New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft AZ-900 Exam - Topic 9 Question 7 Discussion

Actual exam question for Microsoft's AZ-900 exam
Question #: 7
Topic #: 9
[All AZ-900 Questions]

Which resources can be used as a source for a Network security group inbound security rule?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Pearly
4 months ago
D makes the most sense, but I’m surprised it’s not just one option!
upvoted 0 times
...
Antonio
4 months ago
I’ve always used service tags for this.
upvoted 0 times
...
Marvel
4 months ago
Wait, are you sure about that? I thought it was just IPs.
upvoted 0 times
...
Lashon
5 months ago
Totally agree, D covers all bases.
upvoted 0 times
...
Laila
5 months ago
D is the correct answer!
upvoted 0 times
...
Tayna
5 months ago
I thought it was just IP addresses and service tags, but now I'm questioning if application security groups are also valid sources.
upvoted 0 times
...
Ettie
5 months ago
I feel like application security groups are important, but I can't recall if they're the only option or if they can be combined with others.
upvoted 0 times
...
Valentin
5 months ago
I remember practicing a question similar to this, and I believe the answer was D because it includes all the options.
upvoted 0 times
...
Dianne
5 months ago
I think we covered that IP addresses and service tags can be used, but I'm not sure if application security groups are included too.
upvoted 0 times
...
Edelmira
5 months ago
Hmm, I'm a bit confused on this one. I'll need to think it through carefully to make sure I select the right Cisco product.
upvoted 0 times
...
Chau
5 months ago
Okay, I think I've got a handle on this. The key is understanding that Zones don't have the same first-boot process as the Global Zone. I'll focus on identifying which steps can be skipped when working with Zones specifically.
upvoted 0 times
...
Solange
5 months ago
I'm confident I know the answer to this one. It's C - the effect should be reported as a component of income from continuing operations.
upvoted 0 times
...
Rozella
5 months ago
Okay, I think I've got it. The key is to focus on the order of the steps in the SOC workflow.
upvoted 0 times
...

Save Cancel