How should you complete the dynamic membership rule?

HOTSPOT You need to create the LWGroup1 group to meet the management requirements. How should you complete the dynamic membership rule? To answer, drag the appropriate values to the correct targets. Each value may be used once, more than once, or not at all. You many need to drag the...

May 18, 2021 No Comments READ MORE +

What should you implement?

You need to meet the planned changes and technical requirements for App1. What should you implement?A . a policy set in Microsoft Endpoint ManagerB . an app configuration policy in Microsoft Endpoint ManagerC . an app registration in Azure ADD . Azure AD Application ProxyView AnswerAnswer: C Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app

May 16, 2021 No Comments READ MORE +

What should you do?

HOTSPOT You need to identify which roles to use for managing role assignments. The solution must meet the delegation requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

May 16, 2021 No Comments READ MORE +

What should the users do first, and what should you configure?

HOTSPOT You need to meet the technical requirements for the probability that user identities were compromised. What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

May 16, 2021 No Comments READ MORE +

What should you configure?

You need to configure the MFA settings for users who connect from the Boston office. The solution must meet the authentication requirements and the access requirements. What should you configure?A . named locations that have a private IP address rangeB . named locations that have a public IP address rangeC...

May 16, 2021 No Comments READ MORE +

What should you use?

HOTSPOT You have a Microsoft 365 tenant. You need to identify users who have leaked credentials. The solution must meet the following requirements. • Identity sign-Ins by users who ate suspected of having leaked credentials. • Rag the sign-ins as a high risk event. • Immediately enforce a control to...

May 15, 2021 No Comments READ MORE +

Does this meet the goal?

Topic 3, Misc. Questions You use Azure Monitor to analyze Azure Active Directory (Azure AD) activity logs. Yon receive more than 100 email alerts each day for tailed Azure Al) user sign-in attempts. You need to ensure that a new security administrator receives the alerts instead of you. Solution: From...

May 15, 2021 No Comments READ MORE +

What should you do?

Topic 2, Contoso, Ltd Overview Contoso, Ltd is a consulting company that has a main office in Montreal offices in London and Seattle. Contoso has a partnership with a company named Fabrikam, Inc Fabcricam has an Azure Active Diretory (Azure AD) tenant named fabrikam.com. Existing Environment The on-premises network of...

May 14, 2021 No Comments READ MORE +

Which four actions should you perform in sequence?

DRAG DROP You have an on-premises Microsoft Exchange organization that uses an SMTP address space of contoso.com. You discover that users use their email address for self-service sign-up to Microsoft 365 services. You need to gain global administrator privileges to the Azure Active Directory (Azure AD) tenant that contains the...

May 14, 2021 No Comments READ MORE +

What should you do?

You need to meet the planned changes for the User administrator role. What should you do?A . Create an access review.B . Modify Role settingsC . Create an administrator unit.D . Modify Active Assignments.View AnswerAnswer: D

May 14, 2021 No Comments READ MORE +