Which authentication strategy should you implement for the pilot projects?
You need to ensure that all the sales department users can authenticate successfully during Project1 and Project2. Which authentication strategy should you implement for the pilot projects?A . pass-through authenticationB . pass-through authentication and seamless SSOC . password hash synchronization and seamless SSOD . password hash synchronizationView AnswerAnswer: C Explanation:...
Which three actions should you perform in sequence from the Security & Compliance admin center?
DRAG DROP You need to meet the requirement for the legal department. Which three actions should you perform in sequence from the Security & Compliance admin center? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. View...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
Which report should the New York office auditors view?
Which report should the New York office auditors view?A . DLP policy matchesB . DLP false positives and overridesC . DLP incidentsD . Top Senders and RecipientsView AnswerAnswer: C Explanation: Reference: https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies This report also shows policy matches over time, like the policy matches report. However, the policy matches report...
On which server should you use the Defender for identity sensor?
On which server should you use the Defender for identity sensor?A . Server1B . Server2C . Server3D . Server4E . Servers5View AnswerAnswer: A Explanation: However, if the case study had required that the DCs can't have any s/w installed, then the answer would have been a standalone sensor on Server2....
To which role group should you add User2, and what should you use?
HOTSPOT You need to ensure that User2 can review the audit logs. The solutions must meet the technical requirements. To which role group should you add User2, and what should you use? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point....
What should you include in the recommendation?
You need to recommend a solution for the security administrator. The solution must meet the technical requirements. What should you include in the recommendation?A . Microsoft Azure Active Directory (Azure AD) Privileged Identity ManagementB . Microsoft Azure Active Directory (Azure AD) Identity ProtectionC . Microsoft Azure Active Directory (Azure AD)...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
You have a Microsoft 365 tenant that contains a Windows 10 device named Device1 and the Microsoft Endpoint Manager policies shown in the following table.
You have a Microsoft 365 tenant that contains a Windows 10 device named Device1 and the Microsoft Endpoint Manager policies shown in the following table. A . only the settings of Policy!B . only the settings of Policy2C . only the settings of Policy3D . no settingsView AnswerAnswer: C
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...