Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Microsoft Certified: Identity and Access Administrator Associate SC-300 Questions and answers with Dumpstech

Exam SC-300 Premium Access

View all detail and faqs for the SC-300 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions
Questions # 31:

You have an Azure AD tenant that contains a user named User1 and the conditional access policies shown in the following table.

Question # 31

You need to evaluate which policies will be applied User1 when User1 attempts to sign-in from various IP addresses.

Which feature should you use?

Options:

A.

Access reviews

B.

Identity Secure Score

C.

The What If tool

D.

the Microsoft 365 network connectivity test tool

Questions # 32:

You have a Microsoft Entra tenant.

You need to implement smart lockout with a lockout threshold of 10 failed sign-ins. What should you configure in the Microsoft Entra admin center?

Options:

A.

User risk policy

B.

Password protection

C.

Authentication strengths

D.

Sign-in risk policy

Questions # 33:

Your company purchases a Microsoft 565 ES subscription.

A user named User1 is assigned the Security Administrator role.

You need to ensure that User1 can create Microsoft Defender for Cloud Apps session policies.

What should you do first?

Options:

A.

Create a Conditional Access policy and select Use Conditional Access App Control.

B.

Assign the Cloud Application Administrator role to Used.

C.

Create a Conditional Access policy and select Require app protection policy.

D.

Assign the Cloud App Security Administrator role to User1.

Questions # 34:

You have an Azure AD tenant that contains the users shown in the following table.

Question # 34

You need to compare the role permissions of each user. The solution must minimizeadministrative effort.

What should you use?

Options:

A.

the Microsoft 365 Defender portal

B.

the Microsoft 365 admin center

C.

the Microsoft Entra admin center

D.

the Microsoft Purview compliance portal

Questions # 35:

You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains an Azure AD

enterprise application named App1.

A contractor uses the credentials of user1@outlook.com.

You need to ensure that you can provide the contractor with access to App1. The contractor must be able to

authenticate as user1@outlook.com.

What should you do?

Options:

A.

Run the New-AzADUser cmdlet.

B.

Configure the External collaboration settings.

C.

Add a WS-Fed identity provider.

D.

Create a guest user account in contoso.com.

Questions # 36:

Your company recently implemented Azure Active Directory (Azure AD) Privileged Identity Management (PIM).

While you review the roles in PIM, you discover that all 15 users in the IT department at the company have

permanent security administrator rights.

You need to ensure that the IT department users only have access to the Security administrator role when

required.

What should you configure for the Security administrator role assignment?

Options:

A.

Expire eligible assignments after from the Role settings details

B.

Expire active assignments after from the Role settings details

C.

Assignment type to Active

D.

Assignment type to Eligible

Questions # 37:

You have an Azure Active Directory (Azure AD) tenant named contoso.com.

You plan to bulk invite Azure AD business-to-business (B2B) collaboration users.

Which two parameters must you include when you create the bulk invite? Each correct answer presents part of

the solution

NOTE: Each correct selection is worth one point.

Options:

A.

email address

B.

redirection URL

C.

username

D.

shared key

E.

password

Questions # 38:

Your network contains an on-premises Active Directory Domain Services (AD DS) domain that syncs with Azure AD and contains the users shown in the following table.

Question # 38

In Azure AD Connect. Domain/OU Filtering is configured as shown in the following exhibit.

Question # 38

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 38

Options:

Questions # 39:

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. as a result, these questions will not appear in the review screen.

You have an Amazon Web Services (AWS) account a Google Workspace subscription, and a GitHub account

You deploy an Azure subscription and enable Microsoft 365 Defender.

You need to ensure that you can monitor OAuth authentication requests by using Microsoft Defender for Cloud Apps.

Solution: From the Microsoft 365 Defender portal, you add the GitHub app connector

Does this meet the goal?

Options:

A.

Yes

B.

No

Questions # 40:

You have an Azure Active Directory (Azure AD) tenant that contains a user named SecAdmin1. SecAdmin1 is

assigned the Security administrator role.

SecAdmin1 reports that she cannot reset passwords from the Azure AD Identity Protection portal.

You need to ensure that SecAdmin1 can manage passwords and invalidate sessions on behalf of nonadministrative

users. The solution must use the principle of least privilege.

Which role should you assign to SecAdmin1?

Options:

A.

Authentication administrator

B.

Helpdesk administrator

C.

Privileged authentication administrator

D.

Security operator

Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions