SC 300 v25.3.2 - 395 1jf9da
SC 300 v25.3.2 - 395 1jf9da
SC 300 v25.3.2 - 395 1jf9da
in/
Question #1Topic 1
You have an Azure Active Directory (Azure AD) tenant that contains the following objects:
✑ A device named Device1
✑ Users named User1, User2, User3, User4, and User5
✑ Groups named Group1, Group2, Group3, Group4, and Group5
The groups are configured as shown in the following table.
To which groups can you assign a Microsoft Office 365 Enterprise E5 license directly?
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/enterprise-users/licensing-group-advanced
Question #2Topic 1
You have a Microsoft Exchange organization that uses an SMTP address space of contoso.com.
Several users use their contoso.com email address for self-service sign-up to Azure Active Directory
(Azure AD).
https://cloudcertified.in/ 1
ClouCertified Practice Tests https://cloudcertified.in/
You gain global administrator privileges to the Azure AD tenant that contains the self-signed users.
You need to prevent the users from creating user accounts in the contoso.com Azure AD tenant for self-
service sign-up to Microsoft 365 services.
Which PowerShell cmdlet should you run?
• A. Set-MsolCompanySettings
• B. Set-MsolDomainFederationSettings
• C. Update-MsolfederatedDomain
• D. Set-MsolDomain
Correct Answer: A
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/enterprise-users/directory-self-service-signup
Question #3Topic 1
You have a Microsoft 365 tenant that uses the domain named fabrikam.com. The Guest invite settings for
Azure Active Directory (Azure AD) are configured as shown in the exhibit. (Click the Exhibit tab.)
A user named [email protected] shares a Microsoft SharePoint Online document library to the users
https://cloudcertified.in/ 2
ClouCertified Practice Tests https://cloudcertified.in/
• A. User2 only
• B. User1 only
• C. User1 and User2 only
• D. User1, User2, and User3
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/one-time-passcode
Question #4Topic 1
You have 2,500 users who are assigned Microsoft Office 365 Enterprise E3 licenses. The licenses are
assigned to individual users.
From the Groups blade in the Azure Active Directory admin center, you assign Microsoft 365 Enterprise
E5 licenses to the users.
You need to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of
administrative effort.
What should you use?
• A. the Identity Governance blade in the Azure Active Directory admin center
• B. the Set-AzureAdUser cmdlet
• C. the Licenses blade in the Azure Active Directory admin center
• D. the Set-WindowsProductKey cmdlet
Correct Answer: C
You can unassign licenses from users on either the Active users page, or on the Licenses page. The
method you use depends on whether you want to unassign product licenses from specific users or
unassign users licenses from a specific product.
Note:
There are several versions of this question in the exam. The question has two possible correct answers:
1. the Licenses blade in the Azure Active Directory admin center
2. the Set-MsolUserLicense cmdlet
Other incorrect answer options you may see on the exam include the following:
✑ the Administrative units blade in the Azure Active Directory admin center
✑ the Groups blade in the Azure Active Directory admin center
✑ the Set-AzureAdGroup cmdlet
Reference:
https://docs.microsoft.com/en-us/microsoft-365/admin/manage/remove-licenses-from-
users?view=o365-worldwide
Question #5Topic 1
HOTSPOT -
You have a Microsoft 365 tenant named contoso.com.
Guest user access is enabled.
Users are invited to collaborate with contoso.com as shown in the following table.
https://cloudcertified.in/ 3
ClouCertified Practice Tests https://cloudcertified.in/
From the External collaboration settings in the Azure Active Directory admin center, you configure the
Collaboration restrictions settings as shown in the following exhibit.
From a Microsoft SharePoint Online site, a user invites [email protected] to the site.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct
Answer:
https://cloudcertified.in/ 4
ClouCertified Practice Tests https://cloudcertified.in/
Box 1: Yes -
Invitations can only be sent to outlook.com. Therefore, User1 can accept the invitation and access the
application.
Box 2. Yes -
Invitations can only be sent to outlook.com. However, User2 has already received and accepted an
invitation so User2 can access the application.
Box 3. No -
Invitations can only be sent to outlook.com. Therefore, User3 will not receive an invitation.
Question #6Topic 1
You have an Azure Active Directory (Azure AD) tenant named contoso.com.
You plan to bulk invite Azure AD business-to-business (B2B) collaboration users.
Which two parameters must you include when you create the bulk invite? Each correct answer presents
part of the solution.
NOTE: Each correct selection is worth one point.
• A. email address
• B. redirection URL
• C. username
• D. shared key
• E. password
Correct Answer: AB
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/tutorial-bulk-invite
Question #7Topic 1
You have an Azure Active Directory (Azure AD) tenant that contains the objects shown in the following
table.
https://cloudcertified.in/ 5
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: E
Reference:
https://bitsizedbytes.wordpress.com/2018/12/10/distribution-security-and-office-365-groups-nesting/
Question #8Topic 1
DRAG DROP -
You have an on-premises Microsoft Exchange organization that uses an SMTP address space of
contoso.com.
You discover that users use their email address for self-service sign-up to Microsoft 365 services.
You need to gain global administrator privileges to the Azure Active Directory (Azure AD) tenant that
contains the self-signed users.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the
list of actions to the answer area and arrange them in the correct order.
Select and Place:
Correct
Answer:
https://cloudcertified.in/ 6
ClouCertified Practice Tests https://cloudcertified.in/
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/enterprise-users/domains-admin-takeover
Question #9Topic 1
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant that contains a user named User1 and the groups
shown in the following table.
In the tenant, you create the groups shown in the following table.
Which members can you add to GroupA and GroupB? To answer, select the appropriate options in the
answer area.
NOTE: Each correct selection is worth one point.
https://cloudcertified.in/ 7
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
https://cloudcertified.in/ 8
ClouCertified Practice Tests https://cloudcertified.in/
Reference:
https://bitsizedbytes.wordpress.com/2018/12/10/distribution-security-and-office-365-groups-nesting/
Question #10Topic 1
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have an Active Directory forest that syncs to an Azure Active Directory (Azure AD) tenant.
You discover that when a user account is disabled in Active Directory, the disabled user can still
authenticate to Azure AD for up to 30 minutes.
You need to ensure that when a user account is disabled in Active Directory, the user account is
immediately prevented from authenticating to Azure AD.
Solution: You configure password writeback.
Does this meet the goal?
• A. Yes
• B. No
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/choose-ad-authn
https://cloudcertified.in/ 9
ClouCertified Practice Tests https://cloudcertified.in/
Question #11Topic 1
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have an Active Directory forest that syncs to an Azure Active Directory (Azure AD) tenant.
You discover that when a user account is disabled in Active Directory, the disabled user can still
authenticate to Azure AD for up to 30 minutes.
You need to ensure that when a user account is disabled in Active Directory, the user account is
immediately prevented from authenticating to Azure AD.
Solution: You configure pass-through authentication.
Does this meet the goal?
• A. Yes
• B. No
Correct Answer: A
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/choose-ad-authn
Question #12Topic 1
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant that syncs to an Active Directory forest.
You discover that when a user account is disabled in Active Directory, the disabled user can still
authenticate to Azure AD for up to 30 minutes.
You need to ensure that when a user account is disabled in Active Directory, the user account is
immediately prevented from authenticating to Azure AD.
Solution: You configure conditional access policies.
Does this meet the goal?
• A. Yes
• B. No
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/choose-ad-authn
Question #13Topic 1
You have an Azure Active Directory (Azure AD) tenant that contains the following objects.
✑ A device named Device1
✑ Users named User1, User2, User3, User4, and User5
Five groups named Group1, Group2, Group3, Group4, and Group5
https://cloudcertified.in/ 10
ClouCertified Practice Tests https://cloudcertified.in/
How many licenses are used if you assign the Microsoft 365 Enterprise E5 license to Group1?
• A. 0
• B. 2
• C. 3
• D. 4
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/enterprise-users/licensing-group-advanced
Question #14Topic 1
You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains an Azure AD
enterprise application named App1.
A contractor uses the credentials of [email protected].
You need to ensure that you can provide the contractor with access to App1. The contractor must be able
to authenticate as [email protected].
What should you do?
Correct Answer: D
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/b2b-quickstart-add-guest-
users-portal
Question #15Topic 1
Your network contains an Active Directory forest named contoso.com that is linked to an Azure Active
Directory (Azure AD) tenant named contoso.com by using
Azure AD Connect.
You need to prevent the synchronization of users who have the extensionAttribute15 attribute set to
NoSync.
What should you do in Azure AD Connect?
• A. Create an inbound synchronization rule for the Windows Azure Active Directory connector.
• B. Configure a Full Import run profile.
• C. Create an inbound synchronization rule for the Active Directory Domain Services connector.
• D. Configure an Export run profile.
Correct Answer: C
Reference:
https://cloudcertified.in/ 11
ClouCertified Practice Tests https://cloudcertified.in/
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-sync-change-the-
configuration
Question #16Topic 1
Your network contains an on-premises Active Directory domain that syncs to an Azure Active Directory
(Azure AD) tenant. The tenant contains the users shown in the following table.
Correct Answer: A
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-pta-current-limitations
https://cloudcertified.in/ 12
ClouCertified Practice Tests https://cloudcertified.in/
Question #17Topic 1
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have an Active Directory forest that syncs to an Azure Active Directory (Azure AD) tenant.
You discover that when a user account is disabled in Active Directory, the disabled user can still
authenticate to Azure AD for up to 30 minutes.
You need to ensure that when a user account is disabled in Active Directory, the user account is
immediately prevented from authenticating to Azure AD.
Solution: You configure Azure AD Password Protection.
Does this meet the goal?
• A. Yes
• B. No
Correct Answer: B
Question #18Topic 1
HOTSPOT -
Your network contains an on-premises Active Directory domain named contoso.com. The domain
contains the objects shown in the following table.
You install Azure AD Connect. You configure the Domain and OU filtering settings as shown in the Domain
and OU Filtering exhibit. (Click the Domain and OU
Filtering tab.)
https://cloudcertified.in/ 13
ClouCertified Practice Tests https://cloudcertified.in/
You configure the Filter users and devices settings as shown in the Filter Users and Devices exhibit. (Click
the Filter Users and Devices tab.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
https://cloudcertified.in/ 14
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
Only direct members of Group1 are synced. Group2 will sync as it is a direct member of Group1 but the
members of Group2 will not sync.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-install-custom
Question #19Topic 1
You have an Azure Active Directory (Azure AD) tenant named contoso.com.
You need to ensure that Azure AD External Identities pricing is based on monthly active users (MAU).
What should you configure?
https://cloudcertified.in/ 15
ClouCertified Practice Tests https://cloudcertified.in/
• A. a user flow
• B. the terms of use
• C. a linked subscription
• D. an access review
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/external-identities-pricing
Question #20Topic 1
DRAG DROP -
You have a new Microsoft 365 tenant that uses a domain name of contoso.onmicrosoft.com.
You register the name contoso.com with a domain registrar.
You need to use contoso.com as the default domain name for new Microsoft 365 users.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the
list of actions to the answer area and arrange them in the correct order.
Select and Place:
Correct
Answer:
Reference:
https://practical365.com/configure-a-custom-domain-in-office-365/
Question #21Topic 1
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant that has an Azure Active Directory Premium Plan 2
license. The tenant contains the users shown in the following table.
https://cloudcertified.in/ 16
ClouCertified Practice Tests https://cloudcertified.in/
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct
Answer:
https://cloudcertified.in/ 17
ClouCertified Practice Tests https://cloudcertified.in/
Box 1: Yes -
Users may join 5 devices to Azure AD.
Box 2: No -
Cloud device administrator an enable, disable, and delete devices in Azure AD and read Windows 10
BitLocker keys in the Azure portal. The role does not grant permissions to manage any other properties
on the device.
Box 3: No -
An additional local device administrator has not been applied
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/devices/device-management-azure-portal
Question #22Topic 1
DRAG DROP -
You have a Microsoft 365 E5 subscription that contains three users named User1, User2, and User3.
You need to configure the users as shown in the following table.
Which portal should you use to configure each user? To answer, drag the appropriate portals to the
correct users. Each portal may be used once, more than once, or not at all. You may need to drag the split
bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
https://cloudcertified.in/ 18
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Question #23Topic 1
You have an Active Directory forest that syncs to an Azure Active Directory (Azure AD) tenant. The tenant
uses pass-through authentication.
A corporate security policy states the following:
✑ Domain controllers must never communicate directly to the internet.
✑ Only required software must be installed on servers.
The Active Directory domain contains the on-premises servers shown in the following table.
You need to ensure that users can authenticate to Azure AD if a server fails.
On which server should you install an additional pass-through authentication agent?
• A. Server4
• B. Server2
https://cloudcertified.in/ 19
ClouCertified Practice Tests https://cloudcertified.in/
• C. Server1
• D. Server3
Correct Answer: A
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-pta-quick-start
Question #24Topic 1
You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains an Azure AD
enterprise application named App1.
A contractor uses the credentials of [email protected].
You need to ensure that you can provide the contractor with access to App1. The contractor must be able
to authenticate as [email protected].
What should you do?
Correct Answer: A
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/b2b-quickstart-add-guest-
users-portal https://docs.microsoft.com/en-us/powershell/module/azuread/new-
azureadmsinvitation?view=azureadps-2.0
Question #25Topic 1
You have 2,500 users who are assigned Microsoft Office 365 Enterprise E3 licenses. The licenses are
assigned to individual users.
From the Groups blade in the Azure Active Directory admin center, you assign Microsoft 365 Enterprise
E5 licenses to the users.
You need to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of
administrative effort.
What should you use?
• A. the Administrative units blade in the Azure Active Directory admin center
• B. the Set-AzureAdUser cmdlet
• C. the Groups blade in the Azure Active Directory admin center
• D. the Set-MsolUserLicense cmdlet
Correct Answer: D
The Set-MsolUserLicense cmdlet updates the license assignment for a user. This can include adding a new
license, removing a license, updating the license options, or any combination of these actions.
Note:
There are several versions of this question in the exam. The question has two possible correct answers:
1. the Licenses blade in the Azure Active Directory admin center
2. the Set-MsolUserLicense cmdlet
Other incorrect answer options you may see on the exam include the following:
✑ the Identity Governance blade in the Azure Active Directory admin center
✑ the Set-WindowsProductKey cmdlet
✑ the Set-AzureAdGroup cmdlet
Reference:
https://cloudcertified.in/ 20
ClouCertified Practice Tests https://cloudcertified.in/
https://docs.microsoft.com/en-us/powershell/module/msonline/set-msoluserlicense?view=azureadps-
1.0
Question #26Topic 1
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant and an Azure web app named App1.
You need to provide guest users with self-service sign-up for App1. The solution must meet the following
requirements:
✑ Guest users must be able to sign up by using a one-time password.
✑ The users must provide their first name, last name, city, and email address during the sign-up process.
What should you configure in the Azure Active Directory admin center for each requirement? To answer,
select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct
Answer:
https://cloudcertified.in/ 21
ClouCertified Practice Tests https://cloudcertified.in/
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/identity-providers
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/self-service-sign-up-
overview
Question #27Topic 1
You have an Azure Active Directory (Azure AD) Azure AD tenant.
You need to bulk create 25 new user accounts by uploading a template file.
Which properties are required in the template file?
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/enterprise-users/users-bulk-add
Question #28Topic 1
Your network contains an on-premises Active Directory domain that syncs to an Azure Active Directory
(Azure AD) tenant.
Users sign in to computers that run Windows 10 and are joined to the domain.
You plan to implement Azure AD Seamless Single Sign-On (Azure AD Seamless SSO).
You need to configure the Windows 10 computers to support Azure AD Seamless SSO.
What should you do?
https://cloudcertified.in/ 22
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-sso-quick-start
Question #29Topic 1
DRAG DROP -
You need to resolve the recent security incident issues.
What should you configure for each incident? To answer, drag the appropriate policy types to the correct
issues. Each policy type may be used once, more than once, or not at all. You may need to drag the split
bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
Correct
Answer:
https://cloudcertified.in/ 23
ClouCertified Practice Tests https://cloudcertified.in/
sign-in activity across multiple tenants from different countries in the same browser.
Question #30Topic 1
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following
table.
For which users can you configure the Job title property and the Usage location property in Azure AD? To
answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
https://cloudcertified.in/ 24
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
https://cloudcertified.in/ 25
ClouCertified Practice Tests https://cloudcertified.in/
https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-users-profile-
azure-portal https://docs.microsoft.com/en-us/power-platform/admin/invite-users-azure-active-
directory-b2b-collaboration#update-users-name-and-usage-location
Question #31Topic 1
You have an Azure Active Directory (Azure AD) tenant that: contains a user named User1.
You need to ensure that User1 can create new catalogs and add1 resources to the catalogs they own.
What should you do?
• A. From the Roles and administrators blade, modify the Groups administrator role.
• B. From the Roles and administrators blade, modify the Service support administrator role.
• C. From the Identity Governance blade, modify the Entitlement management settings.
• D. From the Identity Governance blade, modify the roles and administrators for the General
catalog.
Correct Answer: C
Create and manage a catalog of resources in Azure AD entitlement management.
Create a catalog.
A catalog is a container of resources and access packages. You create a catalog when you want to group
related resources and access packages. A user who has been delegated the catalog creator role can
create a catalog for resources that they own. Whoever creates the catalog becomes the first catalog
owner. A catalog owner can add more users, groups of users, or application service principals as catalog
owners.
Prerequisite roles: Global administrator, Identity Governance administrator, User administrator, or
Catalog creator.
Incorrect:
* Groups Administrator - Members of this role can create/manage groups, create/manage groups
settings like naming and expiration policies, and view groups activity and audit reports.
* Service Support Administrator
Users with this role can create and manage support requests with Microsoft for Azure and Microsoft 365
services, and view the service dashboard and message center in the Azure portal and Microsoft 365
admin center.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-catalog-
create https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference
Question #32Topic 1
Your network contains an on-premises Active Directory domain that syncs to an Azure Active Directory
(Azure AD) tenant.
Users sign in to computers that run Windows 10 and are joined to the domain.
You plan to implement Azure AD Seamless Single Sign-On (Azure AD Seamless SSO).
You need to configure the Windows 10 computers to support Azure AD Seamless SSO.
What should you do?
Correct Answer: C
Enable Seamless SSO through Azure AD Connect.
At the User sign-in page, select the Enable single sign on option.
https://cloudcertified.in/ 26
ClouCertified Practice Tests https://cloudcertified.in/
Note:
The option will be available for selection only if the Sign On method is Password Hash Synchronization or
Pass-through Authentication.
Seamless SSO can be combined with either the Password Hash Synchronization or Pass-through
Authentication sign-in methods.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-sso-quick-start
Question #33Topic 1
Your company has two divisions named Contoso East and Contoso West. The Microsoft 365 identity
architecture for both divisions is shown in the following exhibit.
https://cloudcertified.in/ 27
ClouCertified Practice Tests https://cloudcertified.in/
You need to assign users from the Contoso East division access to Microsoft SharePoint Online sites in the
Contoso West tenant. The solution must not require additional Microsoft 365 licenses.
What should you do?
Correct Answer: B
Before any of your users can grant SharePoint Online team site access to external guests, you will have to
enable guest sharing from within Azure Active
Directory.
Reference:
https://redmondmag.com/articles/2020/03/11/guest-access-sharepoint-online-team-sites.aspx
https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/multi-tenant-common-
considerations
Question #34Topic 1
DRAG DROP
-
https://cloudcertified.in/ 28
ClouCertified Practice Tests https://cloudcertified.in/
You have a Microsoft 365 E5 subscription that contains two users named User1 and User2.
You need to ensure that User1 can create access reviews for groups, and that User2 can review the
history report for all the completed access reviews. The solution must use the principle of least privilege.
Which role should you assign to each user? To answer, drag the appropriate roles to the correct users.
Each role may be used once, more than once, or not at all. You may need to drag the split bar between
panes or scroll to view content.
Correct Answer:
Question #35Topic 1
HOTSPOT
-
You need to create two custom roles named Role1 and Role2. The solution must meet the following
requirements:
• Users that are assigned Role1 can create or delete instances of Azure Container Apps.
• Users that are assigned Role2 can enforce adaptive network hardening rules.
https://cloudcertified.in/ 29
ClouCertified Practice Tests https://cloudcertified.in/
Which resource provider permissions are required for each role? To answer, select the appropriate
options in the answer area.
Correct
Answer:
Question #36Topic 1
https://cloudcertified.in/ 30
ClouCertified Practice Tests https://cloudcertified.in/
HOTSPOT
-
You have a Microsoft 365 tenant that has 5,000 users. One hundred of the users are executives. The
executives have a dedicated support team.
You need to ensure that the support team can reset passwords and manage multi-factor authentication
(MFA) settings for only the executives. The solution must use the principle of least privilege.
Which object type and Azure Active Directory (Azure AD) role should you use? To answer, select the
appropriate options in the answer area.
Correct
Answer:
Question #37Topic 1
You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following
table.
https://cloudcertified.in/ 31
ClouCertified Practice Tests https://cloudcertified.in/
You have an administrative unit named Au1. Group1, User2, and User3 are members of Au1.
Correct Answer: D
Question #38Topic 1
You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following
table.
You create a dynamic user group and configure the following rule syntax.
user.usageLocation -in ["US","AU"] -and (user.department -eq "Sales") -and -not (user.jobTitle -eq
"Manager") –or (user. jobTitle -eq "SalesRep")
• A. User1 only
• B. User2 only
https://cloudcertified.in/ 32
ClouCertified Practice Tests https://cloudcertified.in/
• C. User3 only
• D. User1 and User2 only
• E. User1 and User3 only
• F. User1, User2, and User3
Correct Answer: D
Question #39Topic 1
• A. Helpdesk administrator
• B. Billing administrator
• C. License administrator
• D. User administrator
Correct Answer: D
Question #40Topic 1
You have 2,500 users who are assigned Microsoft Office 365 Enterprise E3 licenses. The licenses are
assigned to individual users.
From the Groups blade in the Azure Active Directory admin center, you assign Microsoft Office 365
Enterprise E5 licenses to a group that includes all users.
You need to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of
administrative effort.
Correct Answer:A
Question #41Topic 1
You have 2,500 users who are assigned Microsoft Office 365 Enterprise E3 licenses. The licenses are
assigned to individual users.
From the Groups blade in the Azure Active Directory admin center, you assign Microsoft 365 Enterprise
https://cloudcertified.in/ 33
ClouCertified Practice Tests https://cloudcertified.in/
You need to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of
administrative effort.
Correct Answer: D
Question #42Topic 1
HOTSPOT
-
Your on-premises network contains an Active Directory domain that uses Azure AD Connect to sync with
an Azure AD tenant.
What should you use for each requirement? To answer, select the appropriate options in the answer
area.
Correct
Answer:
https://cloudcertified.in/ 34
ClouCertified Practice Tests https://cloudcertified.in/
Question #43Topic 1
You have 2,500 users who are assigned Microsoft Office 365 Enterprise E3 licenses. The licenses are
assigned to individual users.
From the Groups blade in the Azure Active Directory admin center, you assign Microsoft Office 365
Enterprise E5 licenses to a group that includes all users.
You needed to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of
administrative effort.
Correct Answer: D
Question #44Topic 1
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You discover that when a user account is disabled in Active Directory, the disabled user can still
authenticate to Azure AD for up to 30 minutes.
You need to ensure that when a user account is disabled in Active Directory, the user account is
immediately prevented from authenticating to Azure AD.
https://cloudcertified.in/ 35
ClouCertified Practice Tests https://cloudcertified.in/
• A. Yes
• B. No
Correct Answer: B
Question #45Topic 1
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to ensure that User1 can update the status of Identity Secure Score improvement actions.
• A. Yes
• B. No
Correct Answer: A
Question #46Topic 1
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to ensure that User1 can update the status of Identity Secure Score improvement actions.
https://cloudcertified.in/ 36
ClouCertified Practice Tests https://cloudcertified.in/
• A. Yes
• B. No
Correct Answer: B
Question #47Topic 1
HOTSPOT
-
Case Study
-
Overview
-
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London
and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory
(Azure AD) tenant named fabrikam.com.
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The
domain contains an organizational unit (OU) named Contoso_Resources. The Contoso_Resources OU
contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
https://cloudcertified.in/ 37
ClouCertified Practice Tests https://cloudcertified.in/
Contoso also includes a marketing department that has users in each office.
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Azure AD Connect is configured between Azure AD and Active Directory Domain Services (AD DS). Only
the Contoso_Resources OU is synced.
Helpdesk administrators routinely use the Microsoft 365 admin center to manage user settings.
User administrators currently use the Microsoft 365 admin center to manually assign licenses. All users
have all licenses assigned besides the following exceptions:
• The users in the London office have the Microsoft 365 Phone System license unassigned.
• The users in the Seattle office have the Yammer Enterprise license unassigned.
Contoso uses Azure AD Privileged Identity Management (PIM) to protect administrative roles.
• Currently, all the helpdesk administrators can manage user licenses throughout the entire Microsoft
365 tenant.
• The user administrators report that it is tedious to manually configure the different license
requirements for each Contoso office.
• The helpdesk administrators spend too much time provisioning internal and guest access to the
required Microsoft 365 services and apps.
• Currently, the helpdesk administrators can perform tasks by using the User administrator role without
justification or approval.
• When the Logs node is selected in Azure AD, an error message appears stating that Log Analytics
integration is not enabled.
https://cloudcertified.in/ 38
ClouCertified Practice Tests https://cloudcertified.in/
• For new users in the marketing department, implement an automated approval workflow to provide
access to a Microsoft SharePoint Online site, group, and app.
Contoso plans to acquire a company named ADatum Corporation. One hundred new ADatum users will
be created in an Active Directory OU named Adatum. The users will be located in London and Seattle.
You need to meet the technical requirements for license management by the help desk administrators.
What should you create first, and which tool should you use? To answer, select the appropriate options
in the answer area.
Correct
Answer:
https://cloudcertified.in/ 39
ClouCertified Practice Tests https://cloudcertified.in/
Question #48Topic 1
Case Study -
Overview -
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with
the adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security
defaults disabled.
https://cloudcertified.in/ 40
ClouCertified Practice Tests https://cloudcertified.in/
• Multiple users in the sales department have up to five devices. The sales department users report that
sometimes they must contact the support department to join their devices to the Azure AD tenant
because they have reached their device limit.
• A recent security incident reveals that several users leaked their credentials, a suspicious browser was
used for a sign-in, and resources were accessed from an anonymous IP address.
• When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear
in the selection list.
• Anyone in the organization can invite guest users, including other guests and non-administrators.
• The helpdesk spends too much time resetting user passwords.
• Users currently use only passwords for authentication.
https://cloudcertified.in/ 41
ClouCertified Practice Tests https://cloudcertified.in/
• Users assigned the User administrator role must be able to request permission to use the role when
needed for up to one year.
• Users must be prompted to register for MFA and provided with an option to bypass the registration for
a grace period.
• Users must provide one authentication method to reset their password by using SSPR. Available
methods must include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
• Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
• The principle of least privilege must be used.
Correct Answer: A
Question #49Topic 1
Case Study -
Overview -
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with
the adatum.com AD DS domain by using Azure AD Connect.
https://cloudcertified.in/ 42
ClouCertified Practice Tests https://cloudcertified.in/
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security
defaults disabled.
• Multiple users in the sales department have up to five devices. The sales department users report that
sometimes they must contact the support department to join their devices to the Azure AD tenant
because they have reached their device limit.
• A recent security incident reveals that several users leaked their credentials, a suspicious browser was
used for a sign-in, and resources were accessed from an anonymous IP address.
• When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear
in the selection list.
• Anyone in the organization can invite guest users, including other guests and non-administrators.
• The helpdesk spends too much time resetting user passwords.
• Users currently use only passwords for authentication.
https://cloudcertified.in/ 43
ClouCertified Practice Tests https://cloudcertified.in/
• Users assigned the User administrator role must be able to request permission to use the role when
needed for up to one year.
• Users must be prompted to register for MFA and provided with an option to bypass the registration for
a grace period.
• Users must provide one authentication method to reset their password by using SSPR. Available
methods must include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
• Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
• The principle of least privilege must be used.
Correct Answer: B
Question #50Topic 1
Case Study -
Overview -
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
https://cloudcertified.in/ 44
ClouCertified Practice Tests https://cloudcertified.in/
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with
the adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security
defaults disabled.
• Multiple users in the sales department have up to five devices. The sales department users report that
sometimes they must contact the support department to join their devices to the Azure AD tenant
because they have reached their device limit.
• A recent security incident reveals that several users leaked their credentials, a suspicious browser was
used for a sign-in, and resources were accessed from an anonymous IP address.
• When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear
in the selection list.
• Anyone in the organization can invite guest users, including other guests and non-administrators.
• The helpdesk spends too much time resetting user passwords.
https://cloudcertified.in/ 45
ClouCertified Practice Tests https://cloudcertified.in/
• Users assigned the User administrator role must be able to request permission to use the role when
needed for up to one year.
• Users must be prompted to register for MFA and provided with an option to bypass the registration for
a grace period.
• Users must provide one authentication method to reset their password by using SSPR. Available
methods must include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
• Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
• The principle of least privilege must be used.
• A. Azure AD Connect cloud sync between the Azure AD tenant and litware.com
• B. Azure AD Connect to include the litware.com domain
• C. staging mode in Azure AD Connect for the litware.com domain
Correct Answer: B
Question #51Topic 1
https://cloudcertified.in/ 46
ClouCertified Practice Tests https://cloudcertified.in/
To which identities can you assign the Contributor role for RG1?
• A. User1 only
• B. User1 and Group1 only
• C. User1 and VM1 only
• D. User1, VM1, and App1 only
• E. User1, Group1, VM1, and App1
Correct Answer: E
Question #52Topic 1
HOTSPOT
-
You have an Azure AD tenant that contains a user named User1. User1 is assigned the User Administrator
role.
You need to configure External collaboration settings for the tenant to meet the following requirements:
Which three settings should you configure? To answer, select the appropriate settings in the answer
area.
https://cloudcertified.in/ 47
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
https://cloudcertified.in/ 48
ClouCertified Practice Tests https://cloudcertified.in/
Question #53Topic 1
You have 2,500 users who are assigned Microsoft Office 365 Enterprise E3 licenses. The licenses are
assigned to individual users.
From the Groups blade in the Azure Active Directory admin center, you assign Microsoft Office 365
Enterprise E5 licenses to a group that includes all users.
You needed to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of
administrative effort.
Correct Answer: D
Question #54Topic 1
https://cloudcertified.in/ 49
ClouCertified Practice Tests https://cloudcertified.in/
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to ensure that User1 can update the status of Identity Secure Score improvement actions.
• A. Yes
• B. No
Correct Answer: B
Question #55Topic 1
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to ensure that User1 can update the status of Identity Secure Score improvement actions.
• A. Yes
• B. No
Correct Answer: A
Question #56Topic 1
You have an Azure AD tenant that contains a user named Admin1.
https://cloudcertified.in/ 50
ClouCertified Practice Tests https://cloudcertified.in/
You need to ensure that Admin1 can perform only the following tasks:
• From the Microsoft 365 admin center, create and manage service requests.
• From the Microsoft 365 admin center, read and configure service health.
• From the Azure portal, create and manage support tickets.
Correct Answer: C
Question #57Topic 1
HOTSPOT
-
Your network contains an on-premises Active Directory Domain Services (AD DS) domain that syncs with
an Azure AD tenant.
You need to ensure that user authentication always occurs by validating passwords against the AD DS
domain.
What should you configure, and what should you use? To answer, select the appropriate options in the
answer area.
https://cloudcertified.in/ 51
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Question #58Topic 1
You have a Microsoft 365 tenant that uses the domain named fabrikam.com. The Guest invite settings for
Azure Active Directory (Azure AD) are configured as shown in the exhibit. (Click the Exhibit tab.)
https://cloudcertified.in/ 52
ClouCertified Practice Tests https://cloudcertified.in/
A user named [email protected] shares a Microsoft SharePoint Online document library to the users
shown in the following table.
• A. User2 only
• B. User1 only
• C. User1 and User2 only
• D. User1, User2, and User3
Correct Answer: A
Question #59Topic 1
You have 2,500 users who are assigned Microsoft Office 365 Enterprise E3 licenses. The licenses are
assigned to individual users.
From the Groups blade in the Azure Active Directory admin center, you assign Microsoft Office 365
https://cloudcertified.in/ 53
ClouCertified Practice Tests https://cloudcertified.in/
You need to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of
administrative effort.
• A. the Administrative units blade in the Azure Active Directory admin center
• B. the Set-MsolUserLicense cmdlet
• C. the Groups blade in the Azure Active Directory admin center
• D. the Set-WindowsProductKey cmdlet
Correct Answer: B
Question #60Topic 1
HOTSPOT
-
Your network contains an on-premises Active Directory Domain Services (AD DS) domain that syncs with
Azure AD and contains the users shown in the following table.
https://cloudcertified.in/ 54
ClouCertified Practice Tests https://cloudcertified.in/
https://cloudcertified.in/ 55
ClouCertified Practice Tests https://cloudcertified.in/
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Correct
Answer:
Question #61Topic 1
You have 2,500 users who are assigned Microsoft Office 365 Enterprise E3 licenses. The licenses are
assigned to individual users.
From the Groups blade in the Azure Active Directory admin center, you assign Microsoft Office 365
Enterprise E5 licenses to a group that includes all users.
You need to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of
administrative effort.
Correct Answer: B
Question #62Topic 1
You have an Azure AD tenant that contains the users shown in the following table.
https://cloudcertified.in/ 56
ClouCertified Practice Tests https://cloudcertified.in/
You need to compare the role permissions of each user. The solution must minimize administrative
effort.
Correct Answer: B
Question #63Topic 1
You have a Microsoft Exchange organization that uses an SMTP address space of contoso.com.
Several users use their contoso.com email address for self-service sign-up to Azure AD.
You gain global administrator privileges to the Azure AD tenant that contains the self-signed users.
You need to prevent the users from creating user accounts in the contoso.com Azure AD tenant for self-
service sign-up to Microsoft 365 services.
• A. Update-MgOrganization
• B. Update-MgPolicyPermissionGrantPolicyExclude
• C. Update-MgDomain
• D. Update-MgDomainFederationConfiguration
Correct Answer: B
Question #64Topic 1
HOTSPOT
-
https://cloudcertified.in/ 57
ClouCertified Practice Tests https://cloudcertified.in/
• B2B collaboration
• Monthly active users (MAU)-based pricing
Which two settings should you configure? To answer, select the settings in the answer area.
https://cloudcertified.in/ 58
ClouCertified Practice Tests https://cloudcertified.in/
https://cloudcertified.in/ 59
ClouCertified Practice Tests https://cloudcertified.in/
https://cloudcertified.in/ 60
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer:
Question #65Topic 1
https://cloudcertified.in/ 61
ClouCertified Practice Tests https://cloudcertified.in/
You have an Azure AD tenant that contains the external user shown in the following exhibit.
You need to ensure that the user can authenticate by using the updated email address.
Correct Answer: D
Question #66Topic 1
You need to ensure that only users from specific external domains can be invited as guests to the tenant.
https://cloudcertified.in/ 62
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: A
Question #67Topic 1
You have an Azure AD tenant that contains a user named User1 and a Microsoft 365 group named
Group1. User1 is the owner of Group1.
You need to ensure that User1 is notified every three months to validate the guest membership of
Group1.
Correct Answer:B
Question #68Topic 1
HOTSPOT
-
You have a Microsoft Entra tenant that contains a group named Group3 and an administrative unit
named Department1.
Department1 has the users shown in the Users exhibit. (Click the Users tab.)
Department1 has the groups shown in the Groups exhibit. (Click the Groups tab.)
https://cloudcertified.in/ 63
ClouCertified Practice Tests https://cloudcertified.in/
The User Administrator role assignments are shown in the Assignments exhibit (Click the Assignments
tab.)
The members of Group2 are shown in the Group2 exhibit. (Click the Group2 tab.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
https://cloudcertified.in/ 64
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Question #69Topic 1
HOTSPOT
-
Your network contains an on-premises Active Directory Domain Services (AD DS) domain named
fabrikam.com. The domain contains an Active Directory Federation Services (AD FS) instance and a
member server named Server1 that runs Windows Server. The domain contains the users shown in the
following table.
https://cloudcertified.in/ 65
ClouCertified Practice Tests https://cloudcertified.in/
You have a Microsoft Entra tenant named contoso.com that is linked to a Microsoft 365 subscription.
You establish federation between fabrikam.com and contoso.com by using a Microsoft Entra Connect
instance that is configured as shown in the following exhibit.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
https://cloudcertified.in/ 66
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Question #70Topic 1
HOTSPOT
-
You have a Microsoft Entra tenant that has a Microsoft Entra ID P2 service plan. The tenant contains the
users shown in the following table.
https://cloudcertified.in/ 67
ClouCertified Practice Tests https://cloudcertified.in/
For each of the following statements, select Yes if the statement is true. Otherwise. select No.
https://cloudcertified.in/ 68
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Question #71Topic 1
You have an Azure subscription named Sub1 that contains a user named User1.
You need to ensure that User1 can purchase a Microsoft Entra Permissions Management license for Sub1.
The solution must follow the principle of least privilege.
• A. Global Administrator
• B. Billing Administrator
• C. Permissions Management Administrator
• D. User Access Administrator
Correct Answer: B
Question #72Topic 1
You have an Azure subscription that contains a user named User1 and two resource groups named RG1
and RG2.
You need to ensure that User1 can perform the following tasks:
What is the minimum number of role-based access control (RBAC) role assignments required?
• A. 1
• B. 2
• C. 3
• D. 4
Correct Answer: C
Question #73Topic 1
https://cloudcertified.in/ 69
ClouCertified Practice Tests https://cloudcertified.in/
You work for a company named Contoso, Ltd. that has a Microsoft Entra tenant named contoso.com.
• A company named A. Datum Corporation that has a Microsoft Entra tenant named adatum.com.
• A company named Fabrikam, Inc. that has a Microsoft Entra tenant named fabrikam.com.
When you attempt to invite a new guest user from adatum.com to contoso.com, you receive an error
message.
You can successfully invite a new guest user from fabnkam.com to contoso.com.
You need to be able to invite new guest users from adatum.com to contoso.com.
Correct Answer: D
You configure a new Microsoft 365 tenant to use a default domain name of contoso.com.
You need to ensure that you can control access to Microsoft 365 resources by using conditional access
policies.
What should you do first?
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/concept-fundamentals-security-
defaults
Question #2Topic 2
https://cloudcertified.in/ 70
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: D
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-
passwordless
Question #3Topic 2
You have an Azure Active Directory (Azure AD) tenant named contoso.com.
All users who run applications registered in Azure AD are subject to conditional access policies.
You need to prevent the users from using legacy authentication.
What should you include in the conditional access policies to filter out legacy authentication attempts?
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/block-legacy-authentication
Question #4Topic 2
• A. impossible travel
• B. anonymous IP address
• C. atypical travel
• D. leaked credentials
Correct Answer: D
Leaked credentials indicates that the user's valid credentials have been leaked.
Note:
There are several versions of this question in the exam. The question can have other incorrect answer
options, including the following:
✑ password spray
✑ malicious IP address
✑ unfamiliar sign-in properties
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-
protection-risks
Question #5Topic 2
https://cloudcertified.in/ 71
ClouCertified Practice Tests https://cloudcertified.in/
• A. a Microsoft Cloud App Security activity policy that has Microsoft Office 365 governance
actions configured
• B. an Azure AD conditional access policy that has session controls configured
• C. an Azure AD conditional access policy that has client apps conditions configured
• D. a Microsoft Cloud App Security app discovery policy that has governance actions configured
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/cloud-app-security/proxy-intro-aad
Question #6Topic 2
You have an Active Directory domain that syncs to an Azure Active Directory (Azure AD) tenant.
The on-premises network contains a VPN server that authenticates to the on-premises Active Directory
domain. The VPN server does NOT support Azure Multi-
Factor Authentication (MFA).
You need to recommend a solution to provide Azure MFA for VPN connections.
What should you include in the recommendation?
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-nps-extension-vpn
Question #7Topic 2
https://cloudcertified.in/ 72
ClouCertified Practice Tests https://cloudcertified.in/
• A. Azure AD Connect
• B. Azure AD Application Proxy
• C. Password Change Notification Service (PCNS)
• D. the Azure AD Password Protection proxy service
Correct Answer: D
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-password-ban-bad-on-
premises-deploy
Question #8Topic 2
DRAG DROP -
You have a Microsoft 365 E5 tenant.
You purchase a cloud app named App1.
You need to enable real-time session-level monitoring of App1 by using Microsoft Cloud App Security.
In which order should you perform the actions? To answer, move the appropriate actions from the list of
actions to the answer area and arrange them in the correct order.
Select and Place:
Correct
Answer:
Reference:
https://docs.microsoft.com/en-us/cloud-app-security/proxy-deployment-any-app
https://docs.microsoft.com/en-us/cloud-app-security/session-policy-aad
https://cloudcertified.in/ 73
ClouCertified Practice Tests https://cloudcertified.in/
Question #9Topic 2
Correct Answer: C
In Windows 10, Windows Hello for Business replaces passwords with strong two-factor authentication on
PCs and mobile devices. This authentication consists of a new type of user credential that is tied to a
device and uses a biometric or PIN.
After an initial two-step verification of the user during enrollment, Windows Hello is set up on the user's
device and Windows asks the user to set a gesture, which can be a biometric, such as a fingerprint, or a
PIN. The user provides the gesture to verify their identity. Windows then uses Windows Hello to
authenticate users.
Incorrect Answers:
A: A notification through the Microsoft Authenticator app requires connectivity to send the verification
code to the device requesting the logon
B: An app password can be used to open an application but it cannot be used to sign in to a computer.
Question #10Topic 2
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have a Microsoft 365 tenant.
All users must use the Microsoft Authenticator app for multi-factor authentication (MFA) when accessing
Microsoft 365 services.
Some users report that they received an MFA prompt on their Microsoft Authenticator app without
initiating a sign-in request.
You need to block the users automatically when they report an MFA request that they did not initiate.
Solution: From the Azure portal, you configure the Notifications settings for multi-factor authentication
(MFA).
Does this meet the goal?
• A. Yes
• B. No
https://cloudcertified.in/ 74
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: B
You need to configure the fraud alert settings.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings
Question #11Topic 2
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have a Microsoft 365 tenant.
All users must use the Microsoft Authenticator app for multi-factor authentication (MFA) when accessing
Microsoft 365 services.
Some users report that they received an MFA prompt on their Microsoft Authenticator app without
initiating a sign-in request.
You need to block the users automatically when they report an MFA request that they did not initiate.
Solution: From the Azure portal, you configure the Account lockout settings for multi-factor
authentication (MFA).
Does this meet the goal?
• A. Yes
• B. No
Correct Answer: B
You need to configure the fraud alert settings.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings
Question #12Topic 2
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have a Microsoft 365 tenant.
All users must use the Microsoft Authenticator app for multi-factor authentication (MFA) when accessing
Microsoft 365 services.
Some users report that they received an MFA prompt on their Microsoft Authenticator app without
initiating a sign-in request.
You need to block the users automatically when they report an MFA request that they did not initiate.
Solution: From the Azure portal, you configure the Block/unblock users settings for multi-factor
authentication (MFA).
Does this meet the goal?
• A. Yes
• B. No
Correct Answer: B
You need to configure the fraud alert settings.
https://cloudcertified.in/ 75
ClouCertified Practice Tests https://cloudcertified.in/
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings
Question #13Topic 2
HOTSPOT -
You have a Microsoft 365 tenant.
You need to identify users who have leaked credentials. The solution must meet the following
requirements:
✑ Identify sign-ins by users who are suspected of having leaked credentials.
✑ Flag the sign-ins as a high-risk event.
✑ Immediately enforce a control to mitigate the risk, while still allowing the user to access applications.
What should you use? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct
Answer:
https://cloudcertified.in/ 76
ClouCertified Practice Tests https://cloudcertified.in/
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-
protection-risks
Question #14Topic 2
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following
table.
https://cloudcertified.in/ 77
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
https://cloudcertified.in/ 78
ClouCertified Practice Tests https://cloudcertified.in/
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-
protection
Question #15Topic 2
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant that contains a group named Group3 and an
administrative unit named Department1.
Department1 has the users shown in the Users exhibit. (Click the Users tab.)
Department1 has the groups shown in the Groups exhibit. (Click the Groups tab.)
https://cloudcertified.in/ 79
ClouCertified Practice Tests https://cloudcertified.in/
Department1 has the user administrator assignments shown in the Assignments exhibit. (Click the
Assignments tab.)
The members of Group2 are shown in the Group2 exhibit. (Click the Group2 tab.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
https://cloudcertified.in/ 80
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/roles/administrative-units
Question #16Topic 2
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have a Microsoft 365 tenant.
All users must use the Microsoft Authenticator app for multi-factor authentication (MFA) when accessing
Microsoft 365 services.
Some users report that they received an MFA prompt on their Microsoft Authenticator app without
initiating a sign-in request.
You need to block the users automatically when they report an MFA request that they did not initiate.
Solution: From the Azure portal, you configure the Fraud alert settings for multi-factor authentication
(MFA).
Does this meet the goal?
https://cloudcertified.in/ 81
ClouCertified Practice Tests https://cloudcertified.in/
• A. Yes
• B. No
Correct Answer: A
The fraud alert feature lets users report fraudulent attempts to access their resources. When an
unknown and suspicious MFA prompt is received, users can report the fraud attempt using the Microsoft
Authenticator app or through their phone.
The following fraud alert configuration options are available:
✑ Automatically block users who report fraud.
✑ Code to report fraud during initial greeting.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings
Question #17Topic 2
Correct Answer: D
The Authenticator app can be used as a software token to generate an OATH verification code. After
entering your username and password, you enter the code provided by the Authenticator app into the
sign-in interface.
Incorrect Answers:
A: A notification through the Microsoft Authenticator app requires connectivity to send the verification
code to the device requesting the logon.
B: An email requires network connectivity.
C: Security questions are not used as an authentication method but can be used during the self-service
password reset (SSPR) process.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-
authenticator-app#verification-code-from-mobile-app
Question #18Topic 2
HOTSPOT -
You have a Microsoft 365 tenant.
You create a named location named HighRiskCountries that contains a list of high-risk countries.
You need to limit the amount of time a user can stay authenticated when connecting from a high-risk
country.
What should you configure in a conditional access policy? To answer, select the appropriate options in
the answer area.
NOTE: Each correct selection is worth one point.
https://cloudcertified.in/ 82
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition
https://cloudcertified.in/ 83
ClouCertified Practice Tests https://cloudcertified.in/
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-access-
session
Question #19Topic 2
HOTSPOT -
A user named User1 attempts to sign in to the tenant by entering the following incorrect passwords:
✑ Pa55w0rd12
✑ Pa55w0rd12
✑ Pa55w0rd12
✑ Pa55w.rd12
✑ Pa55w.rd123
✑ Pa55w.rd123
✑ Pa55w.rd123
✑ Pa55word12
✑ Pa55word12
✑ Pa55word12
✑ Pa55w.rd12
You need to identify how many sign-in attempts were tracked for User1, and how User1 can unlock her
account before the 300-second lockout duration expires.
What should identify? To answer, select the appropriate
NOTE: Each correct selection is worth one point.
Hot Area:
Correct
Answer:
https://cloudcertified.in/ 84
ClouCertified Practice Tests https://cloudcertified.in/
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-deployment
Question #20Topic 2
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant that has Security defaults disabled.
You are creating a conditional access policy as shown in the following exhibit.
https://cloudcertified.in/ 85
ClouCertified Practice Tests https://cloudcertified.in/
Use the drop-down menus to select the answer choice that completes each statement based on the
information presented in the graphic.
NOTE: Each correct selection is worth one point.
https://cloudcertified.in/ 86
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-conditional-access-
policy-all-users-mfa
Question #21Topic 2
You have an Azure Active Directory (Azure AD) tenant that contains a user named SecAdmin1. SecAdmin1
is assigned the Security administrator role.
SecAdmin1 reports that she cannot reset passwords from the Azure AD Identity Protection portal.
You need to ensure that SecAdmin1 can manage passwords and invalidate sessions on behalf of non-
administrative users. The solution must use the principle of least privilege.
Which role should you assign to SecAdmin1?
• A. Authentication administrator
https://cloudcertified.in/ 87
ClouCertified Practice Tests https://cloudcertified.in/
• B. Helpdesk administrator
• C. Privileged authentication administrator
• D. Security operator
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference
Question #22Topic 2
You configure Azure Active Directory (Azure AD) Password Protection as shown in the exhibit. (Click the
Exhibit tab.)
Correct Answer: C
Reference:
https://blog.enablingtechcorp.com/azure-ad-password-protection-password-evaluation
https://cloudcertified.in/ 88
ClouCertified Practice Tests https://cloudcertified.in/
Question #23Topic 2
Correct Answer: A
The Authenticator app can be used as a software token to generate an OATH verification code. After
entering your username and password, you enter the code provided by the Authenticator app into the
sign-in interface.
Incorrect Answers:
B: Security questions are not used as an authentication method but can be used during the self-service
password reset (SSPR) process.
C, D: An automated voice call and an SMS requires mobile connectivity.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-
methods
Question #24Topic 2
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following
table.
User2 reports that he can only configure multi-factor authentication (MFA) to use the Microsoft
Authenticator app.
You need to ensure that User2 can configure alternate MFA methods.
Which configuration is required, and which user should perform the configuration? To answer, select the
appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
https://cloudcertified.in/ 89
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
https://cloudcertified.in/ 90
ClouCertified Practice Tests https://cloudcertified.in/
authentication for standard users and users with some admin roles.
Correct Answer: C
When administrators require one method be used to reset a password, verification code is the only
option available.
https://cloudcertified.in/ 91
ClouCertified Practice Tests https://cloudcertified.in/
Note: When administrators require two methods be used to reset a password, users are able to use
notification OR verification code in addition to any other enabled methods.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-sspr-howitworks
Question #26Topic 2
You have an Azure Active Directory (Azure AD) tenant that uses Azure AD Identity Protection and
contains the resources shown in the following table.
Correct Answer: B
Scenario: User compromised (True positive)
'Risky users' report shows an at-risk user [Risk state = At risk] with low risk [Risk level = Low] and that user
was indeed compromised.
Feedback: Select the user and click on 'Confirm user compromised'.
What happens under the hood? Azure AD will move the user risk to High [Risk state = Confirmed
compromised; Risk level = High] and will add a new detection
'Admin confirmed user compromised'.
Notes: Currently, the 'Confirm user compromised' option is only available in 'Risky users' report.
The detection 'Admin confirmed user compromised' is shown in the tab 'Risk detections not linked to a
sign-in' in the 'Risky users' report.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-
risk-feedback
Question #27Topic 2
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant: that contains the users shown in the following
table.
In Azure. AD Identity Protection, you configure a user risk policy that has the following settings:
https://cloudcertified.in/ 92
ClouCertified Practice Tests https://cloudcertified.in/
✑ Assignments:
- Users: Group1
- User risk: Low and above
✑ Controls:
- Access: Block access
✑ Enforce policy: On
In Azure AD Identify Protection, you configure a sign-in risk policy that has the following settings:
✑ Assignments:
- Users: Group2
- Sign-in risk: Low and above
✑ Controls:
- Access: Require multi-factor authentication
✑ Enforce policy: On
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct
Answer:
Box 1: Yes -
Note: Azure AD Identity Protection can review user sign-in attempts and take additional action if there's
suspicious behavior:
Some of the following actions may trigger Azure AD Identity Protection risk detection:
Users with leaked credentials.
* -> Sign-ins from anonymous IP addresses.
Impossible travel to atypical locations.
Sign-ins from infected devices.
https://cloudcertified.in/ 93
ClouCertified Practice Tests https://cloudcertified.in/
Box 2: No -
Box 3: No -
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/tutorial-risk-based-sspr-mfa
Question #28Topic 2
Correct Answer: A
A one-gate policy requires one piece of authentication data, such as an email address or phone number.
A one-gate policy applies in the following circumstances:
It's within the first 30 days of a trial subscription; or
A custom domain hasn't been configured for your Azure AD tenant so is using the default
*.onmicrosoft.com. The default *.onmicrosoft.com domain isn't recommended for production use; and
Azure AD Connect isn't synchronizing identities.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-sspr-
policy#administrator-reset-policy-differences
Question #29Topic 2
You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following
table.
The tenant has the authentication methods shown in the following table.
https://cloudcertified.in/ 94
ClouCertified Practice Tests https://cloudcertified.in/
Which users will sign in to cloud apps by matching a number shown in the app with a number shown on
their phone?
• A. User1 only
• B. User2 only
• C. User3 only
• D. User1 and User2 only
• E. User2 and User3 only
Correct Answer: A
Microsoft Authenticator -
You can also allow your employee's phone to become a passwordless authentication method. You may
already be using the Authenticator app as a convenient multi-factor authentication option in addition to a
password. You can also use the Authenticator App as a passwordless option.
The Authenticator App turns any iOS or Android phone into a strong, passwordless credential. Users can
sign in to any platform or browser by getting a notification to their phone, matching a number displayed
on the screen to the one on their phone, and then using their biometric (touch or face) or PIN to confirm.
Incorrect:
* Not User2
Question #30Topic 2
You have an Azure Active Directory (Azure AD) tenant that contains a user named User1 and the
conditional access policies shown in the following table.
You need to evaluate which policies will be applied to User1 when User1 attempts to sign-in from various
IP addresses.
