ExamGecko
Home Home / Microsoft / SC-300

Microsoft SC-300 Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











DRAG DROP

You have a Microsoft 365 E5 subscription that contains three users named User1, User2, and User3.

You need to configure the users as shown in the following table.

Which portal should you use to configure each user? To answer, drag the appropriate portals to the correct users. Each portal may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.


Question 131
Correct answer: Question 131

HOTSPOT

A user named User1 attempts to sign in to the tenant by entering the following incorrect passwords:

Pa55w0rd12

Pa55w0rd12

Pa55w0rd12

Pa55w.rd12

Pa55w.rd123

Pa55w.rd123

Pa55w.rd123

Pa55word12

Pa55word12

Pa55word12

Pa55w.rd12 You need to identify how many sign-in attempts were tracked for User1, and how User1 can unlock her account before the 300-second lockout duration expires. What should identify? To answer, select the appropriate

NOTE: Each correct selection is worth one point.


Question 132
Correct answer: Question 132

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-deployment

HOTSPOT

You have an Azure subscription.

You need to create two custom roles named Role1 and Role2. The solution must meet the following requirements:

• Users that are assigned Role1 can create or delete instances of Azure Container Apps.

• Users that are assigned Role2 can enforce adaptive network hardening rules.

Which resource provider permissions are required for each role? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 133
Correct answer: Question 133

DRAG DROP

You have a Microsoft 365 E5 subscription that contains two users named User1 and User2.

You need to ensure that User1 can create access reviews for groups, and that User2 can review the history report for all the completed access reviews. The solution must use the principle of least privilege.

Which role should you assign to each user? To answer, drag the appropriate roles to the correct users. Each role may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content

NOTE: Each correct selection is worth one point.


Question 134
Correct answer: Question 134

HOTSPOT

You have a Microsoft 365 tenant that has 5,000 users. One hundred of the users are executives. The executives have a dedicated support team.

You need to ensure that the support team can reset passwords and manage multi-factor authentication (MFA) settings for only the executives. The solution must use the principle of least privilege.

Which object type and Azure Active Directory (Azure AD) role should you use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 135
Correct answer: Question 135

HOTSPOT

You have an Azure Active Directory (Azure AD) tenant that contains a user named User1. An administrator deletes User1. You need to identity the following:

• How many days after the account of User1 is deleted can you restore the account?

• Which is the least privileged role that can be used to restore User1?

What should you identify? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.


Question 136
Correct answer: Question 136

You have a Microsoft 365 E5 subscription.

You need to create a Microsoft Defender for Cloud Apps session policy.

What should you do first?

A.

From the Microsoft Defender for Cloud Apps portal, select User monitoring.

A.

From the Microsoft Defender for Cloud Apps portal, select User monitoring.

Answers
B.

From the Microsoft Defender for Cloud Apps portal, select App onboarding/maintenance

B.

From the Microsoft Defender for Cloud Apps portal, select App onboarding/maintenance

Answers
C.

From the Azure Active Directory admin center, create a Conditional Access policy.

C.

From the Azure Active Directory admin center, create a Conditional Access policy.

Answers
D.

From the Microsoft Defender for Cloud Apps portal, create a continuous report.

D.

From the Microsoft Defender for Cloud Apps portal, create a continuous report.

Answers
Suggested answer: A

You need to meet the authentication requirements for leaked credentials.

What should you do?

A.

Enable federation with PingFederate in Azure AD Connect.

A.

Enable federation with PingFederate in Azure AD Connect.

Answers
B.

Configure Azure AD Password Protection.

B.

Configure Azure AD Password Protection.

Answers
C.

Enable password hash synchronization in Azure AD Connect.

C.

Enable password hash synchronization in Azure AD Connect.

Answers
D.

Configure an authentication method policy in Azure AD.

D.

Configure an authentication method policy in Azure AD.

Answers
Suggested answer: C

Explanation:

https://docs.microsoft.com/en-us/azure/security/fundamentals/steps-secure-identity

HOTSPOT

Your network contains an on-premises Active Directory domain that syncs to an Azure Active Directory (Azure AD) tenant.

The tenant contains the groups shown in the following table.

The tenant contains the users shown in the following table.


Question 139
Correct answer: Question 139

HOTSPOT

You have a Microsoft 365 tenant.

You need to Identity users who have leaked credentials. The solution must meet the following requirements:

• Identity sign-ms by users who are suspected of having leaked credentials.

• Flag the sign-ins as a high-risk event.

• Immediately enforce a control to mitigate the risk, while still allowing the user to access applications.

What should you use? To answer, select the appropriate options m the answer area.


Question 140
Correct answer: Question 140
Total 290 questions
Go to page: of 29