Go Back on SC-300 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

SC-300 Practice Test


Page 8 out of 61 Pages

Topic 4: Misc. Questions

You have an Azure Active Directory Premium P2 tenant.
You create a Log Analytics workspace.
You need to ensure that you can view Azure Active Directory (Azure AD) audit log information by using Azure Monitor.
What should you do first?


A. Run the Set-AzureADTenantDetail cmdlet


B. Create an Azure AD workbook.


C. Modify the Diagnostics settings for Azure AD


D. Run the Get-AzureADAuditDirectoryLogs cmdlet





C.
  Modify the Diagnostics settings for Azure AD

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant that syncs to an Active Directory forest.
You discover that when a user account is disabled in Active Directory, the disabled user can still authenticate to Azure AD for up to 30 minutes.
You need to ensure that when a user account is disabled in Active Directory, the user account is immediately prevented from authenticating to Azure AD.
Solution: You configure pass-through authentication.
Does this meet the goal?


A. Yes


B. No





A.
  Yes

You have an Azure Active Directory (Azure AD) tenant named contoso.com.
All users who run applications registered in Azure AD are subject to conditional access policies.
You need to prevent the users from using legacy authentication.
What should you include in the conditional access policies to filter out legacy authentication attempts?


A. a cloud apps or actions condition


B. a user risk condition


C. a client apps condition


D. a sign-in risk condition





C.
  a client apps condition

You have an Azure subscription that contains a user named User1. You need to meet the following requirements:

  • Prevent User1 from being added as an owner of newly registered apps.
  • Ensure that User1 can manage the application proxy settings.
  • Ensure that User2 can register apps.
  • Use the principle of least privilege.
Which role should you assign to User1?


A. Application developer


B. Cloud application administrator


C. Service support administrator


D. Application administrator





D.
  Application administrator

You have a Microsoft 365 tenant.
All users must use the Microsoft Authenticator app for multi-factor authentication (MFA) when accessing Microsoft 365 services.
Some users report that they received an MFA prompt on their Microsoft Authenticator app without initiating a sign-in request.
You need to block the users automatically when they report an MFA request that they did not Initiate.
Solution: From the Azure portal, you configure the Fraud alert settings for multi-factor authentication (MFA).
Does this meet the goal?


A. Yes


B. No





A.
  Yes

Explanation:
The fraud alert feature lets users report fraudulent attempts to access their resources. When an unknown and suspicious MFA prompt is received, users can report the fraud attempt using the Microsoft Authenticator app or through their phone.
The following fraud alert configuration options are available:

  • Automatically block users who report fraud.
  • Code to report fraud during initial greeting.


Page 8 out of 61 Pages
Previous