ExamGecko
Home / Microsoft / SC-300 / List of questions
Ask Question

Microsoft SC-300 Practice Test - Questions Answers, Page 14

List of questions

Question 131

Report
Export
Collapse

DRAG DROP

You have a Microsoft 365 E5 subscription that contains three users named User1, User2, and User3.

You need to configure the users as shown in the following table.

Microsoft SC-300 image Question 103 108195 10052024010905000000

Which portal should you use to configure each user? To answer, drag the appropriate portals to the correct users. Each portal may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.


Microsoft SC-300 image Question 131 108195 10052024010905000
Correct answer: Microsoft SC-300 image answer Question 131 108195 10052024010905000
asked 05/10/2024
Wasawatt Ch
39 questions

Question 132

Report
Export
Collapse

HOTSPOT

A user named User1 attempts to sign in to the tenant by entering the following incorrect passwords:

Pa55w0rd12

Pa55w0rd12

Pa55w0rd12

Pa55w.rd12

Pa55w.rd123

Pa55w.rd123

Pa55w.rd123

Pa55word12

Pa55word12

Pa55word12

Pa55w.rd12 You need to identify how many sign-in attempts were tracked for User1, and how User1 can unlock her account before the 300-second lockout duration expires. What should identify? To answer, select the appropriate

NOTE: Each correct selection is worth one point.


Microsoft SC-300 image Question 132 108196 10052024010905000
Correct answer: Microsoft SC-300 image answer Question 132 108196 10052024010905000

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-deployment

asked 05/10/2024
Leon Chukwuma
30 questions

Question 133

Report
Export
Collapse

HOTSPOT

You have an Azure subscription.

You need to create two custom roles named Role1 and Role2. The solution must meet the following requirements:

• Users that are assigned Role1 can create or delete instances of Azure Container Apps.

• Users that are assigned Role2 can enforce adaptive network hardening rules.

Which resource provider permissions are required for each role? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Microsoft SC-300 image Question 133 108197 10052024010905000
Correct answer: Microsoft SC-300 image answer Question 133 108197 10052024010905000
asked 05/10/2024
Damir M
36 questions

Question 134

Report
Export
Collapse

DRAG DROP

You have a Microsoft 365 E5 subscription that contains two users named User1 and User2.

You need to ensure that User1 can create access reviews for groups, and that User2 can review the history report for all the completed access reviews. The solution must use the principle of least privilege.

Which role should you assign to each user? To answer, drag the appropriate roles to the correct users. Each role may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content

NOTE: Each correct selection is worth one point.


Microsoft SC-300 image Question 134 108198 10052024010905000
Correct answer: Microsoft SC-300 image answer Question 134 108198 10052024010905000
asked 05/10/2024
Louis Flink
32 questions

Question 135

Report
Export
Collapse

HOTSPOT

You have a Microsoft 365 tenant that has 5,000 users. One hundred of the users are executives. The executives have a dedicated support team.

You need to ensure that the support team can reset passwords and manage multi-factor authentication (MFA) settings for only the executives. The solution must use the principle of least privilege.

Which object type and Azure Active Directory (Azure AD) role should you use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Microsoft SC-300 image Question 135 108199 10052024010905000
Correct answer: Microsoft SC-300 image answer Question 135 108199 10052024010905000
asked 05/10/2024
Eduardo Bravo
38 questions

Question 136

Report
Export
Collapse

HOTSPOT

You have an Azure Active Directory (Azure AD) tenant that contains a user named User1. An administrator deletes User1. You need to identity the following:

• How many days after the account of User1 is deleted can you restore the account?

• Which is the least privileged role that can be used to restore User1?

What should you identify? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.


Microsoft SC-300 image Question 136 108200 10052024010905000
Correct answer: Microsoft SC-300 image answer Question 136 108200 10052024010905000
asked 05/10/2024
Rodrigo Serrano dos Santos
38 questions

Question 137

Report
Export
Collapse

You have a Microsoft 365 E5 subscription.

You need to create a Microsoft Defender for Cloud Apps session policy.

What should you do first?

From the Microsoft Defender for Cloud Apps portal, select User monitoring.

From the Microsoft Defender for Cloud Apps portal, select User monitoring.

From the Microsoft Defender for Cloud Apps portal, select App onboarding/maintenance

From the Microsoft Defender for Cloud Apps portal, select App onboarding/maintenance

From the Azure Active Directory admin center, create a Conditional Access policy.

From the Azure Active Directory admin center, create a Conditional Access policy.

From the Microsoft Defender for Cloud Apps portal, create a continuous report.

From the Microsoft Defender for Cloud Apps portal, create a continuous report.

Suggested answer: A
asked 05/10/2024
Olugbenga Fagbohun
40 questions

Question 138

Report
Export
Collapse

You need to meet the authentication requirements for leaked credentials.

What should you do?

Enable federation with PingFederate in Azure AD Connect.

Enable federation with PingFederate in Azure AD Connect.

Configure Azure AD Password Protection.

Configure Azure AD Password Protection.

Enable password hash synchronization in Azure AD Connect.

Enable password hash synchronization in Azure AD Connect.

Configure an authentication method policy in Azure AD.

Configure an authentication method policy in Azure AD.

Suggested answer: C

Explanation:

https://docs.microsoft.com/en-us/azure/security/fundamentals/steps-secure-identity

asked 05/10/2024
Ben Johnson
34 questions

Question 139

Report
Export
Collapse

HOTSPOT

Your network contains an on-premises Active Directory domain that syncs to an Azure Active Directory (Azure AD) tenant.

The tenant contains the groups shown in the following table.

Microsoft SC-300 image Question 111 108203 10052024010905000000

The tenant contains the users shown in the following table.


Microsoft SC-300 image Question 139 108203 10052024010905000
Correct answer: Microsoft SC-300 image answer Question 139 108203 10052024010905000
asked 05/10/2024
Kajenthiran Varnamyilvaganam
47 questions

Question 140

Report
Export
Collapse

HOTSPOT

You have a Microsoft 365 tenant.

You need to Identity users who have leaked credentials. The solution must meet the following requirements:

• Identity sign-ms by users who are suspected of having leaked credentials.

• Flag the sign-ins as a high-risk event.

• Immediately enforce a control to mitigate the risk, while still allowing the user to access applications.

What should you use? To answer, select the appropriate options m the answer area.


Microsoft SC-300 image Question 140 108204 10052024010905000
Correct answer: Microsoft SC-300 image answer Question 140 108204 10052024010905000
asked 05/10/2024
Jesse Moisio
43 questions
Total 306 questions
Go to page: of 31
Search

Related questions