ExamGecko
Home Home / Microsoft / SC-300

Microsoft SC-300 Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











You have an Azure Active Directory (Azure AD) tenant.

You open the risk detections report.

Which risk detection type is classified as a user risk?

A.

impossible travel

A.

impossible travel

Answers
B.

anonymous IP address

B.

anonymous IP address

Answers
C.

atypical travel

C.

atypical travel

Answers
D.

leaked credentials

D.

leaked credentials

Answers
Suggested answer: D

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identityprotection-risks

You have a Microsoft 365 tenant.

All users have computers that run Windows 10. Most computers are company-owned and joined to Azure Active Directory (Azure AD). Some computers are user-owned and are only registered in Azure AD.

You need to prevent users who connect to Microsoft SharePoint Online on their user-owned computer from downloading or syncing files. Other users must NOT be restricted.

Which policy type should you create?

A.

a Microsoft Cloud App Security activity policy that has Microsoft Office 365 governance actions configured

A.

a Microsoft Cloud App Security activity policy that has Microsoft Office 365 governance actions configured

Answers
B.

an Azure AD conditional access policy that has session controls configured

B.

an Azure AD conditional access policy that has session controls configured

Answers
C.

an Azure AD conditional access policy that has client apps conditions configured

C.

an Azure AD conditional access policy that has client apps conditions configured

Answers
D.

a Microsoft Cloud App Security app discovery policy that has governance actions configured

D.

a Microsoft Cloud App Security app discovery policy that has governance actions configured

Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/cloud-app-security/proxy-intro-aad

You have an Azure Active Directory (Azure AD) tenant that syncs to an Active Directory domain.

The on-premises network contains a VPN server that authenticates to the on-premises Active Directory domain. The VPN server does NOT support Azure Multi-Factor Authentication (MFA).

You need to recommend a solution to provide Azure MFA for VPN connections.

What should you include in the recommendation?

A.

Azure AD Application Proxy

A.

Azure AD Application Proxy

Answers
B.

an Azure AD Password Protection proxy

B.

an Azure AD Password Protection proxy

Answers
C.

Network Policy Server (NPS)

C.

Network Policy Server (NPS)

Answers
D.

a pass-through authentication proxy

D.

a pass-through authentication proxy

Answers
Suggested answer: C

You have a Microsoft 365 tenant.

The Azure Active Directory (Azure AD) tenant syncs to an on-premises Active Directory domain. The domain contains the servers shown in the following table.

The domain controllers are prevented from communicating to the internet.

You implement Azure AD Password Protection on Server1 and Server2.

You deploy a new server named Server4 that runs Windows Server 2019.

You need to ensure that Azure AD Password Protection will continue to work if a single server fails.

What should you implement on Server4?

A.

Azure AD Connect

A.

Azure AD Connect

Answers
B.

Azure AD Application Proxy

B.

Azure AD Application Proxy

Answers
C.

Password Change Notification Service (PCNS)

C.

Password Change Notification Service (PCNS)

Answers
D.

the Azure AD Password Protection proxy service

D.

the Azure AD Password Protection proxy service

Answers
Suggested answer: D

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-password-ban-badon-premisesdeploy

You have a Microsoft 365 tenant.

The Azure Active Directory (Azure AD) tenant syncs to an on-premises Active Directory domain.

Users connect to the internet by using a hardware firewall at your company. The users authenticate to the firewall by using their Active Directory credentials.

You plan to manage access to external applications by using Azure AD.

You need to use the firewall logs to create a list of unmanaged external applications and the users who access them.

What should you use to gather the information?

A.

Application Insights in Azure Monitor

A.

Application Insights in Azure Monitor

Answers
B.

access reviews in Azure AD

B.

access reviews in Azure AD

Answers
C.

Cloud App Discovery in Microsoft Cloud App Security

C.

Cloud App Discovery in Microsoft Cloud App Security

Answers
D.

enterprise applications in Azure AD

D.

enterprise applications in Azure AD

Answers
Suggested answer: C

Explanation:

Reference:

https://docs.microsoft.com/en-us/cloud-app-security/create-snapshot-cloud-discoveryreports#using-traffic-logs-for-cloud-discovery

You have a Microsoft 365 tenant.

