ExamGecko
Home Home / Microsoft / AZ-500

Microsoft AZ-500 Practice Test - Questions Answers, Page 37

Question list
Search
Search

List of questions

Search

Related questions











You have an Azure subscription that contains a resource group named RG1 and a security group named ServerAdmins. RG1 contains 10 virtual machines, a virtual network named VNET1, and a network security group JNSG) named NSG1. ServerAdmins can access the virtual machines by using RDP.

You need to ensure that NSG1 only allows RDP connections to the virtual machines for a maximum of 60 minutes when a member of ServerAdmins requests access. What should you configure?

A.
an Azure policy assigned to RGl
A.
an Azure policy assigned to RGl
Answers
B.
a just in time (JIT) VM access policy in Microsoft Defender for Cloud
B.
a just in time (JIT) VM access policy in Microsoft Defender for Cloud
Answers
C.
an Azure AD Privileged Identity Management (PiM) role assignment
C.
an Azure AD Privileged Identity Management (PiM) role assignment
Answers
D.
an Azure Bastion host on VNET1
D.
an Azure Bastion host on VNET1
Answers
Suggested answer: B

Explanation:


DRAG DROP

You have two Azure subscriptions named Sub1 and Sub2. Sub1 contains a resource group named RG1 and an Azure policy named Policy1.

You need to remediate the non-compliant resources in Sub1 based on Policy1.

How should you complete the PowerShell script? To answer, drag the appropriate values to the correct targets. Each value may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.


Question 362
Correct answer: Question 362

Explanation:

For the first blank, use Set-AzContext to set the current subscription context.

For the second blank, use Start-AzPolicyRemediation to create and start a policy remediation for a policy assignment.

The final script should look like this:

$policyAssignmentId = "/subscriptions/f0710c27-9663-4c05-19781bdbedle86as/providers/Microsoft.

Authorization/f Value Set-AzContext -Subscription “Sub1”

Value Start-AzPolicyRemediation -PolicyAssignmentld $policyAssignmentId -Name "policy1” ResourceDiscovery

HOTSPOT

You plan to deploy a custom policy initiative for Microsoft Defender for Cloud.

You need to identify all the resource groups that have a Delete lock.

How should you complete the policy definition? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question 363
Correct answer: Question 363

You have an Azure AD tenant that contains the users shown in the following table.

You need to ensure that the users cannot create app passwords. The solution must ensure that User1 can continue to use the Mail and Calendar app.

What should you do?

A.
Assign User! the Authentication Policy Administrator role.
A.
Assign User! the Authentication Policy Administrator role.
Answers
B.
Enable Azure AD Password Protection.
B.
Enable Azure AD Password Protection.
Answers
C.
Configure a multi-factor authentication (MFA) registration policy.
C.
Configure a multi-factor authentication (MFA) registration policy.
Answers
D.
Create a new app registration.
D.
Create a new app registration.
Answers
Suggested answer: C

You have an Azure subscription that uses Microsoft Defender for Cloud.

You have an Amazon Web Services (AWS) account.

You need to ensure that when you deploy a new AWS Elastic Compute Cloud (EC2) instance, the Microsoft Defender for Servers agent installs automatically.

What should you configure first?

A.
the log Analytics agent
A.
the log Analytics agent
Answers
B.
the Azure Monitor agent
B.
the Azure Monitor agent
Answers
C.
the native cloud connector
C.
the native cloud connector
Answers
D.
the classic cloud connector
D.
the classic cloud connector
Answers
Suggested answer: A

You have an Azure subscription.

You plan to map an online infrastructure and perform vulnerability scanning for the following:

• ASNs

• Hostnames

• IP addresses

• SSL certificates

What should you use?

A.
Microsoft Defender for Cloud
A.
Microsoft Defender for Cloud
Answers
B.
Microsoft Defender for Identity
B.
Microsoft Defender for Identity
Answers
C.
Microsoft Defender for Endpoint
C.
Microsoft Defender for Endpoint
Answers
D.
Microsoft Defender External Attack Surface Management (Defender EASM)
D.
Microsoft Defender External Attack Surface Management (Defender EASM)
Answers
Suggested answer: D

You have an Azure subscription that uses Microsoft Defender for Cloud. You have accounts for the following cloud services:

• Alibaba Cloud

• Amazon Web Services (AWS)

• Google Cloud Platform (GCP)

What can you add to Defender for Cloud?

A.
AWS only
A.
AWS only
Answers
B.
Alibaba Cloud and AWS only
B.
Alibaba Cloud and AWS only
Answers
C.
Alibaba Good and GCP only
C.
Alibaba Good and GCP only
Answers
D.
AWS and GCP only
D.
AWS and GCP only
Answers
E.
Alibaba Cloud, AWS. and GCP
E.
Alibaba Cloud, AWS. and GCP
Answers
Suggested answer: D

HOTSPOT

You have an Azure key vault named KeyVault1 that contains the items shown in the following table.

In KeyVault1 the following events occur in sequence:

• item is deleted.

• ltem2 and Policy1 are deleted.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Question 368
Correct answer: Question 368

Explanation:


You have an Azure subscription that contains a Microsoft Defender External Attack Surface Management (Defender EASM) resource named EASM1. You review the Attack Surface Summary dashboard. You need to identify the following insights:

• Deprecated technologies that are no longer supported

• Infrastructure that will soon expire

Which section of the dashboard should you review?

A.
Securing the Cloud
A.
Securing the Cloud
Answers
B.
Sensitive Services
B.
Sensitive Services
Answers
C.
attack surface composition
C.
attack surface composition
Answers
D.
Attack Surface Priorities
D.
Attack Surface Priorities
Answers
Suggested answer: C

HOTSPOT

You have an Azure subscription that contains a Microsoft Sentinel workspace.

Microsoft Sentinel is configured to ingest logs from several Azure workloads. A third-party service management platform is used to manage incidents.

You need to identify which Microsoft Sentinel components to configure to meet the following requirements:

• When Microsoft Sentinel identifies a threat an incident must be created.

• A ticket must be logged in the service management platform when an incident is created in

Microsoft Sentinel.

Which component should you identify for each requirement? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question 370
Correct answer: Question 370
Total 439 questions
Go to page: of 44