On which server should you install an additional pass-through authentication agent?
You have an Azure Active Directory (Azure AD) tenant that syncs to an Active Directory forest. The tenant-uses through authentication. A corporate security policy states the following: ✑ Domain controllers must never communicate directly to the internet. ✑ Only required software must be- installed on servers. The Active Directory domain...
What should the users do first, and what should you configure?
HOTSPOT You need to meet the technical requirements for the probability that user identifies were compromised. What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:
What should you do?
HOTSPOT You need to configure app registration in Azure AD to meet the delegation requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/roles/delegate-app-roles
What should you export from Azure AD?
You have an Azure Active Directory (Azure AD) tenant that uses conditional access policies. You plan to use third-party security information and event management (SIEM) to analyze conditional access usage. You need to download the Azure AD log that contains conditional access policy data. What should you export from Azure...
Which users can create and manage the access review?
You need to implement the planned changes for Package1. Which users can create and manage the access review?A . User3 onlyB . User4 onlyC . User5 onlyD . User3 and User4E . User3 and User5F . User4and User5View AnswerAnswer: E
What should you implement?
You have a Microsoft 365 tenant. You currently allow email clients that use Basic authentication to conned to Microsoft Exchange Online. You need to ensure that users can connect t to Exchange only run email clients that use Modern authentication protocols. What should you implement? You need to ensure that...
Which type of object should you create?
You need to allocate licenses to the new users from A. Datum. The solution must meet the technical requirements. Which type of object should you create? A. a distribution group B. a Dynamic User security group C. an administrative unit D. an OUView AnswerAnswer: C
You have a custom cloud app named App1 that is registered in Azure Active Directory (Azure AD)
HOTSPOT You have a custom cloud app named App1 that is registered in Azure Active Directory (Azure AD). App1 is configured as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each...
Which type of object should you create?
You need to locate licenses to the A. Datum users. The solution must need the technical requirements. Which type of object should you create? A. A Dynamo User security group B. An OU C. A distribution group D. An administrative unitView AnswerAnswer: D
What should you do?
You need to configure the detection of multi staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic.B . Create a workbook.C . Add an Azure Sentinel playbook.D . Add Azure Sentinel data connectors.View AnswerAnswer: D