Kindle Practice Test 1 Flashcards
Which of the following describe logging of control-plane actions on your Azure subscription?
A. Metrics
B. Diagnostic Log
C. Activity Log
D. Subscription Log
E. Tenant Log
F. Audit Log
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 1). Kindle Edition.
C. Activity Log
Explanation:
Monitoring data from Azure comes in three basic forms: Activity log - Azure subscription control-plane log; Metrics - near real-time monitoring information emitted by resources; Diagnostic log - traditional log information emitted by resources. See: https://docs.microsoft.com/en-us/azure/azure-monitor/platform/data-sources
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 1). Kindle Edition.
What is the minimum required RBAC role required to view Azure Monitor logs?
A. Security Admin
B. Monitoring Contributor
C. Monitoring Administrator
D. Monitoring Reader
E. Security Reader
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 1-2). Kindle Edition.
D. Monitoring Reader
Explanation:
All the roles listed are valid built-in Azure roles, except for Monitoring Administrator that doesn’t exist. The minimum role required to view Azure Monitor logs is Monitoring Reader. See: https://docs.microsoft.com/en-us/azure/azure-monitor/platform/roles-permissions-security
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 2). Kindle Edition.
To configure Azure Monitor log collection and analysis on an Azure VM several configuration steps are required as listed in the answer options. Identify the step that is not required.
A. Create a Log Analytics Workspace
B. Enable a Log Analytics VM Extension
C. Select logs and metrics to collect
D. Provide the VM local administrator username and password
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 2). Kindle Edition.
D. Provide the VM local administrator username and password
Explanation:
All of the options are required to enable Azure Monitor log collection and analytics on an Azure VM except for providing a local administrator username and password. See: https://docs.microsoft.com/en-us/azure/azure-monitor/learn/quick-collect-azurevm
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 2). Kindle Edition.
What are the destinations available for Azure SQL Server audit logs? Choose 3.
A. SQL Data Warehouse
B. Storage
C. Event Hubs
D. SQL Database
E. Log Analytics
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 2-3). Kindle Edition.
B. Storage
C. Event Hubs
E. Log Analytics
Explanation:
Storage (account), event hubs and log analytics are supported destinations for SQL Database (and/or SQL Server) audit logs. The other options are valid Azure services, but is not selectable as audit log destinations. https://docs.microsoft.com/en-us/azure/sql-database/sql-database-auditing#subheading-2
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 3). Kindle Edition.
You configure Azure SQL Database auditing. You select Storage as the audit log destination and don’t change the retention period setting. What is the effect on audit log retention in this scenario?
A. A retention period must be specified, in days up to a maximum of 3285 days
B. Audit logs are kept indefinitely
C. Audit logs are kept for the default of 90 days
D. Audit logs are kept for the default of 120 days
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 3). Kindle Edition.
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 3). Kindle Edition.
B. Audit logs are kept indefinitely
Explanation:
The default retention period setting for Azure SQL Database audit logs is 0. This equates to keeping audit logs indefinitely. A retention period of up to a maximum of 3285 days can be specified. https://docs.microsoft.com/en-us/azure/sql-database/sql-database-auditing#subheading-2
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 3). Kindle Edition.
Describe the steps required to ensure that writing Azure SQL Database audit logs to a storage destination are uninterrupted by a storage access key refresh.
A. Switch the storage destination to an alternative storage account; refresh the primary and secondary storage keys in the storage configuration of the original storage account; optionally switch the storage destination back to the original storage account
B. Stop the Azure SQL Server associated with the Azure SQL Database; refresh the primary and secondary storage keys in the storage configuration; start the Azure SQL Server associated with the Azure SQL Database
C. No action is required - storage keys are automatically updated for SQL Data audit logs when Storage access keys are refreshed
D. Switch the storage access key in the audit configuration to secondary; refresh the primary storage key in the storage configuration; switch the storage access key in the audit configuration to primary; refresh the secondary storage access key in the storage configuration
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 4). Kindle Edition.
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 4). Kindle Edition.
D. Switch the storage access key in the audit configuration to secondary; refresh the primary storage key in the storage configuration; switch the storage access key in the audit configuration to primary; refresh the secondary storage access key in the storage configuration
Explanation:
Switching the storage configuration to secondary, refreshing the primary key, then switching the storage configuration back to primary before finally refreshing the secondary key is the recommended method to ensure uninterrupted audit logging in Azure SQL Database. You can not stop a SQL Server (unless you delete the server along with all databases on it). The storage configuration is not automatically updated. Switching the storage destination to an alternative storage account would work, but you will end up with two sources of audit log data which is not an ideal situation and not the best answer. https://docs.microsoft.com/en-us/azure/sql-database/sql-database-auditing#storage-key-regeneration
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 4). Kindle Edition.
You are planning on rolling out Privilege Identity Management (PIM) to the IT and Dev department. Which of the following licenses should be assigned to your directory to enable this functionality? Select all that apply.
A. Azure AD P1
B. Azure AD P2
C. EMS E3
D. EMS E5
E. Microsoft 365 M5
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 4-5). Kindle Edition.
