Question 39 of 88 from exam SC-300: Microsoft Identity and Access Administrator

Question 39 of 88 from exam SC-300: Microsoft Identity and Access Administrator

Question

HOTSPOT - You have a Microsoft 365 tenant.

You need to identify users who have leaked credentials.

The solution must meet the following requirements: -> Identify sign-ins by users who are suspected of having leaked credentials.

-> Flag the sign-ins as a high-risk event.

-> Immediately enforce a control to mitigate the risk, while still allowing the user to access applications.

What should you use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Answer Area

To classify leaked credentials as high-risk, use:

To trigger remediation, use:

To mitigate the risk, select:

‘Azure Active Directory (Azure AD) Identity Protection
Azure Active Directory (Azure AD) Privileged Identity Management (PIM)
Identity Governance

Self-service password reset (SSPR)

Client apps not using Modem authentication
Device state

Sign-in risk

User location

User risk

[Apply app enforced restrictions
Block access
Grant access but require app protection policy

Grant access but require password change

Explanations