New Year Goodies - 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: av5rz84q

Exact2Pass Menu

Question # 4

You need to track application access assignments by using Identity Governance. The solution must meet the delegation requirements.

What should you do first?

A.

Modify the User consent settings for the enterprise applications.

B.

Create a catalog.

C.

Create a program.

D.

Modify the Admin consent requests settings for the enterprise applications.

Full Access
Question # 5

You need to implement on-premises application and SharePoint Online restrictions to meet the authentication requirements and the access requirements.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 6

You need to configure the detection of multi-staged attacks to meet the monitoring requirements.

What should you do?

A.

Customize the Azure Sentinel rule logic.

B.

Create a workbook.

C.

Add Azure Sentinel data connectors.

D.

Add an Azure Sentinel playbook.

Full Access
Question # 7

You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following table.

You plan to implement Azure AD Identity Protection.

Which users can configure the user risk policy, and which users can view the risky users report? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 8

You have a Microsoft 365 tenant.

You currently allow email clients that use Basic authentication to conned to Microsoft Exchange Online.

You need to ensure that users can connect t to Exchange only run email clients that use Modern authentication protocols.

What should you implement?

You need to ensure that use Modern authentication

A.

a compliance policy in Microsoft Endpoint Manager

B.

a conditional access policy in Azure Active Directory (Azure AD)

C.

an application control profile in Microsoft Endpoint Manager

D.

an OAuth policy in Microsoft Cloud App Security

Full Access
Question # 9

NO: 5 HOTSPOT

You have an Azure Active Directory (Azure AD) tenant that contains Azure AD Privileged Identity Management (PIM) role settings for the User administrator role as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

Full Access
Question # 10

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant.

You have 100 IT administrators who are organized into 10 departments.

You create the access review shown in the exhibit. (Click the Exhibit tab.)

You discover that all access review requests are received by Megan Bowen.

You need to ensure that the manager of each department receives the access reviews of their respective department.

Solution: You add each manager as a fallback reviewer.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 11

You configure Azure Active Directory (Azure AD) Password Protection as shown in the exhibit. (Click the Exhibit tab.)

You are evaluating the following passwords:

  • Pr0jectlitw@re
  • T@ilw1nd
  • C0nt0s0

Which passwords will be blocked?

A.

Pr0jectlitw@re and T@ilw1nd only

B.

C0nt0s0 only

C.

C0nt0s0, Pr0jectlitw@re, and T@ilw1nd

D.

C0nt0s0 and T@ilw1nd only

E.

C0nt0s0 and Pr0jectlitw@re only

Full Access
Question # 12

You have an Azure Active Directory (Azure Azure) tenant that contains the objects shown in the following table.

• A device named Device1

• Users named User1, User2, User3, User4, and User5

• Five groups named Group1, Group2, Group3, Ciroup4, and Group5

The groups are configured as shown in the following table.

How many licenses are used if you assign the Microsoft Office 365 Enterprise E5 license to Group1?

A.

0

B.

2

C.

3

D.

4

Full Access
Question # 13

You need to meet the planned changes for the User administrator role.

What should you do?

A.

Create an access review.

B.

Modify Role settings

C.

Create an administrator unit.

D.

Modify Active Assignments.

Full Access
Question # 14

You need to meet the technical requirements for the probability that user identifies were compromised.

What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 15

You need to meet the planned changes and technical requirements for App1.

What should you implement?

A.

a policy set in Microsoft Endpoint Manager

B.

an app configuration policy in Microsoft Endpoint Manager

C.

an app registration in Azure AD

D.

Azure AD Application Proxy

Full Access
Question # 16

You create a Log Analytics workspace.

You need to implement the technical requirements for auditing.

What should you configure in Azure AD?

A.

Company branding

B.

Diagnostics settings

C.

External Identities

D.

App registrations

Full Access
Question # 17

You need to meet the technical requirements for the probability that user identities were compromised.

What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access