To which groups can you assign a Microsoft Office 365 Enterprise E5 license directly?
You have an Azure Active Directory (Azure AD) tenant that contains the following objects: ✑ A device named Device1 ✑ Users named User1, User2, User3, User4, and User5 ✑ Groups named Group1, Group2, Group3, Group4, and Group5 The groups are configured as shown in the following table. To which groups...
Does this meet the goal?
You have a Microsoft 365 tenant. All users must use the Microsoft Authenticator app for multi-factor authentication (MFA) when accessing Microsoft 365 services. Some users report that they received an MFA prompt on their Microsoft Authenticator app without initiating a sign-in request. You need to block the users automatically when...
What should you do next?
HOTSPOT You need to implement password restrictions to meet the authentication requirements. You install the Azure AD password Protection DC agent on DC1. What should you do next? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Server1...
What should you do?
HOTSPOT You need to configure app registration in Azure AD to meet the delegation requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/roles/delegate-app-roles
What should you do?
HOTSPOT You need to implement on-premises application and SharePoint Online restrictions to meet the authentication requirements and the access requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:
What should you configure in a conditional access policy?
HOTSPOT You have a Microsoft 36S tenant. You create a named location named HighRiskCountries that contains a list of high-risk countries. You need to limit the amount of time a user can stay authenticated when connecting from a high-risk country. What should you configure in a conditional access policy? To...
What should you do?
You need to configure the detection of multi-staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic.B . Create a workbook.C . Add Azure Sentinel data connectors.D . Add an Azure Sentinel playbook.View AnswerAnswer: A
What should you implement?
Topic 2, Contoso, Ltd Overview Contoso, Ltd is a consulting company that has a main office in Montreal offices in London and Seattle. Contoso has a partnership with a company named Fabrikam, Inc Fabcricam has an Azure Active Diretory (Azure AD) tenant named fabrikam.com. Existing Environment The on-premises network of...
What should you configure for each incident?
Topic 3, A. Datum Corp Overview A. Datum Corporation is a consulting company in Montreal. A. Datum recently acquired a Vancouver-based company named Litware, Inc. A Datum Environment The on-premises network of A. Datum contains an Active Directory Domain Services (AD DS) forest named adatum.com. A. Datum has a Microsoft...
What should you do?
You need to sync the ADatum users. The solution must meet the technical requirements. What should you do?A . From the Microsoft Azure Active Directory Connect wizard, select Customize synchronization options. B. From PowerShell, run Set-ADSyncScheduler. C. From PowerShell, run Start-ADSyncSyncCycle. D. From the Microsoft Azure Active Directory Connect wizard,...