What should you use?

You need to configure just in time access to meet the technical requirements.

What should you use?
A . access reviews
B. entitlement management
C. Azure Active Directory (Azure AD) Privileged Identity Management (PIM)
D. Azure Active Directory (Azure AD) Identity Protection

Answer: C

Explanation:

Reference: https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure

joergsi 5 months, 1 week ago

Privileged access management

The effectiveness of an information protection strategy depends on how secure the administrative accounts used to manage that strategy are. If accounts that can be used to configure and manage an information protection strategy are not properly secured, then the information protection strategy itself can be easily compromised.

Privileged access management enables you to configure policies that apply

=> just-in-time administrative principles to sensitive administrative roles.

For example, if someone needs temporary access to configure an information protection policy, that person would need to go through an approval process to obtain the necessary set of rights instead of having an Azure Active Directory (Azure AD) account with those rights permanently assigned.

Thomas, Orin. Exam Ref MS-100 Microsoft 365 Identity and Services (S.10). Pearson Education. Kindle-Version.

Latest MS-100 Dumps Valid Version with 297 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments