What should you do?
Topic 1, Litware, Inc Overview Litware, Inc. is a pharmaceutical company that has a subsidiary named fabrikam, inc Litware has offices in Boston and Seattle, but has employees located across the United States. Employees connect remotely to either office by using a VPN connection. Identity Environment The network contains an...
• Applications: Appl. App?
You have an Azure Active Directory (Azure AD) tenant. You create an enterprise application collection named HR Apps that has the following settings: • Applications: Appl. App?, App3 • Owners: Admin 1 • Users and groups: HRUsers AH three apps have the following Properties settings: • Enabled for users to...
Which users can configure the user risk policy, and which users can view the risky users report?
HOTSPOT You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following table. You plan to implement Azure AD Identity Protection. Which users can configure the user risk policy, and which users can view the risky users report? To answer, select the appropriate options...
What should you configure?
You need to implement the planned changes for litware.com. What should you configure?A . Azure AD Connect cloud sync between the Azure AD tenant and litware.com B. Azure AD Connect to include the litware.com domain C. staging mode in Azure AD Connect for the litware.com domainView AnswerAnswer: C
You have an Azure Active Directory (Azure AD) tenant that contains an administrative unit named Department1
HOTSPOT You have an Azure Active Directory (Azure AD) tenant that contains an administrative unit named Department1. Department1 has the users shown in the Users exhibit. (Click the Users tab.) Department1 has the groups shown in the Groups exhibit. (Click the Groups tab.) Department1 has the user administrator assignments shown...
What should you do?
You need to configure the detection of multi staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic. B. Create a workbook. C. Add an Azure Sentinel playbook. D. Add Azure Sentinel data connectors.View AnswerAnswer: D
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you configure?
You need implement the planned changes for application access to organizational data. What should you configure?A . authentication methods B. the User consent settings C. access packages D. an application proxyView AnswerAnswer: D
What should you do next?
HOTSPOT You need to implement password restrictions to meet the authentication requirements. You install the Azure AD password Protection DC agent on DC1. What should you do next? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:
What should you do?
HOTSPOT You need to identify which roles to use for managing role assignments. The solution must meet the delegation requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: