What should you do?

Your company has two divisions named Contoso East and Contoso West. The Microsoft 365 identity architecture tor both divisions is shown in the following exhibit. You need to assign users from the Contoso East division access to Microsoft SharePoint Online sites in the Contoso West tenant. The solution must not...

May 8, 2025 No Comments READ MORE +

Which type of object should you create?

You need to allocate licenses to the new users from A. Datum. The solution must meet the technical requirements. Which type of object should you create? A. a distribution group B. a Dynamic User security group C. an administrative unit D. an OUView AnswerAnswer: C

May 7, 2025 No Comments READ MORE +

What should you create first, and which tool should you use?

Topic 2, Contoso, Ltd Overview Contoso, Ltd is a consulting company that has a main office in Montreal offices in London and Seattle. Contoso has a partnership with a company named Fabrikam, Inc Fabcricam has an Azure Active Diretory (Azure AD) tenant named fabrikam.com. Existing Environment The on-premises network of...

May 6, 2025 No Comments READ MORE +

What should you do?

You need to configure the detection of multi-staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic.B . Create a workbook.C . Add Azure Sentinel data connectors.D . Add an Azure Sentinel playbook.View AnswerAnswer: A

May 6, 2025 No Comments READ MORE +

What is a valid authentication method available to users?

You have an Azure Active Directory (Azure AD) tenant. You configure self-service password reset (SSPR) by using the following settings: • Require users to register when signing in: Yes • Number of methods required to reset: 1 What is a valid authentication method available to users?A . home prionsB ....

May 5, 2025 No Comments READ MORE +

What should you use to gather the information?

You have a Microsoft 365 tenant. The Azure Active Directory (Azure AD) tenant syncs to an on-premises Active Directory domain. Users connect to the internet by using a hardware firewall at your company. The users authenticate to the firewall by using their Active Directory credentials. You plan to manage access...

May 5, 2025 No Comments READ MORE +

Which type of object should you create?

You need to locate licenses to the A. Datum users. The solution must need the technical requirements. Which type of object should you create? A. A Dynamo User security group B. An OU C. A distribution group D. An administrative unitView AnswerAnswer: D

May 5, 2025 No Comments READ MORE +

Which four actions should you perform in sequence?

DRAG DROP You have a Microsoft 365 E5 tenant. You purchase a cloud app named App1. You need to enable real-time session-level monitoring of App1 by using Microsoft Cloud app Security. Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions...

May 2, 2025 No Comments READ MORE +

What should you configure?

You have a Microsoft 365 tenant. In Azure Active Directory (Azure AD), you configure the terms of use. You need to ensure that only users who accept the terms of use can access the resources in the tenant. Other users must be denied access. What should you configure?A . an...

May 2, 2025 No Comments READ MORE +

What should you do?

HOTSPOT You have a Microsoft 365 tenant. Sometimes, users use external, third-party applications that require limited access to the Microsoft 365 data of the respective user. The users register the applications in Azure Active Directory (Azure AD). You need to receive an alert if a registered application gains read and...

May 1, 2025 No Comments READ MORE +