B. Azure AD P2
D. EMS E5
E. Microsoft 365 M5
Explanation:
When you want to make use of PIM, you need one of the following trail or paid licenses assigned to your tenant: Azure AD P2, EMS E5 and Microsoft 365 M5. Azure AD P1 and EMS E3 does not support PIM functionality. https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/subscription-requirements
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 5). Kindle Edition.
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 5). Kindle Edition.
True or false: a guest user in Azure AD can make use of the paid Azure AD features without having a member account in Azure AD.
A. TRUE
B. FALSE
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 5). Kindle Edition.
A. TRUE
Explanation:
True is correct as you can invite external “guest” users to use your paid Azure AD services, for each paid Azure AD license you can invite up to five guest users. https://docs.microsoft.com/en-us/azure/active-directory/b2b/licensing-guidance
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 5). Kindle Edition.
Which of the following statements are true when transferring the subscription ownership to another user? Select all that apply.
A. When transferring a subscription to a new Azure AD tenant, all RBAC assignments are permanently deleted from the source tenant and not migrated to the target tenant
B. Self-serve subscription transfer is only available for selected offers
C. When transferring a subscription to another administrator will cause downtime
D. The offer type can be changed during the transferring a subscription
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 5-6). Kindle Edition.
A. When transferring a subscription to a new Azure AD tenant, all RBAC assignments are permanently deleted from the source tenant and not migrated to the target tenant
B. Self-serve subscription transfer is only available for selected offers
Explanation:
Option 1 is correct, when transferring a subscription to a new Azure AD tenant, all existing RBAC roles linked to the subscription will be permanently deleted and not migrated to the new tenant. Option 2 is correct as the self-serve option is only available for selected offers. Option 3 is incorrect as there will be no downtime when transferring ownership to another user/administrator. Option 4 is incorrect as you cannot change the offer type while transferring the subscription, the offer must remain the same. https://docs.microsoft.com/en-us/azure/billing/billing-subscription-transfer
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 6). Kindle Edition.
Which of the following roles are required to manage assignments for other administrators in Privilege Identity Management (PIM) for Azure AD roles?
A. Global administrators
B. Security administrators
C. Security readers
D. Privilege Role Administrator
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 6-7). Kindle Edition.
D. Privilege Role Administrator
Explanation:
Privilege role administrator is correct as this is the only role that can manage other administrators in PIM for Azure AD roles. Global administrator, Security administrator and security readers can only view assignments to Azure AD roles in PIM. https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 7). Kindle Edition.
Which of the following roles are required to manage assignments for other administrators in PIM for Azure Resource roles?
A. Subscription administrator
B. Resource owner
C. Resource User Access Administrator
D. Security administrator
E. Security reader
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 7). Kindle Edition.
A. Subscription administrator
B. Resource owner
C. Resource User Access Administrator
Explanation:
Only the following roles can manage assignments for other administrators in PIM for Azure resource roles: Subscription admin, resource owner and resource user access admin. Security admin and security reader do not by default have access to view assignments to Azure resource roles in PIM. https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 7-8). Kindle Edition.
One of the developers needs API access to the “Dev” resource group. Which of the following roles do you need to assign to the developer?
A. Owner role
B. Contributor role
C. API management contributor role
D. Reader role
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 8). Kindle Edition.
C. API management contributor role
Explanation:
API management contributor role is correct, this also needs to be assigned on the resource group level. The developer should now be able to sign in via PowerShell. https://docs.microsoft.com/en-us/azure/api-management/api-management-faq
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 8). Kindle Edition.
True or false: The API management gateway IP address is constant and can be used in firewall rules as a static IP.
A. TRUE
B. FALSE
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 8). Kindle Edition.
A. TRUE
Explanation:
True is correct, in all tiers of API management the public IP address of the API management tenant is static of the lifetime of the tenant, however there are some exceptions like if the service is deleted and re-created. https://docs.microsoft.com/en-us/azure/api-management/api-management-faq
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 8). Kindle Edition.
True or false: You can move an API Management service from one subscription to another.
A. TRUE
B. FALSE
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 9). Kindle Edition.
A. TRUE
Explanation:
True is correct, you can move the API management service from one subscription to another. https://docs.microsoft.com/en-us/azure/api-management/api-management-faq
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 9). Kindle Edition.
You need to manage inbound and outbound traffic rules at scale to specific VMs with minimum effort. You plan on creating separate inbound and outbound NSG rules with CIDR notation. Is this the easiest method to manage multiple VMs?
A. TRUE
B. FALSE
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 17). Kindle Edition.
B. False
Explanation:
False, you need to make use of Application Security Groups (ASG’s). ASG’s allows you to group VM’s to make management easier, for example you can group several VMs with an ASG and only make changes once to the ASG instead of manually adding/removing/editing NSG rules with CIDR notation. https://docs.microsoft.com/en-us/azure/virtual-network/security-overview#application-security-groups
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 17). Kindle Edition.
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 17). Kindle Edition.