hardmultiple choiceObjective-mapped

A company wants to encrypt data at rest in Azure SQL Database using customer-managed keys stored in Azure Key Vault. They also need to be able to rotate the keys without downtime. Which feature should they use?

Question 1hardmultiple choice
Full question →

A company wants to encrypt data at rest in Azure SQL Database using customer-managed keys stored in Azure Key Vault. They also need to be able to rotate the keys without downtime. Which feature should they use?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Transparent Data Encryption with customer-managed keys

Correct. TDE with customer-managed keys in Azure Key Vault provides full control over encryption keys and supports online key rotation without impacting availability.

B

Distractor review

Always Encrypted

Incorrect. Always Encrypted encrypts sensitive data on the client side and never exposes plaintext to the database engine, but it is not for at-rest encryption of the entire database and does not support TDE key rotation.

C

Distractor review

Dynamic Data Masking

Incorrect. Dynamic data masking obfuscates data in query results to unauthorized users, but does not provide encryption at rest or key management.

D

Distractor review

Row-level security

Incorrect. Row-level security restricts access to rows based on user context, not encryption at rest.

Common exam trap

Common exam trap: usable hosts are not the same as total addresses

Subnetting questions often tempt you into counting all addresses. In normal IPv4 subnets, the network and broadcast addresses are not usable host addresses.

Technical deep dive

How to think about this question

Subnetting questions test whether you can identify the network, broadcast address, usable range, mask and correct subnet. Slow down enough to calculate the block size correctly.

KKey Concepts to Remember

  • CIDR notation defines the prefix length.
  • Block size helps identify subnet boundaries.
  • Network and broadcast addresses are not usable hosts in normal IPv4 subnets.
  • The required host count determines the smallest suitable subnet.

TExam Day Tips

  • Write the block size before choosing the subnet.
  • Check whether the question asks for hosts, subnets or a specific address range.
  • Do not confuse /24, /25, /26 and /27 host counts.

Related practice questions

Related AZ-900 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

Question 1

A developer is building a serverless application that requires integration with an on-premises SQL Server database for real-time data processing. The on-premises network is connected to Azure via a site-to-site VPN. Which Azure service would allow the function to securely access the on-premises database without exposing it to the public internet?

Question 2

A solutions architect is designing a storage solution for a large media company. The company needs to store video files that are accessed infrequently but must be retained for several years for compliance. Which two Azure storage options meet these requirements? (Select two.)

Question 3

A company deploys a multi-tier application using Azure virtual machines. The web tier VMs must be evenly distributed across two distinct data centers within an Azure region to avoid a single point of failure from an infrastructure outage. Which Azure construct should they use to meet this requirement?

Question 4

A company wants to enforce a set of security policies across all their Azure subscriptions. They have created several individual policy definitions. Which Azure construct should they use to group these policies together and assign them as a single package?

Question 5

A company deploys a line-of-business application on an Azure virtual machine. The IT team wants to ensure the application remains secure. According to the shared responsibility model, which of the following security tasks is the sole responsibility of the customer (the company)?

Question 6

A company develops a web API that runs on Azure App Service. The development team wants to deploy a new version of the API to a staging environment, run integration tests against it, and then gradually shift production traffic to the new version. If any issues are detected, they want to immediately roll back to the previous version without redeploying. Which Azure App Service feature should the team use to meet these requirements?

FAQ

Questions learners often ask

What does this AZ-900 question test?

CIDR notation defines the prefix length.

What is the correct answer to this question?

The correct answer is: Transparent Data Encryption with customer-managed keys — Transparent Data Encryption (TDE) with customer-managed keys (also known as Bring Your Own Key - BYOK) allows you to control the encryption keys used for TDE. You can store the key in Azure Key Vault and enable key rotation without re-encrypting the database.

What should I do if I get this AZ-900 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.