Microsoft Azure Security Engineer Associate Practice Test (AZ-500)
Use the form below to configure your Microsoft Azure Security Engineer Associate Practice Test (AZ-500). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Microsoft Azure Security Engineer Associate AZ-500 Information
About the Microsoft Azure Security Engineer Associate (AZ-500) Exam
The Microsoft Azure Security Engineer Associate certification, achieved by passing the AZ-500 exam, is a critical credential for professionals dedicated to securing Azure environments. This exam is designed for individuals who implement, manage, and monitor security for resources in Azure, as well as in multi-cloud and hybrid environments. Candidates are expected to have practical experience with the administration of Microsoft Azure and a solid understanding of security principles. The exam validates a candidate's expertise in managing identity and access, implementing platform protection, managing security operations, and securing data and applications. With 95% of Fortune 500 companies utilizing Azure, professionals with validated security skills are in high demand.
Key Domains and Skills Measured
The AZ-500 exam typically consists of 40–60 questions and requires a score of 700 out of 1,000 to pass. The questions, which can include multiple-choice, case studies, and scenario-based formats, are divided into four main domains. These domains include securing identity and access (15–20%), securing networking (20–25%), securing compute, storage, and databases (20–25%), and managing security with Microsoft Defender for Cloud and Microsoft Sentinel (30–35%). This structure ensures that certified professionals are proficient in a wide range of security tasks, from configuring Azure Active Directory for secure access to using advanced tools like Microsoft Sentinel for threat detection and response.
The Value of Practice Exams in Preparation
A crucial component of a successful study plan for the AZ-500 exam is the use of practice exams. These tools are invaluable for several reasons. Firstly, they provide a realistic simulation of the actual exam environment, helping to reduce anxiety and build confidence by familiarizing candidates with the question formats and time constraints. Secondly, practice tests are an excellent way to identify knowledge gaps. By reviewing incorrect answers and the provided explanations, you can pinpoint specific areas that require further study and focus your learning efforts more effectively. Finally, consistently taking practice exams helps in tracking progress over time, offering motivation as scores improve and ensuring a deep, practical understanding of Azure security technologies rather than mere memorization of facts. Microsoft even offers a free practice assessment on its official certification page to help candidates gauge their readiness.

Free Microsoft Azure Security Engineer Associate AZ-500 Practice Test
- 20 Questions
- Unlimited
- Secure identity and accessSecure networkingSecure compute, storage, and databasesSecure Azure using Microsoft Defender for Cloud and Microsoft Sentinel
Free Preview
This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!
You administer an Azure Key Vault named ContosoVault that contains an RSA key named AppKey. Several applications reference the key by using the base URI (https://contosovault.vault.azure.net/keys/AppKey). Compliance requires that AppKey be rotated automatically every 30 days while the existing URI remains valid. You want a solution that involves the least ongoing administrative effort. What should you do?
Create an Azure Automation runbook that calls az keyvault key rotate on AppKey every 30 days.
Configure a key rotation policy on AppKey with a lifetime action of Rotate set to 30 days.
Enable soft delete and purge protection on ContosoVault.
Set the key's activation and expiration dates so that it expires 30 days after creation.
Answer Description
Configuring a key rotation policy on AppKey with a lifetime action of Rotate instructs Azure Key Vault to create a new version of the key every 30 days. The key name and base URI remain unchanged, so applications that call the base identifier automatically begin using the newest version without modification. Setting only an expiration date makes the key unusable after 30 days but does not create a new version. Soft delete or purge protection protect against accidental deletion rather than perform rotation. While an Azure Automation runbook could call the rotate command on a schedule, it requires additional resources and ongoing maintenance, making it a less efficient solution for this requirement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a key rotation policy in Azure Key Vault?
Why is using an Azure Automation runbook less efficient for key rotation?
What is the difference between soft delete/purge protection and key rotation?
An Azure virtual network contains a Windows Server 2022 VM named VM1 that has no public IP. Administrators connect to VM1 through an Azure Bastion host in the same virtual network. You need to enable just-in-time (JIT) access so that VM1 remains reachable only via Bastion. Which JIT rule configuration should you apply?
