Search Header Logo

SC-300

Authored by CloudThat Technologies

Computers

Professional Development

Used 56+ times

SC-300
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization collaborates with a partner company. You want to allow their users to access your Teams environment securely. What should you configure?

Conditional Access policy

Cross-tenant access settings in Microsoft Entra

Azure AD Connect

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user attempts to sign in from an unfamiliar location and device. Microsoft Entra flags this as risky. Which policy evaluates this behavior?

Conditional Access policy

User risk policy

Sign-in risk policy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You want to block access for users who are flagged as high-risk due to leaked credentials. What should you configure?

Sign-in risk policy

User risk policy

Conditional Access with device filters

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You need to assign temporary admin access to a user for a project. What is the best practice?

A. Assign Global Admin permanently
B. Use Privileged Identity Management (PIM) for just-in-time access
C. Add them to the Admin group manually
D. Share credentials of an admin account

Use Privileged Identity Management (PIM) for just-in-time access

Assign Global Admin permanently

Add them to the Admin group manually

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Entra group-based licensing makes large scale management easier. Typically, how soon are license<br />modifications effective after group membership changes are made?

Within the timeframe of local domain controllers being refreshed.
Within minutes of a membership change.
Within 24 hours of a membership change.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You want to detect lateral movement and credential theft within your on-premises environment. Which tool should you use?

Microsoft Defender for Endpoint

Microsoft Defender for Identity

Azure AD Identity Protection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a valid use case for assigning roles to users?


To change their password

To restrict or grant access to resources

To update their profile picture

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?