CSI Canadian Securities Course 2 CSC2 Exam Questions in PDF

Free CSI CSC2 Dumps Questions (page: 3)

What type of return is calculated for a security held for 18 months if no adjustments to the return are made?

  1. Effective rate of return.
  2. Nominal rate of return.
  3. Annualized total return.
  4. Holding period return.

Answer(s): D

Explanation:

The return on a security held for a specific period, such as 18 months, without adjusting for time or compounding, is referred to as the holding period return (HPR). This straightforward calculation assesses total returns over the period of ownership.

1. Definition of Holding Period Return:
The HPR is calculated as:

HPR=(EndingValue-InitialValue)+DividendsReceivedInitialValueHPR = \frac{{\text{(Ending Value -

Initial Value) + Dividends Received}}}{{\text{Initial Value}}}HPR=InitialValue(EndingValue- InitialValue)+DividendsReceived

This measure evaluates total growth, disregarding compounding or annualization.

2. Other Return Types (Incorrect Answers):

Effective Rate of Return: Reflects annualized returns considering compounding within a year. It is not applicable to non-annualized periods like 18 months.

Nominal Rate of Return: The unadjusted rate of return without accounting for inflation.
While related, it does not specifically refer to the holding period concept.

Annualized Total Return: This adjusts returns to reflect an annual basis, assuming constant performance throughout the period. It is unsuitable for raw, unadjusted returns like the HPR.

Reference from CSC Study Documents:

Chapter 15, Volume 2: Covers the calculation of different return metrics, with detailed examples of HPR and its application.

Portfolio Return Analysis in Section 15 explains the non-compounded nature of holding period calculations.

Let me know if further details or clarifications are needed!



What legal authority does the done receive under the protection mandate in Quebec?

  1. The authority to get the will probated and take all the necessary steps for its execution.
  2. The authority to make decisions and to perform certain actions on behalf of the donor if they become incapacitated.
  3. The authority to make decisions and to perform certain action on behalf of the donor while they are capable.
  4. The authority to administrator and distribute the assets in the estate of a deceased after death.

Answer(s): B

Explanation:

In Quebec, the concept of a protection mandate (also known as a "mandate in case of incapacity") allows a person (the donor) to appoint someone (the mandatary or donee) to act on their behalf if they become unable to do so. The legal authority granted under this mandate encompasses decision-

making and taking actions on behalf of the donor when they are incapacitated, ensuring their personal, medical, and financial interests are protected.

Key Aspects of the Protection Mandate:

Purpose: The primary purpose of the protection mandate is to prepare for a scenario where the donor loses their mental or physical capacity to manage their own affairs. It is a proactive measure for managing one's personal care and assets.

Scope of Authority:

The mandatary gains authority to make personal and financial decisions once the incapacity of the donor is confirmed, usually by a medical and legal process.

The decisions may include managing bank accounts, paying bills, handling investments, and making healthcare decisions on behalf of the donor.

Validation Requirement: The mandate only comes into effect after a formal validation process involving legal authorities to confirm the donor's incapacity.

Legal Framework: The Quebec Civil Code governs the creation and execution of a protection mandate, ensuring the mandatary acts in the best interest of the incapacitated individual.

Why Option B Is Correct:

The protection mandate specifically applies in cases where the donor is incapacitated. It grants the donee authority to manage aspects of the donor's life that they can no longer handle themselves.

Options A, C, and D refer to different legal instruments or scenarios, such as probating a will (A), acting while the donor is capable (C), or estate administration after death (D), none of which are relevant under a protection mandate in Quebec.

Reference from CSC Study Materials:

Volume 2, Chapter 26: "Working with the Retail Client," Section on Estate Planning, Powers of Attorney, and Living Wills.



A shareholder receive rights from a company through direct ownership in shares. Not expecting to exercise them, she sells the right on the relevant exchange.
What is her capital gain?

  1. The sale price of the rights.
  2. The sales price less the exercise price of the rights.
  3. The current price of the shares less the sale price of the rights.
  4. The current share price less the exercise price of the rights.

