What should the users do first, and what should you configure?
HOTSPOT You need to meet the technical requirements for the probability that user identifies were compromised. What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:
You have a custom cloud app named App1 that is registered in Azure Active Directory (Azure AD)
HOTSPOT You have a custom cloud app named App1 that is registered in Azure Active Directory (Azure AD). App1 is configured as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each...
You have a Microsoft 365 tenant named contoso.com
HOTSPOT You have a Microsoft 365 tenant named contoso.com. Guest user access is enabled. Users are invited to collaborate with contoso.com as shown in the following table. From the External collaboration settings in the Azure Active Directory admin center, you configure the Collaboration restrictions settings as shown in the following...
What should you include in the recommendation?
You have an Azure Active Directory (Azure AD) tenant that syncs to an Active Directory domain. The on-premises network contains a VPN server that authenticates to the on-premises Active Directory domain. The VPN server does NOT support Azure Multi-Factor Authentication (MFA). You need to recommend a solution to provide Azure...
What should you include in the conditional access policies to filter out legacy authentication attempts?
You have an Azure Active Directory (Azure AD) tenant named contoso.com. All users who run applications registered in Azure AD are subject to conditional access policies. You need to prevent the users from using legacy authentication. What should you include in the conditional access policies to filter out legacy authentication...
What should you do?
Topic 1, Litware, Inc Overview Litware, Inc. is a pharmaceutical company that has a subsidiary named fabrikam, inc Litware has offices in Boston and Seattle, but has employees located across the United States. Employees connect remotely to either office by using a VPN connection. Identity Environment The network contains an...
Which two parameters must you include when you create the bulk invite?
You have an Azure Active Directory (Azure AD) tenant named contoso.com. You plan to bulk invite Azure AD business-to-business (B2B) collaboration users. Which two parameters must you include when you create the bulk invite? Each correct answer presents part of the solutio.n. NOTE: Each correct selection is worth one point.A...
How many licenses are used if you assign the Microsoft Office 365 Enterprise E5 license to Group1?
You have an Azure Active Directory (Azure Azure) tenant that contains the objects shown in the following table. • A device named Device1 • Users named User1, User2, User3, User4, and User5 • Five groups named Group1, Group2, Group3, Ciroup4, and Group5 The groups are configured as shown in the...
What should you do first?
You have an Azure Active Directory (Azure AD) tenant named conto.so.com that has Azure AD Identity Protection enabled. You need to Implement a sign-in risk remediation policy without blocking access. What should you do first?A . Configure access reviews in Azure AD.B . Enforce Azure AD Password Protection.C . implement...
Which objects can you add as eligible in Azure Privileged identity Management (PIM) for an Azure AD role?
You have an Azure Active Directory (Azure AD) tenant that contains the objects shown in the following table. Which objects can you add as eligible in Azure Privileged identity Management (PIM) for an Azure AD role?A . User1 onlyB . User1 and Identity1 onlyC . User1. Guest1, and IdentityD ....