Question 51

You need to recommend an email malware solution that meets the security requirements.
What should you include in the recommendation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

Question 52

You install Azure ATP sensors on domain controllers.
You add a member to the Domain Admins group. You view the timeline in Azure ATP and discover that information regarding the membership change is missing.
You need to meet the security requirements for Azure ATP reporting.
What should you configure? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

Question 53

You have a Microsoft 365 E5 subscription that uses Azure Active Directory (Azure AD) Privileged identity Management (PIM). A user named User! is eligible for the User Account Administrator role. You need User! to request to activate the User Account Administrator role. From where should User1 request to activate the role?
  • Question 54

    Your company has a Microsoft 365 subscription that includes a user named User1.
    You suspect that User1 sent email messages to a competitor detailing company secrets.
    You need to recommend a solution to ensure that you can review any email messages sent by User1 to the competitor, including sent items that were deleted.
    What should you include in the recommendation?
  • Question 55

    Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some questions sets might have more than one correct solution, while others might not have a correct solution.
    After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
    You have a Microsoft 365 subscription.
    You have a user named User1. Several users have full access to the mailbox of User1.
    Some email messages sent to User1 appear to have been read and deleted before the user viewed them.
    When you search the audit log in Security & Compliance to identify who signed in to the mailbox of User1, the results are blank.
    You need to ensure that you can view future sign-ins to the mailbox of User1.
    You run the Set-MailboxFolderPermission -Identity "User1" -User [email protected] -AccessRights Owner command.
    Does that meet the goal?