Answer(s): A

Explanation:

When a shareholder sells rights on the exchange, the proceeds of the sale represent the capital gain. Rights provide shareholders with the opportunity to purchase additional shares of a company at a discounted price. If a shareholder chooses not to exercise these rights and instead sells them on the secondary market, the value they receive from the sale constitutes their capital gain.

Key Concepts:

Rights Offering:

A rights offering allows existing shareholders to purchase additional shares at a set price (exercise price) within a specific period.

Shareholders can either exercise these rights or sell them on the market.

Capital Gain Calculation:

The capital gain from selling the rights equals the sale price. This is because the rights themselves were issued at no cost to the shareholder.

The exercise price is irrelevant to the calculation as the rights were not exercised.

Tax Implications:

The gain from the sale of rights is treated as a capital gain for tax purposes. Only 50% of the capital gain is taxable under Canadian taxation rules.

Why Option A Is Correct:

Since the shareholder did not exercise the rights but sold them, the capital gain is the sale price of the rights. Subtracting the exercise price or using the share price is unnecessary and incorrect for this scenario.

Reference from CSC Study Materials:

Volume 2, Chapter 24: "Canadian Taxation," Section on Capital Gains and Losses.



Which type of trader specializes in managing block trades on behalf of institution clients?

  1. Responsible designated trader.
  2. Agency trader
  3. Liability trader
  4. Market maker

Answer(s): B

Explanation:

An agency trader specializes in executing large block trades for institutional clients without taking ownership of the securities. Their role is critical in facilitating liquidity and minimizing market impact during the execution of trades.

Key Responsibilities of Agency Traders:

Managing Block Trades:

Agency traders handle large transactions on behalf of institutions like pension funds or mutual funds, ensuring the trades are completed efficiently.

They do not use the firm's capital; instead, they act as intermediaries between the buyer and seller.

Minimizing Market Impact:

Large trades can significantly impact stock prices if not executed strategically. Agency traders use methods like algorithmic trading or dark pools to mitigate this impact.

Role vs. Other Traders:

Liability Trader: Trades using the firm's capital, assuming the risk of the position.

Market Maker: Provides liquidity by quoting buy and sell prices.

Responsible Designated Trader: Oversees order flow for specific securities on the exchange.

Why Option B Is Correct:

The question specifies managing block trades for institutional clients. This matches the role of agency traders, as they focus on executing trades on behalf of clients without taking positions themselves.

Reference from CSC Study Materials:

Volume 2, Chapter 27: "Working with the Institutional Client," Section on Roles and Responsibilities in the Institutional Market.



What are examples of primary investment objectives?

  1. Growth and preservation of capital
  2. Tax minimization and safety of principal.
  3. Marketability and growth of capital.
  4. Marketability and tax minimization.

Answer(s): A

Explanation:

Investment objectives are critical components of a financial plan, guiding both the client and the advisor in creating strategies to achieve desired financial outcomes. These objectives generally fall into primary categories that reflect the investor's goals, risk tolerance, and time horizon.

Growth and Preservation of Capital

Growth of Capital: This objective focuses on increasing the principal value of the investment over time. It is particularly important for investors with long-term goals, such as retirement or funding a child's education. Growth-oriented investments typically include equities, equity mutual funds, and growth-oriented ETFs.

Preservation of Capital: This objective ensures that the invested principal remains safe from loss, emphasizing lower-risk investments like government bonds, GICs (Guaranteed Investment Certificates), or money market instruments. Investors prioritizing this objective often have a low tolerance for risk and a shorter time horizon.

Relevance to Financial Planning

By combining growth with preservation, the portfolio aims to strike a balance between generating returns and maintaining the invested capital. This dual objective is well-suited for individuals in different life stages:

Young Investors: Tend to emphasize growth more, leveraging their long time horizons.

Older Investors: Place greater emphasis on preservation as they near or enter retirement, prioritizing capital safety to fund living expenses.

Why A is Correct

Option A explicitly combines both these objectives, aligning with a widely recognized approach to investing that balances risk and reward depending on the investor's profile and needs.


Reference:

Volume 2, Section 15: Portfolio Management Process--Investment Objectives and Constraints.

Volume 1, Section 4: Overview of Economics--Principles of Risk and Return.



What is the main pitfall of closet indexing for investors?

  1. The portfolio does not closely resemble the benchmark index.
  2. Investors must take greater risks due to a high portfolio beta.
  3. passively management fund can be marketed as actively managed.
  4. High portfolio turnover makes it unsuitable for taxable accounts

Answer(s): C

Explanation:

Closet indexing is a controversial practice where a fund manager claims to actively manage a portfolio but instead mirrors an index closely. This practice undermines the very premise of active management.

Main Pitfalls of Closet Indexing

Lack of Value Addition: Investors pay higher fees for active management without receiving the expected benefits, as the portfolio closely tracks a benchmark index.

Deceptive Marketing: Funds marketed as actively managed may mislead investors, violating transparency principles.

Limited Alpha Generation: Since the portfolio resembles an index, it often fails to deliver excess returns ("alpha"), defeating the purpose of active management.

Regulatory Concerns: Closet indexing raises ethical questions and can lead to scrutiny by regulatory bodies.

Why C is Correct

Option C highlights the core issue of closet indexing--misrepresenting a passively managed portfolio as active, leading to higher fees without the commensurate effort or performance.


Reference:

Volume 2, Section 18: Mutual Funds--Indexing and Closet Indexing.

Volume 2, Section 13: Portfolio Manager Styles--Active vs. Passive Management.



How do the fees differ between an F-class and front-end version of the same fund?

  1. The management expense ratio is lower on the F-class fund.
  2. The management expense ratio is higher on the F-class fund.
  3. The fees are identical
  4. The commission changed is higher on the F-class fund.

Answer(s): A

Explanation:

F-class funds are designed for fee-based accounts, where investors pay advisors a separate fee for services rather than a commission. This structure impacts the Management Expense Ratio (MER).

Key Differences Between F-Class and Front-End Funds

Management Expense Ratio (MER):

F-Class Funds: Exclude embedded advisor commissions, resulting in lower MER. These funds are cost-effective for investors in fee-based arrangements.

Front-End Funds: Include advisor commissions as part of the MER, increasing overall costs.

Fee Structure:

F-class funds charge a flat management fee without embedded commissions, offering more transparency.

Front-end funds involve a sales charge (front-end load) that compensates advisors directly at the time of purchase.

Why A is Correct

The lower MER of F-class funds reflects the absence of embedded advisor fees, making them more attractive to fee-conscious investors.


Reference:

Volume 2, Section 25: Fee-Based Accounts--Advantages and Structure of F-Class Funds.

Volume 2, Section 17: Mutual Funds--Charges Associated with Funds.



In which type of ETF does the portfolio manager select securities and their weighting to best match the performance of an index?

  1. Rules-based
  2. Synthetic.
  3. Sampling
  4. Full replication

Answer(s): D

Explanation:

In ETFs, portfolio management involves selecting securities to match an index's performance. Full replication is a method where the portfolio manager buys all the securities in the index in their exact proportions.

Types of ETF Management Approaches

Full Replication:

Involves holding every security in the index.

Ensures minimal tracking error and high fidelity to the benchmark.

Suitable for highly liquid and straightforward indexes like the S&P/TSX Composite.

Sampling:

Used for large, complex indexes where holding all securities is impractical.

Selects a representative sample to approximate the index's performance.

Rules-Based and Synthetic ETFs:

Employ predefined rules or derivatives rather than physical securities.

Why D is Correct

Option D reflects the primary method of mirroring an index's performance through full replication, ensuring accuracy and minimal tracking error.


Reference:

Volume 2, Section 19: Exchange-Traded Funds--Full Replication vs. Sampling.

Volume 2, Section 13: Efficient Market Hypothesis--Implications for Passive Management.



Share your comments for CSI CSC2 exam with other users:

A
AI Tutor Explanation
5/13/2026 11:23:34 PM

Question 6:
Here’s how question 6 works.
Key constraint: All new and extended objects must be in an existing model named FinanceExt. Creating a brand-new model is not allowed.
Why the two correct options work:

  • B. Overlay the existing FinanceExt model and populate the solution definition.
- This keeps all changes inside FinanceExt by overlaying the base model with your solution details.
  • C. Extend the existing FinanceExt model and populate the project model definition.
- This uses the extension approach to add your changes while still residing in FinanceExt, organized via the project model definition.
Why the other options are not correct:
  • A. Create a new model that extends the existing FinanceExt model.
- Not allowed, since no new models may be created.
  • D. Modify DefaultModelForNewProject and name the model FinanceExt.
- The goal is to place changes in FinanceExt, not to name or create a new model via config; this doesn’t describe a valid way to satisfy the constraint.
In short: use B or C; both keep changes inside the existing FinanceExt model.

A
AI Tutor Explanation
5/13/2026 11:00:29 PM

Question 2:
I don’t have the text for Question 2 here. Please paste the exact Question 2 (including all answer choices) or describe the topic it covers.
Once I have it, I’ll:

  • Identify the exam objective it targets.
  • Break down the stem and each option.
  • Use elimination and key concepts to justify why options are correct or incorrect.
  • Give the final answer with a concise explanation of the reasoning.

If there’s an image in Question 2, describe it or transcribe any text shown.

A
AI Tutor Explanation
5/10/2026 12:51:57 AM

Which statement is true about using default environment variables? The environment variables can be read in workflows using the ENV: variable_name syntax. The environment variables created should be prefixed with GITHUB_ to ensure they can be accessed in workflows The environment variables can be set in the defaults: sections of the workflow The GITHUB_WORKSPACE environment variable should be used to access files from within the runner.
Correct answer: The statement "The GITHUB_WORKSPACE environment variable should be used to access files from within the runner." is true.
Why the others are false:

  • ENV: variable_name syntax is not how you read env vars in workflows. Use ${{ env.VARIABLE }} in expressions or $VARIABLE in a shell.
  • Environment variables don’t need a GITHUB_ prefix. Custom vars can have any name; GITHUB_ is only for built-in, predefined vars.
  • defaults: cannot set environment variables. It configures defaults for run steps (like shell or working-directory), not env vars.

Extra tip:
  • GITHUB_WORKSPACE (or ${{ github.workspace }}) is the root path on the runner where the repository is checked out. Use it to access files, e.g., $GITHUB_WORKSPACE/... or ${{ github.workspace }}/....

A
AI Tutor Explanation
5/7/2026 11:34:48 PM

As an administrator for this subscription, you have been tasked with recommending a solution that prohibits users from copying corporate information from managed applications installed on unmanaged devices. Which of the following should you recommend? Windows Virtual Desktop. Microsoft Intune. Windows AutoPilot. Azure AD Application Proxy.

  • Microsoft Intune

Reason: Intune can enforce app protection policies (MAM) on managed apps, even on unmanaged devices, to prevent data leakage (e.g., restricting copy/paste, saving to non-approved apps, etc.). The other options don’t address data protection within apps on unmanaged devices.

A
AI Tutor Explanation
5/4/2026 2:43:10 AM

Question 34:

  • Question 34 asks: Which role(s) has the capability to create Policies? Choose two.
  • Likely correct roles: Compliance Manager and Compliance admin (A and B). These roles typically have policy governance rights to create and manage policies.
  • Why not the others: Compliance User is usually a limited user, not allowed to create policies. Risk Manager focuses on risks, not policy creation in standard setups.
  • Note on the provided key: The answer shown is “C” (Compliance User), which conflicts with “Choose two.” This is probably a key error. In practice, verify against your instance’s ACLs or official docs.
  • Quick check tip: In ServiceNow, review the ACLs and role permissions for the Policy records to see which roles can create policies.

