Topic 4: Misc. Questions
You have an Azure Active Directory Premium P2 tenant.
You create a Log Analytics workspace.
You need to ensure that you can view Azure Active Directory (Azure AD) audit log
information by using Azure Monitor.
What should you do first?
A. Run the Set-AzureADTenantDetail cmdlet
B. Create an Azure AD workbook.
C. Modify the Diagnostics settings for Azure AD
D. Run the Get-AzureADAuditDirectoryLogs cmdlet
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant that syncs to an Active Directory
forest.
You discover that when a user account is disabled in Active Directory, the disabled user
can still authenticate to Azure AD for up to 30 minutes.
You need to ensure that when a user account is disabled in Active Directory, the user
account is immediately prevented from authenticating to Azure AD.
Solution: You configure pass-through authentication.
Does this meet the goal?
A. Yes
B. No
You have an Azure Active Directory (Azure AD) tenant named contoso.com.
All users who run applications registered in Azure AD are subject to conditional access
policies.
You need to prevent the users from using legacy authentication.
What should you include in the conditional access policies to filter out legacy authentication
attempts?
A. a cloud apps or actions condition
B. a user risk condition
C. a client apps condition
D. a sign-in risk condition
You have an Azure subscription that contains a user named User1. You need to meet the
following requirements:
A. Application developer
B. Cloud application administrator
C. Service support administrator
D. Application administrator
You have a Microsoft 365 tenant.
All users must use the Microsoft Authenticator app for multi-factor authentication (MFA)
when accessing Microsoft 365 services.
Some users report that they received an MFA prompt on their Microsoft Authenticator app
without initiating a sign-in request.
You need to block the users automatically when they report an MFA request that they did
not Initiate.
Solution: From the Azure portal, you configure the Fraud alert settings for multi-factor
authentication (MFA).
Does this meet the goal?
A. Yes
B. No
Explanation:
The fraud alert feature lets users report fraudulent attempts to access their resources.
When an unknown and suspicious MFA prompt is received, users can report the fraud
attempt using the Microsoft Authenticator app or through their phone.
The following fraud alert configuration options are available:
Page 8 out of 61 Pages |
Previous |