Free AZ-500 Exam Braindumps (page: 41)

Page 40 of 128

HOTSPOT (Drag and Drop is not supported) (Drag and Drop is not supported)
You have a hybrid Azure Active Directory (Azure AD) tenant named contoso.com that contains a user named User1 and the servers shown in the following table.
The tenant is linked to an Azure subscription that contains a storage account named storage1. The storage1 account contains a file share named share1.
User1 is assigned the Storage File Data SMB Share Contributor role for storage1.
The Security protocol settings for the file shares of storage1 are configured as shown in the following exhibit.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:


  1. See Explanation section for answer.

Answer(s): A

Explanation:


Box 1: No
Kerberos uses user's credentials, not access keys.
Box 2: Yes
Kerberos uses user's credentials.
Box 3: No


Reference:

https://docs.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-configure-single-sign-on-with-kcd



You have an on-premises network and an Azure subscription.
You have the Microsoft SQL Server instances shown in the following table.
You plan to implement Microsoft Defender for SQL.
Which SQL Server instances will be protected by Microsoft Defender for SQL?

  1. sql1 and sql2 only
  2. sql1, sql2, and sql3 only
  3. sql1, sql2, and sql4 only
  4. sql1, sql2, sql3, and sql4

Answer(s): D

Explanation:

Microsoft Defender for SQL protected versions:
* Azure SQL Managed Instance (sql1)
* SQL on Azure virtual machines
SQL Server on Windows Azure Virtual Machines (sql2)
SQL Server on Linux Azure Virtual Machines including Red Hat Enterprise Linux (RHEL) 8 (sql3)
* On-premises SQL servers on Windows machines without Azure Arc (sql4)
* Azure SQL single databases and elastic pools
* SQL Server on Azure Arc-enabled servers
* Azure Synapse Analytics (formerly SQL DW) dedicated SQL pool


Reference:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/defender-for-sql-introduction https://docs.microsoft.com/en-us/azure/azure-sql/virtual-machines/windows/sql-server-on-azure-vm-iaas-what-is-overview https://docs.microsoft.com/en-us/azure/azure-sql/virtual-machines/linux/sql-server-on-linux-vm-what-is-iaas-overview



HOTSPOT (Drag and Drop is not supported) (Drag and Drop is not supported)
You have a Microsoft Sentinel deployment.
You need to connect a third-party security solution to the deployment. The third-party solution will send Common Event Format (CEF)-formatted messages.
What should you include in the solution? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

  1. See Explanation section for answer.

Answer(s): A

Explanation:



You have an Azure subscription that contains an Azure SQL Database logic server named SQL1 and an Azure virtual machine named VM1. VM1 uses a private IP address only.
The Firewall and virtual networks settings for SQL1 are shown in the following exhibit.
You need to ensure that VM1 can connect to SQL1. The solution must use the principle of least privilege.
What should you do?

  1. Set Connection Policy to Proxy.
  2. Set Allow Azure services and resources to access this server to Yes.
  3. Add an existing virtual network.
  4. Create a new firewall rule.

Answer(s): C






Post your Comments and Discuss Microsoft AZ-500 exam with other Community members:

AZ-500 Discussions & Posts