Administering Windows Server Hybrid Core Infrastructure (AZ-800) Practice

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the AZ-800 exam with our comprehensive practice quiz. Test your knowledge with multiple-choice questions and detailed explanations. Enhance your skills in Windows Server Hybrid Core Infrastructure to excel in your certification exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What contains the encrypted secrets necessary for deploying a shielded VM?

  1. A Trusted Computing Group Information log file

  2. The code integrity policy

  3. A shielding data file

  4. The template configuration file

The correct answer is: A shielding data file

The shielding data file is essential for deploying a shielded virtual machine (VM) because it contains the encrypted secrets necessary for the secure operation of the VM. This file holds critical information, such as the encryption keys and the trusted attestation information that ensures the integrity and confidentiality of the VM's data and configuration. This capability is crucial in environments where protecting sensitive workloads is a priority. When a shielded VM is created, the shielding data file is generated to provide the necessary information to the hypervisor and the virtual machine manager, allowing them to validate and secure the VM during deployment and operation. This approach helps prevent unauthorized access and ensures that the VM runs in a trusted environment, compliant with the security requirements of the organization. In contrast, other options, while potentially related to virtualization or security, do not serve the same purpose as the shielding data file in the context of deploying shielded VMs. The trusted computing group log file typically contains logs and reports related to hardware security, while the code integrity policy relates to the enforcement of security policies for applications. The template configuration file, on the other hand, is focused on providing a base configuration for VMs but does not include the required secrets for their secure operation.