This page was exported from IT Certification Exam Braindumps [ http://blog.braindumpsit.com ] Export date:Sat Apr 5 5:16:59 2025 / +0000 GMT ___________________________________________________ Title: 2023 MS-500 Dumps PDF - MS-500 Real Exam Questions Answers [Q117-Q140] --------------------------------------------------- 2023 MS-500 Dumps PDF - MS-500 Real Exam Questions Answers Valid MS-500 Test Answers & Microsoft MS-500 Exam PDF To pass the Microsoft MS-500 Exam, candidates need to have a solid understanding of Microsoft 365 security technologies and the ability to implement and manage these technologies effectively. The exam covers a wide range of topics, including configuring and managing Azure Active Directory, implementing and managing threat protection, implementing and managing information protection, and managing governance and compliance features. Successful candidates will have a strong understanding of Microsoft 365 security technologies, the ability to identify and mitigate security risks, and the skills to implement and manage security solutions to protect their organization's data and systems. Passing the Microsoft MS-500 Exam validates the candidate's expertise and demonstrates their ability to secure Microsoft 365 enterprise environments effectively.   Q117. Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.Username and passwordUse the following login credentials as needed:To enter your username, place your cursor in the Sign in box and click on the username below.To enter your password, place your cursor in the Enter password box and click on the password below.Microsoft 365 Username:admin@LODSe244001@onmicrosoft.comMicrosoft 365 Password: &=Q8v@2qGzYzIf the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.The following information is for technical support only:Lab instance: 11032396You need to ensure that a user named Lee Gu can manage all the settings for Exchange Online. The solution must use the principle of least privilege.To complete this task, sign in to the Microsoft Office 365 admin center. See explanation below.* In the Exchange Administration Center (EAC), navigate to Permissions > Admin Roles.* Select the group: Organization Management and then click on Edit.* In the Members section, click on Add.* Select the users, USGs, or other role groups you want to add to the role group, click on Add, and then click on OK.* Click on Save to save the changes to the role group.Reference:https://help.bittitan.com/hc/en-us/articles/115008104507-How-do-I-assign-the-elevated-admin-role-Organizationhttps://docs.microsoft.com/en-us/exchange/permissions-exo/permissions-exoQ118. You have a Microsoft 365 subscription. From the Security & Compliance admin center, you create the retention policies shown in the following table.Policy1 if configured as showing in the following exhibit.Policy2 is configured as shown in the following exhibit.For each of the following statements, select Yes if the statement is true. Otherwise, select No. ExplanationReference:https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies?redirectSourcePath=%252fen-Q119. You have an Azure Sentinel workspace that has an Office 365 connector.You are threat hunting events that have suspicious traffic from specific IP addresses.You need to save the events and the relevant query results for future reference.Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. Reference:https://docs.microsoft.com/en-us/azure/sentinel/bookmarksQ120. You are evaluating which devices are compliant in Intune.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. ExplanationQ121. You need to recommend a solution for the user administrators that meets the security requirements for auditing.Which blade should you recommend using from the Azure Active Directory admin center?  Sign-ins  Azure AD Identity Protection  Authentication methods  Access review Reference:https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-sign-insTopic 3, Contoso, LtdExisting EnvironmentInfrastructureThe network contains an Active Directory domain named contoso.com that is synced to a Microsoft Azure Active Directory (Azure AD) tenant. Password writeback is enabled.The domain contains servers that run Windows Server 2016. The domain contains laptops and desktop computers that run Windows 10 Enterprise.Each client computer has a single volume.Each office connects to the Internet by using a NAT device. The offices have the IP addresses shown in the following table.Named locations are defined in Azure AD as shown in the following table.From the Multi-Factor Authentication page, an address space of 198.35.3.0/24 is defined in the trusted IPs list.Azure Multi-Factor Authentication (MFA) is enabled for the users in the finance department.The tenant contains the users shown in the following table.The tenant contains the groups shown in the following table.Customer Lockbox is enabled in Microsoft 365.Microsoft Intune ConfigurationThe devices enrolled in Intune are configured as shown in the following table.The device compliance policies in Intune are configured as shown in the following table.The device compliance policies have the assignments shown in the following table.The Mark devices with no compliance policy assigned as setting is set to Compliant.RequirementsTechnical RequirementsContoso identifies the following technical requirements:Use the principle of least privilegeEnable User1 to assign the Reports reader role to usersEnsure that User6 approves Customer Lockbox requests as quickly as possible Ensure that User9 can implement Azure AD Privileged Identity ManagementQ122. You have a Microsoft 365 subscription.You have a site collection named SiteCollection1 that contains a site named Site2. Site2 contains a document library named Customers.Customers contains a document named Litware.docx. You need to remove Litware.docx permanently.Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. ExplanationQ123. You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table.You create and enforce an Azure AD Identity Protection user risk policy that has the following settings:* Assignments: Include Group1, Exclude Group2* Conditions: Sign in risk of Low and above* Access: Allow access, Require password changeYou need to identify how the policy affects User1 and User2.What occurs when User1 and User2 sign in from an unfamiliar location? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. ExplanationQ124. You need to resolve the issue that generates the automated email messages to the IT team.Which tool should you run first?  Synchronization Service Manager  Azure AD Connect wizard  Synchronization Rules Editor  IdFix Explanation/Reference:References:https://docs.microsoft.com/en-us/office365/enterprise/fix-problems-with-directory-synchronization Implement and manage identity and access Testlet 2 This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study.At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section.To start the case studyTo display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. If the case study has an All Information tab, note that the information displayed is identical to the information displayed on the subsequent tabs. When you are ready to answer a question, click the Question button to return to the question.OverviewLitware, Inc. is a financial company that has 1,000 users in its main office in Chicago and 100 users in a branch office in San Francisco.Existing EnvironmentInternal Network InfrastructureThe network contains a single domain forest. The forest functional level is Windows Server 2016.Users are subject to sign-in hour restrictions as defined in Active Directory.The network has the IP address ranges shown in the following table.The offices connect by using Multiprotocol Label Switching (MPLS).The following operating systems are used on the network:* Windows Server 2016* Windows 10 Enterprise* Windows 8.1 EnterpriseThe internal network contains the systems shown in the following table.Litware uses a third-party email system.Cloud InfrastructureLitware recently purchased Microsoft 365 subscription licenses for all users.Microsoft Azure Active Directory (Azure AD) Connect is installed and uses the default authentication settings.User accounts are not yet synced to Azure AD.You have the Microsoft 365 users and groups shown in the following table.RequirementsPlanned ChangesLitware plans to implement the following changes:* Migrate the email system to Microsoft Exchange Online* Implement Azure AD Privileged Identity ManagementSecurity RequirementsLitware identifies the following security requirements:* Create a group named Group3 that will be used for publishing sensitivity labels to pilot users. Group3 must only contain user accounts* Use Azure Advanced Threat Protection (ATP) to detect any security threats that target the forest* Prevent users locked out of Active Directory from signing in to Azure AD and Active Directory* Implement a permanent eligible assignment of the Compliance administrator role for User1* Configure domain-joined servers to ensure that they report sensor data to Microsoft Defender ATP* Prevent access to Azure resources for the guest user accounts by default* Ensure that all domain-joined computers are registered to Azure ADMulti-factor authentication (MFA) RequirementsSecurity features of Microsoft Office 365 and Azure will be tested by using pilot Azure user accounts.You identify the following requirements for testing MFA:* Pilot users must use MFA unless they are signing in from the internal network of the Chicago office. MFA must NOT be used on the Chicago office internal network.* If an authentication attempt is suspicious, MFA must be used, regardless of the user location.* Any disruption of legitimate authentication attempts must be minimized.General RequirementsLitware wants to minimize the deployment of additional servers and services in the Active Directory forest.Q125. Which role should you assign to User1?  Global administrator  User administrator  Privileged role administrator  Security administrator Explanation/Reference:Implement and manage identity and accessQuestion Set 4Q126. You have a Microsoft 365 subscription that contains the users shown in the following table.You implement Azure Active Directory (Azure AD) Privileged Identity Management (PIM).From PIM, you review the Application Administrator role and discover the users shown in the following table.The Application Administrator role is configured to use the following settings in PIM:* Maximum activation duration: 1 hour* Notifications: Disable* Incident/Request ticket: Disable* Multi-Factor Authentication: Disable* Require approval: Enable* Selected approver: No resultsFor each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Q127. You need torecommend an email malware solution that meets the security requirements.What should you include in the recommendation? To answer, select the appropriate options in the answer area.NOTE:Each correct selection is worth one point. ExplanationQ128. You have a Microsoft 365 E5 subscription.All computers run Windows 10 and are onboarded to Windows Defender Advanced Threat Protection (Windows Defender ATP).You create a Windows Defender machine group named MachineGroupl.You need to enable delegation for the security settings of the computers in MachineGroupl.Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 1 – From Windows Defender Security Center, configure the permissions for MachineGroup1.2 – From the Microsoft Azure portal, create an Azure Active Directory (Azure AD) group.3 – From the Azure portal, create an RBAC role.Q129. You have a Microsoft 365 subscription that contains a Microsoft SharePoint Online site named Site1. Site1 contains the folders shown in the following table.At 09:00, you create a Microsoft Cloud App Security policy named Policy1 as shown in the following exhibit.After you create Policy1, you upload files to Site1 as shown in the following table.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. ExplanationReference:https://docs.microsoft.com/en-us/cloud-app-security/data-protection-policiesQ130. You have a Microsoft 365 subscription.You need to ensure that users can manually designate which content will be subject to data loss prevention (DLP) policies.What should you create first?  A retention label in Microsoft Office 365  A custom sensitive information type  A Data Subject Request (DSR)  A safe attachments policy in Microsoft Office 365 Explanation/Reference:References:https://docs.microsoft.com/en-us/office365/securitycompliance/manage-gdpr-data-subject-requests-with-the- dsr-case-tool#more-information-about-using-the-dsr-case-toolQ131. Your network contains an on-premises Active Directory domain. The domain contains the servers shown in the following table.You plan to implement Azure Advanced Threat Protection (ATP) for the domain.You install an Azure ATP standalone sensor on Server1.You need to monitor the domain by using Azure ATP.What should you do?  Configure port mirroring for DC1.  Configure port mirroring for Server 1.  Install the Microsoft Monitoring Agent on Server!.  Install the Microsoft Monitoring Agent on DC1. Reference:https://docs.microsoft.com/en-us/azure-advanced-threat-protection/configure-port-mirroringQ132. You have an on-premises Hyper-V infrastructure that contains the following:An Active Directory domainA domain controller named Server1A member server named Server2A security policy specifies that Server1 cannot connect to the Internet. Server2 can connect to the Internet.You need to implement Azure Advanced Threat Protection (ATP) to monitor the security of the domain.What should you configure on each server? To answer, drag the appropriate components to the correct servers. Each component may only be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.NOTE: Each correct selection is worth one point. 7Q133. You plan to publish a label that will retain documents in Microsoft OneDrive for two years, and then automatically delete the documents.You need to create the label.To complete this task, sign in to the Microsoft Office 365 portal. See explanation below.ExplanationYou need to create a retention label.* Go to the Security & Compliance Admin Center.* Navigate to Classification >* Click on + Create a label to create a new label.* Give the label a name and click* On the File plan descriptors, leave all options empty. The options in this page are used for auto-applying the retention label. Click Next.* Turn the Retention switch to On.* Under Retain the content, set the period to 2 years.* Under What do you want to do after this time?, select the Delete the content automatically option.* Click Next.* Click the Create this label button to create the label. The label is now ready to be published to Microsoft OneDrive.Q134. You have a Microsoft 365 subscription that contains an Azure Active Directory (Azure AD) tenant named contoso.com.You need to recommend an Azure AD Privileged Identity Management (PIM) solution that meets the following requirements:Administrators must be notified when theSecurity administrator role is activated.Users assigned the Security administrator role must be removed from the role automatically if they do not sign in for 30 days.Which Azure AD PIM setting should you recommend configuring for each requirement? To answer, select the appropriate options in the answer area.NOTE:Each correct selection is worth one point. ExplanationReference:https://docs.microsoft.com/bs-latn-ba/azure/active-directory/privileged-identity-management/pim-how-to-confihttps://docs.microsoft.com/bs-latn-ba/azure/active-directory/privileged-identity-management/pim-how-to-changQ135. You have a Microsoft 365 tenant.User attributes are synced from your company’s human resources (HR) system to Azure Active Directory (Azure AD).The company has four departments that each has its own Microsoft SharePoint Online site. Each site must be accessed only by the users from its respective department.You are designing an access management solution that has the following requirements:Users must be added automatically to the security group of their department.All security group owners must verify once quarterly that only the users in their department belong to their group.Which components should you recommend to meet the requirements? To answer, drag the appropriate components to the correct requirements. Each component may only be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.NOTE: Each correct selection is worth one point. Reference:https://cloudbuild.co.uk/tag/create-a-dynamic-security-group-in-azure-ad/https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overviewQ136. You have a Microsoft 365 subscription that uses a default domain name of