What should you do?

HOTSPOT You need to configure the assignment of Azure AD licenses to the Litware users. The solution must meet the licensing requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Litware recently added...

May 11, 2021 No Comments READ MORE +

What should you do?

You need to meet the authentication requirements for leaked credentials. What should you do?A . Enable federation with PingFederate in Azure AD Connect.B . Configure Azure AD Password Protection.C . Enable password hash synchronization in Azure AD Connect.D . Configure an authentication method policy in Azure AView AnswerAnswer: C Explanation:...

May 10, 2021 No Comments READ MORE +

You have an Azure Active Directory (Azure AD) tenant that has Security defaults disabled

HOTSPOT You have an Azure Active Directory (Azure AD) tenant that has Security defaults disabled. You are creating a conditional access policy as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE:...

May 10, 2021 No Comments READ MORE +

What should you do?

You need to configure the detection of multi-staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic.B . Create a workbook.C . Add Azure Sentinel data connectors.D . Add an Azure Sentinel playbook.View AnswerAnswer: A

May 9, 2021 No Comments READ MORE +

Which two parameters must you include when you create the bulk invite?

You have an Azure Active Directory (Azure AD) tenant named contoso.com. You plan to bulk invite Azure AD business-to-business (B2B) collaboration users. Which two parameters must you include when you create the bulk invite? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.A...

May 9, 2021 No Comments READ MORE +

What should you do?

You need to configure the detection of multi staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic.B . Create a workbook.C . Add an Azure Sentinel playbook.D . Add Azure Sentinel data connectors.View AnswerAnswer: D

May 9, 2021 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

May 8, 2021 No Comments READ MORE +

What should the users do first, and what should you configure?

HOTSPOT Y ou need to meet the technical require ments for the probability that user identifies were compromised. What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

May 7, 2021 No Comments READ MORE +

What should you do?

You need to meet the authentication requirements for leaked credentials. What should you do?A . Enable federation with PingFederate in Azure AD Connect.B . Configure Azure AD Password Protection.C . Enable password hash synchronization in Azure AD Connect.D . Configure an authentication method policy in Azure AView AnswerAnswer: C

March 17, 2021 No Comments READ MORE +

What should you do?

Topic 2, Contoso, Ltd Overview Contoso, Ltd is a consulting company that has a main office in Montreal offices in London and Seattle. Contoso has a partnership with a company named Fabrikam, Inc Fabcricam has an Azure Active Diretory (Azure AD) tenant named fabrikam.com. Existing Environment The on-premises network of...

March 17, 2021 No Comments READ MORE +