You modify the properties of the IT administrator user accounts. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this […]
Continue reading…

 

You create a separate access review for each role. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this […]
Continue reading…

 

You need to review access to the Exchange admin center at the end of each month and block sign-ins if required. What should you create?

You have a Microsoft 365 tenant. The Sign-ins activity report shows that an external contractor signed in to the Exchange admin center. You need to review access to the Exchange admin center at the end of each month and block sign-ins if required. What should you create? an access package that targets users outside your […]
Continue reading…

 

What should you configure for the Security administrator role assignment?

Your company recently implemented Azure Active Directory (Azure AD) Privileged Identity Management (PIM). While you review the roles in PIM, you discover that all 15 users in the IT department at the company have permanent security administrator rights. You need to ensure that the IT department users only have access to the Security administrator role […]
Continue reading…

 

You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains a user named User1. User1 has the devices shown in the following table.

HOTSPOT You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains a user named User1. User1 has the devices shown in the following table. On November 5, 2020, you create and enforce terms of use in contoso.com that has the following settings: – Name: Terms1 – Display name: Contoso terms of use […]
Continue reading…

 

You have an Azure Active Directory (Azure AD) tenant that contains Azure AD Privileged Identity Management (PIM) role settings for the User administrator role as shown in the following exhibit.

HOTSPOT You have an Azure Active Directory (Azure AD) tenant that contains Azure AD Privileged Identity Management (PIM) role settings for the User administrator role as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct […]
Continue reading…

 

For which groups can you create an access review?

You have an Azure Active Directory (Azure AD) tenant that contains the groups shown in the following table. For which groups can you create an access review? Group1 only Group1 and Group4 only Group1 and Group2 only Group1, Group2, Group4, and Group5 only Group1, Group2, Group3, Group4 and Group5 Explanation:  You cannot create access reviews […]
Continue reading…

 

You need to ensure that only users who accept the terms of use can access the resources in the tenant. Other users must be denied access. What should you configure?

You have a Microsoft 365 tenant. In Azure Active Directory (Azure AD), you configure the terms of use. You need to ensure that only users who accept the terms of use can access the resources in the tenant. Other users must be denied access. What should you configure? an access policy in Microsoft Cloud App […]
Continue reading…