A
AI Tutor Explanation
4/29/2026 11:59:58 PM

function of appnav in sdwan

  • AppNav (Application Navigation) is the Cisco SD-WAN feature that provides application-level visibility and control.
  • It maintains a catalog of applications (AppIDs) with attributes (ports/protocols, categories) and classifies traffic accordingly.
  • It allows policy authors to reference apps by name in policies, enabling application-aware routing, QoS, and service chaining based on the app’s requirements.
  • The SD-WAN fabric uses AppNav data to steer traffic along the best path, improving user experience for critical apps while optimizing WAN usage.

A
AI Tutor Explanation
4/29/2026 5:25:25 AM

Question 1:

  • Correct answer: C. Extract the hardware ID information of each computer to a CSV file and upload the file from the Microsoft Intune admin center.

  • Why this is correct

A
AI Tutor Explanation
4/29/2026 5:23:14 AM

Question 5:

  • Correct answer: A. User4 and User1 only

  • Why this is correct:
- The Automatic Enrollment setting in Intune has MDM user scope: GroupA. Only users in GroupA can enroll devices via MDM auto-enrollment. - Device6 will be enrolled via Windows Autopilot and Intune, so enrollment is allowed only for users in GroupA. - Based on the group memberships in the scenario, User4 and User1 are in GroupA, while User2 and User3 are not. Therefore only User4 and User1 can enroll Device6.
  • Quick tip for the exam:
- Remember: MDM user scope determines who can auto-enroll devices; MAM scope controls app protection enrollment. When a new Autopilot device is enrolled, the signing-in user must be in the MDM scope.

A
AI Tutor Explanation
4/29/2026 5:17:10 AM

Why this is correct

  • Correct answer: C. Extract the hardware ID information of each computer to a CSV file and upload the file from the Microsoft Intune admin center.

  • Why this is correct:
- Windows Autopilot requires devices to be registered by their hardware IDs (hash) before Autopilot can deploy Windows 10 Enterprise. - Collect the hardware IDs from the new Phoenix machines, save them in a CSV, and upload that CSV in the Intune/Windows Autopilot area. This maps each device to an Autopilot deployment profile. - After registration, you can assign Autopilot profiles (Windows 10 Enterprise, etc.). Other options (serial number CSV, generalizing, or Mobility settings) are not the initial Autopilot registration steps.

A
AI Tutor Explanation
4/25/2026 1:53:46 PM

Question 7:

  • Correct answer: B — A risk score is computed based on the number of remediations needed compared to the industry peer average.

Explanation:
  • Risk360 uses a remediation-based score. It benchmarks how many actions are required to fix issues against peers, giving a relative risk posture.
  • Why not the others:
- A: Not just total risk events by location. - C: Time to mitigate isn’t the primary scoring method. - D: Not a four-stage breach scoring approach.
Note: The page text shows a mismatch (it lists D as the answer), but the study guide describes the remediation-based scoring (B) as the correct concept.

A
AI Tutor Explanation
4/25/2026 1:42:20 PM

Question 104:

  • Correct answer: D) Multi-Terabyte (TB) Range

  • Brief explanation:
- clustering keys organize data into micro-partitions to improve pruning when queries filter on those columns. - The performance benefit is most significant for very large tables; for small tables the overhead of maintaining clustering outweighs gains. - Therefore, as a best practice, define clustering keys on tables at the TB scale.

C
Community Helper
4/25/2026 2:03:10 AM

Q23: Fabric Admin is correct. Because Domain admin cannot create domains. Only Fabric Admin can among the given options. Q51: Wrapping @pipeline.parameter.param1 inside {} will return a string. But question requires the expression to return Int, so correct answer should be @pipeline.parameter.param1 (no {})

A
AI Tutor Explanation
4/23/2026 3:07:03 PM

Question 62:

  • Correct answer: D (per the page)

  • Note: The explanation text on the page describes option B (use ZDX score and Analyze Score to trigger the Y Engine analysis), indicating a mismatch between the stated answer and the rationale.

  • Key concept: For fast root-cause analysis, leverage telemetry and auto-correlated insights:
- Use the user’s ZDX score for AWS and run Analyze Score to activate the Y Engine, which correlates metrics across network, client, and application to pinpoint the issue quickly.
  • Why the other options are less effective:
- A: Only checks for outages; doesn’t provide actionable root-cause analysis. - C: Deep Trace helps visibility but is manual and time-consuming. - D: Packet capture is invasive and slow; not the quickest path to root cause.

A
AI Tutor Explanation
4/23/2026 12:26:21 PM

Question 32:

  • Answer: A (2.4GHz)

  • Why: Lower-frequency signals have longer wavelengths and experience less attenuation when passing through walls and obstacles. Higher frequencies (5GHz, 6GHz) are more easily blocked by walls. NFC operates over very short distances and is not meant to penetrate walls. So 2.4 GHz best penetrates physical objects like walls.

A
AI Tutor Explanation
4/21/2026 8:48:36 AM

Question 3:

  • False is the correct answer (Option B).

Why:
  • In Snowflake, a database is a metadata object that exists within a single Snowflake account. Accounts are isolated—there isn’t one database that lives in multiple accounts.
  • You can access data across accounts via data sharing or database replication, but these create separate database objects in the other accounts (e.g., a database in the consumer account created from a share), not a single shared database across accounts.

So a single database cannot exist in more than one Snowflake account.

A
Anonymous User
4/16/2026 10:54:18 AM

Question 1:

  • Correct answer: Edate = sys.argv[1]
  • Why this is correct:
- When a Databricks Job passes parameters to a notebook, those parameters are supplied to the notebook's Python process as command-line arguments. The first argument after the script name is sys.argv[1], so date = sys.argv[1] captures the passed date value directly.
  • How it compares to other options:
- date = spark.conf.get("date") reads from Spark config, not from job parameters. - input() waits for user input at runtime, which isn’t how job parameters are provided. - date = dbutils.notebooks.getParam("date") would work if the notebook were invoked via dbutils.notebook.run with parameters, not

A
Anonymous User
4/15/2026 4:42:07 AM

Question 528:

  • Correct answer: NSG flow logs for NSG1 (Option B)

  • Why:
- Traffic Analytics uses NSG flow logs to analyze traffic patterns. You must have NSG flow logs enabled for the NSGs you want to monitor. - An Azure Log Analytics workspace is also required to store and query the traffic data. - Network Watcher must be available in the subscription for traffic analytics to function.
  • What to configure (brief steps):
- Ensure Network Watcher is enabled in the East US region (for the subscription/region). - Enable NSG flow logs on NSG1. - Ensure a Log Analytics workspace exists and is accessible (read/write) so Traffic Analytics can store and query logs.
  • Why other options aren’t correct:
- “Diagnostic settings for VM1” or “Diagnostic settings for NSG1” alone don’t guarantee flow logs are captured and sent to Log Analytics, which Traffic Analytics relies on. - “Insights for VM1” is not how Traffic Analytics collects traffic data.

A
Anonymous User
4/15/2026 2:43:53 AM

Question 23:
The correct answer is Domain admin (option B), not Fabric admin.

  • Domain admin provides domain-level management: create domains/subdomains and assign workspaces within those domains, which matches the tasks while following least privilege.
  • Fabric admin is global-level access and is more privileges than needed for this scenario (it would grant broader control across the Fabric environment).

A
Anonymous User
4/14/2026 12:31:34 PM

Question 2:
For question 2, the key concept is the Longest Prefix Match. Routers pick the route whose subnet mask is the most specific (largest prefix length) that still matches the destination IP.
From the options:

  • A) 10.10.10.0/28 ? 10.10.10.0–10.10.10.15
  • B) 10.10.13.0/25 ? 10.10.13.0–10.10.13.127
  • C) 10.10.13.144/28 ? 10.10.13.144–10.10.13.159
  • D) 10.10.13.208/29 ? 10.10.13.208–10.10.13.215

The destination Host A’s IP must fall within 10.10.13.208–10.10.13.215 for the /29 to be the best match. Since /29 is the longest prefix among the matching options, Router1 will use 10.10.13.208/29.
Thus, the correct answer is D.