Open TCP port 443 for the AzureBastionSubnet address range.
Open TCP port 3389 for the Internet service tag.
Open TCP port 22 for any source address.
Open TCP port 3389 for the VirtualNetwork service tag.
Answer Description
Azure Bastion connects to the target VM over its private network using the standard management port (TCP 3389 for Windows). The traffic originates from an address inside the same virtual network, which is represented in NSG and JIT rules by the VirtualNetwork service tag. Therefore, the JIT rule should open TCP port 3389 only for the VirtualNetwork tag. Allowing the Internet tag would expose the port publicly, opening port 443 would not let Bastion reach the VM, and opening port 22 targets SSH rather than RDP.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a VirtualNetwork service tag in Azure?
How does Azure Bastion securely connect to VMs without a public IP?
Why is TCP port 3389 used for JIT access to a Windows VM via Azure Bastion?
Your company's security policy requires the following:
- Helpdesk staff must be able to reset any user's password in Microsoft Entra ID.
- Helpdesk staff must not be able to create, delete, or update user properties other than the password.
You decide to create a custom Microsoft Entra (Azure AD) administrative role and assign it to the Helpdesk group.
Which Microsoft Graph permission should you include in the custom role to meet the requirements?
microsoft.directory/applications/standard/read
microsoft.directory/users/createAsOwner
microsoft.directory/users/password/update
microsoft.directory/users/basic/update
Answer Description
The microsoft.directory/users/password/update permission allows a principal to perform password resets for any user but does not grant rights to delete users or update other user properties. Therefore, including only this permission in the custom Microsoft Entra role lets Helpdesk staff reset passwords while preventing broader user management capabilities. The other listed permissions either allow additional user changes, such as creating or deleting users, or are unrelated to user password management.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Microsoft Graph and how does it relate to Microsoft Entra ID?
What is the significance of the microsoft.directory/users/password/update permission?
How do you create a custom role in Microsoft Entra ID to limit permissions?
Your company has an Azure SQL Database named db1 in the East US region. You need to ensure that developers on the corporate network can connect to db1 through the existing site-to-site VPN without exposing the database to the public internet. The solution must use only private IP addressing and minimize changes to routing. What should you configure?
Enable a virtual network service endpoint for Microsoft.Sql on the subnet that contains the VPN gateway.
Create a Private Endpoint for db1 in the virtual network that is connected by the VPN, and link a private DNS zone to that network.
Deploy an Azure Front Door instance with Web Application Firewall in front of db1.
Configure IP firewall rules on db1 to allow the on-premises public IP address space.
Answer Description
A Private Endpoint assigns a private IP address from the connected virtual network to the Azure SQL Database. Traffic to the database remains on the virtual network and can traverse VPN or ExpressRoute private peering without ever using the public endpoint. Linking a private DNS zone allows clients to resolve the database's fully qualified domain name to the private IP automatically.
Service endpoints do not work from on-premises networks because traffic still targets the public endpoint. IP firewall rules still expose the database's public endpoint to the internet. Azure Front Door is a public reverse-proxy service and does not satisfy the private-IP-only requirement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Private Endpoint in Azure?
What is a private DNS zone in Azure, and why is it needed?
Why don’t service endpoints work for on-premises connections?
You need to publish an e-commerce site through a single public endpoint (https://www.contoso.com/). Origins:
- Azure Storage static website for product images
- Azure App Service for the web application Requirements:
- Route /images and /app paths to the correct origin.
- Cache only /images at Microsoft edge POPs.
- Inspect all traffic with a built-in WAF.
- Deploy the fewest Azure services.
Which design meets all requirements?
Use Azure CDN Standard for the Storage site and place an Azure Application Gateway with WAF in front of the App Service, publishing both through the same DNS zone.
Configure Azure Traffic Manager to direct traffic to separate Azure CDN endpoints for images and application content, each secured by its own WAF.
Create an Azure Front Door (classic) profile with origin groups for the Storage account and App Service, relying on default caching for both paths.
Deploy Azure Front Door Standard, add both origins, create a cached /images route to Storage and an uncached /app route to the App Service, and attach a Front Door WAF policy.
