ExamGecko

AZ-500: Microsoft Azure Security Technologies

Microsoft Azure Security Technologies
Vendor:

Microsoft

Microsoft Azure Security Technologies Exam Questions: 442
Microsoft Azure Security Technologies   2.370 Learners
Take Practice Tests
Comming soon
PDF | VPLUS

The Microsoft Certified: Azure Security Technologies (AZ-500) exam is a crucial certification for anyone aiming to advance their career in cloud security on Microsoft Azure. Our topic is your ultimate resource for AZ-500 practice test shared by individuals who have successfully passed the exam. These practice tests provide real-world scenarios and invaluable insights to help you ace your preparation.

Why Use AZ-500 Practice Test?

  • Real Exam Experience: Our practice test accurately replicates the format and difficulty of the actual Microsoft AZ-500 exam, providing you with a realistic preparation experience.

  • Identify Knowledge Gaps: Practicing with these tests helps you identify areas where you need more study, allowing you to focus your efforts effectively.

  • Boost Confidence: Regular practice with exam-like questions builds your confidence and reduces test anxiety.

  • Track Your Progress: Monitor your performance over time to see your improvement and adjust your study plan accordingly.

Key Features of AZ-500 Practice Test:

  • Up-to-Date Content: Our community ensures that the questions are regularly updated to reflect the latest exam objectives and technology trends.

  • Detailed Explanations: Each question comes with detailed explanations, helping you understand the correct answers and learn from any mistakes.

  • Comprehensive Coverage: The practice test covers all key topics of the Microsoft AZ-500 exam, including identity and access management, security operations, threat protection, and more.

  • Customizable Practice: Create your own practice sessions based on specific topics or difficulty levels to tailor your study experience to your needs.

Exam number: AZ-500

Exam name: Microsoft Certified: Azure Security Technologies

Length of test: 100 minutes

Exam format: Multiple-choice and multiple-response questions.

Exam language: English

Number of questions in the actual exam: Maximum of 40-60 questions

Passing score: 700/1000

Use the member-shared Microsoft AZ-500 Practice Test to ensure you’re fully prepared for your certification exam. Start practicing today and take a significant step towards achieving your certification goals!

Related questions

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have an Azure Subscription. The subscription contains 50 virtual machines that run Windows Server 2012 R2 or Windows Server 2016.

You need to deploy Microsoft Antimalware to the virtual machines.

Solution: You add an extension to each virtual machine.

Does this meet the goal?

A.
Yes
A.
Yes
Answers
B.
No
B.
No
Answers
Suggested answer: A

Explanation:

You can use Visual Studio to enable and configure the Microsoft Antimalware service. This entails selecting Microsoft Antimalware extension from the dropdown list under Installed Extensions and click Add to configure with default antimalware configuration.

References:

https://docs.microsoft.com/en-us/azure/security/fundamentals/antimalware

asked 02/10/2024
Romain PAILLAS
32 questions

Simulation LAB

Task 1

You need to ensure that connections from the Internet to VNET1\subnet0 are allowed only over TCP port 7777. The solution must use only currently deployed resources.

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

You have Azure Resource Manager templates that you use to deploy Azure virtual machines.

You need to disable unused Windows features automatically as instances of the virtual machines are provisioned. What should you use?

A.
device configuration policies in Microsoft Intune
A.
device configuration policies in Microsoft Intune
Answers
B.
an Azure Desired State Configuration (DSC) virtual machine extension
B.
an Azure Desired State Configuration (DSC) virtual machine extension
Answers
C.
application security groups
C.
application security groups
Answers
D.
device compliance policies in Microsoft Intune
D.
device compliance policies in Microsoft Intune
Answers
Suggested answer: B

Explanation:

The primary use case for the Azure Desired State Configuration (DSC) extension is to bootstrap a VM to the Azure Automation State Configuration (DSC) service. The service provides benefits that include ongoing management of the VM configuration and integration with other operational tools, such as Azure Monitoring. Using the extension to register VM's to the service provides a flexible solution that even works across Azure subscriptions.

Reference:

https://docs.microsoft.com/en-us/azure/virtual-machines/extensions/dsc-overview

asked 02/10/2024
de jong arjen
45 questions

You are configuring and securing a network environment.

You deploy an Azure virtual machine named VM1 that is configured to analyze network traffic.

You need to ensure that all network traffic is routed through VM1.

What should you configure?

A.
a system route
A.
a system route
Answers
B.
a network security group (NSG)
B.
a network security group (NSG)
Answers
C.
a user-defined route
C.
a user-defined route
Answers
Suggested answer: C

Explanation:

Although the use of system routes facilitates traffic automatically for your deployment, there are cases in which you want to control the routing of packets through a virtual appliance. You can do so by creating user defined routes that specify the next hop for packets flowing to a specific subnet to go to your virtual appliance instead, and enabling IP forwarding for the VM running as the virtual appliance.

Note: User Defined Routes

For most environments you will only need the system routes already defined by Azure. However, you may need to create a route table and add one or more routes in specific cases, such as:

Force tunneling to the Internet via your on-premises network.

Use of virtual appliances in your Azure environment.

In the scenarios above, you will have to create a route table and add user defined routes to it.

Reference:

https://github.com/uglide/azure-content/blob/master/articles/virtual-network/virtual-networks-udr-overview.md

asked 02/10/2024
Sneh Fields
37 questions

HOTSPOT

You have an Azure subscription that contains the resources shown in the following table.

Transparent Data Encryption (TDE) is disabled on SQL1.

You assign policies to the resource groups as shown in the following table.

You plan to deploy Azure SQL databases by using an Azure Resource Manager (ARM) template. The databases will be configured as shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Question 287
Correct answer: Question 287

Explanation:

https://docs.microsoft.com/en-us/azure/governance/policy/concepts/effects

asked 02/10/2024
sailakshmi KM
41 questions

You have an Azure subscription that contains the Azure virtual machines shown in the following table.

You create an MDM Security Baseline profile named Profile1.

You need to identify to which virtual machines Profile1 can be applied.

Which virtual machines should you identify?

A.
VM1 only
A.
VM1 only
Answers
B.
VM1, VM2, and VM3 only
B.
VM1, VM2, and VM3 only
Answers
C.
VM1 and VM3 only
C.
VM1 and VM3 only
Answers
D.
VM1, VM2, VM3, and VM4
D.
VM1, VM2, VM3, and VM4
Answers
Suggested answer: A

Explanation:

Reference:

https://docs.microsoft.com/en-us/mem/intune/protect/security-baselines

asked 02/10/2024
David Wang
28 questions

HOTSPOT

You have Azure virtual machines that have Update Management enabled. The virtual machines are configured as shown in the following table.

You schedule two update deployments named Update1 and Update2. Update1 updates VM3. Update2 updates VM6.

Which additional virtual machines can be updated by using Update1 and Update2? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 82
Correct answer: Question 82

Explanation:

Update1: VM1 and VM2 only

VM3: Windows Server 2016 West US RG2

Update2: VM4 and VM5 only

VM6: CentOS 7.5 East US RG1

For Linux, the machine must have access to an update repository. The update repository can be private or public.

References:

https://docs.microsoft.com/en-us/azure/automation/automation-update-management

asked 02/10/2024
Luca Bombelli
36 questions

You are testing an Azure Kubernetes Service (AKS) cluster. The cluster is configured as shown in the exhibit. (Click the Exhibit tab.)

You plan to deploy the cluster to production. You disable HTTP application routing.

You need to implement application routing that will provide reverse proxy and TLS termination for AKS services by using a single IP address.

What should you do?

A.
Create an AKS Ingress controller.
A.
Create an AKS Ingress controller.
Answers
B.
Install the container network interface (CNI) plug-in.
B.
Install the container network interface (CNI) plug-in.
Answers
C.
Create an Azure Standard Load Balancer.
C.
Create an Azure Standard Load Balancer.
Answers
D.
Create an Azure Basic Load Balancer.
D.
Create an Azure Basic Load Balancer.
Answers
Suggested answer: A

Explanation:

An ingress controller is a piece of software that provides reverse proxy, configurable traffic routing, and TLS termination for Kubernetes services. References: https://docs.microsoft.com/en-us/azure/aks/ingress-tls

asked 02/10/2024
Tiago Martins
33 questions

HOTSPOT

You have an Azure subscription that contains the following resources:

An Azure key vault

An Azure SQL database named Database1

Two Azure App Service web apps named AppSrv1 and AppSrv2 that are configured to use system-assigned managed identities and access Database1

You need to implement an encryption solution for Database1 that meets the following requirements:

The data in a column named Discount in Database1 must be encrypted so that only AppSrv1 can decrypt the data. AppSrv1 and AppSrv2 must be authorized by using managed identities to obtain cryptographic keys.

How should you configure the encryption settings for Database1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 73
Correct answer: Question 73

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/azure-sql/database/always-encrypted-azure-key-vault-configure?tabs=azure-powershell

asked 02/10/2024
Paula Castanheira
36 questions

HOTSPOT

You have an Azure key vault.

You need to delegate administrative access to the key vault to meet the following requirements:

Provide a user named User1 with the ability to set advanced access policies for the key vault.

Provide a user named User2 with the ability to add and delete certificates in the key vault.

Use the principle of least privilege.

What should you use to assign access to each user? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 84
Correct answer: Question 84

Explanation:

User1: RBAC

RBAC is used as the Key Vault access control mechanism for the management plane. It would allow a user with the proper identity to:

set Key Vault access policies

create, read, update, and delete key vaults

set Key Vault tags

Note: Role-based access control (RBAC) is a system that provides fine-grained access management of Azure resources. Using RBAC, you can segregate duties within your team and grant only the amount of access to users that they need to perform their jobs.

User2: A key vault access policy

A key vault access policy is the access control mechanism to get access to the key vault data plane. Key Vault access policies grant permissions separately to keys, secrets, and certificates.

References:

https://docs.microsoft.com/en-us/azure/key-vault/key-vault-secure-your-key-vault

asked 02/10/2024
Damodar Daesrath
42 questions