What should you implement?
You need to meet the planned changes and technical requirements for App1. What should you implement?A . a policy set in Microsoft Endpoint ManagerB . an app configuration policy in Microsoft Endpoint ManagerC . an app registration in Azure ADD . Azure AD Application ProxyView AnswerAnswer: C Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app
What should you do?
You need to configure the detection of multi-staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic.B . Create a workbook.C . Add Azure Sentinel data connectors.D . Add an Azure Sentinel playbook.View AnswerAnswer: A
What should you do?
HOTSPOT You need to implement on-premises application and SharePoint Online restrictions to meet the authentication requirements and the access requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:
What is a valid authentication method available to users?
You have an Azure Active Directory (Azure AD) tenant. You configure self-service password reset (SSPR) by using the following settings: • Require users to register when signing in: Yes • Number of methods required to reset: 1 What is a valid authentication method available to users?A . home prionsB ....
Does this meet the goal?
You have a Microsoft 365 tenant. All users must use the Microsoft Authenticator app for multi-factor authentication (MFA) when accessing Microsoft 365 services. Some users report that they received an MFA prompt on their Microsoft Authenticator app without initiating a sign-in request. You need to block the users automatically when...
You have a Microsoft 365 tenant named contoso.com
HOTSPOT You have a Microsoft 365 tenant named contoso.com. Guest user access is enabled. Users are invited to collaborate with contoso.com as shown in the following table. From the External collaboration settings in the Azure Active Directory admin center, you configure the Collaboration restrictions settings as shown in the following...
Which type of object should you create?
You need to locate licenses to the A. Datum users. The solution must need the technical requirements. Which type of object should you create? A. A Dynamo User security group B. An OU C. A distribution group D. An administrative unitView AnswerAnswer: A
What should you do?
You need to configure the detection of multi staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic.B . Create a workbook.C . Add an Azure Sentinel playbook.D . Add Azure Sentinel data connectors.View AnswerAnswer: D
Which objects can you add as members to Group3?
You have an Azure Active Directory (Azure AD) tenant that contains the objects shown in the following table. Which objects can you add as members to Group3?A . User2 and Group2 onlyB . User2, Group1, and Group2 onlyC . User1, User2, Group1 and Group2D . User1 and User2 onlyE ....
What should the users do first, and what should you configure?
HOTSPOT You need to meet the technical requirements for the probability that user identifies were compromised. What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: