Easy & Quick Way To Pass Your Any Certification Exam.

Microsoft AZ-500 Exam Dumps

Microsoft Azure Security Technologies

( 975 Reviews )
Total Questions : 377
Update Date : June 11, 2024
PDF + Test Engine
$65 $95
Test Engine
$55 $85
PDF Only
$45 $75

Recent AZ-500 Exam Results

Our Microsoft AZ-500 dumps are key to get success. More than 80000+ success stories.

33

Clients Passed Microsoft AZ-500 Exam Today

94%

Passing score in Real Microsoft AZ-500 Exam

96%

Questions were from our given AZ-500 dumps


AZ-500 Dumps

Dumpsspot offers the best AZ-500 exam dumps that comes with 100% valid questions and answers. With the help of our trained team of professionals, the AZ-500 Dumps PDF carries the highest quality. Our course pack is affordable and guarantees a 98% to 100% passing rate for exam. Our AZ-500 test questions are specially designed for people who want to pass the exam in a very short time.

Most of our customers choose Dumpsspot's AZ-500 study guide that contains questions and answers that help them to pass the exam on the first try. Out of them, many have passed the exam with a passing rate of 98% to 100% by just training online.


Top Benefits Of Microsoft AZ-500 Certification

  • Proven skills proficiency
  • High earning salary or potential
  • Opens more career opportunities
  • Enrich and broaden your skills
  • Stepping stone to avail of advance AZ-500 certification

Who is the target audience of Microsoft AZ-500 certification?

  • The AZ-500 PDF is for the candidates who aim to pass the Microsoft Certification exam in their first attempt.
  • For the candidates who wish to pass the exam for Microsoft AZ-500 in a short period of time.
  • For those who are working in Microsoft industry to explore more.

What makes us provide these Microsoft AZ-500 dumps?

Dumpsspot puts the best AZ-500 Dumps question and answers forward for the students who want to clear the exam in their first go. We provide a guarantee of 100% assurance. You will not have to worry about passing the exam because we are here to take care of that.


Microsoft AZ-500 Sample Questions

Question # 1

You need to configure WebApp1 to meet the data and application requirements.Which two actions should you perform? Each correct answer presents part of the solution.NOTE: Each correct selection is worth one point.

A. Upload a public certificate.
B. Turn on the HTTPS Only protocol setting.
C. Set the Minimum TLS Version protocol setting to 1.2.
D. Change the pricing tier of the App Service plan.
E. Turn on the Incoming client certificates protocol setting.



Question # 2

You need to meet the identity and access requirements for Group1.What should you do?

A. Add a membership rule to Group1.
B. Delete Group1. Create a new group named Group1 that has a membership type ofOffice 365. Add users and devices to the group.
C. Modify the membership rule of Group1.
D. Change the membership type of Group1 to Assigned. Create two groups that havedynamic memberships. Add the new groups to Group1.



Question # 3

You need to ensure that you can meet the security operations requirements.What should you do first?

A. Turn on Auto Provisioning in Security Center.
B. Integrate Security Center and Microsoft Cloud App Security.
C. Upgrade the pricing tier of Security Center to Standard.
D. Modify the Security Center workspace configuration.



Question # 4

You need to meet the technical requirements for VNetwork1.What should you do first?

A. Create a new subnet on VNetwork1.
B. Remove the NSGs from Subnet11 and Subnet13.
C. Associate an NSG to Subnet12.
D. Configure DDoS protection for VNetwork1.



Question # 5

You need to ensure that User2 can implement PIM.What should you do first?

A. Assign User2 the Global administrator role.
B. Configure authentication methods for contoso.com.
C. Configure the identity secure score for contoso.com.
D. Enable multi-factor authentication (MFA) for User2.



Question # 6

Note: This question is part of a series of questions that present the same scenario.Each question in the series contains a unique solution that might meet the statedgoals. Some question sets might have more than one correct solution, while othersmight not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As aresult, these questions will not appear in the review screen.You use Azure Security Center for the centralized policy management of three Azuresubscriptions.You use several policy definitions to manage the security of the subscriptions.You need to deploy the policy definitions as a group to all three subscriptions.Solution: You create a resource graph and an assignment that is scoped to a managementgroup.Does this meet the goal?

A. Yes
B. No



Question # 7

Note: This question is part of a series of questions that present the same scenario.Each question in the series contains a unique solution that might meet the statedgoals. Some question sets might have more than one correct solution, while othersmight not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As aresult, these questions will not appear in the review screen.You have a hybrid configuration of Azure Active Directory (Azure AD).You have an Azure HDInsight cluster on a virtual network.You plan to allow users to authenticate to the cluster by using their on-premises ActiveDirectory credentials.You need to configure the environment to support the planned authentication.Solution: You deploy an Azure AD Application Proxy.Does this meet the goal?

A. Yes
B. No



Question # 8

You have a hybrid configuration of Azure Active Directory (Azure AD). You have an AzureSQL Databaseinstance that is configured to support Azure AD authentication.Database developers must connect to the database instance and authenticate by usingtheir on-premisesActive Directory account.You need to ensure that developers can connect to the instance by using Microsoft SQLServer ManagementStudio. The solution must minimize authentication prompts.Which authentication method should you recommend?

A. Active Directory - Password
B. Active Directory - Universal with MFA support
C. SQL Server Authentication
D. Active Directory - Integrated



Question # 9

You have Azure Resource Manager templates that you use to deploy Azure virtualmachines.You need to disable unused Windows features automatically as instances of the virtualmachines are provisioned.What should you use?

A. security policies in Azure Security Center
B. Azure Logic Apps
C. an Azure Desired State Configuration (DSC) virtual machine extension
D. Azure Advisor



Question # 10

You have an Azure subscription that contains an Azure key vault named Vault1.In Vault1, you create a secret named Secret1.An application developer registers an application in Azure Active Directory (Azure AD).You need to ensure that the application can use Secret1.What should you do?

A. In Azure AD, create a role.
B. In Azure Key Vault, create a key.
C. In Azure Key Vault, create an access policy.
D. In Azure AD, enable Azure AD Application Proxy.



Question # 11

Note: This question is part of a series of questions that present the same scenario.Each question in the series contains a unique solution that might meet the statedgoals. Some question sets might have more than one correct solution, while othersmight not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As aresult, thesequestions will not appear in the review screen.You have an Azure Subscription named Sub1.You have an Azure Storage account named Sa1 in a resource group named RG1.Users and applications access the blob service and the file service in Sa1 by using severalshared accesssignatures (SASs) and stored access policies.You discover that unauthorized users accessed both the file service and the blob service.You need to revoke all access to Sa1.Solution: You generate new SASs.Does this meet the goal?

A. Yes
B. No



Question # 12

You company has an Azure Active Directory (Azure AD) tenant named contoso.com.You plan to create several security alerts by using Azure Monitor.You need to prepare the Azure subscription for the alerts.What should you create first?

A. An Azure Storage account
B. an Azure Log Analytics workspace
C. an Azure event hub
D. an Azure Automation account



Question # 13

You have an Azure SQL Database server named SQL1.You plan to turn on Advanced Threat Protection for SQL1 to detect all threat detectiontypes.Which action will Advanced Threat Protection detect as a threat?

A. A user updates more than 50 percent of the records in a table.
B. A user attempts to sign as select * from table1.
C. A user is added to the db_owner database role.
D. A user deletes more than 100 records from the same table.



Question # 14

Note: This question is part of a series of questions that present the same scenario.Each question in the series contains a unique solution that might meet the statedgoals. Some question sets might have more than one correct solution, while othersmight not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As aresult, these questions will not appear in the review screen.You have an Azure Subscription. The subscription contains 50 virtual machines that runWindows Server 2012 R2 or Windows Server 2016.You need to deploy Microsoft Antimalware to the virtual machines.Solution: You add an extension to each virtual machine.Does this meet the goal?

A. Yes
B. No



Question # 15

Your company has an Azure subscription named Sub1 that is associated to an AzureActive Directory (Azure AD) tenant named contoso.com.The company develops an application named App1. App1 is registered in Azure AD.You need to ensure that App1 can access secrets in Azure Key Vault on behalf of theapplication users.What should you configure?

A. an application permission without admin consent
B. a delegated permission without admin consent
C. a delegated permission that requires admin consent
D. an application permission that requires admin consent



Question # 16

Note: This question is part of a series of questions that present the same scenario.Each question in the series contains a unique solution that might meet the statedgoals. Some question sets might have more than one correct solution, while othersmight not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As aresult, these questions will not appear in the review screen.You have a hybrid configuration of Azure Active Directory (Azure AD).You have an Azure HDInsight cluster on a virtual network.You plan to allow users to authenticate to the cluster by using their on-premises ActiveDirectory credentials.You need to configure the environment to support the planned authentication.Solution: You deploy Azure Active Directory Domain Services (Azure AD DS) to the Azuresubscription.Does this meet the goal?

A. Yes
B. No



Question # 17

You company has an Azure subscription named Sub1. Sub1 contains an Azure web appnamed WebApp1 that uses Azure Application Insights. WebApp1 requires users toauthenticate by using OAuth 2.0 client secrets.Developers at the company plan to create a multi-step web test app that preforms synthetictransactions emulating user traffic to Web App1.You need to ensure that web tests can run unattended.What should you do first?

A. In Microsoft Visual Studio, modify the .webtest file.
B. Upload the .webtest file to Application Insights.
C. Register the web test app in Azure AD.
D. Add a plug-in to the web test app.



Question # 18

You are configuring and securing a network environment.You deploy an Azure virtual machine named VM1 that is configured to analyze networktraffic.You need to ensure that all network traffic is routed through VM1.What should you configure?

A. a system route
B. a network security group (NSG)
C. a user-defined route



Question # 19

You plan to deploy Azure container instances.You have a containerized application that validates credit cards. The application iscomprised of twocontainers: an application container and a validation container.The application container is monitored by the validation container. The validation containerperforms security checks by making requests to the application container and waiting forresponses after every transaction.You need to ensure that the application container and the validation container arescheduled to be deployedtogether. The containers must communicate to each other onlyon ports that are not externally exposed.What should you include in the deployment?

A. application security groups
B. network security groups (NSGs)
C. management groups
D. container groups