Download Microsoft Azure Security Technologies.dump4pass.AZ-500.2021-03-31.5e.191q.vcex


Download Exam

File Info

Exam Microsoft Azure Security Technologies
Number AZ-500
File Name Microsoft Azure Security Technologies.dump4pass.AZ-500.2021-03-31.5e.191q.vcex
Size 16.68 Mb
Posted March 31, 2021
Downloads 25



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%


 
 



Demo Questions

Question 1
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have an Azure subscription named Sub1. 
You have an Azure Storage account named sa1 in a resource group named RG1. 
Users and applications access the blob service and the file service in sa1 by using several shared access signatures (SASs) and stored access policies. 
You discover that unauthorized users accessed both the file service and the blob service. 
You need to revoke all access to sa1. 
Solution: You create a new stored access policy.
Does this meet the goal?

  • A: Yes
  • B: No



Question 2
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a hybrid configuration of Azure Active Directory (Azure AD). 
You have an Azure HDInsight cluster on a virtual network. 
You plan to allow users to authenticate to the cluster by using their on-premises Active Directory credentials. 
You need to configure the environment to support the planned authentication. 
Solution: You deploy the On-premises data gateway to the on-premises network.
Does this meet the goal?

  • A: Yes
  • B: No



Question 3
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. 
You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. 
You plan to deploy Azure AD Connect and to integrate Active Directory and the Azure AD tenant. 
You need to recommend an integration solution that meets the following requirements:
Ensures that password policies and user logon restrictions apply to user accounts that are synced to the tenant 
Minimizes the number of servers required for the solution. 
Which authentication method should you include in the recommendation?

  • A: federated identity with Active Directory Federation Services (AD FS)
  • B: password hash synchronization with seamless single sign-on (SSO)
  • C: pass-through authentication with seamless single sign-on (SSO)



Question 4
Your network contains an on-premises Active Directory domain named corp.contoso.com. 
You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. 
You sync all on-premises identities to Azure AD. 
You need to prevent users who have a givenName attribute that starts with TEST from being synced to Azure AD. The solution must minimize administrative effort. 
What should you use?

  • A: Synchronization Rules Editor
  • B: Web Service Configuration Tool
  • C: the Azure AD Connect wizard
  • D: Active Directory Users and Computers



Question 5
You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. 
An administrator named Admin1 has access to the following identities:
An OpenID-enabled user account 
A Hotmail account 
An account in contoso.com 
An account in an Azure AD tenant named fabrikam.com 
You plan to use Azure Account Center to transfer the ownership of Sub1 to Admin1. 
To which accounts can you transfer the ownership of Sub1?

  • A: contoso.com only
  • B: contoso.com, fabrikam.com, and Hotmail only
  • C: contoso.com and fabrikam.com only
  • D: contoso.com, fabrikam.com, Hotmail, and OpenID-enabled user account



Question 6
Your company plans to create separate subscriptions for each department. Each subscription will be associated to the same Azure Active Directory (Azure AD) tenant. 
You need to configure each subscription to have the same role assignments. 
What should you use?

  • A: Azure Security Center
  • B: Azure Policy
  • C: Azure AD Privileged Identity Management (PIM)
  • D: Azure Blueprints 



Question 7
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a hybrid configuration of Azure Active Directory (Azure AD). 
You have an Azure HDInsight cluster on a virtual network. 
You plan to allow users to authenticate to the cluster by using their on-premises Active Directory credentials. 
You need to configure the environment to support the planned authentication. 
Solution: You deploy Azure Active Directory Domain Services (Azure AD DS) to the Azure subscription.
Does this meet the goal?

  • A: Yes 
  • B: No



Question 8
Your network contains an Active Directory forest named contoso.com. You have an Azure Directory (Azure AD) tenant named contoso.com. 
You plan to configure synchronization by using the Express Settings installation option in Azure AD Connect. 
You need to identify which roles and groups are required to perform the planned configuration. The solution must use the principle of least privilege. 
Which two roles and groups should you identify? Each correct answer presents part of the solution. 
NOTE: Each correct selection is worth one point.

  • A: the Domain Admins group in Active Directory
  • B: the Security administrator role in Azure AD
  • C: the Global administrator role in Azure AD
  • D: the User administrator role in Azure AD
  • E: the Enterprise Admins group in Active Directory



Question 9
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have a hybrid configuration of Azure Active Directory (Azure AD). 
You have an Azure HDInsight cluster on a virtual network. 
You plan to allow users to authenticate to the cluster by using their on-premises Active Directory credentials. 
You need to configure the environment to support the planned authentication. 
Solution: You deploy an Azure AD Application Proxy.
Does this meet the goal?

  • A: Yes
  • B: No



Question 10
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. 
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. 
You have an Azure subscription named Sub1. 
You have an Azure Storage account named sa1 in a resource group named RG1. 
Users and applications access the blob service and the file service in sa1 by using several shared access signatures (SASs) and stored access policies. 
You discover that unauthorized users accessed both the file service and the blob service. 
You need to revoke all access to sa1. 
Solution: You regenerate the access keys.
Does this meet the goal?

  • A: Yes
  • B: No








ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset