Free Practice Test

Free SC-300 Practice Exam – 2025 Updated

Prepare Better for the SC-300 Exam with Our Free and Reliable SC-300 Exam Questions โ€“ Updated for 2025.

At Cert Empire, we are committed to offering the most accurate and up-to-date exam questions for students preparing for the Microsoft SC-300 Exam. To support effective preparation, weโ€™ve made parts of our SC-300 exam resources free for everyone. You can practice as much as you want with Free SC-300 Practice Test.

Question 1

HOTSPOT You have an Azure subscription. From Entitlement management, you plan to create a catalog named Catalog1 that will contain a custom extension. What should you create first and what should you use to distribute Catalog1? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. SC-300 exam question

Show Answer
Correct Answer:

FIRST CREATE: AN AZURE LOGIC APP

DISTRIBUTE CATALOG1 BY USING: AN ACCESS PACKAGE

Explanation

To use a custom extension in an Azure Entitlement Management catalog, you must first have an endpoint for the extension to call. This endpoint is typically an Azure Logic App that contains the custom workflow you want to trigger. Therefore, the Logic App must be created before you configure the custom extension in the catalog.

Within Entitlement Management, a catalog is a container for resources. To grant users access to the resources within a catalog, you must create an access package. The access package bundles the resources and defines the policies for how users can request, approve, and maintain access. Users then request access to this package, making it the primary mechanism for distributing the resources held in the catalog.

References

Microsoft Learn: Trigger a Logic App with a custom extension in entitlement management. This document states under the "Prerequisites" section that to use custom extensions, you need "A Logic App to call." This confirms that the Logic App must be created first.

Microsoft Learn: What are access packages and what resources can I manage with them? This document states, "An access package is a bundle of all the resources with the access a user needs... All access packages must be in a container called a catalog." This clarifies that access packages are the objects used to bundle and distribute resources from a catalog.

Microsoft Learn: Create and manage a catalog of resources in entitlement management. This page describes a catalog as "a container of resources and access packages." This reinforces the relationship where access packages are created within a catalog to provide access.

Question 2

You have an Azure AD tenant that contains the users shown in The following table. SC-300 exam question You enable self-service password reset (SSPR) for all the users and configure SSPR to require security questions as the only authentication method. Which users must use security questions when resetting their password?
Options
A: User4 only
B: User3and User4only
C: User1 and User4only
D: User1, User3, and User4 only
E: User1, User2, User3. and User4
Show Answer
Correct Answer:
User3and User4only
Explanation
Microsoft Entra ID (Azure AD) allows security questions as an SSPR authentication method only for non-administrator member accounts. Accounts that hold any Azure AD administrative role cannot use security questions, and B2B guest users are not eligible for SSPR in the resource tenant at all. In the table, User1 is a Global Administrator (therefore ineligible) and User2 is a Guest (SSPR not supported). User3 and User4 are standard member users without admin roles, so when they reset their passwordsโ€”and security questions are the sole permitted methodโ€”they must answer those questions.
Why Incorrect Options are Wrong

A. Omits User3, a non-admin member who must use security questions.

C. Includes User1, but administrators cannot use security questions.

D. Same issue as C; wrongly adds administrator User1.

E. Wrongly includes administrator User1 and guest User2, neither can use security questions.

References

1. Microsoft Docs โ€“ โ€œSelf-service password reset authentication methodsโ€, section โ€œSecurity questionsโ€ (2024-02-01): โ€œSecurity questions can be used only by users who arenโ€™t administrators.โ€

https://learn.microsoft.com/azure/active-directory/authentication/concept-sspr-authentication-methods

2. Microsoft Docs โ€“ โ€œSelf-service password reset overviewโ€, section โ€œWho can reset a password?โ€: โ€œB2B guest users canโ€™t reset their password in the resource tenant.โ€

https://learn.microsoft.com/azure/active-directory/authentication/concept-sspr-overview

Question 3

You have an Azure AD tenant and a .NET web app named App1. You need to register App1 for Azure AD authentication. What should you configure for App1?
Options
A: the executable name
B: the bundle ID
C: the package name
D: the redirect URI
Show Answer
Correct Answer:
the redirect URI
Explanation
When registering a web application in Azure AD to enable authentication, the Redirect URI (also known as a reply URL) is a critical security configuration. After a user successfully authenticates with the Microsoft identity platform, Azure AD redirects the user's browser back to this specific URI. The redirection includes the security token (an ID token or access token) required by the application to complete the sign-in process and verify the user's identity. Without a correctly configured Redirect URI, the authentication flow cannot be completed, and the application will not receive the necessary token.
Why Incorrect Options are Wrong

A. The executable name is not a standard configuration property for a web app registration in Azure AD; it is more relevant for identifying native desktop applications.

B. The bundle ID is a unique identifier required when registering native applications for Apple's iOS or macOS platforms, not for a .NET web app.

C. The package name is a unique identifier required when registering native applications for the Android platform, not for a .NET web app.

---

References

1. Microsoft identity platform documentation, "Quickstart: Register an application with the Microsoft identity platform."

Reference: Under the section "Register an application," step 5, "Add a redirect URI," it states: "Select the platform for your application - Web... Enter the redirect URI for your application." This explicitly shows that for a web app, the redirect URI is a required configuration.

Source: https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app#register-an-application

2. Microsoft identity platform documentation, "Redirect URI (reply URL) restrictions and limitations."

Reference: The document's overview section states, "A redirect URI, or reply URL, is the location where the Microsoft identity platform redirects a user's client and sends security tokens after authentication. For example, in a web application, the redirect URI is the location where the user is sent after they sign in."

Source: https://docs.microsoft.com/en-us/azure/active-directory/develop/reply-url

3. Microsoft Learn, SC-300 Courseware, "Register an application."

Reference: In the learning module for implementing application access, the section on app registration details the required settings. It specifies: "When you register a web app, you must add a redirect URI. The redirect URI is the URI where users are sent after they've been authenticated." It also shows that Package Name and Bundle ID are for mobile platforms.

Source: https://learn.microsoft.com/en-us/training/modules/implement-manage-app-permissions/2-register-app

Question 4

HOTSPOT Your network contains an on-premises Active Directory Domain Services (AD DS) domain that syncs with Azure AD and contains the users shown in the following table. SC-300 exam question In Azure AD Connect. Domain/OU Filtering is configured as shown in the following exhibit. SC-300 exam question For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. SC-300 exam question

Show Answer
Correct Answer:

YES

YES

NO

Explanation

Statement 1: Yes. User1 is in OU1, which is selected for synchronization. The Azure AD Connect configuration also shows that Password writeback is enabled. Password writeback is a required component for allowing synchronized users to use Azure AD self-service password reset (SSPR) to change their on-premises passwords.

Statement 2: Yes. The user sign-in method is configured for Pass-through authentication. With this method, when a user signs into an Azure AD-integrated application like Exchange Online, Azure AD passes the user's credentials to an agent running on-premises, which then validates them directly against the on-premises Active Directory domain controller.

Statement 3: No. User2 is located in OU2. The Domain/OU Filtering configuration explicitly shows that OU2 is not checked, meaning it is filtered out from synchronization. As a result, User2's identity does not exist in Azure AD. A user account must exist in Azure AD to be added as a member to a resource like a SharePoint Online site.

References

Microsoft Documentation: "Tutorial: Enable self-service password reset writeback to an on-premises environment - Prerequisites". This document states, "The primary prerequisite for SSPR writeback is to have password writeback enabled in Azure AD Connect."

Microsoft Documentation: "Azure Active Directory Pass-through Authentication: How it works". This official guide explains, "The on-premises Authentication Agent receives the request and validates the username and password against Active Directory. The validation occurs on a standard Windows Server, which is similar to how Active Directory Federation Services (AD FS) works." (See the "How it works" section).

Microsoft Documentation: "Azure AD Connect sync: Configure filtering". This document clarifies the effect of OU-based filtering: "If you have filtered out an OU, user objects in that OU aren't synchronized to Azure AD."

Question 5

HOTSPOT You have an Azure subscription that contains the resources shown in the following table. You need to configure access to Vault1. The solution must meet the following requirements: โ€ข Ensure that User1 can manage and create keys in Vault1. โ€ข Ensure that User2 can access a certificate stored in Vault1. โ€ข Use the principle of least privilege. Which role should you assign to each user? To answer select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. SC-300 exam question

Show Answer
Correct Answer:

USER1: KEY VAULT CRYPTO OFFICER

USER2: KEY VAULT CERTIFICATES OFFICER

Explanation

To adhere to the principle of least privilege, each user must be assigned the role that grants only the necessary permissions for their required tasks.

  • User1 needs to manage and create keys. The Key Vault Crypto Officer role is designed specifically for this purpose. It grants permissions to perform all data plane operations on keys, such as create, import, update, and delete, without providing access to certificates or secrets.
  • User2 needs to access a certificate. The Key Vault Certificates Officer role allows a user to perform all data plane operations on certificates, including get, list, create, and import. This role appropriately scopes the user's permissions to only certificates, fulfilling the requirement.

References

Microsoft Corporation. (2024). Azure built-in roles for Key Vault data plane operations. Microsoft Learn.

Reference for User1: The documentation describes the Key Vault Crypto Officer role as allowing users to "Perform any data plane operation on keys." This directly maps to the requirement to manage and create keys.

Reference for User2: The documentation defines the Key Vault Certificates Officer role as enabling users to "Perform any data plane operation on certificates." This aligns with the requirement to access a certificate.

Question 6

You have a Microsoft 365 E5 subscription. You purchase the app governance add-on license. You need to enable app governance integration. Which portal should you use?
Options
A: the Microsoft Defender for Cloud Apps portal
B: the Microsoft 365 admin center
C: Microsoft 365 Defender
D: the Azure Active Directory admin center
E: the Microsoft Purview compliance portal
Show Answer
Correct Answer:
Microsoft 365 Defender
Explanation
App governance is a security and policy management capability for OAuth-enabled apps, and it is an add-on feature for Microsoft Defender for Cloud Apps. The enablement and management of app governance are performed within the unified Microsoft 365 Defender portal. Administrators navigate to the settings for Cloud Apps within this portal to find and activate the app governance service. This centralization aligns with Microsoft's strategy of providing a single, integrated experience for security operations across the Microsoft 365 ecosystem.
Why Incorrect Options are Wrong

A. the Microsoft Defender for Cloud Apps portal: The standalone Defender for Cloud Apps portal is being deprecated. Its functionalities, including app governance, have been integrated into the Microsoft 365 Defender portal.

B. the Microsoft 365 admin center: This portal is used for managing subscriptions, licenses, and users at a high level, not for configuring specific security and compliance features like app governance.

D. the Azure Active Directory admin center: This portal is for managing identities, application registrations, and access control, but not the specific threat and compliance policies of app governance.

E. the Microsoft Purview compliance portal: This portal is focused on data governance, information protection, and compliance management, which is distinct from the app threat and anomaly detection focus of app governance.

---

References

1. Microsoft. (2023). Turn on app governance for Microsoft Defender for Cloud Apps. Microsoft Learn. Retrieved from https://learn.microsoft.com/en-us/defender-cloud-apps/app-governance-enable.

Reference Point: The document explicitly states, "This article describes how to turn on the app governance add-on to Microsoft Defender for Cloud Apps in the Microsoft 365 Defender portal." The step-by-step instructions confirm the path: "In the Microsoft 365 Defender portal, go to Settings > Cloud Apps. Under App governance, select Service enablement."

2. Microsoft. (2023). Get started with app governance. Microsoft Learn. Retrieved from https://learn.microsoft.com/en-us/defender-cloud-apps/app-governance-get-started.

Reference Point: The "Prerequisites" section states, "To enable app governance, you first need to turn on Microsoft Defender for Cloud Apps." and "After you've confirmed that Defender for Cloud Apps is enabled, you need to opt in to app governance in the Microsoft 365 Defender portal." This confirms the management plane is the Microsoft 365 Defender portal.

Question 7

You have an Azure AD tenant that contains a user named User1 User1 needs to manage license assignments and reset user passwords. Which role should you assign to User1?
Options
A: License administrator
B: Helpdesk administrator
C: Billing administrator
D: User administrator
Show Answer
Correct Answer:
User administrator
Explanation
The User administrator role is the most appropriate choice as it grants the necessary permissions for both tasks specified. This role allows for comprehensive management of users and groups. Its permissions explicitly include the ability to reset passwords for non-administrators and limited administrators, as well as the ability to manage all properties of a user, which includes assigning, removing, and updating license assignments. Assigning a single, well-defined role that covers all required duties adheres to the principle of least privilege more effectively than assigning multiple, more granular roles.
Why Incorrect Options are Wrong

A. License administrator: This role can manage license assignments for users and groups but lacks the permission to reset user passwords.

B. Helpdesk administrator: This role can reset passwords for non-administrators and other helpdesk administrators but does not have permissions to manage license assignments.

C. Billing administrator: This role is focused on managing purchases, subscriptions, and billing support tickets; it has no permissions related to user password or license management.

References

1. Microsoft Entra built-in roles - User administrator: Microsoft Learn. In the "User administrator" section, the description explicitly states this role can "Reset passwords for non-administrators, Helpdesk administrators, and other User administrators" and "Assign and remove licenses."

Source: Microsoft Learn, "Microsoft Entra built-in roles," under the "User administrator" role description.

2. Microsoft Entra built-in roles - License administrator: Microsoft Learn. The description for this role confirms it can "Assign, remove, and update license assignments on users, groups (using group-based licensing), and manage the usage location on users." It does not list password reset permissions.

Source: Microsoft Learn, "Microsoft Entra built-in roles," under the "License administrator" role description.

3. Microsoft Entra built-in roles - Helpdesk administrator: Microsoft Learn. The description for this role states it can "Reset passwords for non-administrators and Helpdesk administrators." It does not list license management permissions.

Source: Microsoft Learn, "Microsoft Entra built-in roles," under the "Helpdesk administrator" role description.

Question 8

You have an Azure AD tenant that has multi-factor authentication (MFA) enforced and self-service password reset (SSPR) enabled. You enable combined registration in interrupt mode. You create a new user named User1. Which two authentication methods can User1 use to complete the combined registration process? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
Options
A: a FID02 security key
B: a hardware token
C: a one-time passcode email
D: Windows Hello for Business
E: the Microsoft Authenticator app
Show Answer
Correct Answer:
a FID02 security key, the Microsoft Authenticator app
Explanation
The combined security information registration process prompts users to register authentication methods for both Azure AD Multi-Factor Authentication (MFA) and Self-Service Password Reset (SSPR). Since MFA is enforced, the new user, User1, must register at least one method that satisfies the MFA policy during their first sign-in. The Microsoft Authenticator app and FIDO2 security keys are both strong authentication methods that can be used for MFA and are available for users to self-register during the initial combined registration experience. These methods allow the user to complete the mandatory setup and secure their account from the outset.
Why Incorrect Options are Wrong

B. a hardware token: Hardware OATH tokens must be registered by an administrator for the user; they cannot be self-registered by the user during the initial sign-in process.

C. a one-time passcode email: Email is a method available for SSPR only, not for MFA. It cannot be used to satisfy the initial MFA registration requirement that triggers the combined registration process.

D. Windows Hello for Business: This is provisioned on a specific device after a user has already successfully authenticated with MFA. It is not an option available during the initial registration flow itself.

References

1. Microsoft Learn. (2023). Combined security information registration for Azure Active Directory overview. In "Authentication methods". This document lists the available methods for combined registration, including "Microsoft Authenticator app" and "FIDO2 security key". It also specifies that "Email address" and "Security questions" are available for SSPR only.

2. Microsoft Learn. (2023). Authentication methods and features. In "Authentication". This table confirms that FIDO2 Security Key and Microsoft Authenticator are valid for both MFA and SSPR, while Email is only for SSPR.

3. Microsoft Learn. (2023). Passwordless security key sign-in to Windows 10 devices with Azure Active Directory. In "Enable passwordless security key sign-in". The section "User registration and management of FIDO2 security keys" describes the self-service registration process at https://myprofile.microsoft.com.

4. Microsoft Learn. (2023). How to register and manage OATH hardware tokens in Azure AD. In "OATH tokens". The "Prerequisites" section states, "Admins need to register the hardware tokens for each user." This confirms it is not a self-service method for a new user.

Question 9

DRAG DROP You have an Azure AD tenant that contains a user named Admin1. Admin1 uses the Require password change for high-risk userโ€™s policy template to create a new Conditional Access policy. Who is included and excluded by default in the policy assignment? To answer, drag the appropriate options to the correct target. Each option may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. NOTE: Each correct selection is worth one point. SC-300 exam question

Show Answer
Correct Answer:

INCLUDE: ALL USERS

EXCLUDE: DIRECTORY ROLES

Explanation

The "Require password change for high-risk users" policy template in Azure AD Conditional Access is designed to automatically secure accounts that Azure AD Identity Protection flags as high-risk.

By default, this template is configured to include "All users" in its scope. This ensures that any user account, regardless of its role, is subject to a mandatory password reset if it becomes compromised and is assessed as high-risk.

To prevent accidental lockouts of administrators and disruption of critical services that may run under privileged accounts, the template also defaults to excluding specific "Directory roles." This typically includes highly privileged roles like Global Administrator and Security Administrator. This exclusion is a built-in safety measure to ensure that administrators can always access the tenant to manage policies and respond to incidents.

References

Microsoft Entra Documentation | Conditional Access templates: This official document details the default configurations for the various Conditional Access policy templates. For the "Require password change for high-risk users" template, the documentation specifies the following default user assignments:

Users and groups:

Include: All users

Exclude: Select directory roles (Global Administrator, Security Administrator, Conditional Access Administrator, etc.)

This source directly confirms that the policy includes all users and excludes specific directory roles by default.

Question 10

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps and Conditional Access policies. You need to block access to cloud apps when a user is assessed as high risk. Which type of policy should you create in the Microsoft Defender for Cloud Apps?
Options
A: OAuth app policy
B: anomaly detection polio
C: access policy
D: activity policy
Show Answer
Correct Answer:
access policy
Explanation
In Microsoft Defender for Cloud Apps, an access policy is used for real-time monitoring and control over access to cloud applications. These policies can block or allow access based on a set of conditions, including the user, their location, the device they are using, and the specific application. To meet the requirement of blocking access for a high-risk user, an access policy would be configured to identify users with this risk attribute (often in conjunction with an Azure AD Conditional Access policy) and apply a "Block" action, thereby preventing them from accessing the cloud app.
Why Incorrect Options are Wrong

A. OAuth app policy: This policy type is used to govern third-party OAuth applications and their permissions, not to control user access based on risk.

B. anomaly detection policy: This policy is designed to identify unusual activities and potential security threats. It generates alerts about risk but does not directly enforce access controls.

D. activity policy: This policy is used to monitor and take action on specific user activities after they have occurred (e.g., mass download), not to block initial access based on a user's risk state.

References

1. Microsoft Learn. (2023). Control cloud apps with policies. Microsoft Docs. Retrieved from https://learn.microsoft.com/en-us/defender-cloud-apps/control-cloud-apps-with-policies.

Reference Section: "Policy types". This section explicitly describes an Access policy as the tool to "control access to your cloud apps" in real-time based on user, location, device, and other risk factors. This directly supports the answer.

2. Microsoft Learn. (2023). Create access policies in Microsoft Defender for Cloud Apps. Microsoft Docs. Retrieved from https://learn.microsoft.com/en-us/defender-cloud-apps/access-policy-aad.

Reference Section: "Prerequisites" and "To create an access policy". The document states, "Microsoft Defender for Cloud Apps access policies enable you to monitor and control access to cloud apps in real time...". This confirms that the primary purpose of an access policy is to control access.

3. Microsoft Learn. (2023). Deploy Conditional Access App Control for featured apps. Microsoft Docs. Retrieved from https://learn.microsoft.com/en-us/defender-cloud-apps/proxy-deployment-aad.

Reference Section: "Step 4: Configure the policies in Defender for Cloud Apps". This section details the process after routing traffic via Conditional Access, stating you can "Create an access policy" to "Block or monitor access to apps". This confirms that an access policy is the correct type to create in Defender for Cloud Apps for blocking access.

Question 11

You plan to deploy a new Azure AD tenant. Which multifactor authentication (MFA) method will be enabled by default for the tenant?
Options
A: Microsoft Authenticator
B: SMS
C: voice call
D: email OTP
Show Answer
Correct Answer:
Microsoft Authenticator
Explanation
For new Azure AD tenants created after October 22, 2019, Security Defaults are enabled by default. This baseline security policy requires all users to register for multi-factor authentication (MFA). The mandatory registration process specifically guides users to set up the Microsoft Authenticator app as their primary MFA method. While other methods like SMS and voice calls are also enabled in the tenant's authentication methods policy and can be configured by users, the Microsoft Authenticator app is the method that is actively enforced and presented as the default during the required setup experience for a new tenant.
Why Incorrect Options are Wrong

B. SMS: While the SMS method is enabled by default in the authentication methods policy, it is not the primary method that the default security posture (Security Defaults) requires users to register.

C. voice call: Similar to SMS, the voice call method is available by default in the tenant's policy, but it is not the method specifically enforced by the default Security Defaults configuration.

D. email OTP: The email one-time passcode (OTP) method is enabled by default for self-service password reset (SSPR) but is not a usable method for multi-factor authentication sign-in events.

---

References

1. Microsoft Entra Documentation, "Security defaults in Microsoft Entra ID." This document states, "All users in your tenant must register for multi-factor authentication (MFA)... Users have 14 days to register for Multi-Factor Authentication by using the Microsoft Authenticator app." This confirms that the Authenticator app is the required and default method under the default tenant configuration.

Reference: Microsoft Corporation. (2023). Security defaults in Microsoft Entra ID. Microsoft Learn. Retrieved from https://learn.microsoft.com/en-us/entra/fundamentals/security-defaults#requiring-users-to-register-for-mfa

2. Microsoft Entra Documentation, "Manage authentication methods for Microsoft Entra ID." This document includes a table showing the default state of authentication method policies. It shows that while SMS and Voice Call are "Enabled" (in a "Microsoft managed" state), the entire security framework for new tenants, Security Defaults, is built around the Microsoft Authenticator app.

Reference: Microsoft Corporation. (2023). Manage authentication methods for Microsoft Entra ID. Microsoft Learn. See the table under the "Authentication methods policy" section. Retrieved from https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-methods-manage

3. Microsoft Entra Documentation, "Authentication and verification methods." This source provides a table detailing which methods are available for different purposes. It explicitly shows that "Email OTP" is available for SSPR but not for MFA, confirming why option D is incorrect.

Reference: Microsoft Corporation. (2024). Authentication and verification methods are available in Microsoft Entra ID. Microsoft Learn. See the table "Method strengths and security". Retrieved from https://learn.microsoft.com/en-us/entra/identity/authentication/concept-authentication-methods#method-strengths-and-security

Question 12

You have an Azure AD tenant that contains the users shown in the following table. SC-300 exam question You need to compare the role permissions of each user. The solution must minimize administrative effort. What should you use?
Options
A: the Microsoft 365 Defender portal
B: the Microsoft 365 admin center
C: the Microsoft Entra admin center
D: the Microsoft Purview compliance portal
Show Answer
Correct Answer:
the Microsoft Entra admin center
Explanation
The Microsoft Entra admin center is the dedicated and centralized portal for managing Azure Active Directory (Azure AD) identities, access, and administrative roles. It provides comprehensive tools to view, assign, and manage both built-in and custom roles. Specifically, it includes a feature to directly compare the permissions of up to three roles side-by-side. This functionality directly addresses the requirement to compare role permissions with the least amount of administrative effort, as it consolidates all necessary information in a single, purpose-built interface.
Why Incorrect Options are Wrong

A. the Microsoft 365 Defender portal: This portal is for managing security services and threat protection. Its roles are specific to security operations, not for comparing general Azure AD administrative permissions.

B. the Microsoft 365 admin center: While it allows for some user and role management, it is less detailed than the Entra admin center and is not the primary tool for in-depth permission comparison of Azure AD roles.

D. the Microsoft Purview compliance portal: This portal is used for data governance, risk, and compliance management. The roles within it are scoped to compliance functions, not general tenant-wide administrative roles.

References

1. Microsoft Entra documentation, "Compare roles in Microsoft Entra ID." This document explicitly states, "You can compare the permissions for up to three roles in Microsoft Entra ID... This article describes how to compare roles in the Microsoft Entra admin center." It provides a step-by-step guide on using this feature within the "Roles and administrators" section.

Source: Microsoft Learn, learn.microsoft.com/en-us/entra/identity/role-based-access-control/roles-compare.

2. Microsoft Entra documentation, "Assign administrator and non-administrator roles to users with Microsoft Entra ID." This guide details the process of managing roles and shows that the primary interface for these tasks is the Microsoft Entra admin center.

Source: Microsoft Learn, learn.microsoft.com/en-us/entra/fundamentals/how-to-assign-roles. Section: "Assign roles".

3. Microsoft Purview documentation, "Permissions in the Microsoft Purview compliance portal." This document outlines the role groups available in the Purview portal, such as Compliance Administrator and eDiscovery Manager, confirming its scope is limited to compliance and not general Azure AD role management.

Source: Microsoft Learn, learn.microsoft.com/en-us/purview/microsoft-365-permissions. Section: "Roles and Role Groups in Microsoft Defender XDR and Microsoft Purview".

Question 13

HOTSPOT -


You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1 and the users shown in the following table.


PDF Exam dump

The users have the devices shown in the following table.


PDF Exam dump

You create the following two Conditional Access policies:


โ€ข Name: CAPolicy1

โ€ข Assignments

o Users or workload identities: Group1

o Cloud apps or actions: Office 365 SharePoint Online

o Conditions

Filter for devices: Exclude filtered devices from the policy

Rule syntax: device.displayName -startsWith โ€œDeviceโ€

o Access controls

Grant: Block access

Session: 0 controls selected

o Enable policy: On


โ€ข Name: CAPolicy2

โ€ข Assignments

o Users or workload identities: Group2

o Cloud apps or actions: Office 365 SharePoint Online

o Conditions: 0 conditions selected

โ€ข Access controls

o Grant: Grant access

Require multifactor authentication

o Session: 0 controls selected

โ€ข Enable policy: On


All users confirm that they can successfully authenticate using MFA.


For each of the following statements, select Yes if the statement is true. Otherwise, select No.


NOTE: Each correct selection is worth one point.


PDF Exam dump
Show Answer
Correct Answer:

USER1 CAN ACCESS SITE1 FROM DEVICE1. --> YES

USER2 CAN ACCESS SITE1 FROM DEVICE2. --> YES

USER3 CAN ACCESS SITE1 FROM DEVICE3. --> YES

Explanation

The evaluation of these statements hinges on the device filter in CAPolicy1. This policy is configured to exclude any device whose display name starts with "Device". Since all three devices (Device1, Device2, and Device3) match this naming convention, the "Block access" control from CAPolicy1 is not enforced in any of the three scenarios.

  • User1 on Device1: User1 is only in Group1. CAPolicy1 targets this group, but the policy is excluded because of the device filter. No other policy applies, so access is permitted.
  • User2 on Device2: User2 is only in Group2. CAPolicy2 applies, requiring MFA. Since the user can satisfy the MFA requirement, access is granted.
  • User3 on Device3: User3 is in both groups. CAPolicy1 is excluded by the device filter. CAPolicy2 applies, and access is granted after the user completes the MFA challenge.

References

Microsoft Entra ID Documentation, Conditional Access: Filter for devices. This document explains the use of rules to target or exclude specific devices from a policy. It clarifies that when the "Exclude filtered devices from the policy" option is selected, the policy's grant or session controls are not applied to sign-ins from devices matching the rule.

Microsoft Entra ID Documentation, Building a Conditional Access policy. This guide details how policies are constructed and evaluated. In the section "Assignments," it describes how conditions, including device filters, determine whether a policy applies to a specific sign-in event.

Microsoft Entra ID Documentation, Conditional Access: Grant. This source describes how access controls are enforced. A "Block access" control is the most restrictive. However, it is only enforced if the policy's assignment and condition criteria are met. In this scenario, the condition (device filter) prevents the block from being applied.

Question 14

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it as a result, these questions will not appear in the review screen. You have an Amazon Web Services (AWS) account, a Google Workspace subscription, and a GitHub account. You deploy an Azure subscription and enable Microsoft 365 Defender. You need to ensure that you can monitor OAuth authentication requests by using Microsoft Defender for Cloud Apps. Solution: From the Microsoft 365 Defender portal, you add the Google Workspace app connector. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
Defender for Cloud Apps collects OAuth-app authorizations only from SaaS tenants that are connected through an API connector. Adding the Google Workspace connector lets you monitor OAuth requests that occur inside Google Workspace, but OAuth activity in the AWS and GitHub tenants will remain invisible until those tenants are also connected. Therefore the proposed action does not fully satisfy the requirement to monitor OAuth authentication requests across all the stated environments.
Why Incorrect Options are Wrong

A. Yes โ€“ Only connects Google Workspace; without also connecting AWS and GitHub, their OAuth events are not ingested, so the requirement is not met.

References

1. Microsoft Defender for Cloud Apps โ€“ โ€œConnect apps to Microsoft Defender for Cloud Appsโ€, Steps 1-2; Note: โ€œTo monitor activity, you must create an app connector for each SaaS app (e.g., AWS, Google Workspace, GitHub).โ€

https://learn.microsoft.com/en-us/defender-cloud-apps/connect-apps

2. Microsoft Defender for Cloud Apps โ€“ โ€œMonitor and govern OAuth appsโ€, Section โ€œPrerequisitesโ€; โ€œOAuth events are collected only for connected apps.โ€

https://learn.microsoft.com/en-us/defender-cloud-apps/oauth-apps

3. Microsoft Defender for Cloud Apps โ€“ โ€œConnect Google Workspaceโ€, Overview paragraph; confirms scope is limited to Google Workspace tenant.

https://learn.microsoft.com/en-us/defender-cloud-apps/connect-google-workspace

(Additional sources not required.)

Question 15

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it as a result, these questions will not appear in the review screen. You have an Amazon Web Services (AWS) account, a Google Workspace subscription, and a GitHub account. You deploy an Azure subscription and enable Microsoft 365 Defender You need to ensure that you can monitor OAuth authentication requests by using Microsoft Defender for Cloud Apps. Solution: From the Microsoft 365 Defender portal, you add the Microsoft Azure app connector. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
The proposed solution is incorrect. The goal is to monitor OAuth authentication requests. The Microsoft Azure app connector in Microsoft Defender for Cloud Apps is designed to monitor user and administrative activities within the Azure subscription's management plane (IaaS/PaaS). It provides visibility into Azure resources and detects threats related to the Azure platform itself by analyzing the Azure Activity Log. To monitor OAuth apps that users have granted consent to, you must connect the specific cloud applications where these apps are authorized. For the services mentioned (AWS, Google Workspace, GitHub), you would need to add their respective app connectors. The Azure connector does not fulfill the requirement of monitoring OAuth authentications for these or other SaaS applications.
Why Incorrect Options are Wrong

A. Yes: This is incorrect. The Microsoft Azure app connector's function is to monitor the Azure platform's management and activity logs, not to monitor OAuth authentication requests for third-party applications connected to services like Google Workspace, AWS, or GitHub.

References

1. Microsoft Learn. (2023). Connect Azure to Microsoft Defender for Cloud Apps.

Section: "How to connect Azure to Defender for Cloud Apps"

Content: This document explicitly states that connecting Azure provides "improved visibility into your Azure user activities, and provides threat detection for anomalous behavior." It details the data sources as Azure Activity Log and security recommendations from Microsoft Defender for Cloud, confirming its focus is on the Azure platform's security posture and administrative activities, not OAuth app monitoring.

2. Microsoft Learn. (2023). Investigate and manage OAuth apps that are risky or suspicious.

Section: "How Defender for Cloud Apps helps you manage your OAuth apps"

Content: This document outlines how Defender for Cloud Apps provides visibility into OAuth apps. It specifies that this capability is available for apps connected to Microsoft 365, Google Workspace, and Salesforce, demonstrating that specific SaaS app connectors are required for OAuth app monitoring, not the generic Azure platform connector.

3. Microsoft Learn. (2023). Connect Google Workspace to Microsoft Defender for Cloud Apps.

Section: "Prerequisites" and "How to connect Google Workspace to Defender for Cloud Apps"

Content: This guide details the steps to connect Google Workspace. One of the key capabilities gained from this specific connector is the ability to see and govern OAuth apps authorized in the Google Workspace environment, reinforcing that the correct connector for the specific service must be used.

Question 16

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it as a result, these questions will not appear in the review screen. You have an Amazon Web Services (AWS) account, a Google Workspace subscription, and a GitHub account. You deploy an Azure subscription and enable Microsoft 365 Defender. You need to ensure that you can monitor OAuth authentication requests by using Microsoft Defender for Cloud Apps. Solution: From the Microsoft 365 Defender portal, you add the Amazon Web Services app connector. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
The proposed solution does not meet the goal. The Microsoft Defender for Cloud Apps connector for Amazon Web Services (AWS) is designed to ingest AWS CloudTrail logs. This provides visibility into API activities, detects threats based on user behavior, and assesses security configurations within the AWS environment. However, the specific goal of monitoring and governing third-party OAuth applications that users have authorized is a distinct feature in Defender for Cloud Apps. This feature is supported for Software as a Service (SaaS) platforms like Google Workspace, Microsoft 365, and Salesforce, but not for AWS. Therefore, adding the AWS app connector will not enable the required OAuth app monitoring and governance capabilities.
Why Incorrect Options are Wrong

A. This is incorrect because the AWS app connector's function is to monitor IaaS/PaaS activity via API logs (CloudTrail), not to discover and manage the permissions of third-party OAuth apps, which is a separate feature for specific SaaS platforms.

References

1. Microsoft Learn, Connect AWS to Microsoft Defender for Cloud Apps. This document details the capabilities of the AWS connector, focusing on security configuration assessment and threat detection based on CloudTrail logs. It does not list OAuth app governance as a feature. The document states, "Connecting AWS to Defender for Cloud Apps helps you secure your AWS resources and detect potential threats."

2. Microsoft Learn, Manage OAuth apps in Microsoft Defender for Cloud Apps. This document describes the OAuth app governance feature, explaining its purpose: "Defender for Cloud Apps provides you with the capabilities to see which OAuth applications have been authorized by your users, see the permissions they've granted, and mark them as approved or ban them."

3. Microsoft Learn, App governance in Microsoft 365. This documentation clarifies the scope of OAuth app governance, stating, "App governance is a security and policy management capability... for OAuth-enabled apps that access Microsoft 365 data through Microsoft Graph APIs." This highlights that the feature is specific to platforms that support this type of app integration, such as Microsoft 365 and Google Workspace, not AWS. The table comparing Defender for Cloud Apps and App governance shows OAuth app management is a core CASB function for supported SaaS apps.

Question 17

You have an Azure AD tenant. You deploy a new enterprise application named App1. When users attempt to provide App1 with access to the tenant, the attempt fails. You need to ensure that the users can request admin consent for App1. The solution must follow the principle of least privilege. What should you do first?
Options
A: Enable admin consent requests for the tenant.
B: Designate a reviewer of admin consent requests for the tenant.
C: From the Permissions settings of App1, grant App1 admin consent for the tenant
D: Create a Conditional Access policy for Appl.
Show Answer
Correct Answer:
Enable admin consent requests for the tenant.
Explanation
The scenario indicates that users cannot grant consent to App1, which means the application requires permissions that only an administrator can approve. To allow users to initiate a formal approval process, the admin consent request workflow must be activated. This feature is disabled by default. Enabling "admin consent requests" is the foundational first step that allows users to submit a request for an administrator to review and approve the application's permissions. This aligns with the principle of least privilege by establishing a review process rather than pre-granting permissions.
Why Incorrect Options are Wrong

B. Designate a reviewer of admin consent requests for the tenant.

This is a necessary step in configuring the workflow, but it cannot be done until the admin consent request feature is enabled first.

C. From the Permissions settings of App1, grant App1 admin consent for the tenant.

This action bypasses the user request process entirely. The requirement is to enable users to request consent, not for an administrator to grant it proactively for everyone.

D. Create a Conditional Access policy for App1.

Conditional Access policies control user sign-in and access to applications based on conditions (like location or device health); they do not manage the application permission consent process.

---

References

1. Microsoft Learn. (2023). Configure the admin consent workflow. Microsoft Entra documentation. Retrieved from https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/configure-admin-consent-workflow#enable-the-admin-consent-workflow.

Reference Details: The section "Enable the admin consent workflow" explicitly states: "To enable the admin consent workflow... 1. ... In Enterprise applications > Consent and permissions > Admin consent settings. 2. Under Admin consent requests, select Yes for Users can request admin consent to apps they are unable to consent to." This confirms enabling the setting is the primary step.

2. Microsoft Learn. (2023). Manage consent to applications and evaluating consent requests. Microsoft Entra documentation. Retrieved from https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/manage-consent-requests#prerequisites.

Reference Details: The "Prerequisites" section lists the first requirement as: "The admin consent workflow is enabled." This establishes that enabling the workflow precedes other configuration steps like assigning reviewers.

Question 18

You have an Azure subscription that contains the users shown in the following table. SC-300 exam question You need to implement Azure AD Privileged Identity Management (PIM). Which users can use PIM to activate their role permissions?
Options
A: Admin! only
B: Admin2 only
C: Admin3 only
D: Admin1 and Admin2 only
E: Admin2 and Admin3 only
F: Admin1, Admin2, and Admin3
Show Answer
Correct Answer:
Admin1 and Admin2 only
Explanation
To implement and manage Azure AD Privileged Identity Management (PIM), a user must hold either the Privileged Role Administrator or Global Administrator role. Admin1 is a Privileged Role Administrator, a role specifically designed for managing PIM. Admin2 is a Global Administrator, which has the highest level of permissions and can fully manage PIM. Both Admin1 and Admin2 are member users, granting them the necessary trust level to administer a core security service like PIM. While Admin3 holds the Global Administrator role, they are a guest user. Administrative capabilities for guest accounts are restricted in certain contexts for security reasons. Management of the PIM service is limited to member users of the tenant, thus excluding Admin3 from being able to configure or manage PIM.
Why Incorrect Options are Wrong

A, B, C: These options are incorrect because they are incomplete. Both Admin1 (Privileged Role Administrator) and Admin2 (Global Administrator) have the necessary permissions to manage PIM.

