ExamGecko
Home Home / Microsoft / AZ-500

Microsoft AZ-500 Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

Related questions











SIMULATION

You need to ensure that web11597200 is protected from malware by using Microsoft Antimalware for Virtual Machines and is scanned every Friday at 01:00.

To complete this task, sign in to the Azure portal.

A.
A.
Answers
Suggested answer: A

Explanation:

Answer: A

Explanation:

You need to install and configure the Microsoft Antimalware extension on the virtual machine named web11597200.

1. In the Azure portal, type Virtual Machines in the search box, select Virtual Machines from the search results then select web11597200. Alternatively, browse to Virtual Machines in the left navigation pane.

2. In the properties of web11597200, click on Extensions.

3. Click the Add button to add an Extension.

4. Scroll down the list of extensions and select Microsoft Antimalware.

5. Click the Create button. This will open the settings pane for the Microsoft Antimalware Extension.

6. In the Scan day field, select Friday.

7. In the Scan time field, enter 60. The scan time is measured in minutes after midnight so 60 would be 01:00, 120 would be 02:00 etc.

8. Click the OK button to save the configuration and install the extension.

SIMULATION

You need to ensure that the events in the NetworkSecurityGroupRuleCounter log of the VNET01-Subnet0-NSG network security group (NSG) are stored in the logs11597200 Azure Storage account for 30 days. To complete this task, sign in to the Azure portal.

A.
A.
Answers
Suggested answer: A

Explanation:

Answer: A

Explanation:

You need to configure the diagnostic logging for the NetworkSecurityGroupRuleCounter log.

1. In the Azure portal, type Network Security Groups in the search box, select Network Security Groups from the search results then select VNET01-Subnet0-NSG. Alternatively, browse to Network Security Groups in the left navigation pane.

2. In the properties of the Network Security Group, click on Diagnostic Settings.

3. Click on the Add diagnostic setting link.

4. Provide a name in the Diagnostic settings name field. It doesn’t matter what name you provide for the exam. 5. In the Log section, select NetworkSecurityGroupRuleCounter.

6. In the Destination details section, select Archive to a storage account.

7. In the Storage account field, select the logs11597200 storage account.

8. In the Retention (days) field, enter 30.

9. Click the Save button to save the changes.

SIMULATION

A user named Debbie has the Azure app installed on her mobile device.

You need to ensure that [email protected] is alerted when a resource lock is deleted.

To complete this task, sign in to the Azure portal.

A.
A.
Answers
Suggested answer: A

Explanation:

Answer: A

Explanation:

You need to configure an alert rule in Azure Monitor.

1. Type Monitor into the search box and select Monitor from the search results.

2. Click on Alerts.

3. Click on +New Alert Rule.

4. In the Scope section, click on the Select resource link.

5. In the Filter by resource type box, type locks and select Management locks (locks) from the filtered results. 6. Select the subscription then click the Done button.

7. In the Condition section, click on the Select condition link.

8. Select the Delete management locks condition the click the Done button.

9. In the Action group section, click on the Select action group link.

10. Click the Create action group button to create a new action group.

11. Give the group a name such as Debbie Mobile App (it doesn’t matter what name you enter for the exam) then click the Next: Notifications > button. 12. In the Notification type box, select the Email/SMS message/Push/Voice option.

13. In the Email/SMS message/Push/Voice window, tick the Azure app Push Notifications checkbox and enter [email protected] in the Azure account email field. 14. Click the OK button to close the window.

15. Enter a name such as Debbie Mobile App in the notification name box.

16. Click the Review & Create button then click the Create button to create the action group.

17. Back in the Create alert rule window, in the Alert rule details section, enter a name such as Management lock deletion in the Alert rule name field. 18. Click the Create alert rule button to create the alert rule.

You are troubleshooting a security issue for an Azure Storage account.

You enable the diagnostic logs for the storage account.

What should you use to retrieve the diagnostics logs?

A.
Azure Storage Explorer
A.
Azure Storage Explorer
Answers
B.
SQL query editor in Azure
B.
SQL query editor in Azure
Answers
C.
File Explorer in Windows
C.
File Explorer in Windows
Answers
D.
Azure Security Center
D.
Azure Security Center
Answers
Suggested answer: A

Explanation:

If you want to download the metrics for long-term storage or to analyze them locally, you must use a tool or write some code to read the tables. You must download the minute metrics for analysis. The tables do not appear if you list all the tables in your storage account, but you can access them directly by name. Many storage-browsing tools are aware of these tables and enable you to view them directly (see Azure Storage Client Tools for a list of available tools).

Microsoft provides several graphical user interface (GUI) tools for working with the data in your Azure Storage account. All of the tools outlined in the following table are free.