Which feature should you use?
https://cloudcertified.in/ 95
ClouCertified Practice Tests https://cloudcertified.in/
• A. Access reviews
• B. Identity Secure Score
• C. The What If tool
• D. the Microsoft 365 network connectivity test tool
Correct Answer: C
The Azure AD conditional access What if tool allows you to understand the impact of your conditional
access policies on your environment. Instead of test driving your policies by performing multiple sign-ins
manually, this tool enables you to evaluate a simulated sign-in of a user. The simulation estimates the
impact this sign-in has on your policies and generates a simulation report. The report does not only list
the applied conditional access policies but also classic policies if they exist.
Reference:
https://azure.microsoft.com/en-us/updates/azure-ad-conditional-access-what-if-tool-is-now-available
Question #31Topic 2
• A. an app password
• B. voice
• C. Windows Hello for Business
• D. security questions
Correct Answer: C
The Microsoft Authenticator app provides an additional level of security to your Azure AD work or school
account or your Microsoft account and is available for
Android and iOS. With the Microsoft Authenticator app, users can authenticate in a passwordless way
during sign-in, or as an additional verification option during self-service password reset (SSPR) or
multifactor authentication events.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-
authenticator-app#verification-code-from-mobile-app
Question #32Topic 2
You create a conditional access policy that blocks access when a user triggers a high-severity sign-in alert.
You need to test the policy under the following conditions:
✑ A user signs in from another country.
✑ A user triggers a sign-in risk.
What should you use to complete the test?
https://cloudcertified.in/ 96
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: A
The Azure AD conditional access What if tool allows you to understand the impact of your conditional
access policies on your environment. Instead of test driving your policies by performing multiple sign-ins
manually, this tool enables you to evaluate a simulated sign-in of a user. The simulation estimates the
impact this sign-in has on your policies and generates a simulation report. The report does not only list
the applied conditional access policies but also classic policies if they exist.
Reference:
https://azure.microsoft.com/en-us/updates/azure-ad-conditional-access-what-if-tool-is-now-available
Question #33Topic 2
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following
table.
The tenant contains a named location that has the following configurations:
✑ Name: Location1
✑ Mark as trusted location: Enabled
https://cloudcertified.in/ 97
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
Box 1: No -
10.10.0.150 is from a trusted location.
Note: The trusted IPs feature of Azure AD Multi-Factor Authentication bypasses multi-factor
authentication prompts for users who sign in from a defined IP address range. You can set trusted IP
ranges for your on-premises environments. When users are in one of these locations, there's no Azure AD
Multi-Factor
Authentication prompt. The trusted IPs feature requires Azure AD Premium P1 edition.
Box 2: No -
10.10.1.160 is from a trusted location
Box 3: Yes -
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings
Question #34Topic 2
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant named contoso.com that has Email one-time
passcode for guests set to Yes.
You invite the guest users shown in the following table.
Which users will receive a one-time passcode, and how long will the passcode be valid? To answer, select
the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
https://cloudcertified.in/ 98
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
https://cloudcertified.in/ 99
ClouCertified Practice Tests https://cloudcertified.in/
Box 2: 30 minutes -
One-time passcodes are valid for 30 minutes. After 30 minutes, that specific one-time passcode is no
longer valid, and the user must request a new one. User sessions expire after 24 hours. After that time,
the guest user receives a new passcode when they access the resource. Session expiration provides
added security, especially when a guest user leaves their company or no longer needs access.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/one-time-passcode
Question #35Topic 2
You currently allow email clients that use Basic authentication to connect to Microsoft Exchange Online.
You need to ensure that users can connect to Exchange only from email clients that use Modern
https://cloudcertified.in/ 100
ClouCertified Practice Tests https://cloudcertified.in/
authentication protocols.
Correct Answer: B
Question #36Topic 2
You have an Azure subscription that contains an Azure SQL database named db1.
You deploy an Azure App Service web app named App1 that provides product information to users that
connect to App1 anonymously.
You need to provide App1 with access to db1. The solution must meet the following requirements:
Correct Answer: A
Question #37Topic 2
You have an Azure subscription that contains the custom roles shown in the following table.
You need to create a custom Azure subscription role named Role3 by using the Azure portal. Role3 will
use the baseline permissions of an existing role.
• A. Role2 only
https://cloudcertified.in/ 101
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: C
Question #38Topic 2
The users frequently work from remote locations that do not have Wi-Fi access or mobile phone
connectivity. While working from the remote locations, the users connect their laptops to a wired
network that has internet access.
Which MFA authentication method can the users use from the remote location?
Correct Answer: A
Question #39Topic 2
The users frequently work from remote locations that do not have Wi-Fi access or mobile phone
connectivity. While working from the remote locations, the users connect their laptops to a wired
network that has internet access.
Which MFA authentication method can the users use from the remote location?
• A. voice
• B. Windows Hello for Business
• C. email
• D. security questions
Correct Answer:B
https://cloudcertified.in/ 102
ClouCertified Practice Tests https://cloudcertified.in/
Question #40Topic 2
HOTSPOT
-
You have an Azure subscription that contains the following virtual machine:
• Name: V1
• Azure region: East US
• System-assigned managed identity: Disabled
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
https://cloudcertified.in/ 103
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Question #41Topic 2
HOTSPOT
-
You have an Azure subscription that contains the key vaults shown in the following table.
https://cloudcertified.in/ 104
ClouCertified Practice Tests https://cloudcertified.in/
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Correct
Answer:
Question #42Topic 2
• A. password spray
• B. anonymous IP address
• C. unfamiliar sign-in properties
• D. Azure AD threat intelligence
https://cloudcertified.in/ 105
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: D
Question #43Topic 2
You configure self-service password reset (SSPR) by using the following settings:
• A. a smartcard
• B. a mobile app code
• C. a mobile app notification
• D. an email to an address outside your organization
Correct Answer: B
Question #44Topic 2
You need to ensure that when users connect to the Microsoft 365 portal from an anonymous IP address,
they are prompted to use multi-factor authentication (MFA).
Correct Answer: A
Question #45Topic 2
HOTSPOT
-
You configure a conditional access policy as shown in the Conditional Access policy exhibit. (Click the
Conditional Access policy tab.)
https://cloudcertified.in/ 106
ClouCertified Practice Tests https://cloudcertified.in/
You view the User administrator role settings as shown in the Role setting details exhibit. (Click the Role
setting details tab.)
https://cloudcertified.in/ 107
ClouCertified Practice Tests https://cloudcertified.in/
You view the User administrator role assignments as shown in the Role assignments exhibit. (Click the
Role assignments tab.)
https://cloudcertified.in/ 108
ClouCertified Practice Tests https://cloudcertified.in/
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Correct
Answer:
Question #46Topic 2
HOTSPOT
-
https://cloudcertified.in/ 109
ClouCertified Practice Tests https://cloudcertified.in/
You have an Azure AD tenant that contains the users shown in the following table.
You have the Azure AD Identity Protection policies shown in the following table.
You review the Risky users report and the Risky sign-ins report and perform actions for each user as
shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Correct
Answer:
https://cloudcertified.in/ 110
ClouCertified Practice Tests https://cloudcertified.in/
Question #47Topic 2
• A. Application developer
• B. Cloud application administrator
• C. Service support administrator
• D. Application administrator
Correct Answer: D
Question #48Topic 2
DRAG DROP
-
• Ensure that users can sign in to Azure virtual machines by using their Microsoft 365 credentials.
• Delegate the ability to create new virtual machines.
What should you use for each requirement? To answer, drag the appropriate features to the correct
requirements. Each feature may be used once, more than once, or not at all. You may need to drag the
split bar between panes or scroll to view content.
https://cloudcertified.in/ 111
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Question #49Topic 2
The users frequently work from remote locations that do not have Wi-Fi access or mobile phone
connectivity. While working from the remote locations, the users connect their laptops to a wired
network that has internet access.
Which MFA authentication method can the users use from the remote location?
Correct Answer: D
Question #50Topic 2
HOTSPOT
-
Your network contains an on-premises Active Directory Domain Services (AD DS) domain that syncs with
an Azure AD tenant. The AD DS domain contains the organizational units (OUs) shown in the following
table.
https://cloudcertified.in/ 112
ClouCertified Practice Tests https://cloudcertified.in/
Where should you create BreakGlass, and which role should you assign to BreakGlass? To answer, select
the appropriate options in the answer area.
Correct
Answer:
https://cloudcertified.in/ 113
ClouCertified Practice Tests https://cloudcertified.in/
Question #51Topic 2
You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1.
You need to ensure that users can request access to Site1. The solution must meet the following
requirements:
Correct Answer: B
Question #52Topic 2
HOTSPOT
-
You need to create two custom roles named Role1 and Role2. The solution must meet the following
requirements:
https://cloudcertified.in/ 114
ClouCertified Practice Tests https://cloudcertified.in/
• Users that are assigned Role1 can manage application security groups.
• Users that are assigned Role2 can manage Azure Firewall.
Which resource provider permissions are required for each role? To answer, select the appropriate
options in the answer area.
Correct
Answer:
https://cloudcertified.in/ 115
ClouCertified Practice Tests https://cloudcertified.in/
Question #53Topic 2
The users frequently work from remote locations that do not have Wi-Fi access or mobile phone
connectivity. While working from the remote locations, the users connect their laptop to a wired network
that has internet access.
Which MFA authentication method can the users use from the remote location?
• A. voice
• B. an app password
• C. security questions
• D. a verification code from the Microsoft Authenticator app
Correct Answer: D
Question #54Topic 2
DRAG DROP
-
https://cloudcertified.in/ 116
ClouCertified Practice Tests https://cloudcertified.in/
You need to enable real-time session-level monitoring of App1 by using Microsoft Defender for Cloud
Apps.
In which order should you perform the actions? To answer, move the appropriate actions from the list of
actions to the answer area and arrange them in the correct order.
Correct Answer:
Question #55Topic 2
HOTSPOT
-
Case Study
-
Overview
-
https://cloudcertified.in/ 117
ClouCertified Practice Tests https://cloudcertified.in/
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with
the adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security
defaults disabled.
• Multiple users in the sales department have up to five devices. The sales department users report that
sometimes they must contact the support department to join their devices to the Azure AD tenant
https://cloudcertified.in/ 118
ClouCertified Practice Tests https://cloudcertified.in/
• Users assigned the User administrator role must be able to request permission to use the role when
needed for up to one year.
• Users must be prompted to register for MFA and provided with an option to bypass the registration for
a grace period.
• Users must provide one authentication method to reset their password by using SSPR. Available
methods must include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
• Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
• The principle of least privilege must be used.
What occurs when User3 attempts to use SSPR? To answer, select the appropriate options in the answer
area.
https://cloudcertified.in/ 119
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Question #56Topic 2
HOTSPOT
-
Case Study
-
Overview
-
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
https://cloudcertified.in/ 120
ClouCertified Practice Tests https://cloudcertified.in/
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with
the adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security
defaults disabled.
• Multiple users in the sales department have up to five devices. The sales department users report that
sometimes they must contact the support department to join their devices to the Azure AD tenant
because they have reached their device limit.
• A recent security incident reveals that several users leaked their credentials, a suspicious browser was
used for a sign-in, and resources were accessed from an anonymous IP address.
• When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear
in the selection list.
• Anyone in the organization can invite guest users, including other guests and non-administrators.
• The helpdesk spends too much time resetting user passwords.
https://cloudcertified.in/ 121
ClouCertified Practice Tests https://cloudcertified.in/
• Users assigned the User administrator role must be able to request permission to use the role when
needed for up to one year.
• Users must be prompted to register for MFA and provided with an option to bypass the registration for
a grace period.
• Users must provide one authentication method to reset their password by using SSPR. Available
methods must include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
• Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
• The principle of least privilege must be used.
You need to support the planned changes and meet the technical requirements for MFA.
Which feature should you use, and how long before the users must complete the registration? To
answer, select the appropriate options in the answer area.
https://cloudcertified.in/ 122
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Question #57Topic 2
DRAG DROP
-
Case Study
-
Overview
-
https://cloudcertified.in/ 123
ClouCertified Practice Tests https://cloudcertified.in/
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with
the adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security
defaults disabled.
• Multiple users in the sales department have up to five devices. The sales department users report that
sometimes they must contact the support department to join their devices to the Azure AD tenant
because they have reached their device limit.
• A recent security incident reveals that several users leaked their credentials, a suspicious browser was
used for a sign-in, and resources were accessed from an anonymous IP address.
• When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear
https://cloudcertified.in/ 124
ClouCertified Practice Tests https://cloudcertified.in/
• Users assigned the User administrator role must be able to request permission to use the role when
needed for up to one year.
• Users must be prompted to register for MFA and provided with an option to bypass the registration for
a grace period.
• Users must provide one authentication method to reset their password by using SSPR. Available
methods must include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
• Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
• The principle of least privilege must be used.
What should you configure for each incident? To answer, drag the appropriate policy types to the correct
issues. Each policy type may be used once, more than once, or not at all. You may need to drag the split
bar between panes or scroll to view content.
https://cloudcertified.in/ 125
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Question #58Topic 2
A user named User1 receives an error message when attempting to access the Microsoft Defender for
Cloud Apps portal.
You need to identify the cause of the error. The solution must minimize administrative effort.
• A. Log Analytics
• B. sign-in logs
• C. audit logs
• D. provisioning logs
Correct Answer: B
Question #59Topic 2
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps and Yammer.
You need prevent users from signing in to Yammer from high-risk locations.
What should you do in the Microsoft Defender for Cloud Apps portal?
https://cloudcertified.in/ 126
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: A
Question #60Topic 2
The users frequently work from remote locations that do not have Wi-Fi access or mobile phone
connectivity. While working from the remote locations, the users connect their laptop to a wired network
that has internet access.
Which MFA authentication method can the users use from the remote location?
• A. SMS
• B. email
• C. security questions
• D. a verification code from the Microsoft Authenticator app
Correct Answer: D
Question #61Topic 2
• A. impossible travel
• B. anonymous IP address
• C. malicious IP address
• D. Azure AD threat intelligence
Correct Answer: D
Question #62Topic 2
You configure self-service password reset (SSPR) by using the following settings:
https://cloudcertified.in/ 127
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: A
Question #63Topic 2
You have an Azure AD Tenant.
You configure self-service password reset (SSPR) by using the following settings:
Correct Answer: B
Question #64Topic 2
HOTSPOT
-
From Entitlement management, you plan to create a catalog named Catalog1 that will contain a custom
extension.
What should you create first, and what should you use to distribute Catalog1? To answer, select the
appropriate options in the answer area.
https://cloudcertified.in/ 128
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Question #65Topic 2
You have an Azure AD tenant that contains the users shown in the following table.
https://cloudcertified.in/ 129
ClouCertified Practice Tests https://cloudcertified.in/
You enable self-service password reset (SSPR) for all the users and configure SSPR to require security
questions as the only authentication method.
Which users must use security questions when resetting their password?
• A. User4 only
• B. User3 and User4 only
• C. User1 and User4 only
• D. User1, User3, and User4 only
• E. User1, User2, User3, and User4
Correct Answer: B
Question #66Topic 2
You have an Azure AD tenant.
You need to implement smart lockout with a lockout threshold of 10 failed sign-ins.
• A. Authentication strengths
• B. Password protection
• C. User risk policy
• D. Sign-in risk policy
Correct Answer: B
Question #67Topic 2
You configure a new Microsoft 365 tenant to use a default domain name of contoso.com.
You need to ensure that you can control access to Microsoft 365 resources by using conditional access
policies.
https://cloudcertified.in/ 130
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: A
Question #68Topic 2
An on-premises Active Directory domain is configured to sync with the Azure AD tenant. The domain
contains the servers shown in the following table.
You deploy a new server named Server4 that runs Windows Server 2022.
You need to ensure that Azure AD Password Protection will continue to work if a single server fails.
• A. Azure AD Connect
• B. Azure AD Application Proxy
• C. Password Change Notification Service (PCNS)
• D. the Azure AD Password Protection proxy service
Correct Answer: D
Question #69Topic 2
You have a Microsoft 365 tenant.
The users frequently work from remote locations that do not have Wi-Fi access or mobile phone
connectivity. While working from the remote locations, the users connect their laptops to a wired
https://cloudcertified.in/ 131
ClouCertified Practice Tests https://cloudcertified.in/
Which MFA authentication method can the users use from the remote location?
• A. voice
• B. email
• C. security questions
• D. a verification code from the Microsoft Authenticator app
Correct Answer: D
Question #70Topic 2
HOTSPOT
-
You have an Azure subscription that contains the resources shown in the following table.
You need to configure access to Vault1. The solution must meet the following requirements:
Which role should you assign to each user? To answer select the appropriate options in the answer area.
https://cloudcertified.in/ 132
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Question #71Topic 2
You have an Azure AD tenant that has multi-factor authentication (MFA) enforced and self-service
password reset (SSPR) enabled.
https://cloudcertified.in/ 133
ClouCertified Practice Tests https://cloudcertified.in/
Which two authentication methods can User1 use to complete the combined registration process? Each
correct answer presents a complete solution.
Correct Answer: CE
Question #72Topic 2
DRAG DROP
-
Admin1 uses the Require password change for high-risk users policy template to create a new Conditional
Access policy.
Who is included and excluded by default in the policy assignment? To answer, drag the appropriate
options to the correct target. Each option may be used once, more than once, or not at all. You may need
to drag the split bar between panes or scroll to view content.
https://cloudcertified.in/ 134
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer:
Question #73Topic 2
The users frequently work from remote locations that do not have Wi-Fi access or mobile phone
connectivity. While working from the remote locations, the users connect their laptops to a wired
network that has internet access.
Which MFA authentication method can the users use from the remote location?
• A. SMS
• B. Windows Hello for Business
• C. voice
• D. a notification through the Microsoft Authenticator app
Correct Answer: B
Question #74Topic 2
You currently allow email clients that use Basic authentication to connect to Microsoft Exchange Online.
You need to ensure that users can connect to Exchange Online only from email clients that use Modern
authentication protocols.
Correct Answer: A
https://cloudcertified.in/ 135
ClouCertified Practice Tests https://cloudcertified.in/
Question #75Topic 2
Which multifactor authentication (MFA) method will be enabled by default for the tenant?
• A. Microsoft Authenticator
• B. SMS
• C. voice call
• D. email OTP
Correct Answer: A
Question #76Topic 2
HOTSPOT
-
You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1
and the users shown in the following table.
• Name: CAPolicy1
• Assignments
o Users or workload identities: Group1
o Cloud apps or actions: Office 365 SharePoint Online
o Conditions
Filter for devices: Exclude filtered devices from the policy
https://cloudcertified.in/ 136
ClouCertified Practice Tests https://cloudcertified.in/
• Name: CAPolicy2
• Assignments
o Users or workload identities: Group2
o Cloud apps or actions: Office 365 SharePoint Online
o Conditions: 0 conditions selected
• Access controls
o Grant: Grant access
Require multifactor authentication
o Session: 0 controls selected
• Enable policy: On
All users confirm that they can successfully authenticate using MFA.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Correct
Answer:
https://cloudcertified.in/ 137
ClouCertified Practice Tests https://cloudcertified.in/
Question #77Topic 2
You have a Microsoft 365 E5 subscription that contains three users named User1, User2, and User3 and a
Microsoft SharePoint Online site named Site1.
You have a Conditional Access policy that has the following settings:
• Name: CA1
• Assignments
o Users and groups: User1, User2, User3
o Cloud apps or actions: SharePoint - Site1
• Access controls
o Session: Use app enforced restrictions
From the SharePoint admin center, you configure Access control for unmanaged devices to allow limited,
web-only access.
https://cloudcertified.in/ 138
ClouCertified Practice Tests https://cloudcertified.in/
• A. User1 only
• B. User2 only
• C. User3only
• D. User1 and User2 only
• E. User1, User2, and User3
Correct Answer: A
Question #78Topic 2
You have an Azure AD tenant named contoso.com that contains the resources shown in the following
table.
You need to ensure that Admin1 can enable Security defaults for contoso.com.
• A. Delete Package1.
• B. Delete CAPolicy1.
• C. Assign Admin1 the Authentication Administrator role for Au1.
• D. Configure Identity Governance.
Correct Answer: B
Question #79Topic 2
DRAG DROP
-
You have an Azure subscription that is linked to an Azure AD tenant named contoso.com. The
subscription contains a group named Group1 and a virtual machine named VM1.
How should you complete the PowerShell script? To answer, drag the appropriate cmdlets to the correct
targets. Each cmdlet may be used once, more than once or not at all. You may need to drag the split bar
https://cloudcertified.in/ 139
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Question #80Topic 2
When users attempt to provide App1 with access to the tenant, the attempt fails.
You need to ensure that the users can request admin consent for App1. The solution must follow the
principle of least privilege.
Correct Answer: A
Question #81Topic 2
https://cloudcertified.in/ 140
ClouCertified Practice Tests https://cloudcertified.in/
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
All users must use the Microsoft Authenticator app for multi-factor authentication (MFA) when accessing
Microsoft 365 services.
Some users report that they received an MFA prompt on their Microsoft Authenticator app without
initiating a sign-in request.
You need to block the users automatically when they report an MFA request that they did not initiate.
Solution: From the Azure Active Directory admin center, you configure the Block/unblock users settings
for multi-factor authentication (MFA).
• A. Yes
• B. No
Correct Answer: B
Question #82Topic 2
You have a Microsoft 365 subscription that contains a Microsoft SharePoint Online site named Site1 and
a Microsoft 365 group named Group1.
You need to ensure that the members of Group1 can access Site1 for 90 days. The solution must
minimize administrative effort.
• A. an access package
• B. an access review
• C. a lifecycle workflow
• D. a Conditional Access policy
Correct Answer: A
HOTSPOT -
You have a Microsoft 365 tenant and an Active Directory domain named adatum.com.
You deploy Azure AD Connect by using the Express Settings.
You need to configure self-service password reset (SSPR) to meet the following requirements:
✑ When users reset their password, they must be prompted to respond to a mobile app notification or
https://cloudcertified.in/ 141
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-deployment
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-
security-questions
Question #3Topic 3
https://cloudcertified.in/ 142
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/cloud-app-security/create-snapshot-cloud-discovery-reports#using-
traffic-logs-for-cloud-discovery
Question #4Topic 3
HOTSPOT -
You have an on-premises datacenter that contains the hosts shown in the following table.
The Active Directory forest syncs to an Azure Active Directory (Azure AD) tenant. Multi-factor
authentication (MFA) is enforced for Azure AD.
You need to ensure that you can publish App1 to Azure AD users.
What should you configure on Server4 and Firewall1? To answer, select the appropriate options in the
answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct
Answer:
https://cloudcertified.in/ 143
ClouCertified Practice Tests https://cloudcertified.in/
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/application-proxy
Question #5Topic 3
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant that has the default App registrations settings. The
tenant contains the users shown in the following table.
You purchase two cloud apps named App1 and App2. The global administrator registers App1 in Azure
AD.
You need to identify who can assign users to App1, and who can register App2 in Azure AD.
What should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
https://cloudcertified.in/ 144
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/add-application-portal-assign-
https://cloudcertified.in/ 145
ClouCertified Practice Tests https://cloudcertified.in/
users https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-how-
applications-are-added
Question #6Topic 3
HOTSPOT -
You have a custom cloud app named App1 that is registered in Azure Active Directory (Azure AD).
App1 is configured as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the
information presented in the graphic.
NOTE: Each correct selection is worth one point.
https://cloudcertified.in/ 146
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/assign-user-or-group-access-
portal
Question #7Topic 3
https://cloudcertified.in/ 147
ClouCertified Practice Tests https://cloudcertified.in/
Users report that when they go to the My Apps portal, they only see App1 and App2.
You need to ensure that the users can also see App3.
What should you do from App3?
Correct Answer: A
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/assign-user-or-group-access-
portal https://docs.microsoft.com/en-us/azure/active-directory/user-help/my-applications-portal-
workspaces
Question #8Topic 3
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/roles/delegate-app-roles
Question #9Topic 3
HOTSPOT -
You have a Microsoft 365 tenant that contains a group named Group1 as shown in the Group1 exhibit.
(Click the Group1 tab.)
You create an enterprise application named App1 as shown in the App1 Properties exhibit. (Click the
App1 Properties tab.)
https://cloudcertified.in/ 148
ClouCertified Practice Tests https://cloudcertified.in/
You configure self-service for App1 as shown in the App1 Self-service exhibit. (Click the App1 Self-service
tab.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
https://cloudcertified.in/ 149
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/assign-user-or-group-access-
portal https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/add-application-portal-
assign-users
Question #10Topic 3
You have an Azure Active Directory (Azure AD) tenant named contoso.com that has Azure AD Identity
Protection enabled.
You need to implement a sign-in risk remediation policy without blocking user access.
What should you do first?
https://cloudcertified.in/ 150
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: D
MFA and SSPR are both required. However, MFA is required first.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-
remediate-unblock https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-
deployment
Question #11Topic 3
HOTSPOT -
Your company has a Microsoft 365 tenant.
All users have computers that run Windows 10 and are joined to the Azure Active Directory (Azure AD)
tenant.
The company subscribes to a third-party cloud service named Service1. Service1 supports Azure AD
authentication and authorization based on OAuth. Service1 is published to the Azure AD gallery.
You need to recommend a solution to ensure that the users can connect to Service1 without being
prompted for authentication. The solution must ensure that the users can access Service1 only from
Azure AD-joined computers. The solution must minimize administrative effort.
What should you recommend for each requirement? To answer, select the appropriate options in the
answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct
Answer:
https://cloudcertified.in/ 151
ClouCertified Practice Tests https://cloudcertified.in/
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-how-applications-are-
added https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/require-managed-
devices
Question #12Topic 3
Your company requires that users request access before they can access corporate applications.
You register a new enterprise application named MyApp1 in Azure Active Directory (Azure AD) and
configure single sign-on (SSO) for MyApp1.
Which settings should you configure next for MyApp1?
• A. Self-service
• B. Provisioning
• C. Application proxy
• D. Roles and administrators
Correct Answer: A
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/manage-self-service-access
Question #13Topic 3
DRAG DROP -
Your company has an Azure Active Directory (Azure AD) tenant named contoso.com.
The company is developing a web service named App1.
You need to ensure that App1 can use Microsoft Graph to read directory data in contoso.com.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the
list of actions to the answer area and arrange then in the correct order.
https://cloudcertified.in/ 152
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
https://cloudcertified.in/ 153
ClouCertified Practice Tests https://cloudcertified.in/
You have an Azure Active Directory (Azure AD) tenant that contains cloud-based enterprise apps.
You need to group related apps into categories in the My Apps portal.
What should you create?
• A. tags
• B. collections
• C. naming policies
• D. dynamic groups
Correct Answer: B
Reference:
https://support.microsoft.com/en-us/account-billing/customize-app-collections-in-the-my-apps-portal-
2dae6b8a-d8b0-4a16-9a5d-71ed4d6a6c1d
Question #15Topic 3
The Azure Active Directory (Azure AD) tenant contains the groups shown in the following table.
• A. Group1 only
• B. Group2 only
• C. Group3 only
• D. Group1 and Group4
• E. Group1 and Group3
Correct Answer: E
Using Azure Active Directory (Azure AD) with an Azure AD Premium license plan, you can use groups to
assign access to a SaaS application that's integrated with Azure AD. For example, if you want to assign
access for the marketing department to use five different SaaS applications, you can create an Office 365
or security group that contains the users in the marketing department, and then assign that group to
these five SaaS applications that are needed by the marketing department.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/enterprise-users/groups-saasapps
Question #16Topic 3
You have an Azure Active Directory (Azure AD) tenant that contains the users shown in, the following
table.
https://cloudcertified.in/ 154
ClouCertified Practice Tests https://cloudcertified.in/
The User settings for enterprise applications have the following configurations:
✑ Users can consent to apps accessing company data on their behalf: No
✑ Users can consent to apps accessing company data for the groups they own: No
✑ Users can request admin consent to apps they are unable to consent to: Yes
Who can review admin consent requests: Admin2, User2
User1 attempts, to add an app that requires consent to access company data.
Which user can provide consent?
• A. User1
• B. User2
• C. Admin1
• D. Admin2
Correct Answer: C
To approve requests, a reviewer must be a global administrator, cloud application administrator, or
application administrator.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/configure-admin-consent-
workflow
Question #17Topic 3
You have a Microsoft 365 subscription. The subscription contains users that use Microsoft Outlook 2016
and Outlook 2013 clients.
You need to implement tenant restrictions. The solution must minimize administrative effort.
What should you do first?
Correct Answer: B
From October 13, 2020 onward, only these versions of Office are supported for connecting to Microsoft
365 (and Office 365) services:
Microsoft 365 Apps for enterprise (previously named Office 365 ProPlus)
Microsoft 365 Apps for business (previously named Office 365 Business)
Office LTSC 2021, such as Office LTSC Professional Plus 2021
Office 2019, such as Office Professional Plus 2019
https://cloudcertified.in/ 155
ClouCertified Practice Tests https://cloudcertified.in/
You need to create a Microsoft Defender for Cloud Apps session policy.
• A. From the Microsoft Defender for Cloud Apps portal, select User monitoring.
• B. From the Microsoft Defender for Cloud Apps portal, select App onboarding/maintenance.
• C. From the Azure Active Directory admin center, create a Conditional Access policy.
• D. From the Microsoft Defender for Cloud Apps portal, create a continuous report.
Correct Answer: A
Question #19Topic 3
You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following
table.
You add an enterprise application named App1 to Azure AD and set User1 as the owner of App1. App1
requires admin consent to access Azure AD before the app can be used.
You configure the Admin consent requests settings as shown in the following exhibit.
https://cloudcertified.in/ 156
ClouCertified Practice Tests https://cloudcertified.in/
Which users can review and approve the admin consent requests?
• A. Admin1 only
• B. Admin1, Admin2 and Admin3 only
• C. Admin1, Admin2, and User1 only
• D. Admin1 and Admin2 only
• E. Admin1, Admin2, Admin3, and User1
Correct Answer: D
Question #20Topic 3
You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1.
You need to be notified if a user downloads more than 50 files in one minute from Site1.
Which type of policy should you create in the Microsoft Defender for Cloud Apps portal?
• A. session policy
• B. activity policy
• C. file policy
https://cloudcertified.in/ 157
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: B
Question #21Topic 3
You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1.
Site1 hosts PDF files.
You need to prevent users from printing the files directly from Site1.
Which type of policy should you create in the Microsoft Defender for Cloud Apps portal?
• A. activity policy
• B. access policy
• C. file policy
• D. session policy
Correct Answer: D
Question #22Topic 3
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps and Conditional
Access policies.
You need to block access to cloud apps when a user is assessed as high risk.
Which type of policy should you create in the Microsoft Defender for Cloud Apps portal?
• A. access policy
• B. OAuth app policy
• C. anomaly detection policy
• D. activity policy
Correct Answer: A
Question #23Topic 3
You need to configure an alert that will be triggered when an app requires high permissions and is
authorized by more than 20 users.
Which type of policy should you create in the Microsoft Defender for Cloud Apps portal?
https://cloudcertified.in/ 158
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: D
Question #24Topic 3
Your company has an Azure AD tenant that contains the users shown in the following table.
Which user can create appointments in the calendar of each user at the company?
• A. User1
• B. User2
• C. User3
• D. User4
Correct Answer: B
Question #25Topic 3
You have an Azure AD tenant that contains a user named User1 and a registered app named App1.
What is the maximum number of days you have to restore the app registration from when it was
deleted?
• A. 14
• B. 30
• C. 60
https://cloudcertified.in/ 159
ClouCertified Practice Tests https://cloudcertified.in/
• D. 180
Correct Answer: B
Question #26Topic 3
HOTSPOT
-
Sometimes, users use external, third-party applications that require limited access to the Microsoft 365
data of the respective user. The users register the applications in Azure AD.
You need to receive an alert if a registered application gains read and write access to the users’ email.
What should you do? To answer, select the appropriate options in the answer area.
Correct
Answer:
https://cloudcertified.in/ 160
ClouCertified Practice Tests https://cloudcertified.in/
Question #27Topic 3
Case Study -
Overview -
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with
the adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security
defaults disabled.
https://cloudcertified.in/ 161
ClouCertified Practice Tests https://cloudcertified.in/
• Multiple users in the sales department have up to five devices. The sales department users report that
sometimes they must contact the support department to join their devices to the Azure AD tenant
because they have reached their device limit.
• A recent security incident reveals that several users leaked their credentials, a suspicious browser was
used for a sign-in, and resources were accessed from an anonymous IP address.
• When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear
in the selection list.
• Anyone in the organization can invite guest users, including other guests and non-administrators.
• The helpdesk spends too much time resetting user passwords.
• Users currently use only passwords for authentication.
https://cloudcertified.in/ 162
ClouCertified Practice Tests https://cloudcertified.in/
• Users assigned the User administrator role must be able to request permission to use the role when
needed for up to one year.
• Users must be prompted to register for MFA and provided with an option to bypass the registration for
a grace period.
• Users must provide one authentication method to reset their password by using SSPR. Available
methods must include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
• Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
• The principle of least privilege must be used.
You need implement the planned changes for application access to organizational data.
• A. authentication methods
• B. the User consent settings
• C. access packages
• D. an application proxy
Correct Answer: B
Question #28Topic 3
You have an Azure AD tenant.
You configure User consent settings to allow users to provide consent to apps from verified publishers.
You need to ensure that the users can only provide consent to apps that require low impact permissions.
Correct Answer: A
https://cloudcertified.in/ 163
ClouCertified Practice Tests https://cloudcertified.in/
Question #29Topic 3
HOTSPOT
-
You have a Microsoft 365 E5 subscription that contains a user named User1.
User1 needs to view the App governance dashboard. The solution must use the principle of the least
privilege.
Which role should you assign to User1, and which portal should User1 use to view the dashboard? To
answer, select the appropriate options in the answer area.
Correct
Answer:
https://cloudcertified.in/ 164
ClouCertified Practice Tests https://cloudcertified.in/
Question #30Topic 3
You need to ensure that the apps support automatic provisioning of Azure AD users.
• A. OAuth 2.0
• B. WS-Fed
• C. SCIM 2.0
• D. LDAP 3
Correct Answer: C
Question #31Topic 3
You have an Azure AD tenant and a .NET web app named App1.
https://cloudcertified.in/ 165
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: D
Question #32Topic 3
You have a Microsoft 365 tenant.
The users frequently work from remote locations that do not have Wi-Fi access or mobile phone
connectivity. While working from the remote locations, the users connect their laptops to a wired
network that has internet access.
Which MFA authentication method can the users use from the remote location?
Correct Answer: D
Question #33Topic 3
You have an Azure AD tenant.
You discover that a large number of new apps were added to the tenant.
• A. From the Microsoft Defender for Cloud Apps portal, create a Cloud Discovery anomaly
detection policy.
• B. From the Microsoft Entra admin center, configure the Admin consent settings.
• C. From the Microsoft Defender for Cloud Apps portal, configure an app connector.
• D. From the Microsoft Entra admin center, configure an access review.
Correct Answer: B
Question #34Topic 3
https://cloudcertified.in/ 166
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: C
Question #35Topic 3
Your company purchases a new Microsoft 365 E5 subscription and an app named App1.
You need to create a Microsoft Defender for Cloud Apps access policy for App1.
Correct Answer: D
Question #36Topic 3
Case Study -
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London
and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure AD tenant
named fabrikam.com.
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The
domain contains an organizational unit (OU) named Contoso_Resources. The Contoso_Resources OU
contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
https://cloudcertified.in/ 167
ClouCertified Practice Tests https://cloudcertified.in/
Contoso also includes a marketing department that has users in each office.
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Azure AD Connect is configured between Azure AD and Active Directory Domain Services (AD DS). Only
the Contoso_Resources OU is synced.
Helpdesk administrators routinely use the Microsoft 365 admin center to manage user settings.
User administrators currently use the Microsoft 365 admin center to manually assign licenses. All users
have all licenses assigned besides the following exceptions:
• The users in the London office have the Microsoft 365 Phone System license unassigned.
• The users in the Seattle office have the Yammer Enterprise license unassigned.
Contoso uses Azure AD Privileged Identity Management (PIM) to protect administrative roles.
• Currently, all the helpdesk administrators can manage user licenses throughout the entire Microsoft
365 tenant.
• The user administrators report that it is tedious to manually configure the different license
https://cloudcertified.in/ 168
ClouCertified Practice Tests https://cloudcertified.in/
Contoso plans to acquire a company named A. Datum Corporation. One hundred new A. Datum users will
be created in an Active Directory OU named Adatum. The users will be located in London and Seattle.
You need to meet the planned changes and technical requirements for App1.
https://cloudcertified.in/ 169
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: D
Question #37Topic 3
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have an Amazon Web Services (AWS) account, a Google Workspace subscription, and a GitHub
account.
You need to ensure that you can monitor OAuth authentication requests by using Microsoft Defender for
Cloud Apps.
Solution: From the Microsoft 365 Defender portal, you add the Google Workspace app connector.
• A. Yes
• B. No
Correct Answer: A
Question #38Topic 3
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have an Amazon Web Services (AWS) account, a Google Workspace subscription, and a GitHub
account.
You need to ensure that you can monitor OAuth authentication requests by using Microsoft Defender for
Cloud Apps.
Solution: From the Microsoft 365 Defender portal, you add the Microsoft Azure app connector.
• A. Yes
• B. No
https://cloudcertified.in/ 170
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: B
Question #39Topic 3
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have an Amazon Web Services (AWS) account, a Google Workspace subscription, and a GitHub
account.
You need to ensure that you can monitor OAuth authentication requests by using Microsoft Defender for
Cloud Apps.
Solution: From the Microsoft 365 Defender portal, you add the Amazon Web Services app connector.
• A. Yes
• B. No
Correct Answer: A
Question #40Topic 3
Your company purchases a Microsoft 365 E5 subscription.
You need to ensure that User1 can create Microsoft Defender for Cloud Apps session policies.
• A. Create a Conditional Access policy and select Require app protection policy.
• B. Create a Conditional Access policy and select Use Conditional Access App Control.
• C. Assign the Cloud Application Administrator role to User1.
• D. Assign the Cloud App Security Administrator role to User1.
Correct Answer: B
Question #41Topic 3
https://cloudcertified.in/ 171
ClouCertified Practice Tests https://cloudcertified.in/
The App registration settings for the Azure AD tenant are configured as shown in the following exhibit.
You need to ensure that User1 can register App1. The solution must use the principle of least privilege.
• A. Application Developer
• B. Cloud App Security Administrator
• C. Cloud Application Administrator
• D. Application Administrator
Correct Answer: A
Question #42Topic 3
HOTSPOT
-
You have an Azure subscription that contains the resources shown in the following table.
The subscription contains the virtual machines shown in the following table.
https://cloudcertified.in/ 172
ClouCertified Practice Tests https://cloudcertified.in/
Which identities can be assigned the Owner role for RG1, and to which virtual machines can you assign
Managed2? To answer, select the appropriate options in the answer area.
Correct
Answer:
https://cloudcertified.in/ 173
ClouCertified Practice Tests https://cloudcertified.in/
Question #43Topic 3
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.
Correct Answer: A
Question #44Topic 3
HOTSPOT
-
You have a Microsoft Entra tenant that contains multiple storage accounts.
You plan to deploy multiple Azure App Service apps that will require access to the storage accounts.
You need to recommend an identity solution to provide the apps with access to the storage accounts. The
solution must minimize administrative effort.
Which type of identity should you recommend, and what should you recommend using to control access
to the storage accounts? To answer, select the appropriate options in the answer area.
https://cloudcertified.in/ 174
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Question #45Topic 3
You have an Azure subscription named Sub1 that contains a resource group named RG1. RG1 contains an
Azure Cosmos DB database named DB1 and an Azure Kubernetes Service (AKS) cluster named AKS1. AKS1
uses a managed identity.
You need to ensure that AKS1 can access DB1. The solution must meet the following requirements:
https://cloudcertified.in/ 175
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: C
Question #46Topic 3
You have an Azure subscription that contains a storage account named storage1 and a web app named
WebApp1. WebApp1 uses a system-assigned managed identity.
You need to ensure that WebApp1 can read and write files to storage1 by using the system-assigned
managed identity.
• A. data protection
• B. a shared access signature (SAS)
• C. the Access control (IAM) settings
• D. the File share settings
• E. access keys
Correct Answer: C
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/terms-of-use
Question #2Topic 4
You have an Azure Active Directory (Azure AD) tenant that contains the groups shown in the following
table.
https://cloudcertified.in/ 176
ClouCertified Practice Tests https://cloudcertified.in/
• A. Group1 only
• B. Group1 and Group4 only
• C. Group1 and Group2 only
• D. Group1, Group2, Group4, and Group5 only
• E. Group1, Group2, Group3, Group4 and Group5
Correct Answer: D
You cannot create access reviews for device groups.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/create-access-review
Question #3Topic 4
You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following
table.
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-
start-security-review
Question #4Topic 4
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant that contains Azure AD Privileged Identity
https://cloudcertified.in/ 177
ClouCertified Practice Tests https://cloudcertified.in/
Management (PIM) role settings for the User administrator role as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the
information presented in the graphic.
NOTE: Each correct selection is worth one point.
https://cloudcertified.in/ 178
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-
deployment-plan
Question #5Topic 4
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains a user named
User1.
User1 has the devices shown in the following table.
On November 5, 2020, you create and enforce terms of use in contoso.com that has the following
settings:
✑ Name: Terms1
✑ Display name: Contoso terms of use
✑ Require users to expand the terms of use: On
✑ Require users to consent on every device: On
✑ Expire consents: On
https://cloudcertified.in/ 179
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Box 1: Yes because User1 has not yet accepted the terms on Device1.
Box 2: Yes because User1 has not yet accepted the terms on Device2. User1 will be prompted to register
the device before the terms can be accepted.
Box 3: No because User1 has already accepted the terms on Device3. The terms do not expire until
December 10 and then monthly after that. th
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/terms-of-use
Question #6Topic 4
Your company recently implemented Azure Active Directory (Azure AD) Privileged Identity Management
(PIM).
While you review the roles in PIM, you discover that all 15 users in the IT department at the company
have permanent security administrator rights.
You need to ensure that the IT department users only have access to the Security administrator role
when required.
What should you configure for the Security administrator role assignment?
https://cloudcertified.in/ 180
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: D
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure
Question #7Topic 4
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview
Question #8Topic 4
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have a Microsoft 365 tenant.
You have 100 IT administrators who are organized into 10 departments.
You create the access review shown in the exhibit. (Click the Exhibit tab.)
https://cloudcertified.in/ 181
ClouCertified Practice Tests https://cloudcertified.in/
You discover that all access review requests are received by Megan Bowen.
You need to ensure that the manager of each department receives the access reviews of their respective
department.
Solution: You create a separate access review for each role.
Does this meet the goal?
• A. Yes
• B. No
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/create-access-review
Question #9Topic 4
https://cloudcertified.in/ 182
ClouCertified Practice Tests https://cloudcertified.in/
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have a Microsoft 365 tenant.
You have 100 IT administrators who are organized into 10 departments.
You create the access review shown in the exhibit. (Click the Exhibit tab.)
You discover that all access review requests are received by Megan Bowen.
You need to ensure that the manager of each department receives the access reviews of their respective
department.
Solution: You modify the properties of the IT administrator user accounts.
Does this meet the goal?
• A. Yes
• B. No
https://cloudcertified.in/ 183
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: A
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/create-access-review
Question #10Topic 4
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have a Microsoft 365 tenant.
You have 100 IT administrators who are organized into 10 departments.
You create the access review shown in the exhibit. (Click the Exhibit tab.)
You discover that all access review requests are received by Megan Bowen.
You need to ensure that the manager of each department receives the access reviews of their respective
department.
https://cloudcertified.in/ 184
ClouCertified Practice Tests https://cloudcertified.in/
• A. Yes
• B. No
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/create-access-review
Question #11Topic 4
Correct Answer: A
Question #12Topic 4
You have an Azure Active Directory (Azure AD) tenant named contoso.com.
You implement entitlement management to provide resource access to users at a company named
Fabrikam, Inc. Fabrikam uses a domain named fabrikam.com.
Fabrikam users must be removed automatically from the tenant when access is no longer required.
You need to configure the following settings:
✑ Block external user from signing in to this directory: No
✑ Remove external user: Yes
✑ Number of days before removing external user from this directory: 90
What should you configure on the Identity Governance blade?
• A. Access packages
• B. Entitlement management settings
• C. Terms of use
• D. Access reviews settings
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-
external-users
https://cloudcertified.in/ 185
ClouCertified Practice Tests https://cloudcertified.in/
Question #13Topic 4
• A. 14 days
• B. 30 days
• C. 90 days
• D. 365 days
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-reports-data-
retention#how-long-does-azure-ad-store-the-data
Question #14Topic 4
You have an Azure subscription that contains the resources shown in the following table.
Correct Answer: C
Access reviews require an Azure AD Premium P2 license.
Access reviews for Group1 and App1 can be configured in Azure AD Access Reviews.
Access reviews for the Contributor role and Role1 would need to be configured in Privileged Identity
Management (PIM). PIM is included in Azure AD Premium
P2.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-
start-security-review?toc=/azure/active-directory/governance/ toc.json https://docs.microsoft.com/en-
us/azure/active-directory/governance/access-reviews-overview
Question #15Topic 4
You have an Azure Active Directory (Azure AD) tenant that uses conditional access policies.
You plan to use third-party security information and event management (SIEM) to analyze conditional
access usage.
You need to download the Azure AD log by using the administrative portal. The log file must contain
changes to conditional access policies.
What should you export from Azure AD?
https://cloudcertified.in/ 186
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-audit-logs
Question #16Topic 4
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have a Microsoft 365 tenant.
You have 100 IT administrators who are organized into 10 departments.
You create the access review shown in the exhibit. (Click the Exhibit tab.)
https://cloudcertified.in/ 187
ClouCertified Practice Tests https://cloudcertified.in/
You discover that all access review requests are received by Megan Bowen.
You need to ensure that the manager of each department receives the access reviews of their respective
department.
Solution: You add each manager as a fallback reviewer.
Does this meet the goal?
• A. Yes
• B. No
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/create-access-review
Question #17Topic 4
https://cloudcertified.in/ 188
ClouCertified Practice Tests https://cloudcertified.in/
You have an Azure Active Directory (Azure AD) tenant that contains the objects shown in the following
table.
Which objects can you add as eligible in Azure AD Privileged Identity Management (PIM) for an Azure AD
role?
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-
deployment-plan
Question #18Topic 4
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant that contains the following group:
✑ Name: Group1
✑ Members: User1, User2
✑ Owner: User3
On January 15, 2021, you create an access review as shown in the exhibit. (Click the Exhibit tab.)
https://cloudcertified.in/ 189
ClouCertified Practice Tests https://cloudcertified.in/
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
https://cloudcertified.in/ 190
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/review-your-access
Question #19Topic 4
HOTSPOT -
Your company has an Azure Active Directory (Azure AD) tenant named contoso.com. The company has a
business partner named Fabrikam, Inc.
Fabrikam uses Azure AD and has two verified domain names of fabrikam.com and litwareinc.com. Both
domain names are used for Fabrikam email addresses.
You plan to create an access package named package1 that will be accessible only to the users at
Fabrikam.
You create a connected organization for Fabrikam.
You need to ensure that the package1 will be accessible only to users who have fabrikam.com email
addresses.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
https://cloudcertified.in/ 191
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-access-
package-request-policy https://docs.microsoft.com/en-us/azure/active-
directory/governance/entitlement-management-access-package-create
Question #20Topic 4
You have an Azure Active Directory (Azure AD) tenant named contoso.com that has Azure AD Identity
Protection policies enforced.
You create an Azure Sentinel instance and configure the Azure Active Directory connector.
You need to ensure that Azure Sentinel can generate incidents based on the risk alerts raised by Azure AD
Identity Protection.
What should you do first?
https://cloudcertified.in/ 192
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: A
Reference:
https://docs.microsoft.com/en-us/azure/sentinel/connect-azure-ad-identity-protection
Question #21Topic 4
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You use Azure Monitor to analyze Azure Active Directory (Azure AD) activity logs.
You receive more than 100 email alerts each day for failed Azure AD user sign-in attempts.
You need to ensure that a new security administrator receives the alerts instead of you.
Solution: From Azure AD, you create an assignment for the Insights administrator role.
Does this meet the goal?
• A. Yes
• B. No
Correct Answer: B
Question #22Topic 4
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You use Azure Monitor to analyze Azure Active Directory (Azure AD) activity logs.
You receive more than 100 email alerts each day for failed Azure AD user sign-in attempts.
You need to ensure that a new security administrator receives the alerts instead of you.
Solution: From Azure AD, you modify the Diagnostics settings.
Does this meet the goal?
• A. Yes
• B. No
Correct Answer: A
Question #23Topic 4
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You use Azure Monitor to analyze Azure Active Directory (Azure AD) activity logs.
You receive more than 100 email alerts each day for failed Azure AD user sign-in attempts.
You need to ensure that a new security administrator receives the alerts instead of you.
Solution: From Azure Monitor, you create a data collection rule.
Does this meet the goal?
• A. Yes
https://cloudcertified.in/ 193
ClouCertified Practice Tests https://cloudcertified.in/
• B. No
Correct Answer: B
Question #24Topic 4
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/howto-integrate-activity-
logs-with-log-analytics
Question #25Topic 4
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant contains the users shown in the following table.
In Azure AD Privileged Identity Management (PIM), you configure the Global administrator role as shown
in the following exhibit.
https://cloudcertified.in/ 194
ClouCertified Practice Tests https://cloudcertified.in/
https://cloudcertified.in/ 195
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
Box 1: Yes -
Box 2: No -
The Privileged Authentication Administrator can set or reset any authentication method for any user,
including Global Administrators.
The Privileged Role Administrator can manage role assignments, including the Global Administrator role,
in Azure Active Directory, as well as within Azure AD
Privileged Identity Management. In addition, this role allows management of all aspects of Privileged
Identity Management and administrative units.
Box 3: No -
The Privileged Authentication Administrator can set or reset any authentication method for any user,
including Global Administrators.
The Privileged Role Administrator can manage role assignments, including the Global Administrator role,
in Azure Active Directory, as well as within Azure AD
https://cloudcertified.in/ 196
ClouCertified Practice Tests https://cloudcertified.in/
Privileged Identity Management. In addition, this role allows management of all aspects of Privileged
Identity Management and administrative units.
Question #26Topic 4
Correct Answer: C
Question #27Topic 4
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You use Azure Monitor to analyze Azure Active Directory (Azure AD) activity logs.
You receive more than 100 email alerts each day for failed Azure AD user sign-in attempts.
You need to ensure that a new security administrator receives the alerts instead of you.
Solution: From Azure Monitor, you modify the action group.
Does this meet the goal?
• A. Yes
• B. No
Correct Answer: B
Question #28Topic 4
HOTSPOT -
Your network contains an on-premises Active Directory domain that syncs to an Azure Active Directory
(Azure AD) tenant.
The tenant contains the groups shown in the following table.
https://cloudcertified.in/ 197
ClouCertified Practice Tests https://cloudcertified.in/
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct
Answer:
https://cloudcertified.in/ 198
ClouCertified Practice Tests https://cloudcertified.in/
Box 1: No -
User1 is member of Group1. Group1 is in the cloud. Group1 is member of Group3. Group3 is in the cloud.
The access review applies to Group3, but not to Group1. The access review is setup to remove access if
reviewers don't respond.
Box 2: Yes -
User2 is member of Group2. Group1 is in an Active Directory domain.
The access review applies to Group2.
Box 3: No -
User3 is member of Group3, not of Group2.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview
Question #29Topic 4
You have a Microsoft 365 E5 subscription that contains a web app named App1.
Guest users are regularly granted access to App1.
You need to ensure that the guest users that have NOT accessed App1 during the past 30 days have their
access removed. The solution must minimize administrative effort.
What should you configure?
Correct Answer: D
Access to groups and applications for employees and guests changes over time. To reduce the risk
associated with stale access assignments, administrators can use Azure Active Directory (Azure AD) to
create access reviews for group members or application access.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/create-access-review
Question #30Topic 4
HOTSPOT -
You have an Azure Active Directory (Azure AD) ten-ant: that contains the groups shown in the following
table.
https://cloudcertified.in/ 199
ClouCertified Practice Tests https://cloudcertified.in/
You create an access review for Group1 as shown in the following table.
You create an access review for Group2 as shown in the following table.
What is the minimum member of Azure Active Directory Premium P2 licenses required for each group?
To answer, select the appropriate, options in the answer area.
NOTE: Each correct selection is worth one point.
https://cloudcertified.in/ 200
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
https://cloudcertified.in/ 201
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer:
Box 1: 525 -
For Group1:
Review scope: All Users, Reviewers: Users review own access
Note: How many licenses must you have?
Your directory needs at least as many Azure AD Premium P2 licenses as the number of employees who
will be performing the following tasks:
Member users who are assigned as reviewers
Member users who perform a self-review
Member users as group owners who perform an access review
Member users as application owners who perform an access review
For guest users, licensing needs will depend on the licensing model you're using. However, the below
guest users' activities are considered Azure AD Premium
P2 usage:
Guest users who are assigned as reviewers
Guest users who perform a self-review
Guest users as group owners who perform an access review
Guest users as application owners who perform an access review
Box 2: 1 -
For Group2:
Review scope: Guest users only. Reviewers: Group Owner.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview#license-
requirements
Question #31Topic 4
https://cloudcertified.in/ 202
ClouCertified Practice Tests https://cloudcertified.in/
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains a group named
All Company and has the following Identity Governance settings:
✑ Block external users from signing in to this directory: Yes
✑ Remove external user. Yes
✑ Number of days before removing external user from this directory: 30
On March 11, 2.022, you create an access package named Package1 that has the following settings:
✑ Resource rales
1. Name: All Company
2. Type: Group and Team
3. Role: Member
✑ Lifecycle
1. Access package assignment expire: On date
2. Assignment expiration date: April 1, 2022
On March 1, 2022, you assign Package1 to the guest users shown in the following table.
Correct
Answer:
https://cloudcertified.in/ 203
ClouCertified Practice Tests https://cloudcertified.in/
Box 1: No -
On March 2, 2022, you assign the Reports reader role to Guest1.
On April 1 the access package assignment expires. After another 30 days, well before May 5, the guest
user account is removed.
Box 2: No -
On April 1 the access package assignment expires. After another 30 days, well before May 5, the guest
user account is removed.
Box 3: Yes -
Note: Lifecycle -
On the Lifecycle tab, you specify when a user's assignment to the access package expires. You can also
specify whether users can extend their assignments.
In the Expiration section, set Access package assignments expires to On date, Number of days, Number of
hours, or Never.
For On date, select an expiration date in the future.
For Number of days, specify a number between 0 and 3660 days.
For Number of hours, specify a number of hours.
Based on your selection, a user's assignment to the access package expires on a certain date, a certain
number of days after they are approved, or never.
Note 2: By default, when an external user no longer has any access package assignments, they are
blocked from signing in to your directory. After 30 days, their guest user account is removed from your
directory.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-access-
package-lifecycle-policy https://docs.microsoft.com/en-us/azure/active-
directory/governance/entitlement-management-external-users
Question #32Topic 4
You have an Azure Active Directory (Azure AD) tenant named Contoso that contains a terms of use (Toll)
named Terms1 and an access package. Contoso users collaborate with an external organization named
Fabrikam. Fabrikam users must accept Terms1 before being allowed to use the access package.
You need to identify which users accepted or declined Terms1.
What should you use?
• A. sign-in logs
• B. the Usage and Insights report
• C. provisioning logs
• D. audit logs
Correct Answer: D
View Azure AD audit logs -
If you want to view more activity, Azure AD terms of use policies include audit logs. Each user consent
triggers an event in the audit logs that is stored for 30 days.
You can view these logs in the portal or download as a .csv file.
To get started with Azure AD audit logs, use the following procedure:
1. Sign in to the Azure portal as a global administrator, security administrator, or Conditional Access
administrator.
2. Browse to Azure Active Directory > Security > Conditional Access > Terms of use.
3. Select a terms of use policy.
4. Select View audit logs.
5. On the Azure AD audit logs screen, you can filter the information using the provided lists to target
https://cloudcertified.in/ 204
ClouCertified Practice Tests https://cloudcertified.in/
You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following
table.
• A. User1 only
• B. User3 only
• C. User1 and User2 only
• D. User1, User2, and User3
Correct Answer: A
Note:
If you set Select reviewers to Users review their own access or Managers of users, B2B direct connect
users and Teams won't be able to review their own access in your tenant. The owner of the Team under
review will get an email that asks the owner to review the B2B direct connect user and Teams.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/create-access-review
Question #34Topic 4
HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant that contains three users named User1, User2, and
User3.
You create a group named Group1. You add User2 and User3 to Group1.
You configure a role in Azure AD Privileged Identity Management (PIM) as shown in the Application
Administrator exhibit. (Click the Application Administrator tab.)
https://cloudcertified.in/ 205
ClouCertified Practice Tests https://cloudcertified.in/
https://cloudcertified.in/ 206
ClouCertified Practice Tests https://cloudcertified.in/
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct
Answer:
https://cloudcertified.in/ 207
ClouCertified Practice Tests https://cloudcertified.in/
Box 1: No -
User1 is eligible from 1/1/2021 to 1/31/2021.
However, here the Application Administrator role requires approval.
Box 2: No -
User2 is also member of Group1, and Group1 is configured as the approver for the Application
administrator role.
Box 3: Yes -
User1 is eligible from 1/1/2021 to 1/31/2021.
Activation maximum duration (hours) is set to 5 hours.
Question #35Topic 4
HOTSPOT -
You have a Microsoft 365 E5 subscription.
You create an access review for Azure Active Directory (Azure AD) roles.
You need to ensure that users who do not respond to review requests are removed automatically from
the roles. The solution must minimize administrative effort.
Which two settings should you modify? To answer, select the settings in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct
Answer:
https://cloudcertified.in/ 208
ClouCertified Practice Tests https://cloudcertified.in/
HOTSPOT
-
You have an Azure Active Directory (Azure AD) tenant that contains a user named User1.
https://cloudcertified.in/ 209
ClouCertified Practice Tests https://cloudcertified.in/
• How many days after the account of User1 is deleted can you restore the account?
• Which is the least privileged role that can be used to restore User1?
What should you identify? To answer, select the appropriate options in the answer area.
Correct
Answer:
Question #37Topic 4
HOTSPOT
-
You have an Azure AD tenant that contains the groups shown in the following exhibit.
https://cloudcertified.in/ 210
ClouCertified Practice Tests https://cloudcertified.in/
Use the drop-down menus to select the answer choice that completes each statement based on the
information presented in the graphic.
Correct
Answer:
https://cloudcertified.in/ 211
ClouCertified Practice Tests https://cloudcertified.in/
Question #38Topic 4
You have an Azure AD tenant that contains two users named User1 and User2.
Which two settings can you use? Each correct answer presents a complete solution.
Correct Answer: AB
Question #39Topic 4
DRAG DROP
-
https://cloudcertified.in/ 212
ClouCertified Practice Tests https://cloudcertified.in/
• Identify the locations and IP addresses used by Azure AD users to sign in.
• Review the Azure AD security settings and identify improvement recommendations.
• Identify changes to Azure AD users or service principals.
What should you use for each task? To answer, drag the appropriate resources to the correct
requirements. Each resource may be used once, more than once, or not at all. You may need to drag the
split bar between panes or scroll to view content.
Correct
Answer:
Question #40Topic 4
Case Study -
Overview -
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with
the adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security
https://cloudcertified.in/ 213
ClouCertified Practice Tests https://cloudcertified.in/
defaults disabled.
• Multiple users in the sales department have up to five devices. The sales department users report that
sometimes they must contact the support department to join their devices to the Azure AD tenant
because they have reached their device limit.
• A recent security incident reveals that several users leaked their credentials, a suspicious browser was
used for a sign-in, and resources were accessed from an anonymous IP address.
• When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear
in the selection list.
• Anyone in the organization can invite guest users, including other guests and non-administrators.
• The helpdesk spends too much time resetting user passwords.
• Users currently use only passwords for authentication.
https://cloudcertified.in/ 214
ClouCertified Practice Tests https://cloudcertified.in/
• Users assigned the User administrator role must be able to request permission to use the role when
needed for up to one year.
• Users must be prompted to register for MFA and provided with an option to bypass the registration for
a grace period.
• Users must provide one authentication method to reset their password by using SSPR. Available
methods must include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
• Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
• The principle of least privilege must be used.
• A. User3 only
• B. User4 only
• C. User5 only
• D. User3 and User4
• E. User3 and User5
• F. User4 and User5
Correct Answer: E
Question #41Topic 4
Case Study -
Overview -
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
https://cloudcertified.in/ 215
ClouCertified Practice Tests https://cloudcertified.in/
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with
the adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security
defaults disabled.
• Multiple users in the sales department have up to five devices. The sales department users report that
sometimes they must contact the support department to join their devices to the Azure AD tenant
because they have reached their device limit.
• A recent security incident reveals that several users leaked their credentials, a suspicious browser was
used for a sign-in, and resources were accessed from an anonymous IP address.
• When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear
in the selection list.
• Anyone in the organization can invite guest users, including other guests and non-administrators.
• The helpdesk spends too much time resetting user passwords.
https://cloudcertified.in/ 216
ClouCertified Practice Tests https://cloudcertified.in/
• Users assigned the User administrator role must be able to request permission to use the role when
needed for up to one year.
• Users must be prompted to register for MFA and provided with an option to bypass the registration for
a grace period.
• Users must provide one authentication method to reset their password by using SSPR. Available
methods must include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
• Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
• The principle of least privilege must be used.
Correct Answer: C
Question #42Topic 4
Case Study -
Overview -
https://cloudcertified.in/ 217
ClouCertified Practice Tests https://cloudcertified.in/
The on-premises network of ADatum contains an Active Directory Domain Services (AD DS) forest named
adatum.com.
ADatum has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with
the adatum.com AD DS domain by using Azure AD Connect.
ADatum has an Azure Active Directory (Azure AD) tenant named adatum.com. The tenant has Security
defaults disabled.
• Multiple users in the sales department have up to five devices. The sales department users report that
sometimes they must contact the support department to join their devices to the Azure AD tenant
because they have reached their device limit.
• A recent security incident reveals that several users leaked their credentials, a suspicious browser was
used for a sign-in, and resources were accessed from an anonymous IP address.
https://cloudcertified.in/ 218
ClouCertified Practice Tests https://cloudcertified.in/
• When you attempt to assign the Device Administrators role to IT_Group1, the group does NOT appear
in the selection list.
• Anyone in the organization can invite guest users, including other guests and non-administrators.
• The helpdesk spends too much time resetting user passwords.
• Users currently use only passwords for authentication.
• Users assigned the User administrator role must be able to request permission to use the role when
needed for up to one year.
• Users must be prompted to register for MFA and provided with an option to bypass the registration for
a grace period.
• Users must provide one authentication method to reset their password by using SSPR. Available
methods must include:
- Email
- Phone
- Security questions
- The Microsoft Authenticator app
• Trust relationships must NOT be established between the adatum.com and litware.com AD DS domains.
• The principle of least privilege must be used.
You need to modify the settings of the User administrator role to meet the technical requirements.
Which two actions should you perform for the role? Each correct answer presents part of the solution.
Correct Answer: CD
Question #43Topic 4
https://cloudcertified.in/ 219
ClouCertified Practice Tests https://cloudcertified.in/
You have a Microsoft 365 E5 subscription that contains a user named User1.
You need to ensure that User1 can create access reviews for Azure AD roles. The solution must use the
principle of least privilege.
Correct Answer: C
Question #44Topic 4
HOTSPOT
-
You have a Microsoft 365 E5 subscription that contains three users named User1, User2, and User3.
You have two Azure AD roles that have the Activation settings shown in the following table.
The Azure AD roles have the Assignment settings shown in the following table.
The Azure AD roles have the eligible users shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
https://cloudcertified.in/ 220
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Question #45Topic 4
HOTSPOT
-
You have a hybrid Microsoft 365 subscription that contains the users shown in the following table.
You plan to deploy an on-premises app named App1. App1 will be registered in Azure AD and will use
https://cloudcertified.in/ 221
ClouCertified Practice Tests https://cloudcertified.in/
You need to delegate the installation of the Application Proxy connector and ensure that User1 can
register App1 in Azure AD. The solution must use the principle of least privilege.
Which user should perform the installation, and which role should you assign to User1? To answer, select
the appropriate options in the answer area.
Correct
Answer:
https://cloudcertified.in/ 222
ClouCertified Practice Tests https://cloudcertified.in/
Question #46Topic 4
HOTSPOT
-
You have a Microsoft 365 E5 subscription that contains the users shown in the following table.
The users are assigned the roles shown in the following table.
For which users can User1 and User4 reset passwords? To answer, select the appropriate options in the
answer area.
https://cloudcertified.in/ 223
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
https://cloudcertified.in/ 224
ClouCertified Practice Tests https://cloudcertified.in/
Question #47Topic 4
You have a Microsoft 365 E5 subscription that contains a user named User1. User is eligible for the
Application administrator role.
Correct Answer: C
Question #48Topic 4
You have an Azure subscription that contains a registered app named App1.
You need to review the sign-in activity for App1. The solution must meet the following requirements:
https://cloudcertified.in/ 225
ClouCertified Practice Tests https://cloudcertified.in/
• A. Sign-in logs
• B. Access reviews
• C. Audit logs
• D. Usage & insights
Correct Answer: A
Question #49Topic 4
Your company has an Azure AD tenant that contains a user named User1.
You need to grant permissions to User1 to manage only the users in the marketing department. The
solution must ensure that User1 does NOT have permissions to manage the users in the finance
department.
• A. a management group
• B. an administrative unit
• C. a resource group
• D. a Microsoft 365 group
Correct Answer: B
Question #50Topic 4
You have an Azure AD tenant that contains an access package named Package1 and a user named User1.
Package1 is configured as shown in the following exhibit.
https://cloudcertified.in/ 226
ClouCertified Practice Tests https://cloudcertified.in/
You need to ensure that User1 can modify the review frequency of Package1. The solution must use the
principle of least privilege.
• A. Security administrator
• B. Privileged role administrator
• C. External Identity Provider administrator
• D. User administrator
Correct Answer: D
Question #51Topic 4
HOTSPOT
-
You need to query the logs and graphically display the number of sign-ins per user.
How should you complete the query? To answer, select the appropriate options in the answer area,
https://cloudcertified.in/ 227
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
https://cloudcertified.in/ 228
ClouCertified Practice Tests https://cloudcertified.in/
Question #52Topic 4
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.
You need to identify which users access Facebook from their devices and browsers. The solution must
minimize administrative effort.
Correct Answer: D
Question #53Topic 4
You have an Azure subscription that uses Azure AD Privileged Identity Management (PIM).
You need to identify users that are eligible for the Cloud Application Administrator role.
Which blade in the Privileged Identity Management settings should you use?
https://cloudcertified.in/ 229
ClouCertified Practice Tests https://cloudcertified.in/
• A. Azure resources
• B. Privileged access groups
• C. Review access
• D. Azure AD roles
Correct Answer: B
Question #54Topic 4
HOTSPOT
-
You need to create a dynamic user group that will include all the users that do NOT have a department
defined in their user profile.
How should you complete the membership rule? To answer, select the appropriate options in the answer
area.
Correct
Answer:
https://cloudcertified.in/ 230
ClouCertified Practice Tests https://cloudcertified.in/
Question #55Topic 4
You have an Azure AD Premium P2 tenant.
You need to ensure that you can view Azure AD audit log information by using Azure Monitor.
Correct Answer: A
Question #56Topic 4
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.
You need to identify which users access Facebook from their devices and browsers. The solution must
minimize administrative effort.
Correct Answer: A
Question #57Topic 4
https://cloudcertified.in/ 231
ClouCertified Practice Tests https://cloudcertified.in/
You have a Microsoft 365 subscription that contains the users shown in the following table.
• A. User2 only
• B. User3only
• C. User2 and User3 only
• D. User3 and User4 only
• E. User1, User2, and User3 only
• F. User1, User2, User3, and User4
Correct Answer: D
Question #58Topic 4
You have an Azure subscription that contains the users shown in the following table.
• A. Admin1 only
• B. Admin2 only
• C. Admin3 only
• D. Admin1 and Admin2 only
• E. Admin2 and Admin3 only
• F. Admin1, Admin2, and Admin3
https://cloudcertified.in/ 232
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: C
Question #59Topic 4
HOTSPOT
-
Which apps can you restore on April 16, and which settings can you restore for App4 on April 16? To
answer, select the appropriate options in the answer area.
https://cloudcertified.in/ 233
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Question #60Topic 4
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
https://cloudcertified.in/ 234
ClouCertified Practice Tests https://cloudcertified.in/
You have an Amazon Web Services (AWS) account, a Google Workspace subscription, and a GitHub
account.
You need to ensure that you can monitor OAuth authentication requests by using Microsoft Defender for
Cloud Apps.
Solution: From the Microsoft 365 Defender portal, you add the GitHub app connector.
• A. Yes
• B. No
Correct Answer: B
Question #61Topic 4
Correct Answer: C
Question #62Topic 4
You have a Microsoft 365 tenant.
You need to ensure that only users who accept the terms of use can access the resources in the tenant.
Other users must be denied access.
https://cloudcertified.in/ 235
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: C
Question #63Topic 4
You have a Microsoft 365 E5 subscription that contains a user named User1. User1 is eligible for the
Application Administrator role.
Correct Answer: D
Question #64Topic 4
Your on-premises network contains an Active Directory Domain Services (AD DS) domain and a
certification authority (CA) named CA1.
You need to implement certificate-based authentication in Azure AD. The solution must ensure that users
can sign in by using certificates issued by CA1. What should you do first?
Correct Answer: B
Question #65Topic 4
• Azure
• Alibaba Cloud
• Amazon Web Services (AWS)
• Google Cloud Platform (GCP)
You configure an Azure subscription to use Microsoft Entra Permissions Management to manage the
permissions in Azure only.
• A. AWS only
• B. Alibaba Cloud and AWS only
• C. Alibaba Cloud and GCP only
• D. AWS and GCP only
https://cloudcertified.in/ 236
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: D
Question #66Topic 4
You have three Azure subscriptions that are linked to a single Microsoft Entra tenant.
You need to evaluate and remediate the risks associated with highly privileged accounts. The solution
must minimize administrative effort.
Correct Answer: C
Question #67Topic 4
You have an Azure subscription named Sub1 that uses Microsoft Entra Permissions Management. Sub1
contains a user named User1. User1 is granted multiple permissions across Sub1.
You need to replace all the permissions granted to User1 with read-only permissions. The solution must
minimize administrative effort.
Correct Answer: D
Question #68Topic 4
You have an Azure subscription that contains a user named User1. The subscription is onboarded to
Microsoft Entra Permissions Management.
You need to provide User1 with access to Permissions Management. The solution must meet the
following requirements:
https://cloudcertified.in/ 237
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: B
Question #69Topic 4
DRAG DROP
-
You have an Azure subscription that contains the resources shown in the following table.
Which authorization method should you use for each user? To answer, drag the appropriate
authorization methods to the correct users. Each authorization method may be used once, more than
once, or not at all. You may need to drag the split bar between panes or scroll to view content.
https://cloudcertified.in/ 238
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer:
Question #70Topic 4
HOTSPOT
-
You have two Azure subscriptions named Sub1 and Sub2 that are linked to a Microsoft Entra tenant. The
tenant contains three groups named Group1, Group2, and Group3.
You manage the subscriptions by using Microsoft Entra Permissions Management. Permissions
Management is configured as shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
https://cloudcertified.in/ 239
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Question #71Topic 4
HOTSPOT
-
• Identify all the accounts that are assigned the Global Administrator role permanently.
• Review the Permission Creep Index (PCI) of User1.
Which tab in Permissions Management should you use for each task? To answer, select the appropriate
options in the answer area.
https://cloudcertified.in/ 240
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Topic 5 - Testlet 1
Question #1Topic 5
https://cloudcertified.in/ 241
ClouCertified Practice Tests https://cloudcertified.in/
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London
and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory
(Azure AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The
domain contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
https://cloudcertified.in/ 242
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: D
An administrative unit is an Azure AD resource that can be a container for other Azure AD resources. An
administrative unit can contain only users, groups, or devices.
Administrative units restrict permissions in a role to any portion of your organization that you define.
Deployment scenario -
It can be useful to restrict administrative scope by using administrative units in organizations that are
made up of independent divisions of any kind. Consider the example of a large university that's made up
of many autonomous schools (School of Business, School of Engineering, and so on). Each school has a
team of IT admins who control access, manage users, and set policies for their school.
Scenario: Contoso plans to acquire a company named ADatum Corporation. One hundred new ADatum
users will be created in an Active Directory OU named
Adatum. The users will be located in London and Seattle.
Contoso identifies the following technical requirements: License allocation for new users must be
https://cloudcertified.in/ 243
ClouCertified Practice Tests https://cloudcertified.in/
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London
and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory
(Azure AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The
domain contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
https://cloudcertified.in/ 244
ClouCertified Practice Tests https://cloudcertified.in/
• A. From the Microsoft Azure Active Directory Connect wizard, select Customize synchronization
options.
• B. From PowerShell, run Set-ADSyncScheduler.
• C. From PowerShell, run Start-ADSyncSyncCycle.
• D. From the Microsoft Azure Active Directory Connect wizard, select Change user sign-in.
Correct Answer: A
You need to select Customize synchronization options to configure Azure AD Connect to sync the Adatum
organizational unit (OU).
Question #3Topic 5
https://cloudcertified.in/ 245
ClouCertified Practice Tests https://cloudcertified.in/
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London
and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory
(Azure AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The
domain contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
https://cloudcertified.in/ 246
ClouCertified Practice Tests https://cloudcertified.in/
https://cloudcertified.in/ 247
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/roles/administrative-units
https://docs.microsoft.com/en-us/azure/active-directory/roles/admin-units-manage
Question #4Topic 5
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London
and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory
(Azure AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The
domain contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
https://cloudcertified.in/ 248
ClouCertified Practice Tests https://cloudcertified.in/
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
https://cloudcertified.in/ 249
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: C
Scenario: There are Sales department users in London and in Seattle.
* The users in the London office have the Microsoft 365 Phone System license unassigned.
* The users in the Seattle office have the Yammer Enterprise license unassigned.
Use the Active users page to unassign licenses.
When you use the Active users page to unassign licenses, you unassign product licenses from users.
Unassign licenses from one user.
1. In the admin center, go to the Users > Active users page.
2. Select the row of the user that you want to unassign a license for.
3. In the right pane, select Licenses and Apps.
4. Expand the Licenses section, clear the boxes for the licenses that you want to unassign, then select
Save changes.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/admin/manage/remove-licenses-from-users
Topic 6 - Testlet 2
Question #1Topic 6
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees
connect remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
https://cloudcertified.in/ 250
ClouCertified Practice Tests https://cloudcertified.in/
The network contains an Active Directory forest named litware.com that is linked to an Azure Active
Directory (Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in
litware.com by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection
policies in Microsoft Cloud App Security are enabled.
Litware has an Azure subscription associated to the litware.com Azure AD tenant. The subscription
contains an Azure Sentinel instance that uses the Azure Active
Directory connector and the Office 365 connector. Azure Sentinel currently collects the Azure AD sign-ins
logs and audit logs.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented
from accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory
forest. Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for
Litware but exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
https://cloudcertified.in/ 251
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory
forest. Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Question #2Topic 6
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees
connect remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active
https://cloudcertified.in/ 252
ClouCertified Practice Tests https://cloudcertified.in/
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented
from accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory
forest. Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for
Litware but exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
https://cloudcertified.in/ 253
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: A
Reference:
https://docs.microsoft.com/en-us/azure/security/fundamentals/steps-secure-identity
Question #3Topic 6
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees
connect remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active
Directory (Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in
litware.com by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection
policies in Microsoft Cloud App Security are enabled.
Litware has an Azure subscription associated to the litware.com Azure AD tenant. The subscription
contains an Azure Sentinel instance that uses the Azure Active
Directory connector and the Office 365 connector. Azure Sentinel currently collects the Azure AD sign-ins
logs and audit logs.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
https://cloudcertified.in/ 254
ClouCertified Practice Tests https://cloudcertified.in/
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented
from accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory
forest. Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for
Litware but exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
https://cloudcertified.in/ 255
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
Reference:
https://docs.microsoft.com/en-us/azure/role-based-access-control/role-assignments-portal
https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference
Question #4Topic 6
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees
connect remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active
Directory (Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
https://cloudcertified.in/ 256
ClouCertified Practice Tests https://cloudcertified.in/
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented
from accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory
forest. Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for
Litware but exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
https://cloudcertified.in/ 257
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
Topic 7 - Testlet 3
Question #1Topic 7
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London
and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory
(Azure AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The
domain contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
https://cloudcertified.in/ 258
ClouCertified Practice Tests https://cloudcertified.in/
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
https://cloudcertified.in/ 259
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
https://cloudcertified.in/ 260
ClouCertified Practice Tests https://cloudcertified.in/
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-
protection-policies
Topic 8 - Testlet 4
Question #1Topic 8
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees
connect remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active
Directory (Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in
litware.com by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection
policies in Microsoft Cloud App Security are enabled.
Litware has an Azure subscription associated to the litware.com Azure AD tenant. The subscription
contains an Azure Sentinel instance that uses the Azure Active
Directory connector and the Office 365 connector. Azure Sentinel currently collects the Azure AD sign-ins
logs and audit logs.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
https://cloudcertified.in/ 261
ClouCertified Practice Tests https://cloudcertified.in/
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented
from accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory
forest. Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for
Litware but exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
https://cloudcertified.in/ 262
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition
Question #2Topic 8
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees
connect remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active
Directory (Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in
litware.com by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection
policies in Microsoft Cloud App Security are enabled.
Litware has an Azure subscription associated to the litware.com Azure AD tenant. The subscription
contains an Azure Sentinel instance that uses the Azure Active
Directory connector and the Office 365 connector. Azure Sentinel currently collects the Azure AD sign-ins
logs and audit logs.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented
from accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory
forest. Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
https://cloudcertified.in/ 263
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
https://cloudcertified.in/ 264
ClouCertified Practice Tests https://cloudcertified.in/
Box 2: 14 days -
Multi-factor authentication (MFA): multi-factor authentication is a type of authentication that requires
the use of two or more verification factors to gain access to a system. Azure MFA offers a 14 day grace
period after being initiated.
Reference:
https://www.syskit.com/blog/using-azure-conditional-access-when-security-defaults-isnt-enough/
Topic 9 - Testlet 5
Question #1Topic 9
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London
and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory
(Azure AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The
domain contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
https://cloudcertified.in/ 265
ClouCertified Practice Tests https://cloudcertified.in/
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
https://cloudcertified.in/ 266
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app
Topic 10 - Testlet 6
Question #1Topic 10
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees
connect remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active
Directory (Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in
litware.com by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection
policies in Microsoft Cloud App Security are enabled.
Litware has an Azure subscription associated to the litware.com Azure AD tenant. The subscription
contains an Azure Sentinel instance that uses the Azure Active
Directory connector and the Office 365 connector. Azure Sentinel currently collects the Azure AD sign-ins
logs and audit logs.
https://cloudcertified.in/ 267
ClouCertified Practice Tests https://cloudcertified.in/
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented
from accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory
forest. Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for
Litware but exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
https://cloudcertified.in/ 268
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
Reference:
https://docs.microsoft.com/en-us/sharepoint/app-enforced-restrictions https://docs.microsoft.com/en-
us/azure/active-directory/conditional-access/concept-conditional-access-session
Question #2Topic 10
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees
connect remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active
Directory (Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in
litware.com by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection
https://cloudcertified.in/ 269
ClouCertified Practice Tests https://cloudcertified.in/
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented
from accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory
forest. Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for
Litware but exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
https://cloudcertified.in/ 270
ClouCertified Practice Tests https://cloudcertified.in/
You need to configure app registration in Azure AD to meet the delegation requirements.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct
Answer:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/roles/delegate-app-roles
Question #3Topic 10
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees
connect remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active
Directory (Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in
litware.com by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection
policies in Microsoft Cloud App Security are enabled.
Litware has an Azure subscription associated to the litware.com Azure AD tenant. The subscription
contains an Azure Sentinel instance that uses the Azure Active
https://cloudcertified.in/ 271
ClouCertified Practice Tests https://cloudcertified.in/
Directory connector and the Office 365 connector. Azure Sentinel currently collects the Azure AD sign-ins
logs and audit logs.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented
from accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory
forest. Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for
Litware but exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
https://cloudcertified.in/ 272
ClouCertified Practice Tests https://cloudcertified.in/
Hot Area:
Correct
Answer:
Box 1: Server2 -
Incorrect:
Not Server 1: If you've deployed Azure AD Password Protection Proxy, do not install Azure AD Application
Proxy and Azure AD Password Protection Proxy together on the same machine. Azure AD Application
Proxy and Azure AD Password Protection Proxy install different versions of the Azure AD Connect Agent
Updater service. These different versions are incompatible when installed together on the same machine.
Server1 runs the Azure AD application Proxy connector.
To use Application Proxy, you need a Windows server running Windows Server 2012 R2 or later. You'll
install the Application Proxy connector on the server. This connector server needs to connect to the
Application Proxy services in Azure, and the on-premises applications that you plan to publish.
Scenario:
Requirements. Authentication Requirements include:
Enforce MFA when accessing on-premises applications.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
https://cloudcertified.in/ 273
ClouCertified Practice Tests https://cloudcertified.in/
Box 2: DC1 -
The Azure AD Password Protection proxy service is typically on a member server in your on-premises AD
DS environment. Once installed, the Azure AD
Password Protection proxy service communicates with Azure AD to maintain a copy of the global and
customer banned password lists for your Azure AD tenant.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-password-ban-bad-on-
premises-deploy https://docs.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-
add-on-premises-application
Topic 11 - Testlet 7
Question #1Topic 11
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London
and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory
(Azure AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The
domain contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
https://cloudcertified.in/ 274
ClouCertified Practice Tests https://cloudcertified.in/
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
https://cloudcertified.in/ 275
ClouCertified Practice Tests https://cloudcertified.in/
• A. Company branding
• B. Diagnostics settings
• C. External Identities
• D. App registrations
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/overview-monitoring
Question #2Topic 11
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London
and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory
(Azure AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The
domain contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
https://cloudcertified.in/ 276
ClouCertified Practice Tests https://cloudcertified.in/
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
https://cloudcertified.in/ 277
ClouCertified Practice Tests https://cloudcertified.in/
Correct
Answer:
https://cloudcertified.in/ 278
ClouCertified Practice Tests https://cloudcertified.in/
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-
organization
Question #3Topic 11
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London
and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory
(Azure AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The
domain contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
https://cloudcertified.in/ 279
ClouCertified Practice Tests https://cloudcertified.in/
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
https://cloudcertified.in/ 280
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-
add-role-to-user?tabs=new
Question #4Topic 11
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London
and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory
(Azure AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The
domain contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
https://cloudcertified.in/ 281
ClouCertified Practice Tests https://cloudcertified.in/
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
https://cloudcertified.in/ 282
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: AE
Scenario: Configure the User administrator role to require justification and approval to activate.
A: Require justification.
You can require that users enter a business justification when they activate. To require justification,
check the Require justification on active assignment box or the
Require justification on activation box.
E: You can choose from two assignment duration options for each assignment type (eligible and active)
when you configure settings for a role.
You can choose one of these active assignment duration options:
Allow permanent active assignment: Global admins and Privileged role admins can assign permanent
active assignment.
Expire active assignment after: Global admins and Privileged role admins can require that all active
assignments have a specified start and end date.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-
change-default-settings
Question #5Topic 11
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London
and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory
https://cloudcertified.in/ 283
ClouCertified Practice Tests https://cloudcertified.in/
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
https://cloudcertified.in/ 284
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: C
Scenario: The helpdesk administrators spend too much time provisioning internal and guest access to the
required Microsoft 365 services and apps.
Manage guest access with Azure AD access reviews.
With Azure Active Directory (Azure AD), you can easily enable collaboration across organizational
boundaries by using the Azure AD B2B feature. Guest users from other tenants can be invited by
administrators or by other users. This capability also applies to social identities such as Microsoft
accounts.
You also can easily ensure that guest users have appropriate access. You can ask the guests themselves or
a decision maker to participate in an access review and recertify (or attest) to the guests' access. The
reviewers can give their input on each user's need for continued access, based on suggestions from Azure
AD.
When an access review is finished, you can then make changes and remove access for guests who no
longer need it.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/manage-guest-access-with-access-
reviews
Question #6Topic 11
https://cloudcertified.in/ 285
ClouCertified Practice Tests https://cloudcertified.in/
Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and branch offices in London
and Seattle.
Contoso has a partnership with a company named Fabrikam, Inc. Fabrikam has an Azure Active Directory
(Azure AD) tenant named fabrikam.com.
Existing Environment. Existing Environment
The on-premises network of Contoso contains an Active Directory domain named contoso.com. The
domain contains an organizational unit (OU) named
Contoso_Resources. The Contoso_Resources OU contains all users and computers.
The contoso.com Active Directory domain contains the relevant users shown in the following table.
Contoso also includes a marketing department that has users in each office.
Existing Environment. Microsoft 365/Azure Environment
Contoso has an Azure AD tenant named contoso.com that has the following associated licenses:
Microsoft Office 365 Enterprise E5
https://cloudcertified.in/ 286
ClouCertified Practice Tests https://cloudcertified.in/
• A. From the Microsoft Azure Active Directory Connect wizard, select Customize synchronization
options.
• B. From PowerShell, run Set-ADSyncScheduler.
• C. From PowerShell, run Start-ADSyncSyncCycle.
• D. From the Microsoft Azure Active Directory Connect wizard, select Change user sign-in.
Correct Answer: A
You need to select Customize synchronization options to configure Azure AD Connect to sync the Adatum
organizational unit (OU).
Topic 12 - Testlet 8
Question #1Topic 12
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees
connect remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
https://cloudcertified.in/ 287
ClouCertified Practice Tests https://cloudcertified.in/
The network contains an Active Directory forest named litware.com that is linked to an Azure Active
Directory (Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in
litware.com by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection
policies in Microsoft Cloud App Security are enabled.
Litware has an Azure subscription associated to the litware.com Azure AD tenant. The subscription
contains an Azure Sentinel instance that uses the Azure Active
Directory connector and the Office 365 connector. Azure Sentinel currently collects the Azure AD sign-ins
logs and audit logs.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented
from accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory
forest. Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for
Litware but exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
https://cloudcertified.in/ 288
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: A
Question #2Topic 12
Overview -
Litware, Inc. is a pharmaceutical company that has a subsidiary named Fabrikam, Inc.
Litware has offices in Boston and Seattle, but has employees located across the United States. Employees
connect remotely to either office by using a VPN connection.
Existing Environment. Identity Environment
The network contains an Active Directory forest named litware.com that is linked to an Azure Active
Directory (Azure AD) tenant named litware.com. Azure AD
Connect uses pass-through authentication and has password hash synchronization disabled.
Litware.com contains a user named User1 who oversees all application development.
Litware implements Azure AD Application Proxy.
Fabrikam has an Azure AD tenant named fabrikam.com. The users at Fabrikam access the resources in
litware.com by using guest accounts in the litware.com tenant.
Existing Environment. Cloud Environment
All the users at Litware have Microsoft 365 Enterprise E5 licenses. All the built-in anomaly detection
policies in Microsoft Cloud App Security are enabled.
Litware has an Azure subscription associated to the litware.com Azure AD tenant. The subscription
contains an Azure Sentinel instance that uses the Azure Active
Directory connector and the Office 365 connector. Azure Sentinel currently collects the Azure AD sign-ins
logs and audit logs.
Existing Environment. On-premises Environment
The on-premises network contains the servers shown in the following table.
https://cloudcertified.in/ 289
ClouCertified Practice Tests https://cloudcertified.in/
Both Litware offices connect directly to the internet. Both offices connect to virtual networks in the Azure
subscription by using a site-to-site VPN connection. All on-premises domain controllers are prevented
from accessing the internet.
Requirements. Delegation Requirements
Litware identifies the following delegation requirements:
Delegate the management of privileged roles by using Azure AD Privileged Identity Management (PIM).
Prevent nonprivileged users from registering applications in the litware.com Azure AD tenant.
Use custom programs for Identity Governance.
Ensure that User1 can create enterprise applications in Azure AD.
Use the principle of least privilege.
Requirements. Licensing Requirements
Litware recently added a custom user attribute named LWLicenses to the litware.com Active Directory
forest. Litware wants to manage the assignment of Azure
AD licenses by modifying the value of the LWLicenses attribute. Users who have the appropriate value for
LWLicenses must be added automatically to a
Microsoft 365 group that has the appropriate licenses assigned.
Requirements. Management Requirements
Litware wants to create a group named LWGroup1 that will contain all the Azure AD user accounts for
Litware but exclude all the Azure AD guest accounts.
Requirements. Authentication Requirements
Litware identifies the following authentication requirements:
Implement multi-factor authentication (MFA) for all Litware users by using conditional access policies.
Exempt users from using MFA to authenticate to Azure AD from the Boston office of Litware.
https://cloudcertified.in/ 290
ClouCertified Practice Tests https://cloudcertified.in/
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-
overview
https://cloudcertified.in/ 291