Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

SC-300 Questions and Answers

Question # 6

You have a Microsoft 365 E5 subscription. The subscription contains 500 devices that run Windows

You deploy the Global Secure Access client to the devices.

You need to prevent users from accessing httpsy/contoso.com from the devices

Which three actions should you perform in sequence? To answer move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Full Access
Question # 7

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant.

All users must use the Microsoft Authenticator app for multi-factor authentication (MFA) when accessing Microsoft 365 services.

Some users report that they received an MFA prompt on their Microsoft Authenticator appwithout initiating a sign-in request.

You need to block the users automatically when they report an MFA request that they did not initiate.

Solution: From the Microsoft Entra admin center, you configure the Notifications settings for multi-factor authentication (MFA).

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 8

You have a Microsoft Entra tenant.

You configure self-service password reset (SSPR) with the following settings:

Require users to register when signing in: Yes

Number of methods required to reset: 1

What is a valid authentication method available to users?

A.

A smartcard

B.

A mobile app code

C.

An FIDO2 security token

D.

A Windows Hello PIN

Full Access
Question # 9

You need to resolve the issue of the sales department users. What should you configure for the Azure AD tenant?

A.

the User settings

B.

the Device settings

C.

the Access reviews settings

D.

Security defaults

Full Access
Question # 10

Your on-premises network contains an Active Directory domain that uses Azure AD Connect to sync with an Azure AD tenant. You need to configure Azure AD Connect to meet the following requirements:

• User sign-ins to Azure AD must be authenticated by an Active Directory domain controller.

• Active Directory domain users must be able to use Azure AD self-service password reset (SSPR).

What should you use for each requirement? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 11

You need to configure the assignment of Azure AD licenses to the Litware users. The solution must meet the licensing requirements.

What should you do? To answer, select the appropriate options in the answer area.

NOTE:Each correct selection is worth one point.

Full Access
Question # 12

You need to implement on-premises application and SharePoint Online restrictions to meet the authentication requirements and the access requirements.

What should you do? To answer, select the appropriate options in the answer area.

NOTE:Each correct selection is worth one point.

Full Access
Question # 13

You need to meet the authentication requirements for leaked credentials.

What should you do?

A.

Enable federation with PingFederate in Azure AD Connect.

B.

Configure Azure AD Password Protection.

C.

Enable password hash synchronization in Azure AD Connect.

D.

Configure an authentication method policy in Azure AD.

Full Access
Question # 14

You need to implement password restrictions to meet the authentication requirements.

You install the Azure AD password Protection DC agent on DC1.

What should you do next? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 15

You need to track application access assignments by using Identity Governance. The solution must meet the delegation requirements.

What should you do first?

A.

Modify the User consent settings for the enterprise applications.

B.

Create a catalog.

C.

Create a program.

D.

Modify the Admin consent requests settings for the enterprise applications.

Full Access
Question # 16

You need to configure the detection of multi-staged attacks to meet the monitoring requirements.

What should you do?

A.

Customize the Azure Sentinel rule logic.

B.

Create a workbook.

C.

Add Azure Sentinel data connectors.

D.

Add an Azure Sentinel playbook.

Full Access
Question # 17

You need to create the LWGroup1 group to meet the management requirements.

How should you complete the dynamic membership rule? To answer, drag the appropriate values to the correct targets. Each value may be used once, more than once, or not at all. You many need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Full Access
Question # 18

Task 6

You need to implement additional security checks before the members of the Sg-Executive can access any company apps. The members must meet one of the following conditions:

• Connect by using a device that is marked as compliant by Microsoft Intune.

• Connect by using client apps that are protected by app protection policies.

Full Access
Question # 19

You have a Microsoft 365 tenant that contains the administrative units shown in the following table.

The subscription contains the administrators shown in the following table.

The subscription contains the users shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 20

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

You configure Microsoft Entra Internet Access. Which users can manage Microsoft Entra Internet Access?

A.

User1 only

B.

User2only

C.

User3only

D.

User1 and User2 only

E.

User1, User2, and User3

Full Access
Question # 21

Task 10

You need to create a group named Audit. The solution must ensure that the members of Audit can activate the Security Reader role.

Full Access
Question # 22

You have a Microsoft Entra tenant that contains a user named User1.

You have an Azure subscription named Sub1. User1 is assigned the Owner role for Sub1.

You need to ensure that User1 can onboard Sub1 to Microsoft Entra Permissions Management The solution must follow the principle of least privilege.

Which role should you assign for Sub1, and which role should you assign to User1 for the tenant? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 23

You have a Microsoft Entra tenant that contains the users shown in the following table.

You add an enterprise application named App1 to Microsoft Entra ID and set User! as the owner of App1. App1 requires admin consent to access Microsoft Entra ID before the app can be used.

You configure the Admin consent requests settings as shown in the following exhibit.

Admin1, Admin2. Admin3, and User1 are added as reviewers. Which users can review and approve the admin consent requests?

A.

Admin1 only

B.

Admin1 and Admin2 only

C.

Admin1, Admin2 and Admin3 only

D.

Admin1, Admin2, and User1 only

E.

Admin1, Admin2, Admin3, and User1

Full Access
Question # 24

Task 8

You need to prevent all users from using legacy authentication protocols when authenticating to Microsoft Entra ID.

Full Access
Question # 25

Task 4

You need to ensure that all users can consent to apps that require permission to read their user profile. Users must be prevented from consenting to apps that require any other permissions.

Full Access
Question # 26

Task 3

You need to add the Linkedln application as a resource to the Sales and Marketing access package. The solution must NOT remove any other resources from the access package.

Full Access
Question # 27

Task 7

You need to lock out accounts for five minutes when they have 10 failed sign-in attempts.

Full Access
Question # 28

Task 2

You need to implement a process to review guest users who have access to the Salesforce app. The review must meet the following requirements:

• The reviews must occur monthly.

• The manager of each guest user must review the access.

• If the reviews are NOT completed within five days, access must be removed.

• If the guest user does not have a manager, Megan Bowen must review the access.

Full Access
Question # 29

Task 9

You need to ensure that when users in the Sg-Operations group go to the My Apps portal a tab named Operations appears that contains only the following applications:

• Unkedln

• Box

Full Access
Question # 30

You use Azure Monitor to analyze Azure Active Directory (Azure AD) activity logs.

Yon receive more than 100 email alerts each day for tailed Azure Al) user sign-in attempts.

You need to ensure that a new security administrator receives the alerts instead of you.

Solution: From Azure AD, you create an assignment for the Insights at administrator role.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 31

Task 5

You need to assign a Windows 10/11 Enterprise E3 license to the Sg-Retail group.

Full Access
Question # 32

You have a Microsoft Entra tenant that contains the devices shown in the following table.

You plan to configure Microsoft Entra Private Access. You deploy the Global Secure Access client to compatible devices. From which devices can you use Private Access?

A.

Device1 only

B.

Device2 only

C.

Device2 and Device4 only

D.

Device1. Device2. and Device3 only

E.

Device1. Device2, Device3, and Device4

Full Access
Question # 33

Task 1

You need to deploy multi factor authentication (MFA). The solution must meet the following requirements:

• Require MFA registration only for members of the Sg-Finance group.

• Exclude Debra Berger from having to register for MFA.

• Implement the solution without using a Conditional Access policy.

Full Access
Question # 34

You have on-premises Linux devices.

You have a Microsoft 365 E5 subscription.

You plan to configure Global Secure Access Internet Access.

You need to ensure that the devices can connect to Global Secure Access.

What should you do?

A.

Deploy a private network connector.

B.

Configure the Adaptive Access settings.

C.

Install the Azure Connected Machine agent on the devices.

D.

Create a remote network.

Full Access
Question # 35

You need to identify which roles to use for managing role assignments. The solution must meet the delegation requirements.

What should you do? To answer, select the appropriate options in the answer area.

NOTE:Each correct selection is worth one point.

Full Access
Question # 36

You need to configure app registration in Azure AD to meet the delegation requirements.

What should you do? To answer, select the appropriate options in the answer area.

NOTE:Each correct selection is worth one point.

Full Access
Question # 37

You need to meet the technical requirements for license management by the helpdesk administrators.

What should you create first, and which tool should you use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 38

You need to meet the technical requirements for the probability that user identifies were compromised.

What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 39

You have a Microsoft 365 E5 subscription that contains three users named User1, User2, and User3.

You have two Azure AD roles that have the Activation settings shown in the following table.

The Azure AD roles have the Assignment settings shown in the following table.

The Azure AD roles have the eligible users shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 40

You need to configure the MFA settings for users who connect from the Boston office. The solution must meet the authentication requirements and the access requirements.

What should you configure?

A.

named locations that have a private IP address range

B.

named locations that have a public IP address range

C.

trusted IPs that have a public IP address range

D.

trusted IPs that have a private IP address range

Full Access
Question # 41

You have an Azure AD tenant named Contoso that contains a terms of use (ToU) named Terms1 and an access package. Contoso users collaborate with an external organization named Fabrikam. Fabrikam users must accept Terms1 before being allowed to use the access package.

You need to identify which users accepted or declined Terms1.

What should you use?

A.

provisioning logs

B.

the Usage and Insights report

C.

sign-in logs

D.

audit logs

Full Access
Question # 42

You have a Microsoft Entra tenant that contains two groups named Group! and Group2 and the users shown in the following table.

Group2 is a member of Group1.

You configure an access review that has the following settings:

• Name: Review 1

• Select what to review: Teams + Groups

• Review scope: Select Teams + groups

• Group: Group1

• Scope: Guest users only

• Select reviewers: Group owners(s)

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 43

You need to meet the technical requirements for the probability that user identities were compromised.

What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area.

NOTE:Each correct selection is worth one point.

Full Access
Question # 44

You need to meet the planned changes and technical requirements for App1.

What should you implement?

A.

a policy set in Microsoft Endpoint Manager

B.

an app configuratifon policy in Microsoft Endpoint Manager

C.

an app registration in Azure AD

D.

Azure AD Application Proxy

Full Access
Question # 45

You need to allocate licenses to the new users from A. Datum. The solution must meet thetechnical requirements.

Which type of object should you create?

A.

a distribution group

B.

a Dynamic User security group

C.

an administrative unit

D.

an OU

Full Access
Question # 46

You create a Log Analytics workspace.

You need to implement the technical requirements for auditing.

What should you configure in Azure AD?

A.

Company branding

B.

Diagnostics settings

C.

External Identities

D.

App registrations

Full Access
Question # 47

You need to meet the planned changes for the User administrator role.

What should you do?

A.

Create an access review.

B.

Modify Role settings

C.

Create an administrator unit.

D.

Modify Active Assignments.

Full Access
Question # 48

You need to implement the planned changes and technical requirements for the marketing department.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 49

You need to locate licenses to the A. Datum users. The solution must need the technical requirements.

Which type of object should you create?

A.

A Dynamo User security group

B.

An OU

C.

A distribution group

D.

An administrative unit

Full Access
Question # 50

You need to sync the ADatum users. The solution must meet the technical requirements.

What should you do?

A.

From the Microsoft Azure Active Directory Connect wizard, select Customize synchronization options.

B.

From PowerShell, run Set-ADSyncScheduler.

C.

From PowerShell, run Start-ADSyncSyncCycle.

D.

From the Microsoft Azure Active Directory Connect wizard, select Change user sign-in.

Full Access
Question # 51

You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1. You need to be notified if a user downloads more than 50 files in one minute from Site1.

Which type of policy should you create in the Microsoft Defender for Cloud Apps portal?

A.

session policy

B.

anomaly detection policy

C.

activity policy

D.

file policy

Full Access
Question # 52

You have an Azure subscription that contains an Azure Automation account named Automation1 and an Azure key vault named Vault1. Vault1 contains a secret named Secret 1.

You enable a system-assigned managed identity for Automation1.

You need to ensure that Automation! can read the contents of Secret1. The solution must meet the following requirements:

• Prevent Automation1 from accessing other secrets stored in Vault1.

• Follow the principle of least privilege.

What should you do?

A.

From Vault1, configure the Access control (1AM) settings.

B.

From Automation1, configure the Identity settings.

C.

From Secret1, configure the Access control (1AM) settings

D.

From Automation1, configure the Run as accounts settings.

Full Access
Question # 53

Your company has an Azure Active Directory (Azure AD) tenant named contoso.com.

The company is developing a web service named App1.

You need to ensure that App1 can use Microsoft Graph to read directory data in contoso.com.

Which three actions should yon perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them In the correct order.

Full Access
Question # 54

You have an Azure subscription that contains the resources shown in the following table.

The subscription contains the virtual machines shown in the following table.

Which identities can be assigned the Owner role for RG1, and to which virtual machines can you assign Managed2? To answer, select the appropriate options in the answer area NOTE: Each correct selection is worth one point.

Full Access
Question # 55

You have an Azure subscription that contains the resources shown in the following table.

You need to configure access to Vault1. The solution must meet the following requirements:

• Ensure that User1 can manage and create keys in Vault1.

• Ensure that User2 can access a certificate stored in Vault1.

• Use the principle of least privilege.

Which role should you assign to each user? To answer select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 56

You have a Microsoft Entra tenant.

You need to create a Conditional Access policy to manage administrative access to the tenant. The solution must ensure that administrators are authenticated by using a phishing-resistant multi-factor authentication (MFA) method.

Which three authentication methods should you include in the solution? Each correct answer presents a complete solution.

A.

Windows Hello for Business

B.

an FID02 security key

C.

certificate-based authentication (multi-factor)

D.

voice call

E.

SMS

F.

email OTP

G.

certificate-based authentication (single-factor)

Full Access
Question # 57

You have an Azure AD tenant named contoso.com that contains a group named All Company and has the following Identity Governance settings:

• Block external users from signing in to this directory: Yes

• Remove external user Yes

• Number of days before removing external user from this directory: 30

On March 1, 2022, you create an access package named Package1 that has the following settings:

• Resource roles

o Name: All Company

o Type: Group and Team

o Role: Member

• Lifecycle

o Access package assignment expire: On date

o Assignment expiration date: April 1, 2022

On March 1, 2022, you assign Package1 to the guest users shown in the following table.

On March 2, 2022, you assign the Reports reader role to Guest1.

On April 1(2022, you invite a guest user named Guest3 to contoso.com.

On April 4, 2022, you add Guest3 to the All Company group.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access