Microsoft Azure
Microsoft Azure Security Technologies
AZ-500
Popular
The AZ-500 exam assesses your skills in implementing security controls and threat protection on Azure.
147 questions
0 views
Free
Questions 91–100 of 147
Which Azure service provides advanced threat protection for SQL databases?
-
A
Azure Defender for SQL
-
B
Azure Security Center
-
C
Azure Monitor
-
D
Azure Firewall
Explanation
Azure Defender for SQL specializes in threat protection, while others serve different functions.
You are configuring an Azure Policy that denies the use of unapproved VM sizes. What is the expected result?
-
A
Only approved sizes can be used
-
B
All sizes are approved automatically
-
C
No new VMs can be created
-
D
Existing VMs are affected and stopped
Explanation
The policy restricts new resources to defined specifications, not existing ones.
A company needs to ensure secure connections to their Azure Virtual Network. Which feature should they use?
-
A
Point-to-Site VPN
-
B
Network Security Group
-
C
Azure Bastion
-
D
Virtual Network Peering
Explanation
Point-to-Site VPN enables individual secure connections, unlike the others.
Which service offers advanced security management in Azure?
-
A
Azure Security Center
-
B
Azure DevOps
-
C
Azure Storage
-
D
Azure Functions
Explanation
Azure Security Center provides advanced security management, while the others serve different purposes.
A company needs to restrict access to resources based on user location. Which Azure feature should they use?
-
A
Azure Role-Based Access Control
-
B
Conditional Access Policies
-
C
Network Security Groups
-
D
Privileged Identity Management
Explanation
Conditional Access Policies can restrict access based on user location, unlike the other options.
What happens when a Virtual Machine's network interface loses its public IP address?
-
A
VM will power off
-
B
VM will lose outbound connectivity
-
C
VM will restart automatically
-
D
VM will keep local resources available
Explanation
The VM loses outbound connectivity without a public IP, while local resources remain accessible.
Which service provides threat detection in Azure?
-
A
Azure Security Center
-
B
Azure Backup
-
C
Azure DevOps
-
D
Azure Logic Apps
Explanation
Azure Security Center offers unified security management and threat protection, unlike the other options.
A company needs secure, scalable storage for sensitive data. What Azure service should they use?
-
A
Azure Blob Storage
-
B
Azure Table Storage
-
C
Azure Cosmos DB
-
D
Azure Files
Explanation
Azure Blob Storage has capabilities tailored for secure, scalable unstructured data.
You are configuring Azure Key Vault. What happens when a secret is deleted?
-
A
It is permanently lost immediately.
-
B
It goes into a recovery period.
-
C
It remains accessible to all.
-
D
It cannot be accessed anymore.
Explanation
Deleted secrets enter a soft delete state for recovery.
Which Azure service provides a unified platform for security management?
-
A
Azure Security Center
-
B
Azure Load Balancer
-
C
Azure Blob Storage
-
D
Azure VPN Gateway
Explanation
Azure Security Center offers comprehensive security management, while the others serve different functions.