Black Friday Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Microsoft AZ-500 Exam Success: Microsoft Azure Security Technologies Complete Study and Preparation Tips

Questions 31

You are evaluating the security of VM1, VM2, and VM3 in Sub2.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

AZ-500 Question 31

Options:

Buy Now
Questions 32

You have an Azure subscription that contains the Azure Log Analytics workspaces shown in the following table.

You create the virtual machines shown in the following table.

You plan to use Azure Sentinel to monitor Windows Defender Firewall on the virtual machines.

Which virtual machines you can connect to Azure Sentinel?

Options:

A.

VM1 and VM3 only

B.

VM1 Only

C.

VM1 and VM2 only

D.

VM1, VM2, VM3 and VM4

Buy Now
Questions 33

You have an Azure subscription named Subscription1 that contains the resources shown in the following table.

AZ-500 Question 33

You create an Azure role by using the following JSON file.

You assign Role1 to User1 for RG1.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 34

You have an Azure key vault named Vault1 that stores the resources shown in following table.

Which resources support the creation of a rotation policy?

Options:

A.

Key1 Only

B.

Cert1 only

C.

Key1 and Secret1 only

D.

Key1 and Cert1 only

E.

Secret1 and Cert1 only

F.

Key1, Secret1, and Cert1

Buy Now
Questions 35

You have an Azure Kubernetes Service (AKS) cluster that will connect to an Azure Container Registry.

You need to use the automatically generated service principal for the AKS cluster to authenticate to the Azure Container Registry.

What should you create?

Options:

A.

an Azure AD user

B.

a secret in Azure Key Vault

C.

an Azure AD group

D.

a role assignment

Buy Now
Questions 36

You are securing access to the resources in an Azure subscription.

A new company policy states that all the Azure virtual machines in the subscription must use managed disks.

You need to prevent users from creating virtual machines that use unmanaged disks.

What should you use?

Options:

A.

Azure Monitor

B.

Azure Policy

C.

Azure Security Center

D.

Azure Service Health

Buy Now
Questions 37

You have an Azure subscription named Sub1.

In Azure Security Center, you have a security playbook named Play1. Play1 is configured to send an email message to a user named User1.

You need to modify Play1 to send email messages to a distribution group named Alerts.

What should you use to modify Play1?

Options:

A.

Azure DevOps

B.

Azure Application Insights

C.

Azure Monitor

D.

Azure Logic Apps Designer

Buy Now
Questions 38

You have an Azure subscription that contains an Azure Active Directory (Azure AD) tenant and a user named User1.

The App registrations settings for the tenant are configured as shown in the following exhibit.

You plan to deploy an app named App1.

You need to ensure that User1 can register App1 in Azure AD. The solution must use the principle of least privilege.

Which role should you assign to User1?

Options:

A.

App Configuration Data Owner for the subscription

B.

Managed Application Contributor for the subscription

C.

Cloud application administrator in Azure AD

D.

Application developer in Azure AD.

Buy Now
Questions 39

You have an Azure subscription that uses Microsoft Defender for Cloud.

You need to use Defender for Cloud to review regulatory compliance with the Azure CIS 1.4,0 standard. The solution must minimize administrative effort.

What should you do first?

Options:

A.

Assign an Azure policy.

B.

Manually add the Azure CIS 1.4.0 standard.

C.

Disable one of the Out of the box standards.

D.

Add a custom initiative.

Buy Now
Questions 40

You have an Azure subscription that contains an Azure Data Lake Storage account named sa1.

You plan to deploy an app named App1 that will access sa1 and perform operations, including Read. List, Create Directory, and Delete Directory.

You need to ensure that App1 can connect securely to sa1 by using a private endpoint

What is the minimum number of private endpoints required for sa1?

Options:

A.

1

B.

2

C.

3

D.

4

E.

5

Buy Now