Exam Logo

Microsoft (AZ-500) Exam Questions And Answers page 50

Your network contains an on-premises Active Directory domain named adatum.com that syncs to Azure Active Directory (Azure AD).

The Azure AD tenant contains the users shown in the following table.


You configure the Authentication methods Password Protection settings for adatum.com as shown in the following exhibit.


For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Manage identity and access Manage security operations
You need to configure WebApp1 to meet the data and application requirements.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.
Implement platform protection Secure data and applications
You have an Azure subscription that contains the virtual machines shown in the following table.


From Azure Security Center, you turn on Auto Provisioning.

You deploy the virtual machines shown in the following table.


On which virtual machines is the Microsoft Monitoring Agent installed?
Manage security operations Secure data and applications
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.

Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name.

You have been tasked with integrating Active Directory and the Azure AD tenant. You intend to deploy Azure AD Connect.

Your strategy for the integration must make sure that password policies and user logon limitations affect user accounts that are synced to the Azure AD tenant, and that the amount of necessary servers are reduced.

Solution: You recommend the use of password hash synchronization and seamless SSO.

Does the solution meet the goal?
Manage security operations Secure data and applications
You have a network security group (NSG) bound to an Azure subnet.

You run Get-AzNetworkSecurityRuleConfig and receive the output shown in the following exhibit.


Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

Implement platform protection Manage security operations
You have an Azure Sentinel workspace that has the following data connectors:

• Azure Active Directory Identity Protection
• Common Event Format (CEF)
• Azure Firewall

You need to ensure that data is being ingested from each connector.

From the Logs query window, which table should you query for each connector? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Manage identity and access Manage security operations
You company has an Azure subscription named Sub1. Sub1 contains an Azure web app named WebApp1 that uses Azure Application Insights. WebApp1 requires users to authenticate by using OAuth 2.0 client secrets.

Developers at the company plan to create a multi-step web test app that preforms synthetic transactions emulating user traffic to Web App1.

You need to ensure that web tests can run unattended.

What should you do first?
Manage identity and access Manage security operations
You have the Azure Information Protection labels as shown in the following table.


You have the Azure Information Protection policies as shown in the following table.


You need to identify how Azure Information Protection will label files.

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Manage security operations Secure data and applications
You need to meet the technical requirements for VNetwork1.

What should you do first?
Implement platform protection Manage security operations
You have an Azure subscription.

You plan to create a storage account.

You need to use customer-managed keys to encrypt the tables in the storage account.

From Azure Cloud Shell, which three cmdlets should you run in sequence? To answer, move the appropriate cmdlets from the list of cmdlets to the answer area and arrange them in the correct order.

Implement platform protection Secure data and applications