What should you use to assign access to each user?
HOTSPOT You have an Azure key vault. You need to delegate administrative access to the key vault to meet the following requirements: - Provide a user named User1 with the ability to set advanced access policies for the key vault. - Provide a user named User2 with the ability to...
You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table
HOTSPOT You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table. Azure AD Privileged Identity Management (PIM) is enabled for the tenant. In PIM, the Password Administrator role has the following settings: ✑ Maximum activation duration (hours): 2 ✑ Send...
What should you do?
HOTSPOT You need to deploy Microsoft Antimalware to meet the platform protection requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation:
How should you configure the query?
HOTSPOT You suspect that users are attempting to sign in to resources to which they have no access. You need to create an Azure Log Analytics query to identify failed user sign-in attempts from the last three days. The results must only show users who had more than five failed...
Which authentication method should you include in the recommendation?
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. You have an Azure subscription named Sub1 that is associated to an Azure Active Directory (Azure AD) tenant named contoso.com. You plan to deploy Azure AD Connect and to integrate Active Directory and the Azure...
What information should you obtain from the developer to register the application?
Your company has an Azure subscription named Sub1 that is associated to an Azure Active Directory Azure (Azure AD) tenant named contoso.com. The company develops a mobile application named App1. App1 uses the OAuth 2 implicit grant type to acquire Azure AD access tokens. You need to register App1 in...
What should you do?
From Azure Security, you create a custom alert rule. You need to configure which users will receive an email message when the alert is triggered. What should you do?A . From Azure Monitor, create an action group.B . From Security Center, modify the Security policy settings of the Azure subscription.C...
Which three actions should you perform in sequence?
DRAG DROP You need to configure an access review. The review will be assigned to a new collection of reviews and reviewed by resource owners. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange...
Which three actions should you perform in sequence?
DRAG DROP You create an Azure subscription with Azure AD Premium P2. You need to ensure that you can use Azure Active Directory (Azure AD) Privileged Identity Management (PIM) to secure Azure roles. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list...
Which action will Advanced Threat Protection detect as a threat?
You have an Azure SQL Database server named SQL1. You plan to turn on Advanced Threat Protection for SQL1 to detect all threat detection types. Which action will Advanced Threat Protection detect as a threat?A . A user updates more than 50 percent of the records in a table.B ....