References:

https://docs.microsoft.com/en-us/azure/storage/common/storage-analytics-metrics?toc=%2fazure%2fstorage%2fblobs%2ftoc.json

https://docs.microsoft.com/en-us/azure/storage/common/storage-explorers

SIMULATION

You plan to connect several Windows servers to the WS11641655 Azure Log Analytics workspace.

You need to ensure that the events in the System event logs are collected automatically to the workspace after you connect the Windows servers.

To complete this task, sign in to the Azure portal and modify the Azure resources.

A.
A.
Answers
Suggested answer: A

Explanation:

Answer: A

Explanation:

Azure Monitor can collect events from the Windows event logs or Linux Syslog and performance counters that you specify for longer term analysis and reporting, and take action when a particular condition is detected. Follow these steps to configure collection of events from the Windows system log and Linux Syslog, and several common performance counters to start with.

Data collection from Windows VM

1. In the Azure portal, locate the WS11641655 Azure Log Analytics workspace then select Advanced settings.

2. Select Data, and then select Windows Event Logs.

3. You add an event log by typing in the name of the log. Type System and then select the plus sign +.

4. In the table, check the severities Error and Warning. (for this question, select all severities to ensure that ALL logs are collected).

5. Select Save at the top of the page to save the configuration.

Reference:

https://docs.microsoft.com/en-us/azure/azure-monitor/learn/quick-collect-azurevm

SIMULATION

You need to ensure that the AzureBackupReport log for the Vault1 Recovery Services vault is stored in the WS11641655 Azure Log Analytics workspace.

To complete this task, sign in to the Azure portal and modify the Azure resources.

A.
A.
Answers
Suggested answer: A

Explanation:

Answer: A

Explanation:

1. In the Azure portal, type Recovery Services Vaults in the search box, select Recovery Services Vaults from the search results then select Vault1. Alternatively, browse to Recovery Services Vaults in the left navigation pane. 2. In the properties of Vault1, scroll down to the Monitoring section and select Diagnostic Settings. 3. Click the Add a diagnostic setting link.

4. Enter a name in the Diagnostic settings name box.

5. In the Log section, select AzureBackupReport.

6. In the Destination details section, select Send to log analytics

7. Select the WS11641655 Azure Log Analytics workspace.

8. Click the Save button to save the changes.

Reference:

https://docs.microsoft.com/en-us/azure/backup/backup-azure-diagnostic-events

SIMULATION

You need to ensure that the audit logs from the SQLdb1 Azure SQL database are stored in the WS11641655 Azure Log Analytics workspace.

To complete this task, sign in to the Azure portal and modify the Azure resources.

A.
A.
Answers
Suggested answer: A

Explanation:

Answer: A

Explanation:

1. In the Azure portal, type SQL in the search box, select SQL databases from the search results then select SQLdb1. Alternatively, browse to SQL databases in the left navigation pane.

2. In the properties of SQLdb1, scroll down to the Security section and select Auditing.

3. Turn auditing on if it isn’t already, tick the Log Analytics checkbox then click on Configure.

4. Select the WS11641655 Azure Log Analytics workspace.

5. Click Save to save the changes.

You onboard Azure Sentinel. You connect Azure Sentinel to Azure Security Center.

You need to automate the mitigation of incidents in Azure Sentinel. The solution must minimize administrative effort.

What should you create?

A.
an alert rule
A.
an alert rule
Answers
B.
a playbook
B.
a playbook
Answers
C.
a function app
C.
a function app
Answers
D.
a runbook
D.
a runbook
Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/tutorial-respond-threats-playbook

You have an Azure subscription named Subscription1.

You deploy a Linux virtual machine named VM1 to Subscription1.

You need to monitor the metrics and the logs of VM1.

What should you use?

A.
the AzurePerformanceDiagnostics extension
A.
the AzurePerformanceDiagnostics extension
Answers
B.
Azure HDInsight
B.
Azure HDInsight
Answers
C.
Linux Diagnostic Extension (LAD) 3.0
C.
Linux Diagnostic Extension (LAD) 3.0
Answers
D.
Azure Analysis Services
D.
Azure Analysis Services
Answers
Suggested answer: C

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/virtual-machines/extensions/diagnostics-linux

You have an Azure Active Directory (Azure AD) tenant named contoso.com.

You need to configure diagnostic settings for contoso.com. The solution must meet the following requirements:

Retain logs for two years.

Query logs by using the Kusto query language.

Minimize administrative effort.

Where should you store the logs?

A.
an Azure event hub
A.
an Azure event hub
Answers
B.
an Azure Log Analytics workspace
B.
an Azure Log Analytics workspace
Answers
C.
an Azure Storage account
C.
an Azure Storage account
Answers
Suggested answer: B
Total 439 questions
Go to page: of 44