Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > Microsoft > Microsoft Certifications > MS-500 > MS-500 Online Practice Questions and Answers

MS-500 Online Practice Questions and Answers

Questions 4

HOTSPOT

You have a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named contoso.com.

OneDrive stores files that are shared with external users. The files are configured as shown in the following table.

You create a data loss prevention (DLP) policy that applies to the content stored in OneDrive accounts. The policy contains the following three rules:

Rule1:

7.

Conditions: Label1, Detect content that's shared with people outside my organization

8.

Actions: Restrict access to the content for external users

9.

User notifications: Notify the user who last modified the content 10.User overrides: On 11.Priority: 0

Rule2:

12.Conditions: Label1 or Label2

13.Actions: Restrict access to the content

14.Priority: 1

Rule3:

15.Conditions: Label2, Detect content that's shared with people outside my organization

16.Actions: Restrict access to the content for external users 17.User notifications: Notify the user who last modified the content 18.User overrides: On 19.Priority: 2

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

Buy Now

Correct Answer:

All of them will match Rule2 because it is the most restrictive.

When content is evaluated against rules, the rules are processed in priority order. If content matches multiple rules, the rules are processed in priority order and the most restrictive action is enforced. For example, if content matches all of the

following rules, Rule 3 is enforced because it's the highest priority, most restrictive rule:

Rule 1: only notifies users

Rule 2: notifies users, restricts access, and allows user overrides

Rule 3: notifies users, restricts access, and does not allow user overrides

Rule 4: only notifies users

Rule 5: restricts access

Rule 6: notifies users, restricts access, and does not allow user overrides

Source: https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-policies?view=o365-worldwide

Questions 5

HOTSPOT

You have a Microsoft 365 subscription that contains an Azure Active Directory (Azure AD) tenant named contoso.com.

You need to recommend an Azure AD Privileged Identity Management (PIM) solution that meets the following requirements:

1.

Administrators must be notified when the Security administrator role is activated.

2.

Users assigned the Security administrator role must be removed from the role automatically if they do not sign in for 30 days.

Which Azure AD PIM setting should you recommend configuring for each requirement? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Buy Now

Correct Answer:

Reference: https://docs.microsoft.com/bs-latn-ba/azure/active-directory/privileged-identity-management/pim-how-to-configure-security-alerts?tabs=new

https://docs.microsoft.com/bs-latn-ba/azure/active-directory/privileged-identity-management/pim-how-to-change-default-settings?tabs=new

Questions 6

HOTSPOT

You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table.

You add internal as a blocked word in the group naming policy for contoso.com.

You add Contoso-as prefix in the group naming policy for contoso.com.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

Buy Now

Correct Answer:

User Admin and Global Admin are exempt from group password policies.

Reference: https://docs.microsoft.com/en-us/microsoft-365/solutions/groups-naming-policy?view=o365-worldwide

Questions 7

You have a Microsoft 365 subscription.

A user reports that changes were made to several files in Microsoft OneDrive.

You need to identify which files were modified by which users in the user's OneDrive.

What should you do?

A. From the Azure Active Directory admin center, open the audit log

B. From the OneDrive admin center, select Device access

C. From Security and Compliance, perform an eDiscovery search

D. From Microsoft Cloud App Security, open the activity log

Buy Now

Correct Answer: D

Reference: https://docs.microsoft.com/en-us/cloud-app-security/activity-filters

Questions 8

You have a Microsoft 365 subscription. You need to ensure that users can apply retention labels to individual documents in their Microsoft SharePoint libraries.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A. From the Cloud App Security admin center, create a file policy.

B. From the SharePoint admin center, modify the Site Settings.

C. From the SharePoint admin center, create a label.

D. From the SharePoint admin center, modify the records management settings.

E. From the Security admin center, publish a label.

Buy Now

Correct Answer: CE

Reference: https://docs.microsoft.com/en-us/office365/securitycompliance/protect-sharepoint-online-files-with-office-365-labels-and-dlp

Questions 9

Your network contains an on-premises Active Directory domain. The domain contains servers that run Windows Server and have advanced auditing enabled.

The security logs of the servers are collected by using a third-party SIEM solution.

You purchase a Microsoft 365 subscription and plan to deploy Azure Advanced Threat Protection (ATP) by using standalone sensors.

You need to ensure that you can detect when sensitive groups are modified and when malicious services are created.

What should you do?

A. Turn off Delayed updates for the Microsoft Defender for Identity sensors.

B. Configure auditing in the Microsoft 365 Compliance center.

C. Turn on Delayed updates for the Microsoft Defender for Identity sensors.

D. Integrate SIEM and Microsoft Defender for Identity.

Buy Now

Correct Answer: D

Note:

There are several versions of this question in the exam. The questions in the exam have two different correct answers:

Integrate SIEM and Microsoft Defender for Identity

Configure Event Forwarding on the domain controllers

Other incorrect answer options you may see on the exam include the following:

1.

Configure Microsoft Defender for Identity notifications

2.

Modify the Domain synchronizer candidate settings on the Microsoft Defender for Identity sensors

3.

Enable the Audit account management Group Policy setting for the servers

4.

Configure auditing in the Microsoft 365 Defender portal

Reference: https://docs.microsoft.com/en-us/azure-advanced-threat-protection/configure-event-forwarding

Questions 10

You have an Azure Active Directory (Azure AD) tenant named contoso.com and a Microsoft 365 subscription.

All users in contoso.com use the Microsoft SharePoint Newsfeed.

You need to ensure that all the users use the Yammer.com service.

What should you do?

A. From the Yammer admin center, modify the Usage Policy settings

B. From the SharePoint admin center, modify the Enterprise Social Collaboration settings

C. From the SharePoint admin center, modify the Connected Services settings

D. From the Yammer admin center, modify the Configuration settings

Buy Now

Correct Answer: B

Office 365 includes two options for enterprise social features in SharePoint: Yammer and Newsfeed. The SharePoint administrator selects which option users see when they click Conversations in SharePoint. By default, users see Newsfeed.

You can turn Yammer off or on for conversations in SharePoint by using the SharePoint Online admin center. You must be a global administrator to make this change.

Reference:

https://docs.microsoft.com/en-us/yammer/integrate-yammer-with-other-apps/yammer-and- newsfeed

Questions 11

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 E5 subscription that contains a user named User1.

The Azure Active Directory (Azure AD) Identity Protection risky users report identifies User1.

For User1, you select Confirm user compromised.

User1 can still sign in.

You need to prevent User1 from signing in. The solution must minimize the impact on users at a lower risk level.

Solution: You configure the user risk policy to block access when the user risk level is high.

Does this meet the goal?

A. Yes

B. No

Buy Now

Correct Answer: B

Reference: https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk

Questions 12

You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following table.

You configure the Security Operator role in Azure AD Privileged Identity Management (PIM) as shown in the following exhibit.

You add assignments to the Security Operator role as shown in the following table.

Which users can activate the Security Operator role?

A. User2 only

B. User3 only

C. User1 and User2 only

D. User2 and User3 only

E. User1, User2, and User3

Buy Now

Correct Answer: D

Questions 13

Which role should you assign to User1?

A. Global administrator

B. User administrator

C. Privileged role administrator

D. Security administrator

Buy Now

Correct Answer: C

This role grants the ability to manage assignments for all Azure AD roles including the Global Administrator role. This role does not include any other privileged abilities in Azure AD like creating or updating users. However, users assigned to this role can grant themselves or others additional privilege by assigning additional roles. https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-give-access

Exam Code: MS-500
Exam Name: Microsoft 365 Security Administration
Last Update: Sep 11, 2023
Questions: 367

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.