Microsoft Azure Security Technologies (AZ-500) Practice Exam
Microsoft Azure Security Technologies (AZ-500) Practice Exam
About Microsoft Azure Security Technologies (AZ-500)
The Microsoft Azure Security Technologies (AZ-500) exam is suitable for Azure Security Engineers who serve as part of a larger team dedicated to cloud-based management and security and may also secure or hybrid environments as part of an end-to-end infrastructure. Responsibilities for an Azure Security Engineer include maintaining the security posture, identifying and remediating vulnerabilities by using a variety of security tools, implementing threat protection, and responding to security incident escalations.
Who should take the exam?
Candidates for this exam should have subject matter expertise in implementing security controls and threat protection, managing identity and access, and protecting data, applications, and networks in cloud and hybrid environments as part of an end-to-end infrastructure.
Skills Required
A candidate for this exam should be familiar with scripting and automation and should have a deep understanding of networking and virtualization. A candidate should also have a strong familiarity with cloud capabilities, Azure products and services, and other Microsoft products and service
Course Outline
The Microsoft Azure Security Technologies (AZ-500) covers the latest topics as per exam updates -
Domain 1 - Overview of Managing Identity and access (25–30%)
1.1 Explain and Manage Microsoft Entra identities
- Learn to secure Microsoft Entra users
- Learn to secure Microsoft Entra groups
- Learn to recommend when to use external identities
- Learn to secure external identities
- Learn to implement Microsoft Entra ID Protection
1.2 Explain and Manage Microsoft Entra authentication
- Learn to implement multi-factor authentication (MFA)
- Learn to configure Microsoft Entra Verified ID
- Learn to implement passwordless authentication
- Learn to implement password protection
- Learn to implement single sign-on (SSO)
- Learn to integrate single sign on (SSO) and identity providers
- Learn to recommend and enforce modern authentication methods
1.3 Explain and Manage Microsoft Entra authorization
- Learn to configure Azure role permissions for management groups, subscriptions, resource groups, and resources
- Learn to assign Microsoft Entra built-in roles
- Learn to assign Azure built-in roles
- Learn to create and assign custom roles, including Azure roles and Microsoft Entra roles
- Learn to implement and manage Microsoft Entra Permissions Management
- Learn to configure Microsoft Entra Privileged Identity Management
- Learn to configure role management and access reviews in Microsoft Entra
- Learn to implement Conditional Access policies
1.4 Manage Microsoft Entra application access
- Learn to manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants
- Learn to manage Microsoft Entra app registrations
- Learn to configure app registration permission scopes
- Learn to manage app registration permission consent
- Learn to manage and use service principals
- Learn to manage managed identities for Azure resources
- Learn to recommend when to use and configure a Microsoft Entra Application Proxy, including authentication
Domain 2 - Understanding Secure Networking (20–25%)
2.1 Describe planning and implementing security for virtual networks
- Learn to plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs)
- Learn to plan and implement user-defined routes (UDRs)
- Learn to plan and implement Virtual Network peering or VPN gateway
- Learn to plan and implement Virtual WAN, including secured virtual hub
- Learn to secure VPN connectivity, including point-to-site and site-to-site
- Learn to implement encryption over ExpressRoute
- Learn to configure firewall settings on PaaS resources
- Learn to monitor network security by using Network Watcher, including NSG flow logging
2.2 Describe planning and implementing security for private access to Azure resources
- Learn to plan and implement virtual network Service Endpoints
- Learn to plan and implement Private Endpoints
- Learn to plan and implement Private Link services
- Learn to plan and implement network integration for Azure App Service and Azure Functions
- Learn to plan and implement network security configurations for an App Service Environment (ASE)
- Learn to plan and implement network security configurations for an Azure SQL Managed Instance
2.3 Describe planning and implementing security for public access to Azure resources
- Learn to plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management
- Learn to plan, implement, and manage an Azure Firewall, including Azure Firewall Manager and firewall policies
- Learn to plan and implement an Azure Application Gateway
- Learn to plan and implement an Azure Front Door, including Content Delivery Network (CDN)
- Learn to plan and implement a Web Application Firewall (WAF)
- Learn to recommend when to use Azure DDoS Protection Standard
Domain 3 - Understanding to Secure compute, storage, and databases (20–25%)
3.1 Describe the planning and implementing advanced security for compute
- Learn to plan and implement remote access to public endpoints, including Azure Bastion and just-in-time (JIT) virtual machine (VM) access
- Learn to configure network isolation for Azure Kubernetes Service (AKS)
- Learn to secure and monitor AKS
- Learn to configure authentication for AKS
- Learn to configure security monitoring for Azure Container Instances (ACIs)
- Learn to configure security monitoring for Azure Container Apps (ACAs)
- Learn to manage access to Azure Container Registry (ACR)
- Learn to configure disk encryption, including Azure Disk Encryption (ADE), encryption at host, and confidential disk encryption
- Learn to recommend security configurations for Azure API Management
3.2 Describe planning and implementing security for storage
- Learn to configure access control for storage accounts
- Learn to manage life cycle for storage account access keys
- Learn to select and configure an appropriate method for access to Azure Files
- Learn to select and configure an appropriate method for access to Azure Blob Storage
- Learn to select and configure an appropriate method for access to Azure Tables
- Learn to select and configure an appropriate method for access to Azure Queues
- Learn to select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage
- Learn to configure Bring your own key (BYOK)
- Learn to enable double encryption at the Azure Storage infrastructure level
3.3 Explain planning and implementing security for Azure SQL Database and Azure SQL Managed Instance
- Learn to enable Microsoft Entra database authentication
- Learn to enable database auditing
- Learn to identify use cases for the Microsoft Purview governance portal
- Learn to implement data classification of sensitive information by using the Microsoft Purview governance portal
- Learn to plan and implement dynamic masking
- Learn to implement Transparent Data Encryption (TDE)
- Learn to recommend when to use Azure SQL Database Always Encrypted
Domain 4 - Understand Manage security operations (25–30%)
4.1 Describe Planning, implementing, and managing governance for security
- Learn to create, assign, and interpret security policies and initiatives in Azure Policy
- Learn to configure security settings by using Azure Blueprints
- Learn to deploy secure infrastructures by using a landing zone
- Learn to create and configure an Azure Key Vault
- Learn to recommend when to use a dedicated Hardware Security Module (HSM)
- Learn to configure access to Key Vault, including vault access policies and Azure Role Based Access Control
- Learn to manage certificates, secrets, and keys
- Learn to configure key rotation
- Learn to configure backup and recovery of certificates, secrets, and keys
4.2 Describe managing security posture by using Microsoft Defender for Cloud
- Learn to identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory
- Learn to assess compliance against security frameworks by using Microsoft Defender for Cloud
- Learn to add industry and regulatory standards to Microsoft Defender for Cloud
- Learn to add custom initiatives to Microsoft Defender for Cloud
- Learn to connect hybrid cloud and multi-cloud environments to Microsoft Defender for Cloud
- Learn to identify and monitor external assets by using Microsoft Defender External Attack Surface Management
4.3 Describe configuring and managing threat protection by using Microsoft Defender for Cloud
- Learn to enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, and Resource Manager
- Learn to configure Microsoft Defender for Servers
- Learn to configure Microsoft Defender for Azure SQL Database
- Learn to manage and respond to security alerts in Microsoft Defender for Cloud
- Learn to configure workflow automation by using Microsoft Defender for Cloud
- Learn to evaluate vulnerability scans from Microsoft Defender for Server
4.4 Describe configuring and managing security monitoring and automation solutions
- Learn to monitor security events by using Azure Monitor
- Learn to configure data connectors in Microsoft Sentinel
- Learn to create and customize analytics rules in Microsoft Sentinel
- Learn to evaluate alerts and incidents in Microsoft Sentinel
- Learn to configure automation in Microsoft Sentinel
What do we offer?
- Full-Length Mock Test with unique questions in each test set
- Practice objective questions with section-wise scores
- In-depth and exhaustive explanation for every question
- Reliable exam reports evaluating strengths and weaknesses
- Latest Questions with an updated version
- Tips & Tricks to crack the test
- Unlimited access
What are our Practice Exams?
- Practice exams have been designed by professionals and domain experts that simulate real-time exam scenario.
- Practice exam questions have been created on the basis of content outlined in the official documentation.
- Each set in the practice exam contains unique questions built with the intent to provide real-time experience to the candidates as well as gain more confidence during exam preparation.
- Practice exams help to self-evaluate against the exam content and work towards building strength to clear the exam.
- You can also create your own practice exam based on your choice and preference