web analytics

Solution: From the Azure Active Directory admin center, you create a trusted location and a conditional access policy. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Solution: From the Microsoft 365 admin center, you configure the Organization profile settings. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Solution: From the Device Management admin center, you a trusted location and compliance policy. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Solution: From the Security & Compliance admin center, you create a threat management policy. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Solution: From the SharePoint admin center, you modify the sharing settings. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

You need to be notified if the SharePoint policy is modified in the future. Solution: From the SharePoint site, you create an alert. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

You need to verify whether all the Authentication Agents are used for authentication. What should you do?

Your company has a hybrid deployment of Microsoft 365. Users authenticate by using pass-through authentication. Several Microsoft Azure AD Connect Authentication Agents are deployed. You need to verify whether all

You need to ensure that the company users can invite only authenticated guest users to the sites. What should you do?

You have a Microsoft Office 365 subscription that contains several Microsoft SharePoint Online sites. You discover that users from your company can invite external users to access files on the

What should you do?

Your company has a Microsoft 365 subscription and a Microsoft Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com. An external vendor has a Microsoft account that has a username of

You need to reduce the number of times the users are prompted for multi-factor authentication on their company-owned devices. What should you do?

Your company has a Microsoft 365 subscription that has multi-factor authentication configured for all users. Users on the network report that they are prompted for multi-factor authentication multiple times a

Which authentication strategy should you identify?

Your network contains an Active Directory domain named contoso.com. The domain contains five domain controllers. You purchase Microsoft 365 and plan to implement several Microsoft 365 services. You need to

Which two requirements are met by using federation? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Your network contains an Active Directory domain named contoso.com. All users authenticate by using a third-party authentication solution. You purchase Microsoft 365 and plan to implement several Microsoft 365 services.

You need to recommend a Microsoft 365 solution to ensure that multi-factor authentication is enforced only for users in the branch office. What should you include in the recommendation?

Your company has three main offices and one branch office. The branch office is used for research. The company plans to implement a Microsoft 365 tenant and to deploy multi-factor

Solution: Implement password hash synchronization and modify the password settings from the Default Domain Policy in Active Directory. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Solution: Implement pass-through authentication and configure password protection in the Azure AD tenant. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Solution: Implement password hash synchronization and configure password protection in the Azure AD tenant. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

You have a Microsoft 365 subscription. Your company deploys an Active Directory Federation Services (AD FS) solution. You need to configure the environment to audit AD FS user authentication. Which

Which three actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Your network contains an on-premises Active Directory domain named contoso.local. The domain contains five domain controllers. Your company purchases Microsoft 365 and creates a Microsoft Azure Active Directory (Azure AD)

You need to enforce multi-factor authentication on all cloud-based applications for the users in the finance department. What should you do?

You have a Microsoft 365 Enterprise E5 subscription. You need to enforce multi-factor authentication on all cloud-based applications for the users in the finance department. What should you do? A.

You need to view which users authenticated by using multi-factor authentication. What should you do?

You have a Microsoft 365 Enterprise subscription. You have a conditional access policy to force multi-factor authentication when accessing Microsoft SharePoint from a mobile device. You need to view which

You need to generate a report that lists all the users who completed the Azure MFA registration process. What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.

Your company recently purchased a Microsoft 365 subscription. You enable Microsoft Azure Multi-Factor Authentication (MFA) for all 500 users in the Azure Active Directory (Azure AD) tenant. You need to

Which role should you assign to User1?

Which role should you assign to User1? A. Security Administrator B. Records Management C. Security Reader D. Hygiene Management Answer: C

To which Azure AD role should you add User4 to meet the security requirement?

To which Azure AD role should you add User4 to meet the security requirement? A. Password administrator B. Global administrator C. Security administrator D. Privileged role administrator Answer: B

You need to assign User2 the required roles to meet the security requirements. Solution: From the Office 365 admin center, you assign User2 the Records Management role. From the Exchange admin center, you assign User2 the Help Desk role. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Solution: From the Office 365 admin center, you assign User2 the Security Reader role. From the Exchange admin center, you assign User2 the Help Desk role. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Solution: From the Office 365 admin center, you assign User2 the Security Administrator role. From the Exchange admin center, you add User2 to the View-Only Organization Management role. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Which configuration prevents the users from signing in?

A user receives the following message when attempting to sign in to https://myapps.microsoft.com: “Your sign-in was blocked. We’ve detected something unusual about this sign-in. For example, you might be signing

What should you do from the Security & Compliance admin center?

Your company has a Microsoft 365 E5 subscription. Users in the research department work with sensitive data. You need to prevent the research department users from accessing potentially unsafe websites

You need to ensure that User1 can publish retention labels from the Security & Compliance admin center. The solution must use the principle of least privilege. To which role group should you add User1?

You have a Microsoft 365 subscription that contains a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com. In the tenant, you create a user named User1. You need to

You need to ensure that User1 can place a hold on all mailbox content. What permission should you assign to User1?

You have a Microsoft 365 subscription. You have a user named User1. You need to ensure that User1 can place a hold on all mailbox content. What permission should you

What should you use?

Your company has a Microsoft 365 subscription. You need to identify which users performed the following privileged administration tasks: Deleted a folder from the second-stage Recycle Bin if Microsoft SharePoint

You need to ensure that only the members of a group named PilotUsers can protect content. What should you do?

You have a Microsoft 365 subscription. You plan to enable Microsoft Azure Information Protection. You need to ensure that only the members of a group named PilotUsers can protect content.

To which three roles should you add Admin1? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Your company has a Microsoft Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com that contains a user named User1. You suspect that an imposter is signing in to Azure AD

You need to recommend a solution for the planned directory synchronization. What should you include in the recommendation?

Your network contains a single Active Directory domain and two Microsoft Azure Active Directory (Azure AD) tenants. You plan to implement directory synchronization for both Azure AD tenants. Each tenant

Which two actions should you perform before you run the Azure AD Connect wizard? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Your network contains an Active Directory forest. The forest contains two domains named contoso.com and adatum.com. Your company recently purchased a Microsoft 365 subscription. You deploy a federated identity solution

You need to identify which user accounts failed to sync. You must resolve the issue as quickly as possible. What should you do?

Your company has 10,000 users who access all applications from an on-premises data center. You plan to create a Microsoft 365 subscription and to migrate data to the cloud. You

You need to recommend a synchronization solution. The solution must ensure that the synchronization can complete successfully and as quickly as possible if a single server fails. What should you include in the recommendation?

Your network contains three Active Directory forests. You create a Microsoft Azure Active Directory (Azure AD) tenant. You plan to sync the on-premises Active Directory to Azure AD. You need

You need to modify the value of the city attribute to the three-letter airport code of each city. What should you do?

Your network contains an Active Directory domain named adatum.com that is synced to Microsoft Azure Active Directory (Azure AD). The domain contains 100 user accounts. The city attribute for all

Which authentication strategy should you recommend?

Your network contains an on-premises Active Directory forest. You are evaluating the implementation of Microsoft 365 and the deployment of an authentication strategy. You need to recommend an authentication strategy

You need to prepare the environment for the planned directory synchronization solution. What should you do first?

Your network contains an Active Directory forest named contoso.local. You have a Microsoft 365 subscription. You plan to implement a directory synchronization solution that will use password hash synchronization. From

You need to recommend which DNS record must be created before you begin the project. Which DNS record should you recommend?

You are evaluating the required processes for Project1. You need to recommend which DNS record must be created before you begin the project. Which DNS record should you recommend? A.

You need to add the custom domain names to Office 365 to support the planned changes as quickly as possible. What should you create to verify the domain names successfully?

You need to add the custom domain names to Office 365 to support the planned changes as quickly as possible. What should you create to verify the domain names successfully?

Which devices can be managed by using co-management?

You use Microsoft System Center Configuration manager (Current Branch) to manage devices. Your company uses the following types of devices: Windows 10 Windows 8.1 Android iOS Which devices can be

You need to recommend a Windows 10 deployment method. What should you recommend?

Your network contains an Active Directory domain named contoso.com. The domain contains 1000 Windows 8.1 devices. You plan to deploy a custom Windows 10 Enterprise image to the Windows 8.1

You need to change the edition of Windows 10 to Enterprise the next time users sign in to their computer. The solution must minimize downtime for the users. What should you use?

Your company has a Microsoft 365 E3 subscription. All devices run Windows 10 Pro and are joined to Microsoft Azure Active Directory (Azure AD). You need to change the edition

You plan to onboard all the devices to Windows Defender ATP data in Europe. What should you do first?

Your network contains an on-premises Active Directory domain named contoso.com. The domain contains 1,000 Windows 10 devices. You perform a proof of concept (PoC) deployment of Windows Defender Advanced Threat

You need to monitor a domain controller by using Microsoft Azure Advanced Threat Protection (ATP). What should you do? More than once choice may achieve the goal. Select the BEST answer.

Your network contains an on-premises Active Directory domain. Your company has a security policy that prevents additional software from being installed on domain controllers. You need to monitor a domain

You need to be alerted by email if impossible travel is detected for a user of App1. The solution must ensure that alerts are generated for App1 only. What should you do?

You have a Microsoft 365 tenant. You have a line-of-business application named App1 that users access by using the My Apps portal. After some recent security breaches, you implement a

You need to ensure that an alert is generated only when malware is detected in more than five documents stored in SharePoint Online during a period of 10 minutes. What should you do first?

You have a Microsoft 365 subscription. You recently configured a Microsoft SharePoint Online tenant in the subscription. You plan to create an alert policy. You need to ensure that an