
AZR500part1
Authored by Kenneth Reyes
Fun
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your company recently created an Azure subscription. You have been tasked with making sure that a specified user is able to implement Azure AD Privileged Identity Management (PIM).
Which of the following is the role you should assign to the user?
The Global administrator role
The Security administrator role.
The Password administrator role.
The Compliance administrator role.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name. You have been tasked with integrating Active Directory and the Azure AD tenant. You intend to deploy Azure AD Connect. Your strategy for the integration must make sure that password policies and user logon limitations affect user accounts that are synced to the Azure AD tenant, and that the amount of necessary servers are reduced.
Solution: You recommend the use of pass-through authentication and seamless SSO with password hash synchronization. Does the solution meet the goal?
YES
NO
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name. You have been tasked with integrating Active Directory and the Azure AD tenant. You intend to deploy Azure AD Connect. Your strategy for the integration must make sure that password policies and user logon limitations affect user accounts that are synced to the Azure AD tenant, and that the amount of necessary servers are reduced.
Solution: You recommend the use of federation with Active Directory Federation Services (AD FS). Does the solution meet the goal?
YES
NO
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name. You have been tasked with integrating Active Directory and the Azure AD tenant. You intend to deploy Azure AD Connect. Your strategy for the integration must make sure that password policies and user logon limitations affect user accounts that are synced to the Azure AD tenant, and that the amount of necessary servers are reduced.
Solution: You recommend the use of password hash synchronization and seamless SSO. Does the solution meet the goal?
YES
NO
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name.After syncing all on-premises identities to Azure AD, you are informed that users with a givenName attribute starting with LAB should not be allowed to sync toAzure AD.Which of the following actions should you take?
You should make use of the Synchronization Rules Editor to create an attribute-based filtering rule.
You should configure a DNAT rule on the Firewall.
You should configure a network traffic filtering rule on the Firewall.
You should make use of Active Directory Users and Computers to create an attribute-based filtering rule.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have been tasked with applying conditional access policies for your company's current Azure Active Directory (Azure AD).The process involves assessing the risk events and risk levels.
Which of the following is the risk level that should be configured for users that have leaked credentials?
None
Low
Medium
High
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have been tasked with applying conditional access policies for your company's current Azure Active Directory (Azure AD).The process involves assessing the risk events and risk levels.
Which of the following is the risk level that should be configured for sign ins that originate from IP addresses with dubious activity?
None
Low
Medium
High
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
25 questions
IZONE Quiz
Quiz
•
KG - Professional Dev...
30 questions
Hololive
Quiz
•
7th Grade - Professio...
25 questions
Quling - Quiz ala ala Wuling
Quiz
•
Professional Development
25 questions
Anime Christmas Quiz
Quiz
•
5th Grade - Professio...
25 questions
BCJ ONLINE QUIZ - 2022
Quiz
•
Professional Development
25 questions
QUI EST BTS ?
Quiz
•
KG - Professional Dev...
25 questions
Post Test - Day 1
Quiz
•
Professional Development
27 questions
Eddsworld
Quiz
•
KG - Professional Dev...
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade