
AZ-500 Part 2

Quiz
•
Professional Development
•
Professional Development
•
Hard

CloudThat Technologies
Used 18+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following should not be stored in Azure Key Vault? What are the differences between these items? Select one.
Key management
Secret management
Certificate management
Identity management
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these statements best describes Azure Key Vault's authentication and authorization process? Select one.
Applications authenticate to a vault with the username and password of the lead developer and have full access to all secrets in the vault.
Applications and users authenticate to a vault with their Azure Active Directory identities and are authorized to perform actions on all secrets in the vault.
Applications authenticate to a vault with the username and password of a user that signs in to the web app, and is granted access to secrets owned by that user.
Applications and users authenticate to a vault with a Microsoft account and are authorized to access specific secrets
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
There are two types of Managed Service Identities you can create, one is System-assigned which is second type?
Application-assigned
Database-assigned
VM-assigned
User-assigned
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are configuring Secure transfer required. Your Compliance office wants to more about this feature. You provide all the following information, except? Select one.
Requests to storage can be HTTPS or HTTP.
Requests to storage must be SMB with encryption
Azure storage doesn't support HTTPS for custom domain names
By default, new storage accounts have secure transfer required enabled.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your SQL database administrator has recently read about SQL injection attacks. They ask you what can be done to minimize the risk of this type of attack. You suggest implementing which of the following features?
Advanced Threat Protection
Data Discovery and Classification
Dynamic Data Masking
Transparent Data Encryption
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You can query Log Analytics workspace with which of the following? Select one.
Embedded SQL
Graph API
Kusto Query Language
Contextual Query Language
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You want to be notified when any virtual machine in the production resource group is deleted. What should you configure? Select one.
Log alert
Metric alert
Activity log alert
Application alert
Create a free account and access millions of resources
Similar Resources on Wayground
11 questions
XBOX Modding

Quiz
•
KG - Professional Dev...
10 questions
PRE and POST TEST IKP

Quiz
•
Professional Development
13 questions
ICE BREAK PX SAFETY

Quiz
•
Professional Development
15 questions
Clase 6 - AzureSecDevSecOps

Quiz
•
Professional Development
9 questions
02. Azure Descripción de los servicios

Quiz
•
Professional Development
15 questions
AI_102_MODULE_5

Quiz
•
Professional Development
15 questions
02 AZ-500: Implement Platform Protection

Quiz
•
Professional Development
15 questions
Posa't a prova!

Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade