Microsoft AZ-500 Q & A

1

When registering an app with Azure AD to use modern authentication, what three fields are configurable when first registering the app?

Display name

App ID

App Secret

Supported account types

Redirect URI

Display name , Redirect URI , Supported account types

2

What are the three alert states in Azure Monitor?

New

Fired

Assigned

Acknowledged

Resolved

Closed

New ,Acknowledged , Closed


Explanation
Alert states: New, Acknowledged, Closed are set by the user.
Alert conditions: Fired or Resolved (underlying condition that caused the alert has been resolved) are set by Azure Monitor.
Know the difference between alert states and alert conditions and who sets them (system or user).

3

You have a hybrid Azure AD deployment and have just deployed an Azure SQL Database. You have deployed a custom application to a newly created VM (VM1) and you want the application to use the VM’s system-assigned managed identity to access the Azure SQL Database. You have a user named User1 that wants to use the application. What steps do you perform to accomplish your goal?

Create a Azure AD user account that will serve as the SQL server administrator and assign the AD role of user

Create a Azure AD user account that will serve as the SQL server administrator and assign the AD role of limited administrator

Create a Azure AD user account that will serve as the SQL server administrator and assign the AD role of: global administrator

Enable AD authentication on the Access control (IAM) blade of the SQL server

Enable AD authentication on the Active Directory Admin blade of the SQL server

Enable the system assigned managed identity for the VM using the Azure Active Directory blade

Enable the system assigned managed identity for the VM using the VM Identity blade

Create a contained database user specifying the VM managed identity in the database using CREATE USER [VM1] FROM EXTERNAL PROVIDER

Create a contained database user specifying the VM managed identity in the database using CREATE USER [VM1] FROM EXTERNAL AZURE

Give the user permissions in the database using ALTER ROLE db_datareader ADD MEMBER [VM1]

Give the user permissions in the database using ALTER ROLE db_datareader ADD MEMBER [User1]

The application connects to the SQL server using the Access token

The application connects to the SQL server using the VM user account

Create a Azure AD user account that will serve as the SQL server administrator and assign the AD role of user
Enable AD authentication on the Active Directory Admin blade of the SQL server•
Enable the system assigned managed identity for the VM using the VM Identity blade•
Create a contained database user specifying the VM managed identity in the database using CREATE USER [VM1] FROM EXTERNAL PROVIDER•
Give the user permissions in the database using ALTER ROLE db_datareader ADD MEMBER [VM1]•
The application connects to the SQL server using the Access token

4

What are the four MFA modes?

Phone call

SMS text message

MS Authenticator App

Google Authenticator App

OATH token code

PKI Certificate

Self-signed certificate

Enabled

Disabled

Enforced

Phone call

SMS text message

MS Authenticator App

OATH token code

Explanation


Authentication modes, also known as authentication methods are all the second factors selectable in Azure MFA. There are more methods selectable when you use the on-premises Azure MFA server. Know the differences, especially the more obscure combinations when using on-premises MFA. Enabled, disabled and Enforced are the MFA states for each user – don’t confuse terminology like modes and states like the question is trying to do.

5

When creating a new AIP label, what four areas can be configured?

General

Common

Header

Marking

Protection

Encryption

Conditions

Common ,Marking , Protection , Conditions


Explanation
Common: Name and description
Marking: Visual marking, header, footer, watermark
Protection: Encryption key selection, permissions, expiration
Conditions: Built-in or custom REGEX pattern matching

6

What are the four focus areas of Azure Security Center policy?

Identity

VMs

Compute and apps

Storage

Data

Network

Just in Time (JIT) VM Access

Vulnerability management

Identity , Compute and apps Data ,Network


Explanation
VMs are included in Compute, Storage is included in data.

7

Which two of the following options are not valid exclusion assignments when creating an Azure policy assignment?

Resource group

Resource

Initiative

Subscription

Tenant

Management group

Initiative ,Tenant


Explanation
Policy scope exclusions allow Management group, Subscription, Resource group and Resource selection

8

Which of the following cannot be used to create a custom RBAC role in Azure?

Azure CLI

Azure Portal

Azure PowerShell

Azure Cloud Shell

REST API

Azure Portal


Explanation
Azure portal cannot be used to create a custom RBAC role, you must use one of the command-line or scripting interfaces.

9

You have to ensure the principle of least privilege. Which Azure RBAC role is required to configure a lock on an Azure resource?

Owner

Contributor

User Access Administrator

User Administrator

Security Administrator

User Access Administrator


Explanation
Only User Access Administrator and Owner has the RBAC permissions to create or delete resource locks. Lease privilege means you need to assign the fewest permissions to accomplish the task. Expect to see a focus on this principle throughout the exam. Know the difference between Azure AD roles and Azure resource (RBAC) roles. Azure AD roles allow you different permissions (AKA rights) to administer Azure identities. Azure resource roles allow you different permissions mainly for managing the configuration of Azure resources. There are roles with similar names in each category – User administrator (Azure AD) and User access administrator (Azure RBAC).

10

In Azure Information Protection there are three types of key scenarios. Match the key scenario with the technology used to create and maintain the keys. Choose 3.

Key managed by Microsoft: Microsoft

Key managed by Microsoft: Key Vault

Key managed by Microsoft: AD RMS

Key managed by Microsoft: HSM

Bring your own key (BYOK): Microsoft

Bring your own key (BYOK): Key Vault

Bring your own key (BYOK): AD RMS

Bring your own key (BYOK): HSM

Hold your own key (HYOK): Microsoft

Hold your own key (HYOK): Key Vault

Hold your own key (HYOK): AD RMS

Hold your own key (HYOK): HSM

Key managed by Microsoft: Microsoft , Bring your own key (BYOK): Key Vault , Hold your own key (HYOK): AD RMS


Explanation
Azure Key Vault standard is a software-based HSM; Azure Key Vault Premium is a hardware-backed cloud HSM.

11

A user is enrolled for MFA but loses his mobile device, but the company is not doing mobile device management. He gets a new mobile device with the same phone number. You must ensure that his lost device cannot be used to gain unwanted access to his account . Each option below represents part of the solution and are not in order. Select all options that you should perform:

Revoke and reassign the user’s AAD P2 license

From MFA settings portal, choose service settings and disable “Allow users to remember multi-factor authentication on devices they trust”

From MFA settings portal, choose user settings, enable “Require selected users to provide contact methods again”

From MFA settings portal, choose user settings, enable “Delete all existing app passwords…”

From MFA settings portal, choose user settings, enable “Restore multi-factor authentication on all remembered devices”

Disable and re-enable the user’s user account

From MFA settings portal, choose user settings, enable “Delete all existing app passwords…”

From MFA settings portal, choose user settings, enable “Restore multi-factor authentication on all remembered devices”


Explanation
Revoke and reassign the user’s AAD P2 license
No – this will have no effect on the user’s MFA settings or lost device
From MFA settings portal, choose service settings and disable “Allow users to remember multi-factor authentication on devices they trust”
No – this changes the setting for all users, you only want to change this for a specific user
From MFA settings portal, choose user settings, enable “Require selected users to provide contact methods again”
No – since the user has the same phone number, re-enrolment is not required
From MFA settings portal, choose user settings, enable “Delete all existing app passwords…”
Yes – this ensures that any apps on the user’s mobile device that required an app password will no longer have access
From MFA settings portal, choose user settings, enable “Restore multi-factor authentication on all remembered devices”
Yes – this will revoke all remembered MFA on the user’s devices, requiring MFA to be supplied again to get access
Disable and re-enable the user’s user account
No – This will have no effect on the MFA settings for the user account

12

When doing an app registration in Azure AD, which three of the following are options for application permission scopes (supported account types) can be assigned?

Default Azure AD directory

Any Azure AD directory

Any Azure AD directory and Personal MS accounts

Any Google account

Any Facebook account

Any federated B2B account

Default Azure AD directory

Any Azure AD directory

Any Azure AD directory and Personal MS accounts

13

You have an existing dynamic group in AAD. You want the group to contain users and their devices. What should you configure?

Create two membership rules that select the users and devices respectively

Delete and recreate the group, manually add users and devices

Create a membership rule that selects the users. Manually add the devices to the group

Create two dynamic groups, one for devices and one for users. Create an assigned group and add the two dynamic groups to it

Create a membership rule that selects the devices. Manually add the users to the group

Delete and recreate the group, manually add users and devices


Explanation
This is a gotcha-question typical of recent MS exams… You must know the limitations of the features in Azure. Look out for less common usage scenarios.
You cannot have a dynamic group that contain both users and devices.
You cannot add dynamic groups to assigned groups.