litwareinc.com.You configure the Sharing settings in Microsoft OneDrive as shown in the following exhibit. ExplanationReference:https://docs.microsoft.com/en-us/sharepoint/turn-external-sharing-on-or-offQ137. You have a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named contoso.com. OneDrive stores files that are shared with external users. The files are configured as shown in the following table.You create a data loss prevention (DLP) policy that applies to the content stored in OneDrive accounts. The policy contains the following three rules:* Rulel:* Conditions: Label 1, Detect content that’s shared with people outside my organization* Actions: Restrict access to the content for external users* User notifications: Notify the user who last modified the content* User overrides: On* Priority: 0* Rule2:* Conditions: Label 1 or Label2* Actions: Restrict access to the content* Priority: 1* Rule3:* Conditions: Label2, Detect content that’s shared with people outside my organization* Actions: Restrict access to the content for external users* User notifications: Notify the user who last modified the content* User overrides: On* Priority: 2For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point.For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. Q138. You have a hybrid deployment of Microsoft 365 that contains the users shown in the following table.You plan to use Microsoft 365 Attack Simulator.You need to identify the users against which you can use Attack Simulator.Which users should you identify?  User1 and User3 only  User1, User2, User3, and User4  User3 only  User3 and User4 only Q139. You have a Microsoft 365 subscription that contains a user named User.You enroll devices in Microsoft Intune as shown in the following table.Each device has two line of business apps named App1 and App2 installed.You create application control policies targeted to all the app types in Microsoft Endpoint Manager as shown in the following table.For each of the following statements, Select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Q140. Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.Username and passwordUse the following login credentials as needed:To enter your username, place your cursor in the Sign in box and click on the username below.To enter your password, place your cursor in the Enter password box and click on the password below.Microsoft 365 Username:admin@LODSe244001@onmicrosoft.comMicrosoft 365 Password: &=Q8v@2qGzYzIf the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.The following information is for technical support only:Lab instance: 11032396You need to ensure that SharepointAdmins@contoso.com receives an alert when a user establishes a sync relationship to a document library from a computer that is a member of an Active Directory (AD) domain.To complete this task, sign in to the Microsoft Office 365 admin center. See explanation below.Explanation1. Navigate to Manage Alerts in the Security & Compliance Center.2. On the Activity alerts page, click + New.The flyout page to create an activity alert is displayed.3. Complete the following fields to create an activity alert:a. Name – Type a name for the alert. Alert names must be unique within your organization.b. Description (Optional) – Describe the alert, such as the activities and users being tracked, and the users that email notifications are sent to. Descriptions provide a quick and easy way to describe the purpose of the alert to other admins.c. Alert type – Make sure the Custom option is selected.d. Send this alert when – Click Send this alert when and then configure these two fields:* Activities – Click the drop-down list to display the activities that you can create an alert for. This is the same activities list that’s displayed when you search the Office 365 audit log. You can select one or more specific activities or you can click the activity group name to select all activities in the group. For* a description of these activities, see the “Audited activities” section in Search the audit log. When a user performs any of the activities that you’ve added to the alert, an email notification is sent.* Users – Click this box and then select one or more users. If the users in this box perform the activities that you added to the Activities box, an alert will be sent. Leave the Users box blank to send an alert when any user in your organization performs the activities specified by the alert.e. Send this alert to – Click Send this alert, and then click in the Recipients box and type a name to add a user’s who will receive an email notification when a user (specified in the Users box) performs an activity (specified in the Activities box). Note that you are added to the list of recipients by default. You can remove your name from this list.4. Click Save to create the alert.The new alert is displayed in the list on the Activity alerts page.The status of the alert is set to On. Note that the recipients who will receive an email notification when an alert is sent are also listed.Reference:https://docs.microsoft.com/en-us/microsoft-365/compliance/create-activity-alerts?view=o365-worldwide Loading … MS-500 Exam Dumps - PDF Questions and Testing Engine: https://www.braindumpsit.com/MS-500_real-exam.html --------------------------------------------------- Images: https://blog.braindumpsit.com/wp-content/plugins/watu/loading.gif https://blog.braindumpsit.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-07-06 16:11:26 Post date GMT: 2023-07-06 16:11:26 Post modified date: 2023-07-06 16:11:26 Post modified date GMT: 2023-07-06 16:11:26