What should you implement?

You need to meet the planned changes and technical requirements for App1. What should you implement?A . a policy set in Microsoft Endpoint ManagerB . an app configuration policy in Microsoft Endpoint ManagerC . an app registration in Azure ADD . Azure AD Application ProxyView AnswerAnswer: C Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app

July 14, 2021 No Comments READ MORE +

What should you do?

You need to configure the detection of multi-staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic.B . Create a workbook.C . Add Azure Sentinel data connectors.D . Add an Azure Sentinel playbook.View AnswerAnswer: A

July 14, 2021 No Comments READ MORE +

What should you do?

HOTSPOT You need to implement on-premises application and SharePoint Online restrictions to meet the authentication requirements and the access requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

July 13, 2021 No Comments READ MORE +

What is a valid authentication method available to users?

You have an Azure Active Directory (Azure AD) tenant. You configure self-service password reset (SSPR) by using the following settings: • Require users to register when signing in: Yes • Number of methods required to reset: 1 What is a valid authentication method available to users?A . home prionsB ....

July 12, 2021 No Comments READ MORE +

Does this meet the goal?

You have a Microsoft 365 tenant. All users must use the Microsoft Authenticator app for multi-factor authentication (MFA) when accessing Microsoft 365 services. Some users report that they received an MFA prompt on their Microsoft Authenticator app without initiating a sign-in request. You need to block the users automatically when...

July 12, 2021 No Comments READ MORE +

You have a Microsoft 365 tenant named contoso.com

HOTSPOT You have a Microsoft 365 tenant named contoso.com. Guest user access is enabled. Users are invited to collaborate with contoso.com as shown in the following table. From the External collaboration settings in the Azure Active Directory admin center, you configure the Collaboration restrictions settings as shown in the following...

July 12, 2021 No Comments READ MORE +

Which type of object should you create?

You need to locate licenses to the A. Datum users. The solution must need the technical requirements. Which type of object should you create? A. A Dynamo User security group B. An OU C. A distribution group D. An administrative unitView AnswerAnswer: A

July 12, 2021 No Comments READ MORE +

What should you do?

You need to configure the detection of multi staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic.B . Create a workbook.C . Add an Azure Sentinel playbook.D . Add Azure Sentinel data connectors.View AnswerAnswer: D

July 11, 2021 No Comments READ MORE +

Which objects can you add as members to Group3?

You have an Azure Active Directory (Azure AD) tenant that contains the objects shown in the following table. Which objects can you add as members to Group3?A . User2 and Group2 onlyB . User2, Group1, and Group2 onlyC . User1, User2, Group1 and Group2D . User1 and User2 onlyE ....

July 11, 2021 No Comments READ MORE +

What should the users do first, and what should you configure?

HOTSPOT You need to meet the technical requirements for the probability that user identifies were compromised. What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

July 11, 2021 No Comments READ MORE +