AZ-500-Questions Flashcards

1
Q

Which of the following is the role you should assign to the user?

A

A. The Global administrator role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Does the solution meet the goal?

A

B. No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Does the solution meet the goal?

A

B. No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Does the solution meet the goal?

A

A.Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following actions should you take?

A

A. You should make use of the Synchronization Rules Editor to create an attribute-based filtering rule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is the risk level that should be configured for users that have leaked credentials?

A

D. High

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is the risk level that should be configured for sign ins that originate from IP addresses with dubious activity?

A

C. Medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following should you set Reviewers to?

A

C. Group Owners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following actions should you take FIRST?

A

B. You should consent to Azure Active Directory (Azure AD) Privileged Identity Management (PIM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Select “No adjustment required” if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option.

A

A. No adjustment required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the role you should assign?

A

C. AcrPush

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is the role you should assign?

A

A. Reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Does the solution meet the goal?

A

B. No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Does the solution meet the goal?

A

B. No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Does the solution meet the goal?

A

A. Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following actions should you take?

A

B. You should make use of Azure Automation State Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is an effect that must be included in your code?

A

D. DeployIfNotExi

18
Q

Does the solution meet the goal?

A

A. Yes

19
Q

Which of the following is TRUE with regards to the scenario? (Choose all that apply.)

A

B. You will NOT be able to start VirMac1.
C. You will be able to create a virtual machine in ResGroup2.

20
Q

Which of the following options should you use to achieve your goal?

A

B. RBAC

21
Q

Which of the following options should you use to achieve your goal?

A

A. A key vault access policy

22
Q

Which of the following is TRUE with regards to Azure Disk Encryption for a Windows VM?

A

B. It is supported for standard tier VMs.

23
Q

Which of the following is TRUE with regards to Azure Disk Encryption for a Linux VM?

A

A. It is NOT supported for basic tier VMs.

24
Q

Select “No adjustment required” if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option.

A

A. No adjustment required.

25
Q

Which of the following should be included in the template? (Choose all that apply.)

A

A. WorkspaceID
C. WorkspaceKey

26
Q

Does the solution meet the goal?

A

B. No

27
Q

Does the solution meet the goal?

A

B. No

28
Q

Does the solution meet the goal?

A

A. Yes

29
Q

Which of the following should be included in your query?

A

C. The EventID and Count() parameters.

30
Q

Which of the following is the action you should take?

A

C. You should create an Azure Log Analytics workspace.

31
Q

Which of the following is the option you should use?

A

C. You should make use of the Metric signal type.

32
Q

Which of the following options should you use?

A

C. Activity Log

33
Q

Which of the following options should you use?

A

D. Logs

34
Q

Which of the following is the pricing tier required?

A

C. Standard

35
Q

Does the solution meet the goal?

A

B. No

36
Q

Does the solution meet the goal?

A

A. Yes

37
Q

Select “No adjustment required” if the underlined segment is accurate. If the underlined segment
is inaccurate, select the accurate option.

A

A. No adjustment required

38
Q

Which of the following is the effect in question?

A

DeployIfNotExist

39
Q

Which two of the following parameters must be used in conjunction to meet the requirement?
(Choose two.)

A

B. EnablePurgeProtection
D. EnableSoftDelete

40
Q

Which of the following is the authentication method the developers should use?

A

C. Active Directory integrated authentication.

41
Q

Which of the following will happen if when a faulty SQL statement is generate in the database by
an application?

A

B. A Vulnerability to SQL injection alert is triggered.

42
Q

Which of the following is TRUE with regard to branch policies? (Choose all that apply.)

A

A. It enforces your team’s change management standards.
C. It enforces your team’s code quality.