You have a Microsoft 365 tenant.
You have a Microsoft 365 tenant. All users have mobile phones and laptops. The users frequently work from remote locations that do not have Wi-Fi access or mobile phone connectivity. While working from the remote locations, the users connect their laptop to a wired network that has internet access. You plan to implement multi-factor authentication […]
You have an Azure Active Directory (Azure AD) tenant that contains a user named SecAdmin1.
You have an Azure Active Directory (Azure AD) tenant that contains a user named SecAdmin1. SecAdmin1 is assigned the Security administrator role. SecAdmin1 reports that she cannot reset passwords from the Azure AD Identity Protection portal. You need to ensure that SecAdmin1 can manage passwords and invalidate sessions on behalf of non-administrative users. The solution […]
You have an Azure Active Directory (Azure AD) tenant that contains the objects shown in the following table.
You have an Azure Active Directory (Azure AD) tenant that contains the objects shown in the following table. Which objects can you add as members to Group3? A. User2 and Group2 only B. User2, Group1, and Group2 only C. User1, User2, Group1 and Group2 D. User1 and User2 only E. User2 only Reference: https://bitsizedbytes.wordpress.com/2018/12/10/distribution-security-and-office-365-groups-nesting/
You have an Azure Active Directory (Azure AD) tenant named contoso.com.
You have an Azure Active Directory (Azure AD) tenant named contoso.com. You plan to bulk invite Azure AD business-to-business (B2B) collaboration users. Which two parameters must you include when you create the bulk invite? Each correct answer presents part of the solution NOTE: Each correct selection is worth one point. A. email address B. redirection […]
You have 2,500 users who are assigned Microsoft Office 365 Enterprise E3 licenses.
You have 2,500 users who are assigned Microsoft Office 365 Enterprise E3 licenses. The licenses are assigned to individual users. From the Groups blade in the Azure Active Directory admin center, you assign Microsoft 365 Enterprise E5 licenses to the users. You need to remove the Office 365 Enterprise E3 licenses from the users by […]
You have a Microsoft Exchange organization that uses an SMTP address space of contoso.com.
You have a Microsoft Exchange organization that uses an SMTP address space of contoso.com. Several users use their contoso.com email address for self-service sign-up to Azure Active Directory (Azure AD). You gain global administrator privileges to the Azure AD tenant that contains the self-signed users. You need to prevent the users from creating user accounts […]
You have an Azure Active Directory (Azure AD) tenant that contains the following objects:
You have an Azure Active Directory (Azure AD) tenant that contains the following objects: A device named Device1 Users named User1, User2, User3, User4, and User5 Groups named Group1, Group2, Group3, Group4, and Group5 The groups are configured as shown in the following table. To which groups can you assign a Microsoft Office 365 Enterprise […]
Your network contains an on-premises Active Directory domain that syncs to an Azure Active Directory (Azure AD
Your network contains an on-premises Active Directory domain that syncs to an Azure Active Directory (Azure AD) tenant. Users sign in to computers that run Windows 10 and are joined to the domain. You plan to implement Azure AD Seamless Single Sign-On (Azure AD Seamless SSO). You need to configure the computers for Azure AD […]
You create an Azure subscription named sub1.
You create an Azure subscription named sub1. In sub1, you create a Log Analytics workspace named workspace1. You enable Azure Security Center and configure Security Center to use workspace1. You need to ensure that Security Center processes events from the Azure virtual machines that report to workspace1. What should you do? A. In workspace1, install […]
You provision a Linux virtual machine in a new Azure subscription.
You provision a Linux virtual machine in a new Azure subscription. You enable Azure Defender and onboard the virtual machine to Azure Defender. You need to verify that an attack on the virtual machine triggers an alert in Azure Defender. Which two Bash commands should you run on the virtual machine? Each correct answer presents […]