Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

PDF AZ-500 Study Guide

Page: 8 / 13
Total 464 questions

Microsoft Azure Security Technologies Questions and Answers

Question 29

You have an Azure subscription that uses Microsoft Defender for Cloud.

You have an Amazon Web Service (AWS) account named AWS1 that is connected to defender for Cloud.

You need to ensure that AWS foundational Security Best Practices. The solution must minimize administrate effort.

What should do you in Defender for Cloud?

Options:

A.

Create a new customer assessment.

B.

Assign a built-in assessment.

C.

Assign a built-in compliance standard.

D.

Create a new custom standard.

Question 30

You have an Azure subscription that contains a user named User1. User1 is assigned the Reader role for the subscription.

You plan to create a custom role named Role1 and assign Role1 to User1.

You need to ensure that User1 can create and manage application security groups by using the Azure portal.

Which two permissions should you add to Role1? To answer, select the appropriate permission in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 31

You have an Azure subscription named Sub 1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. The tenant contains the users shown in the following table.

Each user is assigned an Azure AD Premium P2 license.

You plan lo onboard and configure Azure AD identity Protection.

Which users can onboard Azure AD Identity Protection, remediate users, and configure policies? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point

Options:

Question 32

You have an Azure subscription that contains an Azure App Service app named App1, an Azure container instance named AC1. and a storage account named storage1. AC1 hosts an app named App2.

Users send requests to App1 by using a URL of https:/app1.contoso.com/echo/resource-cache? param1 =sample. App1 calls App2. which retrieves data from storage1.

You need to ensure that a security alert will be generated when connections are detected from anomalous IP addresses. Which Microsoft Defender for Cloud service should you use?

Options:

A.

Microsoft Defender for App Service

B.

Microsoft Defender for APIs

C.

Microsoft Defender for Storage

D.

Microsoft Defender for Containers

Page: 8 / 13
Total 464 questions