AZ-500 Exam Question 51

You are testing an Azure Kubernetes Service (AKS) cluster. The cluster is configured as shown in the exhibit.
(Click the Exhibit tab.)

You plan to deploy the cluster to production. You disable HTTP application routing.
You need to implement application routing that will provide reverse proxy and TLS termination for AKS services by using a single IP address.
What should you do?
  • AZ-500 Exam Question 52

    You have an Azure subscription that contains the resources shown in the following table.

    User1 is a member of Group1. Group1 and User2 are assigned the Key Vault Contributor role for Vault1.
    On January 1, 2019, you create a secret in Vault1. The secret is configured as shown in the exhibit. (Click the Exhibit tab.)

    User2 is assigned an access policy to Vault1. The policy has the following configurations:
    * Key Management Operations: Get, List, and Restore
    * Cryptographic Operations: Decrypt and Unwrap Key
    * Secret Management Operations: Get, List, and Restore
    Group1 is assigned an access to Vault1. The policy has the following configurations:
    * Key Management Operations: Get and Recover
    * Secret Management Operations: List, Backup, and Recover
    For each of the following statements, select Yes if the statement is true. Otherwise, select No.

    AZ-500 Exam Question 53

    You have an Azure key vault.
    You need to delegate administrative access to the key vault to meet the following requirements:
    * Provide a user named User1 with the ability to set advanced access policies for the key vault.
    * Provide a user named User2 with the ability to add and delete certificates in the key vault.
    * Use the principle of least privilege.
    What should you use to assign access to each user? To answer, select the appropriate options in the answer area.
    NOTE: Each correct selection is worth one point.

    AZ-500 Exam Question 54

    You have an Azure subscription named Sub1 that contains the resources shown in the following table.

    You need to ensure that you can provide VM1 with secure access to a database on SQL1 by using a contained database user.
    What should you do?
  • AZ-500 Exam Question 55

    You are implementing conditional access policies.
    You must evaluate the existing Azure Active Directory (Azure AD) risk events and risk levels to configure and implement the policies.
    You need to identify the risk level of the following risk events:
    * Users with leaked credentials
    * Impossible travel to atypical locations
    * Sign ins from IP addresses with suspicious activity
    Which level should you identify for each risk event? To answer, drag the appropriate levels to the correct risk events. Each level may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
    NOTE: Each correct selection is worth one point.