Microsoft Azure Security AZ-500 Exam 2025 – Complete Prep Guide

Question: 1 / 400

To confirm suspicions of users attempting to sign in to inaccessible resources, what should be included in the Log Analytics query?

The EventID and Count() parameters.

To confirm suspicions of users attempting to sign in to inaccessible resources, using the EventID and Count() parameters in the Log Analytics query is effective because the EventID specifically identifies distinct types of sign-in events within Azure logs. This allows you to filter down to the relevant events concerning access denial or sign-in attempts to secured resources. By pairing EventID with the Count() function, you get a total count of those specific events, which helps quantify how often these potentially suspicious activities are occurring.

Using Count() provides a straightforward aggregate count of all occurrences of the specified EventID in your logs, which is essential in verifying if there is an anomaly, such as an unusually high number of failed sign-in attempts, signaling a possible attack or security issue.

While using parameters like CountIf() might seem relevant, it is more suitable for scenarios where conditional counting based on specific criteria is necessary. However, in the context of simply needing to confirm the occurrence and tally of sign-in attempts, Count() when combined with EventID is more direct and efficient.

Get further explanation with Examzify DeepDiveBeta

The EventID and CountIf() parameters.

The ActivityID and Count() parameters.

The ActivityID and CountIf() parameters.

Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy