Download Microsoft Azure Security Technologies.CertKingdom.AZ-500.2022-11-23.5e.246q.vcex

Download Exam

File Info

Exam Microsoft Azure Security Technologies
Number AZ-500
File Name Microsoft Azure Security Technologies.CertKingdom.AZ-500.2022-11-23.5e.246q.vcex
Size 19.32 Mb
Posted November 23, 2022
Downloads 26

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

 
 



Demo Questions

Question 1
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements. 
Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name. 
You have been tasked with integrating Active Directory and the Azure AD tenant. You intend to deploy Azure AD Connect. 
Your strategy for the integration must make sure that password policies and user logon limitations affect user accounts that are synced to the Azure AD tenant, and that the amount of necessary servers are reduced. 
Solution: You recommend the use of pass-through authentication and seamless SSO with password hash synchronization. 
Does the solution meet the goal? 

  • A: Yes 
  • B: No 



Question 2
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements. 
Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name. 
You have been tasked with integrating Active Directory and the Azure AD tenant. You intend to deploy Azure AD Connect. 
Your strategy for the integration must make sure that password policies and user logon limitations affect user accounts that are synced to the Azure AD tenant, and that the amount of necessary servers are reduced. 
Solution: You recommend the use of federation with Active Directory Federation Services (AD FS). 
Does the solution meet the goal? 

  • A: Yes 
  • B: No 



Question 3
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements. 
Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name. 
You have been tasked with integrating Active Directory and the Azure AD tenant. You intend to deploy Azure AD Connect. 
Your strategy for the integration must make sure that password policies and user logon limitations affect user accounts that are synced to the Azure AD tenant, and that the amount of necessary servers are reduced. 
Solution: You recommend the use of password hash synchronization and seamless SSO. 
Does the solution meet the goal? 

  • A: Yes 
  • B: No 



Question 4
You have been tasked with applying conditional access policies for your company's current Azure Active Directory (Azure AD). 
The process involves assessing the risk events and risk levels. 
Which of the following is the risk level that should be configured for users that have leaked credentials? 

  • A: None 
  • B: Low 
  • C: Medium 
  • D: High 



Question 5
You have been tasked with applying conditional access policies for your company's current Azure Active Directory (Azure AD). 
The process involves assessing the risk events and risk levels. 
Which of the following is the risk level that should be configured for sign ins that originate from IP addresses with dubious activity? 

  • A: None 
  • B: Low 
  • C: Medium 
  • D: High 



Question 6
You have been tasked with configuring an access review, which you plan to assigned to a new collection of reviews. You also have to make sure that the reviews can be reviewed by resource owners. 
You start by creating an access review program and an access review control. 
You now need to configure the Reviewers. 
Which of the following should you set Reviewers to? 

  • A: Selected users. 
  • B: Members (Self). 
  • C: Group Owners. 
  • D: Anyone. 



Question 7
Your company recently created an Azure subscription. You have, subsequently, been tasked with making sure that you are able to secure Azure AD roles by making use of Azure Active Directory (Azure AD) Privileged Identity Management (PIM). 
Which of the following actions should you take FIRST? 

  • A: You should sign up Azure Active Directory (Azure AD) Privileged Identity Management (PIM) for Azure AD roles. 
  • B: You should consent to Azure Active Directory (Azure AD) Privileged Identity Management (PIM). 
  • C: You should discover privileged roles. 
  • D: You should discover resources. 



Question 8
Your company has an Azure Container Registry. 
You have been tasked with assigning a user a role that allows for the uploading of images to the Azure Container Registry. The role assigned should not require more privileges than necessary. 
Which of the following is the role you should assign? 

  • A: Owner 
  • B: Contributor 
  • C: AcrPush 
  • D: AcrPull 



Question 9
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements. 
Your Company's Azure subscription includes a virtual network that has a single subnet configured. 
You have created a service endpoint for the subnet, which includes an Azure virtual machine that has Ubuntu Server 18.04 installed. 
You are preparing to deploy Docker containers to the virtual machine. You need to make sure that the containers can access Azure Storage resources and Azure SQL databases via the service endpoint. 
You need to perform a task on the virtual machine prior to deploying containers. 
Solution: You create an application security group. 
Does the solution meet the goal? 

  • A: Yes 
  • B: No 



Question 10
You make use of Azure Resource Manager templates to deploy Azure virtual machines. 
You have been tasked with making sure that Windows features that are not in use, are automatically inactivated when instances of the virtual machines are provisioned. 
Which of the following actions should you take? 

  • A: You should make use of Azure DevOps. 
  • B: You should make use of Azure Automation State Configuration. 
  • C: You should make use of network security groups (NSG). 
  • D: You should make use of Azure Blueprints. 






CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset