- Microsoft 365 Security Administration:MS-500 Exam Guide
- Peter Rising
- 323字
- 2021-06-18 18:57:26
Questions
- Which of the following is not one of the identity methods available with Azure AD?
a. Pass-through authentication
b. Federation
c. MFA
d. Password hash sync
- Which of the following tools could you use to assess your organization's readiness to synchronize their active directory to Azure AD?
a. The Remote Connectivity Analyzer tool
b. The IdFix tool
c. The OffCAT tool
d. Synchronization Service Manager
- True or false – with password hash synchronization, users will always authenticate to on-premises AD when logging onto Azure AD.
a. True
b. False
- Which of the following Microsoft 365 licenses allow users to use SSPR (choose two)?
a. Azure AD Premium P2
b. Intune
c. Azure Information Protection P1
d. Azure AD Premium P1
- Which of the following PowerShell commands could you use to run a full Azure AD Connect sync manually?
a. Start-ADSyncSyncCycle -PolicyType Initial
b. Start-ADSyncSyncCycle -PolicyType Delta
c. Start-ADSyncSyncCycle -PolicyType Full
d. Start-ADSyncSyncCycle -PolicyType Immediate
- True or false – Conditional Access is a feature of Azure AD Premium designed to give Microsoft 365 administrators control over user and device access requests to services and applications within Azure AD and to apply actions based on certain conditions.
a. True
b. False
- What is the maximum number of authentication agents that can be configured in Azure AD for pass-through authentication?
a. 5
b. 10
c. 30
d. 40
- How frequently does Azure AD Connect automatically synchronize on-premises AD changes to Azure AD?
a. Every 20 minutes
b. Once an hour
c. Every 30 minutes
d. Every 15 minutes
- Which two of the following methods can be used to authenticate users to Azure AD with MFA?
a. Code with the Microsoft Authenticator app
b. SMS messages to mobile device
c. Security questions
d. Email address
- When deploying federation with AD FS, what is the minimum number of web application proxy servers you should configure on your perimeter network?
a. 5
b. 2
c. 3
d. 7
推薦閱讀
- CTF實戰:技術、解題與進階
- 信息系統安全檢測與風險評估
- INSTANT Burp Suite Starter
- Web安全與攻防入門很輕松(實戰超值版)
- Mastering Kali Linux for Advanced Penetration Testing
- Enterprise Cloud Security and Governance
- Preventing Digital Extortion
- 黑客攻防與無線安全從新手到高手(超值版)
- API攻防:Web API安全指南
- 軟件開發安全之道:概念、設計與實施
- 安全防御入門手冊
- 從實踐中學習密碼安全與防護
- 持續集成:軟件質量改進和風險降低之道
- Cybersecurity Threats,Malware Trends,and Strategies
- 交換機·路由器·防火墻(第2版)