What occurs when User1 and User2 sign in from an unfamiliar location?
HOTSPOT You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table. You create and enforce an Azure AD Identity Protection user risk policy that has the following settings: - Assignments: Include Group1, Exclude Group2 - Conditions: Sign in risk...
What is the effect of the configuration?
HOTSPOT You have a Microsoft 365 subscription that uses a default domain name of contoso.com. The multi-factor authentication (MFA) service settings are configured as shown in the exhibit. (Click the Exhibit tab.) In contoso.com, you create the users shown in the following table. What is the effect of the configuration?...
You are evaluating which finance department users will be prompted for Azure MFA credentials
HOTSPOT You are evaluating which finance department users will be prompted for Azure MFA credentials. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer:
What should you do?
You need to meet the technical requirements for User9. What should you do?A . Assign the Privileged administrator role to User9 and configure a mobile phone number for User9B . Assign the Compliance administrator role to User9 and configure a mobile phone number for User9C . Assign the Security administrator...
What should you include in the recommendation?
HOTSPOT You need to recommend an email malware solution that meets the security requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:
You are evaluating which finance department users will be prompted for Azure MFA credentials. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point
HOTSPOT You are evaluating which finance department users will be prompted for Azure MFA credentials. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer:
Which users are members of ADGroup1 and ADGroup2?
Topic 3, Contoso, Ltd Overview Contoso, Ltd. is a consulting company that has a main office in Montreal and three branch offices in Seattle, and New York. The company has the offices shown in the following table. Contoso has IT, human resources (HR), legal, marketing, and finance departments. Contoso uses...
Which blade should you recommend using from the Azure Active Directory admin center?
You need to recommend a solution for the user administrators that meets the security requirements for auditing. Which blade should you recommend using from the Azure Active Directory admin center?A . Sign-insB . Azure AD Identity ProtectionC . Authentication methodsD . Access reviewView AnswerAnswer: A Explanation: References: https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-sign-ins
What should you do?
You need to implement Windows Defender ATP to meet the security requirements. What should you do?A . Configure port mirroringB . Create the ForceDefenderPassiveMode registry settingC . Download and install the Microsoft Monitoring AgentD . Run WindowsDefenderATPOnboardingScript.cmdView AnswerAnswer: C
What should User6 use to meet the technical requirements?
What should User6 use to meet the technical requirements?A . Supervision in the Security & Compliance admin centerB . Service requests in the Microsoft 365 admin centerC . Security & privacy in the Microsoft 365 admin centerD . Data subject requests in the Security & Compliance admin centerView AnswerAnswer: B