- (Exam Topic 4)
You have a Microsoft 365 Tenant.
A conditional access policy is configured for the tenant as shown in the Policy exhibit. (Click the Policy tab.)
The User Administrator role a configured as shown in the Hole setting exhibit (Click the Role setting tab.)
The User Administrator role has the assignments shown in the Assignments exhibit (Click the Assignments tab.)
For each of the following statements, select yes If the statement is true. Otherwise select No. NOTE Each correct selection is worth one point.
Solution:
Does this meet the goal?
Correct Answer:
A
- (Exam Topic 4)
You have a Microsoft 365 Enterprise E5 subscription.
You use Windows Defender Advanced Threat Protection (Windows Defender ATP).
You need to integrate Microsoft Office 365 Threat Intelligence and Windows Defender ATP. Where should you configure the integration?
Correct Answer:
B
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/integrate-office-365-ti-with-wdatp
- (Exam Topic 4)
You have a Microsoft 365 E5 subscription that contains a user named User1.
The Azure Active Directory (Azure AD) Identity Protection risky users report identities User1. For User1, you select Confirm user compromised.
User1 can still sign in.
You need to prevent User1 from signing in. The solution must minimize the impact on users at a lower risk level.
Solution: You configure the user risk policy to block access when the user risk level is high. Does this meet the goal?
Correct Answer:
B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-investigate
- (Exam Topic 4)
You have a Microsoft 365 subscription that contains a user named Use1. You need to ensure that User1 can review Conditional Access policies.
Solution: You assign User1 the Application Administrator role. Does this meet goal?
Correct Answer:
B
- (Exam Topic 4)
You have a Microsoft 365 E5 subscription that contains a user named Used.
You need to ensure that User! can use the Microsoft 365 compliance center to search audit logs and identify which users were added to Microsoft 365 role groups. The solution must use the principle of least privilege.
To which role group should you add User1?
Correct Answer:
C