Microsoft Azure
Microsoft Azure Security Technologies
AZ-500
Popular
The AZ-500 exam assesses your skills in implementing security controls and threat protection on Azure.
147 questions
0 views
Free
Questions 121–130 of 147
Which Azure service provides security information and event management?
-
A
Azure Sentinel
-
B
Azure Monitor
-
C
Azure Firewall
-
D
Azure Key Vault
Explanation
Azure Sentinel is designed for SIEM tasks, while others serve different functions.
A company needs to control access to their resources based on user attributes. Which feature should they implement?
-
A
Role-Based Access Control
-
B
Network Security Groups
-
C
Privileged Identity Management
-
D
Conditional Access
Explanation
Conditional Access policies enforce access based on user attributes, unlike the others.
What happens when a user deletes a key in Azure Key Vault?
-
A
It is permanently deleted immediately.
-
B
It moves to a recovery state.
-
C
It is hidden but not deleted.
-
D
It is archived in a separate vault.
Explanation
Deleted keys enter a recoverable state for a defined retention period, allowing recovery before permanent deletion.
What does Azure Security Center primarily assess?
-
A
Network traffic patterns
-
B
Security configurations
-
C
User login history
-
D
Resource provisioning details
Explanation
Azure Security Center assesses security configurations to ensure best practices are followed.
A company needs to restrict storage access for specific users without removing their general permissions. Which Azure feature should they use?
-
A
Shared access signatures
-
B
Access control lists
-
C
Azure Policy
-
D
Resource Manager templates
Explanation
Shared access signatures allow fine-grained access without changing general permissions.
You are configuring Azure AD Conditional Access. What happens when a user meets the defined conditions but has MFA enabled?
-
A
Access is always denied
-
B
User is prompted for MFA
-
C
User bypasses MFA
-
D
User gains full admin access
Explanation
The user is prompted for MFA to confirm their identity under the specified conditions.
Which Azure service is used for real-time monitoring of applications?
-
A
Azure Monitor
-
B
Azure Blob Storage
-
C
Azure Key Vault
-
D
Azure DevOps
Explanation
Azure Monitor provides comprehensive monitoring capabilities while the other services serve different purposes.
A company needs to secure its Azure resources by enforcing additional policies. Which service should they implement?
-
A
Azure Role-Based Access Control (RBAC)
-
B
Azure Policy
-
C
Azure Sentinel
-
D
Azure DDoS Protection
Explanation
Azure Policy allows for enforcement of compliance policies; RBAC is focused on access control, not policies.
What happens when you delete a resource group in Azure?
-
A
Only the resources will be deleted.
-
B
All resources and the resource group are deleted.
-
C
The resource group becomes disabled.
-
D
Nothing happens, it is recoverable.
Explanation
Deleting a resource group removes all associated resources, whereas the other options inaccurately describe the outcome.
Which Azure service is best for securing APIs?
-
A
Azure API Management
-
B
Azure SQL Database
-
C
Azure Functions
-
D
Azure Blob Storage
Explanation
Azure API Management provides security features for APIs, while the others focus on different functionalities.