What should the users do first, and what should you configure?

HOTSPOT You need to meet the technical requirements for the probability that user identities were compromised. What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-policies

May 20, 2025 No Comments READ MORE +

You create a group named Group1. You add User2 and User3 to Group1

HOTSPOT You have an Azure Active Directory (Azure AD) tenant that contains three users named User1, User1, and User3, You create a group named Group1. You add User2 and User3 to Group1. You configure a role in Azure AD Privileged identity Management (PIM) as shown in the application administrator exhibit....

May 18, 2025 No Comments READ MORE +

What should you do?

HOTSPOT Your company has an Azure Active Directory (Azure AD) tenant named contoso.com. The company has a business partner named Fabrikam, Inc. Fabrikam uses Azure AD and has two verified domain names of fabrikam.com and litwareinc.com. Both domain names are used for Fabrikam email addresses. You plan to create an...

May 17, 2025 No Comments READ MORE +

Which users will be emailed a passcode?

You have a Microsoft 365 tenant that uses the domain named fabrikam.com. The Guest invite settings for Azure Active Directory (Azure AD) are configured as shown in the exhibit. (Click the Exhibit tab.) A user named [email protected] shares a Microsoft SharePoint Online document library to the users shown in the...

May 16, 2025 No Comments READ MORE +

Does this meet the goal?

You use Azure Monitor to analyze Azure Active Directory (Azure AD) activity logs. Yon receive more than 100 email alerts each day for tailed Azure Al) user sign-in attempts. You need to ensure that a new security administrator receives the alerts instead of you. Solution: From Azure monitor, you create...

May 16, 2025 No Comments READ MORE +

What should you use?

HOTSPOT You have a Microsoft 365 tenant. You need to identify users who have leaked credentials. The solution must meet the following requirements. • Identity sign-Ins by users who ate suspected of having leaked credentials. • Rag the sign-ins as a high risk event. • Immediately enforce a control to...

May 15, 2025 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

May 15, 2025 No Comments READ MORE +

What should you do?

HOTSPOT You need to implement on-premises application and SharePoint Online restrictions to meet the authentication requirements and the access requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

May 15, 2025 No Comments READ MORE +

What should you do first?

You have a Microsoft 365 tenant. You need to ensure that you tan view Azure Active Directory (Azure AD) audit log information by using Azure Monitor. What should you do first?A . Run the Get-AzureADAuditDirectoryLogs cmdlet.B . Create an Azure AD workbook.C . Run the Set-AzureADTenantDetail cmdlet.D . Modify the...

May 14, 2025 No Comments READ MORE +

What should you do?

HOTSPOT You need to identify which roles to use for managing role assignments. The solution must meet the delegation requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/azure/role-based-access-control/role-assignments-portal https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference

May 10, 2025 No Comments READ MORE +