
AZ-500 Part 2
Authored by CloudThat Technologies
Professional Development
Professional Development
Used 18+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following should not be stored in Azure Key Vault? What are the differences between these items? Select one.
Key management
Secret management
Certificate management
Identity management
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these statements best describes Azure Key Vault's authentication and authorization process? Select one.
Applications authenticate to a vault with the username and password of the lead developer and have full access to all secrets in the vault.
Applications and users authenticate to a vault with their Azure Active Directory identities and are authorized to perform actions on all secrets in the vault.
Applications authenticate to a vault with the username and password of a user that signs in to the web app, and is granted access to secrets owned by that user.
Applications and users authenticate to a vault with a Microsoft account and are authorized to access specific secrets
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
There are two types of Managed Service Identities you can create, one is System-assigned which is second type?
Application-assigned
Database-assigned
VM-assigned
User-assigned
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are configuring Secure transfer required. Your Compliance office wants to more about this feature. You provide all the following information, except? Select one.
Requests to storage can be HTTPS or HTTP.
Requests to storage must be SMB with encryption
Azure storage doesn't support HTTPS for custom domain names
By default, new storage accounts have secure transfer required enabled.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your SQL database administrator has recently read about SQL injection attacks. They ask you what can be done to minimize the risk of this type of attack. You suggest implementing which of the following features?
Advanced Threat Protection
Data Discovery and Classification
Dynamic Data Masking
Transparent Data Encryption
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You can query Log Analytics workspace with which of the following? Select one.
Embedded SQL
Graph API
Kusto Query Language
Contextual Query Language
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You want to be notified when any virtual machine in the production resource group is deleted. What should you configure? Select one.
Log alert
Metric alert
Activity log alert
Application alert
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Google Certified Educator Fundamentals Units 3-4
Quiz
•
Professional Development
15 questions
Repair Quiz
Quiz
•
Professional Development
10 questions
Filtering and Sorting
Quiz
•
Professional Development
14 questions
Quiz-P1-3-SVS, Guiding Principles
Quiz
•
Professional Development
10 questions
TOEFL Structure (Skills 43-45)
Quiz
•
9th Grade - Professio...
15 questions
MS Excel
Quiz
•
Professional Development
12 questions
BMI Unique
Quiz
•
Professional Development
10 questions
Complete Recovery EQ DAY 1
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade