What should you do next?

HOTSPOT You need to implement password restrictions to meet the authentication requirements. You install the Azure AD password Protection DC agent on DC1. What should you do next? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Server2 Azure...

February 23, 2023 No Comments READ MORE +

Does this meet the goal?

You have a Microsoft 365 tenant. All users must use the Microsoft Authenticator app for multi-factor authentication (MFA) when accessing Microsoft 365 services. Some users report that they received an MFA prompt on their Microsoft Authenticator app without initiating a sign-in request. You need to block the users automatically when...

February 23, 2023 No Comments READ MORE +

Which MFA authentication method can the users use from the remote location?

You have a Microsoft 365 tenant. All users have mobile phones and laptops. The users frequently work from remote locations that do not have Wi-Fi access or mobile phone connectivity. While working from the remote locations, the users connect their laptop to a wired network that has internetaccess. You plan...

February 23, 2023 No Comments READ MORE +

Which risk detection type is classified as a user risk?

You have an Azure Active Directory (Azure AD) tenant. You open the risk detections report. Which risk detection type is classified as a user risk?A . impossible travel B. anonymous IP address C. atypical travel D. leaked credentialsView AnswerAnswer: D Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-risks

February 23, 2023 No Comments READ MORE +

What should you do?

You need to configure the detection of multi-staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic. B. Create a workbook. C. Add Azure Sentinel data connectors. D. Add an Azure Sentinel playbook.View AnswerAnswer: A

February 22, 2023 No Comments READ MORE +

What occurs when User3 attempts to use SSPR?

CORRECT TEXT You implement the planned changes for SSPR. What occurs when User3 attempts to use SSPR? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

February 22, 2023 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

February 22, 2023 No Comments READ MORE +

What should you do first?

You have an Azure Active Directory (Azure AD) tenant named contoso.com that has Azure AD Identity Protection policies enforced. You create an Azure Sentinel instance and configure the Azure Active Directory connector. You need to ensure that Azure Sentinel can generate incidents based on the risk alerts raised by Azure...

February 22, 2023 No Comments READ MORE +

What should you configure for each incident?

DRAG DROP You need to resolve the recent security incident issues. What should you configure for each incident? To answer, drag the appropriate policy types to the correct issues. Each policy type may be used once, more than once, or not at all. You may need to drag the split...

February 21, 2023 No Comments READ MORE +

What should you create first, and which tool should you use?

HOTSPOT You need to meet the technical requirements for license management by the helpdesk administrators. What should you create first, and which tool should you use? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Text Description automatically...

February 21, 2023 No Comments READ MORE +