exam questions Flashcards
Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?
A. conditional access policies
B. Azure AD Identity Protection
C. Azure AD Privileged Identity Management (PIM)
D. authentication method policies
C. Azure AD Privileged Identity Management (PIM)
Which Azure Active Directory (Azure AD) feature can you use to restrict Microsoft Intune-managed devices from accessing corporate resources?
A. network security groups (NSGs)
B. Azure AD Privileged Identity Management (PIM)
C. Conditional access policies
D. resource locks
C. Conditional access policies
What can you use to provide a user with a two-hour window to complete an administrative task in Azure?
A. Azure Active Directory (Azure AD) Privileged Identity Management (PIM)
B. Azure Multi-Factor Authentication (MFA)
C. Azure Active Directory (Azure AD) Identity Protection
D. conditional access policies
A. Azure Active Directory (Azure AD) Privileged Identity Management (PIM)
In a hybrid identity model, what can you use to sync identities between Active Directory Domain Services (AD DS) and Azure Active directory (Azure AD)?
A. Active Directory Federation Services (AD FS)
B. Azure Sentinel
C. Azure AD Connect
D. Azure AD Privileged Identity Management (PIM)
C. Azure AD Connect
What is the purpose of Azure Active Directory (Azure AD) Password Protection?
A. to control how often users must change their passwords
B. to identify devices to which users can sign in without using multi-factor authentication (MFA)
C. to encrypt a password by using globally recognized encryption standards
D. to prevent users from using specific words in their passwords
D. to prevent users from using specific words in their passwords
Which Azure Active Directory (Azure AD) feature can you use to evaluate group membership and automatically remove users that no longer require membership in a group?
A. access reviews
B. managed identities
C. conditional access policies
D. Azure AD Identity Protection
A. access reviews
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Answer Area
Azure Active Directory (Azuer AD) is ?????????? used for authentication and authorization.
- an extended detection and response (XDR) system
- an identity provider
- a managed resource group
- a security information and event management (SIEM) system
- an identity provider
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Answer Area
?????????? enables collaboration with business partners from external organizations such as suppliers, partners, and vendors. External users appear as guest users in the directory.
- Active Directory Domain Services (AD DS)
- Active Directory forest trusts
- Azure Active Directory (Azure AD) business-to business (B2B)
- Azure Active Directory business-to consumer B2C (Azure AD B2C)
- Azure Active Directory (Azure AD) business-to business (B2B)
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
Statements:
* All Azure Active Directory (Azure AD) license editions include the same features. - Yes/No
* You can manage an Azure Active Directory (Azure AD) tenant by using the Azure portal. - Yes/No
* You must deploy Azure virtual machines to host an Azure Active Directory (Azure AD) tenant. - Yes/No
- All Azure Active Directory (Azure AD) license editions include the same features. - No
- You can manage an Azure Active Directory (Azure AD) tenant by using the Azure portal. - Yes
- You must deploy Azure virtual machines to host an Azure Active Directory (Azure AD) tenant. - No
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
Statements:
* Azure AD Connect can be used to implement hybrid identity. - Yes/No
* Hybrid identity requires the implementation of two Microsoft 365 tenants. - Yes/No
* Hybrid identity refers to the synchronization of Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD). - Yes/No
- Azure AD Connect can be used to implement hybrid identity. - Yes
- Hybrid identity requires the implementation of two Microsoft 365 tenants. - No
- Hybrid identity refers to the synchronization of Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD). - Yes
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
Statements:
* You can create custom roles in Azure Active Directory (Azure AD). - Yes/No
* Global administrator is a role in Azure Active Directory (Azure AD). - Yes/No
* An Azure Active Directory (Azure AD) user can be assigned only one role. - Yes/No
- You can create custom roles in Azure Active Directory (Azure AD). - Yes
- Global administrator is a role in Azure Active Directory (Azure AD). - Yes
- An Azure Active Directory (Azure AD) user can be assigned only one role. - No
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
Statements:
* Azure Active Directory (Azure AD) is deployed to an on-premise environment. - Yes/No
* Azure Active Directory (Azure AD) is provided as part of a Microsoft 365 subscription. - Yes/No
* Azure Active Directory (Azure AD) is an identity and access management service. - Yes/No
- Azure Active Directory (Azure AD) is deployed to an on-premise environment. - No
- Azure Active Directory (Azure AD) is provided as part of a Microsoft 365 subscription. - Yes
- Azure Active Directory (Azure AD) is an identity and access management service. - Yes
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
Statements:
* Azure Active Directory (Azure AD) Identity Protection can add users to groups based on the users’ risk level. - Yes/No
* Azure Active Directory (Azure AD) Identity Protection can detect whether user credentials were leaked to the public. - Yes/No
* Azure Active Directory (Azure AD) Identity Protection can be used to invoke Multi-Factor Authentication based on a user’s risk level. - Yes/No
- Azure Active Directory (Azure AD) Identity Protection can add users to groups based on the users’ risk level. - No
- Azure Active Directory (Azure AD) Identity Protection can detect whether user credentials were leaked to the public. - Yes
- Azure Active Directory (Azure AD) Identity Protection can be used to invoke Multi-Factor Authentication based on a user’s risk level. - Yes
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Answer Area
?????????? requires additional verification, such as a verification code sent to a mobile phone.
- Multi-factor authentication (MFA)
- Pass-through authentication
- Password writeback
- Single sign-on (SSO)
- Multi-factor authentication (MFA)
Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. text message (SMS)
B. Microsoft authenticator app
C. email verification
D. phone call
E. security question
A. text message (SMS)
B. Microsoft authenticator app
D. phone call
Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments of your organization?
A. sensitivity label policies
B. Customer Lockbox
C. information barriers
D. Privileged Access Management (PAM)
C. information barriers
What should you use in Microsoft 365 security center to view security trends and track the protection status of identities?
A. Attack simulator
B. Reports
C. Hunting
D. incidents
B. Reports
What can you specify in Microsoft 365 sensitivity labels?
A. how long files must be preserved
B. when to archive an email message
C. which watermark to add to files
D. where to store files
C. which watermark to add to files
What two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. Display policy tips to users who are about to violate your organization policies.
B. Enable disk encryption on endpoints.
C. Protect documents in Microsoft OneDrive that contain sensitive information.
D. Apply security baselines to devices.
A. Display policy tips to users who are about to violate your organization policies.
C. Protect documents in Microsoft OneDrive that contain sensitive information.
Which Microsoft 365 compliance feature can you use to encrypt content automatically based on specific conditions?
A. Content Search
B. sensitivity labels
C. retention policies
D. eDiscovery
B. sensitivity labels
What is a use case for implementing information barrier policies in Microsoft 365?
A. to restrict unauthorized access to Microsoft 365
B. to restrict Microsoft Teams chatt between certain groups within an organization
C. to restrict Microsoft Exchange Online email between certain groups within an organization
D. to restrict data sharing to external email recipients
B. to restrict Microsoft Teams chatt between certain groups within an organization
Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft SharePoint Online site that contain a specific key word?
A. Audit
B. Compliance Manager
C. Content Search
D. Alerts
C. Content Search
Which Microsoft 365 feature can you use to restrict users from sending email messages that contain lists of customers and their associated credit card numbers?
A. retention policies
B. data loss prevention (DLP) policies
C. conditional access policies
D. information barriers
B. data loss prevention (DLP) policies
Which Microsoft portal provides information about how Microsoft manages privacy, compliance, and security?
A. Microsoft Service Trust Portal
B. Compliance Manager
C. Microsoft 365 compliance center
D. Microsoft Support
A. Microsoft Service Trust Portal
What can you protect by using the information protection solution in the Microsoft 365 compliance center?
A. computers from zero-day exploits
B. users from phishing attempts
C. files from malware and viruses
D. sensitive data from being exposed to unauthorized users
D. sensitive data from being exposed to unauthorized users
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Answer Area
?????????? provides a central location for managing information protection, information governance, and data loss prevention (DLP) policies.
- Azure Defender
- the Microsoft 365 compliance center
- the Microsoft 365 security center
- Microsoft Endpoint Manager
- the Microsoft 365 compliance center
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Answer Area
You can use ?????????? in the Microsoft 365 security center to identify devices that are affected by an alert.
- classifications
- incidents
- policies
- Secure score
- incidents
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Answer Area
You can use ?????????? in the Microsoft 365 security center to view an aggregation of alerts that relate to the same attack.
- Reports
- Hunting
- Attack simulator
- Incidents
- Incidents
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
Statements:
* With Advanced Audit in Microsoft 365, you can identify when email items were accessed. - Yes/No
* Advanced Audit in Microsoft 365 supports the same retention period of audit logs as core auditing. - Yes/No
* Advanced Audit in Microsoft 365 allocates customer-dedicated bandwidth for accessing audit data. - Yes/No
- With Advanced Audit in Microsoft 365, you can identify when email items were accessed. - Yes
- Advanced Audit in Microsoft 365 supports the same retention period of audit logs as core auditing. - No
- Advanced Audit in Microsoft 365 allocates customer-dedicated bandwidth for accessing audit data. - Yes
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
Statements:
* You can use advanced audit in Microsoft 365 to view billing details. - Yes/No
* You can use Advanced Audit in Microsoft 365 to view the contents of an email message. - Yes/No
* You can use Advanced Audit in Microsoft 365 to identify when a user uses the search bar in Outlook on the web to search for items in mailbox. - Yes/No
- You can use advanced audit in Microsoft 365 to view billing details. - No
- You can use Advanced Audit in Microsoft 365 to view the contents of an email message. - No
- You can use Advanced Audit in Microsoft 365 to identify when a user uses the search bar in Outlook on the web to search for items in mailbox. - Yes
What are the two capabilities of Microsoft Defender for Endpoint?
Each correct selection presents a complete solution.
NOTE: Each correct selection is worth one point.
A. automated investigation and remediation
B. transport encryption
C. shadow IT detection
D. attack surface reduction
A. automated investigation and remediation
D. attack surface reduction
What feature in Microsoft Defender for Endpoint provides the first line of defense against cyber threats by reducing the attack surface?
