Kindle Practice Test 3 Flashcards
You have an existing AD Connect implementation. You have to prevent users from a certain department to be synchronised to AAD. What tool do you use?
A. AAD Connect wizard on the AD Connect server
B. Synchronization Rules Editor on the AD Connect server
C. AAD Connect in the Azure portal
D. AD Users and Computers on the local DC
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 57). Kindle Edition.
B. Synchronization Rules Editor on the AD Connect server
Explanation:
Synchronization Rules Editor on the AD Connect server is used to change the users to be synced. https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-sync-change-the-configuration
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 57). Kindle Edition.
What format is an OpenID Connect token?
A. XML
B. SAML
C. JWT
D. Java
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 57). Kindle Edition.
C. JWT
Explanation:
JSON Web Token (JWT)
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 57). Kindle Edition.
Which two of the following are objects you can configure to apply AAD PIM to?
A. Access Reviews
B. AAD Roles
C. ADD Groups
D. Azure Resources
E. AAD Dynamic Groups
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 58). Kindle Edition.
B. AAD Roles
D. Azure Resources
Explanation:
AAD Roles and Azure resources https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure#who-can-do-what-in-pim
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 58). Kindle Edition.
In Azure SQL Database AlwaysEncrypted, two types of column encryption is supported. Match the requirement with the appropriate column encryption type. Plaintext data values always produce the same cyphertext:
A. Deterministic
B. Randomized
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 58). Kindle Edition.
A. Deterministic
Explanation:
In Azure SQL Database AlwaysEncrypted, two types of column encryption is supported. Match the requirement with the appropriate column encryption type. SQL Server can use the encrypted columns in joins and lookups:
A. Deterministic
B. Randomized
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 58-59). Kindle Edition.
B. Randomized
Explanation:
In Azure SQL Database AlwaysEncrypted, two types of column encryption is supported. Match the requirement with the appropriate column encryption type. Not suitable for columns containing boolean data:
A. Deterministic
B. Randomized
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 59). Kindle Edition.
A. Deterministic
Explanation:
You create a new Azure Key Vault and want to ensure that malicious permanent deletions of key vault items can be recovered for 90 days. What at a minimum would you have to enable on the Key Vault?
A. Soft-delete only
B. Purge protection only
C. Soft-delete and purge protection
D. Delete lock only Read-only lock only
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 59-60). Kindle Edition.
C. Soft-delete and purge protection
Explanation:
Soft-delete will allow recovery of accidentally deleted key vault items (or the key vault itself) for 90 days. However a malicious user might purge soft-deleted items which will prevent their recovery despite soft-delete being enabled. To prevent purging of soft-deleted items you should enable purge protection which in turn requires soft-delete to be enabled. The best answer is Soft-delete and purge protection. https://docs.microsoft.com/en-za/azure/key-vault/key-vault-ovw-soft-delete
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 60). Kindle Edition.
Which of the following are default rules created with a network security group?
A. DenyAllInBound
B. DenyAllOutBound
C. DenyVnetInBound
D. DenyVnetOutBound
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 61). Kindle Edition.
A. DenyAllInBound
Explanation:
AllowVnetInBound, AllowAzureLoadBalancerInBound, DenyAllInBound, AllowVnetOutBound, AllowInternetOutBound, DenyAllOutBound, Are the default rules in all NSGs
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 61-62). Kindle Edition.
You must minimise costs. What is the minimum license required to configure Azure AD MFA?
A. Azure AD Premium P1
B. Azure AD Premium P2
C. No license is required
D. Any Office 365 license
E> No license is required, but the user must be an Azure AD Global Administrator
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 62). Kindle Edition.
E> No license is required, but the user must be an Azure AD Global Administrator
Explanation:
No license is required, but the user must be an Azure AD Global Administrator MFA is free if you are a AAD global administrator - reduced functionality You get MFA for all users with any O365 subscription - reduced functionality You get full-featured MFA with AAD P1 You get full-featured MFA with AAD P2 (all AAD P1 features is included in AAD P2) You can configure MFA for any user with no licenses and your subscription will be charged on a per-user consumption-based model https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-mfa-licensing
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 62). Kindle Edition.
When configuring AAD conditional access policies, which of the following are mandatory requirements?
A. User / group
B. Cloud Apps
C. Sign-in risk
D. Device platforms
E. Device state
F. Location
G. Client apps
H. Access controls
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 62-63). Kindle Edition.
A. User / group
B. Cloud Apps
H. Access controls
You are configuring AIP policies. You specify two labels: Label1: matches “Word1” Label2: matches “Word2” You create a document in MS Word that contains both words, which label is applied?
A. Label1
B. Label2
C. Label1 and Label2
D. No label
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 71). Kindle Edition.
B. Label2
Explanation:
Label 2 is applied. AIP labels are applied in the order they are listed in the policy with the last matching label (or sublable) winning. Only one label is applied to the document. Only Office documents are supported. https://docs.microsoft.com/en-us/azure/information-protection/faqs-infoprotect#can-a-file-have-more-than-one-classification
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 71). Kindle Edition.
