You have a Microsoft Entra tenant that contains the devices shown in the following table.
You plan to configure Microsoft Entra Private Access. You deploy the Global Secure Access client to compatible devices. From which devices can you use Private Access?
Task 5
You need to assign a Windows 10/11 Enterprise E3 license to the Sg-Retail group.
Task 8
You need to prevent all users from using legacy authentication protocols when authenticating to Microsoft Entra ID.
Task 10
You need to create a group named Audit. The solution must ensure that the members of Audit can activate the Security Reader role.
Task 3
You need to add the Linkedln application as a resource to the Sales and Marketing access package. The solution must NOT remove any other resources from the access package.
You have a Microsoft Entra tenant that contains a user named User1.
You have an Azure subscription named Sub1. User1 is assigned the Owner role for Sub1.
You need to ensure that User1 can onboard Sub1 to Microsoft Entra Permissions Management The solution must follow the principle of least privilege.
Which role should you assign for Sub1, and which role should you assign to User1 for the tenant? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Task 7
You need to lock out accounts for five minutes when they have 10 failed sign-in attempts.
You need to create the LWGroup1 group to meet the management requirements.
How should you complete the dynamic membership rule? To answer, drag the appropriate values to the correct targets. Each value may be used once, more than once, or not at all. You many need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
You need to implement on-premises application and SharePoint Online restrictions to meet the authentication requirements and the access requirements.
What should you do? To answer, select the appropriate options in the answer area.
NOTE:Each correct selection is worth one point.
You need to configure the detection of multi-staged attacks to meet the monitoring requirements.
What should you do?