Exam Logo

Microsoft (AZ-220) Exam Questions And Answers page 6

You have an Azure IoT Edge solution.

You plan to deploy an Azure Security Center for IoT security agent. You need to configure the security agent to meet the following requirements:

• Connection events must be reported as high priority.
• High priority events must be collected every seven minutes.

How should you configure the azureiotsecurity module twin? To answer, drag the appropriate values to the correct locations. Each value may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Introduction to Azure IoT IoT Security and Compliance
You have an Azure IoT hub.

You plan to attach three types of IoT devices as shown in the following table.


You need to select the appropriate communication protocol for each device.

What should you select? To answer, drag the appropriate protocols to the correct devices. Each protocol may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Introduction to Azure IoT IoT Security and Compliance
You have an Azure Stream Analytics job that connects to an Azure IoT hub named Hub1445 as a streaming data source. Hub1445 is configured as shown in the exhibit.


The Stream Analytics job fails to receive any messages from the IoT hub.

What should you do to resolve the issue?
Device Provisioning and Management Data Ingestion and Processing
You have an existing Azure IoT hub.

You need to connect physical IoT devices to the IoT hub.

You are connecting the devices through a firewall that allows only port 443 and port 80.

Which three communication protocols can you use? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.
Introduction to Azure IoT Data Ingestion and Processing
You have an Azure IoT hub that is being taken from prototype to production.

You plan to connect IoT devices to the IoT hub. The devices have hardware security modules (HSMs).

You need to use the most secure authentication method between the devices and the IoT hub. Company policy prohibits the use of internally generated certificates.

Which authentication method should you use?
Device Provisioning and Management IoT Security and Compliance
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have an Azure Stream Analytics job that receives input from an Azure IoT hub and sends the outputs to Azure Blob storage. The job has compatibility level 1.1 and six streaming units.

You have the following query for the job.


You plan to increase the streaming unit count to 12.

You need to optimize the job to take advantage of the additional streaming units and increase the throughput.

Solution: You change the query to the following.


Does this meet the goal?
Data Ingestion and Processing Developing IoT Solutions
During the POV phase, you connect a device to IoT Hub and start sending telemetry messages.

You need to verify the content of the messages received by IoT Hub during the POV phase.

What should you use?
Introduction to Azure IoT Data Ingestion and Processing
You have an Azure IoT solution that includes an Azure IoT hub.

You receive a root certification authority (CA) certificate from the security department at your company.

You need to configure the IoT hub to use the root CA certificate.

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Device Provisioning and Management IoT Security and Compliance
You have three Azure IoT hubs named Hub1, Hub2, and Hub3, a Device Provisioning Service instance, and an IoT device named Device1.

Each IoT hub is deployed to a separate Azure region.

Device enrollment uses the Lowest latency allocation policy.

The Device Provisioning Service uses the Lowest latency allocation policy.

Device1 is auto-provisioned to Hub1 by using the Device Provisioning Service.

Device1 regularly moves between regions.

You need to ensure that Device1 always connects to the IoT hub that has the lowest latency.

What should you do?
Device Provisioning and Management IoT Security and Compliance
You have an Azure IoT solution that includes an Azure IoT Hub named Hub1 and an Azure IoT Edge device named Edge1. Edge1 connects to Hub1.

You need to deploy a temperature module to Edge1.

What should you do?
Data Ingestion and Processing Developing IoT Solutions