Foren » Discussions » TOP Certificate AZ-500 Exam: Microsoft Azure Security Technologies - Valid Microsoft AZ-500 Exam Outline

gywudosu
Avatar

P.S. Free & New AZ-500 dumps are available on Google Drive shared by CramPDF: https://drive.google.com/open?id=1O4aSOi_cTfRCbe7XWQuPFTzURtlOMoXf The three versions of our AZ-500 training materials each have its own advantage. On the one hand, the software version can simulate the real AZ-500 examination for all of the users in windows operation system. By actually simulating the real test environment. On the other hand, if you choose to use the software version, you can download our AZ-500 Exam Prep only for Windows system. We strongly believe that the software version of our AZ-500 study materials will be of great importance for you to prepare for the exam and all of the employees in our company wish you early success.

For more info visit:

Microsoft AZ-500 Exam Reference

How much AZ-500 Exam Cost

The exam cost of the Microsoft AZ-500 exam is 165 USD. >> Certificate AZ-500 Exam <<

100% Pass Quiz Microsoft - AZ-500 - Microsoft Azure Security Technologies –Trustable Certificate Exam

When prepare a exam, we may face the situation like this: there are so many books in front of me, which one should I choose for preparing for the exam? If you are ready to attentd the AZ-500 exam, then just choose us, our product is the one you can trust, with the experienced professionals to expect and update, the quality of the product is quite high. Furthermore, our company respect the privacy of the customers, with our product, there is no need for you to worry about the probleml. Except for this, if you buy product for the AZ-500 Exam , you will get the free update for one year, and money back gurantee within 60 days after you buy it, so don't hesitate, just do it.

Topics for AZ-500 Test

It is important to keep in mind that before taking this exam, you must form a strong knowledge and understanding of the basic IT security principles. Also, if you want to nail the Microsoft AZ-500 exam at the first attempt, you should explore the four main topic areas listed below:

  • Data and App Security.
  • Identity and Access Management;
  • Platform Protection Implementation;
  • Security Operation Management;

Within the Identity and Access Management domain, the abilities being looked at include managing identities for Azure Active Directory, where the focus is on service principals security, groups for AD directory, AD users, configuring password writeback, authentication methods, and Azure subscriptions. The next item is about using Azure-based AD in configuring secure access. This encompasses technical issues such as Azure AD PIM (Privileged Identity Management), access reviews, activating and configuring PIM, conditional policies for access, and identity protection for Azure AD. Again, managing access for apps is another field to be studied in this first topic. Here, candidates build their capacity in aspects like app registration and API access. The final part involves managing access control where it is broken down into permissions for subscribing and resources, group permissions for resources, custom RBAC roles, interpreting permissions, and checking access. Within the AZ-500 segment of Platform Protection Implementation, candidates must begin by implementing advanced security for networks. This covers VPN, groups for network security, Azure Firewall, application gateway called Azure Front Door, web apps firewall, Azure Bastion, service endpoints, and DDoS protection. The final step involves configuring compute advanced security. In this section, applicants learn about endpoint protection, carrying out VMs system updates, authentication, security configuration, vulnerability management, configuring SSL/TLS certs, and performing automation updates among others. And as far as the Security Operations Management objective is concerned, the areas of study include the use of Azure Monitor in security monitoring. With this, learning encompasses alerts, security logs, and diagnostic logging as well as log retention. It is followed by the area where security is monitored with the help of Azure Security Center. This concerns vulnerability scans, VM access, centralized management of policy, configuring compliance policies, and evaluating for compliance with the help of Azure Security Center. Also, to be covered is monitoring security with the help of Azure Sentinel. Learners will consider aspects such as creating and customizing alerts, configuring data sources, evaluating data sources and results coming from Azure Sentinel, and configuring workflow automation. Finally, candidates will get to cover the configuration of security policies, which includes configuring security settings and a playbook. The final AZ-500 exam topic talking about Data and App Security begins by looking at configuring storage security. Here, exam-takers look at access control, key management, authentication of Azure AD, Azure AD Domain Services, Signatures for Shared Access, policy for shared access, and encryption of storage service. The second part involves configuring database security. This covers database authentication and auditing, advanced threat defence for Azure SQL, database encryption, and implementing encryption for the Azure database. Lastly is configuring and managing Key Vault. This touches Key Vault access, managing permissions to certificates, keys, and secrets, RBAC configuration, managing certificates, and secrets, configuring key rotation, and backing up and restoring items for Key Vault.

Microsoft Azure Security Technologies Sample Questions (Q190-Q195):

NEW QUESTION # 190
You are evaluating the security of the network communication between the virtual machines in Sub2.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Answer: ** Explanation:

NEW QUESTION # 191**
You have an Azure subscription that contains an Azure key vault named Vault1.
On January 1, 2019, Vault1 stores the following secrets.

Which can each secret be used by an application? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Answer: ** Explanation:

Explanation:
Box 1: Never
Password1 is disabled.
Box 2: Only between March 1, 2019 and May 1,
Password2:

Reference:
https://docs.microsoft.com/en-us/powershell/module/azurerm.keyvault/set-azurekeyvaultsecretattribute
NEW QUESTION # 192**
You have an Azure subscription named Sub1 that contains the virtual machines shown in the following table.

You need to ensure that the virtual machines in RG1 have the Remote Desktop port closed until an authorized user requests access.
What should you configure?

  • A. an application security group
  • B. just in time (JIT) VM access
  • C. Azure Active Directory (Azure AD) Privileged Identity Management (PIM)
  • D. Azure Active Directory (Azure AD) conditional access

Answer: B Explanation:
Explanation
Just-in-time (JIT) virtual machine (VM) access can be used to lock down inbound traffic to your Azure VMs, reducing exposure to attacks while providing easy access to connect to VMs when needed.
Note: When just-in-time is enabled, Security Center locks down inbound traffic to your Azure VMs by creating an NSG rule. You select the ports on the VM to which inbound traffic will be locked down. These ports are controlled by the just-in-time solution.
When a user requests access to a VM, Security Center checks that the user has Role-Based Access Control (RBAC) permissions that permit them to successfully request access to a VM. If the request is approved, Security Center automatically configures the Network Security Groups (NSGs) and Azure Firewall to allow inbound traffic to the selected ports and requested source IP addresses or ranges, for the amount of time that was specified. After the time has expired, Security Center restores the NSGs to their previous states. Those connections that are already established are not being interrupted, however.
Reference:
https://docs.microsoft.com/en-us/azure/security-center/security-center-just-in-time
NEW QUESTION # 193
You have the Azure key vaults shown in the following table.

KV1 stores a secret named Secret1 and a key for a managed storage account named Key1.
You back up Secret1 and Key1.
To which key vaults can you restore each backup? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Answer: ** Explanation:

Explanation

The backups can only be restored to key vaults in the same subscription and same geography. You can restore to a different region in the same geography.
NEW QUESTION # 194**
You need to create an Azure key vault. The solution must ensure that any object deleted from the key vault be retained for 90 days.
How should you complete the command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Answer: ** Explanation:

Explanation

Box 1: -EnablePurgeProtection
If specified, protection against immediate deletion is enabled for this vault; requires soft delete to be enabled as well.
Box 2: -EnableSoftDelete
Specifies that the soft-delete functionality is enabled for this key vault. When soft-delete is enabled, for a grace period, you can recover this key vault and its contents after it is deleted.
References:
https://docs.microsoft.com/en-us/powershell/module/azurerm.keyvault/new-azurermkeyvault
NEW QUESTION # 195
...... **AZ-500 Exam Outline
: https://www.crampdf.com/AZ-500-exam-prep-dumps.html BTW, DOWNLOAD part of CramPDF AZ-500 dumps from Cloud Storage: https://drive.google.com/open?id=1O4aSOi_cTfRCbe7XWQuPFTzURtlOMoXf