A. automated remediation
B. automated investigation
C. advanced hunting
D. network protection
D. network protection
Which feature provides the extended detection and response (XDR) capability of Azure Sentinel?
A. integration with Microsoft 365 compliance center
B. support for threat hunting
C. integration with Microsoft 365 Defender
D. support for Azure Monitor Workbooks
C. integration with Microsoft 365 Defender
What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?
A. Microsoft Defender for Office 365
B. Microsoft Defender Antivirus
C. Microsoft Defender for Identity
D. Microsoft Defender for Endpoint
A. Microsoft Defender for Office 365
What can you use to provide threat detection for Azure SQL Managed Instance?
A. Microsoft Secure Score
B. application security groups
C. Azure Defender
D. Azure Bastion
C. Azure Defender
What do you use to provide real-time integration between Azure Sentinel and another security source?
A. Azure AD Connect
B. a Log Analytics workspace
C. Azure Information Protection
D. a connector
D. a connector
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Answer Area
?????????? is a cloud-based solution that leverages on-premises Active Directory signals to identify, detect, and investigate threats.
- Microsoft Cloud App Security
- Microsoft Defender for Endpoint
- Microsoft Defender for Identity
- Microsoft Defender for Office 365
- Microsoft Defender for Identity
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Answer Area
Microsoft Defender for Identity can identify advanced threats from ?????????? signals.
- Azure Active Directory (Azure AD)
- Azure AD Connect
- on-premise Active Directory Domain Services (AD DS)
- on-premise Active Directory Domain Services (AD DS)
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Answer Area
?????????? can use conditional access policies to control sessions in real time.
- Azure Active Directory (Azure AD) Privileged Identity Management (PIM)
- Azure Defender
- Azure Sentinel
- Microsoft Cloud App Security
- Microsoft Cloud App Security
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
Statements:
* Azure Defender can detect vulnerabilities and threats for Azure Storage. - Yes/No
* Cloud Security Posture Management (CSPM) is available for all Azure subscriptions. - Yes/No
* Azure Security Center can evaluate the security of workloads deployed to Azure or on-premises. - Yes/No
- Azure Defender can detect vulnerabilities and threats for Azure Storage. - Yes
- Cloud Security Posture Management (CSPM) is available for all Azure subscriptions. - Yes
- Azure Security Center can evaluate the security of workloads deployed to Azure or on-premises. - Yes
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
Statements:
* Microsoft defender for Endpoint can protect Android devices. - Yes/No
* Microsoft Defender for Endpoint can protect Azure virtual machines that run Windows 10. - Yes/No
* Microsoft Defender for Endpoint can protect Microsoft SharePoint Online sites and content from viruses. - Yes/No
- Microsoft defender for Endpoint can protect Android devices. - Yes
- Microsoft Defender for Endpoint can protect Azure virtual machines that run Windows 10. - Yes
- Microsoft Defender for Endpoint can protect Microsoft SharePoint Online sites and content from viruses. - No
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer Area
Statements:
* Microsoft Secure Score in the Microsoft 365 security center can provide recommendations for Microsoft Cloud App Security. - Yes/No
* From the Microsoft 365 security center, you can view how your Microsoft Secure Score compares to the score of organizations like yours. - Yes/No
* Microsoft Secure Score in the Microsoft 365 security center gives you points if you address the improvement action by using a third-party application or software. - Yes/No
- Microsoft Secure Score in the Microsoft 365 security center can provide recommendations for Microsoft Cloud App Security. - Yes
- From the Microsoft 365 security center, you can view how your Microsoft Secure Score compares to the score of organizations like yours. - Yes
- Microsoft Secure Score in the Microsoft 365 security center gives you points if you address the improvement action by using a third-party application or software. - Yes
What can you use to provision Azure resources across multiple subscriptions in a consistent manner?
A. Azure Defender
B. Azure Blueprints
C. Azure Sentinel
D. Azure Policy
B. Azure Blueprints
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Answer Area
?????????? is a cloud-native security information and event management (SIEM) and security orchestration automated response (SOAR) solution used to provide a single solution for alert detection, threat visibility, proactive hunting, and threat response.
- Azure Adviser
- Azure Bastion
- Azure Monitor
- Azure Sentinel
- Azure Sentinel
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Answer Area
In Azure Sentinel, you can automate common tasks by using ??????????
- deep investigation tools.
- hunting search-and-query tools.
- playbooks.
- workbooks.
- playbooks.
Which three authentication methods does Windows Hello for Business support? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. fingerprint
B. facial recognition
C. PIN
D. email verification
E. security question
A. fingerprint
B. facial recognition
C. PIN
What is an example of encryption at rest?
A. encrypting communications by using a site-to-site VPN
B. encrypting a virtual machine disk
C. accessing a website by using an encrypted HTTPS connection
D. sending an encrypted email
B. encrypting a virtual machine disk
Which two types of resources can be protected by using Azure Firewall? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. Azure virtual machines
B. Azure Active Directory (Azure AD) users
C. Microsoft Exchange Online inboxes
D. Azure virtual networks
E. Microsoft SharePoint Online sites
A. Azure virtual machines
D. Azure virtual networks