Latest AZ-500 Dumps - Check the Newest AZ-500

Views:
 
Category: Education
     
 

Presentation Description

AZ-500 questions and answers have shown outstanding results and, that is why, it has become the choice of everyone. A far reaching clarification has been exhibited in regards to all test subjects that will make you qualified to show exceptional execution in the last test of the year. Not only this, but you will get online practice test with AZ-500 study dumps that will make your success predictable. Since, you get guaranteed success at Dumpspass4sure.com.

Comments

Presentation Transcript

slide 1:

Microsoft AZ-500 Dumps PDF Microsoft Azure Security Technologies For more information: https://www.dumpspass4sure.com/microsoft/az-500-dumps.html

slide 2:

Question: 1 DRAG DROP You are implementing conditional access policies. You must evaluate the existing Azure Active Directory Azure AD risk events and risk levels to configure and implement the policies. You need to identify the risk level of the following risk events: Users with leaked credentials Impossible travel to atypical locations Sign ins from IP addresses with suspicious activity Which level should you identify for each risk event To answer drag the appropriate levels to the correct risk events. Each level may be used once more than once or not at all. You may need to drag the split bar between panes or scroll to view content. NOTE: Each correct selection is worth one point. Answer: Explanation: Azure AD Identity protection can detect six types of suspicious sign-in activities:

slide 3:

Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins from IP addresses with suspicious activity Sign-ins from unfamiliar locations These six types of events are categorized in to 3 levels of risks – High Medium Low: References: http://www.rebeladmin.com/2018/09/step-step-guide-configure-risk-based-azure-conditionalaccess- policies/ Question: 2 HOTSPOT You have an Azure Active Directory Azure AD tenant named contoso.com that contains the users shown in the following table. You create and enforce an Azure AD Identity Protection user risk policy that has the following settings: Assignment: Include Group1 Exclude Group2

slide 4:

Conditions: Sign-in risk of Medium and above Access: Allow access Require password change For each of the following statements select Yes if the statement is true. Otherwise select No. NOTE: Each correct selection is worth one point. Answer: Explanation: Box 1: Yes User1 is member of Group1. Sign in from unfamiliar location is risk level Medium. Box 2: Yes User2 is member of Group1. Sign in from anonymous IP address is risk level Medium. Box 3: No Sign-ins from IP addresses with suspicious activity is low. Note:

slide 5:

Azure AD Identity protection can detect six types of suspicious sign-in activities: Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins from IP addresses with suspicious activity Sign-ins from unfamiliar locations These six types of events are categorized in to 3 levels of risks – High Medium Low: References: http://www.rebeladmin.com/2018/09/step-step-guide-configure-risk-based-azure-conditionalaccess- policies/ Question: 3 DRAG DROP You need to configure an access review. The review will be assigned to a new collection of reviews and reviewed by resource owners. Which three actions should you perform in sequence To answer move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

slide 6:

Answer: Explanation: Step 1: Create an access review program Step 2: Create an access review control Step 3: Set Reviewers to Group owners In the Reviewers section select either one or more people to review all the users in scope. Or you can select to have the members review their own access. If the resource is a group you can ask the group owners to review. References:

slide 7:

https://docs.microsoft.com/en-us/azure/active-directory/governance/create-access-review https://docs.microsoft.com/en-us/azure/active-directory/governance/manage-programs-controls Question: 4 HOTSPOT You have an Azure Active Directory Azure AD tenant named contoso.com. The tenant contains the users shown in the following table. You configure an access review named Review1 as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on the

slide 8:

information presented in the graphic. NOTE: Each correct selection is worth one point. Answer: Explanation: Box 1: User3 only Use the Members self option to have the users review their own role assignments. Box 2: User3 will receive a confirmation request Use the Should reviewer not respond list to specify what happens for users that are not reviewed by the reviewer within the review period. This setting does not impact users who have been reviewed by the reviewers manually. If the final reviewers decision is Deny then the users access will be removed. No change - Leave users access unchanged Remove access - Remove users access Approve access - Approve users access Take recommendations - Take the systems recommendation on denying or approving the users continued access References: https://docs.microsoft.com/bs-latn-ba/azure/active-directory/privileged-identity- management/pimhow- to-start-security-review Question: 5 DRAG DROP You create an Azure subscription.

slide 9:

You need to ensure that you can use Azure Active Directory Azure AD Privileged Identity Management PIM to secure Azure AD roles. Which three actions should you perform in sequence To answer move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. Answer: Explanation: Step 1: Consent to PIM

slide 10:

Step: 2 Verify your identity by using multi-factor authentication MFA Click Verify my identity to verify your identity with Azure MFA. Youll be asked to pick an account. Step 3: Sign up PIM for Azure AD roles Once you have enabled PIM for your directory youll need to sign up PIM to manage Azure AD roles. References: https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pimgetting- started Question: 6 HOTSPOT Your company has two offices in Seattle and New York. Each office connects to the Internet by using a NAT device. The offices use the IP addresses shown in the following table. The company has an Azure Active Directory Azure AD tenant named contoso.com. The tenant contains the users shown in the following table.

slide 11:

The MFA service settings are configured as shown in the exhibit. Click the Exhibit tab. For each of the following statements select Yes if the statement is true. Otherwise select No. NOTE: Each correct selection is worth one point. Answer:

authorStream Live Help