Microsoft · Free Practice Questions · Last reviewed May 2026

AZ-500 Exam Questions and Answers

18 real exam-style questions organised by domain, each with the correct answer highlighted and a plain-English explanation of why it's right — and why the others are wrong.

60 exam questions
120 min time limit
Pass at 700 / 1000
3 exam domains
1

Domain 1: Manage identity and access

All Manage identity and access questions

A company uses Azure AD Identity Protection. They want to automatically block sign-ins that have a high user risk level, but only for users in the 'Finance' department. They also want to require MFA for medium user risk level for all users (including Finance) when sign-in risk is not blocked. They have already created a Conditional Access policy for the Finance department that has a condition of 'User risk level: High' and a grant control of 'Block access'. What additional configuration is needed to also require MFA for all users with medium user risk?

A

Create a second Conditional Access policy targeting all users with condition 'User risk level: Medium' and grant control 'Require multi-factor authentication'

A separate policy for medium user risk applied to all users will require MFA when medium risk is detected. The existing policy will continue to block Finance users with high risk. Policy evaluation is not mutually exclusive; the block takes precedence for high risk, and the MFA requirement applies for medium risk.

B

Modify the existing policy to include 'User risk level: Medium' and change the grant control to 'Require multi-factor authentication'

C

Use Identity Protection's 'User risk policy' instead of Conditional Access

D

Create a new Conditional Access policy with condition 'User risk level: Medium' and grant control 'Block access'

Why: Conditional Access policies evaluate separately. The existing policy only covers high user risk for Finance. To require MFA for medium user risk for all users, a second Conditional Access policy must be created targeting all users with condition 'User risk level: Medium' and grant control 'Require MFA'. Modifying the existing policy to include both high and medium risk would not work because a single policy cannot block high risk for Finance and require MFA for medium risk for everyone; the block would apply to Finance for high risk but the MFA requirement for medium risk would also apply to Finance (which is acceptable, but the policy would not cover non-Finance users). The correct approach is separate policies.

A company uses Azure AD Privileged Identity Management (PIM) to manage access to Azure AD roles. They want to require that users who activate the Global Administrator role must get approval from their manager before activation, and that the approval must be time-bound (maximum 8 hours). Which two PIM configurations should they set?

A

Set the activation maximum duration to 8 hours.

This limits how long the role can be active, meeting the time-bound requirement.

B

Enable approval workflow by adding the manager as an approver.

This requires manager approval before activation.

C

Require multi-factor authentication on activation.

D

Require justification on activation.

Why: To require approval, you enable the 'Approval' workflow in the role settings and add approvers (e.g., the manager). To enforce a maximum activation time, you set the 'Activation maximum duration' to 8 hours. Multi-factor authentication and justification are additional settings but not specifically required for approval or time-bound duration.

A company uses Azure AD Privileged Identity Management (PIM) to manage the Global Administrator role. They want to require that when a user activates the role, they must be using a device that is compliant with Intune policies (e.g., compliant device) and must provide a justification. The company already has Conditional Access policies in place for regular access. How should they enforce the device compliance requirement specifically during PIM activation?

A

Configure a Conditional Access policy that targets the 'Azure AD Privileged Identity Management' cloud app, requiring compliant device.

B

In PIM settings for the Global Administrator role, enable 'Require Multi-Factor Authentication on activation'.

C

In PIM settings for the Global Administrator role, enable 'Require Azure AD Conditional Access authentication context' and create a Conditional Access policy that requires compliant device when that authentication context is used.

Correct. This is the recommended method for integrating PIM with Conditional Access. The authentication context is signaled during activation, and a separate CA policy enforces the device compliance requirement.

D

Use Azure AD Identity Protection's user risk policy to require device compliance when a high-risk user activates the role.

Why: PIM supports integration with Azure AD Conditional Access through authentication context. By enabling 'Require Azure AD Conditional Access authentication context' in the PIM role settings, the activation process will trigger a separate Conditional Access policy that can require a compliant device. This allows you to create a specific CA policy that targets the activation context. Option A is incorrect because Conditional Access policies cannot directly target the PIM activation page without an authentication context. Option B (MFA) does not enforce device compliance. Option D (Identity Protection) is unrelated to device compliance.

A company uses Azure AD Privileged Identity Management (PIM) for the Global Administrator role. They have configured the role activation to require approval from a specific security group. When a user attempts to activate the role, they are immediately approved without any approval request being sent. The user is a member of the same security group that is configured as the approver. What is the most likely cause?

A

The activation approval requirement is not supported for the Global Administrator role

B

The user is a member of the approver group and is self-approving the request

PIM allows approvers to approve their own activation requests unless the 'Disable approver approval' policy setting is enabled. Since the user is in the approver group, they can self-approve.

C

The PIM policy has not been activated for the Global Administrator role

D

The role activation duration is set to zero, causing immediate activation

Why: By default, PIM allows a user to approve their own activation request if they are a member of the approver group. This is because the 'Disable approver approval' setting in the PIM policy is not enabled. To prevent self-approval, administrators must explicitly configure the policy to disallow approvers from approving their own requests.

A company has a partner organization in another Azure AD tenant. They want to allow users from the partner tenant to access their Azure resources through Azure AD B2B collaboration. They also want the partner's Multi-Factor Authentication (MFA) claims to be trusted when partner users access their resources, so that they do not need to perform MFA again. Which configuration in cross-tenant access settings should they enable?

A

Trust multi-factor authentication from the partner tenant (inbound trust).

This setting accepts MFA claims from the partner tenant, avoiding redundant MFA prompts.

B

Trust device compliance from the partner tenant.

C

Enable a Conditional Access policy that grants access to the partner tenant.

D

Configure identity synchronization with the partner tenant.

Why: In cross-tenant access settings, you can configure inbound trust settings to accept MFA claims from the partner tenant. This allows partner users who have already satisfied MFA in their home tenant to access resources without being prompted again. Device compliance trust and identity synchronization are separate settings. Conditional Access policies are per-tenant and do not directly trust external MFA.

A company has an on-premises web application that they want to expose to external users over the internet without requiring a VPN. External users must authenticate with Modern Authentication (e.g., using Azure Multi-Factor Authentication) and access policies must be enforced via Conditional Access. The application does not support SAML or OAuth. Which Azure service should they use to publish this application securely?

A

Azure AD B2C (Business-to-Consumer).

B

Azure Application Gateway with Web Application Firewall (WAF).

C

Azure AD Application Proxy.

Application Proxy is specifically designed for this scenario: it allows on-premises HTTP/HTTPS applications to be published through Azure AD, providing pre-authentication, MFA, and Conditional Access.

D

Azure Front Door.

Why: Azure AD Application Proxy enables secure remote access to on-premises web applications. It works by installing a connector on the on-premises network, then publishing the application through Azure AD. Users authenticate via Azure AD, which supports MFA and Conditional Access, and then are proxied to the internal application. The application does not need to support modern authentication; the proxy handles the authentication translation.

Want more Manage identity and access practice?

Practice this domain
2

Domain 2: Secure networking

All Secure networking questions

A company has a hub-spoke network topology. The hub virtual network contains an Azure Firewall and an ExpressRoute gateway for on-premises connectivity. The spoke virtual network hosts a critical application. They need to ensure that all outbound traffic from the spoke to the internet and to on-premises networks is routed through the Azure Firewall. They configure a user-defined route (UDR) on the spoke subnet with address prefix 0.0.0.0/0 and next hop as the Azure Firewall's private IP. They also disable 'Virtual network gateway route propagation' on the spoke subnet. However, traffic to on-premises still bypasses the firewall and goes through the ExpressRoute gateway. What is the most likely cause?

A

The Azure Firewall is not in the same region as the spoke.

B

The ExpressRoute gateway's BGP routes are still overriding the UDR because gateway propagation is not fully disabled.

C

The spoke subnet does not have a route for the on-premises prefix pointing to the firewall.

The 0.0.0.0/0 UDR only applies to traffic with no more specific match. On-premises traffic has a specific address prefix. To route it through the firewall, you must add a UDR with that specific prefix and the next hop as the firewall.

D

The route table is not associated with the spoke subnet.

Why: Disabling 'Virtual network gateway route propagation' prevents routes from the ExpressRoute gateway from being automatically added to the subnet's route table. However, the UDR with 0.0.0.0/0 only covers internet-bound traffic. Traffic destined to on-premises networks uses the specific prefix learned from ExpressRoute (e.g., 10.0.0.0/8). Even with propagation disabled, the route table does not have a route for that specific on-premises prefix. The 0.0.0.0/0 route is less specific, so traffic matching the on-premises prefix will not use it. To force on-premises traffic through the firewall, you must add an explicit UDR for the on-premises address prefix with next hop as the Azure Firewall. The Azure Firewall's location and route table association are not the issue here.

Your company has an Azure subscription with a hub-spoke network topology. The hub contains an Azure Firewall and a VPN gateway for on-premises connectivity. The spoke virtual network hosts a critical application. You need to ensure that all outbound traffic from the spoke to the internet and on-premises networks flows through the Azure Firewall. You configure a user-defined route (UDR) on the spoke subnet with the default route (0.0.0.0/0) pointing to the Azure Firewall private IP. However, traffic to on-premises still bypasses the firewall. What is the most likely cause?

A

The on-premises traffic uses a more specific route learned via BGP from the VPN gateway, which overrides the UDR

BGP-learned routes for on-premises networks are more specific than 0.0.0.0/0. They will be used even if a UDR for 0.0.0.0/0 exists. To force through firewall, you must either disable BGP route propagation or create specific UDRs for on-premises ranges.

B

The UDR must be applied to the subnet that hosts the Azure Firewall

C

The spoke subnet does not have 'GatewaySubnet' route propagation enabled

D

The Azure Firewall is not configured with a route to the on-premises network

Why: When VNet peering is configured to use the hub's VPN gateway, the spoke VNet learns more specific routes for on-premises prefixes via BGP. These BGP routes have a smaller prefix than 0.0.0.0/0, so they take precedence over the UDR, causing traffic to bypass the firewall.

A company has an Azure virtual network that uses Azure Firewall as the central traffic inspection point. They have a spoke VNet peered to the hub VNet. The spoke VNet contains a subnet with virtual machines. The security team wants to ensure that all outbound traffic from those virtual machines to the internet goes through the Azure Firewall. They have configured a route table on the spoke subnet with a default route (0.0.0.0/0) to the Azure Firewall's private IP. However, traffic from the VMs is still going directly to the internet. What is the most likely cause?

A

The route table is not associated to the subnet.

B

The Azure Firewall is not configured with a default route.

C

The virtual machines have public IP addresses assigned.

When a VM has a public IP, Azure performs default outbound SNAT using that IP, bypassing the route table and the firewall.

D

The VNet peering is not configured properly.

Why: If a virtual machine in Azure has a public IP address assigned, Azure uses that public IP for outbound traffic (Source Network Address Translation) instead of the route table, unless forced tunneling is configured. This overrides the custom route to the firewall, causing traffic to bypass it. The solution is to remove public IPs from the VMs (or use a NAT gateway fronting the firewall).

A company has a hub-spoke network topology with Azure Firewall deployed in the hub virtual network. Spoke virtual networks are peered to the hub. The security team needs to ensure that all outbound internet traffic from virtual machines in a spoke subnet goes through the Azure Firewall. They have configured a route table on the spoke subnet with a default route (0.0.0.0/0) pointing to the Azure Firewall private IP address. However, traffic from spoke VMs is still bypassing the firewall and going directly to the internet. What is the most likely reason?

A

The route table is not associated with the spoke subnet.

Correct. Without explicit association, the subnet uses system routes and traffic bypasses the firewall. The route table must be associated to the subnet to take effect.

B

Azure Firewall is not configured with DNAT rules for outbound traffic.

C

The spoke VNet peering does not allow gateway transit.

D

The route table has a higher priority than system routes.