What tools are available to you for changing the key scenario in AIP (from Microsoft managed to BYOK for example)?
A. Azure portal
B. O365 management portal
C. Security and Compliance Centre
D. Windows PowerShell
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 71). Kindle Edition.
D. Windows PowerShell
Explanation:
Windows PowerShell is currently the only option for key management in AIP.
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 72). Kindle Edition.
You must minimise costs. What is the minimum license required to configure Azure AD Conditional Access?
A. Azure AD Premium P1
B. Azure AD Premium P2
C. No license is required
D. Any Office 365 license
E. No license is required, but the user must be an Azure AD Global Administrator
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 72). Kindle Edition.
A. Azure AD Premium P1
Explanation:
Azure AD Premium P1 is required to configure and use Conditional Access Azure AD Premium P2 includes all the features of Azure Premium P1 (not minimum) You cannot configure or use conditional access if you don’t have at least AAD P1 Conditional access in not included in Azure AD for O365 - having an O365 license won’t help Being an Azure AD Global Administrator doesn’t permit configuring AAD Conditional access, you must have an AAD P1 license at least. https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview#license-requirements
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 72). Kindle Edition.
When configuring an privileged access review what are the three available settings when an assigned reviewer does not complete the review before the configured review ends?
A. Do nothing
B. Take recommendations
C. Remove Access
D. Approve Access
E. Prompt owner
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 72-73). Kindle Edition.
B. Take recommendations
C. Remove Access
D. Approve Access
Explanation:
Do nothing - not an option Take recommendations - use the PIM access review recommended action Remove Access - revoke all access to the role Approve Access - approve all existing access to the role https://docs.microsoft.com/en-us/azure/active-directory/governance/create-access-review#upon-completion-settings
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 73). Kindle Edition.
When you configure Azure AD PIM for the first time, what are the three things you must do?
A. Consent to PIM; verify your identity with MFA; sign-up PIM for AD roles
B. Consent to PIM; verify your identity with MFA; discover AD roles; sign-up PIM for AD roles
C. Verify your identity with MFA; consent to PIM; discover AD roles; sign-up PIM for AD roles
D. Verify your identity with MFA; consent to PIM; sign-up PIM for AD roles
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 73-74). Kindle Edition.
A. Consent to PIM; verify your identity with MFA; sign-up PIM for AD roles
Explanation:
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-getting-started https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-resource-roles-discover-resources
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 74). Kindle Edition.
You deploy several VMs in Azure. You need to ensure that all the VMs have a consistent OS configuration including registry settings. Which of the following options would you configure?
A. ARM templates
B. Desired State Configuration
C. Application Security Groups
D. Device configuration policies
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 74). Kindle Edition.
B. Desired State Configuration
Explanation:
Desired State Configuration (DSC) is used to ensure consistent VM deployment. https://docs.microsoft.com/en-us/azure/automation/automation-dsc-getting-started
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 74). Kindle Edition.
Which of the following will generate an alert from SQL ATP?
A. A user updates more than half of the content of a table in a single procedure
B. “password’ OR 1=1” entered into a password field
C. A user is added to the db_owner database role
D. A user deletes more than 50% of the content of a table in a single procedure
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 76). Kindle Edition.
B. “password’ OR 1=1” entered into a password field
Explanation:
“password’ OR 1=1” entered into a password field is an attempt at SQL injection and SQL ATP will detect and alert on this. The following will also generate alerts: Login from an unusual location or Azure region. Login by an unfamiliar principle. Access from a potentially harmful application. Brute force attempt on SQL Authentication. https://docs.microsoft.com/en-us/azure/sql-database/sql-database-threat-detection-overview#advanced-threat-protection-alerts
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 76). Kindle Edition.
You need to ensure that data is secured in transit for a web application on your Azure subscription. Which of the following is required? Each answer is part of the solution and you have to minimise costs. Choose 4.
A. Upload a certificate to Azure Key Vault
B. Obtain a custom domain name
C. Purchase an app service certificate
D. Purchase a certificate from a CA
E. Create a self-signed certificate
F. Create SSL bindings
G. Deploy Azure Application Gateway
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (pp. 76-77). Kindle Edition.
A. Upload a certificate to Azure Key Vault
B. Obtain a custom domain name
C. Purchase an app service certificate
F. Create SSL bindings
Explanation:
Upload a certificate to Azure Key Vault - yes, use key vault to store and secure the private key. Obtain a custom domain name - yes, this is a prerequisite for obtaining a public certificate. Purchase an app service certificate - yes, this is required to enable TLS for the app service. Purchase a certificate from a CA - no, TLS certificates for Azure app service can be bought from the Azure portal. Create a self-signed certificate - no, this is not supported with app service. Create SSL bindings - yes, to ensure the all browser comms are encrypted to the web app. Deploy Azure Application Gateway - no, this is not required to enable TLS, but you might want to deploy it to provide additional layer of security.
Utrecht, Jee. Azure AZ-500 Security Technologies Practice Tests: Pratice questions with answers and explanations (p. 77). Kindle Edition.