E: This option is incorrect because Admin3, as a guest user, cannot perform administrative management tasks within PIM, even with the Global Administrator role assigned.

F: This option is incorrect because it includes Admin3. Management of core security services like PIM is restricted to trusted member accounts, not external guest identities.

References

1. Microsoft Learn, Azure AD built-in roles, "Who can perform sensitive tasks in Privileged Identity Management": This document explicitly states the roles required to manage PIM. "To manage Azure AD role assignments in PIM, a user must have the Privileged Role Administrator role or the Global Administrator role." This supports why Admin1 and Admin2 are included.

Reference: https://learn.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-roles (Section: "Roles in PIM")

2. Microsoft Learn, Azure AD B2B collaboration, "Properties of an Azure Active Directory B2B collaboration user": This document outlines the inherently limited nature of guest accounts. "By default, guest users have limited permissions in the directory... A guest user's permissions are restricted even when they're a member of an administrator role." This principle supports the exclusion of Admin3 from managing a sensitive security service.

Reference: https://learn.microsoft.com/en-us/azure/active-directory/external-identities/user-properties (Section: "UserType property")

3. Microsoft Learn, Privileged Identity Management, "Assign Azure AD roles in Privileged Identity Management": This document clarifies that guest users can be targets of PIM assignments but does not state they can be managers of the service. "You can assign both members and guests as eligible for Azure AD roles." This distinction is key to understanding why Admin3 can be managed by PIM but cannot manage PIM itself.

Reference: https://learn.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-assign-role (Section: "Assign a role")

Question 19

HOTSPOT You have an Azure AD tenant. You perform the tasks shown in the following table. SC-300 exam question On April 5, an administrator deletes App1, App2, App3, and App4. You need to restore the apps and the settings. Which apps can you restore on April 16, and which settings can you restore for App4 on April 16? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. SC-300 exam question

Show Answer
Correct Answer:

APPS: APP1, APP2, APP3, AND APP4

APP4 SETTINGS: APP ROLES AND CLIENT SECRET ONLY

Explanation

When an application is deleted in Azure AD, it is soft-deleted and can be restored for up to 30 days. All four applications were deleted on April 5, and the restoration attempt is on April 16, which is only 11 days later. Therefore, all four applications (App1, App2, App3, and App4) are within the 30-day window and can be restored.

However, not all settings are restored with the application object.

  • Restored settings include properties defined in the application manifest, such as App roles and Client secrets.
  • Settings that are NOT restored are those associated with the application's service principal, which include Users and groups assignments and Self-service configurations. These must be reconfigured manually after the application is restored.

References

Microsoft Learn | Restore a deleted application registration:

Section: "Restore a deleted application registration"

Content: "When you delete an application registration...the app is in a suspended state for 30 days. During this 30-day window, the app registration can be restored...Restoring an application registration also restores its corresponding service principal. However, any user or group assignments that were previously made to the service principal are not restored." This confirms that all apps are restorable but user/group assignments are lost.

Microsoft Learn | Application and service principal objects in Azure Active Directory:

Section: "Relationship between application and service principal objects"

Content: This document explains the distinction between the application object (global template) and the service principal object (local instance). App roles are defined on the application object, whereas user assignments and self-service SSO configurations are applied to the service principal in the tenant. This distinction clarifies why settings tied to the service principal are not restored with the application object.

Question 20

HOTSPOT You have an Azure AD tenant named contoso.com that contains a group named All Company and has the following Identity Governance settings: โ€ข Block external users from signing in to this directory: Yes โ€ข Remove external user Yes โ€ข Number of days before removing external user from this directory: 30 On March 1, 2022, you create an access package named Package1 that has the following settings: โ€ข Resource roles o Name: All Company o Type: Group and Team o Role: Member โ€ข Lifecycle o Access package assignment expire: On date o Assignment expiration date: April 1, 2022 On March 1, 2022, you assign Package1 to the guest users shown in the following table. SC-300 exam question On March 2, 2022, you assign the Reports reader role to Guest1. On April 1(2022, you invite a guest user named Guest3 to contoso.com. On April 4, 2022, you add Guest3 to the All Company group. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. SC-300 exam question

Show Answer
Correct Answer:

ON MAY 5, 2022, THE GUEST1 ACCOUNT IS IN CONTOSO.COM. NO

ON MAY 5, THE GUEST2 ACCOUNT IS IN CONTOSO.COM. NO

ON MAY 5, THE GUEST3 ACCOUNT IS IN CONTOSO.COM. YES


Explanation

The Identity Governance settings are configured to automatically manage the lifecycle of external users who are granted access via access packages. When such a user loses their last access package assignment, they are blocked from signing in, and a 30-day timer for account deletion begins.

  • Guest1 & Guest2: Both users were granted access via Package1, which expired on April 1, 2022. This was their last access package assignment. The 30-day deletion timer started on this date. Consequently, their accounts were removed from the contoso.com directory around May 1, 2022. By May 5, 2022, their accounts no longer exist. Guest1's separate "Reports reader" role assignment does not prevent this automated deletion process, which is triggered by the loss of the final access package.
  • Guest3: This user was invited and added to a group manually, not through an access package. Therefore, the automated lifecycle management settings do not apply to Guest3's account. Without any other policy in place to remove the account, it remains active in the directory.

References

Microsoft Entra documentation, "Govern access for external users in Microsoft Entra entitlement management": This document details the lifecycle management settings for external users. It states, "By default, when an external user no longer has any access package assignments, they are blocked from signing in to your directory. After 30 days, their guest user account is removed from your directory." This directly supports the removal of Guest1 and Guest2. The scope is defined as, "This control only applies to external users who were invited through entitlement management." This supports why Guest3 is not removed.

Question 21

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. as a result, these questions will not appear in the review screen. You have an Amazon Web Services (AWS) account a Google Workspace subscription, and a GitHub account You deploy an Azure subscription and enable Microsoft 365 Defender. You need to ensure that you can monitor OAuth authentication requests by using Microsoft Defender for Cloud Apps. Solution: From the Microsoft 365 Defender portal, you add the GitHub app connector Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
The goal is to monitor OAuth authentication requests across the cloud environment. In Microsoft Defender for Cloud Apps, this capability is enabled by connecting the primary cloud application suites where users authorize third-party apps, such as Microsoft 365 and Google Workspace. Adding the GitHub app connector provides visibility and control over activities within the connected GitHub organization. However, it does not enable the general discovery and monitoring of OAuth apps that users have granted consent to across other platforms like Google Workspace or Microsoft 365. Therefore, this single action is insufficient to meet the broader goal.
Why Incorrect Options are Wrong

A. Yes: This is incorrect. The GitHub app connector is designed to monitor the GitHub environment itself, not to enable the general monitoring of OAuth authentication requests across other major cloud suites like Google Workspace, which is a key part of the scenario.

References

1. Microsoft Learn. "Manage OAuth apps in Microsoft Defender for Cloud Apps." This document explicitly states which connected apps support OAuth app discovery: "Defender for Cloud Apps is available for Microsoft 365, Google Workspace, and Salesforce connected apps." This confirms that connecting GitHub does not enable this feature for the other platforms.

2. Microsoft Learn. "Connect GitHub to Microsoft Defender for Cloud Apps." This documentation details the capabilities of the GitHub connector, which include discovering repositories, auditing activities, and governing actions within GitHub. It makes no mention of enabling a general OAuth app monitoring capability for other services.

