Free AZ-500 Exam Braindumps (page: 68)

Page 67 of 128

You are troubleshooting a security issue for an Azure Storage account.
You enable Azure Storage Analytics logs and archive it to a storage account.
What should you use to retrieve the diagnostics logs?

  1. Azure Cosmos DB explorer
  2. Azure Monitor
  3. Microsoft Defender for Cloud
  4. Azure Storage Explorer

Answer(s): D

Explanation:

One of the simplest ways to set/get an Azure Storage Blob's metadata is by using the cross-platform Microsoft Azure Storage Explorer, which is a standalone app from Microsoft that allows you to easily work with Azure Storage data on Windows, macOS and Linux.
Note: All logs are stored in block blobs in a container named $logs, which is automatically created when Storage Analytics is enabled for a storage account.
If you use your storage-browsing tool to navigate to the container directly, you will see all the blobs that contain your logging data. Most storage browsing tools enable you to view the metadata of blobs; you can also read this information using PowerShell or programmatically.


Reference:

https://azure.microsoft.com/en-us/features/storage-explorer/
https://docs.microsoft.com/en-us/azure/storage/common/storage-analytics-logging



You have the Azure resources shown in the following table.
You need to meet the following requirements:
-Internet-facing virtual machines must be protected by using network security groups (NSGs).
-All the virtual machines must have disk encryption enabled.
What is the minimum number of security policies that you should create in Microsoft Defender for Cloud?

  1. 1
  2. 2
  3. 3
  4. 4

Answer(s): B

Explanation:

Azure Policy definition Internet-facing virtual machines should be protected with network security groups. We need a security for each of the VMs for Internet- facing protection.
Note: A network security group contains security rules that allow or deny inbound network traffic to, or outbound network traffic from, several types of Azure resources. For each rule, you can specify source and destination, port, and protocol.
We only need one security policy for disk encryption to apply on both for VM1 and VM2 (on all VMs).


Reference:

https://docs.microsoft.com/en-us/azure/virtual-machines/policy-reference https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview



HOTSPOT (Drag and Drop is not supported) (Drag and Drop is not supported)
You have an Azure subscription that contains an Azure key vault. The role assignments for the key vault are shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:


Box 1: Only User1, User 2, and User4
* Owner (User1) - Has full access to all resources including the right to delegate access to others.
* Key Vault Crypto Officer (User2)
Perform any action on the keys of a key vault, except manage permissions.
* Key Vault Administrator (User 4)
Perform all data plane operations on a key vault and all objects in it, including certificates, keys, and secrets
Box 2: Only User1, User3, and User 4
* Key Vault Secrets Officer (User 3)
Perform any action on the secrets of a key vault, except manage permissions. Only works for key vaults that use the 'Azure role-based access control' permission model.


Reference:

https://docs.microsoft.com/en-us/azure/key-vault/general/rbac-guide



HOTSPOT (Drag and Drop is not supported) (Drag and Drop is not supported)
You have an Azure subscription that contains a blob container named cont1. Cont1 has the access policies shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:


Box 1: 4
A container can have up to 5 stored access policies.
Maximum number of stored access policies per blob container: 5
Box 2: 1
Blob version supports one version-level immutability policy and one legal hold. A policy on a blob version can override a default policy specified on the account or container.


Reference:

https://docs.microsoft.com/en-us/azure/storage/blobs/scalability-targets https://docs.microsoft.com/en-us/azure/storage/blobs/immutable-storage-overview






Post your Comments and Discuss Microsoft AZ-500 exam with other Community members:

AZ-500 Exam Discussions & Posts