Why: For a user-defined route table to affect traffic from a subnet, it must be explicitly associated with that subnet. Simply creating the route table with the desired routes is insufficient; association is required. In many cases, administrators create the route table but forget to associate it with the subnet, causing the subnet to continue using system routes (which allow direct internet access). Option A is the most likely reason. Option B is incorrect because Azure Firewall does not require DNAT rules for outbound traffic. Option C (gateway transit) is for VPN gateway scenarios, not for Azure Firewall outbound routing. Option D is false because user-defined routes take precedence over system routes.

A company has two Azure virtual networks: VNet-A and VNet-B. They peer the VNets and deploy a network virtual appliance (NVA) in VNet-A. They want to inspect all outbound traffic from VNet-B to the internet using the NVA. They configure a user-defined route (UDR) in a route table associated with the subnet in VNet-B, with a default route (0.0.0.0/0) and next hop set to the private IP of the NVA in VNet-A. However, outbound traffic from VNet-B still goes directly to the internet. What is the most likely cause?

A

The NVA's network interface must have 'IP forwarding' enabled.

IP forwarding allows the NVA to accept and forward traffic not destined to its own IP. Without it, the NVA drops the packets.

B

The VNet peering is not configured to allow traffic from VNet-B to route through VNet-A.

C

The route table is not associated with the subnet in VNet-B.

D

The NVA does not have a public IP address.

Why: For an NVA to forward traffic in Azure, its network interface must have IP forwarding enabled. Without IP forwarding, the VM will drop traffic not addressed to itself. Even with correct UDRs, the NVA must be configured to forward traffic. The route table association and peering are correct, but the NVA itself must be set up to route packets.

A company has two Azure virtual networks, VNet-A (hub) and VNet-B (spoke), connected via VNet peering. They deploy a network virtual appliance (NVA) in a subnet in VNet-A to inspect all traffic between the VNets. They configure a user-defined route (UDR) on the subnet in VNet-B with the destination address space of VNet-A (10.0.0.0/16) and the next hop set to the private IP of the NVA. However, traffic from VNet-B to VNet-A still bypasses the NVA and takes a direct path. What is the most likely cause?

A

The NVA's private IP address is not reachable from VNet-B

B

VNet peering system routes override user-defined routes

C

The UDR must be applied to the gateway subnet of VNet-B

D

The NVA network interface does not have IP forwarding enabled

IP forwarding must be enabled on the NVA's NIC for it to forward traffic destined to other IPs. Without it, the NVA will drop the traffic, and the peering path remains active.

Why: For a UDR that directs traffic to an NVA to be effective, the NVA's network interface must have IP forwarding enabled. Without IP forwarding, the NVA will drop traffic that is not destined to its own IP address, and the traffic will not be forwarded. System routes for VNet peering do not take precedence over UDRs if the UDR is more specific, but in this case the UDR is specific to VNet-A's prefix. However, if IP forwarding is not enabled, the NVA cannot forward the traffic even if the route is present. The other options are not the primary cause: the NVA is likely reachable, the UDR is on the correct subnet, and peerings do not override UDRs.

Want more Secure networking practice?

Practice this domain
3

Domain 3: Secure compute, storage, and databases

All Secure compute, storage, and databases questions

A company uses Azure SQL Database with Transparent Data Encryption (TDE) protected by a customer-managed key (CMK) stored in Azure Key Vault. The Key Vault has a firewall enabled that denies all public network access. The SQL server is in the same region and has a system-assigned managed identity with the 'Key Vault Crypto Service Encryption User' role assigned at the key scope. However, TDE operations fail because the SQL server cannot access the Key Vault. What additional configuration is required to allow the SQL server to access the Key Vault for TDE operations?

A

Configure a private endpoint for the SQL server to the Key Vault.

B

Enable the 'Allow trusted Microsoft services to bypass the firewall' setting on the Key Vault.

This setting allows trusted Azure services, including Azure SQL Database, to access the Key Vault even when the firewall is enabled. Since the SQL server's managed identity already has the cryptographic role, this is the missing piece to allow TDE operations.

C

Change the Key Vault firewall to allow all Azure services.

D

Create a VNet service endpoint for Microsoft.KeyVault on the SQL server's subnet.

Why: Azure SQL Database is a trusted Microsoft service that can bypass the Key Vault firewall when the 'Allow trusted Microsoft services to bypass the firewall' setting is enabled. This allows the SQL server's managed identity to authenticate to Key Vault even when public network access is denied. The managed identity role assignment provides the necessary permissions, but the network access must be allowed via this exception. Configuring a private endpoint is not required because the SQL server can use the trusted service exception to reach the Key Vault over the Microsoft backbone network.

A company stores sensitive files in Azure Files shares. They require that data is encrypted at rest using a customer-managed key (CMK) stored in Azure Key Vault, and that all client connections use SMB 3.0 encryption for end-to-end encryption in transit. They create a premium Azure Files share in a storage account and configure encryption at rest with a CMK. However, clients are unable to connect without SMB encryption. What additional configuration is necessary to enforce SMB encryption for all connections?

A

No additional configuration is needed; Azure Files uses SMB encryption by default and cannot be disabled.

B

Enable 'Secure transfer required' in the storage account's configuration to enforce SMB 3.0 encryption.

When 'Secure transfer required' is enabled, the storage account accepts only encrypted connections (HTTPS and SMB 3.0 with encryption). For Azure Files, this means clients must use SMB 3.0 encryption to connect.

C

Configure a network security group (NSG) rule to block SMB traffic on port 445 that does not use encryption.

D

Set the Azure Files share to use the 'Premium' performance tier; encryption is only available on premium shares.

Why: Azure Files supports SMB encryption which can be enforced at the storage account level. When you require secure transfer (SMB 3.0 encryption), the storage account rejects any connection that does not use SMB 3.0 encryption. This is configured in the storage account's 'Configuration' settings under 'Secure transfer required'. For Azure Files, this setting enforces SMB encryption for file share access.

A company stores sensitive files in Azure Files shares. They require encryption at rest using customer-managed keys (CMK) and encryption in transit using SMB 3.0 encryption. They have created a premium Azure Files share in a storage account and configured encryption at rest with a CMK. However, clients are able to connect without enforcing SMB encryption. What additional configuration is necessary to ensure that all connections to the file share are encrypted in transit?

A

Enable the 'Secure transfer required' property on the storage account.

Correct. Enabling 'Secure transfer required' forces clients to use SMB 3.0 with encryption (or HTTPS) when connecting to the Azure Files share, ensuring encryption in transit.

B

Configure a network security group (NSG) to allow only encrypted traffic.

C

Set the minimum SMB protocol version to 3.0 on the file share.

D

Create a service endpoint for the storage account.

Why: Azure Storage accounts have a property called 'Secure transfer required'. When enabled, this setting enforces that all requests to the storage account must be made over secure connections. For Azure Files, this means that clients must use SMB 3.0 (with encryption) or HTTPS for the file share REST API. Without this setting, clients can connect using earlier SMB versions that do not require encryption. Therefore, enabling 'Secure transfer required' on the storage account ensures that only encrypted connections are accepted. Option A is correct. Option B (NSG) cannot inspect encryption protocol. Option C (minimum SMB version) is not a configurable setting on the file share itself. Option D (service endpoint) is for network isolation, not encryption enforcement.

A company uses Azure SQL Database with Transparent Data Encryption (TDE) and wants to use a customer-managed key (CMK) stored in Azure Key Vault. The security policy requires that the Key Vault be protected by a firewall and virtual network service endpoints to restrict network access. The storage account for TDE logs is in the same Azure region. Which additional configuration is necessary in the Key Vault to allow Azure SQL Database to access the CMK for encryption operations?

A

Add a network rule in the Key Vault firewall allowing the public IP range of the Azure SQL Database server.

B

Enable the 'Allow trusted Microsoft services to bypass this firewall' option in the Key Vault networking settings.

This setting allows trusted Microsoft services like Azure SQL Database to access the Key Vault even when the firewall is enabled, provided the service uses authentication and authorization.

