What should you do?

HOTSPOT You have a Microsoft 365 tenant. Sometimes, users use external, third-party applications that require limited access to the Microsoft 365 data of the respective user. The users register the applications in Azure Active Directory (Azure AD). You need to receive an alert if a registered application gains read and write access to the...

Continue reading

What should you use?

Topic 3, Misc. Questions HOTSPOT You have a Microsoft 365 tenant. You need to identify users who have leaked credentials. The solution must meet the following requirements. • Identity sign-Ins by users who ate suspected of having leaked credentials. • Rag the sign-ins as a high risk event. • Immediately enforce a control to...

Continue reading

What should you do?

You need to meet the authentication requirements for leaked credentials. What should you do?A . Enable federation with PingFederate in Azure AD Connect.B . Configure Azure AD Password Protection.C . Enable password hash synchronization in Azure AD Connect.D . Configure an authentication method policy in Azure A View Answer Answer: C Explanation: Reference: https://docs.microsoft.com/en-us/azure/security/fundamentals/steps-secure-identity...

What should you implement?

You need to meet the planned changes and technical requirements for App1. What should you implement?A . a policy set in Microsoft Endpoint ManagerB . an app configuration policy in Microsoft Endpoint ManagerC . an app registration in Azure ADD . Azure AD Application Proxy View Answer Answer: C Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app...

What should you do?

You need to configure the detection of multi-staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic.B . Create a workbook.C . Add Azure Sentinel data connectors.D . Add an Azure Sentinel playbook. View Answer Answer: A...

What should you do?

HOTSPOT You need to implement on-premises application and SharePoint Online restrictions to meet the authentication requirements and the access requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View Answer Answer:...