exam questions

Exam AZ-500 All Questions

View all questions & answers for the AZ-500 exam

Exam AZ-500 topic 2 question 6 discussion

Actual exam question from Microsoft's AZ-500
Question #: 6
Topic #: 2
[All AZ-500 Questions]

DRAG DROP -
You are implementing conditional access policies.
You must evaluate the existing Azure Active Directory (Azure AD) risk events and risk levels to configure and implement the policies.
You need to identify the risk level of the following risk events:
✑ Users with leaked credentials
✑ Impossible travel to atypical locations
✑ Sign-ins from IP addresses with suspicious activity
Which level should you identify for each risk event? To answer, drag the appropriate levels to the correct risk events. Each level may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:

Show Suggested Answer Hide Answer
Suggested Answer:
Azure AD Identity protection can detect six types of suspicious sign-in activities:
✑ Users with leaked credentials
✑ Sign-ins from anonymous IP addresses
✑ Impossible travel to atypical locations

Sign-ins from infected devices -

✑ Sign-ins from IP addresses with suspicious activity
✑ Sign-ins from unfamiliar locations
These six types of events are categorized in to 3 levels of risks ג€" High, Medium & Low:

References:
http://www.rebeladmin.com/2018/09/step-step-guide-configure-risk-based-azure-conditional-access-policies/

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
majstor86
Highly Voted 2 years, 2 months ago
Medium High Medium The question is not valid anymore
upvoted 24 times
Malikusmanrasheed
1 year, 11 months ago
rebeladmin guide attached is outdated. The newer guide doesn't have any indication of the severity of each risk
upvoted 3 times
...
...
ahorva
Highly Voted 2 years, 11 months ago
This question is no longer valid. The referenced article in the explanation also mentions the same thing : "Some time ago I wrote this article about sign-in risk-based conditional access policies. But things have been changed over time and I thought it is time to update it with new content. The updated post can access using https://www.rebeladmin.com/2020/11/step-by-step-guide-how-to-configure-sign-in-risk-based-azure-conditional-access-policies/ "
upvoted 5 times
PowerBIAddict
2 years, 11 months ago
Agreed. Trying to confirm the impossible travel in Microsoft docs it is clear that Azure has changed since this question was originally included. Amusingly the official practice exam has a very similar question.
upvoted 3 times
...
...
stonwall12
Most Recent 2 months, 3 weeks ago
Answer: 1. Impossible travel to atypical location: Medium 2. Users with leaked credential: High 3. Sign-ins from IP addresses with suspicious activity: Medium Reason: Impossible travel to atypical locations: Medium - This is considered a high-risk event because it indicates potentially impossible geographic movements that could signal account compromise Users with leaked credentials: High - This represents a medium risk as the credentials are known to be compromised but haven't necessarily been used maliciously yet Sign-ins from IP addresses with suspicious activity: Medium - This is also classified as medium risk since suspicious IP addresses might indicate potential attack attempts but aren't definitive proof of compromise Reference: https://learn.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-risks
upvoted 1 times
...
trashbox
1 year, 7 months ago
Impossible travel: Medium Leaked credentials: High IP addresses with suspicious activity: Medium
upvoted 1 times
...
Andre369
1 year, 11 months ago
Users with leaked credentials - Low Impossible travel to atypical location - High Sign-ins from IP addresses with suspicious activity - Medium The rationale behind these choices is as follows: Users with leaked credentials are typically considered to have a lower risk level because it indicates a potential compromise of user credentials but may not necessarily imply immediate unauthorized access to sensitive resources. Impossible travel to atypical location suggests a high risk level because it indicates a significant deviation from the user's typical travel patterns, which can be indicative of account compromise or misuse. Sign-ins from IP addresses with suspicious activity indicate a medium risk level because it suggests potential suspicious behavior but may require further investigation to determine the severity and intent of the activity.
upvoted 1 times
xRiot007
9 months, 3 weeks ago
"Users with leaked credentials - Low" - Really ? I suggest using Chat GPT less.
upvoted 1 times
...
IvanIco
1 year, 7 months ago
what are u high on bro, it must be some good sh**, i don't know how can someone say the leaked credentials is low risk... but it is high just like you are high on some good stuff
upvoted 8 times
...
...
FonKeel
2 years, 4 months ago
I doubt such question would appear in exams as the Risk level differ based on organization's risk definitions, Microsoft can only recommend but can't bind such levels.
upvoted 3 times
...
awfnewf1q243
2 years, 6 months ago
Note: It is very unlikely the Microsoft will require the memorization of specific risk levels given that they have changed the documentation. Previously the risk levels were very well defined, however they now provide this very vague paragraph: "Microsoft doesn't provide specific details about how risk is calculated. Each level of risk brings higher confidence that the user or sign-in is compromised. For example, something like one instance of unfamiliar sign-in properties for a user might not be as threatening as leaked credentials for another user." Modern Documentation: https://learn.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection#investigate-risk Legacy Documentation: https://web.archive.org/web/20190419234045/https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-risk-events
upvoted 4 times
...
the_flow88
2 years, 9 months ago
question no longer valid - you can now assign your own "score" to any item based on your companies needs. Which makes more sense anyway...
upvoted 2 times
...
phi3nix
2 years, 11 months ago
Sign-ins from IP addresses with suspicious activity is Medium now. https://github.com/toddkitta/azure-content/blob/master/articles/active-directory/active-directory-identityprotection-risk-events-types.md#sign-ins-from-ip-addresses-with-suspicious-activity
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago