For how long does Azure AD store events in the sign-in log?

You have an Azure Active Directory (Azure AD) tenant. You need to review the Azure AD sign-ins log to investigate sign ins that occurred in the past. For how long does Azure AD store events in the sign-in log?A . 14 daysB . 30 daysC . 90 daysD . 365...

March 24, 2024 No Comments READ MORE +

What should you do?

You need to configure the detection of multi staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic.B . Create a workbook.C . Add an Azure Sentinel playbook.D . Add Azure Sentinel data connectors.View AnswerAnswer: D

March 24, 2024 No Comments READ MORE +

Which role should you assign to Admin1?

You have an Azure Active Directory (Azure AD) tenant. For the tenant. Users can register applications Is set to No. A user named Admin1 must deploy a new cloud app named App1. You need to ensure that Admin1 can register App1 in Azure AD. The solution must use the principle...

March 23, 2024 No Comments READ MORE +

Does this meet the goal?

You have a Microsoft 365 tenant. All users must use the Microsoft Authenticator app for multi-factor authentication (MFA) when accessing Microsoft 365 services. Some users report that they received an MFA prompt on their Microsoft Authenticator app without initiating a sign-in request. You need to block the users automatically when...

March 23, 2024 No Comments READ MORE +

You have an Azure Active Directory (Azure AD) tenant that has Security defaults disabled

HOTSPOT You have an Azure Active Directory (Azure AD) tenant that has Security defaults disabled. You are creating a conditional access policy as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE:...

March 23, 2024 No Comments READ MORE +

What should you do?

HOTSPOT You need to identify which roles to use for managing role assignments. The solution must meet the delegation requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/azure/role-based-access-control/role-assignments-portal https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference

March 23, 2024 No Comments READ MORE +

Does this meet the goal?

You use Azure Monitor to analyze Azure Active Directory (Azure AD) activity logs. Yon receive more than 100 email alerts each day for tailed Azure Al) user sign-in attempts. You need to ensure that a new security administrator receives the alerts instead of you. Solution: From Azure AD, you create...

March 22, 2024 No Comments READ MORE +

What should you configure?

You need to configure the MFA settings for users who connect from the Boston office. The solution must meet the authentication requirements and the access requirements. What should you configure?A . named locations that have a private IP address rangeB . named locations that have a public IP address rangeC...

March 22, 2024 No Comments READ MORE +

What should the users do first, and what should you configure?

HOTSPOT You need to meet the technical requirements for the probability that user identifies were compromised. What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

March 22, 2024 No Comments READ MORE +

What should you do?

Topic 1, Litware, Inc Overview Litware, Inc. is a pharmaceutical company that has a subsidiary named fabrikam, inc Litware has offices in Boston and Seattle, but has employees located across the United States. Employees connect remotely to either office by using a VPN connection. Identity Environment The network contains an...

March 22, 2024 No Comments READ MORE +