Practice Test 4 | Microsoft Azure Security Technologies | AZ-500 | Dumps | Mock Test
Your company has an Azure Active Directory tenant that contains the following users.
Name | Member of | Multi-factor authentication status |
whizlabusr1 | None | Disabled |
whizlabusr2 | whizlabgrp1 | Disabled |
whizlabusr3 | whizlabgrp1 | Enforced |
The company has then enabled Azure AD Privileged Identity Management for the tenant.
The following settings have been configured for the Password Administrator Role.
Setting name | Setting value |
Maximum activation duration | 1hr |
Require incident/request ticket number during activation | Disabled |
Require Azure Multi-Factor Authentication for Activation | Enabled |
Require approval to activate this role | Enabled |
Selected approver | whizlabgrp1 |
The following assignments have been made for the Password administrator role.
Name | Assignment Type |
whizlabusr1 | Active |
whizlabusr2 | Eligible |
whizlabusr3 | Eligible |
If whizlabusr3 wants to activate the role, could the user approve their own request?
A. Yes
B. No
Answer – B
A user would not be able to approve their own request. Even if the user is part of the approver group, they will still not be able to self-approve the request.
For more information on privileged identity management for Azure AD roles, please refer to the below link-
Comments are closed, but trackbacks and pingbacks are open.