14

When assigning an Azure policy, when is it necessary to assign a managed identity?

When the policy is assigned to a management group and will have effect on multiple subscriptions

For any security policy

For any policy that includes the DeployIfNotExists policy action

For any policy that includes any policy action

All policies require a managed identity assigned in order to assess (read) the Azure resources to be assessed

For any policy that includes the DeployIfNotExists policy action


Explanation
Permission to deploy resources into the subscription must have a managed identity to deploy resources.

15

Which three of the following options are valid scope assignments when creating an Azure policy assignment?

Resource group

Resource

Initiative

Subscription

Tenant

Management group

Resource group , Subscription , Management group


Explanation
Policies can be scoped to the management group, subscription and optionally the resource group level and will be applied to all resources within the scope.
You can perform a policy assignment or initiative assignment (multiple policies at the same time) at the selected scope.
You can also assign policies or initiatives to hierarchical management groups which are groups of subscriptions. The assignment is inherited by all child objects.

16

You create an Azure Policy assignment to a subscription. Which two of the following are valid scope exclusions?

Resource group

Resource

Initiative

Subscription

Tenant

Management group

Resource group

Resource


Explanation
Resource group and resource are valid exclusion scopes if the policy assignment scope is at the subscription level. If you had scoped the assignment to a management group, you could select individual subscriptions within that management group as exclusions, in addition to child resource groups and resources.

17

What are the two Azure Monitor alert conditions?

New

Fired

Assigned

Acknowledged

Resolved

Closed

Fired , Resolved


Explanation
Alert states: New, Acknowledged, Closed are set by the userAlert conditions: Fired or Resolved (underlying condition that caused the alert has been resolved) are set by Azure Monitor

18

As part of an Azure SQL Database AlwaysEncrypted configuration, where are the encryption keys stored?

Column Master Key: AKV

Column Master Key: SQL

Column Master Key: Client

Column Encryption Key: AKV

Column Encryption Key: SQL

Column Encryption Key: Client

Column Master Key: AKV , Column Encryption Key: SQL

19

You have an Azure HDInsights cluster on a Azure VNet. You need to secure communication between the cluster and your on-premises network, establish name resolution and use on-premises AD credentials to administer the cluster. You have to minimise costs. What do you deploy?

Deploy an on-premises data gateway

Deploy AD Connect

Deploy a site-to-site VPN

Deploy a custom DNS server on the Vnet

Deploy network security groups on the Vnet

Deploy a site-to-site VPN

Deploy a custom DNS server on the Vnet

Deploy network security groups on the Vnet


Explanation
Deploy an on-premises data gateway – no.
Deploy AD Connect – no, local AD credentials used with HDInsight does not need synchronisation with AAD.
Deploy a site-to-site VPN – yes, you need to establish network connectivity.
Deploy a custom DNS server on the Vnet – yes, you need to establish name resolution for the solution. On-premises DNS integration requires you to set up a custom DNS server for the VNet.
Deploy network security groups on the Vnet – yes, you need to secure the communication between the Vnet and the OPE network.

20

In OAuth 2.0 / OpenID Connect, what does the authentication provider return to the browser after a successful authentication?

Certificate

ID Token

Session Key

Session Secret

Azure Key Vault

ID Token


Explanation
ID Token in JSON Web Token (JWT) format

21

What is the difference between OpenID Connect and OAuth 2.0?

OAuth 2.0 is a protocol used for authentication

OAuth 2.0 is a protocol used for authorisation

OAuth 2.0 is a protocol used for security assertion

OpenID Connect is a protocol used for authentication

OpenID Connect is a protocol used for authorisation

OpenID Connect is a protocol used for security assertion

OAuth 2.0 is an extension of OpenID Connect

OpenID Connect is an extension of OAuth 2.0

OAuth 2.0 is a protocol used for authorisation , OpenID Connect is a protocol used for authentication , OpenID Connect is an extension of OAuth 2.0


Explanation
OAuth 2.0 is an industry-standard authorisation protocol. OpenID Connect is an authentication standard built on OAuth 2.0. The exam might sometimes explore the differences between authentication and authorisation by using the standard names instead of the terms.

22

When doing an app registration in Azure AD, what are two methods to ensure application security?

