MS-500: Microsoft 365 Security Administration Practice Exam

MS-500: Microsoft 365 Security Administration Practice Exam

MS-500: Microsoft 365 Security Administration Practice Exam

Are you wanted to pass your MS-500 exam?
Are you searching for High quality MS-500 Practice Questions?
If yes…then you are in the right place.

===============================================================

MS-500 Practice Exam Description

Included in this course is a full practice exam to help prepare for you for Exam MS-500: Microsoft 365 Security Administration.

This course is designed to help you not only understand the Security and Compliance offerings within Microsoft 365 but also prepare you for MS-500 exam.

We will cover all of the skills required to become Microsoft 365 Certified including the following topics:

  • Implement and Manage Identity and Access
    • Secure Microsoft 365 hybrid environments
    • Secure Identities
    • Implement authentication methods
    • Implement conditional access
    • Implement roles and role groups
    • Configure and manage identity governance
    • Implement Azure AD Identity Protection
  • Implement and Manage Threat Protection
    • Implement and manage Microsoft Defender for Identity
    • Implement device threat protection
    • Implement and manage device and application protection
    • Implement and manage Microsoft Defender for Office 365
    • Monitor Microsoft 365 Security with Azure Sentinel
    • Implement and manage Microsoft Cloud App Security
  • Implement and Manage Information Protection
    • Manage sensitive information
    • Manage Data Loss Prevention (DLP)
    • Manage data governance and retention
  • Manage Governance and Compliance Features in Microsoft 365
    • Configure and analyze security reporting
    • Manage and analyze audit logs and reports
    • Discover and respond to compliance queries in Microsoft 365
    • Manage regulatory compliance
    • Manage insider risk solutions in Microsoft 365

This course is brought to you by Card Technology. Our instructors have decades of experience in real world cyber security across multiple industry verticals. We have taken that experience and transferred our knowledge to you through this in-depth course.

================================================================

What you’ll learn

  • Implement and Manage Identity and Access
  • Implement and Manage Threat Protection
  • Implement and Manage Information Protection

================================================================

Who this course is for:

I. Those who want to get knowledge on MS-500 exam & check their skills on MS-500

ii. Those who confident enough to crack their MS-500 exam In their first attempt
iii. have an open mind and desire to learn

Requirements:
I. No prerequisites needed as this is a practice test (MS-500)

MS-500 Practice Exam tests

Question 1.

You have several Conditional Access policies that block noncompliant devices from connecting to services.
You need to identity which devices are blocked by which policies.
What should you use?

  • A. the Setting compliance report in the Microsoft Endpoint Manager admin center
  • B. Sign-ins in the Azure Active Directory admin center
  • C. Activity log in the Cloud App Security admin center
  • D. Audit logs in the Azure Active Directory admin center

Answer 1. B.

Question 2.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 E5 subscription that is associated to a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You use Active Directory Federation Services (AD FS) to federate on-premises Active Directory and the tenant. Azure AD Connect has the following settings:
✑ Source Anchor: objectGUID
✑ Password Hash Synchronization: Disabled
✑ Password writeback: Disabled
✑ Directory extension attribute sync: Disabled
✑ Azure AD app and attribute filtering: Disabled
✑ Exchange hybrid deployment: Disabled
✑ User writeback: Disabled
You need to ensure that you can use leaked credentials detection in Azure AD Identity Protection.
Solution: You modify the Password Hash Synchronization settings.
Does that meet the goal?

  • A. Yes
  • B. No

Answer 2. A

Question 3.

You have a hybrid Microsoft 365 environment. All computers run Windows 10 and are managed by using Microsoft Intune.
You need to create a Microsoft Azure Active Directory (Azure AD) conditional access policy that will allow only Windows 10 computers marked as compliant to establish a VPN connection to the on-premises network.
What should you do first?

  • A. From the Azure Active Directory admin center, create a new certificate
  • B. Enable Application Proxy in Azure AD
  • C. From Active Directory Administrative Center, create a Dynamic Access Control policy
  • D. From the Azure Active Directory admin center, configure authentication methods

Answer 3. A

Question 4.

You have a Microsoft 365 subscription.
From the Microsoft 365 admin center, you create a new user.
You plan to assign the Reports reader role to the user.
You need to view the permissions of the Reports reader role.
Which admin center should you use?

  • A. Azure Active Directory
  • B. Cloud App Security
  • C. Security & Compliance
  • D. Microsoft 365

Answer 4. A.

Question 5.

You have a Microsoft 365 E5 subscription.
You need to ensure that users who are assigned the Exchange administrator role have time-limited permissions and must use multi-factor authentication (MFA) to request the permissions.
What should you use to achieve the goal?

  • A. Security & Compliance permissions
  • B. Microsoft Azure Active Directory (Azure AD) Privileged Identity Management
  • C. Microsoft Azure AD group management
  • D. Microsoft Office 365 user management

Answer 5. B

Question 6.

Your company has a Microsoft 365 subscription.
The company does not permit users to enroll personal devices in mobile device management (MDM).
Users in the sales department have personal iOS devices.
You need to ensure that the sales department users can use the Microsoft Power BI app from iOS devices to access the Power BI data in your tenant.
The users must be prevented from backing up the app’s data to iCloud.
What should you create?

  • A. a conditional access policy in Microsoft Azure Active Directory (Azure AD) that has a device state condition
  • B. an app protection policy in Microsoft Endpoint Manager
  • C. a conditional access policy in Microsoft Azure Active Directory (Azure AD) that has a client apps condition
  • D. a device compliance policy in Microsoft Endpoint Manager

Answer 6. B

Question 7.

Your company has a main office and a Microsoft 365 subscription.
You need to enforce Microsoft Azure Multi-Factor Authentication (MFA) by using conditional access for all users who are NOT physically present in the office.
What should you include in the configuration?

  • A. a user risk policy
  • B. a sign-in risk policy
  • C. a named location in Azure Active Directory (Azure AD)
  • D. an Azure MFA Server

Answer 7. C

=====================Please comment to get more Q&A ============================

============================================================

No posts found!

============================================================

Agile project management Artificial Intelligence aws blockchain cloud computing coding interview coding interviews Collaboration Coursera css cybersecurity cyber threats data analysis data breaches data science data visualization devops django docker excel flask Grafana html It Certification java javascript ketan kk Kubernetes machine learning machine learning engineer Network & Security nodejs online courses online learning Operating Systems Other It & Software pen testing Project Management python Software Engineering Terraform Udemy courses VLAN web development

=====================================================================

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.