Free AZ-500 Exam Braindumps (page: 48)

Page 47 of 128

HOTSPOT (Drag and Drop is not supported) (Drag and Drop is not supported)
You have an Azure key vault named KeyVault1 that contains the items shown in the following table.
In KeyVault1, the following events occur in sequence:
-Item1 is deleted.
-Item2 and Policy1 are deleted.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:


Box1: No
Policies cannot be recovered.
Box2: Soft delete is enabled by default on all key vaults. You cannot add a new key named Item1 because an object named Item1 exists in a soft-deleted state.
Box3: Soft delete is now enabled by default on all key vaults so you can recover Item2.


Reference:

https://docs.microsoft.com/en-us/azure/key-vault/general/soft-delete-overview https://docs.microsoft.com/en-us/azure/key-vault/general/soft-delete-change



Your company has an Azure Active Directory (Azure AD) tenant named contoso.com.
You plan to create several security alerts by using Azure Monitor.
You need to prepare the Azure subscription for the alerts.
What should you create first?

  1. an Azure Storage account
  2. an Azure Log Analytics workspace
  3. an Azure event hub
  4. an Azure Automation account

Answer(s): B



You have an Azure SQL Database server named SQL1.
For SQL1, you turn on Azure Defender for SQL to detect all threat detection types.
Which action will Azure Defender for SQL detect as a threat?

  1. A user updates more than 50 percent of the records in a table.
  2. A user attempts to sign in as SELECT * FROM table1.
  3. A user is added to the db_owner database role.
  4. A user deletes more than 100 records from the same table.

Answer(s): B

Explanation:

Advanced Threat Protection can detect potential SQL injections: This alert is triggered when an active exploit happens against an identified application vulnerability to SQL injection. This means the attacker is trying to inject malicious SQL statements using the vulnerable application code or stored procedures.


Reference:

https://docs.microsoft.com/en-us/azure/azure-sql/database/azure-defender-for-sql



You company has an Azure subscription named Sub1. Sub1 contains an Azure web app named WebApp1 that uses Azure Application Insights. WebApp1 requires users to authenticate by using OAuth 2.0 client secrets.
Developers at the company plan to create a multi-step web test app that preforms synthetic transactions emulating user traffic to Web App1.
You need to ensure that web tests can run unattended.
What should you do first?

  1. In Microsoft Visual Studio, modify the .webtest file.
  2. Upload the .webtest file to Application Insights.
  3. Register the web test app in Azure AD.
  4. Add a plug-in to the web test app.

Answer(s): C






Post your Comments and Discuss Microsoft AZ-500 exam with other Community members:

AZ-500 Discussions & Posts