Which MFA authentication method can the users use from the remote location?

You have a Microsoft 365 tenant. All users have mobile phones and laptops. The users frequently work from remote locations that do not have Wi-Fi access or mobile phone connectivity. While working from the remote locations, the users connect their laptop to a wired network that has internet access. You...

April 23, 2023 No Comments READ MORE +

What should you configure for each incident?

DRAG DROP You need to resolve the recent security incident issues. What should you configure for each incident? To answer, drag the appropriate policy types to the correct issues. Each policy type may be used once, more than once, or not at all. You may need to drag the split...

April 22, 2023 No Comments READ MORE +

What should you do first?

You have an Azure Active Directory (Azure AD) tenant named contoso.com that has Azure AD Identity Protection policies enforced. You create an Azure Sentinel instance and configure the Azure Active Directory connector. You need to ensure that Azure Sentinel can generate incidents based on the risk alerts raised by Azure...

April 22, 2023 No Comments READ MORE +

What should you do?

HOTSPOT You need to identify which roles to use for managing role assignments. The solution must meet the delegation requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

April 22, 2023 No Comments READ MORE +

Which user can sign in to Azure AD?

Your network contains an on-premises Active Directory domain that sync to an Azure Active Directory (Azure AD) tenant. The tenant contains the shown in the following table. All the users work remotely. Azure AD Connect is configured in Azure as shown in the following exhibit. Connectivity from the on-premises domain...

April 21, 2023 No Comments READ MORE +

What should the users do first, and what should you configure?

HOTSPOT You need to meet the technical requirements for the probability that user identities were compromised. What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

April 21, 2023 No Comments READ MORE +

What should you do?

You need to meet the authentication requirements for leaked credentials. What should you do?A . Enable federation with PingFederate in Azure AD Connect. B. Configure Azure AD Password Protection. C. Enable password hash synchronization in Azure AD Connect. D. Configure an authentication method policy in Azure AD.View AnswerAnswer: C Explanation:...

April 21, 2023 No Comments READ MORE +

What should you do?

Topic 1, Litware, Inc Overview Litware, Inc. is a pharmaceutical company that has a subsidiary named fabrikam, inc Litware has offices in Boston and Seattle, but has employees located across the United States. Employees connect remotely to either office by using a VPN connection. Identity Environment The network contains an...

April 18, 2023 No Comments READ MORE +

• Applications: Appl. App?

You have an Azure Active Directory (Azure AD) tenant. You create an enterprise application collection named HR Apps that has the following settings: • Applications: Appl. App?, App3 • Owners: Admin 1 • Users and groups: HRUsers AH three apps have the following Properties settings: • Enabled for users to...

April 17, 2023 No Comments READ MORE +

Which users can configure the user risk policy, and which users can view the risky users report?

HOTSPOT You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following table. You plan to implement Azure AD Identity Protection. Which users can configure the user risk policy, and which users can view the risky users report? To answer, select the appropriate options...

April 17, 2023 No Comments READ MORE +