Which risk detection type is classified as a user risk?
You have an Azure AD tenant You open the risk detections report. Which risk detection type is classified as a user risk?A . password spray B. anonymous IP address C. unfamiliar sign-in properties D. Azure AD threat intelligenceView AnswerAnswer: A
Does this meet the goal?
You use Azure Monitor to analyze Azure Active Directory (Azure AD) activity logs. Yon receive more than 100 email alerts each day for tailed Azure Al) user sign-in attempts. You need to ensure that a new security administrator receives the alerts instead of you. Solution: From Azure monitor, you modify...
What should you do?
You have an Azure AD tenant You configure User consent settings to allow users to provide consent to apps from verified publishers. You need to ensure that the users can only provide consent to apps that require low impact permissions. What should you do?A . Create an access package. B....
What should you do first?
You have a Microsoft 365 E5 subscription. You need to create a Microsoft Defender for Cloud Apps session policy. What should you do first?A . From the Microsoft Defender for Cloud Apps portal, select User monitoring. B. From the Microsoft Defender for Cloud Apps portal, select App onboarding/maintenance C. From...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you include in the solution?
Your company has a Microsoft 365 tenant. The company has a call center that contains 300 users. In the call center, the users share desktop computers and might use a different computer every day. The call center computers are NOT configured for biometric identification. The users are prohibited from having...
What should you configure?
You need implement the planned changes for application access to organizational data. What should you configure?A . authentication methods B. the User consent settings C. access packages D. an application proxyView AnswerAnswer: B
What should you do?
You need to configure the detection of multi staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic. B. Create a workbook. C. Add an Azure Sentinel playbook. D. Add Azure Sentinel data connectors.View AnswerAnswer: D
What should you configure for the Azure AD tenant?
You need to resolve the issue of the sales department users. What should you configure for the Azure AD tenant?A . the User settings B. the Device settings C. the Access reviews settings D. Security defaultsView AnswerAnswer: B
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...