Which users can create and manage the access review?

You need to implement the planned changes for Package!. Which users can create and manage the access review?A . User3 only B. User4 only C. User5 only D. User3 and User4 E. User3 and User5 F. User4and User5View AnswerAnswer: C

February 24, 2023 No Comments READ MORE +

Which resource provider permissions are required for each role?

HOTSPOT You have an Azure subscription. You need to create two custom roles named Role1 and Role2. The solution must meet the following requirements: • Users that are assigned Role1 can create or delete instances of Azure Container Apps. • Users that are assigned Role2 can enforce adaptive network hardening...

February 24, 2023 No Comments READ MORE +

Does this meet the goal?

You use Azure Monitor to analyze Azure Active Directory (Azure AD) activity logs. Yon receive more than 100 email alerts each day for tailed Azure Al) user sign-in attempts. You need to ensure that a new security administrator receives the alerts instead of you. Solution: From Azure AD, you create...

February 23, 2023 No Comments READ MORE +

What should you do next?

HOTSPOT You need to implement password restrictions to meet the authentication requirements. You install the Azure AD password Protection DC agent on DC1. What should you do next? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Server2 Azure...

February 23, 2023 No Comments READ MORE +

Does this meet the goal?

You have a Microsoft 365 tenant. All users must use the Microsoft Authenticator app for multi-factor authentication (MFA) when accessing Microsoft 365 services. Some users report that they received an MFA prompt on their Microsoft Authenticator app without initiating a sign-in request. You need to block the users automatically when...

February 23, 2023 No Comments READ MORE +

Which MFA authentication method can the users use from the remote location?

You have a Microsoft 365 tenant. All users have mobile phones and laptops. The users frequently work from remote locations that do not have Wi-Fi access or mobile phone connectivity. While working from the remote locations, the users connect their laptop to a wired network that has internetaccess. You plan...

February 23, 2023 No Comments READ MORE +

Which risk detection type is classified as a user risk?

You have an Azure Active Directory (Azure AD) tenant. You open the risk detections report. Which risk detection type is classified as a user risk?A . impossible travel B. anonymous IP address C. atypical travel D. leaked credentialsView AnswerAnswer: D Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-risks

February 23, 2023 No Comments READ MORE +

What should you do?

You need to configure the detection of multi-staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic. B. Create a workbook. C. Add Azure Sentinel data connectors. D. Add an Azure Sentinel playbook.View AnswerAnswer: A

February 22, 2023 No Comments READ MORE +

What occurs when User3 attempts to use SSPR?

CORRECT TEXT You implement the planned changes for SSPR. What occurs when User3 attempts to use SSPR? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

February 22, 2023 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

February 22, 2023 No Comments READ MORE +