Question 76

You create an Azure Sentinel workspace.
You configure Azure Sentinel to ingest data from Azure Active Directory (Azure AD).
In the Azure Active Directory admin center, you discover Azure AD Identity Protection alerts. The Azure Sentinel workspace shows the status as shown in the following exhibit.

In Azure Log Analytics, you can see Azure AD data in the Azure Sentinel workspace.
What should you configure in Azure Sentinel to ensure that incidents are created for detected threats?
  • Question 77

    You need to create Group2.
    What are two possible ways to create the group?
  • Question 78

    Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
    After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
    You have a Microsoft 365 tenant. You create a label named CompanyConfidential in Microsoft Azure Information Protection.
    You add CompanyConfidential to a global policy.
    A user protects an email message by using CompanyConfidential and sends the label to several external recipients. The external recipients report that they cannot open the email message.
    You need to ensure that the external recipients can open protected email messages sent to them.
    Solution: You create a new label in the global policy and instruct the user to resend the email message.
    Does this meet the goal?
  • Question 79

    Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some questions sets might have more than one correct solution, while others might not have a correct solution.
    After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
    You have a Microsoft 365 subscription.
    You have a user named User1. Several users have full access to the mailbox of User1.
    Some email messages sent to User1 appear to have been read and deleted before the user viewed them.
    When you search the audit log in Security & Compliance to identify who signed in to the mailbox of User1, the results are blank.
    You need to ensure that you can view future sign-ins to the mailbox of User1.
    You run the Set-AdminAuditLogConfig -AdminAuditLogEnabled $true
    -AdminAuditLogCmdlets *Mailbox* command.
    Does that meet the goal?
  • Question 80

    Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
    After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
    You have a Microsoft 365 subscription that contains the users shown in the following table.

    You discover that all the users in the subscription can access Compliance Manager reports.
    The Compliance Manager Reader role is not assigned to any users.
    You need to recommend a solution to prevent a user named User5 from accessing the Compliance Manager reports.
    Solution: You recommend modifying the licenses assigned to User5.
    Does this meet the goal?