What should you do first?

You have a Microsoft 365 E5 subscription. You need to create a Microsoft Defender for Cloud Apps session policy. What should you do first?A . From the Microsoft Defender for Cloud Apps portal, select User monitoring. B. From the Microsoft Defender for Cloud Apps portal, select App onboarding/maintenance C. From...

July 20, 2023 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

July 20, 2023 No Comments READ MORE +

What should you include in the solution?

Your company has a Microsoft 365 tenant. The company has a call center that contains 300 users. In the call center, the users share desktop computers and might use a different computer every day. The call center computers are NOT configured for biometric identification. The users are prohibited from having...

July 20, 2023 No Comments READ MORE +

What should you configure?

You need implement the planned changes for application access to organizational data. What should you configure?A . authentication methods B. the User consent settings C. access packages D. an application proxyView AnswerAnswer: B

July 20, 2023 No Comments READ MORE +

What should you do?

You need to configure the detection of multi staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic. B. Create a workbook. C. Add an Azure Sentinel playbook. D. Add Azure Sentinel data connectors.View AnswerAnswer: D

July 19, 2023 No Comments READ MORE +

What should you configure for the Azure AD tenant?

You need to resolve the issue of the sales department users. What should you configure for the Azure AD tenant?A . the User settings B. the Device settings C. the Access reviews settings D. Security defaultsView AnswerAnswer: B

July 19, 2023 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

July 19, 2023 No Comments READ MORE +

What should you do?

You need to meet the authentication requirements for leaked credentials. What should you do?A . Enable federation with PingFederate in Azure AD Connect. B. Configure Azure AD Password Protection. C. Enable password hash synchronization in Azure AD Connect. D. Configure an authentication method policy in Azure AD.View AnswerAnswer: C Explanation:...

July 19, 2023 No Comments READ MORE +

What should you create?

You have an Azure Active Directory (Azure AD) tenant that contains cloud-based enterprise apps. You need to group related apps into categories in the My Apps portal. What should you create?A . tags B. collections C. naming policies D. dynamic groupsView AnswerAnswer: B Explanation: Reference: https://support.microsoft.com/en-us/account-billing/customize-app-collections-in-the-my-apps-portal-2dae6b8a-d8b0-4a16-9a5d-71ed4d6a6c1d

July 19, 2023 No Comments READ MORE +

Which MFA authentication method can the users use from the remote location?

You have a Microsoft 365 tenant. All users have mobile phones and laptops. The users frequently work from remote locations that do not have Wi-Fi access or mobile phone connectivity. While working from the remote locations, the users connect their laptop to a wired network that has internet access. You...

July 19, 2023 No Comments READ MORE +