Search Header Logo

AZ-500 Part 2

Authored by CloudThat Technologies

Professional Development

Professional Development

Used 18+ times

AZ-500 Part 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following should not be stored in Azure Key Vault? What are the differences between these items? Select one.

Key management

Secret management

Certificate management

Identity management

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these statements best describes Azure Key Vault's authentication and authorization process? Select one.

Applications authenticate to a vault with the username and password of the lead developer and have full access to all secrets in the vault.

Applications and users authenticate to a vault with their Azure Active Directory identities and are authorized to perform actions on all secrets in the vault.

Applications authenticate to a vault with the username and password of a user that signs in to the web app, and is granted access to secrets owned by that user.

Applications and users authenticate to a vault with a Microsoft account and are authorized to access specific secrets

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There are two types of Managed Service Identities you can create, one is System-assigned which is second type?

Application-assigned

Database-assigned

VM-assigned

User-assigned

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are configuring Secure transfer required. Your Compliance office wants to more about this feature. You provide all the following information, except? Select one.

Requests to storage can be HTTPS or HTTP.

Requests to storage must be SMB with encryption

Azure storage doesn't support HTTPS for custom domain names

By default, new storage accounts have secure transfer required enabled.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your SQL database administrator has recently read about SQL injection attacks. They ask you what can be done to minimize the risk of this type of attack. You suggest implementing which of the following features?

Advanced Threat Protection

Data Discovery and Classification

Dynamic Data Masking

Transparent Data Encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You can query Log Analytics workspace with which of the following? Select one.

Embedded SQL

Graph API

Kusto Query Language

Contextual Query Language

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You want to be notified when any virtual machine in the production resource group is deleted. What should you configure? Select one.

Log alert

Metric alert

Activity log alert

Application alert

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Professional Development