What should you implement?
You have a Microsoft 365 tenant. You currently allow email clients that use Basic authentication to conned to Microsoft Exchange Online. You need to ensure that users can connect t to Exchange only run email clients that use Modern authentication protocols. What should you implement? You need to ensure that...
What should you do?
You need to sync the ADatum users. The solution must meet the technical requirements. What should you do?A . From the Microsoft Azure Active Directory Connect wizard, select Customize synchronization options. B. From PowerShell, run Set-ADSyncScheduler. C. From PowerShell, run Start-ADSyncSyncCycle. D. From the Microsoft Azure Active Directory Connect wizard,...
Which role should you assign to each user?
DRAG DROP You have a Microsoft 365 E5 subscription that contains two users named User1 and User2. You need to ensure that User1 can create access reviews for groups, and that User2 can review the history report for all the completed access reviews. The solution must use the principle of...
You have an Azure Active Directory (Azure AD) tenant that has an Azure Active Directory Premium Plan 2 license
HOTSPOT You have an Azure Active Directory (Azure AD) tenant that has an Azure Active Directory Premium Plan 2 license. The tenant contains the users shown in the following table. You have the Device Settings shown in the following exhibit. User1 has the devices shown in the following table. For...
• How many days after the account of User1 is deleted can you restore the account?
HOTSPOT You have an Azure Active Directory (Azure AD) tenant that contains a user named User1. An administrator deletes User1. You need to identity the following: • How many days after the account of User1 is deleted can you restore the account? • Which is the least privileged role that...
What should you do?
You need to configure the detection of multi staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic. B. Create a workbook. C. Add an Azure Sentinel playbook. D. Add Azure Sentinel data connectors.View AnswerAnswer: D
Which two actions should you perform for the role?
You need to modify the settings of the User administrator role to meet the technical requirements. Which two actions should you perform for the role? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.A . Select Require justification on activation B. Set all...
What occurs when User3 attempts to use SSPR?
CORRECT TEXT You implement the planned changes for SSPR. What occurs when User3 attempts to use SSPR? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:
What should you do?
Topic 2, Contoso, Ltd Overview Contoso, Ltd is a consulting company that has a main office in Montreal offices in London and Seattle. Contoso has a partnership with a company named Fabrikam, Inc Fabcricam has an Azure Active Diretory (Azure AD) tenant named fabrikam.com. Existing Environment The on-premises network of...
What should you configure in Azure AD?
You create a Log Analytics workspace. You need to implement the technical requirements for auditing. What should you configure in Azure AD?A . Company branding B. Diagnostics settings C. External Identities D. App registrationsView AnswerAnswer: B Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/overview-monitoring