What should you configure for each incident?

DRAG DROP You need to resolve the recent security incident issues. What should you configure for each incident? To answer, drag the appropriate policy types to the correct issues. Each policy type may be used once, more than once, or not at all. You may need to drag the split...

January 4, 2023 No Comments READ MORE +

Does this meet the goal?

You have a Microsoft 365 tenant. All users must use the Microsoft Authenticator app for multi-factor authentication (MFA) when accessing Microsoft 365 services. Some users report that they received an MFA prompt on their Microsoft Authenticator app without initiating a sign-in request. You need to block the users automatically when...

January 3, 2023 No Comments READ MORE +

Which role should you assign to each user?

DRAG DROP You have a Microsoft 365 E5 subscription that contains two users named User1 and User2. You need to ensure that User1 can create access reviews for groups, and that User2 can review the history report for all the completed access reviews. The solution must use the principle of...

January 3, 2023 No Comments READ MORE +

What should the users do first, and what should you configure?

HOTSPOT You need to meet the technical requirements for the probability that user identifies were compromised. What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

January 3, 2023 No Comments READ MORE +

What should you do?

You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains an Azure AD enterprise application named App1. A contractor uses the credentials of [email protected]. You need to ensure that you can provide the contractor with access to App1. The contractor must be able to authenticate as [email protected]....

January 2, 2023 No Comments READ MORE +

What should you do?

You need to configure the detection of multi-staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic. B. Create a workbook. C. Add Azure Sentinel data connectors. D. Add an Azure Sentinel playbook.View AnswerAnswer: A

January 2, 2023 No Comments READ MORE +

What should you do?

Your company has two divisions named Contoso East and Contoso West. The Microsoft 365 identity architecture tor both divisions is shown in the following exhibit. You need to assign users from the Contoso East division access to Microsoft SharePoint Online sites in the Contoso West tenant. The solution must not...

January 2, 2023 No Comments READ MORE +

What should you implement?

You need to meet the planned changes and technical requirements for App1. What should you implement?A . a policy set in Microsoft Endpoint Manager B. an app configuration policy in Microsoft Endpoint Manager C. an app registration in Azure AD D. Azure AD Application ProxyView AnswerAnswer: C Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app

January 1, 2023 No Comments READ MORE +

What should you implement?

You have a Microsoft 365 tenant. You currently allow email clients that use Basic authentication to conned to Microsoft Exchange Online. You need to ensure that users can connect t to Exchange only run email clients that use Modern authentication protocols. What should you implement? You need to ensure that...

January 1, 2023 No Comments READ MORE +

What should you do?

You need to sync the ADatum users. The solution must meet the technical requirements. What should you do?A . From the Microsoft Azure Active Directory Connect wizard, select Customize synchronization options. B. From PowerShell, run Set-ADSyncScheduler. C. From PowerShell, run Start-ADSyncSyncCycle. D. From the Microsoft Azure Active Directory Connect wizard,...

January 1, 2023 No Comments READ MORE +