AZ-500 Exam QuestionsBrowse all questions from this exam

AZ-500 Exam - Question 6


You have been tasked with applying conditional access policies for your company's current Azure Active Directory (Azure AD).

The process involves assessing the risk events and risk levels.

Which of the following is the risk level that should be configured for users that have leaked credentials?

Show Answer
Correct Answer: D

D

These six types of events are categorized in to 3 levels of risks ג€" High, Medium & Low:

Reference:

http://www.rebeladmin.com/2018/09/step-step-guide-configure-risk-based-azure-conditional-access-policies/

Discussion

17 comments
Sign in to comment
greatadhesivenessOption: D
Jul 26, 2021

Yes, he's High!

us3r
Mar 18, 2022

cheers

awfnewf1q243Option: D
Oct 26, 2022

D. High Note: It is very unlikely the Microsoft will require the memorization of specific risk levels given that they have changed the documentation. Previously the risk levels were very well defined, however they now provide this very vague paragraph: "Microsoft doesn't provide specific details about how risk is calculated. Each level of risk brings higher confidence that the user or sign-in is compromised. For example, something like one instance of unfamiliar sign-in properties for a user might not be as threatening as leaked credentials for another user." Modern Documentation: https://learn.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection#investigate-risk Legacy Documentation: https://web.archive.org/web/20190419234045/https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-risk-events

Holii
May 31, 2023

Someone confirm if these questions are still on the exam. These are no longer up to date, and now analyzed as Real-Time and Offline.

God2029Option: D
Dec 2, 2022

Use logic and think like a security professional, users with Leaked credentials are always at high risk. Imagine the user is global admin. MFA is there, but still it is high risk. Nothing is secure and privacy is a myth before Advance Persistent Threat.

Fal991lOption: D
Feb 15, 2023

The risk level that should be configured for users that have leaked credentials in a conditional access policy is High. When a user's credentials are leaked, it means that their username and password have been compromised and are potentially in the hands of an attacker. This puts the user's account and the resources that they have access to at a high level of risk, making it important to apply strict access controls and security measures. By setting the risk level to High, conditional access policies can be configured to enforce stricter security measures, such as requiring multifactor authentication or blocking access to certain resources entirely. Therefore, the correct answer is D. High.

majstor86Option: D
Mar 2, 2023

D. High

pekayOption: A
Apr 1, 2023

High is the right answer

TheLegendPashaOption: D
Mar 26, 2022

D The understanding of the risk should be considered. When credentials are leaked the user is 100% exposed to hack.

TheLegendPashaOption: D
Apr 7, 2022

HIGH ! D!

Nerd101Option: D
Apr 22, 2022

D, correct answer!

salmantarik
Dec 5, 2022

The question is outdated and not relevant now

AZ5certOption: D
Dec 10, 2022

D: High

Andre369Option: D
Apr 13, 2023

The correct answer is D

zellckOption: D
May 6, 2023

D is the answer. https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-user-accounts#unusual-sign-ins Leaked credentials user risk detection - Risk Level: High

ESAJRROption: D
Jul 4, 2023

D. High

UrqlexandraOption: D
Sep 28, 2023

Yes, It's High!

xRiot007Option: D
Jul 15, 2024

If your users credentials are leaked, you are yiffed, so it should always be the highest risk value, in this case "High"