To which groups can you apply Policy1?
HOTSPOT Your network contains an on-premises Active Directory domain named contoso.com. The domain contains the groups shown in the following table. The domain is synced to a Microsoft Azure Active Directory (Azure AD) tenant that contains the groups shown in the following table. You create an Azure Information Protection policy...
CORRECT TEXT
CORRECT TEXT Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time. When the Next button is available, click it to access the lab section....
Which Threat & Vulnerability Management page should you use?
You have a Microsoft 365 E5 subscription that contains 1,000 Windows 10 devices. The devices are onboarded to Microsoft Defender for Endpoint. You need to view a consolidated list of the common vulnerabilities and exposures (CVE) that affect the devices. The solution must minimize administrative effort. Which Threat & Vulnerability...
Which tool should you run first?
You need to resolve the issue that targets the automated email messages to the IT team. Which tool should you run first?A . Synchronization Service Manager B. Azure AD Connect wizard C. Synchronization Rules Editor D. IdFixView AnswerAnswer: B Explanation: References: https://docs.microsoft.com/en-us/office365/enterprise/fix-problems-with-directory-synchronization
Does that meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some questions sets might have more than one correct solution, while others might not have a correct solution. After you...
You have a Microsoft 365 E5 subscription that contains the users shown in the following table
HOTSPOT You have a Microsoft 365 E5 subscription that contains the users shown in the following table. You have the devices shown in the following table. You have the Microsoft Defender for Endpoint portal roles shown in the following table. You have the Microsoft Defender for Endpoint device groups shown...
Does that meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some questions sets might have more than one correct solution, while others might not have a correct solution. After you...
Microsoft 365 Password: #HSP.ug?
CORRECT TEXT Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time. When the Next button is available, click it to access the lab section....
Does this meet the goal?
You have a Microsoft 365 E5 subscription that contains a user named User1. The Azure Active Directory (Azure AD) Identity Protection risky users report identities User1. For User1, you select Confirm user compromised. User1 can still sign in. You need to prevent User1 from signing in. The solution must minimize...
CORRECT TEXT
CORRECT TEXT You need to configure your organization to automatically quarantine all phishing email messages. To complete this task, sign in to the Microsoft 365 portal.View AnswerAnswer: You need to edit the Anti-Phishing policy. ✑ Go to the Office 365 Security & Compliance admin center. ✑ Navigate to Threat Management...