You have an Azure Active Directory (Azure AD) tenant that has an Azure Active Directory Premium Plan 2 license

HOTSPOT You have an Azure Active Directory (Azure AD) tenant that has an Azure Active Directory Premium Plan 2 license. The tenant contains the users shown in the following table. You have the Device Settings shown in the following exhibit. User1 has the devices shown in the following table. For...

March 12, 2022 No Comments READ MORE +

What should you do first?

You need to track application access assignments by using Identity Governance. The solution must meet the delegation requirements. What should you do first?A . Modify the User consent settings for the enterprise applications.B . Create a catalog.C . Create a program.D . Modify the Admin consent requests settings for the...

March 12, 2022 No Comments READ MORE +

What should you configure in Azure AD?

You create a Log Analytics workspace. You need to implement the technical requirements for auditing. What should you configure in Azure AD?A . Company brandingB . Diagnostics settingsC . External IdentitiesD . App registrationsView AnswerAnswer: B Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/overview-monitoring

March 12, 2022 No Comments READ MORE +

What should you do next?

HOTSPOT You need to implement password restrictions to meet the authentication requirements. You install the Azure AD password Protection DC agent on DC1. What should you do next? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

March 10, 2022 No Comments READ MORE +

What should you do?

HOTSPOT You have a Microsoft 365 tenant. Sometimes, users use external, third-party applications that require limited access to the Microsoft 365 data of the respective user. The users register the applications in Azure Active Directory (Azure AD). You need to receive an alert if a registered application gains read and...

July 15, 2021 No Comments READ MORE +

What should you use?

Topic 3, Misc. Questions HOTSPOT You have a Microsoft 365 tenant. You need to identify users who have leaked credentials. The solution must meet the following requirements. • Identity sign-Ins by users who ate suspected of having leaked credentials. • Rag the sign-ins as a high risk event. • Immediately...

July 15, 2021 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

July 15, 2021 No Comments READ MORE +

What should you create first, and which tool should you use?

HOTSPOT You need to meet the technical requirements for license management by the helpdesk administrators. What should you create first, and which tool should you use? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Text Description automatically...

July 15, 2021 No Comments READ MORE +

What should you do?

You need to meet the authentication requirements for leaked credentials. What should you do?A . Enable federation with PingFederate in Azure AD Connect.B . Configure Azure AD Password Protection.C . Enable password hash synchronization in Azure AD Connect.D . Configure an authentication method policy in Azure AView AnswerAnswer: C Explanation:...

July 15, 2021 No Comments READ MORE +

How should you complete the dynamic membership rule?

HOTSPOT You need to create the LWGroup1 group to meet the management requirements. How should you complete the dynamic membership rule? To answer, drag the appropriate values to the correct targets. Each value may be used once, more than once, or not at all. You many need to drag the...

July 15, 2021 No Comments READ MORE +