What should you do?

HOTSPOT You have a Microsoft 365 tenant. Sometimes, users use external, third-party applications that require limited access to the Microsoft 365 data of the respective user. The users register the applications in Azure Active Directory (Azure AD). You need to receive an alert if a registered application gains read and...

May 1, 2025 No Comments READ MORE +

What should you include in the solution?

Your company has a Microsoft 365 tenant. The company has a call center that contains 300 users. In the call center, the users share desktop computers and might use a different computer every day. The call center computers are NOT configured for biometric identification. The users are prohibited from having...

April 28, 2025 No Comments READ MORE +

On which server should you install an additional pass-through authentication agent?

You have an Azure Active Directory (Azure AD) tenant that syncs to an Active Directory forest. The tenant-uses through authentication. A corporate security policy states the following: ✑ Domain controllers must never communicate directly to the internet. ✑ Only required software must be- installed on servers. The Active Directory domain...

April 28, 2025 No Comments READ MORE +

You have an Azure Active Directory (Azure AD) tenant that contains an administrative unit named Department1

HOTSPOT You have an Azure Active Directory (Azure AD) tenant that contains an administrative unit named Department1. Department1 has the users shown in the Users exhibit. (Click the Users tab.) Department1 has the groups shown in the Groups exhibit. (Click the Groups tab.) Department1 has the user administrator assignments shown...

April 28, 2025 No Comments READ MORE +

What should the users do first, and what should you configure?

HOTSPOT You need to meet the technical requirements for the probability that user identifies were compromised. What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

April 21, 2025 No Comments READ MORE +

You have a custom cloud app named App1 that is registered in Azure Active Directory (Azure AD)

HOTSPOT You have a custom cloud app named App1 that is registered in Azure Active Directory (Azure AD). App1 is configured as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each...

April 20, 2025 No Comments READ MORE +

You have a Microsoft 365 tenant named contoso.com

HOTSPOT You have a Microsoft 365 tenant named contoso.com. Guest user access is enabled. Users are invited to collaborate with contoso.com as shown in the following table. From the External collaboration settings in the Azure Active Directory admin center, you configure the Collaboration restrictions settings as shown in the following...

April 18, 2025 No Comments READ MORE +

What should you include in the recommendation?

You have an Azure Active Directory (Azure AD) tenant that syncs to an Active Directory domain. The on-premises network contains a VPN server that authenticates to the on-premises Active Directory domain. The VPN server does NOT support Azure Multi-Factor Authentication (MFA). You need to recommend a solution to provide Azure...

April 17, 2025 No Comments READ MORE +

What should you include in the conditional access policies to filter out legacy authentication attempts?

You have an Azure Active Directory (Azure AD) tenant named contoso.com. All users who run applications registered in Azure AD are subject to conditional access policies. You need to prevent the users from using legacy authentication. What should you include in the conditional access policies to filter out legacy authentication...

April 17, 2025 No Comments READ MORE +

What should you do?

Topic 1, Litware, Inc Overview Litware, Inc. is a pharmaceutical company that has a subsidiary named fabrikam, inc Litware has offices in Boston and Seattle, but has employees located across the United States. Employees connect remotely to either office by using a VPN connection. Identity Environment The network contains an...

April 16, 2025 No Comments READ MORE +