Microsoft Azure

Microsoft Azure Security Technologies

AZ-500
Popular

The AZ-500 exam assesses your skills in implementing security controls and threat protection on Azure.

147 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 121–130 of 147

Q121

Which Azure service provides security information and event management?

  • A Azure Sentinel
  • B Azure Monitor
  • C Azure Firewall
  • D Azure Key Vault
Explanation Azure Sentinel is designed for SIEM tasks, while others serve different functions.
Q122

A company needs to control access to their resources based on user attributes. Which feature should they implement?

  • A Role-Based Access Control
  • B Network Security Groups
  • C Privileged Identity Management
  • D Conditional Access
Explanation Conditional Access policies enforce access based on user attributes, unlike the others.
Q123

What happens when a user deletes a key in Azure Key Vault?

  • A It is permanently deleted immediately.
  • B It moves to a recovery state.
  • C It is hidden but not deleted.
  • D It is archived in a separate vault.
Explanation Deleted keys enter a recoverable state for a defined retention period, allowing recovery before permanent deletion.
Q124

What does Azure Security Center primarily assess?

  • A Network traffic patterns
  • B Security configurations
  • C User login history
  • D Resource provisioning details
Explanation Azure Security Center assesses security configurations to ensure best practices are followed.
Q125

A company needs to restrict storage access for specific users without removing their general permissions. Which Azure feature should they use?

  • A Shared access signatures
  • B Access control lists
  • C Azure Policy
  • D Resource Manager templates
Explanation Shared access signatures allow fine-grained access without changing general permissions.
Q126

You are configuring Azure AD Conditional Access. What happens when a user meets the defined conditions but has MFA enabled?

  • A Access is always denied
  • B User is prompted for MFA
  • C User bypasses MFA
  • D User gains full admin access
Explanation The user is prompted for MFA to confirm their identity under the specified conditions.
Q127

Which Azure service is used for real-time monitoring of applications?

  • A Azure Monitor
  • B Azure Blob Storage
  • C Azure Key Vault
  • D Azure DevOps
Explanation Azure Monitor provides comprehensive monitoring capabilities while the other services serve different purposes.
Q128

A company needs to secure its Azure resources by enforcing additional policies. Which service should they implement?

  • A Azure Role-Based Access Control (RBAC)
  • B Azure Policy
  • C Azure Sentinel
  • D Azure DDoS Protection
Explanation Azure Policy allows for enforcement of compliance policies; RBAC is focused on access control, not policies.
Q129

What happens when you delete a resource group in Azure?

  • A Only the resources will be deleted.
  • B All resources and the resource group are deleted.
  • C The resource group becomes disabled.
  • D Nothing happens, it is recoverable.
Explanation Deleting a resource group removes all associated resources, whereas the other options inaccurately describe the outcome.
Q130

Which Azure service is best for securing APIs?

  • A Azure API Management
  • B Azure SQL Database
  • C Azure Functions
  • D Azure Blob Storage
Explanation Azure API Management provides security features for APIs, while the others focus on different functionalities.