New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SC-300 Exam Dumps - Microsoft Identity and Access Administrator

Go to page:
Question # 25

You need to configure the detection of multi-staged attacks to meet the monitoring requirements.

What should you do?

A.

Customize the Azure Sentinel rule logic.

B.

Create a workbook.

C.

Add Azure Sentinel data connectors.

D.

Add an Azure Sentinel playbook.

Full Access
Question # 26

You have an Azure subscription.

You need to use Microsoft Entra Permissions Management to automatically monitor permissions and create and implement right-size roles. The solution must follow the principle of least privilege.

Which role should you assign to the service principal of Permissions Management?

A.

Reader

B.

Contributor

C.

Owner

D.

User Access Administrator

Full Access
Question # 27

You implement the planned changes for SSPR.

What occurs when User3 attempts to use SSPR? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 28

You need to modify the settings of the User administrator role to meet the technical requirements. Which two actions should you perform for the role? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

A.

Select Require justification on activation

B.

Set all assignments to Active

C.

Set all assignments to Eligible

D.

Modify the Expire eligible assignments after setting.

E.

Select Require ticket information on activation.

Full Access
Question # 29

You need to resolve the issue of the guest user invitations. What should you do for the Azure AD tenant?

A.

Configure the Continuous access evaluation settings.

B.

Modify the External collaboration settings.

C.

Configure the Access reviews settings.

D.

Configure a Conditional Access policy.

Full Access
Question # 30

You have a Microsoft 365 subscription.

You plan to deploy an app named App1 that will have the following configurations:

• Will be registered in Microsoft Entra

• Will run as a service without user interaction

• Will collect audit logs associated with user sign-ins

• Will access resources by using the Microsoft Graph API

You need to ensure that App1 can access Microsoft Graph.

What should you use?

A.

application permissions

B.

delegated permissions

C.

a custom role-based access control (RBAC) role

D.

a built-in role-based access control (RBAC) role

Full Access
Question # 31

You need to identify which roles to use for managing role assignments. The solution must meet the delegation requirements.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 32

You have a Microsoft 36S tenant.

You create a named location named HighRiskCountries that contains a list of high-risk countries.

You need to limit the amount of time a user can stay authenticated when connecting from a high-risk country.

What should you configure in a conditional access policy? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Go to page: