ExamGecko
Home Home / Microsoft / AZ-500

Microsoft AZ-500 Practice Test - Questions Answers, Page 31

Question list
Search
Search

List of questions

Search

Related questions











You have an Azure subscription that contains an Azure SQL Database logic server named SQL1 and an Azure virtual machine named VM1. VM1 uses a private IP address only. The Firewall and virtual networks settings for SQL1 are shown in the following exhibit.

You need to ensure that VM1 can connect to SQL1. The solution must use the principle of least privilege. What should you do?

A.
Add an existing virtual network.
A.
Add an existing virtual network.
Answers
B.
Set Connection Policy to Proxy.
B.
Set Connection Policy to Proxy.
Answers
C.
Create a new firewall rule.
C.
Create a new firewall rule.
Answers
D.
Set Allow Azure services and resources to access this server to Yes.
D.
Set Allow Azure services and resources to access this server to Yes.
Answers
Suggested answer: C

You have an Azure subscription that contains an Azure key vault. The role assignments for the key vault are shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point.

A.
A.
Answers
Suggested answer: A

HOTSPOT

You have an Azure subscription that contains a resource group named RG1. RG1 contains a virtual machine named VM1 that uses Azure Active Directory (Azure AD) authentication. You have two custom Azure roles named Role1 and Role2 that are scoped to RG1.

The permissions for Role1 are shown in the following JSON code.

The permissions for Role2 are shown in the following JSON code.

You assign the roles to the users shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Question 303
Correct answer: Question 303

You have an Azure subscription that contains a resource group named RG1 and the network security groups (NSGs) shown in the following table.

You create the Azure policy shown in the following exhibit.

You assign the policy to RG1.

What will occur if you assign the policy to NSG1 and NSG2?

A.
Flow logs will be enabled for NSG1 and NSG2.
A.
Flow logs will be enabled for NSG1 and NSG2.
Answers
B.
Flow logs will be enabled for NSG2 only
B.
Flow logs will be enabled for NSG2 only
Answers
C.
Flow logs will be disabled for NSG1 and NSG2.
C.
Flow logs will be disabled for NSG1 and NSG2.
Answers
D.
Flow logs will be enabled for NSG1 only.
D.
Flow logs will be enabled for NSG1 only.
Answers
Suggested answer: B

You have a Microsoft Sentinel deployment.

You need to connect a third-party security solution to the deployment. The third-party solution will send Common Event Format (CER-formatted messages. What should you include in the solution? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

A.
A.
Answers
Suggested answer: A

You have an Azure subscription that contains an Azure SQL database named SQL1 and an Azure key vault named KeyVault1. KeyVault1 stores the keys shown in the following table.

You reed to configure Transparent Data Encryption (TDE). TDE will use a customer-managed key for SQL1?

A.
Key1. Key2 Key3. and Key4
A.
Key1. Key2 Key3. and Key4
Answers
B.
Key1 only
B.
Key1 only
Answers
C.
Key2 only
C.
Key2 only
Answers
D.
Key1 and key2 only
D.
Key1 and key2 only
Answers
E.
Key2 and Key3 only
E.
Key2 and Key3 only
Answers
Suggested answer: E

You have an Azure subscription that contains the storage accounts shown in the following, table.

You enable Microsoft Defender for Storage.

Which storage services of storages are monitored by Microsoft Defender for Storage, and which storage accounts are protected by Microsoft Defender for Storage? To answer, select the appropriate options in the answer area.

A.
A.
Answers
Suggested answer: A

HOTSPOT

You have a management group named MG1 that contains an Azure subscription and a resource group named RG1. RG1 contains a virtual machine named VM1. You have the custom Azure roles shown in the following table.

The permissions for Role1 are shown in the following role definition file.

You assign the roles to the users shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No

NOTE: Each correct selection is worth one point.


Question 308
Correct answer: Question 308

You have an Azure subscription that contains the virtual machines shown in the following table.

VNET1, VNET2, and VNET3 are peered with each other. You perform the following actions:

* Create two application security groups named ASG1 and ASG2 in the West US region.

* Add the network interface of VM1 to ASG1.

A.
A.
Answers
Suggested answer: A

You have 15 Azure virtual machines in a resource group named RG1.

All virtual machines run identical applications.

You need to prevent unauthorized applications and malware from running on the virtual machines.

What should you do?

A.
Configure Azure Active Directory (Azure AD) Identity Protection.
A.
Configure Azure Active Directory (Azure AD) Identity Protection.
Answers
B.
From Microsoft Defender for Cloud, configure adaptive application controls.
B.
From Microsoft Defender for Cloud, configure adaptive application controls.
Answers
C.
Apply an Azure policy to RGI.
C.
Apply an Azure policy to RGI.
Answers
D.
Apply a resource lock to RGI.
D.
Apply a resource lock to RGI.
Answers
Suggested answer: B

Explanation:

Microsoft Defender for Cloud helps you prevent, detect, and respond to threats. Defender for Cloud gives you increased visibility into, and control over, the security of your Azure resources. It provides integrated security monitoring and policy management across your Azure subscriptions. It helps detect threats that might otherwise go unnoticed, and works with a broad ecosystem of security solutions. Defender for Cloud helps you optimize and monitor the security of your virtual machines by:

Providing security recommendations for the virtual machines. Example recommendations include:

apply system updates, configure ACLs endpoints, enable antimalware, enable network security groups, and apply disk encryption. Monitoring the state of your virtual machines.

https://learn.microsoft.com/en-us/azure/security/fundamentals/virtual-machines-overview

Total 439 questions
Go to page: of 44