DRAG DROP -You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Identity.You receive the following alerts:✑ Suspected Netlogon privilege elevation attempt✑ Suspected Kerberos SPN exposure✑ Suspected DCSync attackTo which stage of the cyber-attack kill chain does each alert map? To answer, drag the appropriate alerts to the correct stages. Each alert may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.NOTE: Each correct selection is worth one point.Select and Place:
HOTSPOT -You are evaluating which devices are compliant in Endpoint Manager.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point.Hot Area:
HOTSPOT -You need to recommend an email antimalware solution that meets the security requirements.What should you include in the recommendation? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point.Hot Area:
You have several Conditional Access policies that block noncompliant devices from connecting to services.You need to identify which devices are blocked by which policies.What should you use?
HOTSPOT -Which users are members of ADGroup1 and ADGroup2? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point.Hot Area:
What should User6 use to meet the technical requirements?