZ-900 Practice Test

AZ-900 Identity and Security Questions and Answers

What is Microsoft Entra ID and why was it renamed from Azure Active Directory?

Microsoft Entra ID is Microsoft's cloud-based identity and access management (IAM) service. It was renamed from Azure Active Directory (Azure AD) to Microsoft Entra ID in 2026 as part of Microsoft's broader Entra product family for identity and access. The name change reflects the expansion beyond just Azure โ€” Entra ID manages identity across Microsoft 365, third-party SaaS apps, and custom applications, not only Azure resources. For the AZ-900 exam, both names are used and refer to the same service.

What is the difference between authentication and authorization in Azure?

Authentication (AuthN) is the process of verifying identity โ€” proving you are who you claim to be, typically via username/password, MFA, or certificate. Authorization (AuthZ) is what happens after authentication โ€” determining what resources and actions you are permitted to access. In Azure, Entra ID handles authentication (confirming your identity), while Azure RBAC handles authorization (defining what you can do once authenticated). A user can be authenticated but still unauthorized to access a specific resource.

What are the three principles of Zero Trust?

The three Zero Trust principles are: (1) Verify Explicitly โ€” always authenticate and authorize using all available signals including identity, location, device health, and risk. (2) Use Least Privilege Access โ€” grant only the minimum permissions needed, using just-in-time and just-enough-access approaches. (3) Assume Breach โ€” operate as if a breach has already occurred; segment networks, minimize blast radius, and use encryption and analytics to detect threats. Zero Trust replaces the old perimeter-based "trust but verify" model.

What is the difference between Microsoft Defender for Cloud and Microsoft Sentinel?

Microsoft Defender for Cloud focuses on security posture management and workload protection โ€” it assesses your Azure environment, provides a Secure Score, and detects threats on specific workloads like VMs and databases. Microsoft Sentinel is a SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) platform โ€” it aggregates security signals from across your entire environment (including non-Azure sources), performs AI-driven threat detection, and automates responses with playbooks. Think of Defender for Cloud as the protector of individual Azure resources, and Sentinel as the central security operations center.

What does Azure Key Vault do and why should applications use it?

Azure Key Vault is a cloud service for securely storing secrets (passwords, API keys), encryption keys, and certificates. Applications should use Key Vault instead of storing sensitive values in code or configuration files because: (1) it centralizes secret management in one audited location, (2) secrets can be rotated without changing application code, (3) access is controlled via Entra ID and RBAC so only authorized apps and users can retrieve secrets, and (4) an audit log records every access attempt. This eliminates the common security risk of hardcoded credentials in source code.

What are the 7 layers of Defense in Depth?

From outermost to innermost: (1) Physical โ€” datacenter physical security controls; (2) Identity & Access โ€” Entra ID, MFA, RBAC, Conditional Access; (3) Perimeter โ€” DDoS protection, Azure Firewall, perimeter firewalls; (4) Network โ€” network segmentation, NSGs, VNet isolation; (5) Compute โ€” VM patching, endpoint protection, Defender for Servers; (6) Application โ€” secure development practices, WAF, no secrets in code; (7) Data โ€” encryption at rest and in transit, Key Vault, database access controls. Each layer provides independent protection โ€” an attacker who bypasses one layer still faces the remaining controls.
โ–ถ Start Quiz