What should you do?
HOTSPOT You need to configure the assignment of Azure AD licenses to the Litware users. The solution must meet the licensing requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Litware recently added...
What should you do?
You need to meet the authentication requirements for leaked credentials. What should you do?A . Enable federation with PingFederate in Azure AD Connect.B . Configure Azure AD Password Protection.C . Enable password hash synchronization in Azure AD Connect.D . Configure an authentication method policy in Azure AView AnswerAnswer: C Explanation:...
You have an Azure Active Directory (Azure AD) tenant that has Security defaults disabled
HOTSPOT You have an Azure Active Directory (Azure AD) tenant that has Security defaults disabled. You are creating a conditional access policy as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE:...
What should you do?
You need to configure the detection of multi-staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic.B . Create a workbook.C . Add Azure Sentinel data connectors.D . Add an Azure Sentinel playbook.View AnswerAnswer: A
Which two parameters must you include when you create the bulk invite?
You have an Azure Active Directory (Azure AD) tenant named contoso.com. You plan to bulk invite Azure AD business-to-business (B2B) collaboration users. Which two parameters must you include when you create the bulk invite? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.A...
What should you do?
You need to configure the detection of multi staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic.B . Create a workbook.C . Add an Azure Sentinel playbook.D . Add Azure Sentinel data connectors.View AnswerAnswer: D
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should the users do first, and what should you configure?
HOTSPOT Y ou need to meet the technical require ments for the probability that user identifies were compromised. What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:
What should you do?
You need to meet the authentication requirements for leaked credentials. What should you do?A . Enable federation with PingFederate in Azure AD Connect.B . Configure Azure AD Password Protection.C . Enable password hash synchronization in Azure AD Connect.D . Configure an authentication method policy in Azure AView AnswerAnswer: C
What should you do?
Topic 2, Contoso, Ltd Overview Contoso, Ltd is a consulting company that has a main office in Montreal offices in London and Seattle. Contoso has a partnership with a company named Fabrikam, Inc Fabcricam has an Azure Active Diretory (Azure AD) tenant named fabrikam.com. Existing Environment The on-premises network of...