SC-300 Reviewer
SC-300 Reviewer
SC-300 Reviewer
From the External collaboration settings in the Azure Which objects can you add as members to Group3?
Active Directory admin center, you configure the
Collaboration restrictions settings as shown in the
A. User2 and Group2 only
following exhibit.
B. User2, Group1, and Group2 only
C. User1, User2, Group1 and Group2
D. User1 and User2 only
E. User2 only
9. DRAG DROP -
In the tenant, you create the groups shown in the 12. Solution: You configure pass-through
following table. authentication.
Does this meet the goal?
A. Yes
Which members can you add to GroupA and GroupB? B. No
To answer, select the appropriate options in the
answer area. 13. Solution: You configure conditional access
NOTE: Each correct selection is worth one point. policies.
Hot Area: Does this meet the goal?
A. Yes
B. No
28. Your company has a Microsoft 365 tenant. Which policy type should you create?
The company has a call center that contains 300
users. In the call center, the users share desktop A. a Microsoft Cloud App Security activity policy that
computers and might use a different computer every has Microsoft Office 365 governance actions
day. The call center computers are NOT configured configured
for biometric identification. B. an Azure AD conditional access policy that has
The users are prohibited from having a mobile phone session controls configured
in the call center. C. an Azure AD conditional access policy that has
You need to require multi-factor authentication client apps conditions configured
(MFA) for the call center users when they access D. a Microsoft Cloud App Security app discovery
Microsoft 365 services. policy that has governance actions configured
What should you include in the solution?
A. a named network location 32. You have an Active Directory domain that syncs
B. the Microsoft Authenticator app to an Azure Active Directory (Azure AD) tenant.
C. Windows Hello for Business authentication The on-premises network contains a VPN server that
D. FIDO2 tokens authenticates to the on-premises Active Directory
domain.
The VPN server does NOT support Azure Multi- Select and Place:
Factor Authentication (MFA).
You need to recommend a solution to provide Azure
MFA for VPN connections.
What should you include in the recommendation?
A. Azure AD Application Proxy
B. an Azure AD Password Protection proxy
C. Network Policy Server (NPS)
Answer:
D. a pass-through authentication proxy
34. DRAG DROP - 36. Note: This question is part of a series of questions
You have a Microsoft 365 E5 tenant. that present the same scenario. Each question in the
You purchase a cloud app named App1. series contains a unique solution that might meet the
You need to enable real-time session-level stated goals. Some question sets might have more
monitoring of App1 by using Microsoft Cloud App than one correct solution, while others might not
Security. have a correct solution.
In which order should you perform the actions? To After you answer a question in this section, you will
answer, move the appropriate actions from the list of NOT be able to return to it. As a result, these
actions to the answer area and arrange them in the questions will not appear in the review screen.
correct order. You have a Microsoft 365 tenant.
All users must use the Microsoft Authenticator app
for multi-factor authentication (MFA) when accessing
Microsoft 365 services.
Some users report that they received an MFA prompt
on their Microsoft Authenticator app without
initiating a sign-in request.
You need to block the users automatically when they 40. HOTSPOT -
report an MFA request that they did not initiate. You have an Azure Active Directory (Azure AD) tenant
Solution: From the Azure portal, you configure the that contains the users shown in the following table.
Notifications settings for multi-factor authentication
(MFA).
Does this meet the goal?
A. Yes
B. No
37. Solution: From the Azure portal, you configure You plan to implement Azure AD Identity Protection.
the Account lockout settings for multi-factor Which users can configure the user risk policy, and
authentication (MFA). which users can view the risky users report? To
Does this meet the goal? answer, select the appropriate options in the answer
A. Yes area.
B. No NOTE: Each correct selection is worth one point.
Hot Area:
38. Solution: From the Azure portal, you configure
the Block/unblock users settings for multi-factor
authentication (MFA).
Does this meet the goal?
A. Yes
B. No
39. HOTSPOT -
You have a Microsoft 365 tenant.
You need to identify users who have leaked
credentials. The solution must meet the following
requirements:
✑ Identify sign-ins by users who are suspected of
having leaked credentials. 41. HOTSPOT -
✑ Flag the sign-ins as a high-risk event. You have an Azure Active Directory (Azure AD) tenant
✑ Immediately enforce a control to mitigate the risk, that contains an administrative unit named
while still allowing the user to access applications. Department1.
What should you use? To answer, select the Department1 has the users shown in the Users
appropriate options in the answer area. exhibit. (Click the Users tab.)
NOTE: Each correct selection is worth one point.
Hot Area:
44. HOTSPOT -
You have a Microsoft 365 tenant.
