Exam Logo

Microsoft (MS-500) Exam Questions And Answers page 4

A state department site was recently attacked and all the servers had their disks erased. The incident response team sealed the area and commenced investigation. During evidence collection they came across a zip disks that did not have the standard labeling on it. The incident team ran the disk on an isolated system and found that the system disk was accidentally erased. They decided to call in the FBI for further investigation. Meanwhile, they short listed possible suspects including three summer interns. Where did the incident team go wrong?
Implement and manage identity and access Monitor and troubleshoot Microsoft 365 security
At what layer of the OSI model do routers function on?
Implement and manage identity and access Implement and manage threat protection
A user stores the following files in Microsoft OneDrive:

• File.docx
• ImportantFile.docx
• File_Important.docx

You create a Microsoft Cloud App Security file policy Policy1 that has the filter shown in the following exhibit.


To which files does Policy1 apply?
Implement and manage identity and access Implement and manage information protection
Before performing a logical or physical search of a drive in Encase, what must be added to the program?
Implement and manage identity and access Monitor and troubleshoot Microsoft 365 security
Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis, he needs to send PDF documents containing sensitive information through E-mail to his customers.
Bill protects the PDF documents with a password and sends them to their intended recipients.
Why PDF passwords do not offer maximum protection?
Implement and manage information protection Manage governance and compliance features in Microsoft 365
Billy, a computer forensics expert, has recovered a large number of DBX files during the forensic investigation of a laptop. Which of the following email clients can he use to analyze the DBX files?
Implement and manage identity and access Monitor and troubleshoot Microsoft 365 security
BMP (Bitmap) is a standard file format for computers running the Windows operating system. BMP images can range from black and white (1 bit per pixel) up to 24 bit color (16.7 million colors). Each bitmap file contains a header, the RGBQUAD array, information header, and image data. Which of the following element specifies the dimensions, compression type, and color format for the bitmap?
Implement and manage identity and access Implement and manage threat protection
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 E5 subscription that is associated to a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.

You use Active Directory Federation Services (AD FS) to federate on-premises Active Directory and the tenant. Azure AD Connect has the following settings:

• Source Anchor: objectGUID
• Password Hash Synchronization: Disabled
• Password writeback: Disabled
• Directory extension attribute sync: Disabled
• Azure AD app and attribute filtering: Disabled
• Exchange hybrid deployment: Disabled
• User writeback: Disabled

You need to ensure that you can use leaked credentials detection in Azure AD Identity Protection.

Solution: You modify the Azure AD app and attribute filtering settings.

Does that meet the goal?
Implement and manage threat protection Manage governance and compliance features in Microsoft 365
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 E5 subscription that is associated to a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.

You use Active Directory Federation Services (AD FS) to federate on-premises Active Directory and the tenant. Azure AD Connect has the following settings:

• Source Anchor: objectGUID
• Password Hash Synchronization: Disabled
• Password writeback: Disabled
• Directory extension attribute sync: Disabled
• Azure AD app and attribute filtering: Disabled
• Exchange hybrid deployment: Disabled
• User writeback: Disabled

You need to ensure that you can use leaked credentials detection in Azure AD Identity Protection.

Solution: You modify the Password Hash Synchronization settings.

Does that meet the goal?
Implement and manage threat protection Manage governance and compliance features in Microsoft 365
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 E5 subscription that is associated to a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.

You use Active Directory Federation Services (AD FS) to federate on-premises Active Directory and the tenant. Azure AD Connect has the following settings:

• Source Anchor: objectGUID
• Password Hash Synchronization: Disabled
• Password writeback: Disabled
• Directory extension attribute sync: Disabled
• Azure AD app and attribute filtering: Disabled
• Exchange hybrid deployment: Disabled
• User writeback: Disabled

You need to ensure that you can use leaked credentials detection in Azure AD Identity Protection.

Solution: You modify the Source Anchor settings.

Does that meet the goal?
Implement and manage identity and access Implement and manage information protection