Microsoft AZ-500 Exam (page: 3)
Microsoft Azure Security Technologies
Updated on: 27-Feb-2026

Viewing Page 3 of 65

Your company's Azure subscription includes Windows Server 2016 Azure virtual machines.
You are informed that every virtual machine must have a custom antimalware virtual machine extension installed. You are writing the necessary code for a policy that will help you achieve this.
Which of the following is an effect that must be included in your code?

  1. Disabled
  2. Modify
  3. AuditIfNotExists
  4. DeployIfNotExists

Answer(s): D

Explanation:

DeployIfNotExists executes a template deployment when the condition is met.


Reference:

https://docs.microsoft.com/en-us/azure/governance/policy/concepts/effects



Your company makes use of Azure Active Directory (Azure AD) in a hybrid configuration. All users are making use of hybrid Azure AD joined Windows 10 computers.
You manage an Azure SQL database that allows for Azure AD authentication.
You need to make sure that database developers are able to connect to the SQL database via Microsoft SQL Server Management Studio (SSMS). You also need to make sure the developers use their on-premises Active Directory account for authentication. Your strategy should allow for authentication prompts to be kept to a minimum.
Which of the following is the authentication method the developers should use?

  1. Azure AD token.
  2. Azure Multi-Factor authentication.
  3. Active Directory integrated authentication.

Answer(s): C

Explanation:

Azure AD can be the initial Azure AD managed domain. Azure AD can also be an on-premises Active Directory Domain Services that is federated with the Azure
AD.
Using an Azure AD identity to connect using SSMS or SSDT
The following procedures show you how to connect to a SQL database with an Azure AD identity using SQL Server Management Studio or SQL Server Database
Tools.
Active Directory integrated authentication
Use this method if you are logged in to Windows using your Azure Active Directory credentials from a federated domain.
1. Start Management Studio or Data Tools and in the Connect to Server (or Connect to Database Engine) dialog box, in the Authentication box, select Active
Directory - Integrated. No password is needed or can be entered because your existing credentials will be presented for the connection.

2. Select the Options button, and on the Connection Properties page, in the Connect to database box, type the name of the user database you want to connect to.
(The AD domain name or tenant IDג€ option is only supported for Universal with MFA connection options, otherwise it is greyed out.)



You have been tasked with enabling Advanced Threat Protection for an Azure SQL Database server.
Advanced Threat Protection must be configured to identify all types of threat detection.
Which of the following will happen if when a faulty SQL statement is generate in the database by an application?

  1. A Potential SQL injection alert is triggered.
  2. A Vulnerability to SQL injection alert is triggered.
  3. An Access from a potentially harmful application alert is triggered.
  4. A Brute force SQL credentials alert is triggered.

Answer(s): B

Explanation:


Reference:

https://docs.microsoft.com/en-us/azure/sql-database/sql-database-threat-detection-overview



Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
You are in the process of creating an Azure Kubernetes Service (AKS) cluster. The Azure Kubernetes Service (AKS) cluster must be able to connect to an Azure
Container Registry.
You want to make sure that Azure Kubernetes Service (AKS) cluster authenticates to the Azure Container Registry by making use of the auto-generated service principal.
Solution: You create an Azure Active Directory (Azure AD) role assignment.
Does the solution meet the goal?

  1. Yes
  2. No

Answer(s): B

Explanation:

When you create an AKS cluster, Azure also creates a service principal to support cluster operability with other Azure resources. You can use this auto-generated service principal for authentication with an ACR registry. To do so, you need to create an Azure AD role assignment that grants the cluster's service principal access to the container registry.


Reference:

https://docs.microsoft.com/bs-latn-ba/azure/container-registry/container-registry-auth-aks



Your company has an Azure subscription that includes two virtual machines, named VirMac1 and VirMac2, which both have a status of Stopped (Deallocated).
The virtual machines belong to different resource groups, named ResGroup1 and ResGroup2.
You have also created two Azure policies that are both configured with the virtualMachines resource type. The policy configured for ResGroup1 has a policy definition of Not allowed resource types, while the policy configured for ResGroup2 has a policy definition of Allowed resource types.
You then create a Read-only resource lock on VirMac1, as well as a Read-only resource lock on ResGroup2.
Which of the following is TRUE with regards to the scenario? (Choose all that apply.)

  1. You will be able to start VirMac1.
  2. You will NOT be able to start VirMac1.
  3. You will be able to create a virtual machine in ResGroup2.
  4. You will NOT be able to create a virtual machine in ResGroup2.

Answer(s): B,D

Explanation:


Reference:

https://docs.microsoft.com/en-us/azure/governance/blueprints/concepts/resource-locking



You have been tasked with delegate administrative access to your company's Azure key vault.
You have to make sure that a specific user can set advanced access policies for the key vault. You also have to make sure that access is assigned based on the principle of least privilege.
Which of the following options should you use to achieve your goal?

  1. Azure Information Protection
  2. RBAC
  3. Azure AD Privileged Identity Management (PIM)
  4. Azure DevOps

Answer(s): B

Explanation:


Reference:

https://docs.microsoft.com/en-us/azure/key-vault/key-vault-secure-your-key-vault



You have been tasked with delegate administrative access to your company's Azure key vault.
You have to make sure that a specific user is able to add and delete certificates in the key vault. You also have to make sure that access is assigned based on the principle of least privilege.
Which of the following options should you use to achieve your goal?

  1. A key vault access policy
  2. Azure policy
  3. Azure AD Privileged Identity Management (PIM)
  4. Azure DevOps

Answer(s): A

Explanation:


Reference:

https://docs.microsoft.com/en-us/azure/key-vault/key-vault-secure-your-key-vault



You have an Azure virtual machine that runs Windows Server R2.
You plan to deploy and configure an Azure Key vault, and enable Azure Disk Encryption for the virtual machine.
Which of the following is TRUE with regards to Azure Disk Encryption for a Windows VM?

  1. It is supported for basic tier VMs.
  2. It is supported for standard tier VMs.
  3. It is supported for VMs configured with software-based RAID systems.
  4. It is supported for VMs configured with Storage Spaces Direct (S2D).

Answer(s): B

Explanation:


Reference:

https://docs.microsoft.com/en-us/azure/virtual-machines/windows/disk-encryption-windows



Viewing Page 3 of 65



Share your comments for Microsoft AZ-500 exam with other users:

Moreece 5/15/2023 8:44:00 AM

just passed the az-500 exam this last friday. most of the questions in this exam dumps are in the exam. i bought the full version and noticed some of the questions which were answered wrong in the free version are all corrected in the full version. this site is good but i wish the had it in an interactive version like a test engine simulator.
Anonymous


Qasim 6/11/2022 9:43:00 AM

just clear exam on 10/06/2202 dumps is valid all questions are came same in dumps only 2 new questions total 46 questions 1 case study with 5 question no lab/simulation in my exam please check the answers best of luck
Anonymous


deally 1/19/2024 3:41:00 PM

knowable questions
UNITED STATES


labuschanka 11/16/2023 6:06:00 PM

i gave the microsoft azure az-500 tests and prepared from this site as it has latest mock tests available which helped me evaluate my performance and score 919/1000
Anonymous