What should you include in the recommendation?
You need to recommend a solution to protect the sign-ins of Admin1 and Admin2. What should you include in the recommendation?A . a device compliance policyB . an access reviewC . a user risk policyD . a sign-in risk policyView AnswerAnswer: D Explanation: References: https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-user-risk-policy
Which three actions should you perform in sequence?
DRAG DROP You have a Microsoft 365 E5 subscription. All computers run Windows 10 and are onboarded to Windows Defender Advanced Threat Protection (Windows Defender ATP). You create a Windows Defender machine group named MachineGroup1. You need to enable delegation for the security settings of the computers in MachineGroup1. Which...
CORRECT TEXT
CORRECT TEXT Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time. When the Next button is available, click it to access the lab section....
Microsoft 365 Password: #HSP.ug?
CORRECT TEXT Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time. When the Next button is available, click it to access the lab section....
Where are suspicious email messages placed by default?
DRAG DROP You have a Microsoft 365 subscription. All users use Microsoft Exchange Online. Microsoft 365 is configured to use the default policy settings without any custom rules. You manage message hygiene. Where are suspicious email messages placed by default? To answer, drag the appropriate location to the correct message...
CORRECT TEXT
CORRECT TEXT Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time. When the Next button is available, click it to access the lab section....
Does this meet the goal?
You have a Microsoft 365 E5 subscription that contains a user named User1. The Azure Active Directory (Azure AD) Identity Protection risky users report identities User1. For User1, you select Confirm user compromised. User1 can still sign in. You need to prevent User1 from signing in. The solution must minimize...
You have a Microsoft 365 Tenant
HOTSPOT You have a Microsoft 365 Tenant. A conditional access policy is configured for the tenant as shown in the Policy exhibit. (Click the Policy tab.) The User Administrator role a configured as shown in the Hole setting exhibit (Click the Role setting tab.) The User Administrator role has the...
Does that meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some questions sets might have more than one correct solution, while others might not have a correct solution. After you...
How should you configure the content search1?
You have a Microsoft 365 subscription. You receive a General Data Protection Regulation (GDPR) request for the custom dictionary of a user. From the Compliance admin center you need to create a content search. How should you configure the content search1?A . Condition: Type Operator. Equals any of Value: Office...