AZ-500 Exam Question 51

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
Your company has an Active Directory forest with a single domain, named weylandindustries.com. They also have an Azure Active Directory (Azure AD) tenant with the same name.
You have been tasked with integrating Active Directory and the Azure AD tenant. You intend to deploy Azure AD Connect.
Your strategy for the integration must make sure that password policies and user logon limitations affect user accounts that are synced to the Azure AD tenant, and that the amount of necessary servers are reduced.
Solution: You recommend the use of pass-through authentication and seamless SSO with password hash synchronization.
Does the solution meet the goal?
  • AZ-500 Exam Question 52

    You have a management group named Group1 that contains an Azure subscription named sub1. Sub1 has a subscription ID of 11111111-1234-1234-1234-1111111111.
    You need to create a custom Azure role-based access control (RBAC) role that will delegate permissions to manage the tags on all the objects in Group1.
    What should you include in the role definition of Role1? To answer, select the appropriate options in the answer area.
    NOTE: Each correct selection is worth one point.

    AZ-500 Exam Question 53

    A user named Debbie has the Azure app installed on her mobile device.
    You need to ensure that [email protected] is alerted when a resource lock is deleted.
    To complete this task, sign in to the Azure portal.

    AZ-500 Exam Question 54

    Your company uses Azure DevOps.
    You need to recommend a method to validate whether the code meets the company's quality standards and code review standards.
    What should you recommend implementing in Azure DevOps?
  • AZ-500 Exam Question 55

    You have an Azure subscription that contains an Azure key vault named Vault1.
    On January 1, 2019, Vault1 stores the following secrets.

    Which can each secret be used by an application? To answer, select the appropriate options in the answer area.
    NOTE: Each correct selection is worth one point.