Answer Description
Azure Front Door Standard or Premium can host both origins under one global endpoint. You create two routes: one matching /images/* that forwards to the Storage static website with caching enabled, and another matching /app/* that forwards to the App Service with caching disabled. A Front Door WAF policy attaches to the profile, giving edge inspection. Because all capabilities-global routing, CDN-grade caching, and WAF-reside in one Front Door deployment, no additional services are required. Other options either need extra components or lack required features.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure Front Door Standard and how does it differ from the classic version?
What is a WAF in Azure Front Door, and why is it important?
What are edge POPs, and why are they used for caching in Azure Front Door?
You enabled Microsoft Defender for Servers Plan 2 on an Azure subscription that contains several virtual machines (VMs). You must now turn on agentless vulnerability assessment for the VMs. The solution must succeed without installing any additional extensions or agents.
Which prerequisite must each VM meet before agentless scanning can be successfully enabled?
The Log Analytics agent must already be installed on the VM.
The VM must use Azure managed disks for all attached disks.
Azure Disk Encryption must be enabled on the OS disk.
The VM must be tagged with DefenderForServers-Scan=Enabled.
Answer Description
Agentless vulnerability assessment in Microsoft Defender for Servers Plan 2 works by creating secure snapshots of the disks that back a VM. The capability is supported only for VMs that use Azure managed disks, because snapshots can be taken only from managed disks. VMs that rely on unmanaged disks or that have ephemeral OS disks are skipped automatically. Consequently, a VM must be configured with managed disks for agentless vulnerability assessment to run.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Azure managed disks and why are they required for agentless vulnerability assessment?
What is agentless vulnerability assessment and how does it work in Microsoft Defender for Servers Plan 2?
What happens if a VM uses unmanaged disks or ephemeral OS disks? Are they excluded from agentless vulnerability assessment?
Contoso runs identical web applications on Azure App Service in East US and West Europe. You must expose a single public endpoint that: terminates TLS with a custom certificate; evaluates a Web Application Firewall policy as close to users as possible; supports cookie-based session affinity; and automatically directs clients to the nearest healthy backend. Which Azure service meets all requirements?
Azure Front Door Standard or Premium with an attached WAF policy
Azure Traffic Manager in Performance mode front-ending the two App Service instances
Separate Azure Application Gateway v2 instances in each region configured for multi-site hosting
An Azure Load Balancer Standard paired with Azure DDoS Protection Standard
Answer Description
Azure Front Door provides a global point of presence that performs layer-7 load balancing and routes each request to the closest available backend. It offloads TLS for custom domains, supports built-in Web Application Firewall policies enforced at the edge, and can maintain user affinity by injecting a session cookie.
- A regional Azure Application Gateway still requires a separate gateway per region and does not offer global anycast entry points.
- Azure Traffic Manager is DNS-based; it cannot terminate TLS, apply a WAF policy, or maintain session affinity.
- Azure Load Balancer operates at layer 4 and cannot perform TLS offload, WAF inspection, or cookie-based affinity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure Front Door and how does it work for global load balancing?
What is the role of Web Application Firewall (WAF) in Azure Front Door?
How does Azure Front Door maintain session affinity using cookies?
You administer an Azure storage account that hosts several Azure Files SMB shares. All employees sign in to their Windows 10 computers by using on-premises Active Directory accounts that are synchronized to Microsoft Entra ID. The security team insists that users must map the shares with their existing Kerberos credentials and that no storage account keys or SAS tokens are to be distributed. Which configuration meets these requirements?
Regenerate and deploy the two storage account access keys to users every 90 days by using a Group Policy script.
Enable a private endpoint for the storage account and disable all public network access.
Create stored-access-policy SAS tokens for each share and distribute the SAS URIs to users.
Enable Microsoft Entra Kerberos authentication for Azure Files without deploying Azure AD Domain Services.
Answer Description
Enable Microsoft Entra (Azure AD) Kerberos authentication directly on the storage account. With Azure AD Kerberos, hybrid identities that exist in both on-premises AD DS and Microsoft Entra ID receive Kerberos tickets issued by Azure AD, letting users access SMB shares with their domain credentials. No storage account keys or SAS tokens are required. Shared keys and SAS rely on NTLM or token-based authentication rather than Kerberos, and private endpoints affect only network routing, not authentication.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Microsoft Entra Kerberos authentication?
How does Kerberos authentication differ from NTLM or token-based authentication?
What are the benefits of enabling a private endpoint for Azure storage accounts?
Your SOC must ingest Syslog from 40 on-premises Linux servers into Microsoft Sentinel. The data should also be copied to an existing Log Analytics workspace used by the IT ops team. You want the simplest deployment that avoids installing multiple agents per server. Which agent should you use?
Azure Diagnostics extension for Linux
Log Analytics agent (MMA/OMS)
Dependency agent
Azure Monitor agent managed through a Data Collection Rule
Answer Description
The Azure Monitor agent (AMA) can be configured with a data collection rule to collect Syslog events and route the same data to multiple destinations-up to five Log Analytics workspaces or Event Hubs-at the same time. This lets you send the events to both the Microsoft Sentinel workspace and the IT operations workspace with a single agent on each server. The legacy Log Analytics (MMA/OMS) agent supports only one workspace on Linux, the Dependency agent is used for process-dependency mapping rather than log collection, and the Azure Diagnostics extension cannot forward Syslog to Microsoft Sentinel.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Azure Monitor agent (AMA)?
What are Data Collection Rules (DCRs) in Azure Monitor agent?
How does the Azure Monitor agent compare to the Log Analytics agent (MMA/OMS)?
Contoso publishes several internal REST APIs through a single Azure API Management (APIM) instance. The security team issues the following requirements for one of the APIs:
- Client applications must authenticate with Microsoft Entra ID, and APIM-not the backend-must validate the issued access tokens.
- Any request whose payload exceeds 128 KB must be rejected before it reaches the backend service.
- Business analysts who use the APIM developer portal must be able to obtain test tokens without exposing a client secret in the browser.
Which APIM configuration meets all of these requirements?
Require mutual TLS on the API, add an IP-filter policy that allows only APIM gateway IP addresses, and add a rate-limit-by-key policy that limits each caller to 50 requests per minute.
Enable the implicit-grant flow for the developer portal, add an enforce-https policy, and add a validate-jwt policy that references the Microsoft Entra ID metadata endpoint.
Deploy the APIM instance in internal VNet mode, enable static IP whitelisting on the backend, and add a set-body policy that replaces any request body larger than 128 KB with an error message.
Create an OAuth 2.0 authorization server in APIM that uses the authorization-code grant, add a validate-azure-ad-token inbound policy to the API, and add a validate-content inbound policy that sets a 128-KB maximum body size.
Answer Description
Defining an OAuth 2.0 authorization server in APIM that uses the authorization-code grant lets the developer portal obtain Microsoft Entra ID tokens on behalf of users without exposing a client secret in the browser. Adding the validate-azure-ad-token inbound policy causes the gateway to verify every JSON Web Token issued by Microsoft Entra ID, ensuring unauthenticated calls are blocked. The validate-content inbound policy, configured with a 128-KB size limit, rejects any oversized request body before the call reaches the backend. None of the alternative configurations satisfies all three requirements simultaneously: mutual TLS does not supply Entra ID tokens, IP filtering does not limit payload size, and the implicit grant exposes tokens directly in the browser without a secure back-channel exchange.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an OAuth 2.0 authorization server in APIM?
What does the validate-azure-ad-token inbound policy do?
What does the validate-content inbound policy do in APIM?
You have an Azure Storage account named contososa and create a private endpoint for it in VNET1. Virtual machines in VNET1 resolve contososa.blob.core.windows.net to the private IP, but on-premises servers connected through a site-to-site VPN still receive the public IP. You must ensure on-premises servers use the private endpoint without changing connection strings. What should you do?
Configure the on-premises DNS servers to forward the zone privatelink.blob.core.windows.net to a DNS forwarder hosted in VNET1.
Disable public network access on the storage account.
Enable an Azure Storage service endpoint on the VPN gateway subnet.
Add an A record for contososa.blob.core.windows.net in the on-premises DNS zone that points to the private IP address.
Answer Description
The on-premises DNS servers must resolve the storage account's FQDN to the private IP that Azure assigned to the private endpoint. The recommended approach is to create a conditional forwarder that sends all queries for the privatelink.blob.core.windows.net zone to a DNS forwarder (for example, Azure DNS Private Resolver or a custom DNS server) located inside VNET1, where the private DNS zone is linked. This causes on-premises queries for contososa.blob.core.windows.net to be answered with the private IP.
Adding a static A record on-premises is not advised because the private IP can change if the endpoint is recreated. Disabling public network access does not fix DNS resolution; the name would still resolve to the public IP and connectivity would fail. Service endpoints are unrelated to private endpoints and do not influence DNS behavior.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is a DNS forwarder used instead of a static A record?
What is the privatelink.blob.core.windows.net DNS zone?
What is the Azure DNS Private Resolver and how does it help here?
You have two Azure Functions running in separate Azure subscriptions. Both functions must read secrets from the same Azure Key Vault, and your solution must minimize secret-management overhead. You want a single identity that you can grant Key Vault access once and reuse from both functions without handling credential rotation. Which option should you choose?
Use a shared access signature (SAS) token stored in Azure App Configuration and reference it from both Function Apps.
Register an Azure AD application, generate a client secret, and store the secret in each Function App's configuration.
Enable a system-assigned managed identity on each Function App and add both identities to the Key Vault access policy.
Create a single user-assigned managed identity and assign it to both Function Apps, then grant that identity access to the Key Vault.
Answer Description
A user-assigned managed identity is an independent Azure resource that can be attached to multiple other resources, including Function Apps that reside in different subscriptions. Because the identity is managed by Azure AD, credentials are automatically rotated, so no secrets need to be stored or updated. A system-assigned managed identity is tied to a single resource and cannot be shared, so you would have to create and grant access for two separate identities. An Azure AD application with a client secret requires manual secret storage and rotation, defeating the goal of minimal secret management. Shared access signature (SAS) tokens are not used for Azure Key Vault authentication and would require manual rotation as well.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a user-assigned managed identity in Azure?
How does Azure Key Vault manage access control?
Why are shared access signature (SAS) tokens not suitable for Azure Key Vault authentication?
You manage an Azure route-based VPN gateway (VpnGw2 SKU) connected to an on-premises hardware VPN device. Governance mandates IPsec/IKE Phase 2 integrity as SHA256, encryption as AES256, and Diffie-Hellman Group 14. You must enforce these parameters from Azure without disrupting the existing tunnel. What should you do first?
Create and apply a custom IPsec/IKE policy on the current site-to-site VPN connection.
Change the gateway to active-active mode and re-establish the tunnel.
Enable policy-based traffic selectors on the VPN connection.
Convert the connection to ExpressRoute for private connectivity.
Answer Description
To control the cryptographic parameters negotiated during tunnel establishment, Azure allows you to attach a custom IPsec/IKE policy to a site-to-site connection when the gateway is route-based. Creating and applying the policy lets you specify exact Phase 1 and Phase 2 algorithms, including AES256 encryption, SHA256 integrity, and DH Group 14. Policy-based traffic selectors influence which prefixes are advertised, but do not change cryptographic suites. Moving to active-active has no effect on algorithm selection, and switching to ExpressRoute eliminates the VPN altogether instead of securing it. Therefore, the correct first step is to define and assign a custom IPsec/IKE policy on the existing connection.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an IPsec/IKE policy in Azure?
What is the difference between route-based and policy-based VPN gateways?
What happens when you enable policy-based traffic selectors on a VPN connection?
Your company runs multiple Azure workloads and is deciding whether to enable Azure DDoS Protection Standard for a new subscription. You must deploy the service only if there is a clear business justification beyond the default Basic protection. In which of the following scenarios would enabling Azure DDoS Protection Standard be most appropriate?
Development and test virtual machines that occasionally expose Remote Desktop over a public IP
An internet-facing payment processing application that requires an SLA-backed DDoS mitigation service and cost protection against scale-out during volumetric attacks
An internal line-of-business API that is reachable only through a Private Endpoint
A publicly accessible static website hosted in Azure Storage fronted by Azure Front Door Premium
Answer Description
Azure DDoS Protection Standard is designed for internet-facing resources that could suffer large-scale network attacks and where rapid, SLA-backed mitigation, cost protection, and access to the DDoS Rapid Response team are valuable. A payment-processing web app exposed through public IP addresses matches these criteria. Development/test VMs, private-only endpoints, and workloads already fronted by a service such as Azure Front Door Premium either have lower risk or include their own edge-level protection, so purchasing the standalone DDoS Standard service is usually unnecessary.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure DDoS Protection Standard?
How does Azure DDoS Protection Standard differ from Basic protection?
What types of workloads benefit most from Azure DDoS Protection Standard?
Your company runs an Azure App Service web app that is not in an App Service Environment. You deploy an Azure SQL Managed Instance inside an Azure virtual network. The web app must connect to the managed instance using only private IP addresses, and the traffic must remain on the Microsoft backbone without traversing the public Internet. Which feature should you enable on the web app to meet these requirements?
Service endpoint for Microsoft.Sql
Gateway-required VNet Integration
Private Endpoint for the web app
Regional VNet Integration
Answer Description
Regional VNet Integration connects an App Service app to a subnet in the same region. Outbound traffic from the app to resources in that virtual network, such as an Azure SQL Managed Instance, is sent over private IP addresses and stays on the Microsoft backbone. Private Endpoint for the web app provides private inbound access to the app but does not make the app's outbound traffic private. Gateway-required VNet Integration uses a VPN gateway, is intended for cross-region scenarios, and is not needed here. A service endpoint for Microsoft.Sql secures traffic from a subnet to Azure SQL but does not apply to traffic that originates from an App Service app that is outside the virtual network.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Regional VNet Integration in Azure?
How does Regional VNet Integration differ from Gateway-required VNet Integration?
Why is Private Endpoint not suitable for ensuring outbound traffic privacy in this case?
You run a production web application on Azure App Service. A recent penetration test shows that the app still accepts TLS 1.0 and TLS 1.1 connections. The security team mandates that the site must allow only TLS 1.2 or later, and no code changes or downtime are acceptable. Which action should you take to meet the requirement?
Place the app behind an Azure Application Gateway configured with a custom TLS policy that disables TLS 1.0 and TLS 1.1.
Upload a new server certificate that explicitly supports only TLS 1.2 cipher suites.
Add a rewrite rule in web.config that redirects all HTTP and TLS 1.0/1.1 traffic to HTTPS with TLS 1.2.
In the App Service TLS/SSL settings, change the Minimum TLS Version setting to 1.2.
Answer Description
Azure App Service lets you restrict the accepted TLS protocol versions at the platform level. In the TLS/SSL settings blade (or through the site configuration property "minTlsVersion") you can set the Minimum TLS Version to 1.2. The platform then terminates any connection using TLS 1.0 or 1.1 before it reaches the application, so no code changes are required and traffic continues to flow uninterrupted. Uploading a new certificate does not influence the protocol version that clients can negotiate, web.config rules only affect redirects and cannot disable older TLS handshakes, and inserting an Application Gateway is unnecessary extra infrastructure when the App Service platform natively enforces the policy.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is TLS and why is TLS 1.2 preferred?
How can you configure the Minimum TLS Version in Azure App Service?
What is the difference between TLS enforcement provided by Azure App Service and Azure Application Gateway?
Your company has an AWS Organization that contains about 300 member accounts. As an Azure security engineer, you need to onboard every current AWS account to Microsoft Defender for Cloud while minimizing ongoing administrative effort. Which onboarding approach should you choose?
Create one single-account AWS connector for each of the 300 member accounts.
Install Azure Arc-enabled servers agent on every EC2 instance in the organization.
Create an AWS Organization connector in Defender for Cloud that uses a CloudFormation StackSet deployed from the management account.
Use Azure Lighthouse to delegate the AWS accounts to the Azure tenant and then enable Defender for Cloud.
Answer Description
The AWS Organization connector is initiated from the AWS management (payer) account and deploys an AWS CloudFormation StackSet that creates a single cross-account role in every existing member account, letting you onboard all 300 accounts in one operation. Although any future AWS accounts added to the organization must still be onboarded manually, this option is far less work than creating 300 individual single-account connectors or installing Azure Arc on every server. Azure Lighthouse cannot register AWS environments with Defender for Cloud.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Microsoft Defender for Cloud?
What is an AWS CloudFormation StackSet?
How does the AWS Organization connector simplify onboarding in Defender for Cloud?
You manage dozens of virtual networks that span multiple subscriptions. You must ensure that no virtual machine in any virtual network can ever receive inbound SSH (TCP 22) traffic from the public Internet, even if an administrator later modifies or deletes local Network Security Groups (NSGs). You want a centrally managed, always-enforced control that applies across subscriptions.
Which Azure Virtual Network Manager feature should you implement first?
Create a security admin configuration with a deny inbound TCP 22 rule and assign it to the relevant network groups.
Enable Azure DDoS Protection Standard on each virtual network and configure a custom policy to drop TCP 22.
Deploy a connectivity configuration in hub-and-spoke mode that advertises custom routes blocking TCP 22.
Place all virtual machines in an Application Security Group and reference that group in subnet-level NSG rules that deny TCP 22.
Answer Description
Azure Virtual Network Manager (AVNM) lets you create a security admin configuration that contains security admin rules. These rules are evaluated before any NSG on the subnet or network interface; if an admin later changes or removes an NSG, the security admin rule is still enforced. Connectivity configurations only build peering topologies, an Azure DDoS plan cannot block specific TCP ports, and Application Security Groups rely on NSGs, which can be altered and therefore do not meet the requirement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a security admin configuration in Azure Virtual Network Manager?
How do security admin configuration rules differ from NSG rules?
Why don't connectivity configurations or Azure DDoS Protection meet the requirement?
You plan to implement a Conditional Access policy that requires multifactor authentication for any interactive management of Azure resources. The policy must take effect when users connect through the Azure portal, Azure PowerShell, Azure CLI, or the Azure Resource Manager REST API, but it must not affect access to productivity SaaS applications such as Microsoft 365. Which cloud-app selection should you configure in the policy?
Microsoft Admin Center
All cloud apps
Azure Active Directory Graph
Microsoft Azure Management
Answer Description
Choose the built-in cloud app named "Microsoft Azure Management." This app groups the Azure portal together with the main Azure Resource Manager management interfaces, including Azure PowerShell, Azure CLI, and the ARM REST API. Targeting it enforces the policy on the common Azure management paths while leaving other cloud apps-such as the Microsoft 365 workload apps-unaffected. Selecting "All cloud apps" would also catch the management endpoints but would unintentionally apply the policy to every application in the directory. The remaining options do not cover all required management methods.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'Conditional Access policy' mean in the context of Azure security?
Why is 'Microsoft Azure Management' the correct cloud-app selection for this Conditional Access policy?
How does filtering app access using Conditional Access policies enhance security on Azure management paths?
You manage Azure virtual networks configured in a hub-and-spoke layout. A security engineer reports that an NVA deployed in a spoke may be rewriting outbound packets. Without installing any agent inside the affected Linux VM, you must collect packet-level data as the traffic leaves the VM to validate the claim. Which Network Watcher capability should you use?
IP flow verify
NSG flow logs
Connection monitor
Packet capture
Answer Description
Network Watcher packet capture lets you start an on-demand or scheduled trace that records packets as they enter or leave an Azure VM. The feature deploys a lightweight, Azure-managed extension automatically and does not require you to install or configure software inside the guest OS. IP flow verify only checks whether a flow is allowed or denied by NSG rules; it does not capture packets. Connection monitor measures connectivity and latency but provides no packet payloads. NSG flow logs record summary information about flows that cross an NSG, not the full packets themselves. Therefore, packet capture is the only option that meets the requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of Network Watcher in Azure?
How does packet capture work in Network Watcher?
What is the difference between packet capture and NSG flow logs?
Woo!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.