Latest SC-300 Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : SC-300
Exam Name : Microsoft Identity and Access Administrator
Vendor Name : "Microsoft"







SC-300 Dumps

SC-300 Braindumps SC-300 Real Questions SC-300 Practice Test

SC-300 Actual Questions


Microsoft


SC-300


Microsoft Identity and Access Administrator


https://killexams.com/pass4sure/exam-detail/SC-300



Question: 39


Contoso, Ltd Overview

Contoso, Ltd is a consulting company that has a main office in Montreal offices in London and Seattle.


Contoso has a partnership with a company named Fabrikam, Inc Fabcricam has an Azure Active Diretory (Azure AD) tenant named fabrikam.com.


Existing Environment


The on-premises network of Contoso contains an Active Directory domain named contos.com. The domain contains an organizational unit (OU) named Contoso_Resources. The Contoso_Resoureces OU contains all users and computers.


The Contoso.com Active Directory domain contains the users shown in the following table.



Microsoft 365/Azure Environment


Contoso has an Azure AD tenant named Contoso.com that has the following associated licenses: Microsoft Office 365 Enterprise E5

Enterprise Mobility + Security Windows 10 Enterprise E5 Project Plan 3

Azure AD Connect is configured between azure AD and Active Directory Domain Serverless (AD DS). Only the

Contoso Resources OU is synced.

Helpdesk administrators routinely use the Microsoft 365 admin center to manage user settings.


User administrators currently use the Microsoft 365 admin center to manually assign licenses, All user have all licenses assigned besides following exception:


The users in the London office have the Microsoft 365 admin center to manually assign licenses. All user have licenses assigned besides the following exceptions:

The users in the London office have the Microsoft 365 Phone System License unassigned.


The users in the Seattle office have the Yammer Enterprise License unassigned. Security defaults are disabled for Contoso.com.


Contoso uses Azure AD Privileged identity Management (PIM) to project administrator roles. Problem Statements

Contoso identifies the following issues:


You need to implement the planned changes and technical requirements for the marketing department.


What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.





Answer:



Question: 40


You create a Log Analytics workspace.


You need to implement the technical requirements for auditing.

What should you configure in Azure AD?

  1. Company branding

  2. Diagnostics settings

  3. External Identities

  4. App registrations




Answer: B
Explanation:

Reference: https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/overview-monitoring



Question: 41


Your company has two divisions named Contoso East and Contoso West.


The Microsoft 365 identity architecture tor both divisions is shown in the following exhibit.



You need to assign users from the Contoso East division access to Microsoft SharePoint Online sites in the Contoso West tenant. The solution must not require additional Microsoft 3G5 licenses.


What should you do?

  1. Configure The exiting Azure AD Connect server in Contoso Cast to sync the Contoso East Active Directory forest to the Contoso West tenant.

  2. Configure Azure AD Application Proxy in the Contoso West tenant.

  3. Deploy a second Azure AD Connect server to Contoso East and configure the server to sync the Contoso East Active Directory forest to the Contoso West tenant.

  4. Create guest accounts for all the Contoso East users in the West tenant.




Answer:
D
Question: 42
HOTSPOT

You need to meet the technical requirements for the probability that user identities were compromised.


What should the users do first, and what should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.





Answer:



Question: 43

You need implement the planned changes for application access to organizational data. What should you configure?

  1. authentication methods

  2. the User consent settings

  3. access packages

  4. an application proxy




Answer: D



Question: 44


You have an Azure Active Directory (Azure AD) tenant that contains the users shown in the following table.


User1 is the owner of Group1.


You create an access review that has the following settings: Users to review: Members of a group

Scope: Everyone Group: Group1

Reviewers: Members (self)


Which users can perform access reviews for User3?

  1. User1, User2, and User3

  2. User3 only

  3. User1 only

  4. User1 and User2 only




Answer: B



Question: 45


You have an Azure Active Directory (Azure AD) tenant that uses conditional accesspolicies.


You plan to use third-party security information and event management (SIEM) to analyze conditional access usage. You need to download the Azure AD log that contains conditional access policy data.

What should you export from Azure AD?

  1. sign-ins in JSON format

  2. sign-ins in CSV format

  3. audit logs in JSON format

  4. audit logs in CSV format




Answer: C
Explanation:

Reference: https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-audit-logs



Question: 46


You have a Microsoft 365 tenant.


The Azure Active Directory (Azure AD) tenant contains the groups shown in the following table.


In Azure AD. you add a new enterprise application named Appl.


Which groups can you assign to App1?

  1. Group1 and Group2 only

  2. Group2 only

  3. Group3 only

  4. Group1 only

  5. Group1 and Group4




Answer: E



Question: 47


You have an Azure Active Directory (Azure AD) tenant named contoso.com.


You implement entitlement management to provide resource access to users at a company named Fabrikam, Inc. Fabrikam uses a domain named fabrikam.com.


Fabrikam users must be removed automatically from the tenant when access is no longer required. You need to configure the following settings:

Block external user from signing in to this directory: No Remove external user: Yes

Number of days before removing external user from this directory: 90


What should you configure on the Identity Governance blade?

  1. Access packages

  2. Settings

  3. Terms of use

  4. Access reviews




Answer: B
Explanation:

Reference: https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-external-users



Question: 48


HOTSPOT

You need to create the LWGroup1 group to meet the management requirements.


How should you complete the dynamic membership rule? To answer, drag the appropriate values to the correct targets. Each value may be used once, more than once, or not at all. You many need to drag the split bar between panes or scroll to view content. NOTE: Each correct selection is worth one point.





Answer: (user.objectId -ne null) and (user.userType -eq "Member")




Question: 49


HOTSPOT


You need to implement on-premises application and SharePoint Online restrictions to meet the authentication requirements and the access requirements.


What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.




Question: 50


HOTSPOT


You have a Microsoft 365 tenant and an Active Directory domain named adatum.com. You deploy Azure AD Connect by using the Express Settings.

You need to configure self-service password reset (SSPR) to meet the following requirements:


When users reset their password, they must be prompted to respond to a mobile app notification or answer three predefined security questions.


Passwords must be synced between the tenant and the domain regardless of where the password was reset.


What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.




Explanation:


Graphical user interface, text, application Description automatically generated
Question: 51

You have 2,500 users who are assigned Microsoft Office 365 Enterprise E3 licenses. The licenses are


assigned to individual users.


From the Groups blade in the Azure Active Directory admin center, you assign Microsoft 365 Enterprise E5licenses to the users.


You need to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of administrative effort.

What should you use?

  1. the Identity Governance blade in the Azure Active Directory admin center

  2. the Set-AzureAdUser cmdlet

  3. the Licenses blade in the Azure Active Directory admin center

  4. the Set-WindowsProductKey cmdlet




Answer: C