Microsoft (MS-500) Exam Questions And Answers page 3
An expert witness is a __________________ who is normally appointed by a party to assist the formulation and preparation of a party s claim or defense.
Subject matter specialist
Witness present at the crime scene
Expert law graduate appointed by attorney
Implement and manage identity and access
Manage governance and compliance features in Microsoft 365
What is another term for an "idle" system?
Single Choice
An "idle" system is also referred to as what?
PC not connected to the Internet
Zombie
PC not being used
Bot
Implement and manage identity and access
Monitor and troubleshoot Microsoft 365 security
An International Mobile Equipment Identifier (IMEI) is a 15-digit number that indicates the manufacturer, model type, and country of approval for GSM devices. The first eight digits of an IMEI number that provide information about the model and origin of the mobile device is also known as:
Type Allocation Code (TAC)
Integrated Circuit Code (ICC)
Manufacturer Identification Code (MIC)
Device Origin Code (DOC)
Implement and manage identity and access
Manage governance and compliance features in Microsoft 365
An investigator enters the command sqlcmd -S WIN-CQQMK62867E -e -s"," -E as part of collecting the primary data file and logs from a database. What does the "WIN-CQQMK62867E represent?
Name of the Database
Name of SQL Server
Operating system of the system
Network credentials of the database
Implement and manage identity and access
Monitor and troubleshoot Microsoft 365 security
An investigator has extracted the device descriptor for a 1GB thumb drive that looks like: Disk&Ven_Best_Buy&Prod_Geek_Squad_U3&Rev_6.15. What does the Geek_Squad part represent?
Product description
Manufacturer Details
Developer description
Software or OS used
Implement and manage identity and access
Manage governance and compliance features in Microsoft 365
An investigator has found certain details after analysis of a mobile device. What can reveal the manufacturer information?
Equipment Identity Register (EIR)
Electronic Serial Number (ESN)
International mobile subscriber identity (IMSI)
Integrated circuit card identifier (ICCID)
Implement and manage identity and access
Monitor and troubleshoot Microsoft 365 security
An investigator is searching through the firewall logs of a company and notices ICMP packets that are larger than 65,536 bytes. What type of activity is the investigator seeing?
Smurf
Ping of death
Fraggle
Nmap scan
Implement and manage threat protection
Annie is searching for certain deleted files on a system running Windows XP OS. Where will she find the files if they were not completely deleted from the system?
C: $Recycled.Bin
C: \$Recycle.Bin
C:\RECYCLER
C:\$RECYCLER
Implement and manage information protection
As a CHFI professional, which of the following is the most important to your professional reputation?
Your Certifications
The correct, successful management of each and every case
The free that you charge
The friendship of local law enforcement officers
Implement and manage identity and access
Manage governance and compliance features in Microsoft 365
As a security analyst, you setup a false survey website that will require users to create a username and a strong password. You send the link to all the employees of the company. What information will you be able to gather?
The IP address of the employees computers
Bank account numbers and the corresponding routing numbers
The employees network usernames and passwords
The MAC address of the employees computers
Implement and manage identity and access
Manage governance and compliance features in Microsoft 365
Comments