Thursday, July 29, 2021

Microsoft Azure AZ-500 Exam Best Preparation Tool

 

Aspired to become a Microsoft Certified Azure Security Engineer? Here’s the definitive guide for your AZ-500 exam preparation, follow this and start your preparation for the Azure AZ-500 certification exam.

Microsoft is one of the strongest names in the world of cloud computing. The cloud service platform of Microsoft, Azure, is one of the market leaders in cloud computing along with AWS and Google Cloud. Therefore, the demand for Azure certifications is always high. One of the most recently launched Azure exams is Microsoft Azure AZ 500 that is ideal for the role of Microsoft Azure Security Engineer.

Many sources on the internet help candidates in the AZ-500 exam preparation. However, the following discussion would aim at illustrating every detail of the exam to support your preparation. The discussion can serve as a guiding path for you to start preparation immediately for the Azure Security certification. So, let us get started!

Use this quick start guide to collect all the information about Microsoft Azure Security Technologies (AZ-500) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the AZ-500 Microsoft Azure Security Technologies exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual Microsoft MCA Azure Security Engineer certification exam.

The Microsoft Azure Security Technologies certification is mainly targeted to those candidates who want to build their career in Microsoft Azure domain. The Microsoft Certified - Azure Security Engineer Associate exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of Microsoft MCA Azure Security Engineer.

Skills measured
The content of this exam will be updated on August 2, 2021. Please download the exam skills outline below to see what will be changing.

Manage identity and access (30-35%)
Implement platform protection (15-20%)
Manage security operations (25-30%)
Secure data and applications (20-25%)

Manage identity and access (30-35%)
Manage Azure Active Directory identities

 configure security for service principals
 manage Azure AD directory groups
 manage Azure AD users
 manage administrative units
 configure password writeback
 configure authentication methods including password hash and Pass Through

Authentication (PTA), OAuth, and passwordless
 transfer Azure subscriptions between Azure AD tenants

Configure secure access by using Azure AD
 monitor privileged access for Azure AD Privileged Identity Management (PIM)
 configure Access Reviews
 configure PIM
 implement Conditional Access policies including Multi-Factor Authentication (MFA)
 configure Azure AD identity protection

Manage application access

 create App Registration
 configure App Registration permission scopes
 manage App Registration permission consent
 manage API access to Azure subscriptions and resources

Manage access control

 configure subscription and resource permissions
 configure resource group permissions
 configure custom RBAC roles
 identify the appropriate role
    o apply principle of least privilege
 interpret permissions
    o check access

Implement platform protection (15-20%)

Implement advanced network security
 secure the connectivity of virtual networks (VPN authentication, Express Route encryption)
 configure Network Security Groups (NSGs) and Application Security Groups (ASGs)
 create and configure Azure Firewall
 implement Azure Firewall Manager
 configure Azure Front Door service as an Application Gateway
 configure a Web Application Firewall (WAF) on Azure Application Gateway
 configure Azure Bastion
 configure a firewall on a storage account, Azure SQL, Key Vault, or App Service
 implement Service Endpoints
 implement DDoS protection

Configure advanced security for compute

 configure endpoint protection
 configure and monitor system updates for VMs
 configure authentication for Azure Container Registry
 configure security for different types of containers
    o implement vulnerability management
    o configure isolation for AKS
    o configure security for container registry
 implement Azure Disk Encryption
 configure authentication and security for Azure App Service
    o configure SSL/TLS certs
    o configure authentication for Azure Kubernetes Service
    o configure automatic updates

Manage security operations (25-30%)
Monitor security by using Azure Monitor
 create and customize alerts
 monitor security logs by using Azure Monitor
 configure diagnostic logging and log retention

Monitor security by using Azure Security Center
 evaluate vulnerability scans from Azure Security Center
 configure Just in Time VM access by using Azure Security Center
 configure centralized policy management by using Azure Security Center
 configure compliance policies and evaluate for compliance by using Azure Security Center
 configure workflow automation by using Azure Security Center

Monitor security by using Azure Sentinel
 create and customize alerts
 configure data sources to Azure Sentinel
 evaluate results from Azure Sentinel
 configure a playbook by using Azure Sentinel

Configure security policies
 configure security settings by using Azure Policy
 configure security settings by using Azure Blueprint

Secure data and applications (20-25%)


Configure security for storage

 configure access control for storage accounts
 configure key management for storage accounts
 configure Azure AD authentication for Azure Storage
 configure Azure AD Domain Services authentication for Azure Files
 create and manage Shared Access Signatures (SAS)
    o create a shared access policy for a blob or blob container
 configure Storage Service Encryption
 configure Azure Defender for Storage

Configure security for databases
 enable database authentication
 enable database auditing
 configure Azure Defender for SQL
    o configure Azure SQL Database Advanced Threat Protection
 implement database encryption
o implement Azure SQL Database Always Encrypted

Configure and manage Key Vault
 manage access to Key Vault
 manage permissions to secrets, certificates, and keys
    o configure RBAC usage in Azure Key Vault
 manage certificates
 manage secrets
 configure key rotation
 backup and restore of Key Vault items
 configure Azure Defender for Key Vault

The exam guide below shows the changes that will be implemented on August 2, 2021.

Audience Profile
Candidates for this exam should have subject matter expertise implementing security controls and threat protection, managing identity and access, and protecting data, applications, and networks.
Responsibilities for an Azure Security Engineer include maintaining the security posture, identifying and remediating vulnerabilities by using a variety of security tools, implementing threat protection, and responding to security incident escalations.
Azure Security Engineers often serve as part of a larger team dedicated to cloud-based management and security and may also secure hybrid environments as part of an end-to-end infrastructure.

A candidate for this exam should be familiar with scripting and automation, and should have a deep understanding of networking and virtualization. A candidate should also have a strong familiarity with cloud capabilities, Azure products and services, and other Microsoft products and services.

Skills Measured
NOTE: The bullets that follow each of the skills measured are intended to illustrate how we are assessing that skill. This list is NOT definitive or exhaustive.
NOTE: Most questions cover features that are General Availability (GA). The exam may contain questions on Preview features if those features are commonly used.

Manage identity and access (30-35%)

Manage Azure Active Directory identities
 configure security for service principals
 manage Azure AD directory groups
 manage Azure AD users
 manage administrative units
 configure password writeback
 configure authentication methods including password hash and Pass Through

Authentication (PTA), OAuth, and passwordless
 transfer Azure subscriptions between Azure AD tenants

Configure secure access by using Azure AD
 monitor privileged access for Azure AD Privileged Identity Management (PIM)
 configure Access Reviews
 configure PIM
 implement Conditional Access policies including Multi-Factor Authentication (MFA)
 configure Azure AD identity protection

Manage application access
 create App Registration
 configure App Registration permission scopes
 manage App Registration permission consent
 manage API access to Azure subscriptions and resources

Manage access control

 configure subscription and resource permissions
 configure resource group permissions
 configure custom RBAC roles
 identify the appropriate role
o apply principle of least privilege
 interpret permissions
o check access

Implement platform protection (15-20%)
Implement advanced network security
 secure the connectivity of virtual networks (VPN authentication, Express Route encryption)
 configure Network Security Groups (NSGs) and Application Security Groups (ASGs)
 create and configure Azure Firewall
 implement Azure Firewall Manager
 configure Azure Front Door service as an Application Gateway
 configure a Web Application Firewall (WAF) on Azure Application Gateway
 configure Azure Bastion
 configure a firewall on a storage account, Azure SQL, Key Vault, or App Service
 implement Service Endpoints
 implement DDoS protection

Configure advanced security for compute
 configure endpoint protection
 configure and monitor system updates for VMs
 configure authentication for Azure Container Registry
 configure security for different types of containers
o implement vulnerability management
o configure isolation for AKS
o configure security for container registry
 implement Azure Disk Encryption
 configure authentication and security for Azure App Service
o configure SSL/TLS certs
o configure authentication for Azure Kubernetes Service
o configure automatic updates

Manage security operations (25-30%)
Monitor security by using Azure Monitor

 create and customize alerts
 monitor security logs by using Azure Monitor
 configure diagnostic logging and log retention

Monitor security by using Azure Security Center
 evaluate vulnerability scans from Azure Security Center
 configure Just in Time VM access by using Azure Security Center
 configure centralized policy management by using Azure Security Center
 configure compliance policies and evaluate for compliance by using Azure Security Center
 configure workflow automation by using Azure Security Center

Monitor security by using Azure Sentinel
 create and customize alerts
 configure data sources to Azure Sentinel
 evaluate results from Azure Sentinel
 configure a playbook by using Azure Sentinel

Configure security policies
 configure security settings by using Azure Policy
 configure security settings by using Azure Blueprint

Secure data and applications (20-25%)

Configure security for storage
 configure access control for storage accounts
 configure key management for storage accounts
 configure Azure AD authentication for Azure Storage
 configure Azure AD Domain Services authentication for Azure Files
 create and manage Shared Access Signatures (SAS)
o create a shared access policy for a blob or blob container
 configure Storage Service Encryption
 configure Azure Defender for Storage

Configure security for databases
 enable database authentication
 enable database auditing
 configure Azure Defender for SQL
o configure Azure SQL Database Advanced Threat Protection
 implement database encryption
o implement Azure SQL Database Always Encrypted

Configure and manage Key Vault

 manage access to Key Vault
 manage permissions to secrets, certificates, and keys
o configure RBAC usage in Azure Key Vault
 manage certificates
 manage secrets
 configure key rotation
 backup and restore of Key Vault items
 configure Azure Defender for Key Vault

QUESTION 1
You need to meet the identity and access requirements for Group1.
What should you do?

A. Add a membership rule to Group1.
B. Delete Group1. Create a new group named Group1 that has a group type of Microsoft 365. Add users and devices to the group.
C. Modify the membership rule of Group1.
D. Change the membership type of Group1 to Assigned. Create two groups that have dynamic memberships. Add the new groups to Group1.

Correct Answer: B

Explanation/Reference:
Incorrect Answers:
A, C: You can create a dynamic group for devices or for users, but you can't create a rule that contains both users and devices.
D: For assigned group you can only add individual members.

QUESTION 2
You need to ensure that User2 can implement PIM.
What should you do first?

A. Assign User2 the Global administrator role.
B. Configure authentication methods for contoso.com.
C. Configure the identity secure score for contoso.com.
D. Enable multi-factor authentication (MFA) for User2.

Correct Answer: A

Explanation/Reference:
Explanation:
To start using PIM in your directory, you must first enable PIM.
1. Sign in to the Azure portal as a Global Administrator of your directory.
You must be a Global Administrator with an organizational account (for example, @yourdomain.com), not a Microsoft account (for example, @outlook.com), to enable PIM for a directory.
Scenario: Technical requirements include: Enable Azure AD Privileged Identity Management (PIM) for contoso.com

QUESTION 3
You need to ensure that you can meet the security operations requirements. What should you do first?

A. Turn on Auto Provisioning in Security Center.
B. Integrate Security Center and Microsoft Cloud App Security.
C. Upgrade the pricing tier of Security Center to Standard.
D. Modify the Security Center workspace configuration.

Correct Answer: C

Explanation/Reference:
Explanation:
The Standard tier extends the capabilities of the Free tier to workloads running in private and other public clouds, providing unified security management and threat protection across your hybrid cloud workloads.
The Standard tier also adds advanced threat detection capabilities, which uses built-in behavioral analytics and machine learning to identify attacks and zero-days exploits, access and application controls to reduce exposure to network attacks and malware, and more.
Scenario: Security Operations Requirements
Litware must be able to customize the operating system security configurations in Azure Security Center.

QUESTION 4
You need to configure WebApp1 to meet the data and application requirements.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. Upload a public certificate.
B. Turn on the HTTPS Only protocol setting.
C. Set the Minimum TLS Version protocol setting to 1.2.
D. Change the pricing tier of the App Service plan.
E. Turn on the Incoming client certificates protocol setting.

Correct Answer: AC

Explanation/Reference:
Explanation:
A: To configure Certificates for use in Azure Websites Applications you need to upload a public Certificate.
C: Over time, multiple versions of TLS have been released to mitigate different vulnerabilities. TLS 1.2 is the most current version available for apps running on Azure App Service.

Incorrect Answers:
B: We need support the http url as well.

QUESTION 5
SIMULATION
You need to ensure that when administrators deploy resources by using an Azure Resource Manager template, the deployment can access secrets in an Azure key vault named KV11597200.
To complete this task, sign in to the Azure portal.
Correct Answer: See the explanation below.

Section: (none)

Explanation/Reference:
Explanation:
You need to configure an option in the Advanced Access Policy of the key vault.
1. In the Azure portal, type Azure Key Vault in the search box, select Azure Key Vault from the search results then select the key vault named KV11597200. Alternatively, browse to Azure Key Vault in the left navigation pane.
2. In the properties of the key vault, click on Advanced Access Policies.
3. Tick the checkbox labelled Enable access to Azure Resource Manager for template deployment.
4. Click Save to save the changes.

Actualkey Microsoft Azure AZ-500 exam pdf, Certkingdom Microsoft Azure AZ-500 PDF

MCTS Training, MCITP Trainnig

Best Microsoft Azure AZ-500 Certification, Microsoft Azure AZ-500 Training at certkingdom.com

Wednesday, July 28, 2021

PK0-004 CompTIA Project+ Exam

 

CompTIA Project+ gives business professionals – inside and outside of IT – the basic concepts to successfully manage small- to medium-sized projects.

Why is it different?

CompTIA Project+ is ideal for professionals who need to manage smaller, less complex projects as part of their other job duties but still have foundational project management skills. Project+ is more versatile than other certifications because it covers essential project management concepts beyond the scope of just one methodology or framework.

About the exam
The CompTIA Project+ examination is designed for business professionals who coordinate or manage small-to-medium-sized projects. The successful candidate will have the knowledge and skills required to:

Manage the project life cycle
Ensure appropriate communication
Manage resources and stakeholders
Maintain project documentation

Exam Details
Exam Codes PK0-004
Exam Description CompTIA Project+ is designed for business professionals who coordinate or manage small-to-medium-size projects, inside and outside of IT. The exam certifies the knowledge and skills required to manage the project life cycle, ensure appropriate, communication, manage resources, manage stakeholders, and maintain project documentation.
Number of Questions Maximum of 95 questions
Type of Questions Multiple choice questions (single and multiple response), and drag and drops
Length of Test 90 Minutes
Passing Score 710 (on a scale of 100-900)
Recommended Experience At least 12 months of cumulative project management experience or equivalent education
Launch Date March 15 2017
Retirement N/A
Languages English, Japanese
Testing Provider Pearson VUE
Testing Centers Online Testing

What Skills Will You Learn?
HARDWARE
PROJECT BASICS

Summarize the properties of project, phases, schedules, roles and responsibilities, and cost controls, as well as identifying the basic aspects of Agile methodology
WINDOWS OPERATING SYSTEMS
PROJECT CONSTRAINTS

Predict the impact of various constraint variables and influences throughout the project and explain the importance of risk strategies and activities
SOFTWARE TROUBLESHOOTING
COMMUNICATION & CHANGE MANAGEMENT

Understand appropriate communication methods of influence and use change control processes within the context of a project
NETWORKING
PROJECT TOOLS & DOCUMENTATION

Compare and contrast various project management tools and analyze project and partner-centric documentation

Official CompTIA Content (OCC) has been designed from the ground up to help you learn and master the material in your certification exam. Trust self-paced CompTIA study guides that are

Clearly written and structured.
Flexible so you can learn at any pace.
Focused on your exam success.

Save With a Bundle
CompTIA Training bundles are a great way to continue your learning process in every stage of your exam preparation. Complement a study guide with popular training options such as:

QUESTION 1
A project manager is attempting to establish the proper sequencing and duration of project activities.
Which of the following would be the MOST beneficial?

A. Network diagram
B. Ishikawa diagram
C. WBS
D. Gantt chart

Correct Answer: A

QUESTION 2
Which of the following are characteristics of a project? (Choose two.)

A. Ongoing
B. Temporary
C. Start and finish
D. Achieving a goal
E. Consisting of milestones
F. Restricting the budget

Correct Answer: BC

QUESTION 3
A company has determined it does not have the in-house capability to perform a project and wants to procure third-party services.
Which of the following documents will the company MOST likely release FIRST?

A. RFO
B. RFI
C. RFP
D. RFQ

Correct Answer: B

QUESTION 4
The project manager was asked to provide recommendations for the removal of a vendor. A meeting was
scheduled with the key stakeholders and the project sponsor to highlight the reasons for this recommendation.
Which of the following should the project manager bring to the meeting to support this recommendation?
(Choose two.)

A. The issue log to show why the vendor should be replaced.
B. The team action items to show why the vendor should be replaced.
C. The scope statement to show why the vendor should be replaced.
D. A procurement plan to show why the vendor should be replaced.
E. A change management plan to have the vendor replaced.

Correct Answer: AE

QUESTION 5
A project manager is creating the WBS.
In which of the following phases is the project?

A. Initiation
B. Planning
C. Execution
D. Closing

Correct Answer: B

QUESTION 6
Which of the following is a characteristics of a matrix organization?

A. Authority lies solely with the project manager.
B. Authority is directed by the project architect.
C. Authority is shared between the project manager and project coordinator.
D. Authority is shared between functional and project managers.

Correct Answer: D

Actualkey CompTIA PK0-004 exam pdf, Certkingdom CompTIA PK0-004 PDF

MCTS Training, MCITP Trainnig

Best CompTIA PK0-004 Certification, CompTIA PK0-004 Training at certkingdom.com