Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Explore how identity is the starting point for all security within your company. Learn to authenticate and authorize users and apps with Azure Active Directory.
This learning path helps prepare you for Exam AZ-500: Microsoft Azure Security Technologies.
Prerequisites:
Explore how to securely configure and administer your Azure Active Directory instance.
Learning objectives:
By the end of this module, you will be able to:
Prerequisites:
Q1. Your organization is considering multifactor authentication in Azure. Your manager asks about secondary verification methods. Which of the following options could serve as secondary verification method?
Q2. Your organization has implemented multifactor authentication in Azure. Your goal is to provide a status report by user account. Which of the following values could be used to provide a valid MFA status?
Q3. Which of the following options can be used when configuring multifactor authentication in Azure?
Q4. When configuring Azure AD roles, which of the following roles would allow the user to manage all the groups in a tenant and would be able to assign other admin roles?
Q5. Which of the following methods enable you to automatically add or remove users to security groups or Microsoft 365 groups, so you don’t always have to do it manually?
Explore how to deploy and configure Azure AD Connect to create a hybrid identity solution for your company.
Learning objectives:
By the end of this module, you will be able to:
Prerequisites:
Q1. The IT helpdesk wants to reduce password reset support tickets. You suggest having users sign-in to both on-premises and cloud-based applications using the same password. Your organization does not plan on using Azure AD Identity Protection, so which feature would be easiest to implement given the requirements?
Q2. Which tool can you use to synchronize Azure AD passwords with on-premises Active Directory?
Q3. Azure AD supports which of the following security protocols?
Q4. Which of the following is an authentication option that integrates with Azure Active Directory, requiring you to use several differing methods, like your phone, to confirm your identity?
Protect identities in Azure AD using Conditional Access, MFA, access reviews, and other capabilities.
Learning objectives:
By the end of this module, you will be able to:
Prerequisites:
Q1. The compliance auditors wants to ensure as employees change jobs or leave the company that their privileges are also changed or revoked. They are especially concerned about the Administrator group. To address their concerns. you implement which of the following?
Q2. Identity Protection has reported that a user’s credentials have been leaked. According to policy, the user’s password must be reset. Which Azure AD role can reset the password?
Q3. Identity Protection identifies risks in which of the following classifications?
Q4. You have implemented Identity Protection and are reviewing the Risky users report. For each reported event you can choose any of the following actions?
Q5. Conditional Access can be used to enable which of the actions listed below?
Q6. Which licensing plan supports Identity Protection?
Ensure that your privileged identities have extra protection and are accessed only with the least amount of access needed to do the job.
Learning objectives:
By the end of this module, you’ll be able to:
Prerequisites:
Q1. To enable Azure AD PIM for your directory, what Azure AD Role do you need to enable PIM?
Q2. A company has implemented Azure AD PIM. There’s a need to ensure a new hire’s request elevation before they make any changes in Azure, what should you do?
Q3. Azure AD PIM is used to manage which of the following roles?
Q4. An organization has enabled Azure AD PIM. The senior IT manager wants the role set up so no action is required, what should you do?
Learn to use RBAC and Azure Policy to limit access to your Azure solutions, and determine which method is right for your security goals.
Learning objectives:
By the end of this module, you will be able to:
Prerequisites:
Q1. The company hires a new administrator and needs to create a new Azure AD user account for them. The new hire must be able to: – Read/write resource deployments they are responsible for. – Read Azure AD access permissions They should not be able to view Azure subscription information. What should be configured to make this work?
Q2. Which of the following would be good example of when to use a resource lock?
Q3. A company has three virtual machines (VM1, VM2, and VM3) in a resource group. The Helpdesk hires a new employee. The new employee must be able to modify the settings on VM3, but not on VM1 and VM2. Your solution must minimize administrative overhead. What should be set up?
Q4. This is a need to target policies and review spend budgets across several subscriptions you manage. What should be created for the subscriptions?
Q5. A manager asks for an explanation of how Azure uses resource groups. Which of the following capabilities is a feature of how Azure uses resource groups?
I hope this AZ-500: Manage Identity and Access in Azure Microsoft Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.
This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.
Keep Learning!
More Coding Solutions >>