AZ-500 Practice Test Questions

446 Questions


Topic 4: Mix Questions

You have an Azure subscription named Sub 1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. The tenant contains the users shown in the following table.






You have a Microsoft Entra tenant that contains the users shown in the following table.



You create and enforce a Microsoft Entra Identity Protection sign-in risk policy that has the following settings:

• Assignments: Include Group1, exclude Group2
• Conditions: Sign-in risk level: Low and above
• Access: Allow access, Require multi-factor authentication

You need to identify what occurs when the users sign in to Microsoft Entra ID.
What should you identify for each user? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.






You have an on-premises datacenter.
You have an Azure subscription that contains a virtual machine named VM1. VM1 is connected to a virtual network named VNet1. VNet1 is connected to the on-premises datacenter by using a Site-to-Site (S2S) VPN.
You plan to create an Azure storage account named storage1 and App1.
You need to ensure that network communication to each resource meets the following requirements:

• Connections to App1 must be allowed only from corporate network NAT addresses.
• Connections from VNet1 to storage1 must use the Microsoft backbone network.
• The solution must minimize costs.

What should you configure for each resource? To answer, drag the appropriate components to the correct resources. Each component may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.






O: 12 HOTSPOT

Your company has two offices in Seattle and New York. Each office connects to the Internet by using a NAT device. The offices use the IP addresses shown in the following table.



The MFA service settings are configured as shown in the exhibit. (Click the Exhibit tab.)






You have an Azure subscription that contains the resources shown in the following table.



You need to ensure that ServerAdmins can perform the following tasks:

Create virtual machines in RG1 only.
Connect the virtual machines to the existing virtual networks in RG2 only.
The solution must use the principle of least privilege.

Which two role-based access control (RBAC) roles should you assign to ServerAdmins? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.


A. a custom RBAC role for RG2


B. the Network Contributor role for RG2


C. the Contributor role for the subscription


D. a custom RBAC role for the subscription


E. the Network Contributor role for RG1


F. the Virtual Machine Contributor role for RG1





A.
  a custom RBAC role for RG2

F.
  the Virtual Machine Contributor role for RG1

You have 10 on-premises servers that run Windows Server 2019.
You plan to implement Azure Security Center vulnerability scanning for the servers.
What should you install on the servers first?


A. the Security Events data connector in Azure Sentinel


B. the Microsoft Endpoint Configuration Manager client


C. the Azure Arc enabled servers Connected Machine agent


D. the Microsoft Defender for Endpoint agent





C.
  the Azure Arc enabled servers Connected Machine agent

Lab Task

use the following login credentials as needed:

To enter your username, place your cursor in the Sign in box and click on the username below.
To enter your password. place your cursor in the Enter password box and click on the password below.

Azure Username: Userl -28681041@ExamUsers.com
Azure Password: GpOAe4@lDg

If the Azure portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.

The following information is for technical support purposes only:

Lab Instance: 28681041

Task 9

You need to ensure that the rg1lod28681041n1 Azure Storage account is encrypted by using a key stored in the KeyVault28681041 Azure key vault.






Explanation:

To configure rg1lod28681041n1 Azure Storage Account to use a customer-managed key (CMK) from KeyVault28681041, first sign in to the Azure Portal with the provided credentials, then ensure KeyVault28681041 has soft delete and purge protection enabled, along with an access policy granting key permissions (Get, Wrap, Unwrap). Next, create or select an existing encryption key (e.g., RSA 2048-bit) in the key vault. In the storage account’s Encryption settings, switch to Customer-managed keys, select KeyVault28681041 as the key source, and choose the appropriate key. Finally, save the changes and verify in the Encryption blade that the storage account now uses the key vault key for encryption. If access issues arise, check key vault firewall rules, cross-subscription permissions, or RBAC roles (e.g., Key Vault Crypto Officer).

Your company has an Azure subscription named Sub1 that is associated to an Azure Active Directory Azure (Azure AD) tenant named contoso.com.
The company develops a mobile application named App1. App1 uses the OAuth 2 implicit grant type to acquire Azure AD access tokens.
You need to register App1 in Azure AD.
What information should you obtain from the developer to register the application?


A. a redirect URI


B. a reply URL


C. a key


D. an application ID





A.
  a redirect URI

You are troubleshooting a security issue for an Azure Storage account You enable Azure Storage Analytics logs and archive It to a storage account. What should you use to retrieve the diagnostics logs?


A. Azure Storage Explorer


B. SQL query editor in Azure


C. Azure Monitor


D. Azure Cosmos DB explorer





A.
  Azure Storage Explorer

You plan to deploy Azure container instances.
You have a containerized application that validates credit cards. The application is comprised of two containers: an application container and a validation container.
The application container is monitored by the validation container. The validation container performs security checks by making requests to the application container and waiting for responses after every transaction.
You need to ensure that the application container and the validation container are scheduled to be deployedtogether. The containers must communicate to each other only on ports that are not externally exposed.
What should you include in the deployment?


A. application security groups


B. network security groups (NSGs)


C. management groups


D. container groups





D.
  container groups

You have an Azure subscription that contains the resources show in the following table.


A. Add the IP address range of VNET1 to the Firewall setting of DB1.


B. For NSG1, configure a rule that has a service tag.


C. Create an application security group.


D. Configure DB1 to allow access from only VNET1





B.
  For NSG1, configure a rule that has a service tag.

From Azure Security Center, you enable Azure Container Registry vulnerability scanning of the images in Registry1.
You perform the following actions:

Push a Windows image named Image1 to Registry1.
Push a Linux image named Image2 to Registry1.
Push a Windows image named Image3 to Registry1.
Modify Image1 and push the new image as Image4 to Registry1.
Modify Image2 and push the new image as Image5 to Registry1.

Which two images will be scanned for vulnerabilities? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.


A. Image4


B. Image2


C. Image1


D. Image3


E. Image5





B.
  Image2

C.
  Image1


Page 7 out of 38 Pages
Previous