What should the users do first, and what should you configure?

HOTSPOT You need to meet the technical requirements for the probability that user identifies were compromised. What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

April 21, 2025 No Comments READ MORE +

You have a custom cloud app named App1 that is registered in Azure Active Directory (Azure AD)

HOTSPOT You have a custom cloud app named App1 that is registered in Azure Active Directory (Azure AD). App1 is configured as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each...

April 20, 2025 No Comments READ MORE +

You have a Microsoft 365 tenant named contoso.com

HOTSPOT You have a Microsoft 365 tenant named contoso.com. Guest user access is enabled. Users are invited to collaborate with contoso.com as shown in the following table. From the External collaboration settings in the Azure Active Directory admin center, you configure the Collaboration restrictions settings as shown in the following...

April 18, 2025 No Comments READ MORE +

What should you include in the recommendation?

You have an Azure Active Directory (Azure AD) tenant that syncs to an Active Directory domain. The on-premises network contains a VPN server that authenticates to the on-premises Active Directory domain. The VPN server does NOT support Azure Multi-Factor Authentication (MFA). You need to recommend a solution to provide Azure...

April 17, 2025 No Comments READ MORE +

What should you include in the conditional access policies to filter out legacy authentication attempts?

You have an Azure Active Directory (Azure AD) tenant named contoso.com. All users who run applications registered in Azure AD are subject to conditional access policies. You need to prevent the users from using legacy authentication. What should you include in the conditional access policies to filter out legacy authentication...

April 17, 2025 No Comments READ MORE +

What should you do?

Topic 1, Litware, Inc Overview Litware, Inc. is a pharmaceutical company that has a subsidiary named fabrikam, inc Litware has offices in Boston and Seattle, but has employees located across the United States. Employees connect remotely to either office by using a VPN connection. Identity Environment The network contains an...

April 16, 2025 No Comments READ MORE +

Which two parameters must you include when you create the bulk invite?

You have an Azure Active Directory (Azure AD) tenant named contoso.com. You plan to bulk invite Azure AD business-to-business (B2B) collaboration users. Which two parameters must you include when you create the bulk invite? Each correct answer presents part of the solutio.n. NOTE: Each correct selection is worth one point.A...

April 16, 2025 No Comments READ MORE +

How many licenses are used if you assign the Microsoft Office 365 Enterprise E5 license to Group1?

You have an Azure Active Directory (Azure Azure) tenant that contains the objects shown in the following table. • A device named Device1 • Users named User1, User2, User3, User4, and User5 • Five groups named Group1, Group2, Group3, Ciroup4, and Group5 The groups are configured as shown in the...

April 16, 2025 No Comments READ MORE +

What should you do first?

You have an Azure Active Directory (Azure AD) tenant named conto.so.com that has Azure AD Identity Protection enabled. You need to Implement a sign-in risk remediation policy without blocking access. What should you do first?A . Configure access reviews in Azure AD.B . Enforce Azure AD Password Protection.C . implement...

April 15, 2025 No Comments READ MORE +

Which objects can you add as eligible in Azure Privileged identity Management (PIM) for an Azure AD role?

You have an Azure Active Directory (Azure AD) tenant that contains the objects shown in the following table. Which objects can you add as eligible in Azure Privileged identity Management (PIM) for an Azure AD role?A . User1 onlyB . User1 and Identity1 onlyC . User1. Guest1, and IdentityD ....

April 15, 2025 No Comments READ MORE +