What should you implement?

You have a Microsoft 365 tenant. You currently allow email clients that use Basic authentication to conned to Microsoft Exchange Online. You need to ensure that users can connect t to Exchange only run email clients that use Modern authentication protocols. What should you implement? You need to ensure that...

February 15, 2023 No Comments READ MORE +

What should you do?

You need to sync the ADatum users. The solution must meet the technical requirements. What should you do?A . From the Microsoft Azure Active Directory Connect wizard, select Customize synchronization options. B. From PowerShell, run Set-ADSyncScheduler. C. From PowerShell, run Start-ADSyncSyncCycle. D. From the Microsoft Azure Active Directory Connect wizard,...

February 15, 2023 No Comments READ MORE +

Which role should you assign to each user?

DRAG DROP You have a Microsoft 365 E5 subscription that contains two users named User1 and User2. You need to ensure that User1 can create access reviews for groups, and that User2 can review the history report for all the completed access reviews. The solution must use the principle of...

February 15, 2023 No Comments READ MORE +

You have an Azure Active Directory (Azure AD) tenant that has an Azure Active Directory Premium Plan 2 license

HOTSPOT You have an Azure Active Directory (Azure AD) tenant that has an Azure Active Directory Premium Plan 2 license. The tenant contains the users shown in the following table. You have the Device Settings shown in the following exhibit. User1 has the devices shown in the following table. For...

February 14, 2023 No Comments READ MORE +

• How many days after the account of User1 is deleted can you restore the account?

HOTSPOT You have an Azure Active Directory (Azure AD) tenant that contains a user named User1. An administrator deletes User1. You need to identity the following: • How many days after the account of User1 is deleted can you restore the account? • Which is the least privileged role that...

February 14, 2023 No Comments READ MORE +

What should you do?

You need to configure the detection of multi staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic. B. Create a workbook. C. Add an Azure Sentinel playbook. D. Add Azure Sentinel data connectors.View AnswerAnswer: D

February 14, 2023 No Comments READ MORE +

Which two actions should you perform for the role?

You need to modify the settings of the User administrator role to meet the technical requirements. Which two actions should you perform for the role? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.A . Select Require justification on activation B. Set all...

February 14, 2023 No Comments READ MORE +

What occurs when User3 attempts to use SSPR?

CORRECT TEXT You implement the planned changes for SSPR. What occurs when User3 attempts to use SSPR? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

February 13, 2023 No Comments READ MORE +

What should you do?

Topic 2, Contoso, Ltd Overview Contoso, Ltd is a consulting company that has a main office in Montreal offices in London and Seattle. Contoso has a partnership with a company named Fabrikam, Inc Fabcricam has an Azure Active Diretory (Azure AD) tenant named fabrikam.com. Existing Environment The on-premises network of...

February 13, 2023 No Comments READ MORE +

What should you configure in Azure AD?

You create a Log Analytics workspace. You need to implement the technical requirements for auditing. What should you configure in Azure AD?A . Company branding B. Diagnostics settings C. External Identities D. App registrationsView AnswerAnswer: B Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/overview-monitoring

February 13, 2023 No Comments READ MORE +