Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

AZ-500 Exam Dumps - Microsoft Azure Security Technologies

Go to page:
Question # 25

You need to delegate the creation of RG2 and the management of permissions for RG1. Which users can perform each task? To answer select the appropriate options in the answer area. NOTE: Each correct selection is worth one point

Full Access
Question # 26

You need to meet the technical requirements for the finance department users.

Which CAPolicy1 settings should you modify?

A.

Cloud apps or actions

B.

Conditions

C.

Grant

D.

Session

Full Access
Question # 27

You need to ensure that the Azure AD application registration and consent configurations meet the identity and access requirements.

What should you use in the Azure portal? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 28

You have an Azure subscription that uses Azure Active Directory (Azure AD) Privileged Identity Management (PIM).

A PIM user that is assigned the User Access Administrator role reports receiving an authorization error when performing a role assignment or viewing the list of assignments.

You need to resolve the issue by ensuring that the PIM service principal has the correct permissions for the subscription. The solution must use the principle of least privilege.

Which role should you assign to the PIM service principle?

A.

Contributor

B.

User Access Administrator

C.

Managed Application Operator

D.

Resource Policy Contributor

Full Access
Question # 29

You have an Azure subscription.

You plan to deploy a new Conditional Access policy named CAPolicy1.

You need to use the What If tool to evaluate how CAPolicy1 will affect uter1. The solution must minimize the impact of CAPolicy1 on the users.

To what should you set the Enable policy setting for CAPolicy1?

A.

Oft

B.

On

C.

Report only

Full Access
Question # 30

You have an Azure environment.

You need to identify any Azure configurations and workloads that are non-compliant with ISO 27001

standards. What should you use?

A.

Azure Sentinel

B.

Azure Active Directory (Azure AD) Identity Protection

C.

Azure Security Center

D.

Azure Advanced Threat Protection (ATP)

Full Access
Question # 31

You plan to create an Azure Kubernetes Service (AKS) cluster in an Azure subscription.

The manifest of the registered server application is shown in the following exhibit.

You need to ensure that the AKS cluster and Azure Active Directory (Azure AD) are integrated.

Which property should you modify in the manifest?

A.

accessTokenAcceptedVersion

B.

keyCredentials

C.

groupMembershipClaims

D.

acceptMappedClaims

Full Access
Question # 32

What is the membership of Group1 and Group2? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Go to page: