Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

AZ-500 Exam Dumps - Microsoft Azure Security Technologies

Go to page:
Question # 9

You have 15 Azure virtual machines in a resource group named RG1.

All virtual machines run identical applications.

You need to prevent unauthorized applications and malware from running on the virtual machines.

What should you do?

A.

Configure Azure Active Directory (Azure AD) Identity Protection.

B.

From Microsoft Defender for Cloud, configure adaptive application controls.

C.

Apply an Azure policy to RGI.

D.

Apply a resource lock to RGI.

Full Access
Question # 10

You have an Azure subscription named Subscription1.

You deploy a Linux virtual machine named VM1 to Subscription1.

You need to monitor the metrics and the logs of VM1.

D18912E1457D5D1DDCBD40AB3BF70D5D

What should you use?

A.

the AzurePerformanceDiagnostics extension

B.

Azure HDInsight

C.

Linux Diagnostic Extension (LAD) 3.0

D.

Azure Analysis Services

Full Access
Question # 11

You have an Azure subscription that contains a resource group named RG1 and the network security groups (NSGs) shown in the following table.

You create the Azure policy shown in the following exhibit.

You assign the policy to RG1.

What will occur if you assign the policy to NSG1 and NSG2?

A.

Flow logs will be enabled for NSG1 and NSG2.

B.

Flow logs will be enabled for NSG2 only.

C.

Flow logs will be disabled for NSG1 and NSG2.

D.

Flow logs will be enabled for NSG1 only.

Full Access
Question # 12

You have been tasked with configuring an access review, which you plan to assigned to a new collection of reviews. You also have to make sure that the reviews can be reviewed by resource owners.

You start by creating an access review program and an access review control.

You now need to configure the Reviewers.

Which of the following should you set Reviewers to?

A.

Selected users.

B.

Members (Self).

C.

Group Owners.

D.

Anyone.

Full Access
Question # 13

You have an Azure subscription that contains the virtual machines shown in the following table.

You create the Azure policies shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 14

You have 15 Azure virtual machines in a resource group named RG1.

All virtual machines run identical applications.

You need to prevent unauthorized applications and malware from running on the virtual machines.

What should you do?

A.

Apply an Azure policy to RG1.

B.

From Azure Security Center, configure adaptive application controls.

C.

Configure Azure Active Directory (Azure AD) Identity Protection.

D.

Apply a resource lock to RG1.

Full Access
Question # 15

You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com.

You are assigned the Global administrator role for the tenant. You are responsible for managing Azure Security Center settings.

You need to create a custom sensitivity label.

What should you do first?

A.

Create a custom sensitive information type.

B.

Elevate access for global administrators in Azure AD.

C.

Upgrade the pricing tier of the Security Center to Standard.

D.

Enable integration with Microsoft Cloud App Security.

Full Access
Question # 16

You company has an Azure Active Directory (Azure AD) tenant named contoso.com.

You plan to create several security alerts by using Azure Monitor.

You need to prepare the Azure subscription for the alerts.

What should you create first?

A.

An Azure Storage account

B.

an Azure Log Analytics workspace

C.

an Azure event hub

D.

an Azure Automation account

Full Access
Go to page: