Question no 1
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have an Azure Subscription named Sub1. Sub1 contains an Azure virtual machine named VM1 that runs Windows Server 2016. You need to encrypt VM1 disks by using Azure Disk Encryption. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
    ↠ Create an Azure Key Vault
    ↠ Configure Access policies for the Azure Key vault
    ↠ Run set-AzureRmVmDiskEncryptionExtension
Answer Description
Question no 2
You have an Azure subscription that contains the virtual machines shown in the following table.
Answer Description
Question no 3
You have an Azure subscription that contains 100 virtual machines. Azure Diagnostics is enabled on all the virtual machines. You are planning the monitoring of Azure services in the subscription. You need to retrieve the following details: Identify the user who deleted a virtual machine three weeks ago. Query the security events of a virtual machine that runs Windows Server 2016. What should you use in Azure Monitor? To answer, drag the appropriate configuration settings to the correct details. Each configuration setting may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. NOTE: Each correct selection is worth one point.
    ↠ Identify the user who deleted a virtual machine three weeks ago
    ↠ Query the security events of a virtual machine that runs Windows Server 2016
Answer Description
Question no 4
You have an Azure subscription that contains 100 virtual machines. Azure Diagnostics is enabled on all the virtual machines. You are planning the monitoring of Azure services in the subscription. You need to retrieve the following details: Identify the user who deleted a virtual machine three weeks ago. Query the security events of a virtual machine that runs Windows Server 2016. What should you use in Azure Monitor? To answer, drag the appropriate configuration settings to the correct details. Each configuration setting may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. NOTE: Each correct selection is worth one point
Answer Description
Question no 5
Your company plans to create separate subscriptions for each department. Each subscription will be associated to the same Azure Active Directory (Azure AD) tenant. You need to configure each subscription to have the same role assignments. What should you use?
    ↠ Azure Security Center
    ↠ Azure Policy
    ↠ Azure AD Privileged Identity Management (PIM)
    ↠ Azure Blueprints
Check Answer
Answer Description Just as a blueprint allows an engineer or an architect to sketch a project's design parameters, Azure Blueprints enables cloud architects and central information technology groups to define a repeatable set of Azure resources that implements and adheres to an organization's standards, patterns, and requirements. Blueprints are a declarative way to orchestrate the deployment of various resource templates and other artifacts such as: Role Assignments Policy Assignments Azure Resource Manager templates Resource Groups Reference: https://docs.microsoft.com/en-us/azure/governance/blueprints/overview
Question no 6
You have an Azure subscription named Sub 1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. The tenant contains the users shown in the following table.
Answer Description
Question no 7
From the Azure portal, you are configuring an Azure policy. You plan to assign policies that use the DeployIfNotExist, AuditIfNotExist, Append, and Deny effects. Which effect requires a managed identity for the assignment?
    ↠ AuditIfNotExist
    ↠ Append
    ↠ DeployIfNotExist
    ↠ Deny
Check Answer
Answer Description When Azure Policy runs the template in the deployIfNotExists policy definition, it does so using a managed identity. References: https://docs.microsoft.com/bs-latn-ba/azure/governance/policy/how-to/remediate-resources
Question no 8
You have an Azure subscription that contains the virtual machines shown in the following table. On which virtual machines is the Log Analytics agent installed?
    ↠ VM3 only
    ↠ VM1 and VM3 only
    ↠ VM3 and VM4 only
    ↠ VM1, VM2, VM3, and VM4
Check Answer
Answer Description When automatic provisioning is On, Security Center provisions the Log Analytics Agent on all supported Azure VMs and any new ones that are created. Supported Operating systems include: Ubuntu 14.04 LTS (x86/x64), 16.04 LTS (x86/x64), and 18.04 LTS (x64) and Windows Server 2008 R2, 2012, 2012 R2, 2016, version 1709 and 1803 Reference: https://docs.microsoft.com/en-us/azure/security-center/security-center-enable-datacollection
Question no 9
You create resources in an Azure subscription as shown in the following table.
Answer Description
Question no 10
You have 10 virtual machines on a single subnet that has a single network security group (NSG). You need to log the network traffic to an Azure Storage account. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
    ↠ Install the Network Performance Monitor solution.
    ↠ Enable Azure Network Watcher.
    ↠ Enable diagnostic logging for the NSG.
    ↠ Enable NSG flow logs.
    ↠ Create an Azure Log Analytics workspace.
Check Answer
Enable Azure Network Watcher.
Enable NSG flow logs.
Answer Description A network security group (NSG) enables you to filter inbound traffic to, and outbound traffic from, a virtual machine (VM). You can log network traffic that flows through an NSG with Network Watcher's NSG flow log capability. Steps include: Create a VM with a network security group Enable Network Watcher and register the Microsoft.Insights provider Enable a traffic flow log for an NSG, using Network Watcher's NSG flow log capability Download logged data Reference:https://docs.microsoft.com/en-us/azure/network-watcher/network-watcher-nsg-flow-loggingportal
Question no 11
You have Azure virtual machines that have Update Management enabled. The virtual machines are configured as shown in the following table.
Answer Description
Question no 12
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a hybrid configuration of Azure Active Directory (AzureAD). You have an Azure HDInsight cluster on a virtual network. You plan to allow users to authenticate to the cluster by using their on-premises Active Directory credentials. You need to configure the environment to support the planned authentication. Solution: You deploy the On-premises data gateway to the on-premises network. Does this meet the goal?
    ↠ Yes
    ↠ No
Check Answer
Answer Description Instead, you connect HDInsight to your on-premises network by using Azure Virtual Networks and a VPN gateway. Note: To allow HDInsight and resources in the joined network to communicate by name, you must perform the following actions: Create Azure Virtual Network. Create a custom DNS server in the Azure Virtual Network. Configure the virtual network to use the custom DNS server instead of the default Azure Recursive Resolver. Configure forwarding between the custom DNS server and your on-premises DNS server. References: https://docs.microsoft.com/en-us/azure/hdinsight/connect-on-premises-network
Question no 13
You are configuring just in time (JIT) VM access to a set of Azure virtual machines. You need to grant users PowerShell access to the virtual machine by using JIT VM access. What should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Answer Description
Question no 14
You have an Azure subscription that contains the virtual networks shown in the following table.
    ↠ RT1
    ↠ RT2
Answer Description
Question no 15
You have an Azure subscription named Sub1 that contains the resources shown in the following table. You need to ensure that you can provide VM1 with secure access to a database on SQL1 by using a contained database user. What should you do?
    ↠ Enable a managed service identity on VM1.
    ↠ Create a secret in KV1.
    ↠ Configure a service endpoint on SQL1.
    ↠ Create a key in KV1.
Check Answer
Why You Need Dumps?
Dumpsbox provides detailed explanations and insights for each question and answer in their Microsoft AZ-500 study materials. This allows you to understand the underlying concepts and reasoning behind the correct answers. By gaining a deeper understanding of the subject matter, you will be better prepared to tackle the diverse range of questions that may appear on the Azure Security Engineer Associate exam.
Real Exam Scenario Simulation:
One of the key features of Dumpsbox is the practice tests that simulate the real exam scenario. These Microsoft Azure Security Technologies braindumps are designed to mirror the format, difficulty level, and time constraints of the actual AZ-500 exam. By practicing with these simulation tests, you can familiarize yourself with the exam environment, build confidence, and improve your time management skills.
65 + Persons Passed in Last 3 Months