Skip to Content

AZ-500 Microsoft Azure Security Technologies Exam Questions and Answers – 1 Part 2

The latest Microsoft AZ-500 Azure Security Technologies certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the Microsoft AZ-500 Azure Security Technologies exam and earn Microsoft AZ-500 Azure Security Technologies certification.

AZ-500 Microsoft Azure Security Technologies Exam Questions and Answers

AZ-500 Question 61

Question

You have Azure Resource Manager templates that you use to deploy Azure virtual machines.
You need to disable unused Windows features automatically as instances of the virtual machines are provisioned.
What should you use?

A. device configuration policies in Microsoft Intune
B. Azure Automation State Configuration
C. security policies in Azure Security Center
D. device compliance policies in Microsoft Intune

Answer

B. Azure Automation State Configuration

Explanation

You can use Azure Automation State Configuration to manage Azure VMs (both Classic and Resource Manager), on-premises VMs, Linux machines, AWS VMs, and on-premises physical machines.

Note: Azure Automation State Configuration provides a DSC pull server similar to the Windows Feature DSC-Service so that target nodes automatically receive configurations, conform to the desired state, and report back on their compliance. The built-in pull server in Azure Automation eliminates the need to set up and maintain your own pull server. Azure Automation can target virtual or physical Windows or Linux machines, in the cloud or on-premises.

Reference

AZ-500 Question 62

Question

You have an Azure subscription that contains the virtual machines shown in the following table.

Name Location Virtual network name
VM1 East US VNET1
VM2 West US VNET2
VM3 East US VNET1
VM4 West US VNET3

All the virtual networks are peered.
You deploy Azure Bastion to VNET2.
Which virtual machines can be protected by the bastion host?

A. VM1, VM2, VM3, and VM4
B. VM1, VM2, and VM3 only
C. VM2 and VM4 only
D. VM2 only

Answer

A. VM1, VM2, VM3, and VM4

Reference

AZ-500 Question 63

Question

HOTSPOT –
You create resources in an Azure subscription as shown in the following table.

Name Type Region
RG1 Resource group West Europe
VNET1 Azure virtual network West Europe
Contoso1901 Azure Storage account West Europe

VNET1 contains two subnets named Subnet1 and Subnet2. Subnet1 has a network ID of 10.0.0.0/24. Subnet2 has a network ID of 10.1.1.0/24.
Contoso1901 is configured as shown in the exhibit. (Click the Exhibit tab.)

Contoso1901 is configured as shown in the exhibit. (Click the Exhibit tab.)

For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

Statements:

  • An Azure virtual machine on Subnet1 can access data in Contoso1901.
  • An Azure virtual machine on Subnet2 can access data in Contoso1901.
  • A computer on the Internet that has an IP address of 193.77.10.2 can access data in Contoso1901.

Answer

  • An Azure virtual machine on Subnet1 can access data in Contoso1901: Yes
  • An Azure virtual machine on Subnet2 can access data in Contoso1901: No
  • A computer on the Internet that has an IP address of 193.77.10.2 can access data in Contoso1901: Yes

Explanation

Box 1: Yes –
Access from Subnet1 is allowed.

Box 2: No –
No access from Subnet2 is allowed.

Box 3: Yes –
Access from IP address 193.77.10.2 is allowed.

AZ-500 Question 64

Question

SIMULATION –
You need to ensure that only devices connected to a 131.107.0.0/16 subnet can access data in the rg1lod10598168 Azure Storage account.
To complete this task, sign in to the Azure portal.

Answer

See the explanation below.

Explanation

Step 1:

  1. In Azure portal go to the storage account you want to secure. Here: rg1lod10598168
  2. Click on the settings menu called Firewalls and virtual networks.
  3. To deny access by default, choose to allow access from Selected networks. To allow traffic from all networks, choose to allow access from All networks.
  4. Click Save to apply your changes.

Step 2:

  1. Go to the storage account you want to secure. Here: rg1lod10598168
  2. Click on the settings menu called Firewalls and virtual networks.
  3. Check that you’ve selected to allow access from Selected networks.
  4. To grant access to a virtual network with a new network rule, under Virtual networks, click Add existing virtual network, select Virtual networks and Subnets options. Enter the 131.107.0.0/16 subnet and then click Add.

Note: When network rules are configured, only applications requesting data over the specified set of networks can access a storage account. You can limit access to your storage account to requests originating from specified IP addresses, IP ranges or from a list of subnets in an Azure Virtual Network (VNet).

