The Microsoft Certified: Azure Security Engineer Associate (AZ-500) validates the skills needed to implement security controls and threat protection on the Azure platform. It covers identity and access management, data protection, and security operations to safeguard cloud-based assets. Holding the symbol AZ_AZ_500 demonstrates a professional's ability to maintain a secure and compliant Azure environment.
---------- Question 1
A company wants to provide secure access to a backend web application that is not exposed to the public internet. The solution must provide Web Application Firewall (WAF) protection and SSL termination. You decide to use Azure Application Gateway. Which configuration is required to ensure the Application Gateway can communicate with the backend application over a private IP address within the virtual network?
- A private frontend IP configuration and a backend pool containing the private IP of the app
- A public frontend IP configuration with a Network Security Group (NSG) on the gateway subnet
- An Azure Bastion host deployed in the same virtual network as the backend application
- A Service Endpoint for Microsoft.Web enabled on the Application Gateway subnet
---------- Question 2
A developer is building a serverless application using Azure Functions that needs to securely access secrets stored in an Azure Key Vault. The security policy strictly prohibits the use of hardcoded credentials or service principal secrets within the source code. The application is deployed within a production subscription. What is the most secure method to grant the Azure Function access to the Key Vault while adhering to the principle of least privilege?
- Create a User-Assigned Managed Identity, assign it to the Azure Function, and grant that identity Key Vault Secrets User permissions in the Key Vault access policy.
- Generate a client secret for the Azure Function app registration and store it as an environment variable within the Function App settings.
- Configure the Azure Function to use a System-Assigned Managed Identity and grant the Function App the Contributor role at the Subscription level.
- Enable the Secret Management feature in Azure DevOps and use a pipeline task to inject the Key Vault password during the deployment phase.
---------- Question 3
An application is registered in Microsoft Entra ID and needs to access the Microsoft Graph API to read the calendar events of the currently signed-in user. The security team insists on the principle of least privilege. You need to configure the App Registration and ensure that the application cannot access the data without the user being present and providing consent. Which type of permission and specific scope should be assigned to the application registration to satisfy these constraints?
- Application permissions with the Calendars.Read scope
- Delegated permissions with the Calendars.Read scope
- Application permissions with the Calendars.ReadWrite scope
- Delegated permissions with the Directory.Read.All scope
---------- Question 4
You are designing network security for a three-tier application. You need to ensure that the web tier can only communicate with the business logic tier on port 8080, and the business logic tier can only communicate with the database tier on port 1433. You want to simplify the management of these rules by grouping virtual machines based on their function rather than individual IP addresses. What should you use?
- Azure Firewall Premium with IDPS enabled
- Network Security Groups (NSGs) combined with Application Security Groups (ASGs)
- User-Defined Routes (UDRs) pointing to a Network Virtual Appliance
- Azure Bastion associated with each application subnet
---------- Question 5
A security engineer is auditing the permissions of a multi-tenant application registered in Microsoft Entra ID. The application has been granted the User.ReadWrite.All delegated permission. The engineer needs to ensure that the application can only perform actions on behalf of the signed-in user and that an administrator must provide consent before the application can access data across the entire organization. Which concept describes the mechanism where an admin grants these high-level permissions?
- User consent flow during the first application sign-in
- Admin consent through the Microsoft Entra admin center
- OAuth 2.0 client credentials flow for daemon applications
- Dynamic permission scoping within the application code
---------- Question 6
Your security team is using Microsoft Sentinel to monitor your Azure environment. You need to create a mechanism that automatically disables a user account in Microsoft Entra ID if a high-severity alert is triggered indicating a brute-force attack from a known malicious IP address. Which components should you use to implement this automated response?
- Create a Sentinel Analytics rule to detect the attack and associate it with an Automation Rule that triggers a Logic App playbook.
- Enable Microsoft Defender for Identity and configure a custom notification email to be sent to the global administrator.
- Use an Azure Monitor Workbook to visualize the attack and manually click the disable user button in the Entra ID portal.
- Configure a Microsoft Defender for Cloud security policy to automatically remediate identity risks by blocking the IP address at the NSG level.
---------- Question 7
You are managing a set of Azure Virtual Machines that store sensitive financial data. You have been tasked with ensuring that the OS and data disks are encrypted at rest using encryption keys that your organization manages in an Azure Key Vault. The solution must ensure that the encryption is transparent to the OS and provides an additional layer of security beyond the default platform-managed keys. Which technology should you implement?
- Implement Azure Storage Service Encryption (SSE) with Customer-Managed Keys (CMK) at the storage account level for all virtual machine disk files.
- Enable Azure Disk Encryption (ADE) on the virtual machines, which utilizes Windows BitLocker or Linux DM-Crypt to encrypt the volumes using keys in Key Vault.
- Configure Transparent Data Encryption (TDE) with Bring Your Own Key (BYOK) support on the virtual machine's local instance of SQL Server.
- Use Azure Backup to create encrypted recovery points and then delete the original unencrypted disks to ensure that only the backups are secured.
---------- Question 8
An organization is developing a cloud-native application that consists of several microservices hosted on Azure Container Apps. One specific microservice requires secure access to an Azure Key Vault to retrieve sensitive connection strings for a backend database. The security architect mandates that no credentials or secrets should be stored within the container images or environment variables. Additionally, the identity used for access must be restricted to only this specific microservice instance. Which identity solution should be implemented to meet these requirements with the least administrative effort?
- Create a service principal in Microsoft Entra ID, generate a client secret, and store that secret as an encrypted secret within the Container Apps environment configuration.
- Enable a system-assigned managed identity for the specific Azure Container App and grant that identity the Secret Get permission in the Key Vault access policies.
- Register the application in Microsoft Entra ID and use the OAuth 2.0 device code flow to allow the microservice to authenticate interactively during the initial startup phase.
- Assign a user-assigned managed identity to the Container App and share that same identity across all microservices in the environment to simplify permission management in Key Vault.
---------- Question 9
You are designing the network security for a global application using Azure Front Door and Web Application Firewall (WAF). The application must be protected against SQL injection and cross-site scripting attacks. Additionally, you need to ensure that the backend Azure App Service only accepts traffic that has been routed through your Azure Front Door instance. What is the most secure and efficient way to restrict access to the backend App Service?
- Configure the App Service to use IP restrictions and manually add the entire range of Azure Front Door IP addresses.
- Implement a Network Security Group on the App Service subnet that allows only the 'AzureFrontDoor.Backend' service tag.
- Use the 'X-Azure-FDID' header to validate the Front Door ID in the application code or via App Service access restrictions.
- Create a Private Endpoint for the App Service and connect it directly to the Azure Front Door Premium tier.
- Use a Service Endpoint to restrict traffic to the App Service from the Front Door edge location subnets.
---------- Question 10
A company is implementing Microsoft Entra Privileged Identity Management (PIM) to secure administrative access to Azure resources. A security engineer needs to ensure that when a user activates the Virtual Machine Contributor role, they must provide a business justification and obtain approval from a specific security manager. Additionally, the activation must be limited to a maximum of 4 hours. Which PIM feature or setting should be modified to enforce these specific requirements for the role?
- PIM Discovery and Insights
- Role settings under PIM Azure resources
- Conditional Access policy for PIM activation
- Microsoft Entra ID Governance reviews
Are they useful?
Click here to get 360 more questions to pass this certification at the first try! Explanation for each answer is included!
Follow the below LINKEDIN channel to stay updated about 89+ exams!

Comments
Post a Comment