AZ-500 Exam Question 126

You have an Azure subscription named Subscription1.
You deploy a Linux virtual machine named VM1 to Subscription1.
You need to monitor the metrics and the logs of VM1.
D18912E1457D5D1DDCBD40AB3BF70D5D
What should you use?
  • AZ-500 Exam Question 127

    You have an Azure subscription that contains 100 virtual machines and has Azure Security Center Standard tier enabled.
    You plan to perform a vulnerability scan of each virtual machine.
    You need to deploy the vulnerability scanner extension to the virtual machines by using an Azure Resource Manager template.
    Which two values should you specify in the code to automate the deployment of the extension to the virtual machines? Each correct answer presents part of the solution.
    NOTE: Each correct selection is worth one point.
  • AZ-500 Exam Question 128

    You have an Azure subscription that contains the resources shown in the following table.

    You need to ensure that ServerAdmins can perform the following tasks:
    Create virtual machines in RG1 only.
    Connect the virtual machines to the existing virtual networks in RG2 only.
    The solution must use the principle of least privilege.
    Which two role-based access control (RBAC) roles should you assign to ServerAdmins? Each correct answer presents part of the solution.
    NOTE: Each correct selection is worth one point.
  • AZ-500 Exam Question 129

    You have an Azure subscription that contains a user named User1. You need to ensure that User1 can create managed identities. The solution must use the principle of least privilege.
    What should you do?
  • AZ-500 Exam Question 130

    Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
    After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
    You have an Azure Subscription named Sub1.
    You have an Azure Storage account named Sa1 in a resource group named RG1.
    Users and applications access the blob service and the file service in Sa1 by using several shared access signatures (SASs) and stored access policies.
    You discover that unauthorized users accessed both the file service and the blob service.
    You need to revoke all access to Sa1.
    Solution: You generate new SASs.
    Does this meet the goal?