ExamGecko
Home / Microsoft / AZ-500 / List of questions
Ask Question

Microsoft AZ-500 Practice Test - Questions Answers, Page 2

List of questions

Question 11

Report
Export
Collapse

HOTSPOT

You need to deploy Microsoft Antimalware to meet the platform protection requirements.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Microsoft AZ-500 image Question 11 87316 10022024015440000
Correct answer: Microsoft AZ-500 image answer Question 11 87316 10022024015440000

Explanation:

Scenario: Microsoft Antimalware must be installed on the virtual machines in RG1.

RG1 is a resource group that contains Vnet1, VM0, and VM1.

Box 1: DeployIfNotExists

DeployIfNotExists executes a template deployment when the condition is met.

Azure policy definition Antimalware

Incorrect Answers:

Append:

Append is used to add additional fields to the requested resource during creation or update. A common example is adding tags on resources such as costCenter or specifying allowed IPs for a storage resource.

Deny:

Deny is used to prevent a resource request that doesn't match defined standards through a policy definition and fails the request.

Box 2: The Create a Managed Identity setting

When Azure Policy runs the template in the deployIfNotExists policy definition, it does so using a managed identity. Azure Policy creates a managed identity for each assignment, but must have details about what roles to grant the managed identity.

Reference:

https://docs.microsoft.com/en-us/azure/governance/policy/concepts/effects

asked 02/10/2024
Armindo Malafaia Neto
35 questions

Question 12

Report
Export
Collapse

DRAG DROP

You need to deploy AKS1 to meet the platform protection requirements.

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

NOTE: More than one order of answer choices is correct. You will receive credit for any of the correct orders you select.


Microsoft AZ-500 image Question 12 87317 10022024015440000
Correct answer: Microsoft AZ-500 image answer Question 12 87317 10022024015440000

Explanation:

Scenario: Azure AD users must be to authenticate to AKS1 by using their Azure AD credentials.

Litewire plans to deploy AKS1, which is a managed AKS (Azure Kubernetes Services) cluster.

Step 1: Create a server application

To provide Azure AD authentication for an AKS cluster, two Azure AD applications are created. The first application is a server component that provides user authentication.

Step 2: Create a client application

The second application is a client component that's used when you're prompted by the CLI for authentication. This client application uses the server application for the actual authentication of the credentials provided by the client.

Step 3: Deploy an AKS cluster.

Use the az group create command to create a resource group for the AKS cluster.

Use the az aks create command to deploy the AKS cluster.

Step 4: Create an RBAC binding.

Before you use an Azure Active Directory account with an AKS cluster, you must create role-binding or cluster role-binding. Roles define the permissions to grant, and bindings apply them to desired users. These assignments can be applied to a given namespace, or across the entire cluster.

Reference:

https://docs.microsoft.com/en-us/azure/aks/azure-ad-integration

asked 02/10/2024
Mauricio de Souza Penhalver Hollanda
48 questions

Question 13

Report
Export
Collapse

You need to ensure that User2 can implement PIM.

What should you do first?

Assign User2 the Global administrator role.
Assign User2 the Global administrator role.
Configure authentication methods for contoso.com.
Configure authentication methods for contoso.com.
Configure the identity secure score for contoso.com.
Configure the identity secure score for contoso.com.
Enable multi-factor authentication (MFA) for User2.
Enable multi-factor authentication (MFA) for User2.
Suggested answer: A

Explanation:

To start using PIM in your directory, you must first enable PIM.

1. Sign in to the Azure portal as a Global Administrator of your directory.

You must be a Global Administrator with an organizational account (for example, @yourdomain.com), not a Microsoft account (for example, @outlook.com), to enable PIM for a directory. Scenario: Technical requirements include: Enable Azure AD Privileged Identity Management (PIM) for contoso.com

References:

https://docs.microsoft.com/bs-latn-ba/azure/active-directory/privileged-identity-management/pim-getting-started

asked 02/10/2024
Peter Unterasinger
42 questions

Question 14

Report
Export
Collapse

You assign User8 the Owner role for RG4, RG5, and RG6.In which resource groups can User8 create virtual networks and NSGs? You must be able to connect virtual machines to deployed virtual networks. To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point.


Microsoft AZ-500 image Question 14 87386 10022024015441000
Correct answer: Microsoft AZ-500 image answer Question 14 87386 10022024015441000

Explanation:

Box 1: RG6 only

The policy does not allow the creation of virtual networks/subnets in RG5. Only NSGs can be created in RG4.B

Box 2: Rg4,Rg5, and Rg6

Scenario:

Contoso has two Azure subscriptions named Sub1 and Sub2.

Sub1 contains six resource groups named RG1, RG2, RG3, RG4, RG5, and RG6.

You assign User8 the Owner role for RG4, RG5, and RG6

User8 city Sidney, Role:None

Note: A network security group (NSG) contains a list of security rules that allow or deny network traffic to resources connected to Azure Virtual Networks (VNet). NSGs can be associated to subnets, individual VMs (classic), or individual network interfaces (NIC) attached to VMs (Resource Manager).

References:

https://docs.microsoft.com/en-us/azure/governance/policy/overview


asked 02/10/2024
LEONARDO CESAR MARQUES
44 questions

Question 15

Report
Export
Collapse

Which virtual networks in Sub1 can User9 modify and delete in their current state? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Microsoft AZ-500 image Question 15 87387 10022024015441000
Correct answer: Microsoft AZ-500 image answer Question 15 87387 10022024015441000

Explanation:

Box 1: VNET4 and VNET1 only

RG1 has only Delete lock, while there are no locks on RG4.

RG2 and RG3 both have Read-only locks.

Box 2: VNET4 only

There are no locks on RG4, while the other resource groups have either Delete or Read-only locks.

