
AZ-500 Assessment - 2
Authored by Managobinda Sethi
Professional Development
Professional Development
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
23 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What type of disk encryption is used for Linux disks?
BitLocker
DM-Crypt
FileVault
Answer explanation
Explanation
DM-Crypt . Azure Disk Encryption is a capability that lets you encrypt your Windows and Linux IaaS VM
disks. Azure Disk Encryption uses the industry standard BitLocker feature of Windows and the `DM-Crypt`
feature of Linux to provide OS and data disk encryption to help protect and safeguard your data.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A company, with both Azure and on-premises virtual machines, needs to ensure your virtual machines are
kept up to date with security patches. Update Management is the Azure tool they will use, hopefully at
limited cost. Will Update management monitor their virtual machines for updates?
.
The Microsoft Monitoring Agent must be installed for both Windows and Linux virtual machines
on-premises.
Both the Update Management feature and the log data storage are free for the customer.
Update Management only pertains to cloud deployed virtual machines
Answer explanation
Explanation
Update Management only pertains to cloud deployed virtual machines. Update Management pertains to
virtual machines in on-premises environments, and in other cloud environments.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following recommendations from Security Center is a medium-severity recommendation for
virtual machines and servers?
Disk encryption should be applied on virtual machines.
Install endpoint protection solution on virtual machines.
System updates should be installed on your machines.
Answer explanation
Explanation
Install endpoint protection solution on virtual machines is a medium-severity recommendation.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following items should be stored in Azure Key Vault?
Secret
Links to external certificate
Identity management
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A select group of users must be able to create and delete keys in the key vault. When authenticating to
the data plane using Azure AD, what security tool should be used the authorize access at a role level to
these users?
Key vault access policies
Role-based Access Control
Azure AD authentication
Answer explanation
Explanation
Role-based Access Control. To create and delete key vaults the data plane you should grant access with
RBAC. For example, Key Vault Contributor. Using Access Policies would not give you role level control, and
does not follow least privilege rules.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of these statements best describes Azure Key Vault's authentication and authorization process?
Applications authenticate to a vault with the username and password of the lead developer and have
full access to all secrets in the vault.
Applications and users authenticate to a vault with their Azure Active Directory identities and are
authorized to perform actions on all secrets in the vault.
Applications and users authenticate to a vault with a Microsoft account and are authorized to access
specific secrets.
Answer explanation
Explanation
Authentication to Key Vault uses Azure Active Directory identities. Access policies are used to provide
authorization for actions that apply to every secret in the vault.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What type of Managed Service Identities can be created?
Application-assigned and VM-assigned
Database-assigned and unsigned
System-assigned and User-assigned
Answer explanation
Explanation
System-assigned, user assigned. There are two types of managed identities: A system-assigned managed
identity is enabled directly on an Azure service instance. When the identity is enabled, Azure creates an
identity for the instance in the Azure AD tenant that's trusted by the subscription of the instance. Creating
an app with a user-assigned identity requires that an organization create the identity and then add its
resource identifier to the app config.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?