exam questions

Exam AZ-500 All Questions

View all questions & answers for the AZ-500 exam

Exam AZ-500 topic 1 question 6 discussion

Actual exam question from Microsoft's AZ-500
Question #: 6
Topic #: 1
[All AZ-500 Questions]

You have been tasked with applying conditional access policies for your company's current Azure Active Directory (Azure AD).
The process involves assessing the risk events and risk levels.
Which of the following is the risk level that should be configured for users that have leaked credentials?

  • A. None
  • B. Low
  • C. Medium
  • D. High
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
greatadhesiveness
Highly Voted 3 years, 9 months ago
Yes, he's High!
upvoted 20 times
us3r
3 years, 1 month ago
cheers
upvoted 1 times
...
...
awfnewf1q243
Highly Voted 7 months, 1 week ago
Selected Answer: D
D. High Note: It is very unlikely the Microsoft will require the memorization of specific risk levels given that they have changed the documentation. Previously the risk levels were very well defined, however they now provide this very vague paragraph: "Microsoft doesn't provide specific details about how risk is calculated. Each level of risk brings higher confidence that the user or sign-in is compromised. For example, something like one instance of unfamiliar sign-in properties for a user might not be as threatening as leaked credentials for another user." Modern Documentation: https://learn.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection#investigate-risk Legacy Documentation: https://web.archive.org/web/20190419234045/https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-risk-events
upvoted 9 times
...
stonwall12
Most Recent 2 months, 2 weeks ago
Selected Answer: D
Answer: D, High Reason: Leaked credentials are classified as a high-risk level in Azure AD Identity Protection because they indicate that valid username/password combinations are available to malicious actors, posing a significant security threat to the organization. Reference: https://learn.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-risks#risk-levels
upvoted 1 times
...
Vaibhav39
3 months, 3 weeks ago
Selected Answer: D
Risk level define is high
upvoted 1 times
...
ITFranz
4 months ago
Selected Answer: D
To support the answer: When a user has leaked credentials detected in Azure, the risk level is typically set to "High" in Conditional Access policies. This is because leaked credentials pose a significant security threat, as they indicate that the user's valid credentials have been compromised and are potentially available to unauthorized parties. To configure a Conditional Access policy for leaked credentials: In the Azure portal, navigate to Microsoft Entra ID > Security > Conditional Access. Create a new policy or edit an existing one. Under "Conditions", select "User risk". Set "Configure" to "Yes". Choose "High" as the risk level. By setting the risk level to "High" for leaked credentials, you ensure that the policy takes immediate action when such a threat is detected, such as requiring a password reset or multi-factor authentication Answer = D
upvoted 1 times
...
Fal991l
7 months, 1 week ago
Selected Answer: D
The risk level that should be configured for users that have leaked credentials in a conditional access policy is High. When a user's credentials are leaked, it means that their username and password have been compromised and are potentially in the hands of an attacker. This puts the user's account and the resources that they have access to at a high level of risk, making it important to apply strict access controls and security measures. By setting the risk level to High, conditional access policies can be configured to enforce stricter security measures, such as requiring multifactor authentication or blocking access to certain resources entirely. Therefore, the correct answer is D. High.
upvoted 2 times
...
zellck
7 months, 1 week ago
Selected Answer: D
D is the answer. https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-user-accounts#unusual-sign-ins Leaked credentials user risk detection - Risk Level: High
upvoted 1 times
...
xRiot007
9 months, 2 weeks ago
If your users credentials are leaked, you are yiffed, so it should always be the highest risk value, in this case "High"
upvoted 2 times
...
Urqlexandra
1 year, 7 months ago
Selected Answer: D
Yes, It's High!
upvoted 2 times
...
ESAJRR
1 year, 9 months ago
Selected Answer: D
D. High
upvoted 2 times
...
Holii
1 year, 11 months ago
Someone confirm if these questions are still on the exam. These are no longer up to date, and now analyzed as Real-Time and Offline.
upvoted 3 times
...
Andre369
2 years ago
Selected Answer: D
The correct answer is D
upvoted 1 times
...
pekay
2 years ago
Selected Answer: A
High is the right answer
upvoted 2 times
...
majstor86
2 years, 1 month ago
Selected Answer: D
D. High
upvoted 2 times
...
AZ5cert
2 years, 4 months ago
D: High
upvoted 1 times
...
salmantarik
2 years, 4 months ago
The question is outdated and not relevant now
upvoted 2 times
...
God2029
2 years, 4 months ago
Use logic and think like a security professional, users with Leaked credentials are always at high risk. Imagine the user is global admin. MFA is there, but still it is high risk. Nothing is secure and privacy is a myth before Advance Persistent Threat.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago