AZ-500 Actual Exam Questions

Last updated on Dec. 13, 2024.
Vendor:Microsoft
Exam Code:AZ-500
Exam Name:Microsoft Azure Security Technologies
Exam Questions:505
 

Topic 1 - Question Set 1

Question #1 Topic 1

Your company recently created an Azure subscription.
You have been tasked with making sure that a specified user is able to implement Azure AD Privileged Identity Management (PIM).
Which of the following is the role you should assign to the user?

  • A. The Global administrator role.
  • B. The Security administrator role.
  • C. The Password administrator role.
  • D. The Compliance administrator role.
Reveal Solution Hide Solution   Discussion   34

Correct Answer: A 🗳️

Question #2 Topic 1

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name.
You have been tasked with integrating Active Directory and the Azure AD tenant. You intend to deploy Azure AD Connect.
Your strategy for the integration must make sure that password policies and user logon limitations affect user accounts that are synced to the Azure AD tenant, and that the amount of necessary servers are reduced.
Solution: You recommend the use of pass-through authentication and seamless SSO with password hash synchronization.
Does the solution meet the goal?

  • A. Yes
  • B. No
Reveal Solution Hide Solution   Discussion   85

Correct Answer: A 🗳️

Question #3 Topic 1

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name.
You have been tasked with integrating Active Directory and the Azure AD tenant. You intend to deploy Azure AD Connect.
Your strategy for the integration must make sure that password policies and user logon limitations affect user accounts that are synced to the Azure AD tenant, and that the amount of necessary servers are reduced.
Solution: You recommend the use of federation with Active Directory Federation Services (AD FS).
Does the solution meet the goal?

  • A. Yes
  • B. No
Reveal Solution Hide Solution   Discussion   22

Correct Answer: B 🗳️

Question #4 Topic 1

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name.
You have been tasked with integrating Active Directory and the Azure AD tenant. You intend to deploy Azure AD Connect.
Your strategy for the integration must make sure that password policies and user logon limitations affect user accounts that are synced to the Azure AD tenant, and that the amount of necessary servers are reduced.
Solution: You recommend the use of password hash synchronization and seamless SSO.
Does the solution meet the goal?

  • A. Yes
  • B. No
Reveal Solution Hide Solution   Discussion   40

Correct Answer: B 🗳️

Question #5 Topic 1

Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name.
After syncing all on-premises identities to Azure AD, you are informed that users with a givenName attribute starting with LAB should not be allowed to sync to
Azure AD.
Which of the following actions should you take?

  • A. You should make use of the Synchronization Rules Editor to create an attribute-based filtering rule.
  • B. You should configure a DNAT rule on the Firewall.
  • C. You should configure a network traffic filtering rule on the Firewall.
  • D. You should make use of Active Directory Users and Computers to create an attribute-based filtering rule.
Reveal Solution Hide Solution   Discussion   24

Correct Answer: A 🗳️

Question #6 Topic 1

You have been tasked with applying conditional access policies for your company's current Azure Active Directory (Azure AD).
The process involves assessing the risk events and risk levels.
Which of the following is the risk level that should be configured for users that have leaked credentials?

  • A. None
  • B. Low
  • C. Medium
  • D. High
Reveal Solution Hide Solution   Discussion   28

Correct Answer: D 🗳️

Question #7 Topic 1

You have been tasked with applying conditional access policies for your company's current Azure Active Directory (Azure AD).
The process involves assessing the risk events and risk levels.
Which of the following is the risk level that should be configured for sign ins that originate from IP addresses with dubious activity?

  • A. None
  • B. Low
  • C. Medium
  • D. High
Reveal Solution Hide Solution   Discussion   78

Correct Answer: C 🗳️

Question #8 Topic 1

You have been tasked with configuring an access review, which you plan to assigned to a new collection of reviews. You also have to make sure that the reviews can be reviewed by resource owners.
You start by creating an access review program and an access review control.
You now need to configure the Reviewers.
Which of the following should you set Reviewers to?

  • A. Selected users.
  • B. Members (Self).
  • C. Group Owners.
  • D. Anyone.
Reveal Solution Hide Solution   Discussion   34

Correct Answer: C 🗳️

Question #9 Topic 1

Your company recently created an Azure subscription. You have, subsequently, been tasked with making sure that you are able to secure Azure AD roles by making use of Azure Active Directory (Azure AD) Privileged Identity Management (PIM).
Which of the following actions should you take FIRST?

  • A. You should sign up Azure Active Directory (Azure AD) Privileged Identity Management (PIM) for Azure AD roles.
  • B. You should consent to Azure Active Directory (Azure AD) Privileged Identity Management (PIM).
  • C. You should discover privileged roles.
  • D. You should discover resources.
Reveal Solution Hide Solution   Discussion   48

Correct Answer: C 🗳️

Question #10 Topic 1

You need to consider the underlined segment to establish whether it is accurate.
You have been tasked with creating a different subscription for each of your company's divisions. However, the subscriptions will be linked to a single Azure Active
Directory (Azure AD) tenant.
You want to make sure that each subscription has identical role assignments.
You make use of Azure AD Privileged Identity Management (PIM).
Select `No adjustment required` if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option.

  • A. No adjustment required
  • B. Azure Blueprints
  • C. Conditional access policies
  • D. Azure DevOps
Reveal Solution Hide Solution   Discussion   42

Correct Answer: B 🗳️

file Viewing page 1 out of 51 pages.
Viewing questions 1-10 out of 505 questions
Next Questions
Browse atleast 50% to increase passing rate cup
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago