ExamGecko
Home Home / Microsoft / AZ-500

Microsoft AZ-500 Practice Test - Questions Answers, Page 44

Question list
Search
Search

List of questions

Search

Related questions











You have a Microsoft Entra tenant that uses Microsoft Entra Permissions Management and contains the accounts shown in the following table:

Which accounts will be listed as assigned to highly privileged roles on the Azure AD insights tab in the Entra Permissions Management portal?

A.

Admin1 only

A.

Admin1 only

Answers
B.

Admin2 and Admin3 only

B.

Admin2 and Admin3 only

Answers
C.

Admin2 and Admin4 only

C.

Admin2 and Admin4 only

Answers
D.

Admin1. Admin2, and Admin3 only

D.

Admin1. Admin2, and Admin3 only

Answers
E.

Admin2. Admin3, and Admin4 only

E.

Admin2. Admin3, and Admin4 only

Answers
F.

Admin1. Admin2, Admin3. and Admin4

F.

Admin1. Admin2, Admin3. and Admin4

Answers
Suggested answer: D

You have an Azure subscription named Subscription1 that is linked to a Microsoft Entra tenant named contoso.com and a resource group named RG1.

You create a custom role named Role1 in contoso.com.

Where can you use Role1 for permission delegation?

A.

contoso.com only

A.

contoso.com only

Answers
B.

contoso.com and RG1 only

B.

contoso.com and RG1 only

Answers
C.

contoso.com and Subscription 1 only

C.

contoso.com and Subscription 1 only

Answers
D.

contoso.com. RG1. and Subscription!

D.

contoso.com. RG1. and Subscription!

Answers
Suggested answer: D

You have an Azure subscription that contains a SQL Server on Azure Virtual Machines instance named SQt1 and a Microsoft Sentinel workspace named Sentinel1.

You need to monitor security incidents on SQL1 by using Sentinel1.

What should you do first?

A.

On SQL1, enable SQL1 Server audit.

A.

On SQL1, enable SQL1 Server audit.

Answers
B.

On SQL1. install the Connected Machine agent for Azure Arc-enabled servers.

B.

On SQL1. install the Connected Machine agent for Azure Arc-enabled servers.

Answers
C.

From the Azure portal, create a Log Analytics workspace.

C.

From the Azure portal, create a Log Analytics workspace.

Answers
D.

From Sentinel1, enable VM insights.

D.

From Sentinel1, enable VM insights.

Answers
Suggested answer: A

You have an Azure subscription that contains an Azure App Service app named App1, an Azure container instance named AC1. and a storage account named storage1. AC1 hosts an app named App2.

Users send requests to App1 by using a URL of https:/app1.contoso.com/echo/resource-cache? param1 =sample. App1 calls App2. which retrieves data from storage1.

You need to ensure that a security alert will be generated when connections are detected from anomalous IP addresses. Which Microsoft Defender for Cloud service should you use?

A.

Microsoft Defender for App Service

A.

Microsoft Defender for App Service

Answers
B.

Microsoft Defender for APIs

B.

Microsoft Defender for APIs

Answers
C.

Microsoft Defender for Storage

C.

Microsoft Defender for Storage

Answers
D.

Microsoft Defender for Containers

D.

Microsoft Defender for Containers

Answers
Suggested answer: B

HOTSPOT

You have an Azure subscription that contains the virtual networks shown in the following table.

The subscription contains the subnets shown in the following table.

You plan to create an Azure web app named WebApp2 that will have the following configurations:

* Region: East US

* VNet integration: Enabled

* Scale out; Autoscale to up to 10 instances

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Question 435
Correct answer: Question 435

HOTSPOT

Your on-premises network contains an Active Directory Domain Services (AD DS) domain and the devices shown in the following table.

You have a hybrid Microsoft Entra tenant that contains a synced user named User1.

You have an Azure subscription that contains the Azure Files shares shown in the following table.

Used is assigned the Storage File Data SMB Share Contributor role tor storage1 and storage2.

The Security settings for Share! are configured as shown in the following exhibit.

For each of the following statements, select Yes if the statement is true. Otherwise. Select No.

NOTE: Each correct selection is worth one point.

Question 436
Correct answer: Question 436

You have an Azure subscription. The subscription contains a virtual network named VNet1 that contains the subnets shown in the following table.

The subscription contains the function apps shown in the following table.

The outbound traffic of which app is controlled by using NSG1?

A.

App4 only

A.

App4 only

Answers
B.

App3 and App4 only

B.

App3 and App4 only

Answers
C.

App2, App3, and App4 only

C.

App2, App3, and App4 only

Answers
D.

App1, App2, App3, andApp4

D.

App1, App2, App3, andApp4

Answers
Suggested answer: D

You have an Azure subscription that contains an Azure Kubernetes Service (AKS) cluster named AKS1.

You have an Azure container registry that stores container images that were deployed by using Azure DevOps Microsoft-hosted agents.

You need to ensure that administrators can access AKS1 only from specific networks. The solution must minimize administrative effort.

What should you configure for AKS1?

A.

an Application Gateway Ingress Controller (AGIC)

A.

an Application Gateway Ingress Controller (AGIC)

Answers
B.

a private cluster

B.

a private cluster

Answers
C.

authorized IP address ranges

C.

authorized IP address ranges

Answers
D.

a private endpoint

D.

a private endpoint

Answers
Suggested answer: C

HOTSPOT

You have an Azure subscription.

You plan to deploy a virtual machine named VM1.

You need to use confidential disk encryption on VM1.

Which virtual machine series should you use for VM1, and which type of disks can be encrypted by using confidential disk encryption? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question 439
Correct answer: Question 439
Total 439 questions
Go to page: of 44