🔥 40% Off Crucial Exams Memberships — This Week Only

6 hours, 44 minutes remaining!
00:20:00

Microsoft Azure Security Engineer Associate Practice Test (AZ-500)

Use the form below to configure your Microsoft Azure Security Engineer Associate Practice Test (AZ-500). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for Microsoft Azure Security Engineer Associate AZ-500
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

Microsoft Azure Security Engineer Associate AZ-500 Information

About the Microsoft Azure Security Engineer Associate (AZ-500) Exam

The Microsoft Azure Security Engineer Associate certification, achieved by passing the AZ-500 exam, is a critical credential for professionals dedicated to securing Azure environments. This exam is designed for individuals who implement, manage, and monitor security for resources in Azure, as well as in multi-cloud and hybrid environments. Candidates are expected to have practical experience with the administration of Microsoft Azure and a solid understanding of security principles. The exam validates a candidate's expertise in managing identity and access, implementing platform protection, managing security operations, and securing data and applications. With 95% of Fortune 500 companies utilizing Azure, professionals with validated security skills are in high demand.

Key Domains and Skills Measured

The AZ-500 exam typically consists of 40–60 questions and requires a score of 700 out of 1,000 to pass. The questions, which can include multiple-choice, case studies, and scenario-based formats, are divided into four main domains. These domains include securing identity and access (15–20%), securing networking (20–25%), securing compute, storage, and databases (20–25%), and managing security with Microsoft Defender for Cloud and Microsoft Sentinel (30–35%). This structure ensures that certified professionals are proficient in a wide range of security tasks, from configuring Azure Active Directory for secure access to using advanced tools like Microsoft Sentinel for threat detection and response.

The Value of Practice Exams in Preparation

A crucial component of a successful study plan for the AZ-500 exam is the use of practice exams. These tools are invaluable for several reasons. Firstly, they provide a realistic simulation of the actual exam environment, helping to reduce anxiety and build confidence by familiarizing candidates with the question formats and time constraints. Secondly, practice tests are an excellent way to identify knowledge gaps. By reviewing incorrect answers and the provided explanations, you can pinpoint specific areas that require further study and focus your learning efforts more effectively. Finally, consistently taking practice exams helps in tracking progress over time, offering motivation as scores improve and ensuring a deep, practical understanding of Azure security technologies rather than mere memorization of facts. Microsoft even offers a free practice assessment on its official certification page to help candidates gauge their readiness.

Microsoft Azure Security Engineer Associate AZ-500 Logo
  • Free Microsoft Azure Security Engineer Associate AZ-500 Practice Test

  • 20 Questions
  • Unlimited time
  • Secure identity and access
    Secure networking
    Secure compute, storage, and databases
    Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel
Question 1 of 20

You want to surface a new set of corporate policies in the Regulatory compliance dashboard so that every subscription in the Finance management group is evaluated against them. Before you choose Add custom standard in Microsoft Defender for Cloud, which preparatory action must you complete?

  • Add the tag complianceStandard=true to each individual policy definition you intend to include.

  • Enable Microsoft Defender for Cloud Plan 2 on every subscription in the Finance management group.

  • Assign the Microsoft Defender for Cloud Policy Contributor role to the built-in Security Insights application at the management-group scope.

  • Define an Azure Policy initiative at the Finance management-group scope and set its category to "Regulatory Compliance".

Question 2 of 20

You manage 15 Azure virtual networks that reside in two subscriptions. You already created an Azure Virtual Network Manager instance and added all production networks in East US to a single network group. You must make sure all member virtual networks automatically peer with each other in a full-mesh topology without creating individual peerings. Which object should you create and deploy?

  • A hub-and-spoke connection configured on each virtual network

  • A security admin rule collection assigned to the network group

  • A connectivity configuration with mesh topology deployed to the East US region

  • An Azure Virtual WAN hub created in the East US region

Question 3 of 20

You assigned the built-in Azure Policy "Allowed locations" at the production subscription scope. After a merger, three resource groups must remain in an unsupported region for the next six months. You need to prevent those resource groups from being reported as non-compliant without removing or modifying the existing policy assignment. What should you configure?

  • Create a policy exemption for each of the three resource groups.

  • Add a role assignment granting the Policy Contributor role to each resource group.

  • Wrap the existing policy in an initiative definition and assign the initiative instead.

  • Create a new policy assignment with the Allowed locations policy but set the effect to Disabled at the resource-group scope.

Question 4 of 20

Your company stores personally identifiable information in an Azure SQL Database. Compliance rules state that the data must be encrypted at rest, in transit, and while it is processed on the server, and that neither database administrators nor Microsoft support engineers can read plaintext values. The application must still perform equality searches on the sensitive columns with minimal code changes. Which Azure SQL feature should you recommend?

  • Transparent Data Encryption (TDE)

  • Always Encrypted configured with deterministic encryption

  • Row-level security

  • Dynamic Data Masking

Question 5 of 20

Your company has 75 virtual networks spread across three Azure subscriptions. You must immediately block all outbound traffic to two public IP addresses that have been reported as command-and-control endpoints, while avoiding per-NSG changes. What should you do?

  • Add a user-defined route with next hop set to None for the two IP addresses in each subnet of every virtual network.

  • Create a security admin rule collection in Azure Virtual Network Manager, attach it to a network group that contains all virtual networks, and add a deny outbound rule for the two IP addresses.

  • Deploy a centralized Azure Firewall in a hub virtual network and add an outbound application rule that denies connections to the two IP addresses.

  • Associate the affected virtual machines with a new application security group and add a deny outbound rule to existing NSGs that references this group.

Question 6 of 20

An Azure Firewall is associated with a firewall policy that contains two network rule collections:

  • Deny-Internet (priority 100) with action Deny and destination address prefixes 0.0.0.0/0 and ::/0.
  • Allow-Internal (priority 200) with action Allow and destination address prefix 10.0.0.0/8.

Users in the connected virtual networks cannot establish HTTPS connections to 10.5.0.4.

Which change will allow the traffic while still blocking outbound internet access?

  • Convert the Deny-Internet rule collection to an application rule collection.

  • Change the priority of the Allow-Internal rule collection to 50 so it is evaluated before Deny-Internet.

  • Add an application rule in Deny-Internet that allows https://10.5.0.4./

  • Enable forced tunneling on the firewall and add a route to 10.0.0.0/8.

Question 7 of 20

Your team assigns the built-in policy "Deploy Diagnostic Settings for Storage Accounts to Log Analytics workspace," which uses the DeployIfNotExists effect. After 24 hours the assignment lists 80 storage accounts as non-compliant, and every remediation task created from the assignment fails with the status Unauthorized. What is the most likely reason the remediation tasks cannot complete?

  • The policy definition must be changed to use the Modify effect instead of DeployIfNotExists.

  • Remediation tasks cannot run until the policy's overall compliance reaches 100 percent.

  • The policy assignment scope needs to be a management group rather than a subscription for remediation to succeed.

  • The policy assignment was created without a managed identity that has sufficient write permissions on the targeted storage accounts.

Question 8 of 20

You manage a subscription that hosts several Azure Container Apps environments. Security operations must receive alerts when Microsoft Defender detects suspicious or malicious activity inside the running containers. You have already onboarded the subscription to Microsoft Defender for Cloud, but no security alerts are shown for the container apps. To ensure runtime threat detection for Azure Container Apps, what should you do first?

  • Configure egress filtering for the Container Apps environment by sending outbound traffic through Azure Firewall.

  • Deploy the container apps into an App Service Environment to inherit App Service threat detection features.

  • Enable the Microsoft Defender for Containers plan for the subscription (or relevant resource group).

  • Enable diagnostic settings on each container app to stream the ContainerAppConsoleLogs and ContainerAppSystemLogs categories to a Log Analytics workspace.

Question 9 of 20

Your Azure VNet has WebSubnet (web-tier VM scale set) and AppSubnet (application VMs). Requirements:

  1. Allow Internet → web tier on TCP 443.
  2. Allow web tier → app tier on TCP 8080.
  3. Block any traffic initiated from AppSubnet to the Internet or WebSubnet. You must minimise NSG rules and ensure policies automatically cover new scale-out instances. What should you configure?
  • Deploy an Azure Firewall in a dedicated subnet and configure user-defined routes so all traffic is forced through the firewall.

  • Associate both subnets with a single Network Security Group that contains individual CIDR-based allow and deny rules for each subnet.

  • Create two Application Security Groups (one for the web tier and one for the app tier) and reference them in the required NSG rules.

  • Use Azure Virtual Network Manager to create security admin rule collections that allow and deny the required traffic.

Question 10 of 20

You are asked to onboard Contoso to Microsoft Defender External Attack Surface Management (EASM) so that the service can begin automatically discovering unknown Internet-facing assets. You have already created a new EASM resource in the Azure portal. Before discovery can start, which action must you perform?

  • Deploy the EASM discovery agent on every public virtual machine in Azure.

  • Connect the Azure subscription to Microsoft Defender for Cloud and enable Cloud Security Posture Management.

  • Create a discovery group and add a root Internet-facing asset (for example, contoso.com) as a seed.

  • Upload a list of on-premises private IP subnets to the EASM resource.

Question 11 of 20

Your company's security policy requires the following:

  • Helpdesk staff must be able to reset any user's password in Microsoft Entra ID.
  • Helpdesk staff must not be able to create, delete, or update user properties other than the password.

You decide to create a custom Microsoft Entra (Azure AD) administrative role and assign it to the Helpdesk group.

Which Microsoft Graph permission should you include in the custom role to meet the requirements?

  • microsoft.directory/applications/standard/read

  • microsoft.directory/users/createAsOwner

  • microsoft.directory/users/password/update

  • microsoft.directory/users/basic/update

Question 12 of 20

You manage an Azure Storage account named mystorage that contains multiple containers. DevOps engineers need read and write access to only the container named source for the next 72 hours from a CI/CD pipeline. The solution must avoid exposing either of the storage account access keys and must rely on Azure AD for authorization. Which access mechanism should you recommend?

  • An access key stored in an Azure Key Vault secret

  • A user delegation SAS

  • A service SAS signed with the storage account key

  • A stored access policy that uses an account key

Question 13 of 20

You are deploying an Azure SQL Managed Instance in a dedicated subnet. To meet corporate policy you attach a Network Security Group (NSG) to the subnet and delete the default Allow Internet Outbound rule, effectively blocking all outbound Internet traffic. After the change, the managed instance remains stuck in the Creating state and eventually fails to provision. You must keep the Internet block in place but still allow the managed instance to deploy and operate. Which single NSG rule should you add?

  • Allow outbound TCP 443 to the service tag SqlManagement

  • Allow outbound TCP 443 to the service tag Internet

  • Allow outbound UDP 1194 to the service tag GatewayManager

  • Allow outbound TCP 1443 to the service tag VirtualNetwork

Question 14 of 20

You manage an Azure Kubernetes Service (AKS) cluster that uses the Azure CNI network plugin. Workloads from several teams run in separate namespaces. The security team requires that pods be isolated so that traffic between namespaces is blocked unless explicitly allowed. You need to enforce this requirement without modifying the cluster network plugin or the container images. What should you do?

  • Associate a network security group with each node subnet that blocks traffic between the pod address ranges.

  • Deploy Azure Firewall and route all pod egress traffic through it, adding deny rules for other namespaces.

  • Enable the Azure network policy add-on for the cluster and apply Kubernetes NetworkPolicy objects to each namespace.

  • Enable Microsoft Defender for Cloud for Kubernetes and configure the "Block cross-namespace communication" security policy.

Question 15 of 20

Contoso wants to enforce multi-factor authentication (MFA) only when administrators manage Azure resources-not when they use other Microsoft 365 services.
You are asked to create a single Conditional Access policy that meets these requirements.
Which cloud app or action should you target in the policy so that MFA is required only when administrators sign in through the Azure portal, Azure PowerShell, Azure CLI, or the REST API?

  • All cloud apps

  • Office 365

  • Microsoft Azure Management

  • User action: Register security information

Question 16 of 20

Your organization plans to enforce a new Azure Policy that denies the deployment of any storage account that is not encrypted with customer-managed keys (CMK). Because many existing deployment pipelines have not yet been updated, you need a transition period during which the policy records non-compliant resources but does not block their creation. You also want to avoid changing the policy definition itself during this period.

Which configuration should you apply to the policy assignment to meet these requirements?

  • Add the policy to an initiative and leave the initiative in draft state.

  • Create an exemption for the subscription that expires after the transition period.

  • Set the policy assignment's enforcement mode to "DoNotEnforce".

  • Add a custom non-compliance message to the policy assignment.

Question 17 of 20

You enabled soft-delete and purge protection on an Azure Key Vault that stores an RSA key named AppKey. The operations team used Azure CLI to create a backup of AppKey to a Blob storage container. A week later, AppKey is accidentally deleted, but has not been purged from the vault. To bring the key back into service as quickly as possible while preserving all existing versions, which action should you perform?

  • Create a new key named AppKey with az keyvault key create.

  • Run az keyvault key restore --vault-name <vaultName> --file appkey_backup.

  • Run az keyvault key import --vault-name <vaultName> --file appkey_backup.

  • Run az keyvault key recover --vault-name <vaultName> --name AppKey.

Question 18 of 20

Your team wants to detect whether any VM in subnet-prod is opening outbound connections to unapproved IP addresses. All VMs are protected by a single network security group named nsg-prod. You must collect logs of every allowed and denied outbound flow with source and destination information for later analysis in Log Analytics. Which Network Watcher feature should you enable?

  • Configure a packet capture session on each VM's network interface.

  • Set up Connection Monitor between the VMs and the unapproved IP ranges.

  • Run IP flow verify for outbound traffic from each VM.

  • Enable NSG flow logs on nsg-prod.

Question 19 of 20

You manage an Azure subscription that is protected by Microsoft Defender for Cloud. The Regulatory compliance dashboard currently shows only the Azure Security Benchmark. Auditors now require the environment to be evaluated against ISO/IEC 27001:2013, and the compliance results must appear in the same dashboard.

What is the first change you must make in Microsoft Defender for Cloud to meet this requirement?

  • Manually assign the built-in Azure Policy initiative "Audit ISO 27001" at each resource group.

  • Deploy an Azure Monitor workbook that tracks ISO 27001 controls.

  • Create a continuous export rule that sends secure score and compliance data to an Event Hub.

  • Enable the ISO 27001 regulatory standard in Microsoft Defender for Cloud Environment settings for the subscription.

Question 20 of 20

Your company uses an Azure SQL Database that stores customer records. A new compliance mandate states that the data files, transaction logs, and all automated backups must be encrypted at rest. The mandate explicitly allows database administrators to view the data, and the development team must not change existing client applications. Which Azure SQL feature should you enable to meet the requirements?

  • Enforcing TLS 1.2 for all client connections

  • Transparent Data Encryption (TDE)

  • Dynamic Data Masking

  • Always Encrypted