C

Create a private endpoint for the Key Vault and connect it to the same virtual network as the Azure SQL Database.

D

Configure the Key Vault to use role-based access control (RBAC) and assign the 'Key Vault Crypto Service Encryption User' role to the SQL Database server's managed identity.

Why: When Azure SQL Database uses a CMK in Key Vault for TDE, the SQL service must be able to access the key to encrypt and decrypt the database. If the Key Vault uses firewall rules, you must allow trusted Microsoft services to bypass the firewall. This is done by enabling the 'Allow trusted Microsoft services to bypass this firewall' setting in the Key Vault's networking configuration. Azure SQL Database is a trusted Microsoft service for this purpose.

A company uses Azure SQL Database with Transparent Data Encryption (TDE) protected by a customer-managed key stored in Azure Key Vault. The Key Vault has a firewall enabled that blocks all public network access. The SQL server has a system-assigned managed identity with the 'Key Vault Crypto Service Encryption User' role assigned at the key scope. Despite this, TDE operations fail because the SQL server cannot access the Key Vault. What additional configuration is required?

A

Enable the Azure SQL Database server's firewall to allow Azure services to access the server.

B

Configure the Key Vault firewall to allow trusted Microsoft services to bypass the firewall.

This setting allows trusted Azure services, including Azure SQL Database, to access the Key Vault when using a managed identity.

C

Assign a user-assigned managed identity to the SQL server instead of a system-assigned identity.

D

Change the Key Vault firewall to allow all networks.

Why: Azure Key Vault firewall allows you to deny public access but provides an option to allow trusted Microsoft services to bypass the firewall. Azure SQL Database, when configured with a managed identity and the appropriate permissions, is considered a trusted Microsoft service for Key Vault. Enabling this setting allows the SQL server to access the Key Vault for TDE operations without opening public access.

A company uses Azure SQL Database. They want to ensure that all data at rest is encrypted using a customer-managed key (CMK) stored in Azure Key Vault. They also require that the key is automatically rotated every 12 months. Which two actions must be configured to meet this requirement? (Select two.)

A

Enable Transparent Data Encryption (TDE) with a customer-managed key.

This must be configured to use a customer-managed key stored in Azure Key Vault for encrypting the database at rest.

B

Configure Key Vault to automatically rotate the key on a schedule.

Key Vault supports key rotation policies that can automatically rotate the key every 12 months to meet the requirement.

C

Configure Azure SQL Database auditing to log key usage.

D

Enable Azure Information Protection for the database.

Why: To use a customer-managed key for TDE, you must enable Transparent Data Encryption with a customer-managed key in Azure SQL Database. To meet the automatic rotation requirement, you must configure a key rotation policy in Azure Key Vault. The access policy for the SQL server to use the key is necessary but considered part of the setup for TDE with CMK; however, the question focuses on the high-level features (TDE with CMK and key rotation). The two essential features are enabling TDE with CMK and enabling automatic key rotation.

Want more Secure compute, storage, and databases practice?

Practice this domain

Frequently asked questions

How many questions are on the AZ-500 exam?

The AZ-500 exam has up to 60 questions and must be completed in 120 minutes. The passing score is 700/1000.

What types of questions appear on the AZ-500 exam?

The AZ-500 exam uses multiple-choice, multiple-select, drag-and-drop, and exhibit-based questions. Exhibit questions show CLI output, network diagrams, or routing tables and ask you to interpret them — exactly the format Courseiva uses.

How are AZ-500 questions organised by domain?

The exam covers 3 domains: Manage identity and access, Secure networking, Secure compute, storage, and databases. Questions are weighted by domain — higher-weight domains appear more on your actual exam.

Are these the actual AZ-500 exam questions?

No. These are original exam-style practice questions written against the official Microsoft AZ-500 exam objectives. They are not copied from the real exam. Courseiva focuses on genuine understanding, not memorisation of braindumps.

Ready to practice all 60 AZ-500 questions?

Courseiva tracks your accuracy per domain and routes you toward weak areas automatically. Free, no account required.