Sometimes, users use external, third-party
For each of the following statements, select Yes if the applications that require limited access to the
statement is true. Otherwise, select No. Microsoft 365 data of the respective user. The users
NOTE: Each correct selection is worth one point. register the applications in Azure Active Directory
Hot Area: (Azure AD).
You need to receive an alert if a registered
application gains read and write access to the users'
email.
What should you do? To answer, select the
appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
43. HOTSPOT -
You have a Microsoft 365 tenant and an Active
Directory domain named adatum.com.
You deploy Azure AD Connect by using the Express
Settings.
45. You have a Microsoft 365 tenant. 47. HOTSPOT -
The Azure Active Directory (Azure AD) tenant syncs to You have an Azure Active Directory (Azure AD) tenant
an on-premises Active Directory domain. that has the default App registrations settings. The
Users connect to the internet by using a hardware tenant contains the users shown in the following
firewall at your company. The users authenticate to table.
the firewall by using their Active Directory
credentials.
You plan to manage access to external applications
by using Azure AD.
You need to use the firewall logs to create a list of
unmanaged external applications and the users who You purchase two cloud apps named App1 and App2.
access them. The global administrator registers App1 in Azure AD.
What should you use to gather the information? You need to identify who can assign users to App1,
A. Application Insights in Azure Monitor and who can register App2 in Azure AD.
B. access reviews in Azure AD What should you identify? To answer, select the
C. Cloud App Discovery in Microsoft Cloud App appropriate options in the answer area.
Security NOTE: Each correct selection is worth one point.
D. enterprise applications in Azure AD Hot Area:
46. HOTSPOT -
You have an on-premises datacenter that contains
the hosts shown in the following table.
51. HOTSPOT -
You have a Microsoft 365 tenant that contains a
group named Group1 as shown in the Group1
exhibit. (Click the Group1 tab.)
53. HOTSPOT -
Your company has a Microsoft 365 tenant.
All users have computers that run Windows 10 and
are joined to the Azure Active Directory (Azure AD)
tenant.
The company subscribes to a third-party cloud
service named Service1. Service1 supports Azure AD
You configure self-service for App1 as shown in the authentication and authorization based on OAuth.
App1 Self-service exhibit. (Click the App1 Self-service Service1 is published to the Azure AD gallery.
tab.) You need to recommend a solution to ensure that
the users can connect to Service1 without being
prompted for authentication. The solution must
ensure that the users can access Service1 only from
Azure AD-joined computers. The solution must
minimize administrative effort.
What should you recommend for each requirement?
To answer, select the appropriate options in the
answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
70. You have an Azure subscription that contains the 74. HOTSPOT -
resources shown in the following table. You have an Azure Active Directory (Azure AD) tenant
that contains the following group:
✑ Name: Group1
✑ Members: User1, User2
For which resources can you create an access ✑ Owner: User3
review? On January 15, 2021, you create an access review as
A. Group1, Role1, and Contributor only shown in the exhibit. (Click the Exhibit tab.)
B. Group1 only
C. Group1, App1, Contributor, and Role1
D. Role1 and Contributor only
76. You have an Azure Active Directory (Azure AD) Contoso also includes a marketing department that
tenant named contoso.com that has Azure AD has users in each office.
Identity Protection policies enforced. Existing Environment. Microsoft 365/Azure
You create an Azure Sentinel instance and configure Environment
the Azure Active Directory connector. Contoso has an Azure AD tenant named contoso.com
You need to ensure that Azure Sentinel can generate that has the following associated licenses:
incidents based on the risk alerts raised by Azure AD Microsoft Office 365 Enterprise E5
Identity Protection.
What should you do first? Enterprise Mobility + Security E5
A. Add an Azure Sentinel data connector. Windows 10 Enterprise E3
Project Plan 3
Azure AD Connect is configured between Azure AD For new users in the marketing department,
and Active Directory Domain Services (AD DS). Only implement an automated approval workflow to
the Contoso_Resources OU is synced. provide access to a Microsoft SharePoint Online site,
Helpdesk administrators routinely use the Microsoft group, and app.
365 admin center to manage user settings. Contoso plans to acquire a company named ADatum
User administrators currently use the Microsoft 365 Corporation. One hundred new ADatum users will be
admin center to manually assign licenses. All users created in an Active Directory OU named Adatum.
have all licenses assigned besides the following The users will be located in London and Seattle.
exceptions: Requirements. Technical Requirements
The users in the London office have the Microsoft Contoso identifies the following technical
365 Phone System license unassigned. requirements:
The users in the Seattle office have the Yammer All users must be synced from AD DS to the
Enterprise license unassigned. contoso.com Azure AD tenant.
Security defaults are disabled for contoso.com. App1 must have a redirect URI pointed to
Contoso uses Azure AD Privileged Identity https://contoso.com/auth-response.
Management (PIM) to protect administrative roles. License allocation for new users must be assigned
Existing Environment. Problem Statements automatically based on the location of the user.
Contoso identifies the following issues: Fabrikam users must have access to the marketing
Currently, all the helpdesk administrators can department's SharePoint site for a maximum of 90
manage user licenses throughout the entire days.
Microsoft 365 tenant. Administrative actions performed in Azure AD must
The user administrators report that it is tedious to be audited. Audit logs must be retained for one year.
manually configure the different license The helpdesk administrators must be able to manage
requirements for each Contoso office. licenses for only the users in their respective office.
The helpdesk administrators spend too much time Users must be forced to change their password if
provisioning internal and guest access to the required there is a probability that the users' identity was
Microsoft 365 services and apps. compromised.
Currently, the helpdesk administrators can perform
tasks by using the User administrator role without Question
justification or approval. You need to sync the ADatum users. The solution
When the Logs node is selected in Azure AD, an error must meet the technical requirements.
message appears stating that Log Analytics What should you do?
integration is not enabled.
A. From the Microsoft Azure Active Directory
Requirements. Planned Changes - Connect wizard, select Customize synchronization
Contoso plans to implement the following changes: options.
Implement self-service password reset (SSPR). B. From PowerShell, run Set-ADSyncScheduler.
Analyze Azure audit activity logs by using Azure C. From PowerShell, run Start-ADSyncSyncCycle.
Monitor. D. From the Microsoft Azure Active Directory
Simplify license allocation for new users added to the Connect wizard, select Change user sign-in.
tenant.
Collaborate with the users at Fabrikam on a joint 78. Question
marketing campaign. HOTSPOT -
Configure the User administrator role to require You need to meet the technical requirements for
justification and approval to activate. license management by the helpdesk administrators.
Implement a custom line-of-business Azure web app What should you create first, and which tool should
named App1. App1 will be accessible from the you use? To answer, select the appropriate options in
internet and authenticated by using Azure AD the answer area.
accounts. NOTE: Each correct selection is worth one point.
Hot Area: in the following table.
77*83. Question
HOTSPOT -
You need to meet the technical requirements for the
80. Question
probability that user identities were compromised.
You need to meet the authentication requirements
What should the users do first, and what should you
for leaked credentials.
configure? To answer, select the appropriate options
What should you do?
in the answer area.
A. Enable password hash synchronization in Azure AD
NOTE: Each correct selection is worth one point.
Connect.
Hot Area:
B. Configure Azure AD Password Protection.
C. Configure an authentication method policy in
Azure AD.
D. Enable federation with PingFederate in Azure AD
Connect.
81. Question
HOTSPOT -
84. Question Hot Area:
You need to configure the MFA settings for users
who connect from the Boston office. The solution
must meet the authentication requirements and the
access requirements.
What should you include in the configuration?
A. named locations that have a private IP address
range
B. named locations that have a public IP address 77*88. Question
range You create a Log Analytics workspace.
C. trusted IPs that have a public IP address range You need to implement the technical requirements
D. trusted IPs that have a private IP address range for auditing.
What should you configure in Azure AD?
77*85. Question A. Company branding
You need to meet the planned changes and technical B. Diagnostics settings
requirements for App1. C. External Identities
What should you implement? D. App registrations
A. a policy set in Microsoft Endpoint Manager
B. an app configuration policy in Microsoft Endpoint 77*89. Question
Manager HOTSPOT -
C. an app registration in Azure AD You need to implement the planned changes and
D. Azure AD Application Proxy technical requirements for the marketing
department.
86. Question What should you do? To answer, select the
HOTSPOT - appropriate options in the answer area.
You need to implement on-premises application and NOTE: Each correct selection is worth one point.
SharePoint Online restrictions to meet the Hot Area
authentication requirements and the access
requirements.
What should you do? To answer, select the
appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
77*90. Question
You need to meet the planned changes for the User
administrator role.
What should you do?
A. Create an access review.
B. Create an administrative unit.
87. Question C. Modify Active assignments.
HOTSPOT - D. Modify Role settings.
You need to configure app registration in Azure AD to
meet the delegation requirements. 91. Question
What should you do? To answer, select the You need to configure the detection of multi-staged
appropriate options in the answer area. attacks to meet the monitoring requirements.
NOTE: Each correct selection is worth one point. What should you do?
A. Customize the Azure Sentinel rule logic.
B. Create a workbook.
C. Add Azure Sentinel data connectors.
D. Add an Azure Sentinel playbook.
92. Question
You need to track application access assignments by
using Identity Governance. The solution must meet
the delegation requirements.
What should you do first?
A. Modify the User consent settings for the
enterprise applications.
B. Create a catalog.
C. Create a program.
D. Modify the Admin consent requests settings for
the enterprise applications.