AZR500part1

AZR500part1

Professional Development

30 Qs

quiz-placeholder

Similar activities

Monthly Mash

Monthly Mash

Professional Development

29 Qs

Who is that?

Who is that?

Professional Development

25 Qs

WOW QUIZ

WOW QUIZ

University - Professional Development

25 Qs

Roblox Doors

Roblox Doors

KG - Professional Development

33 Qs

Yu-Gi-Oh Card and Effect Identifier

Yu-Gi-Oh Card and Effect Identifier

6th Grade - Professional Development

26 Qs

GPT Face Off - Session 4 (US - all products)

GPT Face Off - Session 4 (US - all products)

Professional Development

32 Qs

British in india

British in india

KG - Professional Development

31 Qs

INDOVINA CSI

INDOVINA CSI

Professional Development

25 Qs

AZR500part1

AZR500part1

Assessment

Quiz

Fun

Professional Development

Hard

Created by

Kenneth Reyes

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company recently created an Azure subscription. You have been tasked with making sure that a specified user is able to implement Azure AD Privileged Identity Management (PIM).

Which of the following is the role you should assign to the user?

The Global administrator role

The Security administrator role.

The Password administrator role.

The Compliance administrator role.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name. You have been tasked with integrating Active Directory and the Azure AD tenant. You intend to deploy Azure AD Connect. Your strategy for the integration must make sure that password policies and user logon limitations affect user accounts that are synced to the Azure AD tenant, and that the amount of necessary servers are reduced.

Solution: You recommend the use of pass-through authentication and seamless SSO with password hash synchronization. Does the solution meet the goal?

YES

NO

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name. You have been tasked with integrating Active Directory and the Azure AD tenant. You intend to deploy Azure AD Connect. Your strategy for the integration must make sure that password policies and user logon limitations affect user accounts that are synced to the Azure AD tenant, and that the amount of necessary servers are reduced.

Solution: You recommend the use of federation with Active Directory Federation Services (AD FS). Does the solution meet the goal?

YES

NO

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name. You have been tasked with integrating Active Directory and the Azure AD tenant. You intend to deploy Azure AD Connect. Your strategy for the integration must make sure that password policies and user logon limitations affect user accounts that are synced to the Azure AD tenant, and that the amount of necessary servers are reduced.

Solution: You recommend the use of password hash synchronization and seamless SSO. Does the solution meet the goal?

YES

NO

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name.After syncing all on-premises identities to Azure AD, you are informed that users with a givenName attribute starting with LAB should not be allowed to sync toAzure AD.Which of the following actions should you take?

You should make use of the Synchronization Rules Editor to create an attribute-based filtering rule.

You should configure a DNAT rule on the Firewall.

You should configure a network traffic filtering rule on the Firewall.

You should make use of Active Directory Users and Computers to create an attribute-based filtering rule.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have been tasked with applying conditional access policies for your company's current Azure Active Directory (Azure AD).The process involves assessing the risk events and risk levels.

Which of the following is the risk level that should be configured for users that have leaked credentials?

None

Low

Medium

High

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have been tasked with applying conditional access policies for your company's current Azure Active Directory (Azure AD).The process involves assessing the risk events and risk levels.

Which of the following is the risk level that should be configured for sign ins that originate from IP addresses with dubious activity?

None

Low

Medium

High

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?