FULL SC300 EXAMPREP
FULL SC300 EXAMPREP
(SC-300)
To which groups can you assign a Microsoft Office 365 Enterprise E5 license directly?
Answer: B
Explanation:
You can assign licences to any group created within the Azure AD portal. These can include security groups,
Microsoft 365 groups, and either assigned or dynamic groups. You can even create a dynamic device security
group and assign E5 licences to it, which doesn't make sense but is true (I've tested it).
However, the missing bit of information is whether the Microsoft 365 groups have the "SecurityEnabled"
attribute set to True. Only M365 groups that have the "SecurityEnabled" attribute set to True can have
licences assigned to them. If the group is created in the M365 Admin Centre, then the "SecurityEnabled"
attribute is set to False and you can not assign licences to the group. But if the M365 group is created in the
Azure AD portal, then the "SecurityEnabled" attribute is set to True and you can assign licences.
For the answer, I would make an assumption that because this is an Identity-related exam testing us on Azure
AD topics, that the M365 groups were created in the Azure AD portal and therefore have the
"SecurityEnabled" attribute set to True. Which means the correct answer is B - all groups.
A. Set-MsolCompanySettings
B. Set-MsolDomainFederationSettings
C. Update-MsolfederatedDomain
D. Set-MsolDomain
Answer: A
Explanation:
As reference, Self-service sign-up: Method by which a user signs up for a cloud service and has an identity
automatically created for them in Azure AD based on their email domain.
Azure AD cmdlet Set-MsolCompanySettings could help you to prevent creating user accounts with
parameters:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/enterprise-users/directory-self-service-signup
A. User2 only
B. User1 only
C. User1 and User2 only
D. User1, User2, and User3
Answer: A
Explanation:
Correct Answer= A
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/one-time-passcode#when-does-
a-guest-user-get-a-one-time-passcode
"When the email one-time passcode feature is enabled, newly invited users who meet certain conditions will
use one-time passcode authentication. Guest users who redeemed an invitation before email one-time
passcode was enabled will continue to use their same authentication method."
User 1 is already a registered guest user in fabrikan.com so will not receive additional OTP.
User 2 has never accessed fabrikam.com so WILL receive OTP each time they login.
User 3 (providing email addy is not a typo) will not receive a OTP as they are a domain user.
Answer is A.
A. the Identity Governance blade in the Azure Active Directory admin center
B. the Set-AzureAdUser cmdlet
C. the Licenses blade in the Azure Active Directory admin center
D. the Set-WindowsProductKey cmdlet
Answer: C
Explanation:
You can unassign licenses from users on either the Active users page, or on the Licenses page. The method
you use depends on whether you want to unassign product licenses from specific users or unassign users
licenses from a specific product.
Note:
There are several versions of this question in the exam. The question has two possible correct answers:
1. the Licenses blade in the Azure Active Directory admin center
2. the Set-MsolUserLicense cmdlet
Other incorrect answer options you may see on the exam include the following:
✑ the Administrative units blade in the Azure Active Directory admin center
✑ the Groups blade in the Azure Active Directory admin center
✑ the Set-AzureAdGroup cmdlet
Reference:
https://docs.microsoft.com/en-us/microsoft-365/admin/manage/remove-licenses-from-users?view=o365-wor
ldwide
Question: 5 Exam Heist
HOTSPOT -
You have a Microsoft 365 tenant named contoso.com.
Guest user access is enabled.
Users are invited to collaborate with contoso.com as shown in the following table.
From the External collaboration settings in the Azure Active Directory admin center, you configure the
Collaboration restrictions settings as shown in the following exhibit.
From a Microsoft SharePoint Online site, a user invites [email protected] to the site.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
Box 1: yes.
Box2: yes
Box 3: No
A. email address
B. redirection URL
C. username
D. shared key
E. password
Answer: AB
Explanation:
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/tutorial-bulk-invite#invite-guest-
users-in-bulk
Redirection url - the URL to which the invited user is forwarded after accepting the invitation. If you want to
forward the user to the My Apps page, you must change this value to https://myapps.microsoft.com or
https://myapplications.microsoft.com.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/tutorial-bulk-invite
Question: 7 Exam Heist
You have an Azure Active Directory (Azure AD) tenant that contains the objects shown in the following table.
Answer: E
Explanation:
The answer is Use2 only. I just tested. You can't assign the users with no license. 100%
Mail enabled Security Group can only be managed in the M365 Admin Center.
In AAD, you can't modify the membership. - "Some groups can't be managed in the Azure Portal."
In the M365 admin center, only users can be added to the mail-enabled security group.
You can only add licensed users to the group, unlicensed users won't even show up on the member select
page.
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/enterprise-users/domains-admin-takeover
In the tenant, you create the groups shown in the following table.
Which members can you add to GroupA and GroupB? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
Group A - User1, Group1, Group2 and Group3.Group A cannot contain M365 groups.
Reference:
https://bitsizedbytes.wordpress.com/2018/12/10/distribution-security-and-office-365-groups-nesting/
A. Yes
B. No
Answer: B
Explanation:
Answer NO
Password writeback is a feature of Azure AD Connect which ensures that when a password changes in Azure
AD (password change, self-service password reset, or an administrative change to a user password) it is
written back to the local AD – if they meet the on-premises AD password policy.
Technically, a password write-back operation is a password “reset” action. Password writeback removes the
need to set up an on-premises solution for users to reset their password. It all happens in real time, and so
users are notified immediately if their password could not be reset or changed for any reason.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/choose-ad-authn
A. Yes
B. No
Answer: A
Explanation:
Azure Active Directory (Azure AD) Pass-through Authentication allows your users to sign in to both on-
premises and cloud-based applications by using the same passwords. Pass-through Authentication signs
users in by validating their passwords directly against on-premises Active Directory.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/choose-ad-authn
A. Yes
B. No
Answer: B
Explanation:
Azure Active Directory (Azure AD) Pass-through Authentication allows your users to sign into both on-
premises and cloud-based applications using the same passwords
It uses a lightweight on-premises agent that listens for and responds to password validation requests. If
disabled user can not login
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/choose-ad-authn
How many licenses are used if you assign the Microsoft 365 Enterprise E5 license to Group1?
A. 0
B. 2
C. 3
D. 4
Answer: B
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/enterprise-users/licensing-group-advanced
Question: 14 Exam Heist
You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains an Azure AD enterprise
application named App1.
A contractor uses the credentials of [email protected]
You need to ensure that you can provide the contractor with access to App1. The contractor must be able to
authenticate as [email protected]
What should you do?
Answer: D
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/b2b-quickstart-add-guest-users-
portal
A. Create an inbound synchronization rule for the Windows Azure Active Directory connector.
B. Configure a Full Import run profile.
C. Create an inbound synchronization rule for the Active Directory Domain Services connector.
D. Configure an Export run profile.
Answer: C
Explanation:
The connector name is Active Directory Domain Services connector (AD DS connector)
Reference
https://learn.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-configure-ad-ds-connector-
account
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-sync-change-the-
configuration
Question: 16 Exam Heist
Your network contains an on-premises Active Directory domain that syncs to an Azure Active Directory (Azure AD)
tenant. The tenant contains the users shown in the following table.
Answer: A
Explanation:
When the connection to on-premise is lost, PTA will not work anymore. The failover to
Password Hash Synchronization is not automatic and needs to be configured manually in AD Connect. If the
connection to on-premise is lost, and the AD Connect server runs un-premise, user 2 cannot login.
-~~~~~-
Enabling Password Hash Synchronization gives you the option to failover authentication if your on-premises
infrastructure is disrupted. This failover from Pass-through Authentication to Password Hash Synchronization
is not automatic. You'll need to switch the sign-in method manually using Azure AD Connect. If the server
running Azure AD Connect goes down, you'll require help from Microsoft Support to turn off Pass-through
Authentication.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-pta-current-limitations
A. Yes
B. No
Answer: B
Explanation:
Answer is No.
Correct solution shall be Azure Active Directory (Azure AD) Pass-through Authentication.
Azure Active Directory (Azure AD) Pass-through Authentication allows your users to sign in to both on-
premises and cloud-based applications by using the same passwords. Pass-through Authentication signs
users in by validating their passwords directly against on-premises Active Directory.
You configure the Filter users and devices settings as shown in the Filter Users and Devices exhibit. (Click the
Filter Users and Devices tab.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
Only direct members of Group1 are synced. Group2 will sync as it is a direct member of Group1 but the
members of Group2 will not sync.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-install-custom
A. a user flow
B. the terms of use
C. a linked subscription
D. an access review
Answer: C
Explanation:
To take advantage of MAU billing, your Azure AD tenant must be linked to an Azure subscription.
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/external-identities-pricing#what-
do-i-need-to-do
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/external-identities-pricing
Answer:
Explanation:
Reference:
https://practical365.com/configure-a-custom-domain-in-office-365/
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
1. No
Maximum number of devices: This setting enables you to select the maximum number of Azure AD joined or
Azure AD registered devices that a user can have in Azure AD
2. Yes
You must be assigned one of the following roles to view or manage device settings in the Azure portal:
Global Administrator
Global Reader
Directory Reader
3.No
Reference:
https://docs.microsoft.com/en-gb/azure/active-directory/devices/device-management-azure-
portal#configure-device-settings
https://docs.microsoft.com/en-us/azure/active-directory/devices/device-management-azure-portal
Which portal should you use to configure each user? To answer, drag the appropriate portals to the correct users.
Each portal may be used once, more than once, or not at all. You may need to drag the split bar between panes or
scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
Answer:
Explanation:
User 2: Microsoft Purview admin center (legacy Microsoft Compliance Admin center), these roles came from
Exchange, Microsoft is not enforcing the roles permission from Exchange, Microsoft is recommending using
Microsoft Purview Admin center. I believe this answer is too old. it could be true years ago, however, Microsoft
today is with MS purview to assign these roles. Record management and Quarantine role are known as SCC
(security and compliance center) SCC roles have evolved from Exchange role groups design to MS Purview.
User 3: Endpoint Manager/Tenant administration/Roles/ you will see these two roles in the endpoint admin
center.
A. Server4
B. Server2
C. Server1
D. Server3
Answer: A
Explanation:
Server 4
The standalone Authentication Agents can be installed on any Windows Server 2016 or later, with TLS 1.2
enabled. The server needs to be on the same Active Directory forest as the users whose passwords you need
to validate.
Answer: A
Explanation:
A is the answers, they are looking for you to invite the user to azure ad. Assume that unless stated otherwise,
default config in Azure AD is set, so collaboration settings are already on. "By default, all users in your
organization, including B2B collaboration guest users, can invite external users to B2B collaboration. If you
want to limit the ability to send invitations, you can turn invitations on or off for everyone, or limit invitations to
certain roles."
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/external-collaboration-settings-
configure
Question: 25 Exam Heist
You have 2,500 users who are assigned Microsoft Office 365 Enterprise E3 licenses. The licenses are assigned to
individual users.
From the Groups blade in the Azure Active Directory admin center, you assign Microsoft 365 Enterprise E5
licenses to the users.
You need to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of
administrative effort.
What should you use?
A. the Administrative units blade in the Azure Active Directory admin center
B. the Set-AzureAdUser cmdlet
C. the Groups blade in the Azure Active Directory admin center
D. the Set-MsolUserLicense cmdlet
Answer: D
Explanation:
The Set-MsolUserLicense cmdlet updates the license assignment for a user. This can include adding a new
license, removing a license, updating the license options, or any combination of these actions.
Note:
There are several versions of this question in the exam. The question has two possible correct answers:
1. the Licenses blade in the Azure Active Directory admin center
2. the Set-MsolUserLicense cmdlet
Other incorrect answer options you may see on the exam include the following:
✑ the Identity Governance blade in the Azure Active Directory admin center
✑ the Set-WindowsProductKey cmdlet
✑ the Set-AzureAdGroup cmdlet
Reference:
https://docs.microsoft.com/en-us/powershell/module/msonline/set-msoluserlicense?view=azureadps-1.0
Explanation:
- First you'll enable self-service sign-up for your tenant and federate with the identity providers you want to
allow external users to use for sign-in. Then you'll create and customize the sign-up user flow and assign your
applications to it.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/identity-providers
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/self-service-sign-up-overview
Question: 27 Exam Heist
You have an Azure Active Directory (Azure AD) Azure AD tenant.
You need to bulk create 25 new user accounts by uploading a template file.
Which properties are required in the template file?
Answer: C
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/enterprise-users/users-bulk-add
Answer: C
Explanation:
You can gradually roll out Seamless SSO to your users using the instructions provided below. You start by
adding the following Azure AD URL to all or selected users' Intranet zone settings by using Group Policy in
Active Directory:
https://autologon.microsoftazuread-sso.com
In addition, you need to enable an Intranet zone policy setting called Allow updates to status bar via script
through Group Policy.
more information in:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-sso-quick-start
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-sso-quick-start
Answer:
Explanation:
Leaked credentials: This risk detection type indicates that the user's valid credentials have been leaked. When
cybercriminals compromise valid passwords of legitimate users, they often share those credentials.
Suspicious browser: Suspicious browser detection indicates anomalous behavior based on suspicious sign-in
activity across multiple tenants from different countries in the same browser.
A sign-in risks include activity from anonymous IP address: This detection is discovered by Microsoft Defender
for Cloud Apps. This detection identifies that users were active from an IP address that has been identified as
an anonymous proxy IP address.
Note: The following three policies are available in Azure AD Identity Protection to protect users and respond
to suspicious activity. You can choose to turn the policy enforcement on or off, select users or groups for the
policy to apply to, and decide if you want to block access at sign-in or prompt for additional action.
Identifies and responds to user accounts that may have compromised credentials. Can prompt the user to
create a new password.
Identifies and responds to suspicious sign-in attempts. Can prompt the user to provide additional forms of
verification using Azure AD Multi-Factor Authentication.
Makes sure users are registered for Azure AD Multi-Factor Authentication. If a sign-in risk policy prompts for
MFA, the user must already be registered for Azure
AD Multi-Factor Authentication.
Anomalous Token
Anonymous IP address
Atypical travel
Impossible travel
Malicious IP address
Malware linked IP address
New country
Password spray
Suspicious browser
Leaked credentials
https://learn.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-
risks
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-
policies
For which users can you configure the Job title property and the Usage location property in Azure AD? To answer,
select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
See
https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-users-profile-azure-
portal
It states: Note
“You must use Windows Server Active Directory to update the identity, contact info, or job info for users
whose source of authority is Windows Server Active Directory. After you complete your update, you must wait
for the next synchronization cycle to complete before you'll see the changes.”
Invite users with Azure Active Directory B2B collaboration, Update user's name and usage location.
To assign a license, the invited user's Usage location must be specified. Admins can update the invited user's
profile on the Azure portal.
1. Go to Azure Active Directory > Users and groups > All users. If you don't see the newly created user, refresh
the page.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-users-profile-azure-
portal https://docs.microsoft.com/en-us/power-platform/admin/invite-users-azure-active-directory-b2b-
collaboration#update-users-name-and-usage-location
A. From the Roles and administrators blade, modify the Groups administrator role.
B. From the Roles and administrators blade, modify the Service support administrator role.
C. From the Identity Governance blade, modify the Entitlement management settings.
D. From the Identity Governance blade, modify the roles and administrators for the General catalog.
Answer: C
Explanation:
Create and manage a catalog of resources in Azure AD entitlement management.
Create a catalog.
A catalog is a container of resources and access packages. You create a catalog when you want to group
related resources and access packages. A user who has been delegated the catalog creator role can create a
catalog for resources that they own. Whoever creates the catalog becomes the first catalog owner. A catalog
owner can add more users, groups of users, or application service principals as catalog owners.
Prerequisite roles: Global administrator, Identity Governance administrator, User administrator, or Catalog
creator.
Incorrect:
* Groups Administrator - Members of this role can create/manage groups, create/manage groups settings like
naming and expiration policies, and view groups activity and audit reports.
* Service Support Administrator
Users with this role can create and manage support requests with Microsoft for Azure and Microsoft 365
services, and view the service dashboard and message center in the Azure portal and Microsoft 365 admin
center.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-catalog-creat
e https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference
Answer: C
Explanation:
The question states: You need to configure the Windows 10 computers to support Azure AD Seamless SSO.
The answer is C.
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-sso-quick-start
Answer: B
Explanation:
Before any of your users can grant SharePoint Online team site access to external guests, you will have to
enable guest sharing from within Azure Active
Directory.
Reference:
https://redmondmag.com/articles/2020/03/11/guest-access-sharepoint-online-team-sites.aspx https://docs.m
icrosoft.com/en-us/azure/active-directory/fundamentals/multi-tenant-common-considerations
You have a Microsoft 365 E5 subscription that contains two users named User1 and User2.
You need to ensure that User1 can create access reviews for groups, and that User2 can review the history report
for all the completed access reviews. The solution must use the principle of least privilege.
Which role should you assign to each user? To answer, drag the appropriate roles to the correct users. Each role
may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view
content.
Explanation:
User Administrator
Security Reader
Reference:
https://learn.microsoft.com/en-us/azure/active-directory/roles/delegate-by-task
Question: 35 Exam Heist
HOTSPOT
-
You need to create two custom roles named Role1 and Role2. The solution must meet the following requirements:
• Users that are assigned Role1 can create or delete instances of Azure Container Apps.
• Users that are assigned Role2 can enforce adaptive network hardening rules.
Which resource provider permissions are required for each role? To answer, select the appropriate options in the
answer area.
Answer:
Explanation:
Role2: Microsoft.Security
You have a Microsoft 365 tenant that has 5,000 users. One hundred of the users are executives. The executives
have a dedicated support team.
You need to ensure that the support team can reset passwords and manage multi-factor authentication (MFA)
settings for only the executives. The solution must use the principle of least privilege.
Which object type and Azure Active Directory (Azure AD) role should you use? To answer, select the appropriate
options in the answer area.
Answer:
Explanation:
You have an administrative unit named Au1. Group1, User2, and User3 are members of Au1.
Answer: D
Explanation:
Adding a group to an administrative unit brings the group itself into the management scope of the
administrative unit, but not the members of the group. In other words, an administrator scoped to the
administrative unit can manage properties of the group, such as group name or membership, but they cannot
manage properties of the users or devices within that group (unless those users and devices are separately
added as members of the administrative unit).
https://learn.microsoft.com/en-us/azure/active-directory/roles/administrative-units
You create a dynamic user group and configure the following rule syntax.
user.usageLocation -in ["US","AU"] -and (user.department -eq "Sales") -and -not (user.jobTitle -eq "Manager") –or
(user. jobTitle -eq "SalesRep")
A. User1 only
B. User2 only
C. User3 only
D. User1 and User2 only
E. User1 and User3 only
F. User1, User2, and User3
Answer: D
Explanation:
According to operators precedence we can consider the following parenthesis: (statement1 -and statement2 -
and statement3) -or (statement4). So, the results is the sub-result of the first parenthesis plus the results of
the second one. So, it's D.
Question: 39 Exam Heist
You have an Azure AD tenant that contains a user named User1.
A. Helpdesk administrator
B. Billing administrator
C. License administrator
D. User administrator
Answer: D
Explanation:
D. Is Correct - Neither of the other Roles have permissions to handle all of the statements.
From the Groups blade in the Azure Active Directory admin center, you assign Microsoft Office 365 Enterprise E5
licenses to a group that includes all users.
You need to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of
administrative effort.
Answer: A
Explanation:
A. el cmdlet Set-MsolUserLicense
From the Groups blade in the Azure Active Directory admin center, you assign Microsoft 365 Enterprise E5
licenses to a group that includes all the users.
You need to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of
administrative effort.
Answer: D
Explanation:
Your on-premises network contains an Active Directory domain that uses Azure AD Connect to sync with an Azure
AD tenant.
What should you use for each requirement? To answer, select the appropriate options in the answer area.
Answer:
Explanation:
From the Groups blade in the Azure Active Directory admin center, you assign Microsoft Office 365 Enterprise E5
licenses to a group that includes all users.
You needed to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of
administrative effort.
Answer: D
Explanation:
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not
appear in the review screen.
You discover that when a user account is disabled in Active Directory, the disabled user can still authenticate to
Azure AD for up to 30 minutes.
You need to ensure that when a user account is disabled in Active Directory, the user account is immediately
prevented from authenticating to Azure AD.
A.Yes
B.No
Answer: B
Explanation:
No is a correct answer.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not
appear in the review screen.
You need to ensure that User1 can update the status of Identity Secure Score improvement actions.
A. Yes
B. No
Answer: A
Explanation:
https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/identity-secure-score#read-and-
write-roles
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not
appear in the review screen.
You need to ensure that User1 can update the status of Identity Secure Score improvement actions.
A. Yes
B. No
Answer: B
Explanation:
https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/identity-secure-score#read-and-
write-roles
Case Study
-
Overview
-
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory (Azure
AD) tenant named fabrikam.com.
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The domain
contains an organizational unit (OU) named Contoso_Resources. The Contoso_Resources OU contains all users and
computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
Contoso also includes a marketing department that has users in each office.
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Azure AD Connect is configured between Azure AD and Active Directory Domain Services (AD DS). Only the
Contoso_Resources OU is synced.
Helpdesk administrators routinely use the Microsoft 365 admin center to manage user settings.
User administrators currently use the Microsoft 365 admin center to manually assign licenses. All users have all
licenses assigned besides the following exceptions:
•The users in the London office have the Microsoft 365 Phone System license unassigned.
•The users in the Seattle office have the Yammer Enterprise license unassigned.
Contoso uses Azure AD Privileged Identity Management (PIM) to protect administrative roles.
•Currently, all the helpdesk administrators can manage user licenses throughout the entire Microsoft 365 tenant.
•The user administrators report that it is tedious to manually configure the different license requirements for each
Contoso office.
•The helpdesk administrators spend too much time provisioning internal and guest access to the required
Microsoft 365 services and apps.
•Currently, the helpdesk administrators can perform tasks by using the User administrator role without
justification or approval.
•When the Logs node is selected in Azure AD, an error message appears stating that Log Analytics integration is
not enabled.
Contoso plans to acquire a company named ADatum Corporation. One hundred new ADatum users will be created
in an Active Directory OU named Adatum. The users will be located in London and Seattle.
You need to meet the technical requirements for license management by the help desk administrators.
What should you create first, and which tool should you use? To answer, select the appropriate options in the
answer area.
Answer:
Explanation:
An administrative unit.
Overview -
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with the
adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security defaults
disabled.
•Multiple users in the sales department have up to five devices. The sales department users report that sometimes
they must contact the support department to join their devices to the Azure AD tenant because they have reached
their device limit.
•A recent security incident reveals that several users leaked their credentials, a suspicious browser was used for a
sign-in, and resources were accessed from an anonymous IP address.
•When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear in the
selection list.
•Anyone in the organization can invite guest users, including other guests and non-administrators.
•The helpdesk spends too much time resetting user passwords.
•Users currently use only passwords for authentication.
•Users assigned the User administrator role must be able to request permission to use the role when needed for up
to one year.
•Users must be prompted to register for MFA and provided with an option to bypass the registration for a grace
period.
•Users must provide one authentication method to reset their password by using SSPR. Available methods must
include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
•Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
•The principle of least privilege must be used.
Answer: A
Explanation:
Azure Portal > Azure AD> Device > Device Settings> in the "Azure AD join and registration settings" section,
change the maximum number of devices a user can have in Azure AD.
Overview -
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with the
adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security defaults
disabled.
•Multiple users in the sales department have up to five devices. The sales department users report that sometimes
they must contact the support department to join their devices to the Azure AD tenant because they have reached
their device limit.
•A recent security incident reveals that several users leaked their credentials, a suspicious browser was used for a
sign-in, and resources were accessed from an anonymous IP address.
•When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear in the
selection list.
•Anyone in the organization can invite guest users, including other guests and non-administrators.
•The helpdesk spends too much time resetting user passwords.
•Users currently use only passwords for authentication.
•Users assigned the User administrator role must be able to request permission to use the role when needed for up
to one year.
•Users must be prompted to register for MFA and provided with an option to bypass the registration for a grace
period.
•Users must provide one authentication method to reset their password by using SSPR. Available methods must
include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
•Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
•The principle of least privilege must be used.
Answer: B
Explanation:
Overview -
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with the
adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security defaults
disabled.
•Multiple users in the sales department have up to five devices. The sales department users report that sometimes
they must contact the support department to join their devices to the Azure AD tenant because they have reached
their device limit.
•A recent security incident reveals that several users leaked their credentials, a suspicious browser was used for a
sign-in, and resources were accessed from an anonymous IP address.
•When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear in the
selection list.
•Anyone in the organization can invite guest users, including other guests and non-administrators.
•The helpdesk spends too much time resetting user passwords.
•Users currently use only passwords for authentication.
•Users assigned the User administrator role must be able to request permission to use the role when needed for up
to one year.
•Users must be prompted to register for MFA and provided with an option to bypass the registration for a grace
period.
•Users must provide one authentication method to reset their password by using SSPR. Available methods must
include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
•Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
•The principle of least privilege must be used.
A.Azure AD Connect cloud sync between the Azure AD tenant and litware.com
B.Azure AD Connect to include the litware.com domain
C.staging mode in Azure AD Connect for the litware.com domain
Answer: B
Explanation:
To which identities can you assign the Contributor role for RG1?
A.User1 only
B.User1 and Group1 only
C.User1 and VM1 only
D.User1, VM1, and App1 only
E.User1, Group1, VM1, and App1
Answer: A
Explanation:
Answer is A. A group cannot be added as a member of role assignable group. You cannot add a Dynamic user
membership type.
https://learn.microsoft.com/en-us/azure/active-directory/roles/groups-concept
You have an Azure AD tenant that contains a user named User1. User1 is assigned the User Administrator role.
You need to configure External collaboration settings for the tenant to meet the following requirements:
Which three settings should you configure? To answer, select the appropriate settings in the answer area.
Answer:
Question: 53 Exam Heist
You have 2,500 users who are assigned Microsoft Office 365 Enterprise E3 licenses. The licenses are assigned to
individual users.
From the Groups blade in the Azure Active Directory admin center, you assign Microsoft Office 365 Enterprise E5
licenses to a group that includes all users.
You needed to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of
administrative effort.
Answer: D
Explanation:
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not
appear in the review screen.
You need to ensure that User1 can update the status of Identity Secure Score improvement actions.
A.Yes
B.No
Answer: B
Explanation:
B With read and write access, you can make changes and directly interact with identity secure score.Global
administratorSecurity administrator Exchange administrator SharePoint administratorSecurity Operator has
only read access, so he can not update anything
https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/identity-secure-score#who-can-use-
the-identity-secure-score
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not
appear in the review screen.
You need to ensure that User1 can update the status of Identity Secure Score improvement actions.
A.Yes
B.No
Answer: A
Explanation:
From Microsoft:With read and write access, you can make changes and directly interact with identity secure
score.Global administratorSecurity administratorExchange administratorSharePoint administrator
https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/identity-secure-score#who-can-use-
the-identity-secure-score
You need to ensure that Admin1 can perform only the following tasks:
•From the Microsoft 365 admin center, create and manage service requests.
•From the Microsoft 365 admin center, read and configure service health.
•From the Azure portal, create and manage support tickets.
Answer: C
Explanation:
https://learn.microsoft.com/en-us/azure/active-directory/roles/permissions-reference#helpdesk-
administrator
Your network contains an on-premises Active Directory Domain Services (AD DS) domain that syncs with an Azure
AD tenant.
You need to ensure that user authentication always occurs by validating passwords against the AD DS domain.
What should you configure, and what should you use? To answer, select the appropriate options in the answer
area.
Explanation:
https://learn.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad-on-
premises
Question: 58 Exam Heist
You have a Microsoft 365 tenant that uses the domain named fabrikam.com. The Guest invite settings for Azure
Active Directory (Azure AD) are configured as shown in the exhibit. (Click the Exhibit tab.)
A user named [email protected] shares a Microsoft SharePoint Online document library to the users shown in the
following table.
A.User2 only
B.User1 only
C.User1 and User2 only
D.User1, User2, and User3
Answer: A
Explanation:
In Question, [Email Protected] = bsmith@fabrikam.com
Correct Answer = A
https://learn.microsoft.com/en-us/azure/active-directory/external-identities/one-time-passcode
From the Groups blade in the Azure Active Directory admin center, you assign Microsoft Office 365 Enterprise E5
licenses to a group that includes all users.
You need to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of
administrative effort.
A.the Administrative units blade in the Azure Active Directory admin center
B.the Set-MsolUserLicense cmdlet
C.the Groups blade in the Azure Active Directory admin center
D.the Set-WindowsProductKey cmdlet
Answer: B
Explanation:
This PowerShell cmdlet is used to adjust licenses for users in the Microsoft 365 admin center and can be used
to add, replace, or remove licenses. It allows for bulk operations when used in a script, making it quite
efficient for managing licenses for a large number of users.
Your network contains an on-premises Active Directory Domain Services (AD DS) domain that syncs with Azure AD
and contains the users shown in the following table.
Answer:
Explanation:
yes
yes
No
From the Groups blade in the Azure Active Directory admin center, you assign Microsoft Office 365 Enterprise E5
licenses to a group that includes all users.
You need to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of
administrative effort.
Answer: B
Explanation:
the Licenses blade in the Azure Active Directory admin center
You need to compare the role permissions of each user. The solution must minimize administrative effort.
Answer: B
Explanation:
Reference:
https://learn.microsoft.com/en-us/microsoft-365/admin/add-users/admin-roles-page#compare-roles
Several users use their contoso.com email address for self-service sign-up to Azure AD.
You gain global administrator privileges to the Azure AD tenant that contains the self-signed users.
You need to prevent the users from creating user accounts in the contoso.com Azure AD tenant for self-service
sign-up to Microsoft 365 services.
A.Update-MgOrganization
B.Update-MgPolicyPermissionGrantPolicyExclude
C.Update-MgDomain
D.Update-MgDomainFederationConfiguration
Answer: B
Explanation:
•B2B collaboration
•Monthly active users (MAU)-based pricing
Which two settings should you configure? To answer, select the settings in the answer area.
You need to ensure that the user can authenticate by using the updated email address.
Answer: D
Explanation:
You need to ensure that only users from specific external domains can be invited as guests to the tenant.
Answer: A
Explanation:
The correct answer is A. External collaboration settings. External collaboration settings allow you to control
who can collaborate with your Azure AD tenant. You can use external collaboration settings to specify which
external domains are allowed to be invited as guests to your tenant.
You need to ensure that User1 is notified every three months to validate the guest membership of Group1.
Answer: B
Explanation:
You have a Microsoft Entra tenant that contains a group named Group3 and an administrative unit named
Department1.
Department1 has the users shown in the Users exhibit. (Click the Users tab.)
Department1 has the groups shown in the Groups exhibit. (Click the Groups tab.)
The User Administrator role assignments are shown in the Assignments exhibit (Click the Assignments tab.)
The members of Group2 are shown in the Group2 exhibit. (Click the Group2 tab.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Answer:
Explanation:
No
No
Yes
Question: 69 Exam Heist
HOTSPOT
-
Your network contains an on-premises Active Directory Domain Services (AD DS) domain named fabrikam.com. The
domain contains an Active Directory Federation Services (AD FS) instance and a member server named Server1
that runs Windows Server. The domain contains the users shown in the following table.
You have a Microsoft Entra tenant named contoso.com that is linked to a Microsoft 365 subscription.
You establish federation between fabrikam.com and contoso.com by using a Microsoft Entra Connect instance that
is configured as shown in the following exhibit.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Answer:
Explanation:
No
No
yes
You have a Microsoft Entra tenant that has a Microsoft Entra ID P2 service plan. The tenant contains the users
shown in the following table.
You have the Device settings shown in the following exhibit.
For each of the following statements, select Yes if the statement is true. Otherwise. select No.
Explanation:
No
Yes
No
You need to ensure that User1 can purchase a Microsoft Entra Permissions Management license for Sub1. The
solution must follow the principle of least privilege.
A.Global Administrator
B.Billing Administrator
C.Permissions Management Administrator
D.User Access Administrator
Answer: B
Explanation:
You need to ensure that User1 can perform the following tasks:
What is the minimum number of role-based access control (RBAC) role assignments required?
A.1
B.2
C.3
D.4
Answer: A
Explanation:
•A company named A. Datum Corporation that has a Microsoft Entra tenant named adatum.com.
•A company named Fabrikam, Inc. that has a Microsoft Entra tenant named fabrikam.com.
When you attempt to invite a new guest user from adatum.com to contoso.com, you receive an error message.
You can successfully invite a new guest user from fabnkam.com to contoso.com.
You need to be able to invite new guest users from adatum.com to contoso.com.
Answer: D
Explanation:
A.WebApp1 only
B.storage1 and WebApp1 only
C.VM1 and WebApp1 only
D.VM1, storage1, and WebApp1
Answer: D
Explanation:
The External collaboration settings are configured as shown in the Collaboration exhibit. (Click the Collaboration
tab.)
The Email one-time passcode for guests setting is enabled for the tenant.
A user named [email protected] shares a Microsoft SharePoint Online document library to the users shown in the
following table.
A.User1 only
B.User2 only
C.User1 and User2 only
D.User1, User2, and User3
Answer: B
Explanation:
Here[email protected]=bsmith@fabrikam.com.
From the Groups blade in the Microsoft Entra admin center, you assign Microsoft Office 365 Enterprise E5
licenses to a group that includes all users.
You need to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of
administrative effort.
Answer: C
Explanation:
C. the Set-MgUserLicense cmdletTo remove the Office 365 Enterprise E3 licenses from the users who are
now part of a group with Office 365 Enterprise E5 licenses assigned, you should use the Set-MgUserLicense
cmdlet. This cmdlet allows you to modify the licenses assigned to a user. By using this cmdlet, you can
remove the Office 365 Enterprise E3 licenses from all users who are part of the group where you assigned the
Office 365 Enterprise E5 licenses.
From the Groups blade in the Microsoft Entra admin center, you assign Microsoft Office 365 Enterprise E5
licenses to a group that includes all users.
You need to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of
administrative effort.
Answer: A
Explanation:
A. the Licenses blade in the Microsoft Entra admin centerTo remove the Office 365 Enterprise E3 licenses
from the users who are now part of a group with Office 365 Enterprise E5 licenses assigned, you should use
the "Licenses" blade in the Microsoft Entra admin center. This allows you to manage license assignments at a
group level, making it easier to apply and remove licenses for multiple users simultaneously.
Answer: B
Explanation:
Taken from article in answer: “If your tenant was created on or after October 22, 2019, it is possible security
defaults are already enabled in your tenant. To protect all of our users, security defaults are being rolled out
to all new tenants created.”
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/concept-fundamentals-security-
defaults
Answer: D
Explanation:
so D. FIDO2 key
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-
passwordless
Answer: C
Explanation:
The easiest way to block legacy authentication across your entire organization is by configuring a Conditional
Access policy that applies specifically to legacy authentication clients and blocks access.
Client apps
By default, all newly created Conditional Access policies will apply to all client app types even if the client
apps condition is not configured.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/block-legacy-authentication
A. impossible travel
B. anonymous IP address
C. atypical travel
D. leaked credentials
Answer: D
Explanation:
Leaked credentials indicates that the user's valid credentials have been leaked.
Note:
There are several versions of this question in the exam. The question can have other incorrect answer options,
including the following:
✑ password spray
✑ malicious IP address
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-risks
A. a Microsoft Cloud App Security activity policy that has Microsoft Office 365 governance actions configured
B. an Azure AD conditional access policy that has session controls configured
C. an Azure AD conditional access policy that has client apps conditions configured
D. a Microsoft Cloud App Security app discovery policy that has governance actions configured
Answer: C
Explanation:
After review this on a real tenant first you need to select SPO in Cloud apps or actions
that action will enable in session settings App enforced restrictions might require additional admin
configurations within the cloud apps. The restrictions will only take effect for new sessions.
So because first action is configure the application that will be affected by sessions settings, choosing C,
instead B can the option to select as demoxyl told 2 months, 1 week ago C is the answer
This is not worded properly enough. In CA, if you go into session controls and select 'User conditional access
app control', you can monitor or block downloads. However, both of those are in preview and the test doesn't
ask you about that. You can select custom policy there https://docs.microsoft.com/en-gb/defender-cloud-
apps/proxy-intro-aad#supported-apps-and-clients . SO I say it must be C.
Answer: C
Explanation:
Network Policy Server (NPS) is a server role that allows you to implement RADIUS authentication,
authorization, and accounting. You can use NPS to integrate Azure MFA with your VPN server.
A. Azure AD Connect
B. Azure AD Application Proxy
C. Password Change Notification Service (PCNS)
D. the Azure AD Password Protection proxy service
Answer: D
Explanation:
The AzureAD Password Protection proxy service initiates an outbound connection (Port 443) to Azure to pull
the banned password list.
The downloaded banned password list is pulled by the agent installed on DCs.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-password-ban-bad-on-
premises-deploy
Question: 85 Exam Heist
DRAG DROP -
You have a Microsoft 365 E5 tenant.
You purchase a cloud app named App1.
You need to enable real-time session-level monitoring of App1 by using Microsoft Cloud App Security.
In which order should you perform the actions? To answer, move the appropriate actions from the list of actions to
the answer area and arrange them in the correct order.
Select and Place:
Answer:
Explanation:
1. Publish App1.
Reference -
https://techcommunity.microsoft.com/t5/itops-talk-blog/step-by-step-blocking-data-downloads-via-
microsoft-cloud-app/ba-p/326357
https://docs.microsoft.com/en-us/cloud-app-security/proxy-deployment-any-app
https://docs.microsoft.com/en-us/cloud-app-security/session-policy-aad
Question: 86 Exam Heist
You have a Microsoft 365 tenant.
All users have mobile phones and laptops.
The users frequently work from remote locations that do not have Wi-Fi access or mobile phone connectivity. While
working from the remote locations, the users connect their laptop to a wired network that has internet access.
You plan to implement multi-factor authentication (MFA).
Which MFA authentication method can the users use from the remote location?
Answer: C
Explanation:
In Windows 10, Windows Hello for Business replaces passwords with strong two-factor authentication on PCs
and mobile devices. This authentication consists of a new type of user credential that is tied to a device and
uses a biometric or PIN.
After an initial two-step verification of the user during enrollment, Windows Hello is set up on the user's
device and Windows asks the user to set a gesture, which can be a biometric, such as a fingerprint, or a PIN.
The user provides the gesture to verify their identity. Windows then uses Windows Hello to authenticate
users.
Incorrect Answers:
A: A notification through the Microsoft Authenticator app requires connectivity to send the verification code
to the device requesting the logon
B: An app password can be used to open an application but it cannot be used to sign in to a computer.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-methods http
s://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-overview
A. Yes
B. No
Answer: B
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings
A. Yes
B. No
Answer: B
Explanation:
The account lockout settings are applied only when a PIN code is entered for the MFA prompt.
Fraud Alert:
The fraud alert feature lets users report fraudulent attempts to access their resources. When an unknown and
suspicious MFA prompt is received, users can report the fraud attempt by using the Microsoft Authenticator
app or through their phone.
Automatically block users who report fraud. If a user reports fraud, the Azure AD Multi-Factor Authentication
attempts for the user account are blocked for 90 days or until an administrator unblocks the account.
https://learn.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings
A. Yes
B. No
Answer: B
Explanation:
It should be Azure Active Directory > Security > Multifactor authentication > Fraud alert -> Allow users to
submit fraud alerts to On
Pay attention to the words - you need to block the users AUTOMATICALLY
FRAUD ALERT
The fraud alert feature lets users report fraudulent attempts to access their resources. When an unknown and
suspicious MFA prompt is received, users can report the fraud attempt by using the Microsoft Authenticator
app or through their phone.
If a user's device is lost or stolen, you can block Azure AD Multi-Factor Authentication attempts for the
associated account. Any Azure AD Multi-Factor Authentication attempts for blocked users are automatically
denied. Users remain blocked for 90 days from the time that they're blocked.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-risks
Answer:
Explanation:
View the Risky Users Report: User3 and User4 (Security Administrator and Security Operator)
Authentication Administrator
Security Administrator
Security Operator
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection
Department1 has the groups shown in the Groups exhibit. (Click the Groups tab.)
Department1 has the user administrator assignments shown in the Assignments exhibit. (Click the Assignments
tab.)
The members of Group2 are shown in the Group2 exhibit. (Click the Group2 tab.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
#1: N
https://docs.microsoft.com/en-us/azure/active-directory/roles/administrative-units
"A scoped role assignment doesn't apply to members of groups added to an administrative unit, unless the
group members are directly added to the administrative unit. For more information, see Add members to an
administrative unit."
#2: Y
"microsoft.directory/groups/members/update"
https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference#user-administrator
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/roles/administrative-units
A. Yes
B. No
Answer: A
Explanation:
The fraud alert feature lets users report fraudulent attempts to access their resources. When an unknown and
suspicious MFA prompt is received, users can report the fraud attempt using the Microsoft Authenticator app
or through their phone.
The following fraud alert configuration options are available:
✑ Automatically block users who report fraud.
✑ Code to report fraud during initial greeting.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings
Answer: D
Explanation:
The Authenticator app can be used as a software token to generate an OATH verification code. After entering
your username and password, you enter the code provided by the Authenticator app into the sign-in interface.
Incorrect Answers:
A: A notification through the Microsoft Authenticator app requires connectivity to send the verification code
to the device requesting the logon.
B: An email requires network connectivity.
C: Security questions are not used as an authentication method but can be used during the self-service
password reset (SSPR) process.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-authenticator
-app#verification-code-from-mobile-app
Answer:
Explanation:
CONDITION-->named LOCATION.
SESSION-->SIGN-IN FREQUENCY
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-access-
session
Answer:
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-deployment
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-conditional-access-policy-
all-users-mfa
A. Authentication administrator
B. Helpdesk administrator
C. Privileged authentication administrator
D. Security operator
Answer: A
Explanation:
In details:
Privileged Auth Admin can reset passwords of non admins and admin accounts
Helpdesk Admins can reset non admins and Helpdesk Admins password
To follow the least privilege requirement, Authentication Administrator should be the answer
Answer: C
Explanation:
✑ Pr0jectlitw@re
✑ T@ilw1nd
✑ C0nt0s0
B. C0nt0s0 only
Correct Answer= C
Reference:
https://blog.enablingtechcorp.com/azure-ad-password-protection-password-evaluation
Answer: A
Explanation:
The Authenticator app can be used as a software token to generate an OATH verification code. After entering
your username and password, you enter the code provided by the Authenticator app into the sign-in interface.
Incorrect Answers:
B: Security questions are not used as an authentication method but can be used during the self-service
password reset (SSPR) process.
C, D: An automated voice call and an SMS requires mobile connectivity.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-methods
User2 reports that he can only configure multi-factor authentication (MFA) to use the Microsoft Authenticator app.
You need to ensure that User2 can configure alternate MFA methods.
Which configuration is required, and which user should perform the configuration? To answer, select the
appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
Box 1: Modify security defaults.
Privileged Authentication Administrator
Users with this role can set or reset any authentication method (including passwords) for any user, including
Global Administrators. Privileged Authentication
Administrators can force users to re-register against existing non-password credential (such as MFA or FIDO)
and revoke 'remember MFA on the device', prompting for MFA on the next sign-in of all users.
The Authentication Administrator role has permission to force re-registration and multifactor authentication
for standard users and users with some admin roles.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference
Answer: C
Explanation:
When administrators require one method be used to reset a password, verification code is the only option
available.
Note: When administrators require two methods be used to reset a password, users are able to use
notification OR verification code in addition to any other enabled methods.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-sspr-howitworks
Answer: B
Explanation:
'Risky users' report shows an at-risk user [Risk state = At risk] with low risk [Risk level = Low] and that user
was indeed compromised.
What happens under the hood? Azure AD will move the user risk to High [Risk state = Confirmed
compromised; Risk level = High] and will add a new detection
Notes: Currently, the 'Confirm user compromised' option is only available in 'Risky users' report.
The detection 'Admin confirmed user compromised' is shown in the tab 'Risk detections not linked to a sign-in'
in the 'Risky users' report.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-risk-
feedback
In Azure. AD Identity Protection, you configure a user risk policy that has the following settings:
✑ Assignments:
- Users: Group1
- User risk: Low and above
✑ Controls:
- Access: Block access
✑ Enforce policy: On
In Azure AD Identify Protection, you configure a sign-in risk policy that has the following settings:
✑ Assignments:
- Users: Group2
- Sign-in risk: Low and above
✑ Controls:
- Access: Require multi-factor authentication
✑ Enforce policy: On
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
So user1 gets only user risk policy —> not affected, can login YES
User2 affected by the sign-in risk policy, and has no MFA so cannot login NO
User 3 gets both policies, but only policy 2 is used for the anonymous IP, and he has MFA, so can login YES
Ref: https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-
risks
Answer: A
Explanation:
A one-gate policy requires one piece of authentication data, such as an email address or phone number.
A one-gate policy applies in the following circumstances:
It's within the first 30 days of a trial subscription; or
A custom domain hasn't been configured for your Azure AD tenant so is using the default *.onmicrosoft.com.
The default *.onmicrosoft.com domain isn't recommended for production use; and Azure AD Connect isn't
synchronizing identities.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-sspr-policy#administrator-re
set-policy-differences
The tenant has the authentication methods shown in the following table.
Which users will sign in to cloud apps by matching a number shown in the app with a number shown on their
phone?
A. User1 only
B. User2 only
C. User3 only
D. User1 and User2 only
E. User2 and User3 only
Answer: A
Explanation:
Microsoft Authenticator -
You can also allow your employee's phone to become a passwordless authentication method. You may already
be using the Authenticator app as a convenient multi-factor authentication option in addition to a password.
You can also use the Authenticator App as a passwordless option.
The Authenticator App turns any iOS or Android phone into a strong, passwordless credential. Users can sign
in to any platform or browser by getting a notification to their phone, matching a number displayed on the
screen to the one on their phone, and then using their biometric (touch or face) or PIN to confirm.
Incorrect:
* Not User2
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-passwordles
s
You need to evaluate which policies will be applied to User1 when User1 attempts to sign-in from various IP
addresses.
Which feature should you use?
A. Access reviews
B. Identity Secure Score
C. The What If tool
D. the Microsoft 365 network connectivity test tool
Answer: C
Explanation:
The Azure AD conditional access What if tool allows you to understand the impact of your conditional access
policies on your environment. Instead of test driving your policies by performing multiple sign-ins manually,
this tool enables you to evaluate a simulated sign-in of a user. The simulation estimates the impact this sign-in
has on your policies and generates a simulation report. The report does not only list the applied conditional
access policies but also classic policies if they exist.
Reference:
https://azure.microsoft.com/en-us/updates/azure-ad-conditional-access-what-if-tool-is-now-available
A. an app password
B. voice
C. Windows Hello for Business
D. security questions
Answer: C
Explanation:
App Passwords are a legacy feature for old Office versions. Windows Hello is the way to go.
Answer: A
Explanation:
The Azure AD conditional access What if tool allows you to understand the impact of your conditional access
policies on your environment. Instead of test driving your policies by performing multiple sign-ins manually,
this tool enables you to evaluate a simulated sign-in of a user. The simulation estimates the impact this sign-in
has on your policies and generates a simulation report. The report does not only list the applied conditional
access policies but also classic policies if they exist.
Reference:
https://azure.microsoft.com/en-us/updates/azure-ad-conditional-access-what-if-tool-is-now-available
Answer:
Explanation:
Box 1: No -
Note: The trusted IPs feature of Azure AD Multi-Factor Authentication bypasses multi-factor authentication
prompts for users who sign in from a defined IP address range. You can set trusted IP ranges for your on-
premises environments. When users are in one of these locations, there's no Azure AD Multi-Factor
Authentication prompt. The trusted IPs feature requires Azure AD Premium P1 edition.
Box 2: Yes (although the request is from a trusted location, that doesn't mean the MFA prompt will be
bypassed! If there was CA policy configured to require MFA with the trusted locations EXCLUDED, then the
user would not get the MFA prompt)
Box 3: No (request is coming from the IP that is added to the MFA trusted IPs list in the legacy MFA portal
https://account.activedirectory.windowsazure.com/UserManagement/MfaSettings.aspx)
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings
Which users will receive a one-time passcode, and how long will the passcode be valid? To answer, select the
appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
Box 1: Guest3 only -
When does a guest user get a one-time passcode?
When a guest user redeems an invitation or uses a link to a resource that has been shared with them, they'll
receive a one-time passcode if:
They don't have an Azure AD account
They don't have a Microsoft account
The inviting tenant didn't set up federation with social (like Google) or other identity providers.
Box 2: 30 minutes -
One-time passcodes are valid for 30 minutes. After 30 minutes, that specific one-time passcode is no longer
valid, and the user must request a new one. User sessions expire after 24 hours. After that time, the guest
user receives a new passcode when they access the resource. Session expiration provides added security,
especially when a guest user leaves their company or no longer needs access.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/one-time-passcode
You currently allow email clients that use Basic authentication to connect to Microsoft Exchange Online.
You need to ensure that users can connect to Exchange only from email clients that use Modern authentication
protocols.
Answer: B
Explanation:
https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/block-legacy-authentication
You deploy an Azure App Service web app named App1 that provides product information to users that connect to
App1 anonymously.
You need to provide App1 with access to db1. The solution must meet the following requirements:
Answer: A
You need to create a custom Azure subscription role named Role3 by using the Azure portal. Role3 will use the
baseline permissions of an existing role.
A. Role2 only
B. built-in Azure subscription roles only
C. built-in Azure subscription roles and Role2 only
D. built-in Azure subscription roles and built-in Azure AD roles only
E. Role1, Role2, built-in Azure subscription roles, and built-in Azure AD roles
Answer: C
Explanation:
The answer is correct. C. tested in the lab. You can clone Role2 (CustomRole) and Azure Built-in Roles
It's unclear if the question asks which roles can be cloned from a single action or in general, but I'd say the
latter. So, both custom and Azure built-in roles can be cloned - https://learn.microsoft.com/en-us/azure/role-
based-access-control/custom-roles-portal#clone-a-role
The users frequently work from remote locations that do not have Wi-Fi access or mobile phone connectivity. While
working from the remote locations, the users connect their laptops to a wired network that has internet access.
Which MFA authentication method can the users use from the remote location?
Answer: A
Explanation:
A. Windows Hello for businnes > app pasword. This question comes up several times and many users indicate
that Windows hello for business is what should be the answer.
The users frequently work from remote locations that do not have Wi-Fi access or mobile phone connectivity. While
working from the remote locations, the users connect their laptops to a wired network that has internet access.
Which MFA authentication method can the users use from the remote location?
A. voice
B. Windows Hello for Business
C. email
D. security questions
Answer: B
Explanation:
You have an Azure subscription that contains the following virtual machine:
• Name: V1
• Azure region: East US
• System-assigned managed identity: Disabled
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Explanation:
https://learn.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/managed-
identities-faq#can-the-same-managed-identity-be-used-across-multiple-regions
You have an Azure subscription that contains the key vaults shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Answer:
Explanation:
Yes - Key Vault Administrator can perform all data plane operations on a key vault.
NB: Purge protection is an optional Key Vault behavior and is not enabled by default.
NB: Also the Key Vault contributor role doesn't allow to get access to certificate
A. password spray
B. anonymous IP address
C. unfamiliar sign-in properties
D. Azure AD threat intelligence
Answer: D
Explanation:
- Anonymous IP address
- Atypical travel
- Impossible travel
- Malicious IP
- Malware linked IP
- New country
- Password spray
- Suspicious browser
- Leaked credentials
https://learn.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-
risks
You configure self-service password reset (SSPR) by using the following settings:
A. a smartcard
B. a mobile app code
C. a mobile app notification
D. an email to an address outside your organization
Answer: B
Explanation:
https://learn.microsoft.com/en-us/azure/active-directory/authentication/concept-sspr-howitworks#mobile-
app-and-sspr
When using a mobile app as a method for password reset, like the Microsoft Authenticator app, the following
considerations apply:
- When administrators require one method be used to reset a password, verification code is the only option
available.
- When administrators require two methods be used to reset a password, users are able to use notification OR
verification code in addition to any other enabled methods.
You need to ensure that when users connect to the Microsoft 365 portal from an anonymous IP address, they are
prompted to use multi-factor authentication (MFA).
Answer: A
Explanation:
Anonymous IP address
Atypical travel
Leaked credentials
Password spray
You configure a conditional access policy as shown in the Conditional Access policy exhibit. (Click the Conditional
Access policy tab.)
You view the User administrator role settings as shown in the Role setting details exhibit. (Click the Role setting
details tab.)
You view the User administrator role assignments as shown in the Role assignments exhibit. (Click the Role
assignments tab.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Answer:
You have an Azure AD tenant that contains the users shown in the following table.
You have the Azure AD Identity Protection policies shown in the following table.
You review the Risky users report and the Risky sign-ins report and perform actions for each user as shown in the
following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Answer:
Explanation:
Risk level of User2 is High due to the last action, so User risk policy block the access
YES - User3 has "Dismiss risk User" so User Risk policy is bypassed.
anonymous IP address is a risk, but context is missing to know if it's considered as an high risk.
Maybe it's an outdated question when there were fix values defined by Microsoft for risk type.
https://www.rebeladmin.com/2020/11/step-by-step-guide-how-to-configure-sign-in-risk-based-azure-
conditional-access-policies/
A. Application developer
B. Cloud application administrator
C. Service support administrator
D. Application administrator
Answer: D
Explanation:
Cloud Application Administrator = Can create and manage all aspects of app registrations and enterprise
apps ***except App Proxy***.
Service Support Administrator = Can read service health information and manage support tickets.
Application Developer = Can create application registrations independent of the 'Users can register
applications' setting.
https://learn.microsoft.com/en-us/azure/active-directory/roles/permissions-reference
• Ensure that users can sign in to Azure virtual machines by using their Microsoft 365 credentials.
• Delegate the ability to create new virtual machines.
What should you use for each requirement? To answer, drag the appropriate features to the correct requirements.
Each feature may be used once, more than once, or not at all. You may need to drag the split bar between panes or
scroll to view content.
Answer:
Explanation:
1. Azure RBAC
https://learn.microsoft.com/en-us/azure/active-directory/devices/howto-vm-sign-in-azure-ad-
windows#configure-role-assignments-for-the-vm
https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles
Question: 126 Exam Heist
You have a Microsoft 365 tenant.
The users frequently work from remote locations that do not have Wi-Fi access or mobile phone connectivity. While
working from the remote locations, the users connect their laptops to a wired network that has internet access.
Which MFA authentication method can the users use from the remote location?
Answer: D
Explanation:
Your network contains an on-premises Active Directory Domain Services (AD DS) domain that syncs with an Azure
AD tenant. The AD DS domain contains the organizational units (OUs) shown in the following table.
Where should you create BreakGlass, and which role should you assign to BreakGlass? To answer, select the
appropriate options in the answer area.
Explanation:
https://learn.microsoft.com/en-us/azure/active-directory/roles/security-emergency-access#how-to-create-
an-emergency-access-account
Question: 128 Exam Heist
You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1.
You need to ensure that users can request access to Site1. The solution must meet the following requirements:
Answer: B
Explanation:
https://learn.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-access-
package-create
You need to create two custom roles named Role1 and Role2. The solution must meet the following requirements:
•Users that are assigned Role1 can manage application security groups.
•Users that are assigned Role2 can manage Azure Firewall.
Which resource provider permissions are required for each role? To answer, select the appropriate options in the
answer area.
Explanation:
https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-
operations#microsoftnetwork
Question: 130 Exam Heist
You have a Microsoft 365 tenant.
The users frequently work from remote locations that do not have Wi-Fi access or mobile phone connectivity. While
working from the remote locations, the users connect their laptop to a wired network that has internet access.
Which MFA authentication method can the users use from the remote location?
A. voice
B. an app password
C. security questions
D. a verification code from the Microsoft Authenticator app
Answer: D
Explanation:
The Authenticator app can be used as a software token to generate an OATH verification code. After entering
your username and password, you enter the code provided by the Authenticator app into the sign-in interface.
Incorrect Answers:
B: Security questions are not used as an authentication method but can be used during the self-service
password reset (SSPR) process.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-methods
You need to enable real-time session-level monitoring of App1 by using Microsoft Defender for Cloud Apps.
In which order should you perform the actions? To answer, move the appropriate actions from the list of actions to
the answer area and arrange them in the correct order.
Answer:
Explanation:
1. Publish App1.2. Create a conditional access policy that has session controls configured.3. From MCAS
modify the Connected apps settings4. From MCAS create a session policyReference -
https://techcommunity.microsoft.com/t5/itops-talk-blog/step-by-step-blocking-data-downloads-via-
microsoft-cloud-app/ba-p/326357
Case Study
-
Overview
-
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with the
adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security defaults
disabled.
•Multiple users in the sales department have up to five devices. The sales department users report that sometimes
they must contact the support department to join their devices to the Azure AD tenant because they have reached
their device limit.
•A recent security incident reveals that several users leaked their credentials, a suspicious browser was used for a
sign-in, and resources were accessed from an anonymous IP address.
•When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear in the
selection list.
•Anyone in the organization can invite guest users, including other guests and non-administrators.
•The helpdesk spends too much time resetting user passwords.
•Users currently use only passwords for authentication.
•Users assigned the User administrator role must be able to request permission to use the role when needed for up
to one year.
•Users must be prompted to register for MFA and provided with an option to bypass the registration for a grace
period.
•Users must provide one authentication method to reset their password by using SSPR. Available methods must
include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
•Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
•The principle of least privilege must be used.
What occurs when User3 attempts to use SSPR? To answer, select the appropriate options in the answer area.
Answer:
Question: 133 Exam Heist
HOTSPOT
-
Case Study
-
Overview
-
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with the
adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security defaults
disabled.
•Multiple users in the sales department have up to five devices. The sales department users report that sometimes
they must contact the support department to join their devices to the Azure AD tenant because they have reached
their device limit.
•A recent security incident reveals that several users leaked their credentials, a suspicious browser was used for a
sign-in, and resources were accessed from an anonymous IP address.
•When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear in the
selection list.
•Anyone in the organization can invite guest users, including other guests and non-administrators.
•The helpdesk spends too much time resetting user passwords.
•Users currently use only passwords for authentication.
•Users assigned the User administrator role must be able to request permission to use the role when needed for up
to one year.
•Users must be prompted to register for MFA and provided with an option to bypass the registration for a grace
period.
•Users must provide one authentication method to reset their password by using SSPR. Available methods must
include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
•Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
•The principle of least privilege must be used.
You need to support the planned changes and meet the technical requirements for MFA.
Which feature should you use, and how long before the users must complete the registration? To answer, select
the appropriate options in the answer area.
Answer:
Explanation:
Box1: MFA registration policyBox2: 14 days Azure AD Identity Protection will prompt your users to register the
next time they sign in interactively and they'll have 14 days to complete registration. During this 14-day period,
they can bypass registration if MFA isn't required as a condition, but at the end of the period they'll be
required to register before they can complete the sign-in process.
https://learn.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-
configure-mfa-policy#user-experience
Case Study
-
Overview
-
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with the
adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security defaults
disabled.
•Multiple users in the sales department have up to five devices. The sales department users report that sometimes
they must contact the support department to join their devices to the Azure AD tenant because they have reached
their device limit.
•A recent security incident reveals that several users leaked their credentials, a suspicious browser was used for a
sign-in, and resources were accessed from an anonymous IP address.
•When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear in the
selection list.
•Anyone in the organization can invite guest users, including other guests and non-administrators.
•The helpdesk spends too much time resetting user passwords.
•Users currently use only passwords for authentication.
•Users assigned the User administrator role must be able to request permission to use the role when needed for up
to one year.
•Users must be prompted to register for MFA and provided with an option to bypass the registration for a grace
period.
•Users must provide one authentication method to reset their password by using SSPR. Available methods must
include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
•Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
•The principle of least privilege must be used.
What should you configure for each incident? To answer, drag the appropriate policy types to the correct issues.
Each policy type may be used once, more than once, or not at all. You may need to drag the split bar between
panes or scroll to view content.
You need to identify the cause of the error. The solution must minimize administrative effort.
A.Log Analytics
B.sign-in logs
C.audit logs
D.provisioning logs
Answer: B
Explanation:
sign-in logs
You need prevent users from signing in to Yammer from high-risk locations.
What should you do in the Microsoft Defender for Cloud Apps portal?
Answer: A
Explanation:
https://learn.microsoft.com/en-us/defender-cloud-apps/access-policy-aad
Question: 137 Exam Heist
You have a Microsoft 365 tenant.
The users frequently work from remote locations that do not have Wi-Fi access or mobile phone connectivity. While
working from the remote locations, the users connect their laptop to a wired network that has internet access.
Which MFA authentication method can the users use from the remote location?
A.SMS
B.email
C.security questions
D.a verification code from the Microsoft Authenticator app
Answer: D
Explanation:
A.impossible travel
B.anonymous IP address
C.malicious IP address
D.Azure AD threat intelligence
Answer: D
Explanation:
https://learn.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-
risks
You configure self-service password reset (SSPR) by using the following settings:
Answer: A
Explanation:
You configure self-service password reset (SSPR) by using the following settings:
Answer: B
Explanation:
Reference:
https://learn.microsoft.com/en-us/azure/active-directory/authentication/concept-sspr-
howitworks#authentication-methods
From Entitlement management, you plan to create a catalog named Catalog1 that will contain a custom extension.
What should you create first, and what should you use to distribute Catalog1? To answer, select the appropriate
options in the answer area.
Which users must use security questions when resetting their password?
A.User4 only
B.User3 and User4 only
C.User1 and User4 only
D.User1, User3, and User4 only
E.User1, User2, User3, and User4
Answer: B
Explanation:
Correct answer.Basically, some administrative roles, by design can only use strong, two-gate password reset
policy, regardles of SSPR settings. User Administrator and Password Administrator will be always forced to
use two methods and cannot use security questions. Securiry Reader and User will use whatever is set under
SSPR, so security questions in this case.
https://learn.microsoft.com/en-us/azure/active-directory/authentication/concept-sspr-policy#administrator-
reset-policy-differences
You need to implement smart lockout with a lockout threshold of 10 failed sign-ins.
A.Authentication strengths
B.Password protection
C.User risk policy
D.Sign-in risk policy
Answer: B
Explanation:
You need to ensure that you can control access to Microsoft 365 resources by using conditional access policies.
Answer: A
Explanation:
An on-premises Active Directory domain is configured to sync with the Azure AD tenant. The domain contains the
servers shown in the following table.
You deploy a new server named Server4 that runs Windows Server 2022.
You need to ensure that Azure AD Password Protection will continue to work if a single server fails.
A.Azure AD Connect
B.Azure AD Application Proxy
C.Password Change Notification Service (PCNS)
D.the Azure AD Password Protection proxy service
Answer: D
Explanation:
https://learn.microsoft.com/en-us/entra/identity/authentication/concept-password-ban-bad-on-
premises#how-microsoft-entra-password-protection-works
The users frequently work from remote locations that do not have Wi-Fi access or mobile phone connectivity. While
working from the remote locations, the users connect their laptops to a wired network that has internet access.
Which MFA authentication method can the users use from the remote location?
A.voice
B.email
C.security questions
D.a verification code from the Microsoft Authenticator app
Answer: D
Explanation:
You have an Azure subscription that contains the resources shown in the following table.
You need to configure access to Vault1. The solution must meet the following requirements:
Which role should you assign to each user? To answer select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Answer:
Answer: AE
Explanation:
1. A. a FIDO2 security key: Users can use a FIDO2 security key, which is a hardware device that provides strong
authentication, typically in the form of a USB key or a biometric-enabled key.E. the Microsoft Authenticator
app: Users can use the Microsoft Authenticator app, which supports multi-factor authentication (MFA) and
can generate one-time passcodes or be used for push notifications for MFA approval.So, User1 can use these
two methods to complete the combined registration process.
Admin1 uses the Require password change for high-risk users policy template to create a new Conditional Access
policy.
Who is included and excluded by default in the policy assignment? To answer, drag the appropriate options to the
correct target. Each option may be used once, more than once, or not at all. You may need to drag the split bar
between panes or scroll to view content.
Answer:
Question: 150 Exam Heist
You have a Microsoft 365 tenant.
The users frequently work from remote locations that do not have Wi-Fi access or mobile phone connectivity. While
working from the remote locations, the users connect their laptops to a wired network that has internet access.
Which MFA authentication method can the users use from the remote location?
A.SMS
B.Windows Hello for Business
C.voice
D.a notification through the Microsoft Authenticator app
Answer: B
Explanation:
B. Windows Hello for Business. It's the only option when no internet connectivity or access to a mobile phone
device.
You currently allow email clients that use Basic authentication to connect to Microsoft Exchange Online.
You need to ensure that users can connect to Exchange Online only from email clients that use Modern
authentication protocols.
Answer: A
Explanation:
Which multifactor authentication (MFA) method will be enabled by default for the tenant?
A.Microsoft Authenticator
B.SMS
C.voice call
D.email OTP
Answer: A
Explanation:
Reference:
https://learn.microsoft.com/en-us/azure/active-directory/authentication/tutorial-enable-azure-mfa
You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1 and the
users shown in the following table.
•Name: CAPolicy1
•Assignments
oUsers or workload identities: Group1
oCloud apps or actions: Office 365 SharePoint Online
oConditions
Filter for devices: Exclude filtered devices from the policy
Rule syntax: device.displayName -startsWith “Device”
oAccess controls
Grant: Block access
Session: 0 controls selected
oEnable policy: On
•Name: CAPolicy2
•Assignments
oUsers or workload identities: Group2
oCloud apps or actions: Office 365 SharePoint Online
oConditions: 0 conditions selected
•Access controls
oGrant: Grant access
Require multifactor authentication
oSession: 0 controls selected
•Enable policy: On
All users confirm that they can successfully authenticate using MFA.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Answer:
Explanation:
yes
yes
yes
You have a Conditional Access policy that has the following settings:
•Name: CA1
•Assignments
oUsers and groups: User1, User2, User3
oCloud apps or actions: SharePoint - Site1
•Access controls
oSession: Use app enforced restrictions
From the SharePoint admin center, you configure Access control for unmanaged devices to allow limited, web-only
access.
A.User1 only
B.User2 only
C.User3only
D.User1 and User2 only
E.User1, User2, and User3
Answer: B
Explanation:
You need to ensure that Admin1 can enable Security defaults for contoso.com.
A.Delete Package1.
B.Delete CAPolicy1.
C.Assign Admin1 the Authentication Administrator role for Au1.
D.Configure Identity Governance.
Answer: B
Explanation:
The correct answer is B. Delete CAPolicy1.To enable Security defaults for contoso.com, Admin1 must be
assigned at least the Security Administrator role1. However, this role is not available in the list of roles for Au1,
which is the only authentication method for contoso.com. This is because Au1 has a Conditional Access policy
named CAPolicy1 that blocks legacy authentication protocols2. Security defaults also block legacy
authentication protocols, so they cannot be enabled if there is an existing Conditional Access policy that does
the same3.Therefore, to enable Security defaults, Admin1 must first delete CAPolicy1 from Au1. This will allow
Admin1 to sign in to contoso.com using a legacy authentication protocol and then assign themselves the
Security Administrator role. After that, Admin1 can enable Security defaults for contoso.com.
You have an Azure subscription that is linked to an Azure AD tenant named contoso.com. The subscription contains
a group named Group1 and a virtual machine named VM1.
How should you complete the PowerShell script? To answer, drag the appropriate cmdlets to the correct targets.
Each cmdlet may be used once, more than once or not at all. You may need to drag the split bar between panes or
scroll to view content.
When users attempt to provide App1 with access to the tenant, the attempt fails.
You need to ensure that the users can request admin consent for App1. The solution must follow the principle of
least privilege.
Answer: A
Explanation:
To ensure that users can request admin consent for App1 in your Azure AD tenant, you should first enable
admin consent requests for the tenant. Enabling admin consent requests allows users to initiate the process
of requesting admin consent for applications that require it. By default, users do not have the ability to grant
admin consent for applications. Enabling this feature ensures that users can request admin consent for App1
without having to rely on an administrator to initiate the process.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not
appear in the review screen.
All users must use the Microsoft Authenticator app for multi-factor authentication (MFA) when accessing
Microsoft 365 services.
Some users report that they received an MFA prompt on their Microsoft Authenticator app without initiating a
sign-in request.
You need to block the users automatically when they report an MFA request that they did not initiate.
Solution: From the Azure Active Directory admin center, you configure the Block/unblock users settings for multi-
factor authentication (MFA).
A.Yes
B.No
Answer: B
Explanation:
Report suspicious activity and the legacy Fraud Alert implementation can operate in parallel. You can keep
your tenant-wide Fraud Alert functionality in place while you start to use Report suspicious activity with a
targeted test group.If Fraud Alert is enabled with Automatic Blocking, and Report suspicious activity is
enabled, the user will be added to the blocklist and set as high-risk and in-scope for any other policies
configured. These users will need to be removed from the blocklist and have their risk remediated to enable
them to sign in with MFA.
https://learn.microsoft.com/en-us/entra/identity/authentication/howto-mfa-mfasettings#report-suspicious-
activity-and-fraud-alert
Answer: A
Explanation:
A.30 days
B.60 days
C.90 days
D.180 days
Answer: A
Explanation:
The retention period for logs of risky user activity in Microsoft Entra varies by report type and license type.
For instance, the risky sign-ins report contains filterable data for up to the past 30 days. However, you can
retain the audit and sign-in activity data for longer than the default retention period by routing it to an Azure
storage account using Azure Monitor.
You have a Microsoft Entra tenant that contains the users shown in the following table.
You have a user risk policy that has the following settings:
•Assignments:
oInclude: Group1
oExclude: Group2
•Sign-in risk: Medium and above
•Access controls:
oGrant access: Require password change
When the users attempt to sign in, user risk levels are detected as shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
You plan to assign the users the following roles for RG1:
•User1: Reader
•User2: Contributor
•User3: Storage Blob Data Reader
•User4: Virtual Machine Contributor
A.User1
B.User2
C.User3
D.User4
Answer: C
Explanation:
Attribute-based access control (ABAC) grants access based on attributes of users, resources, and the
environment.- User roles (User1, User2, User3, User4) are a simpler form of access control.Out of the options,
only Storage Blob Data Reader and Virtual Machine Contributor roles are specific to resource types (Storage
Blob and Virtual Machine). These roles suggest ABAC might be used for finer-grained control.So, the answer
is either C or D.While both Storage Blob Data Reader and Virtual Machine Contributor roles might be used
with ABAC, it's more likely for data access.Therefore, the most likely user to benefit from ABAC is User3:
Storage Blob Data Reader.So the answer is: C. User3.
Answer:
Explanation:
1) You have Go to Azure active directory > under Manage section Password reset blade > Authentication
methods & check the Security Questions
2) Inorder to sync password between Domain & tenant either you have to do password hash sync & Pass
through authentication with password writeback enable in Azure Ad Connect.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-deployment
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-security-
questions
Answer:
Explanation:
Microsoft Cloud App Security. It's now called Microsoft Defender for Cloud Apps
you can set permission policies so that you get automated notifications when an OAuth app meets certain
criteria.
Malicious OAuth app consent Scans OAuth apps connected to your environment and triggers an alert when a
potentially malicious app is authorized.
Reference:
https://docs.microsoft.com/en-us/cloud-app-security/app-permission-policy
Explanation:
Reference:
https://docs.microsoft.com/en-us/cloud-app-security/create-snapshot-cloud-discovery-reports#using-traffic-
logs-for-cloud-discovery
The Active Directory forest syncs to an Azure Active Directory (Azure AD) tenant. Multi-factor authentication
(MFA) is enforced for Azure AD.
You need to ensure that you can publish App1 to Azure AD users.
What should you configure on Server4 and Firewall1? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/application-proxy
You purchase two cloud apps named App1 and App2. The global administrator registers App1 in Azure AD.
You need to identify who can assign users to App1, and who can register App2 in Azure AD.
What should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
Only administrators (Admin1 - Application Administrator & Admin3 - Cloud application administrator) can
manage/configure apps.
Name: Cloud application administrator
Description: Users in this role can add, manage, and configure enterprise applications, app registrations but
will not be able to configure or manage on-premises like app proxy.
Azure AD - User settings - App registration: default is Yes (If this option is set to yes, then non-admin users
may register custom-developed applications for use within this directory.)
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/add-application-portal-assign-users
https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-how-applications-are-
added
Explanation:
1)The valid Answer is All user can access app by using hompage url.
2) only assigned users and group will able to access through myapps.microsoft.com
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/add-application-portal-configure
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/assign-user-or-group-access-portal
Answer: A
Explanation:
Correct Answer. A
I just tried this in my company's tenancy. User assignment and Visible to Users goes hand in hand for this.
If Visible to Users is set to Yes then this is the explanation from the 'i' next to it:
If this option is set to yes, then assigned users will see the application on My Apps and O365 app launcher. If
this option is set to no, then no users will see this application on their My Apps and O365 launcher. Assigned
User is the key here.
Unless the users are assigned to the app, then No one will see the application on their MyApps or O365
Launcher. Provided Answer is Correct!
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/assign-user-or-group-access-portal
https://docs.microsoft.com/en-us/azure/active-directory/user-help/my-applications-portal-workspaces
Answer: B
Explanation:
Description: Users in this role will continue to be able to register app registrations even if the Global Admin
has turned off the tenant level switch for "Users can register apps".
Application Developer Can create application registrations independent of the 'Users can register
applications' setting.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference
https://docs.microsoft.com/en-us/azure/active-directory/roles/delegate-app-roles
You create an enterprise application named App1 as shown in the App1 Properties exhibit. (Click the App1
Properties tab.)
You configure self-service for App1 as shown in the App1 Self-service exhibit. (Click the App1 Self-service tab.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
1. NO - Only direct members will have access. Approved users will be added to Group 1.
2. Yes - The approver will automatically become owner of the Group 1 after self service is configured.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/assign-user-or-group-access-portal
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/add-application-portal-assign-users
Question: 172 Exam Heist
You have an Azure Active Directory (Azure AD) tenant named contoso.com that has Azure AD Identity Protection
enabled.
You need to implement a sign-in risk remediation policy without blocking user access.
What should you do first?
Answer: D
Explanation:
MFA and SSPR are both required. However, MFA is required first.
Azure AD MFA can be triggered, allowing to user to prove it's them by using one of their registered
authentication methods, resetting the sign in risk.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-
configure-risk-policies
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-
remediate-unblock https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-
deployment
Explanation:
Service1 support OAuth for Authentication & authorization, however service1 is published in Azure AD gallery,
hence we will use An enterprise application in Azure AD blade to register for SSO.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-how-applications-are-
added https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/require-managed-devices
A. Self-service
B. Provisioning
C. Application proxy
D. Roles and administrators
Answer: A
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/manage-self-service-access
Answer:
Explanation:
Reference:
https://docs.microsoft.com/en-us/graph/auth/auth-concepts
A. tags
B. collections
C. naming policies
D. dynamic groups
Answer: B
Explanation:
In the My Apps portal, applications appear in default collections and your custom app collections. The Apps
collection in My Apps is a default collection that contains all the applications that have been assigned to you,
sorted alphabetically.
Reference:
https://support.microsoft.com/en-us/account-billing/customize-app-collections-in-the-my-apps-portal-
2dae6b8a-d8b0-4a16-9a5d-71ed4d6a6c1d
Question: 177 Exam Heist
The Azure Active Directory (Azure AD) tenant contains the groups shown in the following table.
A. Group1 only
B. Group2 only
C. Group3 only
D. Group1 and Group4
E. Group1 and Group3
Answer: D
Explanation:
- Nested group memberships and Microsoft 365 groups aren't currently supported.
https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/assign-user-or-group-access-portal?
pivots=portal
A. User1
B. User2
C. Admin1
D. Admin2
Answer: C
Explanation:
To approve requests, a reviewer must be a global administrator, cloud application administrator, or application
administrator.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/configure-admin-consent-workflow
Answer: A
Explanation:
Microsoft Office 2013 on Microsoft Windows computers supports Modern authentication. But, to turn it on,
you need to configure the following registry keys
https://learn.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/enable-modern-
authentication?view=o365-worldwide
You need to create a Microsoft Defender for Cloud Apps session policy.
A. From the Microsoft Defender for Cloud Apps portal, select User monitoring.
B. From the Microsoft Defender for Cloud Apps portal, select App onboarding/maintenance.
C. From the Azure Active Directory admin center, create a Conditional Access policy.
D. From the Microsoft Defender for Cloud Apps portal, create a continuous report.
Answer: C
Explanation:
From the Azure Active Directory admin center, create a Conditional Access policy.
You add an enterprise application named App1 to Azure AD and set User1 as the owner of App1. App1 requires
admin consent to access Azure AD before the app can be used.
You configure the Admin consent requests settings as shown in the following exhibit.
Admin1, Admin2, Admin3, and User’ are added as reviewers.
Which users can review and approve the admin consent requests?
A. Admin1 only
B. Admin1, Admin2 and Admin3 only
C. Admin1, Admin2, and User1 only
D. Admin1 and Admin2 only
E. Admin1, Admin2, Admin3, and User1
Answer: D
Explanation:
https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/configure-admin-consent-workflow
"To approve requests, a reviewer must be a global administrator, cloud application administrator, or
application administrator. The reviewer must already have one of these admin roles assigned; simply
designating them as a reviewer doesn't elevate their privileges."
Which type of policy should you create in the Microsoft Defender for Cloud Apps portal?
A. session policy
B. activity policy
C. file policy
D. anomaly detection policy
Answer: B
Explanation:
https://learn.microsoft.com/en-us/defender-cloud-apps/user-activity-policies
You need to prevent users from printing the files directly from Site1.
Which type of policy should you create in the Microsoft Defender for Cloud Apps portal?
A. activity policy
B. access policy
C. file policy
D. session policy
Answer: D
Explanation:
Correct
https://learn.microsoft.com/en-us/defender-cloud-apps/session-policy-aad
You need to block access to cloud apps when a user is assessed as high risk.
Which type of policy should you create in the Microsoft Defender for Cloud Apps portal?
A. access policy
B. OAuth app policy
C. anomaly detection policy
D. activity policy
Answer: A
You need to configure an alert that will be triggered when an app requires high permissions and is authorized by
more than 20 users.
Which type of policy should you create in the Microsoft Defender for Cloud Apps portal?
Answer: B
Explanation:
https://learn.microsoft.com/en-us/defender-cloud-apps/app-permission-policy
In addition to the existing investigation of OAuth apps connected to your environment, you can set permission
policies so that you get automated notifications when an OAuth app meets certain criteria. For example, you
can automatically be alerted when there are apps that require a high permission level and were authorized by
more than 50 users
Which user can create appointments in the calendar of each user at the company?
A. User1
B. User2
C. User3
D. User4
Answer: B
Explanation:
User2 is the only one who has access to Application.write for the calendar.
What is the maximum number of days you have to restore the app registration from when it was deleted?
A. 14
B. 30
C. 60
D. 180
Answer: B
Explanation:
30 is a correct answer.
Sometimes, users use external, third-party applications that require limited access to the Microsoft 365 data of
the respective user. The users register the applications in Azure AD.
You need to receive an alert if a registered application gains read and write access to the users’ email.
What should you do? To answer, select the appropriate options in the answer area.
Overview -
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with the
adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security defaults
disabled.
•Multiple users in the sales department have up to five devices. The sales department users report that sometimes
they must contact the support department to join their devices to the Azure AD tenant because they have reached
their device limit.
•A recent security incident reveals that several users leaked their credentials, a suspicious browser was used for a
sign-in, and resources were accessed from an anonymous IP address.
•When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear in the
selection list.
•Anyone in the organization can invite guest users, including other guests and non-administrators.
•The helpdesk spends too much time resetting user passwords.
•Users currently use only passwords for authentication.
•Users assigned the User administrator role must be able to request permission to use the role when needed for up
to one year.
•Users must be prompted to register for MFA and provided with an option to bypass the registration for a grace
period.
•Users must provide one authentication method to reset their password by using SSPR. Available methods must
include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
•Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
•The principle of least privilege must be used.
You need implement the planned changes for application access to organizational data.
A.authentication methods
B.the User consent settings
C.access packages
D.an application proxy
Answer: C
Explanation:
1. Azure Portal> Azure AD > Identity Governance > (Entitlement Management Heading) Access Packages > +
New Access Package (from the top bar) > (Resources tab) + Applications > (Requests tab) in the section "users
who can requests" we check box " for users in your directory), and then "all members(incl. guests), and then in
the section " approval, we select "Yes" ..etc
You need to ensure that the users can only provide consent to apps that require low impact permissions.
Answer: D
Explanation:
1. I go with Dhttps://learn.microsoft.com/en-us/azure/active-directory/manage-apps/configure-permission-
classifications?pivots=portal
You have a Microsoft 365 E5 subscription that contains a user named User1.
User1 needs to view the App governance dashboard. The solution must use the principle of the least privilege.
Which role should you assign to User1, and which portal should User1 use to view the dashboard? To answer, select
the appropriate options in the answer area.
Explanation:
https://learn.microsoft.com/en-us/defender-cloud-apps/app-governance-get-started#roles
Question: 192 Exam Heist
You have an Azure subscription.
You need to ensure that the apps support automatic provisioning of Azure AD users.
A.OAuth 2.0
B.WS-Fed
C.SCIM 2.0
D.LDAP 3
Answer: C
Explanation:
Chttps://learn.microsoft.com/en-us/azure/active-directory/app-provisioning/user-provisioningor
https://techcommunity.microsoft.com/t5/security-compliance-and-identity/provisioning-with-scim-getting-
started/ba-p/880010
Answer: D
Explanation:
The users frequently work from remote locations that do not have Wi-Fi access or mobile phone connectivity. While
working from the remote locations, the users connect their laptops to a wired network that has internet access.
Answer: D
Explanation:
You discover that a large number of new apps were added to the tenant.
A.From the Microsoft Defender for Cloud Apps portal, create a Cloud Discovery anomaly detection policy.
B.From the Microsoft Entra admin center, configure the Admin consent settings.
C.From the Microsoft Defender for Cloud Apps portal, configure an app connector.
D.From the Microsoft Entra admin center, configure an access review.
Answer: B
Explanation:
From the Microsoft Entra admin center, configure the Admin consent settings.
Reference:
https://practical365.com/use-azure-ad-admin-consent-requests-to-help-avoid-attacks-against-your-users/
Explanation:
Reference:
https://learn.microsoft.com/en-us/defender-cloud-apps/app-governance-get-started#turn-on-app-
governance
You need to create a Microsoft Defender for Cloud Apps access policy for App1.
Answer: D
Explanation:
Reference:
https://learn.microsoft.com/en-us/defender-cloud-apps/proxy-intro-aad#how-it-works
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure AD tenant named
fabrikam.com.
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The domain
contains an organizational unit (OU) named Contoso_Resources. The Contoso_Resources OU contains all users and
computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
Contoso also includes a marketing department that has users in each office.
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Azure AD Connect is configured between Azure AD and Active Directory Domain Services (AD DS). Only the
Contoso_Resources OU is synced.
Helpdesk administrators routinely use the Microsoft 365 admin center to manage user settings.
User administrators currently use the Microsoft 365 admin center to manually assign licenses. All users have all
licenses assigned besides the following exceptions:
•The users in the London office have the Microsoft 365 Phone System license unassigned.
•The users in the Seattle office have the Yammer Enterprise license unassigned.
Contoso uses Azure AD Privileged Identity Management (PIM) to protect administrative roles.
•Currently, all the helpdesk administrators can manage user licenses throughout the entire Microsoft 365 tenant.
•The user administrators report that it is tedious to manually configure the different license requirements for each
Contoso office.
•The helpdesk administrators spend too much time provisioning internal and guest access to the required
Microsoft 365 services and apps.
•Currently, the helpdesk administrators can perform tasks by using the User administrator role without
justification or approval.
•When the Logs node is selected in Azure AD, an error message appears stating that Log Analytics integration is
not enabled.
Contoso plans to acquire a company named A. Datum Corporation. One hundred new A. Datum users will be
created in an Active Directory OU named Adatum. The users will be located in London and Seattle.
You need to meet the planned changes and technical requirements for App1.
Answer: D
Explanation:
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not
appear in the review screen.
You have an Amazon Web Services (AWS) account, a Google Workspace subscription, and a GitHub account.
You need to ensure that you can monitor OAuth authentication requests by using Microsoft Defender for Cloud
Apps.
Solution: From the Microsoft 365 Defender portal, you add the Google Workspace app connector.
Answer: A
Explanation:
Microsoft Defender for Cloud Apps is now part of Microsoft 365 Defender, which correlates signals from
across the Microsoft Defender suite and provides incident-level detection, investigation, and powerful
response capabilities. For more information, see Microsoft Defender for Cloud Apps in Microsoft 365
Defender.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not
appear in the review screen.
You have an Amazon Web Services (AWS) account, a Google Workspace subscription, and a GitHub account.
You need to ensure that you can monitor OAuth authentication requests by using Microsoft Defender for Cloud
Apps.
Solution: From the Microsoft 365 Defender portal, you add the Microsoft Azure app connector.
A.Yes
B.No
Answer: B
Explanation:
Correct Answer. B, No. The way to manage those third party apps is through the Microsoft Defender for Cloud
Apps -> App Connector. If not, there is no way to detect and investigate them.
https://learn.microsoft.com/en-us/defender-cloud-apps/manage-app-permissions
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not
appear in the review screen.
You have an Amazon Web Services (AWS) account, a Google Workspace subscription, and a GitHub account.
Solution: From the Microsoft 365 Defender portal, you add the Amazon Web Services app connector.
A.Yes
B.No
Answer: B
Explanation:
Reference:
https://learn.microsoft.com/en-us/defender-cloud-apps/manage-app-permissions
You need to ensure that User1 can create Microsoft Defender for Cloud Apps session policies.
A.Create a Conditional Access policy and select Require app protection policy.
B.Create a Conditional Access policy and select Use Conditional Access App Control.
C.Assign the Cloud Application Administrator role to User1.
D.Assign the Cloud App Security Administrator role to User1.
Answer: B
Explanation:
Answer . B. Create a Conditional Access policy and select Use Conditional Access App Control. "The relevant
apps should be deployed with Conditional Access App Control"Make sure you've configured your IdP solution
to work with Defender for Cloud Apps, as follows:- For Azure AD Conditional Access, see Configure
integration with Azure AD- For other IdP solutions, see Configure integration with other IdP solutions"
References:
https://learn.microsoft.com/en-us/defender-cloud-apps/session-policy-aad#prerequisites-to-using-session-
policies
The App registration settings for the Azure AD tenant are configured as shown in the following exhibit.
User1 builds an ASP.NET web app named App1.
You need to ensure that User1 can register App1. The solution must use the principle of least privilege.
A.Application Developer
B.Cloud App Security Administrator
C.Cloud Application Administrator
D.Application Administrator
Answer: A
Explanation:
"Assign the Application Developer role to grant the ability to create application registrations when the Users
can register applications setting is set to No. This role also grants permission to consent on one's own behalf
when the Users can consent to apps accessing company data on their behalf setting is set to No.
"https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/delegate-app-roles#grant-
individual-permissions-to-create-and-consent-to-applications-when-the-default-ability-is-disabled
You have an Azure subscription that contains the resources shown in the following table.
The subscription contains the virtual machines shown in the following table.
Which identities can be assigned the Owner role for RG1, and to which virtual machines can you assign Managed2?
To answer, select the appropriate options in the answer area.
Answer:
Explanation:
Answer: A
Explanation:
A is the right answer>Tested and confirmed you can filter to see apps that require user authentication from
both cloud app catalog and Cloud discovery.
2. To identify which apps do NOT require user authentication in the Microsoft 365 Defender portal, you should
review the cloud app catalog. Reviewing the cloud app catalog in the Microsoft 365 Defender portal provides
you with a comprehensive list of all the apps connected to your Microsoft 365 environment. It allows you to
see which apps require user authentication and which ones do not.
You have a Microsoft Entra tenant that contains multiple storage accounts.
You plan to deploy multiple Azure App Service apps that will require access to the storage accounts.
You need to recommend an identity solution to provide the apps with access to the storage accounts. The solution
must minimize administrative effort.
Which type of identity should you recommend, and what should you recommend using to control access to the
storage accounts? To answer, select the appropriate options in the answer area.
Answer:
Explanation:
system assigned managed identity.
https://learn.microsoft.com/en-us/azure/app-service/scenario-secure-app-access-storage?tabs=azure-portal
You need to ensure that AKS1 can access DB1. The solution must meet the following requirements:
Answer: B
Explanation:
For DB1, assign the Azure Cosmos DB Account Reader Role role.
You need to ensure that WebApp1 can read and write files to storage1 by using the system-assigned managed
identity.
A.data protection
B.a shared access signature (SAS)
C.the Access control (IAM) settings
D.the File share settings
E.access keys
Answer: C
Explanation:
Access control (IAM) settings in Azure allow you to manage access to various resources within your Azure
subscription. If you want to ensure that the WebApp1 web app can read and write files in storage1, you must
grant the web app the appropriate permissions on the storage1 storage account.By configuring access control
(IAM) for the storage account "storage1", you can assign the necessary permissions (such as "Storage Blob
Data Contributor" or "Storage Blob Data Reader") to the web app's managed identity to access the Blob
services can access to read and write files.
You have an Azure subscription named Sub1 that contains a storage account named storage1.
You need to deploy two apps named App1 and App2 that will have the following configurations:
Which type of identity will each app use to access storage1? To answer, select the appropriate options in the
answer area.
Answer:
Question: 210 Exam Heist
HOTSPOT
-
You need to configure app consent for the subscription. The solution must meet the following requirements:
Which portal should you use for each requirement? To answer, select the appropriate options in the answer area.
You plan to deploy an app named App1 that will have the following configurations:
A.application permissions
B.delegated permissions
C.a custom role-based access control (RBAC) role
D.a built-in role-based access control (RBAC) role
Answer: B
Explanation:
Answer: C
Explanation:
See the link "How to deploy terms of use policy in AZAD" referenced in the MS article;
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/terms-of-use
A. Group1 only
B. Group1 and Group4 only
C. Group1 and Group2 only
D. Group1, Group2, Group4, and Group5 only
E. Group1, Group2, Group3, Group4 and Group5
Answer: D
Explanation:
You cannot create access reviews for device groups.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/create-access-review
Answer: B
Explanation:
- When Reviewers is set to Members (Self), then only each individual member can review their own access,
and if they do not then it is reported as no response
- [https://learn.microsoft.com/en-us/azure/active-directory/governance/create-access-review]
(https://learn.microsoft.com/en-us/azure/active-directory/governance/create-access-review)
- [https://learn.microsoft.com/en-us/azure/active-directory/governance/create-access-review]
(https://learn.microsoft.com/en-us/azure/active-directory/governance/create-access-review)
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-start-
security-review
Explanation:
8 hours
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-deployment-
plan
On November 5, 2020, you create and enforce terms of use in contoso.com that has the following settings:
✑ Name: Terms1
✑ Display name: Contoso terms of use
✑ Require users to expand the terms of use: On
✑ Require users to consent on every device: On
✑ Expire consents: On
✑ Expire starting on: December 10, 2020
✑ Frequency: Monthly
On November 15, 2020, User1 accepts Terms1 on Device3.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
Box 1: Yes because User1 has not yet accepted the terms on Device1.
Box 2: No, Answer date is December 11, 2020 expire starting on: December 10, 2020 answer date is December
11, 2020
Box 3: No because User1 has already accepted the terms on Device3. The terms do not expire until December
10 and then monthly after that.
Answer: D
Explanation:
I think the best way to read this question is "What should you configure FIRST for the Security administrator
role assignment?"
You would setup "D. Assignment type to Eligible" so the admins can request the role in future, for a limited
time based on the Role Setting of "Activation maximum duration (hours): 8 (by default)"
Only then would you set "B. Expire active assignments after from the Role settings details"
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure
Answer: C
Explanation:
You can target a group with a conditional policy to detect and remediate the login at the end of each month
Not valid, A, B, D
D admin is not using an app is using a privileged role to use Exchange admin center
A and B No
An access package.
A bundle of resources that a team or project needs and is governed with policies. Access packages are
defined in containers called catalogs.
To reduce the risk of stale access, you should enable periodic reviews of users who have active assignments
to an access package in Azure AD entitlement management
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview
You discover that all access review requests are received by Megan Bowen.
You need to ensure that the manager of each department receives the access reviews of their respective
department.
Solution: You create a separate access review for each role.
Does this meet the goal?
A. Yes
B. No
Answer: B
Explanation:
No - each access review would still send review approval to Megan as no manager has been set for the user
accounts under review.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/create-access-review
A. Yes
B. No
Answer: A
Explanation:
Yes. Megan Bowen is receiving the access reviews because no Managers are set for those users under Job
Info, she is the fallback reviewer. If you set the Manager value to a user, this user will receive the review
instead of Megan Bowen.
Question: 221 Exam Heist
Note: This question is part of a series of questions that present the same scenario. Each question in the series
contains a unique solution that might meet the stated goals. Some question sets might have more than one correct
solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not
appear in the review screen.
You have a Microsoft 365 tenant.
You have 100 IT administrators who are organized into 10 departments.
You create the access review shown in the exhibit. (Click the Exhibit tab.)
You discover that all access review requests are received by Megan Bowen.
You need to ensure that the manager of each department receives the access reviews of their respective
department.
Solution: You set Reviewers to Member (self).
Does this meet the goal?
A. Yes
B. No
Answer: B
Explanation:
Fallback reviewers are asked to do a review when the user has no manager specified in the directory or the
group does not have an owner
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/create-access-review
Answer: A
Explanation:
This is an account used in 'break the glass' scenarios. It only has a very long password, that is kept under lock
and key. User id and password are not connected to any user or device for authentication. No MFA can block
its access. Even with Cell or network/email/phone down situations you can login with this account. You can
login from anywhere. So it needs to be monitored to prevent tampering and account usage.
A. Access packages
B. Entitlement management settings
C. Terms of use
D. Access reviews settings
Answer: B
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-external-user
s
A. 14 days
B. 30 days
C. 90 days
D. 365 days
Answer: B
Explanation:
To be selected in the exam, to add, free, No, because no 7 days, but to choose 30 or 90 they need to add P1 or
P2, but assume P2 is more expensive so thought only just P1, so 30 is correct
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-reports-data-
retention#how-long-does-azure-ad-store-the-data
Explanation:
Yeah, it is possible to create access reviews for both Azure AND Azure AD roles.
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-create-azure-
ad-roles-and-resource-roles-review
Access reviews for Group1 and App1 can be configured in Azure AD Access Reviews.
Access reviews for the Contributor role and Role1 would need to be configured in Privileged Identity
Management (PIM). PIM is included in Azure AD Premium
P2.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-start-
security-review?toc=/azure/active-directory/governance/ toc.json https://docs.microsoft.com/en-
us/azure/active-directory/governance/access-reviews-overview
Answer: C
Explanation:
You can also choose to download the filtered data, up to 250,000 records, by selecting the Download button.
You can download the logs in either CSV or JSON format
So this question, can be one of those that you will got Corect if you choose any of both csv or JSON,
You can use the JSON transform feature in the Power Query Editor in Excel to split each property in the JSON
object in the AuditData column into multiple columns so that each property has its own column.
So answer= C, JSON
https://docs.microsoft.com/en-us/microsoft-365/compliance/export-view-audit-log-records?view=o365-
worldwide
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-audit-logs
You discover that all access review requests are received by Megan Bowen.
You need to ensure that the manager of each department receives the access reviews of their respective
department.
Solution: You add each manager as a fallback reviewer.
Does this meet the goal?
A. Yes
B. No
Answer: B
Explanation:
The option of Fallback reviewer is when you set as reviewer to the manager or group owner and somehow that
user is not having a manager in the directory. In those case, the fallback reviewer, which could be a
department head would be the reviewer.
"Fallback reviewers are asked to do a review when the user has no manager specified in the directory or the
group does not have an owner."
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/create-access-review
Which objects can you add as eligible in Azure AD Privileged Identity Management (PIM) for an Azure AD role?
Answer: B
Explanation:
You cannot assign service principals as eligible to Azure AD roles, Azure roles, and Privileged Access groups
but you can grant a time limited active assignment to all three.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-deployment-
plan
Question: 229 Exam Heist
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant that contains the following group:
✑ Name: Group1
✑ Members: User1, User2
✑ Owner: User3
On January 15, 2021, you create an access review as shown in the exhibit. (Click the Exhibit tab.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
#1 No, because as it's rolling "monthly" review cycle with an end date, the review period which is eligible for
input or change is a 14 day period, since User 1 responded in the first period which started 15th Jan and ended
29th Jan, to respond 5th Feb would be outside of this scope.
#2 Yes, Similar to #1 for User1, this is within the 14 day period of User2.
#3 No, Reviews are for Group1, which User3 is not a member of.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/review-your-access
Answer:
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-access-packa
ge-request-policy https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-manage
ment-access-package-create
Answer: C
Explanation:
Add a Microsoft Sentinel Data connector is the wrong answer. Meant to mislead.
Because question itself mentions that AAD connector was added. Which seem to cover all AAD functionality
including Identity Protection feature.
What you are asked to do is generate incidents based on the risk alerts.
For that you use playbooks in Sentinel. Which automates tasks that SOC engineers need to such as generte
risk alerts. So answer is C.
A. Yes
B. No
Answer: B
Explanation:
https://learn.microsoft.com/en-us/azure/active-directory/roles/permissions-reference#security-administrator
Answer: B
Explanation:
Nothing here that say's about using Defender for Cloud. Defender for cloud is a separate service. And
monitoring logs would be premium paid feature. Nothing here mentions Defender for Cloud.
A. Yes
B. No
Answer: B
Explanation:
Data Collection Rules (DCRs) define the data collection process in Azure Monitor. DCRs specify what data
should be collected, how to transform that data, and where to send that data. Some DCRs will be created and
managed by Azure Monitor to collect a specific set of data to enable insights and visualizations.
From <https://learn.microsoft.com/en-us/azure/azure-monitor/essentials/data-collection-rule-overview>
Answer: C
Explanation:
Select Azure Active Directory > Diagnostic settings -> Add diagnostic setting. You can also select Export
Settings from the Audit Logs or Sign-ins page to get to the diagnostic settings configuration page.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/howto-integrate-activity-logs-
with-log-analytics
In Azure AD Privileged Identity Management (PIM), you configure the Global administrator role as shown in the
following exhibit.
User1 is eligible for the Global administrator role.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
Box 1: Yes -
Box 2: No -
The Privileged Authentication Administrator can set or reset any authentication method for any user,
including Global Administrators.
The Privileged Role Administrator can manage role assignments, including the Global Administrator role, in
Azure Active Directory, as well as within Azure AD
Privileged Identity Management. In addition, this role allows management of all aspects of Privileged Identity
Management and administrative units.
Box 3: No -
The Privileged Authentication Administrator can set or reset any authentication method for any user,
including Global Administrators.
The Privileged Role Administrator can manage role assignments, including the Global Administrator role, in
Azure Active Directory, as well as within Azure AD
Privileged Identity Management. In addition, this role allows management of all aspects of Privileged Identity
Management and administrative units.
Answer: D
Explanation:
Access packages for governed applications should be in a designated catalog. If you don't already have a
catalog for your application governance scenario, create a catalog in Microsoft Entra entitlement
management.
https://learn.microsoft.com/en-us/azure/active-directory/governance/identity-governance-applications-
deploy#deploy-entitlement-management-policies-for-automating-access-assignment
A. Yes
B. No
Answer: A
Explanation:
The correct answer is A - Yes, you modify the action group from Azure Monitor.
https://learn.microsoft.com/en-us/azure/azure-monitor/alerts/action-groups#configure-notifications
Question: 239 Exam Heist
HOTSPOT -
Your network contains an on-premises Active Directory domain that syncs to an Azure Active Directory (Azure AD)
tenant.
The tenant contains the groups shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
Box 1: No -
User1 is member of Group1. Group1 is in the cloud. Group1 is member of Group3. Group3 is in the cloud.
The access review applies to Group3, but not to Group1. The access review is setup to remove access if
reviewers don't respond.
Box 2: No -
Box 3: No -
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview
Answer: D
Explanation:
Access to groups and applications for employees and guests changes over time. To reduce the risk associated
with stale access assignments, administrators can use Azure Active Directory (Azure AD) to create access
reviews for group members or application access.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/create-access-review
You create an access review for Group1 as shown in the following table.
You create an access review for Group2 as shown in the following table.
What is the minimum member of Azure Active Directory Premium P2 licenses required for each group? To answer,
select the appropriate, options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
Box 1: 500
In your Azure AD tenant, guest user collaboration usage is billed based on the count of unique guest users
with authentication activity within a calendar month. This model replaces the 1:5 ratio billing model, which
allowed up to five guest users for each Azure AD Premium license in your tenant. When your tenant is linked
to a subscription and you use External Identities features to collaborate with guest users, you'll be
automatically billed using the MAU-based billing model.
Your first 50,000 MAUs per month are free for both Premium P1 and Premium P2 features. To determine the
total number of MAUs, we combine MAUs from all your tenants (both Azure AD and Azure AD B2C) that are
linked to the same subscription.
Box 2: 1 -
For Group2:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview#license-
requirements
Explanation:
Box 1: No -
On March 2, 2022, you assign the Reports reader role to Guest1.
On April 1 the access package assignment expires. After another 30 days, well before May 5, the guest user
account is removed.
Box 2: No -
On April 1 the access package assignment expires. After another 30 days, well before May 5, the guest user
account is removed.
Box 3: Yes -
Note: Lifecycle -
On the Lifecycle tab, you specify when a user's assignment to the access package expires. You can also
specify whether users can extend their assignments.
In the Expiration section, set Access package assignments expires to On date, Number of days, Number of
hours, or Never.
For On date, select an expiration date in the future.
For Number of days, specify a number between 0 and 3660 days.
For Number of hours, specify a number of hours.
Based on your selection, a user's assignment to the access package expires on a certain date, a certain
number of days after they are approved, or never.
Note 2: By default, when an external user no longer has any access package assignments, they are blocked
from signing in to your directory. After 30 days, their guest user account is removed from your directory.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-access-packa
ge-lifecycle-policy https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-manage
ment-external-users
Question: 243 Exam Heist
You have an Azure Active Directory (Azure AD) tenant named Contoso that contains a terms of use (Toll) named
Terms1 and an access package. Contoso users collaborate with an external organization named Fabrikam.
Fabrikam users must accept Terms1 before being allowed to use the access package.
You need to identify which users accepted or declined Terms1.
What should you use?
A. sign-in logs
B. the Usage and Insights report
C. provisioning logs
D. audit logs
Answer: D
Explanation:
View Azure AD audit logs -
If you want to view more activity, Azure AD terms of use policies include audit logs. Each user consent
triggers an event in the audit logs that is stored for 30 days.
You can view these logs in the portal or download as a .csv file.
To get started with Azure AD audit logs, use the following procedure:
1. Sign in to the Azure portal as a global administrator, security administrator, or Conditional Access
administrator.
2. Browse to Azure Active Directory > Security > Conditional Access > Terms of use.
3. Select a terms of use policy.
4. Select View audit logs.
5. On the Azure AD audit logs screen, you can filter the information using the provided lists to target specific
audit log information.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/terms-of-use
A. User1 only
B. User3 only
C. User1 and User2 only
D. User1, User2, and User3
Answer: B
Explanation:
You can ask the guests themselves or a decision maker to participate in an access review and recertify (or
attest) to the guests' access.
https://learn.microsoft.com/en-us/azure/active-directory/governance/manage-guest-access-with-access-
reviews
Answer:
Explanation:
Box 1: No -
Box 2: Yes-
you cannot approve a request for yourself. Also, if there are guest accounts in the group, they will receive the
email about approving the request but they cannot do it
Box 3: Yes -
Reference:
https://blog.quadrotech-it.com/blog/how-to-manage-guest-access-in-azure-active-directory-pt-1/
You have an Azure Active Directory (Azure AD) tenant that contains a user named User1.
An administrator deletes User1.
• How many days after the account of User1 is deleted can you restore the account?
• Which is the least privileged role that can be used to restore User1?
What should you identify? To answer, select the appropriate options in the answer area.
Answer:
You have an Azure AD tenant that contains the groups shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information
presented in the graphic.
Answer:
Explanation:
Which two settings can you use? Each correct answer presents a complete solution.
Answer: AB
Explanation:
when you create a group you MUST enable "azure ad roles can be assigned to the group" (cannot be done
afterwards). If you enable this feature when creating a group, dynamic groups are getting greyed out /
disabled.
• Identify the locations and IP addresses used by Azure AD users to sign in.
• Review the Azure AD security settings and identify improvement recommendations.
• Identify changes to Azure AD users or service principals.
What should you use for each task? To answer, drag the appropriate resources to the correct requirements. Each
resource may be used once, more than once, or not at all. You may need to drag the split bar between panes or
scroll to view content.
Answer:
Overview -
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with the
adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security defaults
disabled.
•Multiple users in the sales department have up to five devices. The sales department users report that sometimes
they must contact the support department to join their devices to the Azure AD tenant because they have reached
their device limit.
•A recent security incident reveals that several users leaked their credentials, a suspicious browser was used for a
sign-in, and resources were accessed from an anonymous IP address.
•When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear in the
selection list.
•Anyone in the organization can invite guest users, including other guests and non-administrators.
•The helpdesk spends too much time resetting user passwords.
•Users currently use only passwords for authentication.
Requirements. Planned Changes -
•Users assigned the User administrator role must be able to request permission to use the role when needed for up
to one year.
•Users must be prompted to register for MFA and provided with an option to bypass the registration for a grace
period.
•Users must provide one authentication method to reset their password by using SSPR. Available methods must
include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
•Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
•The principle of least privilege must be used.
A.User3 only
B.User4 only
C.User5 only
D.User3 and User4
E.User3 and User5
F.User4 and User5
Answer: E
Explanation:
First, you must be assigned one of the following roles: Global administrator User administrator Identity
Governance Administrator Privileged Role Administrator (for reviews of role-assignable groups only)(Preview)
Microsoft 365 or AAD Security Group owner of the group to be reviewedhttps://learn.microsoft.com/en-
us/azure/active-directory/governance/manage-access-review
Overview -
ADatum Corporation is a consulting company in Montreal.
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with the
adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security defaults
disabled.
•Multiple users in the sales department have up to five devices. The sales department users report that sometimes
they must contact the support department to join their devices to the Azure AD tenant because they have reached
their device limit.
•A recent security incident reveals that several users leaked their credentials, a suspicious browser was used for a
sign-in, and resources were accessed from an anonymous IP address.
•When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear in the
selection list.
•Anyone in the organization can invite guest users, including other guests and non-administrators.
•The helpdesk spends too much time resetting user passwords.
•Users currently use only passwords for authentication.
•Users assigned the User administrator role must be able to request permission to use the role when needed for up
to one year.
•Users must be prompted to register for MFA and provided with an option to bypass the registration for a grace
period.
•Users must provide one authentication method to reset their password by using SSPR. Available methods must
include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
•Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
•The principle of least privilege must be used.
Answer: C
Explanation:
Azure Portal > Azure AD > External identities > External collaboration settings > (Guest invite settings
Section) check "Only users assigned to specific admin roles can invite guest users"
Overview -
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with the
adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security defaults
disabled.
•Multiple users in the sales department have up to five devices. The sales department users report that sometimes
they must contact the support department to join their devices to the Azure AD tenant because they have reached
their device limit.
•A recent security incident reveals that several users leaked their credentials, a suspicious browser was used for a
sign-in, and resources were accessed from an anonymous IP address.
•When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear in the
selection list.
•Anyone in the organization can invite guest users, including other guests and non-administrators.
•The helpdesk spends too much time resetting user passwords.
•Users currently use only passwords for authentication.
•Users assigned the User administrator role must be able to request permission to use the role when needed for up
to one year.
•Users must be prompted to register for MFA and provided with an option to bypass the registration for a grace
period.
•Users must provide one authentication method to reset their password by using SSPR. Available methods must
include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
•Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
•The principle of least privilege must be used.
You need to modify the settings of the User administrator role to meet the technical requirements.
Which two actions should you perform for the role? Each correct answer presents part of the solution.
Answer: CD
Explanation:
You need to ensure that User1 can create access reviews for Azure AD roles. The solution must use the principle of
least privilege.
Answer: A
Explanation:
1. To create access reviews for Azure resources, you must be assigned to the Owner or the User Access
Administrator role for the Azure resources. To create access reviews for Azure AD roles, you must be
assigned to the Global Administrator or the Privileged Role Administrator role.https://learn.microsoft.com/en-
us/azure/active-directory/privileged-identity-management/pim-create-roles-and-resource-roles-
review#prerequisites
2. To create access reviews for Azure resources, you must be assigned to the Owner or the User Access
Administrator role for the Azure resources. To create access reviews for Azure AD roles, you must be
assigned to the Global Administrator or the Privileged Role Administrator role.
You have a Microsoft 365 E5 subscription that contains three users named User1, User2, and User3.
You have two Azure AD roles that have the Activation settings shown in the following table.
The Azure AD roles have the Assignment settings shown in the following table.
The Azure AD roles have the eligible users shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Explanation:
https://learn.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-resource-
roles-configure-role-settings#require-justification-on-active-assignment
You have a hybrid Microsoft 365 subscription that contains the users shown in the following table.
You plan to deploy an on-premises app named App1. App1 will be registered in Azure AD and will use Azure AD
Application Proxy.
You need to delegate the installation of the Application Proxy connector and ensure that User1 can register App1 in
Azure AD. The solution must use the principle of least privilege.
Which user should perform the installation, and which role should you assign to User1? To answer, select the
appropriate options in the answer area.
Answer:
Explanation:
Admin 1
You have a Microsoft 365 E5 subscription that contains the users shown in the following table.
The users are assigned the roles shown in the following table.
For which users can User1 and User4 reset passwords? To answer, select the appropriate options in the answer
area.
Answer:
Explanation:
https://learn.microsoft.com/en-us/azure/active-directory/roles/permissions-reference#who-can-reset-
passwords
Explanation:
https://learn.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-
activate-role
You need to review the sign-in activity for App1. The solution must meet the following requirements:
A.Sign-in logs
B.Access reviews
C.Audit logs
D.Usage & insights
Answer: D
Explanation:
1. D: Usage & insights
You need to grant permissions to User1 to manage only the users in the marketing department. The solution must
ensure that User1 does NOT have permissions to manage the users in the finance department.
Answer: B
Explanation:
B. an administrative unit
You need to ensure that User1 can modify the review frequency of Package1. The solution must use the principle of
least privilege.
A.Security administrator
B.Privileged role administrator
C.External Identity Provider administrator
D.User administrator
Answer: D
Explanation:
o enable reviews of access packages, you must meet the prerequisites for creating an access
package:Microsoft Azure AD Premium P2 or Microsoft Entra ID GovernanceGlobal administrator, Identity
Governance administrator, User administrator, Catalog owner, or Access package manager
You need to query the logs and graphically display the number of sign-ins per user.
How should you complete the query? To answer, select the appropriate options in the answer area,
Answer:
Explanation:
Sign in Logs |where Result Type == 0|summarize login_ count = count() by Identity| render column chart.
You need to identify which users access Facebook from their devices and browsers. The solution must minimize
administrative effort.
Answer: D
Explanation:
Unsanctioning an app doesn't block use, but enables you to more easily monitor its use with the Cloud
Discovery filters. You can then notify users of the unsanctioned app and suggest an alternative safe app for
their use, or generate a block script using the Defender for Cloud Apps APIs to block all unsanctioned apps.
https://learn.microsoft.com/en-us/defender-cloud-apps/governance-discovery#sanctioningunsanctioning-an-
app
You need to identify users that are eligible for the Cloud Application Administrator role.
Which blade in the Privileged Identity Management settings should you use?
A.Azure resources
B.Privileged access groups
C.Review access
D.Azure AD roles
Answer: D
Explanation:
1. A. Role does not fitB. Blade does not existC. Makes sense only if an access review would existD: Easiest way:
Azure AD roles -> AssignmentsAny other suggestions?
You need to create a dynamic user group that will include all the users that do NOT have a department defined in
their user profile.
How should you complete the membership rule? To answer, select the appropriate options in the answer area.
Answer:
Explanation:
)https://learn.microsoft.com/en-us/azure/active-directory/enterprise-users/groups-dynamic-
membership#use-of-null-values
You need to ensure that you can view Azure AD audit log information by using Azure Monitor.
Answer: A
Explanation:
You need to identify which users access Facebook from their devices and browsers. The solution must minimize
administrative effort.
Answer: A
Explanation:
A.User2 only
B.User3only
C.User2 and User3 only
D.User3 and User4 only
E.User1, User2, and User3 only
F.User1, User2, User3, and User4
Answer: D
Explanation:
A.Admin1 only
B.Admin2 only
C.Admin3 only
D.Admin1 and Admin2 only
E.Admin2 and Admin3 only
F.Admin1, Admin2, and Admin3
Answer: C
Explanation:
Classic subscription administrator rolesYou cannot manage the following classic subscription administrator
roles in Privileged Identity Management:Account AdministratorService AdministratorCo-Administrator
https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-roles
Which apps can you restore on April 16, and which settings can you restore for App4 on April 16? To answer, select
the appropriate options in the answer area.
Answer:
Explanation:
Box 2: App roles, Users and groups, client secret, and Self-service.
https://learn.microsoft.com/en-us/entra/identity-platform/howto-restore-app
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not
appear in the review screen.
You have an Amazon Web Services (AWS) account, a Google Workspace subscription, and a GitHub account.
You need to ensure that you can monitor OAuth authentication requests by using Microsoft Defender for Cloud
Apps.
Solution: From the Microsoft 365 Defender portal, you add the GitHub app connector.
A.Yes
B.No
Answer: B
Explanation:
No, the solution does not meet the goal. Adding the GitHub app connector to Microsoft Defender for Cloud
Apps will allow you to monitor OAuth authentication requests from GitHub to Microsoft 365. However, it will
not allow you to monitor OAuth authentication requests to your AWS account, Google Workspace
subscription, or Azure subscription.
Answer: C
Explanation:
The correct answer is C. Global Administrator, Security Administrator, and Security Contributor only.Azure AD
Privileged Identity Management (PIM) can be used to manage the following roles:Global
AdministratorSecurity AdministratorSecurity ContributorAccount AdministratorPrivileged Role
AdministratorIdentity Governance AdministratorOther roles, such as User Administrator and Application
Administrator, cannot be managed by using PIM.
You need to ensure that only users who accept the terms of use can access the resources in the tenant. Other
users must be denied access.
Answer: C
Explanation:
C. a conditional access policy in Microsoft Entra ID. A conditional access policy is a feature that allows you to
enforce granular controls over access to cloud apps based on user, location, device, and app. You can use a
conditional access policy along with terms of use to require users to accept the terms of use policy before
getting access to the resources in the tenant. You can also designate reviewers who can view and act on the
consent requests in the Microsoft 365 admin center.
Question: 274 Exam Heist
You have a Microsoft 365 E5 subscription that contains a user named User1. User1 is eligible for the Application
Administrator role.
Answer: D
Explanation:
D. the Azure Active Directory admin center. The Azure Active Directory admin center is a portal that allows
you to manage your Microsoft Entra ID resources, such as users, groups, roles, and applications. You can use
the Azure Active Directory admin center to assign roles to users, either directly or through eligible
assignments.
You need to implement certificate-based authentication in Azure AD. The solution must ensure that users can sign
in by using certificates issued by CA1. What should you do first?
Answer: B
Explanation:
•Azure
•Alibaba Cloud
•Amazon Web Services (AWS)
•Google Cloud Platform (GCP)
You configure an Azure subscription to use Microsoft Entra Permissions Management to manage the permissions
in Azure only.
A.AWS only
B.Alibaba Cloud and AWS only
C.Alibaba Cloud and GCP only
D.AWS and GCP only
E.Alibaba Cloud, AWS, and GCP
Answer: D
Explanation:
Microsoft Entra Permissions Management is a cloud infrastructure entitlement management (CIEM) solution
that provides comprehensive visibility into permissions assigned to all identities. For example, over-privileged
workload and user identities, actions, and resources across multicloud infrastructures in Microsoft Azure,
Amazon Web Services (AWS), and Google Cloud Platform (GCP).
You need to evaluate and remediate the risks associated with highly privileged accounts. The solution must
minimize administrative effort.
Answer: C
Explanation:
You need to replace all the permissions granted to User1 with read-only permissions. The solution must minimize
administrative effort.
Answer: C
Explanation:
Reference:
https://learn.microsoft.com/en-us/training/permissions-management/explore-features-of-permissions-
management/9-act-on-your-findings-with-remediation-tab
You need to provide User1 with access to Permissions Management. The solution must meet the following
requirements:
Answer: B
Explanation:
You have an Azure subscription that contains the resources shown in the following table.
The subscription uses Privileged Identity Management (PIM).
Which authorization method should you use for each user? To answer, drag the appropriate authorization methods
to the correct users. Each authorization method may be used once, more than once, or not at all. You may need to
drag the split bar between panes or scroll to view content.
Answer:
Explanation:
You have two Azure subscriptions named Sub1 and Sub2 that are linked to a Microsoft Entra tenant. The tenant
contains three groups named Group1, Group2, and Group3.
You manage the subscriptions by using Microsoft Entra Permissions Management. Permissions Management is
configured as shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Answer:
Explanation:
No
Yes
Yes
•Identify all the accounts that are assigned the Global Administrator role permanently.
•Review the Permission Creep Index (PCI) of User1.
Which tab in Permissions Management should you use for each task? To answer, select the appropriate options in
the answer area.
Answer:
Explanation:
Azure AD Insights.
Analytics.
You need to use Microsoft Entra Permissions Management to automatically monitor permissions and create and
implement right-size roles. The solution must follow the principle of least privilege.
Which role should you assign to the service principal of Permissions Management?
Answer: B
Explanation:
Correct Answer B:To use Microsoft Entra Permissions Management to automatically monitor permissions and
create and implement right-size roles while following the principle of least privilege, you should assign the
Contributor role to the service principal12. This role provides the necessary permissions to manage resources
without granting full administrative access.
Question: 284 Exam Heist
HOTSPOT
-
You need to ensure that Permissions Management users can manage role assignments for Sub1. The solution must
follow the principle of least privilege.
Which role should you assign and to which identity should you assign the role? To answer, select the appropriate
options in the answer area.
Answer:
Explanation:
You need to recommend a solution to assess the risks associated with privilege assignments across all the
platforms. The solution must minimize administrative effort.
A.Microsoft Sentinel
B.Microsoft Entra ID Protection
C.Microsoft Defender for Cloud Apps
D.Microsoft Entra Permissions Management
Answer: D
Explanation:
You need to configure continuous access evaluation for app sign-ins and assign the configuration to users that are
assigned the Application Administrator role.
Answer: C
Explanation:
C. a Conditional Access policyTo configure continuous access evaluation for app sign-ins and assign the
configuration to users that are assigned the Application Administrator role, you should configure a
Conditional Access policy. Conditional Access policies in Microsoft Entra allow you to control access to apps
and resources based on certain conditions such as user, location, device, and application state. By creating a
Conditional Access policy, you can enable continuous access evaluation for app sign-ins and target the policy
specifically to users assigned the Application Administrator role. This ensures that the configuration applies
only to those users who have the appropriate role.
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory (Azure
AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The domain
contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
Enterprise Mobility + Security E5
Windows 10 Enterprise E3
Project Plan 3
Azure AD Connect is configured between Azure AD and Active Directory Domain Services (AD DS). Only the
Contoso_Resources OU is synced.
Helpdesk administrators routinely use the Microsoft 365 admin center to manage user settings.
User administrators currently use the Microsoft 365 admin center to manually assign licenses. All users have all
licenses assigned besides the following exceptions:
The users in the London office have the Microsoft 365 Phone System license unassigned.
The users in the Seattle office have the Yammer Enterprise license unassigned.
Security defaults are disabled for contoso.com.
Contoso uses Azure AD Privileged Identity Management (PIM) to protect administrative roles.
Existing Environment. Problem Statements
Contoso identifies the following issues:
Currently, all the helpdesk administrators can manage user licenses throughout the entire Microsoft 365 tenant.
The user administrators report that it is tedious to manually configure the different license requirements for each
Contoso office.
The helpdesk administrators spend too much time provisioning internal and guest access to the required Microsoft
365 services and apps.
Currently, the helpdesk administrators can perform tasks by using the User administrator role without justification
or approval.
When the Logs node is selected in Azure AD, an error message appears stating that Log Analytics integration is
not enabled.
Answer: A
Explanation:
You cannot assign licenses to an Administrative Unit, only a Group, see here https://learn.microsoft.com/en-
us/answers/questions/955831/can-licenses-be-directly-assigned-to-an-administra.html
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory (Azure
AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The domain
contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
Enterprise Mobility + Security E5
Windows 10 Enterprise E3
Project Plan 3
Azure AD Connect is configured between Azure AD and Active Directory Domain Services (AD DS). Only the
Contoso_Resources OU is synced.
Helpdesk administrators routinely use the Microsoft 365 admin center to manage user settings.
User administrators currently use the Microsoft 365 admin center to manually assign licenses. All users have all
licenses assigned besides the following exceptions:
The users in the London office have the Microsoft 365 Phone System license unassigned.
The users in the Seattle office have the Yammer Enterprise license unassigned.
Security defaults are disabled for contoso.com.
Contoso uses Azure AD Privileged Identity Management (PIM) to protect administrative roles.
Existing Environment. Problem Statements
Contoso identifies the following issues:
Currently, all the helpdesk administrators can manage user licenses throughout the entire Microsoft 365 tenant.
The user administrators report that it is tedious to manually configure the different license requirements for each
Contoso office.
The helpdesk administrators spend too much time provisioning internal and guest access to the required Microsoft
365 services and apps.
Currently, the helpdesk administrators can perform tasks by using the User administrator role without justification
or approval.
When the Logs node is selected in Azure AD, an error message appears stating that Log Analytics integration is
not enabled.
A. From the Microsoft Azure Active Directory Connect wizard, select Customize synchronization options.
B. From PowerShell, run Set-ADSyncScheduler.
C. From PowerShell, run Start-ADSyncSyncCycle.
D. From the Microsoft Azure Active Directory Connect wizard, select Change user sign-in.
Answer: A
Explanation:
You need to select Customize synchronization options to configure Azure AD Connect to sync the Adatum
organizational unit (OU).
- Only Contoso_Resources OU is synced (if you run PS command it will sync only this OU)
- You need to also sync new OU Adatum in Contonso AD where new users were created
https://learn.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-installation-
wizard#customize-synchronization-options
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory (Azure
AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The domain
contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
Enterprise Mobility + Security E5
Windows 10 Enterprise E3
Project Plan 3
Azure AD Connect is configured between Azure AD and Active Directory Domain Services (AD DS). Only the
Contoso_Resources OU is synced.
Helpdesk administrators routinely use the Microsoft 365 admin center to manage user settings.
User administrators currently use the Microsoft 365 admin center to manually assign licenses. All users have all
licenses assigned besides the following exceptions:
The users in the London office have the Microsoft 365 Phone System license unassigned.
The users in the Seattle office have the Yammer Enterprise license unassigned.
Security defaults are disabled for contoso.com.
Contoso uses Azure AD Privileged Identity Management (PIM) to protect administrative roles.
Existing Environment. Problem Statements
Contoso identifies the following issues:
Currently, all the helpdesk administrators can manage user licenses throughout the entire Microsoft 365 tenant.
The user administrators report that it is tedious to manually configure the different license requirements for each
Contoso office.
The helpdesk administrators spend too much time provisioning internal and guest access to the required Microsoft
365 services and apps.
Currently, the helpdesk administrators can perform tasks by using the User administrator role without justification
or approval.
When the Logs node is selected in Azure AD, an error message appears stating that Log Analytics integration is
not enabled.
Answer:
Explanation:
Q1: Administrative Units. This would limit the scope of admins as required.
Q2: AAD Admin Center (not the on-prem Active Directory Administrative Center)
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/roles/administrative-units
https://docs.microsoft.com/en-us/azure/active-directory/roles/admin-units-manage
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory (Azure
AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The domain
contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
Enterprise Mobility + Security E5
Windows 10 Enterprise E3
Project Plan 3
Azure AD Connect is configured between Azure AD and Active Directory Domain Services (AD DS). Only the
Contoso_Resources OU is synced.
Helpdesk administrators routinely use the Microsoft 365 admin center to manage user settings.
User administrators currently use the Microsoft 365 admin center to manually assign licenses. All users have all
licenses assigned besides the following exceptions:
The users in the London office have the Microsoft 365 Phone System license unassigned.
The users in the Seattle office have the Yammer Enterprise license unassigned.
Security defaults are disabled for contoso.com.
Contoso uses Azure AD Privileged Identity Management (PIM) to protect administrative roles.
Existing Environment. Problem Statements
Contoso identifies the following issues:
Currently, all the helpdesk administrators can manage user licenses throughout the entire Microsoft 365 tenant.
The user administrators report that it is tedious to manually configure the different license requirements for each
Contoso office.
The helpdesk administrators spend too much time provisioning internal and guest access to the required Microsoft
365 services and apps.
Currently, the helpdesk administrators can perform tasks by using the User administrator role without justification
or approval.
When the Logs node is selected in Azure AD, an error message appears stating that Log Analytics integration is
not enabled.
Answer: C
Explanation:
* The users in the London office have the Microsoft 365 Phone System license unassigned.
* The users in the Seattle office have the Yammer Enterprise license unassigned.
When you use the Active users page to unassign licenses, you unassign product licenses from users.
2. Select the row of the user that you want to unassign a license for.
4. Expand the Licenses section, clear the boxes for the licenses that you want to unassign, then select Save
changes.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/admin/manage/remove-licenses-from-users
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees connect
remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active Directory
(Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in litware.com
by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection policies in
Microsoft Cloud App Security are enabled.
Litware has an Azure subscription associated to the litware.com Azure AD tenant. The subscription contains an
Azure Sentinel instance that uses the Azure Active
Directory connector and the Office 365 connector. Azure Sentinel currently collects the Azure AD sign-ins logs
and audit logs.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented from
accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory forest.
Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for Litware but
exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
Implement a banned password list for the litware.com forest.
Enforce MFA when accessing on-premises applications.
Automatically detect and remediate externally leaked credentials.
Requirements. Access Requirements
Litware identifies the following access requirements:
Control all access to all Azure resources and Azure AD applications by using conditional access policies.
Implement a conditional access policy that has session controls for Microsoft SharePoint Online.
Control privileged access to applications by using access reviews in Azure AD.
Requirements. Monitoring Requirements
Litware wants to use the Fusion rule in Azure Sentinel to detect multi-staged attacks that include a combination of
suspicious Azure AD sign-ins followed by anomalous Microsoft Office 365 activity. Question HOTSPOT -
You need to configure the assignment of Azure AD licenses to the Litware users. The solution must meet the
licensing requirements.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory forest.
Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees connect
remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active Directory
(Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in litware.com
by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection policies in
Microsoft Cloud App Security are enabled.
Litware has an Azure subscription associated to the litware.com Azure AD tenant. The subscription contains an
Azure Sentinel instance that uses the Azure Active
Directory connector and the Office 365 connector. Azure Sentinel currently collects the Azure AD sign-ins logs
and audit logs.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented from
accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory forest.
Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for Litware but
exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
Implement a banned password list for the litware.com forest.
Enforce MFA when accessing on-premises applications.
Automatically detect and remediate externally leaked credentials.
Requirements. Access Requirements
Litware identifies the following access requirements:
Control all access to all Azure resources and Azure AD applications by using conditional access policies.
Implement a conditional access policy that has session controls for Microsoft SharePoint Online.
Control privileged access to applications by using access reviews in Azure AD.
Requirements. Monitoring Requirements
Litware wants to use the Fusion rule in Azure Sentinel to detect multi-staged attacks that include a combination of
suspicious Azure AD sign-ins followed by anomalous Microsoft Office 365 activity. Question You need to meet the
authentication requirements for leaked credentials.
What should you do?
Answer: A
Explanation:
"Risk detections like leaked credentials require the presence of password hashes for detection to occur. For
more information about password hash synchronization, see the article, Implement password hash
synchronization with Azure AD Connect sync."
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-
risks#password-hash-synchronization
Reference:
https://docs.microsoft.com/en-us/azure/security/fundamentals/steps-secure-identity
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees connect
remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active Directory
(Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in litware.com
by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection policies in
Microsoft Cloud App Security are enabled.
Litware has an Azure subscription associated to the litware.com Azure AD tenant. The subscription contains an
Azure Sentinel instance that uses the Azure Active
Directory connector and the Office 365 connector. Azure Sentinel currently collects the Azure AD sign-ins logs
and audit logs.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented from
accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory forest.
Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for Litware but
exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
Implement a banned password list for the litware.com forest.
Enforce MFA when accessing on-premises applications.
Automatically detect and remediate externally leaked credentials.
Requirements. Access Requirements
Litware identifies the following access requirements:
Control all access to all Azure resources and Azure AD applications by using conditional access policies.
Implement a conditional access policy that has session controls for Microsoft SharePoint Online.
Control privileged access to applications by using access reviews in Azure AD.
Requirements. Monitoring Requirements
Litware wants to use the Fusion rule in Azure Sentinel to detect multi-staged attacks that include a combination of
suspicious Azure AD sign-ins followed by anomalous Microsoft Office 365 activity. Question HOTSPOT -
You need to identify which roles to use for managing role assignments. The solution must meet the delegation
requirements.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
For Azure AD roles in Privileged Identity Management, only a user who is in the Privileged Role Administrator
or Global Administrator role can manage assignments for other administrators. Global Administrators,
Security Administrators, Global Readers, and Security Readers can also view assignments to Azure AD roles
in Privileged Identity Management.
For Azure resource roles in Privileged Identity Management, only a subscription administrator, a resource
Owner, or a resource User Access administrator can manage assignments for other administrators. Users who
are Privileged Role Administrators, Security Administrators, or Security Readers do not by default have
access to view assignments to Azure resource roles in Privileged Identity Management.
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure
Reference:
https://docs.microsoft.com/en-us/azure/role-based-access-control/role-assignments-portal
https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees connect
remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active Directory
(Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in litware.com
by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection policies in
Microsoft Cloud App Security are enabled.
Litware has an Azure subscription associated to the litware.com Azure AD tenant. The subscription contains an
Azure Sentinel instance that uses the Azure Active
Directory connector and the Office 365 connector. Azure Sentinel currently collects the Azure AD sign-ins logs
and audit logs.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented from
accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory forest.
Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for Litware but
exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
Implement a banned password list for the litware.com forest.
Enforce MFA when accessing on-premises applications.
Automatically detect and remediate externally leaked credentials.
Requirements. Access Requirements
Litware identifies the following access requirements:
Control all access to all Azure resources and Azure AD applications by using conditional access policies.
Implement a conditional access policy that has session controls for Microsoft SharePoint Online.
Control privileged access to applications by using access reviews in Azure AD.
Requirements. Monitoring Requirements
Litware wants to use the Fusion rule in Azure Sentinel to detect multi-staged attacks that include a combination of
suspicious Azure AD sign-ins followed by anomalous Microsoft Office 365 activity. Question HOTSPOT -
You need to create the LWGroup1 group to meet the management requirements.
How should you complete the dynamic membership rule? To answer, select the appropriate options in the answer
area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
REQ: Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for
Litware but exclude all the Azure AD guest accounts.
If you want your group to exclude guest users and include only members of your tenant, create a dynamic
group as described above, but in the Rule syntax box, enter the following expression:
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/use-dynamic-groups#creating-a-
group-of-members-only
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory (Azure
AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The domain
contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
Enterprise Mobility + Security E5
Windows 10 Enterprise E3
Project Plan 3
Azure AD Connect is configured between Azure AD and Active Directory Domain Services (AD DS). Only the
Contoso_Resources OU is synced.
Helpdesk administrators routinely use the Microsoft 365 admin center to manage user settings.
User administrators currently use the Microsoft 365 admin center to manually assign licenses. All users have all
licenses assigned besides the following exceptions:
The users in the London office have the Microsoft 365 Phone System license unassigned.
The users in the Seattle office have the Yammer Enterprise license unassigned.
Security defaults are disabled for contoso.com.
Contoso uses Azure AD Privileged Identity Management (PIM) to protect administrative roles.
Existing Environment. Problem Statements
Contoso identifies the following issues:
Currently, all the helpdesk administrators can manage user licenses throughout the entire Microsoft 365 tenant.
The user administrators report that it is tedious to manually configure the different license requirements for each
Contoso office.
The helpdesk administrators spend too much time provisioning internal and guest access to the required Microsoft
365 services and apps.
Currently, the helpdesk administrators can perform tasks by using the User administrator role without justification
or approval.
When the Logs node is selected in Azure AD, an error message appears stating that Log Analytics integration is
not enabled.
Answer:
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-polic
ies
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees connect
remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active Directory
(Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in litware.com
by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection policies in
Microsoft Cloud App Security are enabled.
Litware has an Azure subscription associated to the litware.com Azure AD tenant. The subscription contains an
Azure Sentinel instance that uses the Azure Active
Directory connector and the Office 365 connector. Azure Sentinel currently collects the Azure AD sign-ins logs
and audit logs.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented from
accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory forest.
Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for Litware but
exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
Implement a banned password list for the litware.com forest.
Enforce MFA when accessing on-premises applications.
Automatically detect and remediate externally leaked credentials.
Requirements. Access Requirements
Litware identifies the following access requirements:
Control all access to all Azure resources and Azure AD applications by using conditional access policies.
Implement a conditional access policy that has session controls for Microsoft SharePoint Online.
Control privileged access to applications by using access reviews in Azure AD.
Requirements. Monitoring Requirements
Litware wants to use the Fusion rule in Azure Sentinel to detect multi-staged attacks that include a combination of
suspicious Azure AD sign-ins followed by anomalous Microsoft Office 365 activity. Question You need to configure
the MFA settings for users who connect from the Boston office. The solution must meet the authentication
requirements and the access requirements.
What should you include in the configuration?
Answer: B
Explanation:
Named Locations are part of Conditional Access Policies whereas "Trusted IPs" are in the legacy MFA
settings, which would not be preferred.
The IP address will appear to be coming into Azure from the NAT'd public address not the internal network
private address.
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees connect
remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active Directory
(Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in litware.com
by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection policies in
Microsoft Cloud App Security are enabled.
Litware has an Azure subscription associated to the litware.com Azure AD tenant. The subscription contains an
Azure Sentinel instance that uses the Azure Active
Directory connector and the Office 365 connector. Azure Sentinel currently collects the Azure AD sign-ins logs
and audit logs.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented from
accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory forest.
Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for Litware but
exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
Implement a banned password list for the litware.com forest.
Enforce MFA when accessing on-premises applications.
Automatically detect and remediate externally leaked credentials.
Requirements. Access Requirements
Litware identifies the following access requirements:
Control all access to all Azure resources and Azure AD applications by using conditional access policies.
Implement a conditional access policy that has session controls for Microsoft SharePoint Online.
Control privileged access to applications by using access reviews in Azure AD.
Requirements. Monitoring Requirements
Litware wants to use the Fusion rule in Azure Sentinel to detect multi-staged attacks that include a combination of
suspicious Azure AD sign-ins followed by anomalous Microsoft Office 365 activity. Question HOTSPOT -
You need to support the planned changes and meet the technical requirements for MFA.
Which feature should you use, and how long before the users must complete the registration? To answer, select
the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-
configure-mfa-policy#policy-configuration
Box 2: 14 days -
Multi-factor authentication (MFA): multi-factor authentication is a type of authentication that requires the use
of two or more verification factors to gain access to a system. Azure MFA offers a 14 day grace period after
being initiated.
Reference:
https://www.syskit.com/blog/using-azure-conditional-access-when-security-defaults-isnt-enough/
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory (Azure
AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The domain
contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
Enterprise Mobility + Security E5
Windows 10 Enterprise E3
Project Plan 3
Azure AD Connect is configured between Azure AD and Active Directory Domain Services (AD DS). Only the
Contoso_Resources OU is synced.
Helpdesk administrators routinely use the Microsoft 365 admin center to manage user settings.
User administrators currently use the Microsoft 365 admin center to manually assign licenses. All users have all
licenses assigned besides the following exceptions:
The users in the London office have the Microsoft 365 Phone System license unassigned.
The users in the Seattle office have the Yammer Enterprise license unassigned.
Security defaults are disabled for contoso.com.
Contoso uses Azure AD Privileged Identity Management (PIM) to protect administrative roles.
Existing Environment. Problem Statements
Contoso identifies the following issues:
Currently, all the helpdesk administrators can manage user licenses throughout the entire Microsoft 365 tenant.
The user administrators report that it is tedious to manually configure the different license requirements for each
Contoso office.
The helpdesk administrators spend too much time provisioning internal and guest access to the required Microsoft
365 services and apps.
Currently, the helpdesk administrators can perform tasks by using the User administrator role without justification
or approval.
When the Logs node is selected in Azure AD, an error message appears stating that Log Analytics integration is
not enabled.
Answer: C
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees connect
remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active Directory
(Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in litware.com
by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection policies in
Microsoft Cloud App Security are enabled.
Litware has an Azure subscription associated to the litware.com Azure AD tenant. The subscription contains an
Azure Sentinel instance that uses the Azure Active
Directory connector and the Office 365 connector. Azure Sentinel currently collects the Azure AD sign-ins logs
and audit logs.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented from
accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory forest.
Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for Litware but
exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
Implement a banned password list for the litware.com forest.
Enforce MFA when accessing on-premises applications.
Automatically detect and remediate externally leaked credentials.
Requirements. Access Requirements
Litware identifies the following access requirements:
Control all access to all Azure resources and Azure AD applications by using conditional access policies.
Implement a conditional access policy that has session controls for Microsoft SharePoint Online.
Control privileged access to applications by using access reviews in Azure AD.
Requirements. Monitoring Requirements
Litware wants to use the Fusion rule in Azure Sentinel to detect multi-staged attacks that include a combination of
suspicious Azure AD sign-ins followed by anomalous Microsoft Office 365 activity. Question HOTSPOT -
You need to implement on-premises application and SharePoint Online restrictions to meet the authentication
requirements and the access requirements.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
The requirement for on-premise applications is "Enforce MFA when accessing ...", as we have already
we just need to "Publish the applications by using Azure AD Application Proxy" - this will force users to use
their Azure AD account (and MFA) to access the on-premise applications.
Reference:
https://docs.microsoft.com/en-us/sharepoint/app-enforced-restrictions https://docs.microsoft.com/en-
us/azure/active-directory/conditional-access/concept-conditional-access-session
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees connect
remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active Directory
(Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in litware.com
by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection policies in
Microsoft Cloud App Security are enabled.
Litware has an Azure subscription associated to the litware.com Azure AD tenant. The subscription contains an
Azure Sentinel instance that uses the Azure Active
Directory connector and the Office 365 connector. Azure Sentinel currently collects the Azure AD sign-ins logs
and audit logs.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented from
accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory forest.
Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for Litware but
exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
Implement a banned password list for the litware.com forest.
Enforce MFA when accessing on-premises applications.
Automatically detect and remediate externally leaked credentials.
Requirements. Access Requirements
Litware identifies the following access requirements:
Control all access to all Azure resources and Azure AD applications by using conditional access policies.
Implement a conditional access policy that has session controls for Microsoft SharePoint Online.
Control privileged access to applications by using access reviews in Azure AD.
Requirements. Monitoring Requirements
Litware wants to use the Fusion rule in Azure Sentinel to detect multi-staged attacks that include a combination of
suspicious Azure AD sign-ins followed by anomalous Microsoft Office 365 activity. Question HOTSPOT -
You need to configure app registration in Azure AD to meet the delegation requirements.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Answer:
Explanation:
https://docs.microsoft.com/en-us/azure/active-directory/roles/delegate-app-roles#restrict-who-can-create-
applications
#1 "On the User settings page for your organization, set the Users can register applications setting to No. This
will disable the default ability for users to create application registrations."
#2 "By default in Azure AD, all users can register applications and manage all aspects of applications they
create. Everyone also has the ability to consent to apps accessing company data on their behalf. You can
choose to selectively grant those permissions by setting the global switches to 'No' and adding the selected
users to the Application Developer role."
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/roles/delegate-app-roles
Question: 301 Exam Heist
Introductory Info Case Study -
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees connect
remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active Directory
(Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in litware.com
by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection policies in
Microsoft Cloud App Security are enabled.
Litware has an Azure subscription associated to the litware.com Azure AD tenant. The subscription contains an
Azure Sentinel instance that uses the Azure Active
Directory connector and the Office 365 connector. Azure Sentinel currently collects the Azure AD sign-ins logs
and audit logs.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented from
accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory forest.
Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for Litware but
exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
Implement a banned password list for the litware.com forest.
Enforce MFA when accessing on-premises applications.
Automatically detect and remediate externally leaked credentials.
Requirements. Access Requirements
Litware identifies the following access requirements:
Control all access to all Azure resources and Azure AD applications by using conditional access policies.
Implement a conditional access policy that has session controls for Microsoft SharePoint Online.
Control privileged access to applications by using access reviews in Azure AD.
Requirements. Monitoring Requirements
Litware wants to use the Fusion rule in Azure Sentinel to detect multi-staged attacks that include a combination of
suspicious Azure AD sign-ins followed by anomalous Microsoft Office 365 activity. Question HOTSPOT -
How should the access be setup to the on-premises applications?
Hot Area:
Answer:
Explanation:
Box 1: Server2 -
Incorrect:
Not Server 1: If you've deployed Azure AD Password Protection Proxy, do not install Azure AD Application
Proxy and Azure AD Password Protection Proxy together on the same machine. Azure AD Application Proxy
and Azure AD Password Protection Proxy install different versions of the Azure AD Connect Agent
Updater service. These different versions are incompatible when installed together on the same machine.
Server1 runs the Azure AD application Proxy connector.
To use Application Proxy, you need a Windows server running Windows Server 2012 R2 or later. You'll install
the Application Proxy connector on the server. This connector server needs to connect to the Application
Proxy services in Azure, and the on-premises applications that you plan to publish.
Scenario:
Requirements. Authentication Requirements include:
Enforce MFA when accessing on-premises applications.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
Box 2: DC1 -
The Azure AD Password Protection proxy service is typically on a member server in your on-premises AD DS
environment. Once installed, the Azure AD
Password Protection proxy service communicates with Azure AD to maintain a copy of the global and
customer banned password lists for your Azure AD tenant.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-password-ban-bad-on-premise
s-deploy https://docs.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-add-on-premi
ses-application
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory (Azure
AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The domain
contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
Enterprise Mobility + Security E5
Windows 10 Enterprise E3
Project Plan 3
Azure AD Connect is configured between Azure AD and Active Directory Domain Services (AD DS). Only the
Contoso_Resources OU is synced.
Helpdesk administrators routinely use the Microsoft 365 admin center to manage user settings.
User administrators currently use the Microsoft 365 admin center to manually assign licenses. All users have all
licenses assigned besides the following exceptions:
The users in the London office have the Microsoft 365 Phone System license unassigned.
The users in the Seattle office have the Yammer Enterprise license unassigned.
Security defaults are disabled for contoso.com.
Contoso uses Azure AD Privileged Identity Management (PIM) to protect administrative roles.
Existing Environment. Problem Statements
Contoso identifies the following issues:
Currently, all the helpdesk administrators can manage user licenses throughout the entire Microsoft 365 tenant.
The user administrators report that it is tedious to manually configure the different license requirements for each
Contoso office.
The helpdesk administrators spend too much time provisioning internal and guest access to the required Microsoft
365 services and apps.
Currently, the helpdesk administrators can perform tasks by using the User administrator role without justification
or approval.
When the Logs node is selected in Azure AD, an error message appears stating that Log Analytics integration is
not enabled.
A. Company branding
B. Diagnostics settings
C. External Identities
D. App registrations
Answer: B
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/overview-monitoring
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory (Azure
AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The domain
contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
Enterprise Mobility + Security E5
Windows 10 Enterprise E3
Project Plan 3
Azure AD Connect is configured between Azure AD and Active Directory Domain Services (AD DS). Only the
Contoso_Resources OU is synced.
Helpdesk administrators routinely use the Microsoft 365 admin center to manage user settings.
User administrators currently use the Microsoft 365 admin center to manually assign licenses. All users have all
licenses assigned besides the following exceptions:
The users in the London office have the Microsoft 365 Phone System license unassigned.
The users in the Seattle office have the Yammer Enterprise license unassigned.
Security defaults are disabled for contoso.com.
Contoso uses Azure AD Privileged Identity Management (PIM) to protect administrative roles.
Existing Environment. Problem Statements
Contoso identifies the following issues:
Currently, all the helpdesk administrators can manage user licenses throughout the entire Microsoft 365 tenant.
The user administrators report that it is tedious to manually configure the different license requirements for each
Contoso office.
The helpdesk administrators spend too much time provisioning internal and guest access to the required Microsoft
365 services and apps.
Currently, the helpdesk administrators can perform tasks by using the User administrator role without justification
or approval.
When the Logs node is selected in Azure AD, an error message appears stating that Log Analytics integration is
not enabled.
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-organization
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory (Azure
AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The domain
contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
Enterprise Mobility + Security E5
Windows 10 Enterprise E3
Project Plan 3
Azure AD Connect is configured between Azure AD and Active Directory Domain Services (AD DS). Only the
Contoso_Resources OU is synced.
Helpdesk administrators routinely use the Microsoft 365 admin center to manage user settings.
User administrators currently use the Microsoft 365 admin center to manually assign licenses. All users have all
licenses assigned besides the following exceptions:
The users in the London office have the Microsoft 365 Phone System license unassigned.
The users in the Seattle office have the Yammer Enterprise license unassigned.
Security defaults are disabled for contoso.com.
Contoso uses Azure AD Privileged Identity Management (PIM) to protect administrative roles.
Existing Environment. Problem Statements
Contoso identifies the following issues:
Currently, all the helpdesk administrators can manage user licenses throughout the entire Microsoft 365 tenant.
The user administrators report that it is tedious to manually configure the different license requirements for each
Contoso office.
The helpdesk administrators spend too much time provisioning internal and guest access to the required Microsoft
365 services and apps.
Currently, the helpdesk administrators can perform tasks by using the User administrator role without justification
or approval.
When the Logs node is selected in Azure AD, an error message appears stating that Log Analytics integration is
not enabled.
Answer: D
Explanation:
Role Setting details is where you need to be: Role setting details - User Administrator
Approvers None
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-add-
role-to-user?tabs=new
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory (Azure
AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The domain
contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
Enterprise Mobility + Security E5
Windows 10 Enterprise E3
Project Plan 3
Azure AD Connect is configured between Azure AD and Active Directory Domain Services (AD DS). Only the
Contoso_Resources OU is synced.
Helpdesk administrators routinely use the Microsoft 365 admin center to manage user settings.
User administrators currently use the Microsoft 365 admin center to manually assign licenses. All users have all
licenses assigned besides the following exceptions:
The users in the London office have the Microsoft 365 Phone System license unassigned.
The users in the Seattle office have the Yammer Enterprise license unassigned.
Security defaults are disabled for contoso.com.
Contoso uses Azure AD Privileged Identity Management (PIM) to protect administrative roles.
Existing Environment. Problem Statements
Contoso identifies the following issues:
Currently, all the helpdesk administrators can manage user licenses throughout the entire Microsoft 365 tenant.
The user administrators report that it is tedious to manually configure the different license requirements for each
Contoso office.
The helpdesk administrators spend too much time provisioning internal and guest access to the required Microsoft
365 services and apps.
Currently, the helpdesk administrators can perform tasks by using the User administrator role without justification
or approval.
When the Logs node is selected in Azure AD, an error message appears stating that Log Analytics integration is
not enabled.
Answer: AD
Explanation:
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory (Azure
AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The domain
contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
Enterprise Mobility + Security E5
Windows 10 Enterprise E3
Project Plan 3
Azure AD Connect is configured between Azure AD and Active Directory Domain Services (AD DS). Only the
Contoso_Resources OU is synced.
Helpdesk administrators routinely use the Microsoft 365 admin center to manage user settings.
User administrators currently use the Microsoft 365 admin center to manually assign licenses. All users have all
licenses assigned besides the following exceptions:
The users in the London office have the Microsoft 365 Phone System license unassigned.
The users in the Seattle office have the Yammer Enterprise license unassigned.
Security defaults are disabled for contoso.com.
Contoso uses Azure AD Privileged Identity Management (PIM) to protect administrative roles.
Existing Environment. Problem Statements
Contoso identifies the following issues:
Currently, all the helpdesk administrators can manage user licenses throughout the entire Microsoft 365 tenant.
The user administrators report that it is tedious to manually configure the different license requirements for each
Contoso office.
The helpdesk administrators spend too much time provisioning internal and guest access to the required Microsoft
365 services and apps.
Currently, the helpdesk administrators can perform tasks by using the User administrator role without justification
or approval.
When the Logs node is selected in Azure AD, an error message appears stating that Log Analytics integration is
not enabled.
Answer: D
Explanation:
"You need to resolve the issue of the guest user invitations." Guest user invitations is the key.
I would think the guest user issue that needs resolving would be: "Fabrikam users must have access to the
marketing department's SharePoint site for a maximum of 90 days". If that is the case answer should be D.
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory (Azure
AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The domain
contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
Enterprise Mobility + Security E5
Windows 10 Enterprise E3
Project Plan 3
Azure AD Connect is configured between Azure AD and Active Directory Domain Services (AD DS). Only the
Contoso_Resources OU is synced.
Helpdesk administrators routinely use the Microsoft 365 admin center to manage user settings.
User administrators currently use the Microsoft 365 admin center to manually assign licenses. All users have all
licenses assigned besides the following exceptions:
The users in the London office have the Microsoft 365 Phone System license unassigned.
The users in the Seattle office have the Yammer Enterprise license unassigned.
Security defaults are disabled for contoso.com.
Contoso uses Azure AD Privileged Identity Management (PIM) to protect administrative roles.
Existing Environment. Problem Statements
Contoso identifies the following issues:
Currently, all the helpdesk administrators can manage user licenses throughout the entire Microsoft 365 tenant.
The user administrators report that it is tedious to manually configure the different license requirements for each
Contoso office.
The helpdesk administrators spend too much time provisioning internal and guest access to the required Microsoft
365 services and apps.
Currently, the helpdesk administrators can perform tasks by using the User administrator role without justification
or approval.
When the Logs node is selected in Azure AD, an error message appears stating that Log Analytics integration is
not enabled.
A. From the Microsoft Azure Active Directory Connect wizard, select Customize synchronization options.
B. From PowerShell, run Set-ADSyncScheduler.
C. From PowerShell, run Start-ADSyncSyncCycle.
D. From the Microsoft Azure Active Directory Connect wizard, select Change user sign-in.
Answer: A
Explanation:
You need to select Customize synchronization options to configure Azure AD Connect to sync the Adatum
organizational unit (OU).
Answer A is correct.
https://learn.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-sync-configure-
filtering#filtering-options
https://learn.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-sync-whatis#azure-ad-
connect-sync-topics
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented from
accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory forest.
Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for Litware but
exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
Implement a banned password list for the litware.com forest.
Enforce MFA when accessing on-premises applications.
Automatically detect and remediate externally leaked credentials.
Requirements. Access Requirements
Litware identifies the following access requirements:
Control all access to all Azure resources and Azure AD applications by using conditional access policies.
Implement a conditional access policy that has session controls for Microsoft SharePoint Online.
Control privileged access to applications by using access reviews in Azure AD.
Requirements. Monitoring Requirements
Litware wants to use the Fusion rule in Azure Sentinel to detect multi-staged attacks that include a combination of
suspicious Azure AD sign-ins followed by anomalous Microsoft Office 365 activity. Question You need to configure
the detection of multi-staged attacks to meet the monitoring requirements.
What should you do?
Answer: A
Explanation:
https://learn.microsoft.com/en-us/azure/sentinel/configure-fusion-rules#configure-fusion-rules
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees connect
remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active Directory
(Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in litware.com
by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection policies in
Microsoft Cloud App Security are enabled.
Litware has an Azure subscription associated to the litware.com Azure AD tenant. The subscription contains an
Azure Sentinel instance that uses the Azure Active
Directory connector and the Office 365 connector. Azure Sentinel currently collects the Azure AD sign-ins logs
and audit logs.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented from
accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory forest.
Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for Litware but
exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
Implement a banned password list for the litware.com forest.
Enforce MFA when accessing on-premises applications.
Automatically detect and remediate externally leaked credentials.
Requirements. Access Requirements
Litware identifies the following access requirements:
Control all access to all Azure resources and Azure AD applications by using conditional access policies.
Implement a conditional access policy that has session controls for Microsoft SharePoint Online.
Control privileged access to applications by using access reviews in Azure AD.
Requirements. Monitoring Requirements
Litware wants to use the Fusion rule in Azure Sentinel to detect multi-staged attacks that include a combination of
suspicious Azure AD sign-ins followed by anomalous Microsoft Office 365 activity. Question You need to track
application access assignments by using Identity Governance. The solution must meet the delegation
requirements.
What should you do first?
Answer: C
Explanation:
The Answer is C - Programs as stated they are requiring the use of custom programs
If you have any feedback or thoughts on the bumps, I would love to hear them.
Your insights can help me improve our writing and better understand our readers.
Best of Luck
You have worked hard to get to this point, and you are well-prepared for the exam
Keep your head up, stay positive, and go show that exam what you're made of!