Topic 4: Misc. Questions
You have an Azure AD tenant named contoso.com that contains the resources shown in
the following table.
You create a user named Admin 1.
You need to ensure that Admin can enable Security defaults for contoso.com.
What should you do first?
A. Configure Identity Governance
B. Delete Package1
C. Delete CAPolicy1
D. Assign Admin1 the Authentication administrator role for Au1
Explanation: To enable Security defaults for contoso.com, you should first sign in to the Azure portal as a security administrator, Conditional Access administrator, or global administrator. Then, browse to Azure Active Directory > Properties and select Manage security defaults. Set the Enable security defaults toggle to Yes and select Save. After that, you can assign Admin1 the Identity Administrator role for Au1 to enable them to manage security defaults for the tenant.
You have a Microsoft 365 tenant.
All users have mobile phones and laptops.
The users frequently work from remote locations that do not have Wi-Fi access or mobile
phone connectivity. While working from the remote locations, the users connect their laptop
to a wired network that has internet access.
You plan to implement multi-factor authentication (MFA).
Which MFA authentication method can the users use from the remote location?
A. a notification through the Microsoft Authenticator app
B. an app password
C. Windows Hello for Business
D. SMS
Explanation: In Windows 10, Windows Hello for Business replaces passwords with strong two-factor authentication on PCs and mobile devices. This authentication consists of a new type of user credential that is tied to a device and uses a biometric or PIN. After an initial two-step verification of the user during enrollment, Windows Hello is set up on the user's device and Windows asks the user to set a gesture, which can be a biometric, such as a fingerprint, or a PIN. The user provides the gesture to verify their identity. Windows then uses Windows Hello to authenticate users.
You have an Azure subscription named Sub1 that contains two resource groups named RG1 and RG2. Sub1 contains the users shown in the following table.

You have an Azure Active Directory (Azure AD) tenant that contains the objects shown in
the following table.
Which objects can you add as eligible in Azure Privileged identity Management (PIM) for an
Azure AD role?
A. User1 only
B. User1 and Identity1 only
C. User1. Guest1, and Identity
D. User1 and Guest1 only
You have a Microsoft Entra tenant that contains the users shown in the following table.

You have an Azure Active Directory Premium P2 tenant.
You create a Log Analytics workspace.
You need to ensure that you can view Azure Active Directory (Azure AD) audit log
information by using Azure Monitor.
What should you do first?
A. Run the Set-AzureADTenantDetail cmdlet
B. Create an Azure AD workbook.
C. Modify the Diagnostics settings for Azure AD
D. Run the Get-AzureADAuditDirectoryLogs cmdlet
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant that syncs to an Active Directory
forest.
You discover that when a user account is disabled in Active Directory, the disabled user
can still authenticate to Azure AD for up to 30 minutes.
You need to ensure that when a user account is disabled in Active Directory, the user
account is immediately prevented from authenticating to Azure AD.
Solution: You configure pass-through authentication.
Does this meet the goal?
A. Yes
B. No
You have an Azure Active Directory (Azure AD) tenant named contoso.com.
All users who run applications registered in Azure AD are subject to conditional access
policies.
You need to prevent the users from using legacy authentication.
What should you include in the conditional access policies to filter out legacy authentication
attempts?
A. a cloud apps or actions condition
B. a user risk condition
C. a client apps condition
D. a sign-in risk condition
You have an Azure subscription that contains a user named User1. You need to meet the
following requirements:
- Prevent User1 from being added as an owner of newly registered apps.
- Ensure that User1 can manage the application proxy settings.
- Ensure that User2 can register apps.
- Use the principle of least privilege.
A. Application developer
B. Cloud application administrator
C. Service support administrator
D. Application administrator
You have a Microsoft 365 tenant.
All users must use the Microsoft Authenticator app for multi-factor authentication (MFA)
when accessing Microsoft 365 services.
Some users report that they received an MFA prompt on their Microsoft Authenticator app
without initiating a sign-in request.
You need to block the users automatically when they report an MFA request that they did
not Initiate.
Solution: From the Azure portal, you configure the Fraud alert settings for multi-factor
authentication (MFA).
Does this meet the goal?
A. Yes
B. No
Explanation:
The fraud alert feature lets users report fraudulent attempts to access their resources.
When an unknown and suspicious MFA prompt is received, users can report the fraud
attempt using the Microsoft Authenticator app or through their phone.
The following fraud alert configuration options are available:
- Automatically block users who report fraud.
- Code to report fraud during initial greeting.
| Page 4 out of 36 Pages |
| SC-300 Practice Test | Previous |