The Azure Active Directory (Azure AD) tenant syncs to an on-premises Active Directory domain.

You plan to create an emergency-access administrative account named Emergency1. Emergency1 will be assigned the Global administrator role in Azure AD. Emergency1 will be used in the event of Azure AD functionality failures and on- premises infrastructure failures.

You need to reduce the likelihood that Emergency1 will be prevented from signing in during an emergency.

What should you do?

A.

Configure Azure Monitor to generate an alert if Emergency1 is modified or signs in.

A.

Configure Azure Monitor to generate an alert if Emergency1 is modified or signs in.

Answers
B.

Require Azure AD Privileged Identity Management (PIM) activation of the Global administrator role for Emergency1.

B.

Require Azure AD Privileged Identity Management (PIM) activation of the Global administrator role for Emergency1.

Answers
C.

Configure a conditional access policy to restrict sign-in locations for Emergency1 to only the corporate network.

C.

Configure a conditional access policy to restrict sign-in locations for Emergency1 to only the corporate network.

Answers
D.

Configure a conditional access policy to require multi-factor authentication (MFA) for Emergency1.

D.

Configure a conditional access policy to require multi-factor authentication (MFA) for Emergency1.

Answers
Suggested answer: A

You have a Microsoft 365 tenant.

In Azure Active Directory (Azure AD), you configure the terms of use.

You need to ensure that only users who accept the terms of use can access the resources in the tenant. Other users must be denied access.

What should you configure?

A.

an access policy in Microsoft Cloud App Security.

A.

an access policy in Microsoft Cloud App Security.

Answers
B.

Terms and conditions in Microsoft Endpoint Manager.

B.

Terms and conditions in Microsoft Endpoint Manager.

Answers
C.

a conditional access policy in Azure AD

C.

a conditional access policy in Azure AD

Answers
D.

a compliance policy in Microsoft Endpoint Manager

D.

a compliance policy in Microsoft Endpoint Manager

Answers
Suggested answer: C

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/terms-of-use

You have an Azure Active Directory (Azure AD) tenant that contains the groups shown in the following table.

For which groups can you create an access review?

A.

Group1 only

A.

Group1 only

Answers
B.

Group1 and Group4 only

B.

Group1 and Group4 only

Answers
C.

Group1 and Group2 only

C.

Group1 and Group2 only

Answers
D.

Group1, Group2, Group4, and Group5 only

D.

Group1, Group2, Group4, and Group5 only

Answers
E.

Group1, Group2, Group3, Group4 and Group5

E.

Group1, Group2, Group3, Group4 and Group5

Answers
Suggested answer: D

Explanation:

You cannot create access reviews for device groups.

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/governance/create-access-review

You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following table.

User1 is the owner of Group1.

You create an access review that has the following settings:

Users to review: Members of a group

Scope: Everyone

Group: Group1

Reviewers: Members (self)

Which users can perform access reviews for User3?

A.

User1, User2, and User3

A.

User1, User2, and User3

Answers
B.

User3 only

B.

User3 only

Answers
C.

User1 only

C.

User1 only

Answers
D.

User1 and User2 only

D.

User1 and User2 only

Answers
Suggested answer: B

Your company recently implemented Azure Active Directory (Azure AD) Privileged Identity Management (PIM).

While you review the roles in PIM, you discover that all 15 users in the IT department at the company have permanent security administrator rights.

You need to ensure that the IT department users only have access to the Security administrator role when required.

What should you configure for the Security administrator role assignment?

A.

Expire eligible assignments after from the Role settings details

A.

Expire eligible assignments after from the Role settings details

Answers
B.

Expire active assignments after from the Role settings details

B.

Expire active assignments after from the Role settings details

Answers
C.

Assignment type to Active

C.

Assignment type to Active

Answers
D.

Assignment type to Eligible

D.

Assignment type to Eligible

Answers
Suggested answer: D

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pimconfigure

Total 290 questions
Go to page: of 29