Microsoft Azure Security Technologies (AZ-500)

Disable ads (and more) with a membership for a one time $4.99 payment

Study for the Microsoft Azure Security Technologies (AZ-500) exam. Prepare with well-structured questions and detailed explanations. Enhance your understanding and improve your readiness for the certification exam!

Practice this question and more.


Which risk level should be configured for users that have leaked credentials?

  1. None

  2. Low

  3. Medium

  4. High

The correct answer is: High

When configuring risk levels for users that have leaked credentials, assigning a high risk is appropriate because compromised credentials pose a significant threat to the security of an organization. When a user's credentials are leaked, it indicates that an unauthorized individual might have access to sensitive data or systems. A high-risk classification triggers more stringent monitoring and protective measures to ensure that any potential breaches can be immediately identified and addressed. This classification typically leads to implementing stronger authentication mechanisms, such as multi-factor authentication, and may involve temporarily suspending the account until the user can secure their credentials and confirm their identity. By treating leaked credentials with a high-risk level, organizations can better protect their resources and minimize potential damages from unauthorized access. In contrast, lower risk levels such as none, low, or medium do not appropriately reflect the gravity of the situation involving leaked credentials and may not provide adequate responses to mitigate the risks associated with such scenarios.