ExamGecko
Home Home / Microsoft / AZ-500

Microsoft AZ-500 Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

Related questions











You have an Azure Container Registry named ContReg1 that contains a container image named image1.

You enable content trust for ContReg1.

After content trust is enabled, you push two images to ContReg1 as shown in the following table.

Which images are trusted images?

A.
image1 and image2 only
A.
image1 and image2 only
Answers
B.
image2 only
B.
image2 only
Answers
C.
image1, image2, and image3
C.
image1, image2, and image3
Answers
Suggested answer: B

Explanation:

Azure Container Registry implements Docker's content trust model, enabling pushing and pulling of signed images.

To push a trusted image tag to your container registry, enable content trust and push the image with docker push.

To work with trusted images, both image publishers and consumers need to enable content trust for their Docker clients. As a publisher, you can sign the images you push to a content trust-enabled registry.

Reference:

https://docs.microsoft.com/en-us/azure/container-registry/container-registry-content-trust

SIMULATION

Use the following login credentials as needed:

To enter your username, place your cursor in the Sign in box and click on the username below.

To enter your password, place your cursor in the Enter password box and click on the password below.

Azure Username: [email protected]

Azure Password: Ag1Bh9!#Bd

The following information is for technical support purposes only:

Lab Instance: 10598168

You need to configure Azure to allow RDP connections from the Internet to a virtual machine named VM1. The solution must minimize the attack surface of VM1.

To complete this task, sign in to the Azure portal.

A.
A.
Answers
Suggested answer: A

Explanation:

Answer: A

Explanation:

To enable the RDP port in an NSG, follow these steps:

1. Sign in to the Azure portal.

2. In Virtual Machines, select VM1

3. In Settings, select Networking.

4. In Inbound port rules, check whether the port for RDP is set correctly. The following is an example of the configuration:

Priority: 300

Name: Port_3389

Port(Destination): 3389

Protocol: TCP

Source: Any

Destinations: Any

Action: Allow

Reference:

https://docs.microsoft.com/en-us/azure/virtual-machines/troubleshooting/troubleshoot-rdp-nsg-problem

SIMULATION

Use the following login credentials as needed:

To enter your username, place your cursor in the Sign in box and click on the username below.

To enter your password, place your cursor in the Enter password box and click on the password below.

Azure Username: [email protected]

Azure Password: Ag1Bh9!#Bd

The following information is for technical support purposes only:

Lab Instance: 10598168

You need to add the network interface of a virtual machine named VM1 to an application security group named ASG1.

To complete this task, sign in to the Azure portal.

A.
A.
Answers
Suggested answer: A

Explanation:

Answer: A

Explanation:

1. In the Search resources, services, and docs box at the top of the portal, begin typing the name of a virtual machine, VM1 that has a network interface that you want to add to, or remove from, an application security group.

2. When the name of your VM appears in the search results, select it.

3. Under SETTINGS, select Networking. Select Configure the application security groups, select the application security groups that you want to add the network interface to, or unselect the application security groups that you want to remove the network interface from, and then select Save.

Reference:

https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-network-interface

SIMULATION

Use the following login credentials as needed:

To enter your username, place your cursor in the Sign in box and click on the username below.

To enter your password, place your cursor in the Enter password box and click on the password below.

Azure Username: [email protected]

Azure Password: Ag1Bh9!#Bd

The following information is for technical support purposes only:

Lab Instance: 10598168

You need to perform a full malware scan every Sunday at 02:00 on a virtual machine named VM1 by using Microsoft Antimalware for Virtual Machines.

To complete this task, sign in to the Azure portal.

A.
A.
Answers
Suggested answer: A

Explanation:

Answer: A

Explanation:

Deploy the Microsoft Antimalware Extension using the Azure Portal for single VM deployment

1. In Azure Portal, go to the Azure VM1’s blade, navigate to the Extensions section and press Add.

2. Select the Microsoft Antimalware extension and press Create.

3. Fill the “Install extension” form as desired and press OK.

Scheduled: Enable

Scan type: Full

Scan day: Sunday

Reference:

https://www.e-apostolidis.gr/microsoft/azure/azure-vm-antimalware-extension-management/

SIMULATION

Use the following login credentials as needed:

To enter your username, place your cursor in the Sign in box and click on the username below.

To enter your password, place your cursor in the Enter password box and click on the password below.

Azure Username: [email protected]

Azure Password: Ag1Bh9!#Bd

The following information is for technical support purposes only:

Lab Instance: 10598168

You need to prevent administrative users from accidentally deleting a virtual network named VNET1. The administrative users must be allowed to modify the settings of VNET1.

To complete this task, sign in to the Azure portal.

A.
A.
Answers
Suggested answer: A

Explanation:

Answer: A

Explanation:

Locking prevents other users in your organization from accidentally deleting or modifying critical resources, such as Azure subscription, resource group, or resource.

Note: In Azure, the term resource refers to an entity managed by Azure. For example, virtual machines, virtual networks, and storage accounts are all referred to as Azure resources.

1. In the Settings blade for virtual network VNET, select Locks.

2. To add a lock, select Add.

3. For Lock type select Delete lock, and click OK

Reference:

https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-group-lock-resources

SIMULATION

Use the following login credentials as needed:

To enter your username, place your cursor in the Sign in box and click on the username below.

To enter your password, place your cursor in the Enter password box and click on the password below.

Azure Username: [email protected]

Azure Password: Ag1Bh9!#Bd

The following information is for technical support purposes only:

Lab Instance: 10598168

You need to ensure that a user named user21059868 can manage the properties of the virtual machines in the RG1lod10598168 resource group. The solution must use the principle of least privilege.

To complete this task, sign in to the Azure portal.

A.
A.
Answers
Suggested answer: A

Explanation:

Answer: A

Explanation:

1. In Azure portal, locate and select the RG1lod10598168 resource group.

2. Click Access control (IAM).

3. Click the Role assignments tab to view all the role assignments at this scope.

4. Click Add > Add role assignment to open the Add role assignment pane.

5. In the Role drop-down list, select the role Virtual Machine Contributor.

Virtual Machine Contributor lets you manage virtual machines, but not access to them, and not the virtual network or storage account they're connected to.

6. In the Select list, select user user21059868

7. Click Save to assign the role.

Reference:

https://docs.microsoft.com/en-us/azure/role-based-access-control/role-assignments-portal

https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#virtual-machine-contributor

SIMULATION

Use the following login credentials as needed:

To enter your username, place your cursor in the Sign in box and click on the username below.

To enter your password, place your cursor in the Enter password box and click on the password below.

Azure Username: [email protected]

Azure Password: Ag1Bh9!#Bd

The following information is for technical support purposes only:

Lab Instance: 10598168

You need to ensure that only devices connected to a 131.107.0.0/16 subnet can access data in the rg1lod10598168 Azure Storage account.

To complete this task, sign in to the Azure portal.

A.
A.
Answers
Suggested answer: A

Explanation:

Answer: A

Explanation:

Step 1:

1. In Azure portal go to the storage account you want to secure. Here: rg1lod10598168

2. Click on the settings menu called Firewalls and virtual networks.

3. To deny access by default, choose to allow access from Selected networks. To allow traffic from all networks, choose to allow access from All networks.

4. Click Save to apply your changes.

Step 2:

1. Go to the storage account you want to secure. Here: rg1lod10598168

2. Click on the settings menu called Firewalls and virtual networks.

3. Check that you've selected to allow access from Selected networks.

4. To grant access to a virtual network with a new network rule, under Virtual networks, click Add existing virtual network, select Virtual networks and Subnets options. Enter the 131.107.0.0/16 subnet and then click Add.

Note: When network rules are configured, only applications requesting data over the specified set of networks can access a storage account. You can limit access to your storage account to requests originating from specified IP addresses, IP ranges or from a list of subnets in an Azure Virtual Network (VNet).

Reference:

https://docs.microsoft.com/en-us/azure/storage/common/storage-network-security

You have Azure Resource Manager templates that you use to deploy Azure virtual machines.

You need to disable unused Windows features automatically as instances of the virtual machines are provisioned.

What should you use?

A.
device configuration policies in Microsoft Intune
A.
device configuration policies in Microsoft Intune
Answers
B.
Azure Automation State Configuration
B.
Azure Automation State Configuration
Answers
C.
security policies in Azure Security Center
C.
security policies in Azure Security Center
Answers
D.
device compliance policies in Microsoft Intune
D.
device compliance policies in Microsoft Intune
Answers
Suggested answer: B

Explanation:

You can use Azure Automation State Configuration to manage Azure VMs (both Classic and Resource Manager), on-premises VMs, Linux machines, AWS VMs, and on-premises physical machines.

Note: Azure Automation State Configuration provides a DSC pull server similar to the Windows Feature DSC-Service so that target nodes automatically receive configurations, conform to the desired state, and report back on their compliance. The built-in pull server in Azure Automation eliminates the need to set up and maintain your own pull server. Azure Automation can target virtual or physical Windows or Linux machines, in the cloud or on-premises.

Reference:

https://docs.microsoft.com/en-us/azure/automation/automation-dsc-getting-started

You have an Azure subscription that contains the Azure virtual machines shown in the following table.

You create an MDM Security Baseline profile named Profile1.

You need to identify to which virtual machines Profile1 can be applied.

Which virtual machines should you identify?

A.
VM1 only
A.
VM1 only
Answers
B.
VM1, VM2, and VM3 only
B.
VM1, VM2, and VM3 only
Answers
C.
VM1 and VM3 only
C.
VM1 and VM3 only
Answers
D.
VM1, VM2, VM3, and VM4
D.
VM1, VM2, VM3, and VM4
Answers
Suggested answer: A

Explanation:

Reference:

https://docs.microsoft.com/en-us/mem/intune/protect/security-baselines

SIMULATION

You need to ensure that connections from the Internet to VNET1\subnet0 are allowed only over TCP port 7777. The solution must use only currently deployed resources.

To complete this task, sign in to the Azure portal.

A.
A.
Answers
Suggested answer: A

Explanation:

Answer: A

Explanation:

You need to configure the Network Security Group that is associated with subnet0.

1. In the Azure portal, type Virtual Networks in the search box, select Virtual Networks from the search results then select VNET1. Alternatively, browse to Virtual Networks in the left navigation pane.

2. In the properties of VNET1, click on Subnets. This will display the subnets in VNET1 and the Network Security Group associated to each subnet. Note the name of the Network Security Group associated to Subnet0.

3. Type Network Security Groups into the search box and select the Network Security Group associated with Subnet0.

4. In the properties of the Network Security Group, click on Inbound Security Rules.

5. Click the Add button to add a new rule.

6. In the Source field, select Service Tag.

7. In the Source Service Tag field, select Internet.

8. Leave the Source port ranges and Destination field as the default values (* and All).

9. In the Destination port ranges field, enter 7777.

10. Change the Protocol to TCP.

11. Leave the Action option as Allow.

12. Change the Priority to 100.

13. Change the Name from the default Port_8080 to something more descriptive such as Allow_TCP_7777_from_Internet. The name cannot contain spaces. 14. Click the Add button to save the new rule.

Total 439 questions
Go to page: of 44