Download Microsoft Azure Security Technologies.CertKingdom.AZ-500.2022-10-28.5e.189q.vcex

Download Exam

File Info

Exam Microsoft Azure Security Technologies
Number AZ-500
File Name Microsoft Azure Security Technologies.CertKingdom.AZ-500.2022-10-28.5e.189q.vcex
Size 14.45 Mb
Posted October 28, 2022
Downloads 43

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

 
 



Demo Questions

Question 1
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements. 
Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name. 
You have been tasked with integrating Active Directory and the Azure AD tenant. You intend to deploy Azure AD Connect. 
Your strategy for the integration must make sure that password policies and user logon limitations affect user accounts that are synced to the Azure AD tenant, and that the amount of necessary servers are reduced. 
Solution: You recommend the use of federation with Active Directory Federation Services (AD FS). 
Does the solution meet the goal? 

  • A: Yes 
  • B: No 



Question 2
You have been tasked with applying conditional access policies for your company's current Azure Active Directory (Azure AD). 
The process involves assessing the risk events and risk levels. 
Which of the following is the risk level that should be configured for sign ins that originate from IP addresses with dubious activity? 

  • A: None 
  • B: Low 
  • C: Medium 
  • D: High 



Question 3
You have been tasked with configuring an access review, which you plan to assigned to a new collection of reviews. You also have to make sure that the reviews can be reviewed by resource owners. 
You start by creating an access review program and an access review control. 
You now need to configure the Reviewers. 
Which of the following should you set Reviewers to? 

  • A: Selected users. 
  • B: Members (Self). 
  • C: Group Owners. 
  • D: Anyone. 



Question 4
Your company has an Azure Container Registry. 
You have been tasked with assigning a user a role that allows for the uploading of images to the Azure Container Registry. The role assigned should not require more privileges than necessary. 
Which of the following is the role you should assign? 

  • A: Owner 
  • B: Contributor 
  • C: AcrPush 
  • D: AcrPull 



Question 5
Your company has an Azure subscription that includes two virtual machines, named VirMac1 and VirMac2, which both have a status of Stopped (Deallocated). The virtual machines belong to different resource groups, named ResGroup1 and ResGroup2. 
You have also created two Azure policies that are both configured with the virtualMachines resource type. The policy configured for ResGroup1 has a policy definition of Not allowed resource types, while the policy configured for ResGroup2 has a policy definition of Allowed resource types. 
You then create a Read-only resource lock on VirMac1, as well as a Read-only resource lock on ResGroup2. 
Which of the following is TRUE with regards to the scenario? (Choose all that apply.) 

  • A: You will be able to start VirMac1. 
  • B: You will NOT be able to start VirMac1. 
  • C: You will be able to create a virtual machine in ResGroup2. 
  • D: You will NOT be able to create a virtual machine in ResGroup2. 



Question 6
You have been tasked with delegate administrative access to your company's Azure key vault. 
You have to make sure that a specific user can set advanced access policies for the key vault. You also have to make sure that access is assigned based on the principle of least privilege. 
Which of the following options should you use to achieve your goal? 

  • A: Azure Information Protection 
  • B: RBAC 
  • C: Azure AD Privileged Identity Management (PIM) 
  • D: Azure DevOps 



Question 7
You need to consider the underlined segment to establish whether it is accurate. 
You have configured an Azure Kubernetes Service (AKS) cluster in your testing environment. 
You are currently preparing to deploy the cluster to the production environment. 
After disabling HTTP application routing, you want to replace it with an application routing solution that allows for reverse proxy and TLS termination for AKS services via a solitary IP address. 
You must create an AKS Ingress controller. 
Select "No adjustment required"  if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option. 

  • A: No adjustment required. 
  • B: a network security group 
  • C: an application security group 
  • D: an Azure Basic Load Balancer 



Question 8
You want to gather logs from a large number of Windows Server 2016 computers using Azure Log Analytics. 
You are configuring an Azure Resource Manager template to deploy the Microsoft Monitoring Agent to all the servers automatically. 
Which of the following should be included in the template? (Choose all that apply.) 

  • A: WorkspaceID 
  • B: AzureADApplicationID 
  • C: WorkspaceKey 
  • D: StorageAccountKey 



Question 9
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements. 
Your company has Azure subscription linked to their Azure Active Directory (Azure AD) tenant. 
As a Global administrator for the tenant, part of your responsibilities involves managing Azure Security Center settings. 
You are currently preparing to create a custom sensitivity label. 
Solution: You start by altering the pricing tier of the Security Center. 
Does the solution meet the goal? 

  • A: Yes 
  • B: No 



Question 10
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a hybrid configuration of Azure Active Directory (Azure AD). 
You have an Azure HDInsight cluster on a virtual network. 
You plan to allow users to authenticate to the cluster by using their on-premises Active Directory credentials. 
You need to configure the environment to support the planned authentication. 
Solution: You deploy the On-premises data gateway to the on-premises network. 
Does this meet the goal? 

  • A: Yes 
  • B: No 






CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset