Skip to Content

AZ-500 Microsoft Azure Security Technologies Exam Questions and Answers – 1

The latest Microsoft AZ-500 Azure Security Technologies certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the Microsoft AZ-500 Azure Security Technologies exam and earn Microsoft AZ-500 Azure Security Technologies certification.

AZ-500 Microsoft Azure Security Technologies Exam Questions and Answers

Question 11

Question

SIMULATION –
You need to ensure that the audit logs from the SQLdb1 Azure SQL database are stored in the WS11641655 Azure Log Analytics workspace.
To complete this task, sign in to the Azure portal and modify the Azure resources.

Answer

See explanation below.

Explanation

1. In the Azure portal, type SQL in the search box, select SQL databases from the search results then select SQLdb1. Alternatively, browse to SQL databases in the left navigation pane.
2. In the properties of SQLdb1, scroll down to the Security section and select Auditing.
3. Turn auditing on if it isn’t already, tick the Log Analytics checkbox then click on Configure.

Turn auditing on if it isn't already, tick the Log Analytics checkbox then click on Configure.

4. Select the WS11641655 Azure Log Analytics workspace.
5. Click Save to save the changes.

Question 12

Question

SIMULATION –
You need to ensure that the AzureBackupReport log for the Vault1 Recovery Services vault is stored in the WS11641655 Azure Log Analytics workspace.
To complete this task, sign in to the Azure portal and modify the Azure resources.

Answer

See the explanation below.

Explanation

1. In the Azure portal, type Recovery Services Vaults in the search box, select Recovery Services Vaults from the search results then select Vault1. Alternatively, browse to Recovery Services Vaults in the left navigation pane.
2. In the properties of Vault1, scroll down to the Monitoring section and select Diagnostic Settings.
3. Click the Add a diagnostic setting link.
4. Enter a name in the Diagnostic settings name box.
5. In the Log section, select AzureBackupReport.

In the Log section, select AzureBackupReport.

6. In the Destination details section, select Send to log analytics

In the Destination details section, select Send to log analytics

7. Select the WS11641655 Azure Log Analytics workspace.
8. Click the Save button to save the changes.

Reference

Question 13

Question

SIMULATION –
You plan to connect several Windows servers to the WS11641655 Azure Log Analytics workspace.
You need to ensure that the events in the System event logs are collected automatically to the workspace after you connect the Windows servers.
To complete this task, sign in to the Azure portal and modify the Azure resources.

Answer

See the explanation below.

Explanation

Azure Monitor can collect events from the Windows event logs or Linux Syslog and performance counters that you specify for longer term analysis and reporting, and take action when a particular condition is detected. Follow these steps to configure collection of events from the Windows system log and Linux Syslog, and several common performance counters to start with.

Data collection from Windows VM –
1. In the Azure portal, locate the WS11641655 Azure Log Analytics workspace then select Advanced settings.

In the Azure portal, locate the WS11641655 Azure Log Analytics workspace then select Advanced settings.

2. Select Data, and then select Windows Event Logs.
3. You add an event log by typing in the name of the log. Type System and then select the plus sign +.
4. In the table, check the severities Error and Warning. (for this question, select all severities to ensure that ALL logs are collected).
5. Select Save at the top of the page to save the configuration.

Reference

Question 14

Question

You are troubleshooting a security issue for an Azure Storage account.
You enable the diagnostic logs for the storage account.
What should you use to retrieve the diagnostics logs?

A. Azure Storage Explorer
B. SQL query editor in Azure
C. File Explorer in Windows
D. Azure Security Center

Answer

A. Azure Storage Explorer

Explanation

If you want to download the metrics for long-term storage or to analyze them locally, you must use a tool or write some code to read the tables. You must download the minute metrics for analysis. The tables do not appear if you list all the tables in your storage account, but you can access them directly by name.

Many storage-browsing tools are aware of these tables and enable you to view them directly (see Azure Storage Client Tools for a list of available tools).

Microsoft provides several graphical user interface (GUI) tools for working with the data in your Azure Storage account. All of the tools outlined in the following table are free.

Azure Storage client tool Supported platforms Block Blob Page Blob Append Blob Tables Queues Files
Azure portal Web Yes Yes Yes Yes Yes Yes
Azure Storage Explorer Windows, OSX Yes Yes Yes Yes Yes Yes
Microsoft Visual Studio Cloud Explorer Windows Yes Yes Yes Yes Yes No

Note: There are several versions of this question in the exam. The questions in the exam have two different correct answers:

  1. Azure Storage Explorer
  2. AZCopy

Other incorrect answer options you may see on the exam include the following:

  1. Azure Monitor
  2. The Security & Compliance admin center
  3. Azure Cosmos DB explorer
  4. Azure Monitor

Reference

Question x15

Question

SIMULATION –
A user named Debbie has the Azure app installed on her mobile device.
You need to ensure that [email protected] is alerted when a resource lock is deleted.
To complete this task, sign in to the Azure portal.

Answer

See the explanation below.

Explanation

You need to configure an alert rule in Azure Monitor.

  1. Type Monitor into the search box and select Monitor from the search results.
  2. Click on Alerts.
  3. Click on +New Alert Rule.
  4. In the Scope section, click on the Select resource link.
  5. In the Filter by resource type box, type locks and select Management locks (locks) from the filtered results.
  6. Select the subscription then click the Done button.
  7. In the Condition section, click on the Select condition link.
  8. Select the Delete management locks condition the click the Done button.
  9. In the Action group section, click on the Select action group link.
  10. Click the Create action group button to create a new action group.
  11. Give the group a name such as Debbie Mobile App (it doesn’t matter what name you enter for the exam) then click the Next: Notifications > button.
  12. In the Notification type box, select the Email/SMS message/Push/Voice option.
  13. In the Email/SMS message/Push/Voice window, tick the Azure app Push Notifications checkbox and enter [email protected] in the Azure account email field.
  14. Click the OK button to close the window.
  15. Enter a name such as Debbie Mobile App in the notification name box.
  16. Click the Review & Create button then click the Create button to create the action group.
  17. Back in the Create alert rule window, in the Alert rule details section, enter a name such as Management lock deletion in the Alert rule name field.
  18. Click the Create alert rule button to create the alert rule.

Question 16

Question

You have multiple development teams that will create apps in Azure.
You plan to create a standard development environment that will be deployed for each team.
You need to recommend a solution that will enforce resource locks across the development environments and ensure that the locks are applied in a consistent manner.
What should you include in the recommendation?

A. an Azure policy
B. an Azure Resource Manager template
C. a management group
D. an Azure blueprint

Answer

D. an Azure blueprint

Reference

Question 17

Question

HOTSPOT –
You have the Azure virtual networks shown in the following table.

Name Location Subnet Peered network
VNET1 East US Subnet1 VNET2
VNET2 West US Subnet2, Subnet3 VNET1
VNET4 East US Subnet4 None

You have the Azure virtual machines shown in the following table.

Name Application security group Network security group (NSG) Connected to Public IP address
VM1 ASG1 NSG1 Subnet1 No
VM2 ASG2 NSG1 Subnet2 No
VM3 ASG2 NSG1 Subnet3 Yes
VM4 ASG4 NSG1 Subnet4 Yes

The firewalls on all the virtual machines allow ping traffic.
NSG1 is configured as shown in the following exhibit.

Inbound security rules –

Inbound security rules -

Outbound security rules –

Outbound security rules -

For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

Statements:

  • VM1 can ping VM3 successfully.
  • VM2 can ping VM4 successfully.
  • VM3 can be accessed by using Remote Desktop from the internet.

Answer

  • VM1 can ping VM3 successfully: Yes
  • VM2 can ping VM4 successfully: No
  • VM3 can be accessed by using Remote Desktop from the internet: Yes

Explanation

Box 1: Yes –
VM1 and VM3 are on peered VNets. The firewall rules with a source of ASG1 and ASG2 allow ג€˜any’ traffic on ג€˜any’ protocol so pings are allowed between VM1 and VM3.

Box 2: No –
VM2 and VM4 are on separate VNets and the VNets are not peered. Therefore, the pings would have to go over the Internet. VM4 does have a public IP and the firewall allows pings. However, for VM2 to be able to ping VM4, VM2 would also need a public IP address. In Azure, pings don’t go out through the default gateway as they would in a physical network. For an Azure VM to ping external IPs, the VM must have a public IP address assigned to it.

Box 3: Yes –
VM3 has a public IP address and the firewall allows traffic on port 3389.

Question 18

Question

You plan to create an Azure Kubernetes Service (AKS) cluster in an Azure subscription.
The manifest of the registered server application is shown in the following exhibit.

The manifest of the registered server application is shown in the following exhibit.

You need to ensure that the AKS cluster and Azure Active Directory (Azure AD) are integrated.
Which property should you modify in the manifest?

A. accessTokenAcceptedVersion
B. keyCredentials
C. groupMembershipClaims
D. acceptMappedClaims

Answer

C. groupMembershipClaims

Reference

Question 19

Question

HOTSPOT –
You have an Azure subscription that contains a storage account named storage1 and several virtual machines. The storage account and virtual machines are in the same Azure region. The network configurations of the virtual machines are shown in the following table.

Name Public IP address Connected to
VM1 52.232.128.194 VNET1/Subnet1
VM2 52.233.129.82 VNET1/Subnet2
VM3 52.233.130.11 VNET1/Subnet3

The virtual network subnets have service endpoints defined as shown in the following table.

Name Service endpoint
VNET1/Subnet1 Microsoft.Storage
VNET2/Subnet2 None
VNET3/Subnet3 Microsoft.KeyVault

You configure the following Firewall and virtual networks settings for storage1:

  • Allow access from: Selected networks
  • Virtual networks: VNET3\Subnet3
  • Firewall Address range: 52.233.129.0/24

For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

  • VM1 can connect to storage1.
  • VM2 can connect to storage1.
  • VM3 can connect to storage1.

Answer

  • VM1 can connect to storage1: No
  • VM2 can connect to storage1: Yes
  • VM3 can connect to storage1: No

Explanation

Box 1: No –
VNet1 has a service endpoint configure for Azure Storage. However, the Azure storage does not allow access from VNet1 or the public IP address of VM1.

Box 2: Yes –
VNet2 does not have a service endpoint configured. However, the Azure storage allows access from the public IP address of VM2.

Box 3: No –
Azure storage allows access from VNet3. However, VNet3 does not have a service endpoint for Azure storage. The Azure storage also does not allow access from the public IP of VM3.

Question 20

Question

You are securing access to the resources in an Azure subscription.
A new company policy states that all the Azure virtual machines in the subscription must use managed disks.
You need to prevent users from creating virtual machines that use unmanaged disks.
What should you use?

A. Azure Monitor
B. Azure Policy
C. Azure Security Center
D. Azure Service Health

Answer

B. Azure Policy

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. We need money to operate the site, and almost all of it comes from online advertising. Please support us by disabling these ads blocker.

Please disable ad blocker