Question 36

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 subscription.
You discover that some external users accessed content on a Microsoft SharePoint site. You modify the SharePoint sharing policy to prevent sharing outside your organization.
You need to be notified if the SharePoint policy is modified in the future.
Solution: From the Security & Compliance admin center, you create a threat management policy.
Does this meet the goal?
  • Question 37

    Your network contains an on-premises Active Directory domain. The domain contains 2,000 computers that run Windows 10.
    You purchase a Microsoft 365 subscription.
    You implement password hash synchronization and Azure Active Directory (Azure AD) Seamless Single Sign-On (Seamless SSO).
    You need to ensure that users can use Seamless SSO from the Windows 10 computers.
    What should you do?
  • Question 38

    Your company has an Azure Active Directory (Azure AD) tenant named contoso.com that contains 10,000 users.
    The company has a Microsoft 365 subscription.
    You enable Azure Multi-Factor Authentication (MFA) for all the users in contoso.com.
    You run the following query.
    search "SigninLogs" | where ResultDescription == "User did not pass the MFA challenge." The query returns blank results.
    You need to ensure that the query returns the expected results.
    What should you do?
  • Question 39

    You have a Microsoft 365 subscription.
    You suspect that several Microsoft Office 365 applications or services were recently updated.
    You need to identify which applications or services were recently updated.
    What are two possible ways to achieve the goal? Each correct answer presents a complete solution.
    NOTE: Each correct selection is worth one point.
  • Question 40

    Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
    When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
    Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
    Labs are not timed separately, and this exam may have more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
    Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
    You may now click next to proceed to the lab.
    Lab information
    Use the following login credentials as needed:
    To enter your username, place your cursor in the Sign in box and click on the username below.
    To enter your password, place your cursor in the Enter password box and click on the password below.
    Microsoft 365 Username:
    [email protected]
    Microsoft 365 Password: 3&YWyjse-6-d
    If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.
    The following information is for technical support purposes only:
    Lab Instance: 10887751
    You need to ensure that all mobile devices that connect to Microsoft Exchange Online meet the following requirements:
    A password must be used to access the devices.
    Data on the devices must be encrypted.