S
srameh
4/14/2026 10:09:29 AM

Question 3:

  • Correct answer: Phase 4, Post Accreditation

  • Explanation:
- In DITSCAP, the four phases are: - Phase 1: Definition (concept and requirements) - Phase 2: Verification (design and testing) - Phase 3: Validation (fielding and evaluation) - Phase 4: Post Accreditation (ongoing operations and lifecycle management) - The description—continuing operation of an accredited IT system and addressing changing threats throughout its life cycle—fits the Post Accreditation phase, which covers operations, maintenance, monitoring, and reauthorization as threats and environment evolve.

O
onibokun10
4/13/2026 7:50:14 PM

Question 129:
Correct answer: CNAME

  • A CNAME record creates an alias for a domain, so newapplication.comptia.org will resolve to whatever IP address www.comptia.org resolves to. This ensures both names point to the same resource without duplicating the IP.
  • Why not the others:
- SOA defines authoritative information for a zone. - MX specifies mail exchange servers. - NS designates name servers for a zone.
  • Notes: The alias name (newapplication.comptia.org) should not have other records if you use a CNAME for it, and CNAMEs aren’t used for the zone apex (root) domain. This scenario uses a subdomain, so a CNAME is appropriate.

A
Anonymous User
4/13/2026 6:29:58 PM

Question 1:

  • Correct answer: C

  • Why this is best:
- Uses OS Login with IAM, so SSH access is granted via Google accounts rather than distributing per-user SSH keys. - Granting the compute.osAdminLogin role to a Google group gives admin access to all team members in a centralized, auditable way. - Access is auditable: Cloud Audit Logs show who accessed which VM, satisfying the security requirement to determine who accessed a given instance.
  • How it works:
- Enable OS Login on the project/instances (enable-oslogin metadata). - Add the team’s

A
Anonymous User
4/13/2026 1:00:51 PM

Question 2:

  • Answer: D. Azure Advisor

  • Why: To view security-related recommendations for resources in the Compute and Apps area (including App Service Web Apps and Functions), you use Azure Advisor. Advisor surfaces personalized best-practice recommendations across resources, including security, and shows which resources are affected and the severity.

  • Why not the others:
- Azure Log Analytics is for ad-hoc querying of telemetry, not for viewing security recommendations. - Azure Event Hubs is for streaming telemetry data, not for security recommendations.
  • Quick tip: In the portal, navigate to Azure Advisor and check the Security recommendations for App Services to see actionable items and affe

D
Don
4/11/2026 5:36:42 AM

Recommend using AI for Solutions rather the Answer(s) submitted here

M
Mogae Malapela
4/8/2026 6:37:56 AM

This is very interesting

A
Anon
4/6/2026 5:22:54 PM

Are these the same questions you have to pay for in ExamTopics?

L
LRK
3/22/2026 2:38:08 PM

For Question 7 - while the answer description indicates the correct answer, the option no. mentioned is incorrect. Nice and Comprehensive. Thankyou

R
Rian
3/19/2026 9:12:10 AM

This is very good and accurate. Explanation is very helpful even thou some are not 100% right but good enough to pass.

G
Gerrard
3/18/2026 6:58:37 AM

The DP-900 exam can be tricky if you aren't familiar with Microsoft’s specific cloud terminology. I used the practice questions from free-braindumps.com and found them incredibly helpful. The site breaks down core data concepts and Azure services in a way that actually mirrors the real test. As a resutl I passed my exam.

V
Vineet Kumar
3/6/2026 5:26:16 AM

interesting

J
Joe
1/20/2026 8:25:24 AM

Passed this exam 2 days ago. These questions are in the exam. You are safe to use them.

N
NJ
12/24/2025 10:39:07 AM

Helpful to test your preparedness before giving exam

A
Ashwini
12/17/2025 8:24:45 AM

Really helped

J
Jagadesh
12/16/2025 9:57:10 AM

Good explanation

AI Tutor 👋 I’m here to help!