Free AZ-500 Exam Braindumps (page: 7)

Page 6 of 128

Your company has an Azure subscription that includes two virtual machines, named VirMac1 and VirMac2, which both have a status of Stopped (Deallocated).
The virtual machines belong to different resource groups, named ResGroup1 and ResGroup2.
You have also created two Azure policies that are both configured with the virtualMachines resource type. The policy configured for ResGroup1 has a policy definition of Not allowed resource types, while the policy configured for ResGroup2 has a policy definition of Allowed resource types.
You then create a Read-only resource lock on VirMac1, as well as a Read-only resource lock on ResGroup2.
Which of the following is TRUE with regards to the scenario? (Choose all that apply.)

  1. You will be able to start VirMac1.
  2. You will NOT be able to start VirMac1.
  3. You will be able to create a virtual machine in ResGroup2.
  4. You will NOT be able to create a virtual machine in ResGroup2.

Answer(s): B,D

Explanation:


Reference:

https://docs.microsoft.com/en-us/azure/governance/blueprints/concepts/resource-locking



You have been tasked with delegate administrative access to your company's Azure key vault.
You have to make sure that a specific user can set advanced access policies for the key vault. You also have to make sure that access is assigned based on the principle of least privilege.
Which of the following options should you use to achieve your goal?

  1. Azure Information Protection
  2. RBAC
  3. Azure AD Privileged Identity Management (PIM)
  4. Azure DevOps

Answer(s): B

Explanation:


Reference:

https://docs.microsoft.com/en-us/azure/key-vault/key-vault-secure-your-key-vault



You have been tasked with delegate administrative access to your company's Azure key vault.
You have to make sure that a specific user is able to add and delete certificates in the key vault. You also have to make sure that access is assigned based on the principle of least privilege.
Which of the following options should you use to achieve your goal?

  1. A key vault access policy
  2. Azure policy
  3. Azure AD Privileged Identity Management (PIM)
  4. Azure DevOps

Answer(s): A

Explanation:


Reference:

https://docs.microsoft.com/en-us/azure/key-vault/key-vault-secure-your-key-vault



You have an Azure virtual machine that runs Windows Server R2.
You plan to deploy and configure an Azure Key vault, and enable Azure Disk Encryption for the virtual machine.
Which of the following is TRUE with regards to Azure Disk Encryption for a Windows VM?

  1. It is supported for basic tier VMs.
  2. It is supported for standard tier VMs.
  3. It is supported for VMs configured with software-based RAID systems.
  4. It is supported for VMs configured with Storage Spaces Direct (S2D).

Answer(s): B

Explanation:


Reference:

https://docs.microsoft.com/en-us/azure/virtual-machines/windows/disk-encryption-windows






Post your Comments and Discuss Microsoft AZ-500 exam with other Community members:

AZ-500 Discussions & Posts