You have a Microsoft 365 subscription. You need to recommend a passwordless authentication solution that uses biometric authentication. What should you include in the recommendation? A. Windows Hello for Business B. a smart card C. the Microsoft Authenticator app D.…

You have a Microsoft 365 tenant that is linked to a hybrid Azure Active Directory (Azure AD) tenant named contoso.com. You need to enable Azure AD Seamless Single Sign-On (Azure AD SSO) for contoso.com. What should you use? A. Azure…

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution,…

HOTSPOT You have a Microsoft 365 subscription that contains the users shown in the following table. Group1 is member of a group named Group3. The Azure Active Directory (Azure AD) tenant contains the Windows 10 devices shown in the following…

You have a Microsoft 365 E5 subscription You need to use Microsoft Cloud App Security to identify documents stored in Microsoft SharePoint Online that contain proprietary information. What should you create in Cloud App Security? A. a data source and…

You have a Microsoft 365 E5 subscription that contains a user named User1. The Azure Active Directory (Azure AD) Identity Protection risky users report identifies User1. For User1, you select Confirm user compromised. User1 can still sign in. You need…

You have a Microsoft 365 E5 subscription that contains a user named User1. The Azure Active Directory (Azure AD) Identity Protection risky users report identifies User1. For User1. you select Confirm user compromised. User1 can still sign in. You need…

You have a Microsoft 365 E5 subscription that contains a user named User1. The Azure Active Directory (Azure AD) Identity Protection risky users report identities User1. For User1, you select Confirm user compromised. User1 can still sign in. You need…

HOTSPOT You have a Microsoft 365 E5 subscription that contains the users shown in the following table. You have the devices shown in the following table. You have the Microsoft Defender for Endpoint portal roles shown in the following table.…