AZ-500 Exam Questions Flashcards
You manage external guest users in an Azure AD tenant. The tenant uses the default settings.
Which capability is available to the guest users? Select only one answer. A. Invite other guests. B. Read all directory information. C. Register new applications. D. Read subscriptions.
A
By default guest users can invite other guests. They are unable to read all directory information, register new applications, or read subscriptions.
https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/users-default-permissions
2.
You are configuring Azure AD risk policies.
You need to configure a policy that minimizes the impact on user experience while following the Zero Trust architecture.
Your users are not registered for multi-factor authentication (MFA), and self-service password reset (SSPR) is disabled.
What should you do?
A. Set the user risk policy threshold to high B. Set the user risk policy threshold to low C. Allow self -remediation options D. Set the sign-in risk policy to low
A
Choosing a high threshold reduces the number of times a policy is triggered and minimizes the impact on users. Setting the sign-in risk policy to low introduces more user interrupts. Self-remediation requires MFA and SSPR. As they are unavailable, administrator interventions is required. Settings the user risk policy to low introduces more users interrupts.
3.
You manage Azure AD for a retail company.
You need to ensure that employees using shared Android tablets can use passwordless authentication when accessing the Azure portal.
Which authentication method should you use?
A. The Microsoft Authenticator App B. Windows Hello for Business C. Security Keys D. Windows Hello
A
You can only use the Microsoft Authenticator app or one-time password login on shared devices. Windows Hello can only be used for Windows Devices. You cannot use security keys on shared devices.
https://learn.microsoft.com/en-us/training/modules/azure-active-directory/12-passwordless
https://learn.microsoft.com/en-us/azure/active-directory/authentication/howto-authentication-passwordless-deployment
You need to configure passwordless authentication. The solution must follow the principal of least privilege. Which role should you assign to complete the task?
A. Global Administrator B. Security Administrator C. Authentication Policy Administrator D. Authentications Administrator
A.
Configuring authentication methods requires Global Administrator privileges. Security Administrators have permissions to manage other security-related features. Authentication policy administrators can configure the authentication methods policy, tenant-wide multi-factor authentication settings, and password protection policy. Authentications administrators can set or reset any authentication methods including passwords for non- administrators and some roles.
You have an Azure AD tenant.
You need to recommend a password less authentication solution.
Which three authentication methods should you include in the recommendation? Each Correct answer presents a complete solution.
A. Windows Hello For Business B. OATH Software Tokens C. FIDO2 Security Keys D. SMS verification E. The Microsoft Authenticator app F. Voice call verification
A C E
Windows Hello for Business, Security keys, and the Microsoft Authenticator app all support password less authentication. The remaining options do not support password less authentication.
https://learn.microsoft.com/en-us/azure/active-directory/authentication/howto-authentication-passwordless-deployment
https://learn.microsoft.com/en-us/training/modules/manage-user-authentication/
6.
You have an Azure subscription that contains the following resources:
Two virtual networks
VNet1: Contains two subnets
VNet2: Contains three subnets
Virtual machines: Connected to all the subnets on VNet1 and VNet2
A storage account named storage1
You need to identify the minimal number of service endpoints that are required to meet the following requirements:
Virtual machines that are connected to the subnets of VNet1 must be able to access storage1 over the Azure backbone.
Virtual machines that are connected to the subnets of VNet2 must be able to access Azure AD over the Azure backbone.
How many service endpoints should you recommend?
A. 2 B. 3 C. 4 D. 5
D.
A service endpoint is configured for a specific server at the subnet level. Based of the requirements, you need to configure two service endpoints for Microsoft.Storage on VNet1 because Vnet1 has two subnets and three service endpoints for Microsfot.AzureActiveDirectory on VNet2 because Vnet2 has three subnets. The minimum number of service endpoints that you must configure is 5.
https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-service-endpoints-overview
You have a workload in Azure that uses a virtual machine named VM1. VM1 is in a resource group named RG1.
You need to create and assign an identity to VM1 that will be used to access Azure resources. Other virtual machines must be able to use the same identity.
Which PowerShell script should you run?
A. New-AzUserAssignedIdentity -ResourceGroupName RG1 -Name VMID $vm = Get-AzVM -ResourceGroupName RG1 -Name VM1 Update-AzVM -ResourceGroupName RG1 -VM $vm -IdentityType UserAssigned -IdentityID “/subscriptions/<SUBSCRIPTION>/resourcegroups/RG1/providers/Microsoft.ManagedIdentity/userAssignedIdentities/VMID"</SUBSCRIPTION>
B. New-AzUserAssignedIdentity -ResourceGroupName RG1 -Name VMID $vm = Get-AzVM -ResourceGroupName RG1 -Name VM1 Update-AzVM -ResourceGroupName RG1 -VM $vm -IdentityType UserAssigned -IdentityID “/subscriptions/<SUBSCRIPTION>/resourcegroups/RG1/providers/Microsoft.ManagedIdentity/userAssignedIdentities/VM1"</SUBSCRIPTION>
C. $vm = Get-AzVM -ResourceGroupName RG1 -Name VM1 Update-AzVM -ResourceGroupName RG1 -VM $vm -IdentityType SystemAssigned
D. $vm = Get-AzVM -ResourceGroupName RG1 -Name VM1 Update-AzVM -ResourceGroupName RG1 -VM $vm -IdentityType SystemAssignedUserAssigned
A.
Only user-assigned managed identities can be shared by different Azure resources. Once a managed identity is created, you need to update the virtual machines to use the identity by passing its resource ID.
https://learn.microsoft.com/en-us/training/modules/application-security/6-managed-identities
https://learn.microsoft.com/en-us/powershell/module/az.compute/update-azvm?view=azps-10.0.0&viewFallbackFrom=azps-9.2.0
https://learn.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/qs-configure-powershell-windows-vm#code-try-9
You have an Azure AD tenant. All the users in the tenant have Windows devices that are Azure AD-joined.
You need to implement Azure AD Multi-Factor Authentication (MFA). The solution must ensure that Azure MFA can be used without internet access or mobile network availability.
Which authentication method should you use? A. Windows Hello for Business B. OATH software tokens C. Voice call verification D. Windows Hello for Business
A, D
FIDO2 incorporates the web authentication (WebAuthn) specification. User can register, and then select a FIDO2 security key at sign-in as their main means of authentication. FIDO2 security keys are typically USB devices but can also Bluetooth or NFC. OATH software tokens and voice call verification is unsupported as a primary authentication method. Windows Hello for business can be used as a primary authentication method and can be installed on a device that uses NFC.
https://learn.microsoft.com/en-us/training/modules/manage-user-authentication/2-administer-fido2-passwordless-authentication-methods
You create an access review for a select number of groups in Azure AD for all users that have access to your tenant. You configure the review to automatically apply results to resources.
After running the review, you notice that a user that should have been removed from a group is still part of the group.
Why is the user still in the group?
A. The user is a part of the Compliance Administrator role.
B. The user is a guest user.
C. The group is a Windows AD group.
D. The group is an Azure AD group.
C.
The group is a Windows AD group and access reviews can only manage Azure AD groups. Guest users and users that are part of the Compliance Administrator role can be removed, and access reviews can manage Azure AD groups.
https://learn.microsoft.com/azure/active-directory/governance/create-access-review
You need to ensure that users signing in to the Azure portal are prompted to sign in every 48 hours.
What should you configure?
A. Coniditional Access Sign-in frequency
B. Conditional Access App Control
C. Conditional Access Persistent browser session
D. Azure AD Privileged Identity Management (PIM)
A.
Sign-in frequency defines the time period before a user is asked to sign in again when attempting to access a resource. Conditional Access App Control and PIM do not allow the control of authentication session management. A persistent browser session allows users to remain signed in after closing and reopening their browser window.
https://learn.microsoft.com/en-us/training/modules/azure-ad-identity-protection/10-conditional-access-conditions
You create a role by using the following JSON.
