ExamGecko
Home / Microsoft / AZ-500 / List of questions
Ask Question

Microsoft AZ-500 Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

You have an Azure subscription that contains an Azure key vault named Vault1.

In Vault1, you create a secret named Secret1.

An application developer registers an application in Azure Active Directory (Azure AD).

You need to ensure that the application can use Secret1.

What should you do?

In Azure AD, create a role.
In Azure AD, create a role.
In Azure Key Vault, create a key.
In Azure Key Vault, create a key.
In Azure Key Vault, create an access policy.
In Azure Key Vault, create an access policy.
In Azure AD, enable Azure AD Application Proxy.
In Azure AD, enable Azure AD Application Proxy.
Suggested answer: A
Explanation:

Azure Key Vault provides a way to securely store credentials and other keys and secrets, but your code needs to authenticate to Key Vault to retrieve them. Managed identities for Azure resources overview makes solving this problem simpler, by giving Azure services an automatically managed identity in Azure Active Directory (Azure AD). You can use this identity to authenticate to any service that supports Azure AD authentication, including Key Vault, without having any credentials in your code. Example: How a system-assigned managed identity works with an Azure VM

After the VM has an identity, use the service principal information to grant the VM access to Azure resources. To call Azure Resource Manager, use role-based access control (RBAC) in Azure AD to assign the appropriate role to the VM service principal. To call Key Vault, grant your code access to the specific secret or key in Key Vault. References: https://docs.microsoft.com/en-us/azure/key-vault/quick-create-net https://docs.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/overview

asked 02/10/2024
shikeba barakzei
37 questions

Question 32

Report Export Collapse

You have an Azure SQL database.

You implement Always Encrypted.

You need to ensure that application developers can retrieve and decrypt data in the database.

Which two pieces of information should you provide to the developers? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

a stored access policy
a stored access policy
a shared access signature (SAS)
a shared access signature (SAS)
the column encryption key
the column encryption key
user credentials
user credentials
the column master key
the column master key
Suggested answer: C, E
Explanation:

Always Encrypted uses two types of keys: column encryption keys and column master keys. A column encryption key is used to encrypt data in an encrypted column. A column master key is a key-protecting key that encrypts one or more column encryption keys.

References: https://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/always-encrypted-database-engine

asked 02/10/2024
Jordan Fredriksz
38 questions

Question 33

Report Export Collapse

You have a hybrid configuration of Azure Active Directory (Azure AD).

All users have computers that run Windows 10 and are hybrid Azure AD joined.

You have an Azure SQL database that is configured to support Azure AD authentication.

Database developers must connect to the SQL database by using Microsoft SQL Server Management Studio (SSMS) and authenticate by using their on-premises Active Directory account. You need to tell the developers which authentication method to use to connect to the SQL database from SSMS. The solution must minimize authentication prompts. Which authentication method should you instruct the developers to use?

SQL Login
SQL Login
Active Directory - Universal with MFA support
Active Directory - Universal with MFA support
Active Directory - Integrated
Active Directory - Integrated
Active Directory - Password
Active Directory - Password
Suggested answer: C
Explanation:

Azure AD can be the initial Azure AD managed domain. Azure AD can also be an on-premises Active Directory Domain Services that is federated with the Azure AD.

Using an Azure AD identity to connect using SSMS or SSDT

The following procedures show you how to connect to a SQL database with an Azure AD identity using SQL Server Management Studio or SQL Server Database Tools.

Active Directory integrated authentication

Use this method if you are logged in to Windows using your Azure Active Directory credentials from a federated domain.

1. Start Management Studio or Data Tools and in the Connect to Server (or Connect to Database Engine) dialog box, in the Authentication box, select Active Directory - Integrated. No password is needed or can be entered because your existing credentials will be presented for the connection.

Microsoft AZ-500 image Question 6 explanation 87471 10022024015441000000

2. Select the Options button, and on the Connection Properties page, in the Connect to database box, type the name of the user database you want to connect to. (The AD domain name or tenant ID” option is only supported for Universal with MFA connection options, otherwise it is greyed out.)

References:

https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/sql-database/sql-database-aad-authentication-configure.md

asked 02/10/2024
Marcel Bertz
36 questions

Question 34

Report Export Collapse

You have an Azure SQL Database server named SQL1.

You plan to turn on Advanced Threat Protection for SQL1 to detect all threat detection types.

Which action will Advanced Threat Protection detect as a threat?

A user updates more than 50 percent of the records in a table.
A user updates more than 50 percent of the records in a table.
A user attempts to sign as select * from table1.
A user attempts to sign as select * from table1.
A user is added to the db_owner database role.
A user is added to the db_owner database role.
A user deletes more than 100 records from the same table.
A user deletes more than 100 records from the same table.
Suggested answer: B
Explanation:

Advanced Threat Protection can detect potential SQL injections: This alert is triggered when an active exploit happens against an identified application vulnerability to SQL injection. This means the attacker is trying to inject malicious SQL statements using the vulnerable application code or stored procedures.

References: https://docs.microsoft.com/en-us/azure/sql-database/sql-database-threat-detection-overview

asked 02/10/2024
Francesco Mammola
43 questions

Question 35

Report Export Collapse

Your company uses Azure DevOps.

You need to recommend a method to validate whether the code meets the company's quality standards and code review standards. What should you recommend implementing in Azure DevOps?

branch folders
branch folders
branch permissions
branch permissions
branch policies
branch policies
branch locking
branch locking
Suggested answer: C
Explanation:

Branch policies help teams protect their important branches of development. Policies enforce your team's code quality and change management standards. References:

https://docs.microsoft.com/en-us/azure/devops/repos/git/branch-policies?view=azure-devops&viewFallbackFrom=vsts

asked 02/10/2024
Nazarii Bybyk
38 questions

Question 36

Report Export Collapse

DRAG DROP

Your company has an Azure Active Directory (Azure AD) tenant named contoso.com.

The company is developing an application named App1. App1 will run as a service on server that runs Windows Server 2016. App1 will authenticate to contoso.com and access Microsoft Graph to read directory data.

You need to delegate the minimum required permissions to App1.

Which three actions should you perform in sequence from the Azure portal? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.


Microsoft AZ-500 image Question 36 87474 10022024015441000
Correct answer: Microsoft AZ-500 image answer Question 36 87474 10022024015441000
Explanation:

Step 1: Create an app registration

First the application must be created/registered.

Step 2: Add an application permission

Application permissions are used by apps that run without a signed-in user present.

Step 3: Grant permissions

Incorrect Answers:

Delegated permission

Delegated permissions are used by apps that have a signed-in user present.

Application Proxy:

Azure Active Directory's Application Proxy provides secure remote access to on-premises web applications.

References:

https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-permissions-and-consent

asked 02/10/2024
Adrian Petrisoaia
44 questions

Question 37

Report Export Collapse

HOTSPOT

You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com.

You plan to implement an application that will consist of the resources shown in the following table.

Microsoft AZ-500 image Question 10 87475 10022024015441000000

Users will authenticate by using their Azure AD user account and access the Cosmos DB account by using resource tokens.

You need to identify which tasks will be implemented in CosmosDB1 and WebApp1.

Which task should you identify for each resource? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Microsoft AZ-500 image Question 37 87475 10022024015441000
Correct answer: Microsoft AZ-500 image answer Question 37 87475 10022024015441000
Explanation:

CosmosDB1: Create database users and generate resource tokens.

Azure Cosmos DB resource tokens provide a safe mechanism for allowing clients to read, write, and delete specific resources in an Azure Cosmos DB account according to the granted permissions.

WebApp1: Authenticate Azure AD users and relay resource tokens

A typical approach to requesting, generating, and delivering resource tokens to a mobile application is to use a resource token broker. The following diagram shows a high-level overview of how the sample application uses a resource token broker to manage access to the document database data:

Microsoft AZ-500 image Question 10 explanation 87475 10022024015441000000

References:

https://docs.microsoft.com/en-us/xamarin/xamarin-forms/data-cloud/cosmosdb/authentication

asked 02/10/2024
Archana Pingily
46 questions

Question 38

Report Export Collapse

HOTSPOT

You need to create an Azure key vault. The solution must ensure that any object deleted from the key vault be retained for 90 days.

How should you complete the command? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Microsoft AZ-500 image Question 38 87476 10022024015441000
Correct answer: Microsoft AZ-500 image answer Question 38 87476 10022024015441000
Explanation:

Box 1: -EnablePurgeProtection

If specified, protection against immediate deletion is enabled for this vault; requires soft delete to be enabled as well.

Box 2: -EnableSoftDelete

Specifies that the soft-delete functionality is enabled for this key vault. When soft-delete is enabled, for a grace period, you can recover this key vault and its contents after it is deleted.

References:

https://docs.microsoft.com/en-us/powershell/module/azurerm.keyvault/new-azurermkeyvault

asked 02/10/2024
Andrew Staton
44 questions

Question 39

Report Export Collapse

DRAG DROP

You have an Azure subscription named Sub1 that contains an Azure Storage account named Contosostorage1 and an Azure key vault named Contosokeyvault1.

You plan to create an Azure Automation runbook that will rotate the keys of Contosostorage1 and store them in Contosokeyvault1.

You need to implement prerequisites to ensure that you can implement the runbook.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.


Microsoft AZ-500 image Question 39 87477 10022024015441000
Correct answer: Microsoft AZ-500 image answer Question 39 87477 10022024015441000
Explanation:

Step 1: Create an Azure Automation account

Runbooks live within the Azure Automation account and can execute PowerShell scripts.

Step 2: Import PowerShell modules to the Azure Automation account

Under β€˜Assets’ from the Azure Automation account Resources section select β€˜to add in Modules to the runbook. To execute key vault cmdlets in the runbook, we need to add AzureRM.profile and AzureRM.key vault.

Step 3: Create a connection resource in the Azure Automation account

You can use the sample code below, taken from the AzureAutomationTutorialScript example runbook, to authenticate using the Run As account to manage Resource Manager resources with your runbooks. The AzureRunAsConnection is a connection asset automatically created when we created β€˜run as accounts’ above. This can be found under Assets -> Connections. After the authentication code, run the same code above to get all the keys from the vault.

$connectionName = "AzureRunAsConnection"

try

{

# Get the connection "AzureRunAsConnection "

$servicePrincipalConnection=Get-AutomationConnection -Name $connectionName

"Logging in to Azure..."

Add-AzureRmAccount `

-ServicePrincipal `

-TenantId $servicePrincipalConnection.TenantId `

-ApplicationId $servicePrincipalConnection.ApplicationId `

-CertificateThumbprint $servicePrincipalConnection.CertificateThumbprint

}

References:

https://www.rahulpnath.com/blog/accessing-azure-key-vault-from-azure-runbook/

asked 02/10/2024
megat ilham
40 questions

Question 40

Report Export Collapse

HOTSPOT

You have the Azure Information Protection conditions shown in the following table.

Microsoft AZ-500 image Question 13 87478 10022024015441000000

You have the Azure Information Protection labels shown in the following table.

Microsoft AZ-500 image Question 13 87478 10022024015441000000

You have the Azure Information Protection policies shown in the following table.

Microsoft AZ-500 image Question 13 87478 10022024015441000000

You need to identify how Azure Information Protection will label files.

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Microsoft AZ-500 image Question 40 87478 10022024015441000
Correct answer: Microsoft AZ-500 image answer Question 40 87478 10022024015441000
Explanation:

Box 1: Label 2 only

How multiple conditions are evaluated when they apply to more than one label

1. The labels are ordered for evaluation, according to their position that you specify in the policy: The label positioned first has the lowest position (least sensitive) and the label positioned last has the highest position (most sensitive).

2. The most sensitive label is applied.

3. The last sublabel is applied.

Box 2: No Label

Automatic classification applies to Word, Excel, and PowerPoint when documents are saved, and apply to Outlook when emails are sent. Automatic classification does not apply to Microsoft Notepad. References:

https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-classification

asked 02/10/2024
Dustin Sickle
36 questions
Total 442 questions
Go to page: of 45
Search

Related questions