- Microsoft 365 Security Administration:MS-500 Exam Guide
- Peter Rising
- 332字
- 2021-06-18 18:57:36
Questions
- Which of the following is not a notification option that can be configured in Azure AD Identity Protection?
a. Users at risk detected alerts
b. Flagged users
c. Weekly digest
- True or False: With Identity Protection, you are able to configure an MFA registration policy.
a. True
b. False
- Which of the following would not be considered an example of a sign-in risk?
a. Impossible travel
b. MFA authentication
c. Anonymous IP address
d. Leaked credentials
- Which of these licenses is one of the possible requirements for users who need to be protected with Azure AD Identity Protection?
a. Azure Information Protection P1
b. Azure AD Premium P2
c. Azure AD Premium P1
d. Azure Information Protection P2
- True or False: Microsoft 365 administrators can block users identified as a risk from accessing Microsoft 365 resources.
a. True
b. False
- When the MFA registration policy is applied to a user, how long do they have before they are forced to complete the MFA registration process?
a. 12 days
b. 14 days
c. 15 days
d. 30 days
- How can you best ensure that your permanent break glass account is not targeted by user risk policy and sign-in risk policy?
a. Ensure your break glass account is synced with an on-premises AD
b. Ensure your break glass account is a cloud-only account
c. Ensure your break glass account is excluded from the user risk policy and the sign-in risk policy
d. Ensure your break glass account has a complex password
- True or False: With a user risk policy, it is possible to enforce MFA for a user.
a. True
b. False
- Which of these is not a sign-in risk level?
a. Low and above
b. Medium and above
c. Moderate
d. High
- True or False: When examining a risky user event, it is possible for administrators to confirm a suspected risky user as compromised, and in so doing, automatically raise the risk level of that user to High.
a. True
b. False
推薦閱讀
- Node Security
- INSTANT Netcat Starter
- SASE原理、架構(gòu)與實(shí)踐
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 工業(yè)物聯(lián)網(wǎng)安全
- 云原生安全與DevOps保障
- 數(shù)據(jù)安全領(lǐng)域指南
- 人工智能安全(精裝版)
- 黑客攻防從入門到精通:命令版
- 黑客攻防與電腦安全從新手到高手(超值版)
- CTF網(wǎng)絡(luò)安全競(jìng)賽入門教程
- 2010年中國(guó)互聯(lián)網(wǎng)網(wǎng)絡(luò)安全報(bào)告
- 極限黑客攻防:CTF賽題揭秘
- 應(yīng)用密碼學(xué):原理、分析與Python實(shí)現(xiàn)
- 網(wǎng)絡(luò)設(shè)備安全與防火墻