Microsoft
AZ-500
120 Minutes
492
Microsoft Azure Security Technologies
Select an option, then click Show Answer.
You have an Azure subscription named Sub1 that has Security defaults disabled. The subscription contains the following users: * Five users that have owner permissions for Sub1. * Ten users that have owner permissions for Azure resources. None of the users have multi-factor authentication (MFA) enabled. Sub1 has the secure score as shown in the Secure Score exhibit. (Click the Secure Score tab.) You plan to enable MFA for the following users: * Five users that have owner permissions for Sub1. * Five users that have owner permissions for Azure resources. By how many points will the secure score increase after you perform the planned changes?
Correct Answer: C
You have an Azure subscription that contains an Azure App Service app named App1, an Azure container instance named AC1. and a storage account named storage1. AC1 hosts an app named App2. Users send requests to App1 by using a URL of https:/app1.contoso.com/echo/resource-cache? param1 =sample. App1 calls App2. which retrieves data from storage1. You need to ensure that a security alert will be generated when connections are detected from anomalous IP addresses. Which Microsoft Defender for Cloud service should you use?
Correct Answer: B
You have an Azure subscription that contains the virtual machines shown in the following table. You are configuring Microsoft Defender for Servers. You plan to enable adaptive application controls to create an allowlist of known-safe apps on the virtual machines. Which virtual machines support the use of adaptive application controls?
Correct Answer: A
Lab Task Task 2 You need to ensure that the events in the NetworkSecurityGroupRuleCounter log of the VNETOI-Subnet0-NSG network security group (NSG) are stored in the Iogs31330471 Azure Storage account for 30 days.
Correct Answer: A
Enable diagnostic resource logging for the NSG. You can use the Azure portal, Azure PowerShell, or the Azure CLI to do this. You need to select theRule countercategory under Logs and choose theIogs31330471storage account as the destination.
Configure the retention policy for the storage account to keep the logs for 30 days. You can use the Azure portal, Azure PowerShell, or the Azure CLI to do this. You need to specify thedaysparameter as 30 for the Set-AzStorageServiceProperty cmdlet or the az storage logging update command.
View and analyze the logs in the storage account. You can use any tool that can read JSON files, such as Azure Storage Explorer or Visual Studio Code. You can also export the logs to any visualization tool, SIEM solution, or IDS of your choice
Have questions? You’re not alone. We’ve answered the most frequently asked questions to help you feel confident and informed every step of the way.
DumpMasters a premium service offering a comprehensive collection of exam questions and answers for over 1400 certification exams. It is regularly updated and designed to help users pass their certification exams confidently.
You can by Contacting our sales team.
Free updates are available for the duration of your subscription, after the subscription is expired, your access will no longer be available.