Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Microsoft Certified: Identity and Access Administrator Associate SC-300 Questions and answers with Dumpstech

Exam SC-300 Premium Access

View all detail and faqs for the SC-300 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions
Questions # 41:

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant.

You have 100 IT administrators who are organized into 10 departments.

You create the access review shown in the exhibit. (Click theExhibittab.)

Question # 41

You discover that all access review requests are received by Megan Bowen.

You need to ensure that the manager of each department receives the access reviews of their respective department.

Solution: You add each manager as a fallback reviewer.

Does this meet the goal?

Options:

A.

Yes

B.

No

Questions # 42:

You have a Microsoft Entra tenant.

You configure self-service password reset (SSPR) with the following settings:

Require users to register when signing in: Yes

Number of methods required to reset: 1

What is a valid authentication method available to users?

Options:

A.

A smartcard

B.

A mobile app code

C.

An FIDO2 security token

D.

A Windows Hello PIN

Questions # 43:

You need to meet the authentication requirements for leaked credentials.

What should you do?

Options:

A.

Enable federation with PingFederate in Azure AD Connect.

B.

Configure Azure AD Password Protection.

C.

Enable password hash synchronization in Azure AD Connect.

D.

Configure an authentication method policy in Azure AD.

Questions # 44:

You need to implement password restrictions to meet the authentication requirements.

You install the Azure AD password Protection DC agent on DC1.

What should you do next? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 44

Options:

Questions # 45:

You need to track application access assignments by using Identity Governance. The solution must meet the delegation requirements.

What should you do first?

Options:

A.

Modify the User consent settings for the enterprise applications.

B.

Create a catalog.

C.

Create a program.

D.

Modify the Admin consent requests settings for the enterprise applications.

Questions # 46:

You need to implement on-premises application and SharePoint Online restrictions to meet the authentication requirements and the access requirements.

What should you do? To answer, select the appropriate options in the answer area.

NOTE:Each correct selection is worth one point.

Question # 46

Options:

Questions # 47:

You need to configure the assignment of Azure AD licenses to the Litware users. The solution must meet the licensing requirements.

What should you do? To answer, select the appropriate options in the answer area.

NOTE:Each correct selection is worth one point.

Question # 47

Options:

Questions # 48:

You need to configure the detection of multi-staged attacks to meet the monitoring requirements.

What should you do?

Options:

A.

Customize the Azure Sentinel rule logic.

B.

Create a workbook.

C.

Add Azure Sentinel data connectors.

D.

Add an Azure Sentinel playbook.

Questions # 49:

You need to configure the MFA settings for users who connect from the Boston office. The solution must meet the authentication requirements and the access requirements.

What should you configure?

Options:

A.

named locations that have a private IP address range

B.

named locations that have a public IP address range

C.

trusted IPs that have a public IP address range

D.

trusted IPs that have a private IP address range

Questions # 50:

You need to create the LWGroup1 group to meet the management requirements.

How should you complete the dynamic membership rule? To answer, drag the appropriate values to the correct targets. Each value may be used once, more than once, or not at all. You many need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Question # 50

Options:

Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions