ExamGecko
Home / Microsoft / AZ-500 / List of questions
Ask Question

Microsoft AZ-500 Practice Test - Questions Answers, Page 9

List of questions

Question 81

Report Export Collapse

HOTSPOT

You have an Azure subscription that contains the virtual machines shown in the following table.

Microsoft AZ-500 image Question 8 87330 10022024015440000000

You create the Azure policies shown in the following table.

Microsoft AZ-500 image Question 8 87330 10022024015440000000

You create the resource locks shown in the following table.

Microsoft AZ-500 image Question 8 87330 10022024015440000000

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Microsoft AZ-500 image Question 81 87330 10022024015440000
Correct answer: Microsoft AZ-500 image answer Question 81 87330 10022024015440000
Explanation:

References:

https://docs.microsoft.com/en-us/azure/governance/blueprints/concepts/resource-locking

asked 02/10/2024
efrem perry
50 questions

Question 82

Report Export Collapse

HOTSPOT

You have Azure virtual machines that have Update Management enabled. The virtual machines are configured as shown in the following table.

Microsoft AZ-500 image Question 9 87331 10022024015440000000

You schedule two update deployments named Update1 and Update2. Update1 updates VM3. Update2 updates VM6.

Which additional virtual machines can be updated by using Update1 and Update2? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Microsoft AZ-500 image Question 82 87331 10022024015440000
Correct answer: Microsoft AZ-500 image answer Question 82 87331 10022024015440000
Explanation:

Update1: VM1 and VM2 only

VM3: Windows Server 2016 West US RG2

Update2: VM4 and VM5 only

VM6: CentOS 7.5 East US RG1

For Linux, the machine must have access to an update repository. The update repository can be private or public.

References:

https://docs.microsoft.com/en-us/azure/automation/automation-update-management

asked 02/10/2024
Luca Bombelli
40 questions

Question 83

Report Export Collapse

HOTSPOT

You have an Azure subscription named Sub1.

You create a virtual network that contains one subnet. On the subnet, you provision the virtual machines shown in the following table.

Microsoft AZ-500 image Question 10 87332 10022024015440000000

Currently, you have not provisioned any network security groups (NSGs).

You need to implement network security to meet the following requirements:

Allow traffic to VM4 from VM3 only.

Allow traffic from the Internet to VM1 and VM2 only.

Minimize the number of NSGs and network security rules.

How many NSGs and network security rules should you create? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Microsoft AZ-500 image Question 83 87332 10022024015440000
Correct answer: Microsoft AZ-500 image answer Question 83 87332 10022024015440000
Explanation:

NSGs: 2

Network security rules: 3

Not 2: You cannot specify multiple service tags or application groups) in a security rule.

References:

https://docs.microsoft.com/en-us/azure/virtual-network/security-overview

asked 02/10/2024
JASON HOLT
40 questions

Question 84

Report Export Collapse

HOTSPOT

You have an Azure key vault.

You need to delegate administrative access to the key vault to meet the following requirements:

Provide a user named User1 with the ability to set advanced access policies for the key vault.

Provide a user named User2 with the ability to add and delete certificates in the key vault.

Use the principle of least privilege.

What should you use to assign access to each user? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Microsoft AZ-500 image Question 84 87333 10022024015440000
Correct answer: Microsoft AZ-500 image answer Question 84 87333 10022024015440000
Explanation:

User1: RBAC

RBAC is used as the Key Vault access control mechanism for the management plane. It would allow a user with the proper identity to:

set Key Vault access policies

create, read, update, and delete key vaults

set Key Vault tags

Note: Role-based access control (RBAC) is a system that provides fine-grained access management of Azure resources. Using RBAC, you can segregate duties within your team and grant only the amount of access to users that they need to perform their jobs.

User2: A key vault access policy

A key vault access policy is the access control mechanism to get access to the key vault data plane. Key Vault access policies grant permissions separately to keys, secrets, and certificates.

References:

https://docs.microsoft.com/en-us/azure/key-vault/key-vault-secure-your-key-vault

asked 02/10/2024
Damodar Daesrath
44 questions

Question 85

Report Export Collapse

HOTSPOT

You have two Azure virtual machines in the East US2 region as shown in the following table.

Microsoft AZ-500 image Question 12 87334 10022024015440000000

You deploy and configure an Azure Key vault.

You need to ensure that you can enable Azure Disk Encryption on VM1 and VM2.

What should you modify on each virtual machine? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Microsoft AZ-500 image Question 85 87334 10022024015440000
Correct answer: Microsoft AZ-500 image answer Question 85 87334 10022024015440000
Explanation:

VM1: The Tier

The Tier needs to be upgraded to standard.

Disk Encryption for Windows and Linux IaaS VMs is in General Availability in all Azure public regions and Azure Government regions for Standard VMs and VMs with Azure Premium Storage.

VM2: The type

Need to change the VMtype to any of A, D, DS, G, GS, F, and so on, series IaaS VMs.

Not the operating system version: Ubuntu 16.04 is supported.

References:

https://docs.microsoft.com/en-us/azure/security/azure-security-disk-encryption-overview

https://docs.microsoft.com/en-us/azure/security/azure-security-disk-encryption-faq#bkmk_LinuxOSSupport

asked 02/10/2024
null null
48 questions

Question 86

Report Export Collapse

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have an Azure Subscription. The subscription contains 50 virtual machines that run Windows Server 2012 R2 or Windows Server 2016.

You need to deploy Microsoft Antimalware to the virtual machines.

Solution: You add an extension to each virtual machine.

Does this meet the goal?

Yes
Yes
No
No
Suggested answer: A
Explanation:

You can use Visual Studio to enable and configure the Microsoft Antimalware service. This entails selecting Microsoft Antimalware extension from the dropdown list under Installed Extensions and click Add to configure with default antimalware configuration.

References:

https://docs.microsoft.com/en-us/azure/security/fundamentals/antimalware

asked 02/10/2024
Romain PAILLAS
37 questions

Question 87

Report Export Collapse

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have an Azure Subscription. The subscription contains 50 virtual machines that run Windows Server 2012 R2 or Windows Server 2016.

You need to deploy Microsoft Antimalware to the virtual machines.

Solution: You connect to each virtual machine and add a Windows feature.

Does this meet the goal?

Yes
Yes
No
No
Suggested answer: B
Explanation:

Microsoft Antimalware is deployed as an extension and not a feature.

References:

https://docs.microsoft.com/en-us/azure/security/fundamentals/antimalware

asked 02/10/2024
Jailson Batista
39 questions

Question 88

Report Export Collapse

From Azure Security, you create a custom alert rule.

You need to configure which users will receive an email message when the alert is triggered.

What should you do?

From Azure Monitor, create an action group.
From Azure Monitor, create an action group.
From Security Center, modify the Security policy settings of the Azure subscription.
From Security Center, modify the Security policy settings of the Azure subscription.
From Azure Active Directory (Azure AD). modify the members of the Security Reader role group.
From Azure Active Directory (Azure AD). modify the members of the Security Reader role group.
From Security Center, modify the alert rule.
From Security Center, modify the alert rule.
Suggested answer: A
Explanation:

References:

https://docs.microsoft.com/en-us/azure/azure-monitor/platform/action-groups

asked 02/10/2024
Arun Samuel
50 questions

Question 89

Report Export Collapse

You are configuring and securing a network environment.

You deploy an Azure virtual machine named VM1 that is configured to analyze network traffic.

You need to ensure that all network traffic is routed through VM1.

What should you configure?

a system route
a system route
a network security group (NSG)
a network security group (NSG)
a user-defined route
a user-defined route
Suggested answer: C
Explanation:

Although the use of system routes facilitates traffic automatically for your deployment, there are cases in which you want to control the routing of packets through a virtual appliance. You can do so by creating user defined routes that specify the next hop for packets flowing to a specific subnet to go to your virtual appliance instead, and enabling IP forwarding for the VM running as the virtual appliance.

Note: User Defined Routes

For most environments you will only need the system routes already defined by Azure. However, you may need to create a route table and add one or more routes in specific cases, such as:

Force tunneling to the Internet via your on-premises network.

Use of virtual appliances in your Azure environment.

In the scenarios above, you will have to create a route table and add user defined routes to it.

Reference:

https://github.com/uglide/azure-content/blob/master/articles/virtual-network/virtual-networks-udr-overview.md

asked 02/10/2024
Sneh Fields
45 questions

Question 90

Report Export Collapse

You have an Azure subscription that contains the virtual networks shown in the following table.

Microsoft AZ-500 image Question 17 87339 10022024015440000000

The subscription contains the virtual machines shown in the following table.

Microsoft AZ-500 image Question 17 87339 10022024015440000000

On NIC1, you configure an application security group named ASG1.

On which other network interfaces can you configure ASG1?

NIC2 only
NIC2 only
NIC2, NIC3, NIC4, and NIC5
NIC2, NIC3, NIC4, and NIC5
NIC2 and NIC3 only
NIC2 and NIC3 only
NIC2, NIC3, and NIC4 only
NIC2, NIC3, and NIC4 only
Suggested answer: C
Explanation:

Only network interfaces in NVET1, which consists of Subnet11 and Subnet12, can be configured in ASG1, as all network interfaces assigned to an application security group have to exist in the same virtual network that the first network interface assigned to the application security group is in.

Reference:

https://azure.microsoft.com/es-es/blog/applicationsecuritygroups/

asked 02/10/2024
Paola Aguirre
47 questions
Total 442 questions
Go to page: of 45
Search

Related questions