What should you configure in a conditional access policy?
HOTSPOT You have a Microsoft 36S tenant. You create a named location named HighRiskCountries that contains a list of high-risk countries. You need to limit the amount of time a user can stay authenticated when connecting from a high-risk country. What should you configure in a conditional access policy? To...
What should you configure in Azure AD?
You create a Log Analytics workspace. You need to implement the technical requirements for auditing. What should you configure in Azure AD?A . Company brandingB . Diagnostics settingsC . External IdentitiesD . App registrationsView AnswerAnswer: B Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/overview-monitoring
What should you do?
HOTSPOT You need to implement on-premises application and SharePoint Online restrictions to meet the authentication requirements and the access requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:
Which role should you assign to SecAdmin1?
You have an Azure Active Directory (Azure AD) tenant that contains a user named SecAdmin1. SecAdmin1 is assigned the Security administrator role. SecAdmin1 reports that she cannot reset passwords from the Azure AD Identity Protection portal. You need to ensure that SecAdmin1 can manage passwords and invalidate sessions on behalf...
What should you configure?
You need implement the planned changes for application access to organizational data. What should you configure?A . authentication methodsB . the User consent settingsC . access packagesD . an application proxyView AnswerAnswer: B
What should the users do first, and what should you configure?
HOTSPOT You need to meet the technical requirements for the probability that user identities were compromised. What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-policies
What should you configure?
Topic 3, A. Datum Corp Overview A. Datum Corporation is a consulting company in Montreal. A. Datum recently acquired a Vancouver-based company named Litware, Inc. A Datum Environment The on-premises network of A. Datum contains an Active Directory Domain Services (AD DS) forest named adatum.com. A. Datum has a Microsoft...
Which two parameters must you include when you create the bulk invite?
You have an Azure Active Directory (Azure AD) tenant named contoso.com. You plan to bulk invite Azure AD business-to-business (B2B) collaboration users. Which two parameters must you include when you create the bulk invite? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.A...
Which three actions should yon perform in sequence?
DRAG DROP Your company has an Azure Active Directory (Azure AD) tenant named contoso.com. The company is developing a web service named App1. You need to ensure that App1 can use Microsoft Graph to read directory data in contoso.com. Which three actions should yon perform in sequence? To answer, move...
What should you export from Azure AD?
You have an Azure Active Directory (Azure AD) tenant that uses conditional access policies. You plan to use third-party security information and event management (SIEM) to analyze conditional access usage. You need to download the Azure AD log that contains conditional access policy data. What should you export from Azure...