Microsoft (MS-500) Exam Questions And Answers page 4
A state department site was recently attacked and all the servers had their disks erased. The incident response team sealed the area and commenced investigation. During evidence collection they came across a zip disks that did not have the standard labeling on it. The incident team ran the disk on an isolated system and found that the system disk was accidentally erased. They decided to call in the FBI for further investigation. Meanwhile, they short listed possible suspects including three summer interns. Where did the incident team go wrong?
They attempted to implicate personnel without proof
They tampered with evidence by using it
They called in the FBI without correlating with the fingerprint data
Implement and manage identity and access
Monitor and troubleshoot Microsoft 365 security
At what layer of the OSI model do routers function on?
4
3
1
5
Implement and manage identity and access
Implement and manage threat protection
A user stores the following files in Microsoft OneDrive:
• File.docx
• ImportantFile.docx
• File_Important.docx
You create a Microsoft Cloud App Security file policy Policy1 that has the filter shown in the following exhibit.
To which files does Policy1 apply?
• File.docx
• ImportantFile.docx
• File_Important.docx
You create a Microsoft Cloud App Security file policy Policy1 that has the filter shown in the following exhibit.
To which files does Policy1 apply?
File_Important.docx only
File.docx, ImportantFile.docx, and File_Important.docx
File.docx only
ImportantFile.docx only
File.docx and File_Important.docx only
Implement and manage identity and access
Implement and manage information protection
Before performing a logical or physical search of a drive in Encase, what must be added to the program?
File signatures
Keywords
Hash sets
Bookmarks
Implement and manage identity and access
Monitor and troubleshoot Microsoft 365 security
Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis, he needs to send PDF documents containing sensitive information through E-mail to his customers.
Bill protects the PDF documents with a password and sends them to their intended recipients.
Why PDF passwords do not offer maximum protection?
Bill protects the PDF documents with a password and sends them to their intended recipients.
Why PDF passwords do not offer maximum protection?
PDF passwords can easily be cracked by software brute force tools
PDF passwords are converted to clear text when sent through E-mail
PDF passwords are not considered safe by Sarbanes-Oxley
When sent through E-mail, PDF passwords are stripped from the document completely
Implement and manage information protection
Manage governance and compliance features in Microsoft 365
Billy, a computer forensics expert, has recovered a large number of DBX files during the forensic investigation of a laptop. Which of the following email clients can he use to analyze the DBX files?
Microsoft Outlook
Eudora
Mozilla Thunderbird
Microsoft Outlook Express
Implement and manage identity and access
Monitor and troubleshoot Microsoft 365 security
BMP (Bitmap) is a standard file format for computers running the Windows operating system. BMP images can range from black and white (1 bit per pixel) up to 24 bit color (16.7 million colors). Each bitmap file contains a header, the RGBQUAD array, information header, and image data. Which of the following element specifies the dimensions, compression type, and color format for the bitmap?
Information header
Image data
The RGBQUAD array
Header
Implement and manage identity and access
Implement and manage threat protection
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 E5 subscription that is associated to a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You use Active Directory Federation Services (AD FS) to federate on-premises Active Directory and the tenant. Azure AD Connect has the following settings:
• Source Anchor: objectGUID
• Password Hash Synchronization: Disabled
• Password writeback: Disabled
• Directory extension attribute sync: Disabled
• Azure AD app and attribute filtering: Disabled
• Exchange hybrid deployment: Disabled
• User writeback: Disabled
You need to ensure that you can use leaked credentials detection in Azure AD Identity Protection.
Solution: You modify the Azure AD app and attribute filtering settings.
Does that meet the goal?
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 E5 subscription that is associated to a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You use Active Directory Federation Services (AD FS) to federate on-premises Active Directory and the tenant. Azure AD Connect has the following settings:
• Source Anchor: objectGUID
• Password Hash Synchronization: Disabled
• Password writeback: Disabled
• Directory extension attribute sync: Disabled
• Azure AD app and attribute filtering: Disabled
• Exchange hybrid deployment: Disabled
• User writeback: Disabled
You need to ensure that you can use leaked credentials detection in Azure AD Identity Protection.
Solution: You modify the Azure AD app and attribute filtering settings.
Does that meet the goal?
Yes
No
Implement and manage threat protection
Manage governance and compliance features in Microsoft 365
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 E5 subscription that is associated to a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You use Active Directory Federation Services (AD FS) to federate on-premises Active Directory and the tenant. Azure AD Connect has the following settings:
• Source Anchor: objectGUID
• Password Hash Synchronization: Disabled
• Password writeback: Disabled
• Directory extension attribute sync: Disabled
• Azure AD app and attribute filtering: Disabled
• Exchange hybrid deployment: Disabled
• User writeback: Disabled
You need to ensure that you can use leaked credentials detection in Azure AD Identity Protection.
Solution: You modify the Password Hash Synchronization settings.
Does that meet the goal?
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 E5 subscription that is associated to a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You use Active Directory Federation Services (AD FS) to federate on-premises Active Directory and the tenant. Azure AD Connect has the following settings:
• Source Anchor: objectGUID
• Password Hash Synchronization: Disabled
• Password writeback: Disabled
• Directory extension attribute sync: Disabled
• Azure AD app and attribute filtering: Disabled
• Exchange hybrid deployment: Disabled
• User writeback: Disabled
You need to ensure that you can use leaked credentials detection in Azure AD Identity Protection.
Solution: You modify the Password Hash Synchronization settings.
Does that meet the goal?
Yes
No
Implement and manage threat protection
Manage governance and compliance features in Microsoft 365
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 E5 subscription that is associated to a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You use Active Directory Federation Services (AD FS) to federate on-premises Active Directory and the tenant. Azure AD Connect has the following settings:
• Source Anchor: objectGUID
• Password Hash Synchronization: Disabled
• Password writeback: Disabled
• Directory extension attribute sync: Disabled
• Azure AD app and attribute filtering: Disabled
• Exchange hybrid deployment: Disabled
• User writeback: Disabled
You need to ensure that you can use leaked credentials detection in Azure AD Identity Protection.
Solution: You modify the Source Anchor settings.
Does that meet the goal?
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 E5 subscription that is associated to a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You use Active Directory Federation Services (AD FS) to federate on-premises Active Directory and the tenant. Azure AD Connect has the following settings:
• Source Anchor: objectGUID
• Password Hash Synchronization: Disabled
• Password writeback: Disabled
• Directory extension attribute sync: Disabled
• Azure AD app and attribute filtering: Disabled
• Exchange hybrid deployment: Disabled
• User writeback: Disabled
You need to ensure that you can use leaked credentials detection in Azure AD Identity Protection.
Solution: You modify the Source Anchor settings.
Does that meet the goal?
Yes
No
Implement and manage identity and access
Implement and manage information protection
Comments