{
“Name”: “Virtual Machine Operator”,
“Id”: “88888888-8888-8888-8888-888888888888”,
“IsCustom”: true,
“Description”: “Can monitor and restart virtual machines.”,
“Actions”: [
“Microsoft.Storage//read”,
“Microsoft.Network//read”,
“Microsoft.Compute/virtualMachines/start/action”,
“Microsoft.Compute/virtualMachines/restart/action”,
“Microsoft.Authorization//read”,
“Microsoft.ResourceHealth/availabilityStatuses/read”,
“Microsoft.Resources/subscriptions/resourceGroups/read”,
“Microsoft.Insights/alertRules/”,
“Microsoft.Insights/diagnosticSettings/”,
“Microsoft.Support/”
],
“NotActions”: [],
“DataActions”: [],
“NotDataActions”: [],
“AssignableScopes”: [“/subscriptions/*”]
}
A user that is part of the new role reports that they are unable to restart a virtual machine by using a PowerShell script.
What should you do to ensure that the user can restart the virtual machine?
Select only one answer:
A. Instruct the user to sign out and back in to their account. B. Ask the user to restart the virtual machine by using the Azure portal. C. Add Microsoft.Compute/*/read to the list of Actions in the role. D. Add Microsoft.Computer/virtualMachines/login/action to the list of DataActions in the custom role.
C.
The role needs read access to virtual machines to restart them. The user does not need to authenticate again for the role to be in effect, and the user will not be able to access the virtual machine from the portal. Adding Microsoft.Compute/virtualMachines/login/action to the list of DataActions in the role allows the user to sign in as a user, but not to restart the virtual machine.
https://learn.microsoft.com/en-us/azure/role-based-access-control/custom-roles
You have an Azure virtual machine named VM1 the runs Windows Server 2022.
A programmer is writing code to run on VM1. The code will use the system-assigned managed identity assigned to VM1 to access Azure resources.
Which endpoint should the programmer use to request the authentication token required to access the Azure resources?
A. Azure AD v1.0 B. AzureAD v2.0 C. Azure Instance Metadata Service D. Azure Resource Manager (ARM)
C.
Azure Instance Metadata Service is a REST endpoint accessible to all IaaS virtual machines created via Azure Resource Manager (ARM). The endpoint is available at a well-known non-routable IP address (169.254.169.254) that can be accessed only from the virtual machines. The endpoint is used to request the authentication token required to gain access to the Azure resources. Azure AD v1.0 and Azure AD v2.0 endpoints are used to authenticate work and school accounts, not managed identities. The ARM endpoint is where the authentication token is sent by the code once it is obtained from the Azure Instance Metadata Service.
https://learn.microsoft.com/en-us/training/modules/application-security/2-microsoft-identity-platform
https://learn.microsoft.com/en-us/training/modules/application-security/6-managed-identities
13.
You create a web API and register the API as an Azure AD application.
You need to expose a function in the API to ensure that administrators must provide consent to apps that use the API.
What should you add to your app registration?
A. A scope
B. An application ID URI
C. A permission
D. client application
A.
A scope is used to request content to run a given function in an API. An application ID URI does not handle permissions, a permission is used to allow an application to access the scope created in another app, and a client application allows an application to use the API.
https://learn.microsoft.com/en-us/training/modules/application-security/
You create an Azure AD app registration.
You need to consent to the use of a given API in your app for all users.
What should you add to your app registration?
A. a scope B. an application ID URI C. a permission D. a client application
C.
A permission allows the application to use a given API. A scope is used to request consent to run a given function on an API. An application ID URI does not handle permissions.
https://learn.microsoft.com/en-us/azure/active-directory/develop/quickstart-configure-app-access-web-apis
15.
You have Azure web apps named App1 and App2.
You need to ensure that App1 and App2 use the same identity.
Which identity type should you use?
A. A user-assigned managed identity
B. A system-assigned managed identity
C. A service principal with password-based authentication
D. A service principal with certificate-based authentication
A.
A user-assigned managed identity can be associated with more than one Azure resource. Creating a system-assigned managed identity cannot be pre-authorized. Creating a service principal with password-based authentication or certificate-based authentication involves the use of credentials.
https://learn.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/overview
You have an Azure storage account named sa1 that has a container named container1.
You create an Azure AD user named User1.
You need to ensure that User1 can create data in container1.
Which role should you assign to User1?
A. Storage Blob Data Contributor
B. Storage Blob Delegator
C. Storage Account Contributor
D. Classic Storage Account Contributor
A.
Storage Blob Data Contributor can write to containers. Storage Blob Delegator allows the delegation of access keys. Storage Account Contributor allows the management of storage accounts, but not access to the data. Classic Storage Account Contributor allows the management of classic storage accounts, but not the access to the data.
https://learn.microsoft.com/azure/role-based-access-control/custom-roles
You have a resource group named RG1 that contains an Azure virtual network named VNet1. A user named User1 is assigned the Contributor role for RG1.
You need to prevent User1 from modifying the properties of VNet1.
What should you do?
A. Apply a read-only lock to the RG1 scope
B. Remove the Contributor role assignment from VM2
C. Add a deny assignment for Microsoft.Compute/virtualMachines/* in the VM1 scope.
D. Assign User1 the Virtual Machine User Login role in the RG1 scope.
A.
A read-only lock on a resource group that contains a virtual machine prevents all users from starting or restarting the virtual machine. The RBAC assignment is set at the resource group level and inherited by the resource. The assignment needs to be edited at the original scope (level). You cannot directly create your own deny assignments. Assigning User1 the Virtual Machine User Login role in the RG1 scope will still allow User1 to have access as a contributor to restart VM1.
https://learn.microsoft.com/azure/azure-resource-manager/management/lock-resources?tabs=json#considerations-before-applying-locks
You have an Azure subscription named Sub1 that is linked to an Azure AD tenant. The tenant contains a user named Admin1.
Sub1 contains an Azure Policy definition assignment named Assignment1. The definition includes the deployIfNotExists effect.
You need to grant Admin1 permission to include a remediation task for Assignment1. The solution must use the principle of least privilege.
Which role should you assign to Admin1?
A. Contributor
B. Owner
C. Resource Policy Contributor
D. Compliance Administrator
C.
Resource Policy Contributor grants permissions to create and modify resource policy, create support ticket, and read resources and hierarchy. The Owner grants full rights, which violates the principle of least privilege. Contributor does not have sufficient permissions. Compliance Administrator is an Azure AD role, not an Azure RBAC role.
https://learn.microsoft.com/training/modules/enterprise-governance/7-azure-rbac-vs-azure-policies
19.
You create an application named App1 in an Azure tenant.
You need to host the application as a multitenant application for any users in Azure, while restricting non-Azure accounts.
You need to allow administrators in other Azure tenants to add the application to their gallery.
Which CLI command should you run?
A. az ad app create –display-name app1 –sign-in-audience AzureADandPersonalMicrosoftAccount
B. az ad app create –display-name app1–sign-in-audience AzureADMultipleOrgs
C. az webapp auth openid-connect add -r rg1 -n app1 –provider-name p1
D. az webapp auth-classic update -r rg1 -n app1 –action LoginWithAzureActiveDirectory
B.
The correct CLI command allows the application to provide SSO for Azure AD users in any tenant. The CLI commands requiring a web app do not create a gallery entry for the application and configuring the sign-in audience to Azure AD and personal Microsoft accounts does not restrict users to only Azure accounts.
https://learn.microsoft.com/cli/azure/ad/app?view=azure-cli-latest#az-ad-app-create
You have an Azure virtual network named VNet1. VNet1 is in a resource group named RG1. VNet1 contains the following two subnets:
Subnet1: 10.0.1.0/24
Subnet2: 10.0.2.0/24
You need to configure access to a storage account named sa1 in a resource group named RG2. The solution must ensure that sa1 can only be accessed from Subnet2.
What should you run?
A. az storage account network-rule add –resource-group “RG1” –account-name “SA1” –ip-address “10.0.2.0”
B. az storage account network-rule add –resource-group “RG2” –account-name “SA1” –ip-address “10.0.2.0/24” az storage account update –default-action deny –name sa1 –resource-group RG2
C. az network nsg rule create -g RG1 –nsg-name NSG1 -n RULE1 –priority 400 –source-address-prefixes VirtualNetwork –destination-address-prefixes Storage –destination-port-ranges ‘*’ –direction Outbound –access Allow –protocol Tcp
D. az network nsg rule create -g RG1 –nsg-name NSG1 -n RULE1 –priority 400 –source-address-prefixes VirtualNetwork –destination-address-prefixes Storage –destination-port-ranges ‘*’ –direction Outbound –access Allow –protocol Udp
B.
The correct CLI command adds a rule to allow access from the 10.0.2.0/24 subnet to the storage account. The resource group should be for RG2, not RG1. The CLI commands that create network security group (NSG) rules simply allow the entire virtual network to send requests to all storage endpoints.
https://learn.microsoft.com/training/modules/network-security/
21.
You have a workload in Azure that uses multiple virtual machines and Azure functions to access data in a storage account.
You need to ensure that all access to the storage account is done by using a single identity. The solution must reduce the overhead of managing the identity.
Which type of identity should you use?
A. user
B. Group
C. user-assigned managed identity
D. system-assigned managed identity
C.
A user assigned managed identity can be shared across Azure resources, and its password changes are handled by Azure. An user needs to manually handle password changes. You cannot use a group as a service principle. Multiple Azure resources cannot share system-assigned managed identities.
https://learn.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/overview
Your company opens a new office.
You need to allow a user named Admin1 to manage user and group accounts for the new office only.
Which type of resource should you create?
A. Resource Group
B. Management Group
C. Administrative Unit
D. Security Group
C.
An administrative unit can contain only users, groups, and devices. You can also give role management rights to the resources in an administrative unit. Resource groups cannot contain users, groups, or devices. Management groups can only contain other management groups or subscriptions. Departments are used for billing.
https://learn.microsoft.com/training/modules/azure-active-directory/8-azure-active-directory-administrative-units
You configure Azure AD to use multi-factor authentication (MFA) by using the Microsoft Authenticator app.
You need to ensure that users are required to use the Microsoft Authenticator app when accessing Azure from new devices or locations.
Which type of Azure AD Identity Protection policy should you create?
A. user risk policy with self-remediation
B. user risk policy with administrator remediation
C. sign-in risk policy with self-remediation
D. sign-in risk policy with administrator remediation
C.
By using a sign-in risk policy with self-remediation, a sign-in risk is detected when users access their account from a different device or location, and self-remediation forces MFA to be required, whereas administer remediation requires admin intervention. User risk policies are triggered for users that have specific risk levels due to issues such as password leaks.
https://learn.microsoft.com/training/modules/azure-ad-identity-protection/5-sign-risk-policy?ns-enrollment-type=learningpath&ns-enrollment-id=learn.wwl.manage-identity-access
You need to delegate the ability to configure sign-in risk policies. The solution must follow the principle of least privilege.
Which role should you assign?
A. Conditional Access Administrator
B. Security Administrator
C. Authentication Policy Administrator
D. Authentication Administrator
B.
Security administrators have permissions to manage security-related features in the Microsoft 365 Defender portal, Azure AD Identity Protection, Azure AD authentication, Azure Information Protection (AIP), and Office 365 Security & Compliance Center.
https://learn.microsoft.com/azure/active-directory/roles/delegate-by-task
25.
You are creating an Azure AD app registration. You are configuring credentials for the app registration and have the following requirements:
Ensure that the credentials are not transmitted during authentication.
Ensure that the credentials are stored securely.
Ensure that credential usage follows the principle of least privilege.
What should you do?
A. Use certificate credentials
B. Use password credentials
C. User multiple credentials in one app
D. commit credentials using code
A.
Using certificate credentials ensures that the credentials are not transmitted during authentication, that they are stored securely, and that the credential usage follows the principle of least privilege.
https://learn.microsoft.com/azure/active-directory/develop/security-best-practices-for-app-registration
26.
You have an Azure AD tenant that uses the default settings.
You are configuring the Azure AD External collaboration settings.
You need to ensure that only users that are assigned Azure AD administrative roles can invite guests.
What should you do?
A. Enable Security Defaults
B. Set Admins and users in the guest inviter role can invite to Yes
C. Set Guest user access restrictions to Guest user access is restricted to properties and memberships of their own directory objects.
D. In User Permissions, set members can invite to No.
B.
Setting Admins and users in the guest inviter role can invite to Yes allows users to invite guests. Security defaults do not affect guest invitation privileges. The Guest user access is restricted to properties and memberships of their own directory objects setting does not affect guests’ permissions to invite guests. Setting Members can invite to Yes allows non-admin members of your directory to invite guests. Another setting can still override this one.
https://learn.microsoft.com/azure/active-directory/fundamentals/users-default-permissions
27.
You have an Azure SQL database, an Azure key vault, and an Azure App Service web app.
You plan to encrypt SQL data at rest by using Bring Your Own Key (BYOK).
You need to create a managed identity to authenticate without storing any credentials in the code. The managed identity must share the lifecycle with the Azure resource it is used for.
What should you implement?
A. a system-assigned managed identity for an Azure SQL logical server
B. a system-assigned managed identity for Azure Key Vault
C. a system-assigned managed identity for an Azure web app
D. a user-assigned managed identity
C.
To use the managed identity for accessing the encryption key in Key Vault, the identity needs to be set at the Azure SQL logical server level. The managed identity needs to be granted access to the key vault, not vice versa. The web app having a managed identity does not enable encryption at rest by using BYOK. The user-assigned managed identity has an independent lifecycle and must be deleted explicitly.
https://learn.microsoft.com/azure/azure-sql/database/transparent-data-encryption-byok-identity?view=azuresql
28.
You have Azure web apps named App1 and App2.
You need to ensure that App1 and App2 use the same identity.
Which identity type should you use?
A. a user-assigned managed identity
B. a system-assigned managed identity
C. a service principal with password-based authentication
D. a service principal with certificate-based authentication
A.
A user-assigned managed identity can be associated with more than one Azure resource. Creating a system-assigned managed identity cannot be pre-authorized. Creating a service principal with password-based authentication or certificate-based authentication involves the use of credentials.
https://learn.microsoft.com/azure/active-directory/develop/app-objects-and-service-principals
29.
You have an Azure AD tenant that uses the default setting.
You need prevent users from a domain named contoso.com from being invited to the tenant.
What should you do?
A. Edit the Collaboration restrictions settings.
B. Enable security defaults.
C. Deploy Azure AD Privileged Identity Management (PIM).
D. Edit the Access review settings.
A.
After you edit the Collaboration restrictions settings, if you try to invite a user from a blocked domain, you cannot. Security defaults and PIM do not affect guest invitation privileges. By default, the Allow invitations to be sent to any domain (most inclusive) setting is enabled. In this case, you can invite B2B users from any organization.
https://learn.microsoft.com/azure/active-directory/external-identities/allow-deny-list
You plan to provide connectivity between Azure and your company’s datacenter.
You need to define how to establish the connection. The solution must meet the following requirements:
- All traffic between the datacenter and Azure must be encrypted
- Bandwidth must be between 10 and 100 Gpbs
A. ExpressRoute with a provider
B. ExpressRoute Direct
C. Azure VPN Gateway
D. VPN Gateway with Azure virtual WAN
B.
