HOTSPOT -You have a Microsoft 365 tenant.A conditional access policy is configured for the tenant as shown in the Policy exhibit. (Click the Policy tab.)The User Administrator role is configured as shown in the Role setting exhibit. (Click the Role setting tab.)The User Administrator role has the assignments shown in the Assignments exhibit. (Click the Assignments tab.)For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point.Hot Area:
HOTSPOT -Your company has a Microsoft 365 E5 subscription and a hybrid Azure Active Directory named contoso.com.Contoso.com includes the following users:You configure Password protection for Contoso.com as shown in the following exhibit.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point.Hot Area:
You have a Microsoft 365 E5 subscription that contains a user named User1.You need to ensure that User1 can use the Microsoft 365 compliance center to search audit logs and identify which users were added to Microsoft 365 role groups. The solution must use the principle of least privilege.To which role group should you add User1?
DRAG DROP -You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Identity.You receive the following alerts:✑ Suspected Netlogon privilege elevation attempt✑ Suspected Kerberos SPN exposure✑ Suspected DCSync attackTo which stage of the cyber-attack kill chain does each alert map? To answer, drag the appropriate alerts to the correct stages. Each alert may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.NOTE: Each correct selection is worth one point.Select and Place:
HOTSPOT -You have a Microsoft 365 subscription.You configure Microsoft Defender for Endpoint as shown in the following table.You onboard devices to Microsoft Defender for Endpoint as shown in the following table.Microsoft Defender for Endpoint contains the incidents shown in the following table.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point.Hot Area:
You have several Conditional Access policies that block noncompliant devices from connecting to services.You need to identify which devices are blocked by which policies.What should you use?