Application Certificate

Application key

Application secret

Azure Key Vault

Azure Security Center

Application Certificate ,Application secret

23

T/F: MFA can be implemented by requiring a primary “system access” username and password, and a secondary “application access” username and password.

True

False

Don’t know

False


Explanation
MFA requires more than one factor of authentication at the same time
Something you know (password)
Something you have (token / device / certificate)
Something you are (biometrics)
Using two passwords is just using the same factor twice and is not considered true MFA

24

When a user is enabled for MFA in AAD, when would an app password be required?

When the user doesn’t have a license that enables MFA

When the user is using an OS other than Windows

When the user is using an Android-based mobile device

When the user is using an IOS-based mobile device

All of the options are correct

None of the options are correct

None of the options are correct


Explanation
A user will be required to have an app password for apps that don’t support modern authentication like older versions of Office apps (Office 2010 or Office 2013) and native mail apps on mobile devices.
Modern Office apps for IOS and Android support modern authentication and don’t need an app password.

25

Which of the following authentication methods are not supported for Azure MFA?

Password

Security questions

Email address

MS authenticator app

OATH hardware token

SMS

Voice call

App passwords

Security questions

Email address


Explanation
Security questions and email address are not supported for MFA. All the others are valid configurable authentication methods for both MFA and SSPR. App passwords are only applicable to MFA and not to SSPR.

26

Match the Azure RBAC terms and definitions

Group of users: assignment

Group of users: scope

Group of users: role

Group of users: principal

Group of permissions: assignment

Group of permissions: scope

Group of permissions: role

Group of permissions: principal

Group of resources: assignment

Group of resources: scope

Group of resources: role

Group of resources: principal

Group of access: assignment

Group of access: scope

Group of access: role

Group of users: principal , Group of permissions: role ,Group of resources: scope , Group of access: assignment

27

You are creating a custom RBAC role and want to restrict all but a few allowable actions to the new role. What section of the role definition JSON file do you configure?

Actions

NotActions

DataActions

NotDataActions

AssignableScopes

Actions


Explanation
You will configure the allowable actions in the Actions section of the file. Configuring items in allowable excludes everything not listed. Configuring items in NotActions only prevents the listed items.

28

You want to ensure the use of trusted container images in your organisation. Which two of the following options should you choose?

Docker hub

Azure container registry

Docker trusted registry

Azure container instances

Azure Kubernetes Service

Azure Key Vault

Azure container registry

Docker trusted registry


Explanation
Azure container registry and Docker trusted registry are ways to ensure the use of trusted container images

29

You are configuring Azure Update Management. You onboarded several VMs that have been deployed to different resource groups and regions. You have configured the following update deployments:

  • Item1: VM1, EastUS, RG1, Windows 2008R2
  • Item2: VM2, WestUS, RG2, CentOS 6
    You want to add additional VMs to the update deployments. Which of the following can you do?


    Add VM3, EastUS, RG2, Windows 2016 to Item1

    Add VM4, WestEurope, RG1, Windows 2016 to Item1

    Add VM5, EastUS, RG1, CentOS 6 to Item1

    Add VM6, EastUS, RG2, CentOS 6 to Item2
  • Add VM3, EastUS, RG2, Windows 2016 to Item1
  • Add VM4, WestEurope, RG1, Windows 2016 to Item1 Add VM6, EastUS, RG2, CentOS 6 to Item2

  • Explanation
    A favourite trope of the exam – knowing the limitations of adding instances with different properties (region, resource group, OS, etc.) to Azure services once you’ve already configured the service.
    You can add any VM from and RG or Region to a Update Management deployment schedule as long as the new VM is also Windows or Linux respectively.

30

Which of the following options would you deploy and configure if you wanted to protect a Azure SQL Database against the OWASP-defined threat of SQL Injection?

Azure Application Gateway with Web Application Firewall

Azure SQL Server Advanced Threat Protection

Azure Firewall

Network Security Group

Application Security Group

Azure Security Center Standard

Azure SQL Server Advanced Threat Protection


Explanation
Azure SQL Server Advanced Threat Protection protects agains SQL injection. If you wanted to secure a web app against SQL injection you would deploy Azure Application Gateway with Web Application Firewall.

31

You are using Azure Key Vault to provide protection for a custom application your organisation is using. Match the application security issue with the appropriate Key Vault object to be used to secure it.

The connection string to REDIS cache is stored in the web application configuration file: Secret

The connection string to REDIS cache is stored in the web application configuration file: Key

The connection string to REDIS cache is stored in the web application configuration file: Certificate

SQL AlwaysEncrypted will be configured: Secret

SQL AlwaysEncrypted will be configured: Key

SQL AlwaysEncrypted will be configured: Certificate

Database connection string with username and password is stored in clear text in the web application configuration file: Secret

Database connection string with username and password is stored in clear text in the web application configuration file: Key

Database connection string with username and password is stored in clear text in the web application configuration file: Certificate

Connecting to the web application will be restricted to HTTPS only: Secret

Connecting to the web application will be restricted to HTTPS only: Key

Connecting to the web application will be restricted to HTTPS only: Certificate

The connection string to REDIS cache is stored in the web application configuration file: Secret , SQL AlwaysEncrypted will be configured: Key , Database connection string with username and password is stored in clear text in the web application configuration file: Secret , Connecting to the web application will be restricted to HTTPS only: Certificate

32

You are configuring BYOK for a storage account you manage. Which of the following are not prerequisites for the deployment.

Azure Key Vault deployed in the same region

Azure Key Vault deployed in the same resource group

Azure Key Valut deployed in the same subscription

Azure Key Vault access policy enabled for volume encryption

Azure Key Vault deployed in the same resource group

Azure Key Valut deployed in the same subscription

Azure Key Vault access policy enabled for volume encryption


Explanation
AKV and storage account must be in the same region for BYOK, but need not be in the same RG or sub. AKV volume encryption access policy is for Azure Disk Encryption (BitLocker) and not used as part of BYOK storage.

33

T/F: Azure SQL Database encrypts sensitive data using the column encryption key (CEK) in a AlwaysEncrypted deployment.

True

False

Tralse

False


Explanation
The Always Encrypted enabled client driver running on the client is responsible for encryption and decryption of data before it is sent to the database.

34

You are securing your web application by removing connection strings to Azure SQL Database from the web.config configuration file. What two options do you have in Azure to accomplish your goal?

Azure Key Vault secret

Azure Active Directory Managed Service Identity (MSI)

Azure Active Directory Application Registration

Azure SQL Database server Active Directory admin

Azure SQL Database AlwaysEncrypted

Azure SQL Database Transparent Data Encryption (TDE)

Azure Key Vault secret

Azure Active Directory Managed Service Identity (MSI)

35

You’re configuring AIP and want to help your users find more information about the information protection policies and classifications. What would you use to provide this information to users?

Custom tooltip

Custom URL

Custom label

Custom policy

Custom URL


Explanation
Custom URL for “tell me more”

36

From what interface can you launch a previously-configured security playbook?

Azure Security Center

Security Alert

Azure Monitor

Azure Logic App

Security Alert


Explanation
Playbooks can be launched from the investigation screen of a security alert or security incident in Azure Security Center

37

Match the following datasets with the Azure Monitor data store.

Trace data: Logs

Trace data: Telemetry

Trace data: Metrics

Trace data: Store

Point in time resource property: Logs

Point in time resource property: Telemetry

Point in time resource property: Metrics

Point in time resource property: Store

Access record: Logs

Access record: Telemetry

Access record: Metrics

Access record: Store

Trace data: Logs ,Point in time resource property: Metrics ,Access record: Logs


Explanation
Azure Monitor uses only two kinds of data: logs and metrics. Logs are multi-dimensional records, metrics are key-value pairs.

38

Match the following datasets with the Azure Monitor data store.

Telemetry data: Logs

Telemetry data: Telemetry

Telemetry data: Metrics

Telemetry data: Store

OS events: Logs

OS events: Telemetry

OS events: Metrics

OS events: Store

Lightweight performance indicator: Logs

Lightweight performance indicator: Telemetry

Lightweight performance indicator: Metrics

Lightweight performance indicator: Store

Telemetry data: Logs , OS events: Logs ,Lightweight performance indicator: Metrics


Explanation
Azure Monitor uses only two kinds of data: logs and metrics. Logs are multi-dimensional records, metrics are key-value pairs.

39

Match the following datasets with the Azure Monitor data store.

Key / value pair: Logs

Key / value pair: Telemetry

Key / value pair: Metrics

Key / value pair: Store

Multi-dimensional object property: Logs

Multi-dimensional object property: Telemetry

Multi-dimensional object property: Metrics

Multi-dimensional object property: Store

Key / value pair: Metrics , Multi-dimensional object property: Logs


Explanation
Azure Monitor uses only two kinds of data: logs and metrics. Logs are multi-dimensional records, metrics are key-value pairs.

40

Which of these cannot be used to create AAD conditional access policies?

Azure Portal

Windows PowerShell

Azure Cloud Shell

PowerShell Core

Azure CLI

REST API

Windows PowerShell

Azure Cloud Shell

PowerShell Core

Azure CLI

REST API


Explanation
AAD conditional access policies can only be created using the Azure portal

41

What is the minimum license that is required to configure AAD Identity Protection?

Azure AD Premium P1

Azure AD Premium P2

No license is required

Any Office 365 license

No license is required, but the user must be an Azure AD Global Administrator

Azure AD Premium P2


Explanation
Azure AD Premium P2
No other license option provides AAD Identity Protection

42

You have the following resource groups containing the listed resources:

  • RG1; VM1 (stopped)
  • RG2; VM2 (stopped)
  • RG3; VM3 (stopped)

You have locks configured as follows:

  • Lock1; Read-only; RG1
  • Lock2; Delete; RG1
  • Lock3; Delete; RG2
  • Lock4; Read-only; RG3

Which of the following actions can you perform?

You can start VM1

You can start VM2

You can delete VM1

You can delete VM2

You can delete VM3

You can start VM2


Explanation
You can start VM1 [No] Start is considered a change and is prevented by RO Lock1 inherited from RG1.
You can start VM2 [Yes] No-delete Lock3 inherited from RG2 does not prevent changes (including start/stop) to VM2.
You can delete VM1 [No] Delete is prevented by RO locks. RO Lock1 inherited from RG1 prevents delete. No-delete Lock2 inherited from RG1 also prevents delete.
You can delete VM2 [No] No-delete Lock3 inherited from RG2 prevents delete.
You can delete VM3 [No] Delete is prevented by RO locks. RO Lock4 inherited from RG3 prevents delete.

43

You have an Azure container registry. You have users with these roles.

  • User1: Contributor
  • User2: Reader
  • User3: AcrPush
  • User4: AcrPull

Select what each user can do?

User1 can sign an image

User2 can pull an image

User3 can pull an image

User4 can pull an image

User3 can pull an image

User4 can pull an image


Explanation
User1 can sign an image [No] Only AcrSign can do that, not even owner can.
User2 can pull an image [No] Reader can only do ARM things.
User3 can pull an image [Yes] AcrPush can also pull.
User4 can pull an image [Yes] Obviously.

44

What are the three types of keys in AIP?

Tenant Key

Document Key

Classification Key

Label Key

Content Key

User Key

Tenant Key ,Content Key

User Key


Explanation
Tenant key: used as the root key to secure all other keys.
Content key: used to secure information.
User key: Used by the user to get access (and varying permissions) to content.

45

You have an existing AD Connect implementation. You have to prevent users from a certain department to be synchronised to AAD. What tool do you use?

AAD Connect wizard on the AD Connect server

Synchronization Rules Editor on the AD Connect server

AAD Connect in the Azure portal

AD Users and Computers on the local DC

Synchronization Rules Editor on the AD Connect server


Explanation
Synchronization Rules Editor on the AD Connect server is used to change the users to be synced.

46

What format is an OpenID Connect token?

XML

SAML

JWT

Java

JWT


Explanation
JSON Web Token (JWT)

47

Which two of the following are objects you can configure to apply AAD PIM to?

Access Reviews

AAD Roles

ADD Groups

Azure Resources

AAD Dynamic Groups

AAD Roles , Azure Resources


Explanation
AAD Roles and Azure resources

48

In Azure SQL Database AlwaysEncrypted, two types of column encryption is supported. Match the requirement with the appropriate column encryption type. Plaintext data values always produce the same cyphertext:

Deterministic

Randomized

Deterministic


49

In Azure SQL Database AlwaysEncrypted, two types of column encryption is supported. Match the requirement with the appropriate column encryption type. SQL Server can use the encrypted columns in joins and lookups:

Deterministic

Randomized

Deterministic

50

In Azure SQL Database AlwaysEncrypted, two types of column encryption is supported. Match the requirement with the appropriate column encryption type. Highest level of security:

Deterministic

Randomized

Randomized