What should you configure for the Security administrator role assignment?
Your company recently implemented Azure Active Directory (Azure AD) Privileged Identity Management (PIM). While you review the roles in PIM, you discover that all 15 users in the IT department at the company have permanent security administrator rights. You need to ensure that the IT department users only have access...
What should the users do first, and what should you configure?
HOTSPOT You need to meet the technical requirements for the probability that user identifies were compromised. What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:
What should you do?
HOTSPOT You need to configure app registration in Azure AD to meet the delegation requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Graphical user interface, text Description automatically generated
Which type of object should you create?
You need to locate licenses to the A. Datum users. The solution must need the technical requirements. Which type of object should you create? A. A Dynamo User security group B. An OU C. A distribution group D. An administrative unitView AnswerAnswer: A
For which users can you configure the Job title property and the Usage location property in Azure AD?
HOTSPOT You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following table. For which users can you configure the Job title property and the Usage location property in Azure AD? To answer, select the appropriate options in the answer area. NOTE: Each correct...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
For which groups can you create an access review?
You have an Azure Active Directory (Azure AD) tenant that contains the groups shown in the following table. For which groups can you create an access review?A . Group1 onlyB . Group1 and Group4 onlyC . Group1 and Group2 onlyD . Group1, Group2, Group4, and Group5 onlyE . Group1, Group2,...
What should you do first?
You have an Azure Active Directory Premium P2 tenant. You create a Log Analytics workspace. You need to ensure that you can view Azure Active Directory (Azure AD) audit log information by using Azure Monitor. What should you do first?A . Run the Set-AzureADTenantDetail cmdlet.B . Create an Azure AD...
Which MFA authentication method can the users use from the remote location?
You have a Microsoft 365 tenant. All users have mobile phones and laptops. The users frequently work from remote locations that do not have Wi-Fi access or mobile phone connectivity. While working from the remote locations, the users connect their laptop to a wired network that has internet access. You...
Does this meet the goal?
Topic 3, Misc. Questions You use Azure Monitor to analyze Azure Active Directory (Azure AD) activity logs. Yon receive more than 100 email alerts each day for tailed Azure Al) user sign-in attempts. You need to ensure that a new security administrator receives the alerts instead of you. Solution: From...