hardmultiple choiceObjective-mapped

A company uses Azure SQL Database with Transparent Data Encryption (TDE) encrypted using a customer-managed key (CMK) stored in Azure Key Vault. The Key Vault is protected by a firewall that denies all public access. The SQL server must be able to access the key for TDE operations. Which additional configuration is necessary in the Key Vault to allow this?

Question 1hardmultiple choice
Full question →

A company uses Azure SQL Database with Transparent Data Encryption (TDE) encrypted using a customer-managed key (CMK) stored in Azure Key Vault. The Key Vault is protected by a firewall that denies all public access. The SQL server must be able to access the key for TDE operations. Which additional configuration is necessary in the Key Vault to allow this?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Configure a private endpoint for the Key Vault and assign it to the SQL server's virtual network.

This is a valid approach but requires setting up virtual network integration and is not a single 'additional configuration' in Key Vault alone. The firewall exception is a simpler and more direct configuration.

B

Distractor review

Enable soft-delete on the Key Vault.

Soft-delete is for recovery of deleted keys, secrets, and certificates. It does not grant access to bypass the firewall.

C

Best answer

Enable the 'Allow trusted Microsoft services to bypass this firewall' setting.

This setting allows Azure services like Azure SQL Database, which are trusted by Azure, to access the Key Vault even when the firewall is enabled to deny public traffic. It is the required configuration to allow TDE operations.

D

Distractor review

Add a firewall rule to allow traffic from the Azure SQL Database's public IP address.

Azure SQL Database uses a range of public IPs that are not static and can change. It is not practical to maintain IP-based rules, and this would also compromise security by allowing broader IP ranges.

Common exam trap

Common exam trap: answer the scenario, not the keyword

Many certification questions include familiar terms but test a specific constraint. Read the exact wording before choosing an answer that is generally true but wrong for this case.

Technical deep dive

How to think about this question

This question should be treated as a scenario, not a definition check. Identify the problem, the constraint and the best action. Then compare each option against those facts.

KKey Concepts to Remember

  • Read the scenario before looking for a memorised answer.
  • Find the constraint that changes the correct option.
  • Eliminate answers that are true in general but not in this case.
  • Use explanations to understand the rule behind the answer.

TExam Day Tips

  • Underline the problem statement mentally.
  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Related practice questions

Related AZ-500 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this AZ-500 question test?

Read the scenario before looking for a memorised answer.

What is the correct answer to this question?

The correct answer is: Enable the 'Allow trusted Microsoft services to bypass this firewall' setting. — When the Key Vault firewall blocks all public traffic, Azure services like Azure SQL Database can still access the vault if trusted services are allowed. The 'Allow trusted Microsoft services to bypass this firewall' setting provides this exception. Other options are either not directly related (soft-delete), require complex setup (private endpoint), or are impractical (IP-based firewall rule).

What should I do if I get this AZ-500 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.