ExpressRoute Direct can have up to 100 Gpbs and use MACSec for Layer 2 encryption. ExpressRoute with a provider does not allow for MACSec encryption and can only use up to 10 Gbps. VPN Gateway and VPN Gateway with Virtual WAN cannot support a bandwidth over 1 Gbps.
https://learn.microsoft.com/azure/expressroute/expressroute-erdirect-about
You have an Azure subscription that contains a network security group (NSG) named NSG1.
You plan to add a security rule named Rule1 to NSG1 that will allow incoming RDP traffic.
You need to ensure that the other security rules of NSG1 cannot override Rule1.
Which priority setting should you use for Rule1?
A. 0
B. 1
C. 100
D. 1000
E. 65000
C.
The priority setting for a security rule can be a number between 100 and 4096. Rules are processed in priority order, with lower numbers processed before higher numbers, which results in lower numbers having a higher priority. Once traffic matches a rule, processing stops. To ensure that other rules cannot override Rule1, you must configure Rule1 to have the highest priority, which means that it must be configured with a priority of 100.
https://learn.microsoft.com/azure/virtual-network/network-security-groups-overview
You have an Azure subscription that contains the following resources:
- A virtual machine named VM1 that has a network interface named NIC1
- A virtual network named VNet1 that has a subnet named Subnet1
- A public IP address named PubIP1
-A load balancer named LB1
You create a network security group (NSG) named NSG1.
To which two resources can you associate NSG1? Each correct answer presents a complete solution.
A. VM1
B. NIC1
C. VNet1
D. Subnet1
E. PublP1
F. LB1
B, D
You can associate an NSG to a virtual network subnet and network interface only. You can associate zero or one NSGs to each virtual network subnet and network interface on a virtual machine. The same NSG can be associated to as many subnets and network interfaces as you choose.
https://learn.microsoft.com/azure/virtual-network/network-security-group-how-it-works
You have an Azure subscription that contains the following resources:
An web app named WebApp1 in the West US Azure region
A virtual network named VNet1 in the West US 3 Azure region
You need to integrate WebApp1 with VNet1.
What should you implement first?
A. peering
B. Azure Front door
C. a service endpoint
D. a VPN gateway
D.
WebApp1 and VNet1 are in different regions and cannot use regional integration; you can use only gateway-required virtual network integration. To be able to implement this type of integration, you must first deploy a virtual network gateway in VNet1.
https://learn.microsoft.com/azure/app-service/overview-vnet-integration
You have an Azure subscription that contains a virtual network named VNet1.
VNet1 contains the following subnets:
Subnet1: Has a connected virtual machine
Subnet2: Has a Microsoft.Storage service endpoint
Subnet3: Has subnet delegation to the Microsoft.Web/serverFarms service
Subnet: Has no additional configurations
You need to deploy an Azure SQL managed instance named managed1 to VNet1.
To which subnets can you connect managed1?
A. Subnet4 only
B. Subnet2 and Subnet4 only
C. Subnet3 and Subnet4 only
D. Subnet2, Subnet3, and Subnet4 only
E. Subnet1, Subnet2, Subnet3, and Subnet4
D.
You can deploy an SQL managed instance to a dedicated virtual network subnet that does not have any resource connected. The subnet can have a service endpoint or can be delegated for a different service. For this scenario, you can deploy managed1 to Subnet2, Subnet3, and Subnet4 only. You cannot deploy managed1 to Subnet1 because Subnet1 has a connected virtual machine.
https://learn.microsoft.com/azure/azure-sql/managed-instance/connectivity-architecture-overview?view=azuresql&tabs=current
35.
You have an Azure subscription that contains a virtual machine named VM1. VM1 runs a web app named App1.
You need to protect App1 by implementing Web Application Firewall (WAF).
What resource should you deploy?
A. Azure Firewall
B. Azure Application Gateway
C. Azure Traffic Manager
D. Azure Front Door
B.
WAF is a tier of Application Gateway. If you want to deploy WAF, you must deploy Application Gateway and select the WAF or WAF V2 tier.
https://learn.microsoft.com/training/modules/network-security/8-azure-application-gateway
36.
