You have a Microsoft 365 E5 subscription that contains the users shown in the following table.
You need to prevent users in the finance department from sharing files with users in the research department. Which type of policy should you configure?
Answer : A
You have a Microsoft 365 E5 subscription that contains a user named Used.
You need to ensure that User! can use the Microsoft 365 compliance center to search audit logs and identify which users were added to Microsoft 365 role groups. The solution must use the principle of least privilege.
To which role group should you add User1?
Answer : C
You have a Microsoft 365 E5 subscription that has Microsoft Defender for Cloud Apps enabled. You need to create an alert in Defender for Cloud Apps when source code is shared externally.
Which type of policy should you create?
Answer : B
You have a Microsoft 365 subscription that contains a user named Used.
You need to assign User1 permissions to search Microsoft Office 365 audit logs.
What should you use?
Answer : A
You have a Microsoft 365 E5 subscription that contains the users shown in the following table.
You enable Customer Lockbox.
Which users will be notified when a Microsoft support engineer requests access to the organization?
Answer : D
You have a Microsoft 365 tenant that has modern authentication enabled.
You have Windows 10, MacOS. Android, and iOS devices that are managed by using Microsoft Endpoint Manager. Some users have older email client applications that use Basic authentication to connect to Microsoft Exchange Online. You need to implement a solution to meet the following security requirements-
* Allow users to connect to Exchange Online only by using email client applications that support modern authentication protocols based on OAuth 2.0.
* Block connections to Exchange Online by any email client applications that do NOT support modern authentication.
What should you implement?
Answer : C
You have a Microsoft 365 E5 subscription that uses Azure Active Directory (Azure AD) Privileged identity Management (PIM). A user named User! is eligible for the User Account Administrator role. You need User! to request to activate the User Account Administrator role. From where should User1 request to activate the role?
Answer : B