Kindle Practice Test 2 Flashcards
How does Azure SQL Database provide protection for data at rest?
A. BitLocker
B. SSL/TLS 1.2
C. Azure Storage Service Encryption
D. Transparent Data Encryption
E. AES Encryption
F. Azure Key Vault
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 31). Kindle Edition.
D. Transparent Data Encryption
Explanation:
Azure SQL Database has a built-in data at rest encryption capability called Transparent Data Encryption. The encryption key is managed by Microsoft, but it is possible to bring your own key through the TDE integration with Azure Key Vault - Key Vault is not the best answer here though. SSL/TLS is used for securing data in transit. Bitlocker is used for endpoint encryption, not for SQL Database encryption. By default TDE uses the AES encryption algorithm, but this is also not the best answer for the question. TDE is used for database encryption and is very similar to the Azure Storage counterpart called Storage Service Encryption. https://docs.microsoft.com/en-us/azure/sql-database/transparent-data-encryption-azure-sql
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 31). Kindle Edition.
Which of the following Azure tools can help mature the security baseline specific to detecting malicious activity? Select all that apply.
A. Azure Key Vault
B. Azure portal
C. Azure AD
D. Azure Security Center
E. Azure Monitor
F. Azure policy
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 31-32). Kindle Edition.
D. Azure Security Center
E. Azure Monitor
Explanation:
Azure Security Center is correct as this tool allows you to mature the policies and processes in your Azure environment. Azure monitor is correct as this tool can also be used in maturing polices and processes regarding security baselines in Azure. The Azure portal, Key vault, Azure AD and Azure policy cannot be used as a tool regarding a security baseline when detecting malicious activity in your Azure environment. https://docs.microsoft.com/bs-latn-ba/azure/architecture/cloud-adoption/governance/security-baseline/toolchain
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 32). Kindle Edition.
You are the administrator of all resources in Azure. You need to enforce all new resources created to a specific region. Solution: You create an Azure policy Does this meet the requirements?
A. TRUE
B. FALSE
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 32). Kindle Edition.
A. TRUE
Explanation:
True is correct, you can create an Azure Policy to enforce a specific region when new resources are created. https://docs.microsoft.com/en-us/azure/governance/policy/samples/allowed-locations
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 32). Kindle Edition.
When securing Azure Key Vault one has to secure the management plane and the data plane. Which of these options is relevant when securing the management plane?
A. Create, read, update, delete key vaults
B. Set key vault tags
C. Set key vault access policies
D. Set key vault secrets
E. Create RBAC roles
F. Create key vault keys
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 33). Kindle Edition.
A. Create, read, update, delete key vaults
B. Set key vault tags
C. Set key vault access policies
Explanation:
Key vault management plane security operations covers administering the key vault itself; whereas the data plane covers the data (keys and secrets) inside the key vault. One would use built-in RBAC roles as part of assigning access control to the vault. One can create a custom RBAC role as part of this, but that would be performed in AAD and is not considered part of vault security operations. See: https://docs.microsoft.com/en-us/azure/key-vault/key-vault-secure-your-key-vault#resource-endpoints
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 33). Kindle Edition.
Which single Azure SQL Database feature provides data security for data at rest, data in transit and data in use?
A. SSL/TLS 1.2
B. Always Encrypted
C. Azure Storage Service Encryption
D. Transparent Data Encryption
E. Azure Key Vault
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 33-34). Kindle Edition.
B. Always Encrypted
Explanation:
Always Encrypted is a data encryption technology in Azure SQL Database and SQL Server that helps protect sensitive data at rest on the server, during movement between client and server, and while the data is in use, ensuring that sensitive data never appears as plain text inside the database system. The encryption is performed on the endpoint application before writing the data to the database. The encryption keys are not revealed to the database management system. The encrypted data is also not readable by other privileged users like database administrators. https://docs.microsoft.com/en-us/azure/sql-database/sql-database-always-encrypted-azure-key-vault
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 34). Kindle Edition.