You are evaluating the Azure Policy configurations to identify any required custom initiatives and policies.
You need to run workloads in Azure that are compliant with the following regulations:
FedRAMP High
PCI DSS 3.2.1
GDPR
ISO 27001:2013
For which regulation should you create custom initiatives?
Select only one answer.
A. FedRAMP High
B. PCI DSS 3.2.1
C. GPDR
D. ISO 27001:2013
C.
To run workloads that are compliant with GPDR, custom initiatives should be to be created. GPDR compliance initiatives are not yet available in Azure. Azure has existing initiatives for ISO, PCI DDS 3.2.1, and FedRAMP High.
https://learn.microsoft.com/training/modules/enterprise-governance/
37.
You have the following security policy deployed to an Azure subscription.
policyRule: {
if: {
allOf: [
{
field: “type”,
equals: “Microsoft.Storage/storageAccounts”
},
{
field: “Microsoft.Storage/storageAccounts/allowSharedKeyAccess”,
equals: “true”
}
]
},
then: {
effect: “Deny”
}
}
You successfully deploy a new storage account.
Which statements is true?
Select only one answer.
A. Usage of Azure AD authentication is enforced.
B. Usage of the storage account shared key is allowed.
C. Accessing the data in the storage account is enabled for users that have the Storage Account Contributor role.
D. Accessing the data by using SAS tokens is disabled.
A.
Enforcing Azure AD authentication prevents using shared keys, and leaves only data plane RBAC as an authentication option. The policy prevents account shared keys for storage accounts. The Storage Account Contributor role is not a data plane RBAC role, but leverages shared keys. SAS tokens can still be created by using a delegated SAS model (Azure AD).
https://learn.microsoft.com/azure/governance/policy/concepts/effects
38.
You are configuring an Azure Policy in your environment.
You need to ensure that any resources that are missing a tag named CostCenter inherit a value from a resource group.
You create a custom policy that uses the following snippet.
“policyRule”: {
“if”: {
“field”: “tags[‘CostCenter’]”,
“exists”: “false”
},
“then”: {
“effect”: “modify”,
“details”: {
“roleDefinitionIds”: [
“/providers/microsoft.authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c”
],
“operations”: [{
“operation”: “addOrReplace “,
“field”: “tags[‘CostCenter’]”,
“value”: “[resourcegroup().tags[‘CostCenter’]]”
}]
}
}
}
Which policy mode should you use?
Select only one answer.
A. indexed
B. all
C. Append
D. DeployIfNotExists
A.
indexed mode ensures that the policy skips resource groups. all includes resource groups, which cannot be nested. Append and DeployIfNotExists are policy effects.
https://learn.microsoft.com/azure/governance/policy/concepts/definition-structure#resource-manager-modes
39.
You have an Azure subscription that contains a user named Admin1.
You need to ensure that Admin1 can access the Regulatory compliance dashboard in Microsoft Defender for Cloud. The solution must follow the principle of least privilege.
Which two roles should you assign to Admin1? Each correct answer presents part of the solution.
A. Global Reader
B. Security Reader
C. Resources Policy Contributor
D. Security Admin
C,D
To use the Regulatory compliance dashboard in Defender for Cloud, you must have sufficient permissions. At a minimum, you must be assigned the Resource Policy Contributor and Security Admin roles.
https://learn.microsoft.com/training/modules/azure-security-center/
Your company has a multi-cloud online environment.
You plan to use Microsoft Defender for Cloud to protect all supported online environments.
Which three environments support Defender for Cloud? Each correct answer presents a complete solution.
A. Amazon Web Services (AWS)
B. Oracle Cloud
C. GitHub
D. Azure DevOps
E. Alibaba Cloud
A, C, D
Defender for Cloud protects workloads in Azure, AWS, GitHub, and Azure DevOps. Oracle Cloud and Alibaba Cloud are unsupported by Defender for Cloud.
https://learn.microsoft.com/training/modules/azure-security-center/