Which three actions should you perform in sequence?

Testlet 2

This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.

To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study.

At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section.

To start the case study

To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. If the case study has an All Information tab, note that the information displayed is identical to the information displayed on the subsequent tabs. When you are ready to answer a question, click the Question button to return to the question.

Overview

Litware, Inc. is a financial company that has 1,000 users in its main office in Chicago and 100 users in a branch office in San Francisco.

Existing Environment

Internal Network Infrastructure

The network contains a single domain forest. The forest functional level is Windows Server 2016.

Users are subject to sign-in hour restrictions as defined in Active Directory.

The network has the IP address ranges shown in the following table.

The offices connect by using Multiprotocol Label Switching (MPLS).

The following operating systems are used on the network:

– Windows Server 2016

– Windows 10 Enterprise

– Windows 8.1 Enterprise

The internal network contains the systems shown in the following table.

Litware uses a third-party email system.

Cloud Infrastructure

Litware recently purchased Microsoft 365 subscription licenses for all users.

Microsoft Azure Active Directory (Azure AD) Connect is installed and uses the default authentication settings. User accounts are not yet synced to Azure AD.

You have the Microsoft 365 users and groups shown in the following table.

Requirements

Planned Changes

Litware plans to implement the following changes:

– Migrate the email system to Microsoft Exchange Online

– Implement Azure AD Privileged Identity Management

Security Requirements

Litware identifies the following security requirements:

– Create a group named Group2 that will include all the Azure AD user accounts. Group2 will be used to provide limited access to Windows Analytics

– Create a group named Group3 that will be used to apply Azure Information Protection policies to pilot users. Group3 must only contain user accounts

– Use Azure Advanced Threat Protection (ATP) to detect any security threats that target the forest

– Prevent users locked out of Active Directory from signing in to Azure AD and Active Directory

– Implement a permanent eligible assignment of the Compliance administrator role for User1

– Configure domain-joined servers to ensure that they report sensor data to Microsoft Defender ATP

– Prevent access to Azure resources for the guest user accounts by default

– Ensure that all domain-joined computers are registered to Azure AD

Multi-factor authentication (MFA) Requirements

Security features of Microsoft Office 365 and Azure will be tested by using pilot Azure user accounts.

You identify the following requirements for testing MFA:

– Pilot users must use MFA unless they are signing in from the internal network of the Chicago office. MFA must NOT be used on the Chicago office internal network.

– If an authentication attempt is suspicious, MFA must be used, regardless of the user location.

– Any disruption of legitimate authentication attempts must be minimized.

General Requirements

Litware wants to minimize the deployment of additional servers and services in the Active Directory forest.

DRAG DROP

You need to configure threat detection for Active Directory. The solution must meet the security requirements.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Answer:

Latest MS-500 Dumps Valid Version with 193 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments