Topic 4: Misc. Questions
Task 8
You need to prevent all users from using legacy authentication protocols when
authenticating to Microsoft Entra ID.
Explanation:
To prevent all users from using legacy authentication protocols when authenticating to
Microsoft Entra ID, you can create a Conditional Access policy that blocks legacy
authentication. Here’s how to do it:
Sign in to the Microsoft Entra admin center:
uk.co.certification.simulator.questionpool.PList@64121097
Navigate to Conditional Access:
Create a new policy:
Set users and groups:
Target resources:
Set conditions:
Configure access controls:
Enable policy:
By following these steps, you will block legacy authentication protocols for all users,
enhancing the security posture of your organization by requiring modern authentication
methods. Remember to monitor the impact of this policy and adjust as necessary to ensure business continuity.
Task 5
You need to assign a Windows 10/11 Enterprise E3 license to the Sg-Retail group.
Explanation:
To assign a Windows 10/11 Enterprise E3 license to the Sg-Retail group, you can follow
these steps:
Sign in to the Microsoft Entra admin center:
uk.co.certification.simulator.questionpool.PList@10b7708e
Navigate to the licensing page:
Find the Windows 10/11 Enterprise E3 license:
Assign licenses to the group:
Review and confirm the assignment:
Monitor the license status:
By following these steps, the Sg-Retail group should now have the Windows 10/11
Enterprise E3 licenses assigned to them.
Task 7
You need to lock out accounts for five minutes when they have 10 failed sign-in attempts.
Explanation:
To configure the account lockout settings so that accounts are locked out for five minutes
after 10 failed sign-in attempts, you can follow these steps:
Open the Microsoft Entra admin center:
uk.co.certification.simulator.questionpool.PList@2b58d93c
Navigate to the lockout settings:
Adjust the Smart Lockout settings:
Please note that by default, smart lockout locks an account from sign-in after 10 failed
attempts in Azure Public and Microsoft Azure operated by 21Vianet tenants1. The lockout
period is one minute at first, and longer in subsequent attempts. However, you can
customize these settings to meet your organization’s requirements if you have Microsoft
Entra ID P1 or higher licenses for your users1.
Task 1
You need to deploy multi factor authentication (MFA). The solution must meet the following
requirements:
- Require MFA registration only for members of the Sg-Finance group.
- Exclude Debra Berger from having to register for MFA.
- Implement the solution without using a Conditional Access policy.
Explanation:
To deploy Multi-Factor Authentication (MFA) for only the members of the Sg-Finance
group, excluding Debra Berger, and without using a Conditional Access policy, you can follow these steps:
Open the Microsoft Entra admin center:
uk.co.certification.simulator.questionpool.PList@104a0cb8
Navigate to MFA settings:
Manage user settings:
Exclude a user from MFA:
Verify the configuration:
Communicate the change:
Monitor the setup:
Task 6
You need to implement additional security checks before the members of the Sg-Executive
can access any company apps. The members must meet one of the following conditions:
- Connect by using a device that is marked as compliant by Microsoft Intune.
- Connect by using client apps that are protected by app protection policies.
Explanation:
To implement additional security checks for the Sg-Executive group members before they
can access any company apps, you can use Conditional Access policies in Microsoft Entra.
Here’s a step-by-step guide:
Sign in to the Microsoft Entra admin center:
uk.co.certification.simulator.questionpool.PList@164c53bc
Navigate to Conditional Access:
Create a new policy:
Assign the policy to the Sg-Executive group:
Define the application control conditions:
Set the device compliance requirement:
Set the app protection policy requirement:
Configure the access controls:
Enable the policy:
Review and save the policy:
By following these steps, you will ensure that the Sg-Executive group members can only
access company apps if they meet one of the specified conditions, either by using a
compliant device or a protected client app. This enhances the security posture of your
organization by enforcing stricter access controls for executive-level users.
Task 2
You need to implement a process to review guest users who have access to the Salesforce
app. The review must meet the following requirements:
- The reviews must occur monthly.
- The manager of each guest user must review the access.
- If the reviews are NOT completed within five days, access must be removed.
- If the guest user does not have a manager, Megan Bowen must review the access.
Explanation:
To implement a process for reviewing guest users’ access to the Salesforce app with the
specified requirements, you can use Microsoft Entra’s Identity Governance access reviews
feature. Here’s a step-by-step guide:
Assign the appropriate role:
uk.co.certification.simulator.questionpool.PList@10556031
Navigate to Identity Governance:
Create a new access review:
Configure the review settings:
Determine the reviewers:
Automate the removal process:
Monitor and enforce compliance:
Communicate the process:
By following these steps, you can ensure that guest users’ access to the Salesforce app is
reviewed monthly, with managers being responsible for the review, and access is removed
if the review is not completed in time.
Task 10
You need to create a group named Audit. The solution must ensure that the members of
Audit can activate the Security Reader role.
Explanation:
To create a group named “Audit” and ensure that its members can activate the Security
Reader role, follow these steps:
Open the Microsoft Entra admin center:
uk.co.certification.simulator.questionpool.PList@4c9ee6f3
Navigate to Groups:
Create the security group:
Edit settings:
Assign roles:
Review and finish:
By following these steps, you will have created the “Audit” group and enabled its members
to activate the Security Reader role, which allows them to view security-related information
without having permissions to change it. Remember to communicate the new group and
role assignment to the relevant stakeholders in your organization.
Task 4
You need to ensure that all users can consent to apps that require permission to read their
user profile. Users must be prevented from consenting to apps that require any other
permissions.
Explanation:
To ensure that all users can consent to apps that require permission to read their user
profile and prevent them from consenting to apps that require any other permissions, you
can configure the user consent settings in the Microsoft Entra admin center. Here’s how
you can do it:
Sign in as a Global Administrator:
uk.co.certification.simulator.questionpool.PList@60ecdd90
Navigate to user consent settings:
Configure the consent settings:
Save the settings:
By following these steps, you will have configured the system to allow user consent for apps that need to read the user profile while blocking consent for apps that require additional permissions. This setup helps maintain user autonomy where appropriate while safeguarding against unauthorized access to broader permissions.
Task 9
You need to ensure that when users in the Sg-Operations group go to the My Apps portal a
tab named Operations appears that contains only the following applications:
- Unkedln
- Box
Explanation:
To ensure that users in the Sg-Operations group see a tab named “Operations” containing
only LinkedIn and Box applications in the My Apps portal, you can create a collection with
these specific applications. Here’s how to do it:
Sign in to the Microsoft Entra admin center:
uk.co.certification.simulator.questionpool.PList@552a66a9
Navigate to App launchers:
Create a new collection:
Add applications to the collection:
Assign the collection to the Sg-Operations group:
Review and create the collection:
By following these steps, when users in the Sg-Operations group visit the My Apps portal,
they will see a new tab named “Operations” that contains only the LinkedIn and Box
applications1.
Please note that to create collections on the My Apps portal, you need a Microsoft Entra ID
P1 or P2 license1.
Task 3
You need to add the Linkedln application as a resource to the Sales and Marketing access
package. The solution must NOT remove any other resources from the access package.
Explanation:
To add the LinkedIn application as a resource to the Sales and Marketing access package
without removing any other resources, you can follow these steps:
Sign in to the Microsoft Entra admin center:
uk.co.certification.simulator.questionpool.PList@76155049
Navigate to Entitlement Management:
Select the Sales and Marketing access package:
Add a new resource:
Configure the resource role:
Review and update the access package:
Save the changes:
Communicate the update:
By following these steps, you will successfully add the LinkedIn application to the Sales
and Marketing access package without affecting the other resources.
| Page 9 out of 36 Pages |