Reference

AZ-500 Question 65

Question

SIMULATION –
You need to grant the required permissions to a user named User2-11641655 to manage the virtual networks in the RG1lod11641655 resource group. The solution must use the principle of least privilege.
To complete this task, sign in to the Azure portal.

Answer

See the explanation below.

Explanation

1. In Azure portal, locate and select the RG1lod10598168 resource group.
2. Click Access control (IAM).
3. Click the Role assignments tab to view all the role assignments at this scope.
4. Click Add > Add role assignment to open the Add role assignment pane.

Click Add/> Add role assignment to open the Add role assignment pane.” width=”499″ height=”218″></p><p>5. In the Role drop-down list, select the role Virtual Machine Contributor.<br />Virtual Machine Contributor lets you manage virtual machines, but not access to them, and not the virtual network or storage account they’re connected to.<br />6. In the Select list, select user user21059868<br />7. Click Save to assign the role.</p><h3><span id=Reference

AZ-500 Question 66

Question

SIMULATION –
You need to prevent administrative users from accidentally deleting a virtual network named VNET1. The administrative users must be allowed to modify the settings of VNET1.
To complete this task, sign in to the Azure portal.

Answer

See the explanation below.

Explanation

Locking prevents other users in your organization from accidentally deleting or modifying critical resources, such as Azure subscription, resource group, or resource.
Note: In Azure, the term resource refers to an entity managed by Azure. For example, virtual machines, virtual networks, and storage accounts are all referred to as Azure resources.
1. In the Settings blade for virtual network VNET, select Locks.

In the Settings blade for virtual network VNET, select Locks.

2. To add a lock, select Add.

To add a lock, select Add.

3. For Lock type select Delete lock, and click OK

Reference

AZ-500 Question 67

Question

SIMULATION –
You need to perform a full malware scan every Sunday at 02:00 on a virtual machine named VM1 by using Microsoft Antimalware for Virtual Machines.
To complete this task, sign in to the Azure portal.

Answer

See the explanation below.

Explanation

Deploy the Microsoft Antimalware Extension using the Azure Portal for single VM deployment
1. In Azure Portal, go to the Azure VM1″s blade, navigate to the Extensions section and press Add.

In Azure Portal, go to the Azure VM1's blade, navigate to the Extensions section and press Add.

2. Select the Microsoft Antimalware extension and press Create.
3. Fill the “Install extension” form as desired and press OK.

Scheduled: Enable –
Scan type: Full –
Scan day: Sunday –

Fill the

AZ-500 Question 68

Question

SIMULATION –
You need to add the network interface of a virtual machine named VM1 to an application security group named ASG1.
To complete this task, sign in to the Azure portal.

Answer

See the explanation below.

Explanation

1. In the Search resources, services, and docs box at the top of the portal, begin typing the name of a virtual machine, VM1 that has a network interface that you want to add to, or remove from, an application security group.
2. When the name of your VM appears in the search results, select it.
3. Under SETTINGS, select Networking. Select Configure the application security groups, select the application security groups that you want to add the network interface to, or unselect the application security groups that you want to remove the network interface from, and then select Save.

Reference

AZ-500 Question 69

Question

SIMULATION –
You need to configure Azure to allow RDP connections from the Internet to a virtual machine named VM1. The solution must minimize the attack surface of VM1.
To complete this task, sign in to the Azure portal.

Answer

See the explanation below.

Explanation

To enable the RDP port in an NSG, follow these steps:
1. Sign in to the Azure portal.
2. In Virtual Machines, select VM1
3. In Settings, select Networking.
4. In Inbound port rules, check whether the port for RDP is set correctly. The following is an example of the configuration:

Priority: 300 –
Name: Port_3389 –
Port(Destination): 3389 –
Protocol: TCP –
Source: Any –
Destinations: Any –
Action: Allow –

Reference

AZ-500 Question 70

Question

You have an Azure Container Registry named ContReg1 that contains a container image named image1.
You enable content trust for ContReg1.
After content trust is enabled, you push two images to ContReg1 as shown in the following table.

Name Details
image2 Image was pushed with client content trust enabled.
image3 Image was pushed with client content trust disabled.

Which images are trusted images?

A. image1 and image2 only
B. image2 only
C. image1, image2, and image3

Answer

B. image2 only

Explanation

Azure Container Registry implements Docker’s content trust model, enabling pushing and pulling of signed images.

To push a trusted image tag to your container registry, enable content trust and push the image with docker push.

To work with trusted images, both image publishers and consumers need to enable content trust for their Docker clients. As a publisher, you can sign the images you push to a content trust-enabled registry.

Reference