Note: As an administrator, you may need to lock a subscription, resource group, or resource to prevent other users in your organization from accidentally deleting or modifying critical resources. You can set the lock level to CanNotDelete or ReadOnly. In the portal, the locks are called Delete and Read-only respectively.

CanNotDelete means authorized users can still read and modify a resource, but they can't delete the resource. ReadOnly means authorized users can read a resource, but they can't delete or update the resource. Applying this lock is similar to restricting all authorized users to the permissions granted by the Reader role.

Scenario:

Sub1 contains six resource groups named RG1, RG2, RG3, RG4, RG5, and RG6.

User9 creates the virtual networks shown in the following table.

Microsoft AZ-500 image Question 2 explanation 87387 10022024015441000000

Sub1 contains the locks shown in the following table.

Microsoft AZ-500 image Question 2 explanation 87387 10022024015441000000

Reference:

https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-group-lock-resources


asked 02/10/2024
Manoj Balan
44 questions

Question 16

Report
Export
Collapse

You need to configure WebApp1 to meet the data and application requirements.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Upload a public certificate.
Upload a public certificate.
Turn on the HTTPS Only protocol setting.
Turn on the HTTPS Only protocol setting.
Set the Minimum TLS Version protocol setting to 1.2.
Set the Minimum TLS Version protocol setting to 1.2.
Change the pricing tier of the App Service plan.
Change the pricing tier of the App Service plan.
Turn on the Incoming client certificates protocol setting.
Turn on the Incoming client certificates protocol setting.
Suggested answer: A, C

Explanation:

A: To configure Certificates for use in Azure Websites Applications you need to upload a public Certificate.

C: Over time, multiple versions of TLS have been released to mitigate different vulnerabilities. TLS 1.2 is the most current version available for apps running on Azure App Service.

Incorrect Answers:

B: We need support the http url as well.

Note:

Microsoft AZ-500 image Question 1 explanation 87463 10022024015441000000

References:

https://docs.microsoft.com/en-us/azure/app-service/app-service-web-configure-tls-mutual-auth

https://azure.microsoft.com/en-us/updates/app-service-and-functions-hosted-apps-can-now-update-tls-versions/

asked 02/10/2024
55 Cantera Ct. Johnson
38 questions

Question 17

Report
Export
Collapse

HOTSPOT

You need to create Role1 to meet the platform protection requirements.

How should you complete the role definition of Role1? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.


Microsoft AZ-500 image Question 17 87464 10022024015441000
Correct answer: Microsoft AZ-500 image answer Question 17 87464 10022024015441000

Explanation:

Scenario: A new custom RBAC role named Role1 must be used to delegate the administration of the managed disks in RG1. Role1 must be available only for RG1.

Azure RBAC template managed disks "Microsoft.Storage/"

Reference:

https://blogs.msdn.microsoft.com/azureedu/2017/02/11/new-managed-disk-storage-option-for-your-azure-vms/

https://blogs.msdn.microsoft.com/azure4fun/2016/10/21/custom-azure-rbac-roles-and-how-to-extend-existing-role-definitions-scope/

asked 02/10/2024
Dewald Van Schalkwyk
32 questions

Question 18

Report
Export
Collapse

DRAG DROP

You need to configure SQLDB1 to meet the data and application requirements.

Which three actions should you recommend be performed in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.


Microsoft AZ-500 image Question 18 87465 10022024015441000
Correct answer: Microsoft AZ-500 image answer Question 18 87465 10022024015441000

Explanation:

Reference:

https://docs.microsoft.com/en-gb/azure/azure-sql/database/authentication-aad-overview

asked 02/10/2024
Abel Galleguillos
39 questions

Question 19

Report
Export
Collapse

HOTSPOT

What is the membership of Group1 and Group2? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.


Microsoft AZ-500 image Question 19 87318 10022024015440000
Correct answer: Microsoft AZ-500 image answer Question 19 87318 10022024015440000

Explanation:

Box 1: User1, User2, User3, User4

Contains "ON" is true for Montreal (User1), MONTREAL (User2), London (User 3), and Ontario (User4) as string and regex operations are not case sensitive.

Box 2: Only User3

Match "*on" is only true for London (User3).

Scenario:

Contoso.com contains the users shown in the following table.

Microsoft AZ-500 image Question 1 explanation 87318 10022024015440000000

Contoso.com contains the security groups shown in the following table.

Microsoft AZ-500 image Question 1 explanation 87318 10022024015440000000

References:

https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/groups-dynamic-membership

asked 02/10/2024
DOMINIC FERNANDEZ
40 questions

Question 20

Report
Export
Collapse

HOTSPOT

You are evaluating the security of the network communication between the virtual machines in Sub2.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Microsoft AZ-500 image Question 20 87319 10022024015440000
Correct answer: Microsoft AZ-500 image answer Question 20 87319 10022024015440000

Explanation:

Box 1: Yes. All traffic is allowed out to the Internet so you can ping the public IP.

NSG1, NSG2, NSG3, and NSG4 have the outbound security rules shown in the following table.

Microsoft AZ-500 image Question 2 explanation 87319 10022024015440000000

Box 2: Yes. VM3 is on Subnet12. There is no NSG attached to Subnet12 so the traffic will be allowed by default.

Microsoft AZ-500 image Question 2 explanation 87319 10022024015440000000

Box 3: No (because VM5 is in a separate VNet).

Note: Sub2 contains the virtual machines shown in the following table.

Microsoft AZ-500 image Question 2 explanation 87319 10022024015440000000

Microsoft AZ-500 image Question 2 explanation 87319 10022024015440000000

asked 02/10/2024
Martin Ojeda Knapp
25 questions
Total 442 questions
Go to page: of 45
Search

Related questions