AZ-500-Questions Flashcards

1
Q

Which of the following is the role you should assign to the user?

A

A. The Global administrator role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Does the solution meet the goal?

A

B. No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Does the solution meet the goal?

A

B. No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Does the solution meet the goal?

A

A.Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following actions should you take?

A

A. You should make use of the Synchronization Rules Editor to create an attribute-based filtering rule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is the risk level that should be configured for users that have leaked credentials?

A

D. High

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is the risk level that should be configured for sign ins that originate from IP addresses with dubious activity?

A

C. Medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following should you set Reviewers to?

A

C. Group Owners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following actions should you take FIRST?

A

B. You should consent to Azure Active Directory (Azure AD) Privileged Identity Management (PIM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Select “No adjustment required” if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option.

A

A. No adjustment required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the role you should assign?

A

C. AcrPush

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is the role you should assign?

A

A. Reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Does the solution meet the goal?

A

B. No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Does the solution meet the goal?

A

B. No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Does the solution meet the goal?

A

A. Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following actions should you take?

A

B. You should make use of Azure Automation State Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is an effect that must be included in your code?

A

D. DeployIfNotExi

18
Q

Does the solution meet the goal?

19
Q

Which of the following is TRUE with regards to the scenario? (Choose all that apply.)

A

B. You will NOT be able to start VirMac1.
C. You will be able to create a virtual machine in ResGroup2.

20
Q

Which of the following options should you use to achieve your goal?

21
Q

Which of the following options should you use to achieve your goal?

A

A. A key vault access policy

22
Q

Which of the following is TRUE with regards to Azure Disk Encryption for a Windows VM?

A

B. It is supported for standard tier VMs.

23
Q

Which of the following is TRUE with regards to Azure Disk Encryption for a Linux VM?

A

A. It is NOT supported for basic tier VMs.

24
Q

Select “No adjustment required” if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option.

A

A. No adjustment required.

25
Which of the following should be included in the template? (Choose all that apply.)
A. WorkspaceID C. WorkspaceKey
26
Does the solution meet the goal?
B. No
27
Does the solution meet the goal?
B. No
28
Does the solution meet the goal?
A. Yes
29
Which of the following should be included in your query?
C. The EventID and Count() parameters.
30
Which of the following is the action you should take?
C. You should create an Azure Log Analytics workspace.
31
Which of the following is the option you should use?
C. You should make use of the Metric signal type.
32
Which of the following options should you use?
C. Activity Log
33
Which of the following options should you use?
D. Logs
34
Which of the following is the pricing tier required?
C. Standard
35
Does the solution meet the goal?
B. No
36
Does the solution meet the goal?
A. Yes
37
Select “No adjustment required” if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option.
A. No adjustment required
38
Which of the following is the effect in question?
DeployIfNotExist
39
Which two of the following parameters must be used in conjunction to meet the requirement? (Choose two.)
B. EnablePurgeProtection D. EnableSoftDelete
40
Which of the following is the authentication method the developers should use?
C. Active Directory integrated authentication.
41
Which of the following will happen if when a faulty SQL statement is generate in the database by an application?
B. A Vulnerability to SQL injection alert is triggered.
42
Which of the following is TRUE with regard to branch policies? (Choose all that apply.)
A. It enforces your team's change management standards. C. It enforces your team's code quality.