ExamGecko
Home / Microsoft / AZ-500 / List of questions
Ask Question

Microsoft AZ-500 Practice Test - Questions Answers, Page 14

Add to Whishlist

List of questions

Question 131

Report Export Collapse

You plan to create an Azure Kubernetes Service (AKS) cluster in an Azure subscription.

The manifest of the registered server application is shown in the following exhibit.

Microsoft AZ-500 image Question 58 87380 10022024015441000000

You need to ensure that the AKS cluster and Azure Active Directory (Azure AD) are integrated.

Which property should you modify in the manifest?

accessTokenAcceptedVersion
accessTokenAcceptedVersion
keyCredentials
keyCredentials
groupMembershipClaims
groupMembershipClaims
acceptMappedClaims
acceptMappedClaims
Suggested answer: C
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/aks/azure-ad-integration-cli

https://www.codeproject.com/Articles/3211864/Operation-and-Maintenance-of-AKS-Applications

asked 02/10/2024
Dominique Reemer
43 questions

Question 132

Report Export Collapse

HOTSPOT

You have the Azure virtual networks shown in the following table.

Microsoft AZ-500 image Question 59 87381 10022024015441000000

You have the Azure virtual machines shown in the following table.

Microsoft AZ-500 image Question 59 87381 10022024015441000000

The firewalls on all the virtual machines allow ping traffic.

NSG1 is configured as shown in the following exhibit.

Inbound security rules

Microsoft AZ-500 image Question 59 87381 10022024015441000000

Outbound security rules

Microsoft AZ-500 image Question 59 87381 10022024015441000000

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Microsoft AZ-500 image Question 132 87381 10022024015441000
Correct answer: Microsoft AZ-500 image answer Question 132 87381 10022024015441000
Explanation:

Box 1: Yes

VM1 and VM3 are on peered VNets. The firewall rules with a source of ASG1 and ASG2 allow β€˜any’ traffic on β€˜any’ protocol so pings are allowed between VM1 and VM3.

Box 2: No

VM2 and VM4 are on separate VNets and the VNets are not peered. Therefore, the pings would have to go over the Internet. VM4 does have a public IP and the firewall allows pings. However, for VM2 to be able to ping VM4, VM2 would also need a public IP address. In Azure, pings don’t go out through the default gateway as they would in a physical network. For an Azure VM to ping external IPs, the VM must have a public IP address assigned to it.

Box 3: Yes

VM3 has a public IP address and the firewall allows traffic on port 3389.

asked 02/10/2024
Dusan Munjiza
53 questions

Question 133

Report Export Collapse

You have an Azure subscription that contains two virtual machines named VM1 and VM2 that run Windows Server 2019.

You are implementing Update Management in Azure Automation.

You plan to create a new update deployment named Update1.

You need to ensure that Update1 meets the following requirements:

Automatically applies updates to VM1 and VM2.

Automatically adds any new Windows Server 2019 virtual machines to Update1.

What should you include in Update1?

a security group that has a Membership type of Assigned
a security group that has a Membership type of Assigned
a security group that has a Membership type of Dynamic Device
a security group that has a Membership type of Dynamic Device
a dynamic group query
a dynamic group query
a Kusto query language query
a Kusto query language query
Suggested answer: C
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/automation/update-management/configure-groups

asked 02/10/2024
Tony Hardyanto
36 questions

Question 134

Report Export Collapse

You have multiple development teams that will create apps in Azure.

You plan to create a standard development environment that will be deployed for each team.

You need to recommend a solution that will enforce resource locks across the development environments and ensure that the locks are applied in a consistent manner.

What should you include in the recommendation?

an Azure policy
an Azure policy
an Azure Resource Manager template
an Azure Resource Manager template
a management group
a management group
an Azure blueprint
an Azure blueprint
Suggested answer: D
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/governance/blueprints/concepts/resource-locking

asked 02/10/2024
Robert Hernady
36 questions

Question 135

Report Export Collapse

Note: This question-is part of a series of questions that present the same scenario. Each question-in the series contains a unique solution that might meet the stated goals. Some question-sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question-in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have an Azure Subscription named Sub1.

You have an Azure Storage account named Sa1 in a resource group named RG1.

Users and applications access the blob service and the file service in Sa1 by using several shared access signatures (SASs) and stored access policies. You discover that unauthorized users accessed both the file service and the blob service.

You need to revoke all access to Sa1.

Solution: You create a new stored access policy.

Does this meet the goal?

Yes
Yes
No
No
Suggested answer: B
Explanation:

Creating a new (additional) stored access policy with have no effect on the existing policy or the SAS’s linked to it. To revoke a stored access policy, you can either delete it, or rename it by changing the signed identifier. Changing the signed identifier breaks the associations between any existing signatures and the stored access policy. Deleting or renaming the stored access policy immediately effects all of the shared access signatures associated with it. References: https://docs.microsoft.com/en-us/rest/api/storageservices/Establishing-a-Stored-Access-Policy

asked 02/10/2024
Joseph McCray
47 questions

Question 136

Report Export Collapse

Note: This question-is part of a series of questions that present the same scenario. Each question-in the series contains a unique solution that might meet the stated goals. Some question-sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question-in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a hybrid configuration of Azure Active Directory (AzureAD).

You have an Azure HDInsight cluster on a virtual network.

You plan to allow users to authenticate to the cluster by using their on-premises Active Directory credentials. You need to configure the environment to support the planned authentication.

Solution: You deploy the On-premises data gateway to the on-premises network.

Does this meet the goal?

Yes
Yes
No
No
Suggested answer: B
Explanation:

Instead, you connect HDInsight to your on-premises network by using Azure Virtual Networks and a VPN gateway. Note: To allow HDInsight and resources in the joined network to communicate by name, you must perform the following actions: Create Azure Virtual Network. Create a custom DNS server in the Azure Virtual Network.

Configure the virtual network to use the custom DNS server instead of the default Azure Recursive Resolver. Configure forwarding between the custom DNS server and your on-premises DNS server. References: https://docs.microsoft.com/en-us/azure/hdinsight/connect-on-premises-network

asked 02/10/2024
sheldan simeina
40 questions

Question 137

Report Export Collapse

Note: This question-is part of a series of questions that present the same scenario. Each question-in the series contains a unique solution that might meet the stated goals. Some question-sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question-in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a hybrid configuration of Azure Active Directory (AzureAD).

You have an Azure HDInsight cluster on a virtual network.

You plan to allow users to authenticate to the cluster by using their on-premises Active Directory credentials. You need to configure the environment to support the planned authentication.

Solution: You create a site-to-site VPN between the virtual network and the on-premises network.

Does this meet the goal?

Yes
Yes
No
No
Suggested answer: A
Explanation:

You can connect HDInsight to your on-premises network by using Azure Virtual Networks and a VPN gateway. Note: To allow HDInsight and resources in the joined network to communicate by name, you must perform the following actions: Create Azure Virtual Network. Create a custom DNS server in the Azure Virtual Network.

Configure the virtual network to use the custom DNS server instead of the default Azure Recursive Resolver. Configure forwarding between the custom DNS server and your on-premises DNS server. References: https://docs.microsoft.com/en-us/azure/hdinsight/connect-on-premises-network

asked 02/10/2024
Gishi Anurag
32 questions

Question 138

Report Export Collapse

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. You plan to deploy Azure AD Connect and to integrate Active Directory and the Azure AD tenant.

You need to recommend an integration solution that meets the following requirements:

Ensures that password policies and user logon restrictions apply to user accounts that are synced to the tenant Minimizes the number of servers required for the solution. Which authentication method should you include in the recommendation?

federated identity with Active Directory Federation Services (AD FS)
federated identity with Active Directory Federation Services (AD FS)
password hash synchronization with seamless single sign-on (SSO)
password hash synchronization with seamless single sign-on (SSO)
pass-through authentication with seamless single sign-on (SSO)
pass-through authentication with seamless single sign-on (SSO)
Suggested answer: B
Explanation:

Password hash synchronization requires the least effort regarding deployment, maintenance, and infrastructure. This level of effort typically applies to organizations that only need their users to sign in to Office 365, SaaS apps, and other Azure AD-based resources. When turned on, password hash synchronization is part of the Azure AD Connect sync process and runs every two minutes. Incorrect Answers:

A: A federated authentication system relies on an external trusted system to authenticate users. Some companies want to reuse their existing federated system investment with their Azure AD hybrid identity solution. The maintenance and management of the federated system falls outside the control of Azure AD. It's up to the organization by using the federated system to make sure it's deployed securely and can handle the authentication load. C: For pass-through authentication, you need one or more (we recommend three) lightweight agents installed on existing servers. These agents must have access to your on-premises Active Directory Domain Services, including your onpremises AD domain controllers. They need outbound access to the Internet and access to your domain controllers. For this reason, it's not supported to deploy the agents in a perimeter network. Pass-through Authentication requires unconstrained network access to domain controllers. All network traffic is encrypted and limited to authentication requests. References: https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-pta

asked 02/10/2024
Felix Bourdier
51 questions

Question 139

Report Export Collapse

Your network contains an on-premises Active Directory domain named corp.contoso.com.

You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. You sync all on-premises identities to Azure AD.

You need to prevent users who have a givenName attribute that starts with TEST from being synced to Azure AD. The solution must minimize administrative effort. What should you use?

Synchronization Rules Editor
Synchronization Rules Editor
Web Service Configuration Tool
Web Service Configuration Tool
the Azure AD Connect wizard
the Azure AD Connect wizard
Active Directory Users and Computers
Active Directory Users and Computers
Suggested answer: A
Explanation:

Use the Synchronization Rules Editor and write attribute-based filtering rule.

References: https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-sync-change-the-configuration

asked 02/10/2024
giulio guzzi
47 questions

Question 140

Report Export Collapse

Your company plans to create separate subscriptions for each department. Each subscription will be associated to the same Azure Active Directory (Azure AD) tenant.

You need to configure each subscription to have the same role assignments.

What should you use?

Azure Security Center
Azure Security Center
Azure Policy
Azure Policy
Azure AD Privileged Identity Management (PIM)
Azure AD Privileged Identity Management (PIM)
Azure Blueprints
Azure Blueprints
Suggested answer: D
Explanation:

Just as a blueprint allows an engineer or an architect to sketch a project's design parameters, Azure Blueprints enables cloud architects and central information technology groups to define a repeatable set of Azure resources that implements and adheres to an organization's standards, patterns, and requirements.

Blueprints are a declarative way to orchestrate the deployment of various resource templates and other artifacts such as:

Role Assignments

Policy Assignments

Azure Resource Manager templates

Resource Groups

Reference:

https://docs.microsoft.com/en-us/azure/governance/blueprints/overview

asked 02/10/2024
William Macy
59 questions
Total 442 questions
Go to page: of 45
Search

Related questions