Microsoft AZ-500 dumps

Microsoft AZ-500 Exam Dumps

Microsoft Azure Security Technologies
737 Reviews

Exam Code AZ-500
Exam Name Microsoft Azure Security Technologies
Questions 457 Questions Answers With Explanation
Update Date July 07,2025
Price Was : $88.2 Today : $49 Was : $106.2 Today : $59 Was : $124.2 Today : $69

Pass the AZ-500 Exam on Your First Try – 100% Guaranteed Study Material

Struggling to find the right resources to prepare for the Microsoft Azure Security Technologies certification? Your search ends here. At Certionary, we offer real exam-based dumps and expertly crafted study guides that mirror the actual exam format — giving you everything you need to pass with confidence.

Why Choose Certionary for AZ-500?

  • Verified Exam Questions & Answers – Straight from real exam patterns
  • Accurate & Updated Content – Covers the latest AZ-500 syllabus
  • Downloadable PDF Format – Study offline anytime, anywhere
  • Designed for Fast Learning – No filler, just what you need to know
  • 100% Pass Guarantee – Or your money back

We don’t just help you prepare — we guarantee your success.

What’s Inside?

  • Full collection of AZ-500 real questions & verified answers
  • Practice materials that reflect actual exam difficulty
  • Clear explanations to help you understand, not just memorize
  • Easy-to-navigate PDF files — use on your phone, tablet, or desktop
  • Lifetime access & free future updates

Our dumps are trusted by thousands of IT professionals around the world. You study less, learn more, and pass faster. Why take risks with outdated material or generic practice questions? With Certionary, you get precisely what you need to pass — no guesswork, no stress.

Microsoft AZ-500 Exam Reviews

Microsoft AZ-500 Sample Questions

Question # 1

You plan to implement JIT VM access. Which virtual machines will be supported?

A. VM1 and VM3 only 
B. VM1. VM2. VM3, and VM4 
C. VM2, VM3, and VM4 only 
D. VM1 only 



Question # 2

You need to meet the technical requirements for the finance department users.Which CAPolicy1 settings should you modify?

A. Cloud apps or actions 
B. Conditions 
C. Grant 
D. Session 



Question # 3

From Azure Security Center, you need to deploy SecPol1.What should you do first?

A. Enable Azure Defender. 
B. Create an Azure Management group. 
C. Create an initiative. 
D. Configure continuous export. 



Question # 4

You need to encrypt storage1 to meet the technical requirements. Which key vaults canyou use?

A. KeyVault1 only 
B. KeyVaurt2 and KeyVault3 only 
C. KeyVault1 and KeyVault3 only 
D. KeyVault1 KeyVault2 and KeyVault3 



Question # 5

You plan to configure Azure Disk Encryption for VM4 Which key vault can you use to storethe encryption key?

A. KeyVault1 
B. KeyVault3 
C. KeyVault2 



Question # 6

Lab TaskTask 4You need to ensure that when administrators deploy resources by using an AzureResource Manager template, the deployment can access secrets in an Azure key vaultnamed KV31330471.



Question # 7

You have an Azure AD tenant.You plan to implement an authentication solution to meet the following requirements:• Require number matching.• Display the geographical location when signing in.Which authentication method should you include in the solution?

A. SMS
B. Temporary Access Pass
C. Microsoft Authenticator
D. FID02 security key



Question # 8

You have an Azure subscription that uses Microsoft Defender for Cloud.You have an Amazon Web Services (AWS) account.You need to ensure that when you deploy a new AWS Elastic Compute Cloud (EC2)instance, the Microsoft Defender for Servers agent installs automatically. What should you configure first?

A. the log Analytics agent
B. the Azure Monitor agent
C. the native cloud connector
D. the classic cloud connector



Question # 9

Lab TaskTask 5A user named Debbie has the Azure app installed on her mobile device.You need to ensure that [email protected] is alerted when a resource lock is deleted.



Question # 10

You have an Azure subscription that contains a storage account and an Azure web appnamed App1.App1 connects to an Azure Cosmos DB database named Cosmos1 that uses a privateendpoint named Endpoint1. Endpoint1 has the default settings.You need to validate the name resolution to Cosmos1.Which DNS zone should you use?

A. Endpoint1. Privatelink,blob,core,windows,net
B. Endpoint1. Privatelink,database,azure,com
C. Endpoint1. Privatelink,azurewebsites,net
D. Endpoint1. Privatelink,documents,azure,com



Question # 11

Lab Taskuse the following login credentials as needed:To enter your username, place your cursor in the Sign in box and click on the usernamebelow.To enter your password. place your cursor in the Enter password box and click on thepassword below.Azure Username: Userl [email protected] Password: GpOAe4@lDgIf the Azure portal does not load successfully in the browser, press CTRL-K to reload theportal in a new browser tab.The following information is for technical support purposes only:Lab Instance: 28681041Task 8You need to prevent HTTP connections to the rg1lod28681041n1 Azure Storage account.



Question # 12

You have an Azure subscription that contains a Microsoft Defender External Attack SurfaceManagement (Defender EASM) resource named EASM1. You review the Attack SurfaceSummary dashboard. You need to identify the following insights:• Deprecated technologies that are no longer supported• Infrastructure that will soon expireWhich section of the dashboard should you review?

A. Securing the Cloud
B. Sensitive Services
C. attack surface composition
D. Attack Surface Priorities



Question # 13

You have an Azure subscription that contains an Azure Data Lake Storage account namedsa1.You plan to deploy an app named App1 that will access sa1 and perform operations,including Read. List, Create Directory, and Delete Directory.You need to ensure that App1 can connect securely to sa1 by using a private endpointWhat is the minimum number of private endpoints required for sa1?

A. 1
B. 2
C. 3
D. 4
E. 5



Question # 14

Lab TaskTask 1You need to ensure that connections from the Internet to VNET1\subnet0 are allowed onlyover TCP port 7777. The solution must use only currently deployed resources.



Question # 15

You are troubleshooting a security issue for an Azure Storage account You enable Azure Storage Analytics logs and archive It to a storage account. What should you use to retrievethe diagnostics logs?

A. Azure Storage Explorer
B. SQL query editor in Azure
C. Azure Monitor
D. Azure Cosmos DB explorer



Question # 16

You have an Azure subscription that is linked to an Azure Active Directory (Azure AD) tenant. From the Azure portal, you register an enterprise application.Which additional resource will be created in Azure AD?

A. a service principal
B. an X.509 certificate
C. a managed identity
D. a user account



Question # 17

You have an Azure subscription that uses Microsoft Sentinel. You need to create a Microsoft Sentinel notebook that will use the Guided Investigation - Anomaly Lookup template.What should you create first?

A. an analytics rule
B. a Log Analytics workspace 
C. an Azure Machine Learning workspace
D. a hunting query



Question # 18

You have an Azure Active Directory (Azure AD) tenant that contains a user named Admin1. Admin1 is assigned the Application developer role. You purchase a cloud app named App1 and register App1 in Azure AD. Admin1 reports that the option to enable token encryption for App1 is unavailable. You need to ensure that Admin1 can enable token encryption for App1 in the Azure portal. What should you do?

A. Upload a certificate for App1.
B. Modify the API permissions of App1.
C. Add App1 as an enterprise application.
D. Assign Admin! the Cloud application administrator role.



Question # 19

You need to create a new Azure Active Directory (Azure AD) directory named 12345678.onmicrosoft.com. The new directory must contain a new user named [email protected]. To complete this task, sign in to the Azure portal. 



Question # 20

You have a web app hosted on an on-premises server that is accessed by using a URL of https://www.contoso.com. You plan to migrate the web app to Azure. You will continue touse https://www.contoso.com. You need to enable HTTPS for the Azure web app. What should you do first?

A. Export the public key from the on-premises server and save the key as a P7b file.
B. Export the private key from the on-premises server and save the key as a PFX file that is encrypted by using TripleDES.
C. Export the public key from the on-premises server and save the key as a CER file.
D. Export the private key from the on-premises server and save the key as a PFX file that is encrypted by using AES256.



Question # 21

You need to ensure that a user named user2-12345678 can manage the properties of the virtual machines in the RG1lod12345678 resource group. The solution must use the principle of least privilege. To complete this task, sign in to the Azure portal. 



Question # 22

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name.You have been tasked with integrating Active Directory and the Azure AD tenant. You intend to deploy Azure AD Connect. Your strategy for the integration must make sure that password policies and user logon limitations affect user accounts that are synced to the Azure AD tenant, and that the amount of necessary servers are reduced. Solution: You recommend the use of password hash synchronization and seamless SSO. Does the solution meet the goal?

A. Yes
B. No



Question # 23

You have an Azure subscription that uses Azure Active Directory (Azure AD) Privileged Identity Management (PIM). A PIM user that is assigned the User Access Administrator role reports receiving an authorization error when performing a role assignment or viewing the list of assignments. You need to resolve the issue by ensuring that the PIM service principal has the correctpermissions for the subscription. The solution must use the principle of least privilege. Which role should you assign to the PIM service principle?

A. Contributor
B. User Access Administrator
C. Managed Application Operator
D. Resource Policy Contributor



Question # 24

You have an Azure subscription name Sub1 that contains an Azure Policy definition named Policy1. Policy1 has the following settings: Definition location: Tenant Root GroupCategory: Monitoring You need to ensure that resources that are noncompliant with Policy1 are listed in the Azure Security Center dashboard. What should you do first?

A. Change the Category of Policy1 to Security Center.
B. Add Policy1 to a custom initiative.
C. Change the Definition location of Policy1 to Sub1.
D. Assign Policy1 to Sub1.



Question # 25

You have an Azure Active Directory (Azure AD) tenant named contoso.comYou need to configure diagnostic settings for contoso.com. The solution must meet thefollowing requirements:• Retain loqs for two years.• Query logs by using the Kusto query language• Minimize administrative effort.Where should you store the logs?

A. an Azure Log Analytics workspace 
B. an Azure event hub 
C. an Azure Storage account 



Question # 26

You have an Azure Active Directory (Azure AD) tenant.You need to prevent nonprivileged Azure AD users from creating service principals inAzure AD.What should you do in the Azure Active Directory admin center of the tenant?

A. From the Properties Wade, set Enable Security defaults to Yes. 
B. From the Properties blade, set Access management fen Azure resources to No 
C. From the User settings blade, set Users can register applications to No 
D. From the User settings blade, set Restrict access to Azure AD administration portal toYes. 



Question # 27

You have an Azure subscription named Sub1.In Azure Security Center, you have a workflow automation named WF1. WF1 is configuredto send an email message to a user named User1.You need to modify WF1 to send email messages to a distribution group named Alerts.What should you use to modify WF1?

A. Azure Application Insights 
B. Azure Monitor 
C. Azure Logic Apps Designer 
D. Azure DevOps 



Question # 28

You have an Azure subscription that contains 100 virtual machines and has Azure SecurityCenter Standard tier enabled.You plan to perform a vulnerability scan of each virtual machine.You need to deploy the vulnerability scanner extension to the virtual machines by using anAzure Resource Manager template.Which two values should you specify in the code to automate the deployment of theextension to the virtual machines? Each correct answer presents part of the solution.NOTE: Each correct selection is worth one point.

A. the user-assigned managed identity 
B. the workspace ID 
C. the Azure Active Directory (Azure AD) ID 
D. the Key Vault managed storage account key 
E. the system-assigned managed identity 
F. the primary shared key 



Question # 29

You have multiple development teams that will create apps in Azure.You plan to create a standard development environment that will be deployed for eachteam.You need to recommend a solution that will enforce resource locks across the developmentenvironments and ensure that the locks are applied in a consistent manner.What should you include in the recommendation?

A. an Azure policy 
B. an Azure Resource Manager template 
C. a management group 
D. an Azure blueprint 



Question # 30

You have an Azure Sentinel deployment.You need to create a scheduled query rule named Rule1.What should you use to define the query rule logic for Rule1?

A. a Transact-SQL statement 
B. a JSON definition 
C. GraphQL 
D. a Kusto query 



Question # 31

You have an app that uses an Azure SQL database.You need to be notified if a SQL injection attack is launched against the database.What should you do?

A. Modify the Diagnostics settings for the database. 
B. Deploy the SQL Health Check solution in Azure Monitor. 
C. Enable Azure Defender for SQL for the database. 
D. Enable server-level auditing for the database. 



Question # 32

Your company has an Active Directory forest with a single domain, namedweylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant withthe same name.After syncing all on-premises identities to Azure AD, you are informed that users with agivenName attribute starting with LAB should not be allowed to sync toAzure AD.Which of the following actions should you take?

A. You should make use of the Synchronization Rules Editor to create an attribute-basedfiltering rule. 
B. You should configure a DNAT rule on the Firewall. 
C. B. You should configure a network traffic filtering rule on the Firewall. 
D. You should make use of Active Directory Users and Computers to create an attributebased filtering rule. 



Question # 33

Note: The question is included in a number of questions that depicts the identicalset-up. However, every question has a distinctive result. Establish if the solutionsatisfies the requirements.Your company has an Active Directory forest with a single domain, namedweylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant withthe same name.You have been tasked with integrating Active Directory and the Azure AD tenant. Youintend to deploy Azure AD Connect.Your strategy for the integration must make sure that password policies and user logonlimitations affect user accounts that are synced to the Azure AD tenant, and that theamount of necessary servers are reduced.Solution: You recommend the use of federation with Active Directory Federation Services(AD FS).Does the solution meet the goal?

A. Yes 
B. No 



Question # 34

Note: This question is part of a series of questions that present the same scenario.Each question in the series contains a unique solution that might meet the statedgoals. Some question sets might have more than one correct solution, while othersmight not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As aresult, these questions will not appear in the review screen.You have an Azure subscription named Sub1.You have an Azure Storage account named sa1 in a resource group named RG1.Users and applications access the blob service and the file service in sa1 by using severalshared access signatures (SASs) and stored access policies.You discover that unauthorized users accessed both the file service and the blob service.You need to revoke all access to sa1.Solution: You regenerate the Azure storage account access keys.Does this meet the goal?

A. Yes 
B. No 



Question # 35

You have an Azure subscription that contains two virtual machines named VM1 and VM2that run Windows Server 2019.You are implementing Update Management in Azure Automation.You plan to create a new update deployment named Update1.You need to ensure that Update! meets the following requirements:• Automatically applies updates to VM1 and VM2.• Automatically adds any new Windows Server 2019 virtual machines to Update1.What should you include in Update1?

A. a security group that has a Membership type of Dynamic Device 
B. a security group that has a Membership type of Assigned 
C. a Kusto query language query 
D. a dynamic group query



Question # 36

You have 10 on-premises servers that run Windows Server 2019.You plan to implement Azure Security Center vulnerability scanning for the servers.What should you install on the servers first?

A. the Security Events data connector in Azure Sentinel 
B. the Microsoft Endpoint Configuration Manager client 
C. the Azure Arc enabled servers Connected Machine agent 
D. the Microsoft Defender for Endpoint agent 



Question # 37

You have an Azure subscription that contains four Azure SQL managed instances.You need to evaluate the vulnerability of the managed instances to SQL injection attacks.What should you do first?

A. Create an Azure Sentinel workspace. 
B. Enable Advanced Data Security. 
C. Add the SQL Health Check solution to Azure Monitor. 
D. Create an Azure Advanced Threat Protection (ATP) instance. 



Question # 38

You have an Azure subscription that contains several Azure SQL databases and an AzureSentinelworkspace.You need to create a saved query in the workspace to find events reported by AdvancedThreat Protection for Azure SQL Database.What should you do?

A. From Azure CLI run the Get-AzOperationalInsightsworkspace cmdlet. 
B. From the Azure SQL Database query editor, create a Transact-SQL query. 
C. From the Azure Sentinel workspace, create a Kusto Query Language query. 
D. From Microsoft SQL Server Management Studio (SSMS), create a Transact-SQL query. 



Question # 39

You plan to deploy an app that will modify the properties of Azure Active Directory (AzureAD) users by using Microsoft Graph. You need to ensure that the app can access AzureAD. What should you configure first?

A. a custom role-based access control (RBAQ role 
B. an external identity 
C. an Azure AD Application Proxy 
D. an app registration 



Question # 40

You have an Azure subscription.You plan to create a workflow automation in Azure Security Center that will automaticallyremediate a security vulnerability.What should you create first?

A. a managed identity 
B. an automation account 
C. an Azure function app 
D. an alert rule 
E. an Azure logic app 



Question # 41

You have an Azure subscription that contains an Azure SQL database named sql1.You plan to audit sql1.You need to configure the audit log destination. The solution must meet the followingrequirements:Support querying events by using the Kusto query language.Minimize administrative effort.What should you configure?

A. an event hub 
B. a storage account 
C. a Log Analytics workspace



Question # 42

You have a Microsoft 365 tenant that uses an Azure Active Directory (Azure AD) tenantThe Azure AD tenant syncs to an on-premises Active Directory domain by using aninstance of Azure AD Connect.You create a new Azure subscriptionYou discover that the synced on-premises user accounts cannot be assigned rotes in thenew subscription.You need to ensure that you can assign Azure and Microsoft 365 roles to the synced AzureAD user accounts.What should you do first?

A. Change the Azure AD tenant used by the new subscription. 
B. Configure the Azure AD tenant used by the new subscription to use pass-throughauthenticate 
C. Configure the Azure AD tenant used by the new subscription to use federatedauthentication. 
D. Configure a second instance of Azure AD Connect. 



Question # 43

Note: The question is included in a number of questions that depicts the identicalset-up. However, every question has a distinctive result. Establish if the solutionsatisfies the requirements.Your company has an Active Directory forest with a single domain, namedweylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant withthe same name.You have been tasked with integrating Active Directory and the Azure AD tenant. Youintend to deploy Azure AD Connect.Your strategy for the integration must make sure that password policies and user logonlimitations affect user accounts that are synced to the Azure AD tenant, and that theamount of necessary servers are reduced.Solution: You recommend the use of pass-through authentication and seamless SSO withpassword hash synchronization.Does the solution meet the goal?

A. Yes 
B. No 



Question # 44

Your company recently created an Azure subscription.You have been tasked with making sure that a specified user is able to implement AzureAD Privileged Identity Management (PIM).Which of the following is the role you should assign to the user?

A. The Global administrator role. 
B. The Security administrator role. 
C. The Password administrator role. 
D. The Compliance administrator role. 



Question # 45

You need to recommend which virtual machines to use to host App1. The solution mustmeet the technical requirements for KeyVault1.Which virtual machines should you use?

A. VM1 only 
B. VM1 and VM2 only 
C. VM1, VM2, and VM4 only 
D. VM1, VM2, VM3. and VM4 



Question # 46

You have an Azure subscription linked to an Azure Active Directory Premium Plan 1 tenant.You plan to implement Azure Active Directory (Azure AD) Identity Protection.You need to ensure that you can configure a user risk policy and a sign-in risk policy.What should you do first?

A. Purchase Azure Active Directory Premium Plan 2 licenses for all users.
B. Register all users for Azure Multi-Factor Authentication (MFA).
C. Enable security defaults for Azure AD.
D. Upgrade Azure Security Center to the standard tier.



Leave Your Review