What PowerShell cmdlet is used to initiate Azure Disk Encryption for a Windows-based VM on Azure?
A. Set-AzVMDiskEncryptionExtension
B. Disable-AzVMDiskEncryption
C. Set-AzVMDiskEncryption
D. Set-AzVMDiskEncryptionWindows
E. Set-AzVMDiskEncryptionLinux
F. Get-AzVmDiskEncryptionStatus
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 34). Kindle Edition.
A. Set-AzVMDiskEncryptionExtension
Explanation
Set-AzVMDiskEncryptionExtension is the correct answer. The same cmdlet is used for both Windows and Linux VMs See https://docs.microsoft.com/en-us/azure/security/azure-security-disk-encryption-windows
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 34-35). Kindle Edition.
True of false: Just-in-time VM access will automatically create the NSG rules, however you will need to manually remove the NSG rules afterwards.
A. TRUE
B. FALSE
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 35). Kindle Edition.
B. FALSE
Explanation:
False is correct, JIT VM Access will automatically create the NSG rules to the user to connect securely to the VM and will also automatically remove the NSG rule it created after the configured time expired. https://docs.microsoft.com/en-us/azure/security-center/security-center-just-in-time
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 35). Kindle Edition.
Which of the following are valid access control options for Azure Data Lake? Choose 3
A. Shared Access Key
B. Service Key
C. Shared Access Signature
D. Role Based Access Control
E. Access Key
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 35). Kindle Edition.
C. Shared Access Signature
D. Role Based Access Control
E. Access Key
Explanation:
Access keys, Azure AD RBAC and Shared Access Signatures are all valid access control methods for storage accounts - the underlying technology for Data Lake. Service key and shared access key are not valid names for storage account access controls. https://docs.microsoft.com/en-za/azure/storage/blobs/data-lake-storage-access-control
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 35-36). Kindle Edition.
You are the administrator for the ACME banking group. You are responsible for managing the key vault in Azure called ACMEvault. You have decommissioned a production server which has its password stored in the key vault labelled “FinanceAdmin”. You need to remove the password from the vault by using an API call. Which API call is correct?
A. RECOVER https://ACMEvault.vault.azure.net/secrets/FinanceAdmin?api-version=7.0
B. DELETE https://ACMEvault.vault.azure.net/secrets/FinanceAdmin?api-version=7.0
C. PURGE https://ACMEvault.vault.azure.net/secrets/FinanceAdmin?api-version=7.0
D. 1. REMOVE https://ACMEvault.vault.azure.net/secrets/FinanceAdmin?api-version=7.0
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 36). Kindle Edition.
B. DELETE https://ACMEvault.vault.azure.net/secrets/FinanceAdmin?api-version=7.0
Explanation:
DELETE is the correct operation name as it references the correct vault and secret name. REMOVE not a valid operation name. PURGE is used to remove the password irreversibly, almost the same as emptying the recycle bin on your desktop. RECOVER will not suffice as this is used to recover a deleted secret on soft-delete enabled vaults. https://docs.microsoft.com/en-us/rest/api/keyvault/deletesecret/deletesecret
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 36). Kindle Edition.
Azure backup can be configured to backup on-premises VMs. What is used to ensure data is encrypted at rest?
A. Passphrase
B. Azure Recovery Vault
C. Azure Storage Service Encryption
D. Azure Recovery Services
E. Transparent Data Encryption
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 36-37). Kindle Edition.
A. Passphrase
Explanation:
When using Azure backup to backup on-premises VMs a passphrase is used along with AES256 to encrypt the backup. See: https://docs.microsoft.com/en-us/azure/backup/backup-azure-backup-faq#encryption
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 37). Kindle Edition.
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 37). Kindle Edition.
Azure backup can be configured to Azure VMs. What is used to ensure data is encrypted at rest?
A. Passphrase
B. Azure Storage Service Encryption
C. Transparent Data Encryption
D. Azure Recovery Services
E. Azure Recovery Vault
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 37). Kindle Edition.
B. Azure Storage Service Encryption
Explanation:
When using Azure backup to backup Azure VMs, Azure Storage Service encryption is used to encrypt the backup. See: https://docs.microsoft.com/en-us/azure/backup/backup-azure-backup-faq#encryption
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 37). Kindle Edition.
Which of the following is not a technology that can be used to visualise Azure Monitor data?
A. Azure Dashboards
B. All of the answers are correct
C. None of the answers are correct
D. Power BI
E. Azure Monitor Workbooks
F. Azure Monitor Views
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 37-38). Kindle Edition.
C. None of the answers are correct
Explanation:
All of the answers provided are valid ways to visualise Azure Monitor data. The question, however, asked which of the options can not be used to visualise Azure Monitor data. None of the answer option are therefore correct. It is doubtful that the official exam will use such double-negative tactics, but it is used here as a reminder to be aware of negative answers to negative questions. See: https://docs.microsoft.com/en-us/azure/azure-monitor/visualizations
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 38). Kindle Edition.
Which of the following is not a configuration step required to create an Azure Monitor Alert?
A. Define alert details
B. Define alert condition
C. Define action group
D. Define notification action
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 38). Kindle Edition.
D. Define notification action
Explanation:
Creating an Azure Monitor Alert required defining alert conditions, alert details and the action group. Although specifying the alert action is part of defining the action group, there is no define notification action step. See: https://docs.microsoft.com/en-us/azure/azure-monitor/learn/tutorial-response
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 38). Kindle Edition.
You are configuring security for data in transit for an Azure App Service. Which of the following security tasks should be performed? Choose all that apply, do not choose any that does not apply.
A. Minimum TLS version enforced
B. Test HTTPS
C. Upload SSL Certificate
D. Bind SSL Certificate
E. HTTPS enforced
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 39). Kindle Edition.
A. Minimum TLS version enforced
B. Test HTTPS
C. Upload SSL Certificate
D. Bind SSL Certificate
E. HTTPS enforced
Explanation:
All the answer options should be configured for Azure App Service. See: https://docs.microsoft.com/en-us/azure/app-service/app-service-web-tutorial-custom-ssl
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 39). Kindle Edition.
Select all the answers that specify the technology and Azure resource prerequisites for Azure Disk Encryption.
A. DM-Crypt
B. SSL/TLS 1.2
C. BitLocker
D. Azure Storage Service Encryption
E. Azure Key Vault
F. Transparent Data Encryption
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 39-40). Kindle Edition.
A. DM-Crypt
C. BitLocker
E. Azure Key Vault
Explanation:
Azure Disk Encryption uses BitLocker for Windows-based VMs and DM-Crypt for supported Linux-based VMs in Azure. It also requires Azure Key Vault to provide secure access to the encryption/decryption keys. https://docs.microsoft.com/en-us/azure/security/azure-security-disk-encryption-overview
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 40). Kindle Edition.
Your organization is planning on synchronizing their on premises identities to Azure via the AD Connect tool. You need to ensure that all domain user identities are properly formatted before they are synchronized as to not cause synchronization errors. What should you do?
A. Re-run the AD Connect application
B. Run the IdFix tool
C. Run synchronization rules editor
D. Run synchronization service manager
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 40). Kindle Edition.
B. Run the IdFix tool
Explanation:
IdFix tool is correct as this free tool is used to isolate and remediate common errors reported by the AD Connect tool like formatting issues with domain user names. Re-running the AD Connect application will not resolve any sync issues. Running the synchronization service manager is incorrect as this tool is used to configure more advanced aspects of AD Connect like connectors and synchronization schedule. Running the synchronization rules editor is incorrect as this can only be run post-deployment of directory synchronization, this tool is used to customize user and group attributes synched between on-prem and Azure. https://docs.microsoft.com/en-us/office365/enterprise/install-and-run-idfix
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 40-41). Kindle Edition.