Question 22

You have a Microsoft 365 subscription that contains a Microsoft SharePoint Online site named Site1 and a Microsoft 365 group named Group1. You need to ensure that the members of Group1 can access Site1 for 90 days. The solution must minimize administrative effort. What should you use?
Options
A: an access review
B: a lifecycle workflow
C: an access package
D: a Conditional Access policy
Show Answer
Correct Answer:
an access package
Explanation
Microsoft Entra entitlement management uses access packages to govern access to a collection of resources, such as SharePoint Online sites. An administrator can create an access package that includes Site1 and configure a policy that grants access for a specific duration, such as 90 days. This policy can be assigned to Group1, automatically provisioning access for all its members. Access is automatically revoked after the 90-day period expires, fulfilling the requirements with minimal administrative effort.
Why Incorrect Options are Wrong

A. an access review: Access reviews are used to periodically review and recertify existing user access to resources, not to initially grant time-bound access.

B. a lifecycle workflow: Lifecycle Workflows automate identity-related processes based on a user's lifecycle events (Joiner, Mover, Leaver), not for managing time-limited access to specific resources.

D. a Conditional Access policy: Conditional Access policies enforce security controls (like requiring MFA) when a user attempts to access a resource; they do not grant the underlying permissions or manage their duration.

---

References

1. Microsoft Entra documentation, "What is entitlement management?": "Microsoft Entra entitlement management is an identity governance feature that enables organizations to manage identity and access lifecycle at scale, by automating access request workflows, access assignments, reviews, and expiration." This document explicitly states that entitlement management handles access expiration.

Source: Microsoft Learn, Microsoft Entra ID Governance documentation. Section: "What is entitlement management?".

2. Microsoft Entra documentation, "Tutorial: Manage access to resources in entitlement management": This tutorial demonstrates creating an access package and adding resources like groups, applications, and SharePoint sites. Step 4 of "Create an access package" details configuring the policy's lifecycle settings.

Source: Microsoft Learn, Microsoft Entra ID Governance documentation. Section: "Tutorial: Manage access to resources in entitlement management", Sub-section: "Step 4: Create an access package", Paragraph on "Lifecycle".

3. Microsoft Entra documentation, "What are Microsoft Entra access reviews?": "Microsoft Entra access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments. User's access can be reviewed on a regular basis to make sure only the right people have continued access." This confirms access reviews are for reviewing, not provisioning.

Source: Microsoft Learn, Microsoft Entra ID Governance documentation. Section: "What are Microsoft Entra access reviews?".

4. Microsoft Entra documentation, "What are lifecycle workflows?": "Lifecycle Workflows are a new identity governance feature that enables organizations to manage Microsoft Entra users by automating three basic lifecycle processes: Joiner, Mover, and Leaver." This defines the scope of Lifecycle Workflows as being tied to the user's employment status, not project-based resource access.

Source: Microsoft Learn, Microsoft Entra ID Governance documentation. Section: "What are lifecycle workflows?".

Question 23

HOTSPOT You have an Azure AD tenant that contains multiple storage accounts. You plan to deploy multiple Azure App Service apps that will require access to the storage accounts. You need to recommend an identity solution to provide the apps with access to the storage accounts. The solution must minimize administrative effort. Which type of identity should you recommend, and what should you recommend using to control access to the storage accounts? To answer, select the appropriate options in the answer area. SC-300 exam question

Show Answer
Correct Answer:

IDENTITY TYPE: USER-ASSIGNED MANAGED IDENTITY

TO CONTROL ACCESS, USE: ROLE-BASED ACCESS CONTROL (RBAC)


Explanation

For a scenario with multiple App Service apps requiring access to multiple storage accounts, a User-assigned managed identity is the most efficient choice. This type of identity is a standalone Azure resource. You can create one identity, grant it the necessary permissions on all the storage accounts using Role-based access control (RBAC), and then assign that single identity to all of the apps. This approach centralizes permission management and significantly minimizes administrative effort compared to creating and managing a separate system-assigned identity for each app.

Role-based access control (RBAC) is the standard and most secure method for granting this identity access. By assigning roles like "Storage Blob Data Contributor" to the user-assigned identity at the storage account scope, you provide granular permissions without managing any credentials like SAS tokens or certificates, which would increase administrative overhead.

References

Microsoft Entra Documentation, Managed identities for Azure resources: This source compares the two types of managed identities. It states, "User-assigned managed identities are more efficient in a broader range of scenarios than system-assigned managed identities... A user-assigned identity can be used in scenarios where... multiple resources need to share the same permissions." This directly aligns with the question's scenario of multiple apps.

Source: learn.microsoft.com/en-us/entra/identity/managed-identities-azure-resources/overview#which-type-of-managed-identity-should-i-use

Azure Storage Documentation, Authorize access to blobs using Microsoft Entra ID: This document confirms that using Azure AD (now Microsoft Entra ID) identities with RBAC is the recommended authorization mechanism for storage. It explicitly contrasts this with less secure and harder-to-manage methods like Shared Key or SAS tokens. "We recommend using Microsoft Entra credentials when possible for maximum security and ease of use... With Microsoft Entra ID, you can use Azure role-based access control (Azure RBAC) to grant permissions to a security principal."

Source: learn.microsoft.com/en-us/azure/storage/blobs/authorize-access-azure-active-directory#authorize-with-microsoft-entra-id

Azure RBAC Documentation, What is Azure role-based access control (Azure RBAC)?: This provides the fundamental definition of RBAC as the system for managing access to Azure resources. "Instead of trying to assign permissions directly to users, you make it easier to manage access by assigning roles... Azure RBAC is an authorization system built on Azure Resource Manager."

Source: learn.microsoft.com/en-us/azure/role-based-access-control/overview

Question 24

You have an Azure subscription that contains an Azure Automation account named Automation1 and an Azure key vault named Vault1. Vault1 contains a secret named Secret 1. You enable a system-assigned managed identity for Automation1. You need to ensure that Automation! can read the contents of Secret1. The solution must meet the following requirements: โ€ข Prevent Automation1 from accessing other secrets stored in Vault1. โ€ข Follow the principle of least privilege. What should you do?
Options
A: From Vault1, configure the Access control (1AM) settings.
B: From Automation1, configure the Identity settings.
C: From Secret1, configure the Access control (1AM) settings
D: From Automation1, configure the Run as accounts settings.
Show Answer
Correct Answer:
From Secret1, configure the Access control (1AM) settings
Explanation
To meet the principle of least privilege, permissions must be granted at the most granular scope required. Azure Key Vault, when configured to use the Azure role-based access control (RBAC) permission model, allows for role assignments on individual secrets. By navigating to the specific secret (Secret1) and configuring its Access control (IAM) settings, you can assign a role, such as "Key Vault Secrets User," to the Automation account's managed identity. This grants the identity permission to read Secret1 exclusively, without providing any access to other secrets within the same vault (Vault1), thereby fulfilling all the stated requirements.
Why Incorrect Options are Wrong

A. Configuring IAM at the Vault1 level would grant the managed identity permissions to all secrets within the vault, which violates the principle of least privilege.

B. The identity is already enabled for Automation1. Configuring identity settings further does not grant permissions to external resources like a Key Vault.

D. Run As accounts are a legacy authentication method. The scenario correctly uses a modern managed identity, making Run As account configuration irrelevant.

References

1. Microsoft Learn | Azure Key Vault security: "Provide access to Key Vault keys, certificates, and secrets with an Azure role-based access control". This document states, "The Azure RBAC model allows you to set permissions on different scope levels: management group, subscription, resource group, or individual resources. Azure RBAC for key vault also allows having separate permissions on individual keys, secrets, and certificates". This directly supports assigning permissions at the individual secret scope (Option C).

2. Microsoft Learn | Assign an Azure role for access to keys, certificates, and secrets: Under the "Assign role at secret, key, or certificate scope" section, the documentation provides a step-by-step guide for assigning a role to a specific secret using the Azure portal, which is the action described in the correct answer.

3. Microsoft Learn | Managed identities for Azure Automation: This document explains the use of managed identities as the recommended method for an Automation account to securely access other Azure AD-protected resources, confirming the approach used in the question. It also notes that managed identities are preferred over legacy Run As accounts.

Question 25

You have an Azure subscription that contains a resource group named RG1 and four users named User1, User2, User3, and User4. You plan to assign the users the following roles for RG1: โ€ข User1: Reader โ€ข User2: Contributor โ€ข User3: Storage Blob Data Reader โ€ข User4: Virtual Machine Contributor You are evaluating the use of attribute-based access control (ABAC). Which user's role will support the use of ABAC?
Options
A: User1
B: User2
C: User3
D: User4
Show Answer
Correct Answer:
User3
Explanation
Azure attribute-based access control (ABAC) adds conditions to role assignments to provide more fine-grained access control. Currently, conditions are supported for Azure role assignments that include specific data actions, primarily for Azure Blob Storage and Azure Queue Storage. Among the listed roles, only Storage Blob Data Reader is a data plane role that includes storage blob data actions (e.g., Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read). The other roles (Reader, Contributor, Virtual Machine Contributor) are management plane roles and do not contain the specific storage data actions required to support ABAC conditions.
Why Incorrect Options are Wrong

A. User1: The Reader role is a management plane role and does not include the storage data actions necessary for ABAC conditions.

B. User2: The Contributor role is a management plane role for managing resources, but it lacks the specific storage data actions that support ABAC conditions.

D. User4: The Virtual Machine Contributor role is for managing compute resources and does not contain the storage blob or queue data actions required for ABAC.

References

1. Microsoft Learn. (2024). What is Azure attribute-based access control (Azure ABAC)?. "Currently, conditions can be added to built-in or custom role assignments that have storage blob data actions or storage queue data actions." Retrieved from https://learn.microsoft.com/en-us/azure/role-based-access-control/conditions-overview#where-can-i-add-conditions

2. Microsoft Learn. (2024). Prerequisites to add or edit Azure role assignment conditions. "To add or update role assignment conditions, you must have... Microsoft.Authorization/roleAssignments/write... Also, your role assignment must be for a built-in or custom role that supports conditions. Conditions can be added to built-in or custom role assignments that have storage blob data actions." Retrieved from https://learn.microsoft.com/en-us/azure/role-based-access-control/conditions-prerequisites

3. Microsoft Learn. (2024). Azure built-in roles. This document lists the actions for each built-in role. Reviewing the permissions for Reader, Contributor, and Virtual Machine Contributor confirms they do not include Microsoft.Storage/storageAccounts/blobServices/... data actions, whereas Storage Blob Data Reader does. Retrieved from https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles

Question 26

You have an Azure subscription named Sub1 that contains a virtual machine named VM1. You need to enable Microsoft Entra login for VM1 and configure VM1 to access the resources in Sub1. Which type of identity should you assign to VM1?
Options
A: system-assigned managed identity
B: Azure Automation account
C: Microsoft Entra user account
D: user-assigned managed identity
Show Answer
Correct Answer:
system-assigned managed identity
Explanation
A system-assigned managed identity creates an identity for the virtual machine (VM1) directly within Microsoft Entra ID. This identity's lifecycle is tied to the VM; if the VM is deleted, the identity is automatically removed. Once enabled, this identity can be granted permissions via Azure Role-Based Access Control (RBAC) to access other Azure resources in the subscription (Sub1). This allows the VM to authenticate and access resources securely without storing any credentials, such as passwords or access keys, within the VM's code or configuration. This is the most direct and simplified approach for a single Azure resource.
Why Incorrect Options are Wrong

B. Azure Automation account: This is a service for automating and orchestrating tasks, not an identity type that can be assigned to a VM to grant it access to other resources.

C. Microsoft Entra user account: This represents a human user identity for signing into services. It is not used to grant an Azure resource, like a VM, its own identity for service-to-service authentication.

D. user-assigned managed identity: While this also provides an identity, it is a standalone Azure resource managed separately from the VM. It is typically used when an identity needs to be shared across multiple resources, which is not a requirement in this scenario.

References

1. Microsoft Entra Documentation. What are managed identities for Azure resources? Microsoft Learn. Retrieved from https://learn.microsoft.com/en-us/entra/identity/managed-identities-azure-resources/overview.

Section: Managed identity types. This document states, "A system-assigned managed identity is enabled directly on an Azure resource... The lifecycle of this identity is tied to the Azure resource that it's enabled on. If the resource is deleted, Azure automatically cleans up the identity for you." This supports using a system-assigned identity for a single VM.

2. Microsoft Entra Documentation. Configure managed identities for Azure resources on a VM using the Azure portal. Microsoft Learn. Retrieved from https://learn.microsoft.com/en-us/entra/identity/managed-identities-azure-resources/qs-configure-portal-windows-vm.

Section: Enable system-assigned managed identity on an existing VM. This guide provides the exact steps for enabling a system-assigned identity on a VM, noting that it provides the VM with an "automatically managed identity in Microsoft Entra ID" which can be used "to authenticate to any service that supports Microsoft Entra authentication."

Question 27

You have a Microsoft 365 subscription. You plan to deploy an app named App1 that will have the following configurations: โ€ข Will be registered in Microsoft Entra โ€ข Will run as a service without user interaction โ€ข Will collect audit logs associated with user sign-ins โ€ข Will access resources by using the Microsoft Graph API You need to ensure that App1 can access Microsoft Graph. What should you use?
Options
A: application permissions
B: delegated permissions
C: a custom role-based access control (RBAC) role
D: a built-in role-based access control (RBAC) role
Show Answer
Correct Answer:
application permissions
Explanation
The question describes an application that will run as a service without user interaction. This is a classic example of a daemon application or a background service. Such applications authenticate and authorize using their own identity, not on behalf of a user. The Microsoft identity platform provides two types of permissions: delegated and application. Application permissions are specifically designed for scenarios where an app needs to access an API directly, without a signed-in user present. An administrator must grant consent for these permissions, allowing the app to access the required resources, such as Microsoft Graph audit logs, using its own credentials.
Why Incorrect Options are Wrong

B. delegated permissions: This is incorrect because delegated permissions are used when an application acts on behalf of a signed-in user. The scenario explicitly states the app runs "without user interaction."

C. a custom role-based access control (RBAC) role: This is incorrect. Microsoft Entra RBAC roles grant permissions to manage Microsoft Entra resources (e.g., users, groups), not for granting an application permission to call an API.

D. a built-in role-based access control (RBAC) role: This is incorrect for the same reason as custom RBAC roles. Built-in roles like "Global Reader" are for administrative tasks, not for API access by a service principal.

References

1. Microsoft Entra documentation, "Permissions and consent in the Microsoft identity platform."

Section: "Permission types"

Content: This document explicitly defines the two permission types. It states, "Application permissions are used by apps that run without a signed-in user present; for example, apps that run as background services or daemons." This directly supports the use of application permissions for App1.

2. Microsoft identity platform documentation, "Scenario: Daemon app that calls web APIs."

Section: "Overview"

Content: This guide details the architecture for applications that run in the background. It specifies, "For this scenario, the permissions exposed by the API must be of type Application." This confirms that a daemon app like App1 must use application permissions.

3. Microsoft Graph documentation, "Microsoft Graph permissions reference."

Section: "Audit log permissions"

Content: The documentation for the auditLog resource type lists both delegated (AuditLog.Read.All) and application (AuditLog.Read.All) permissions. The choice between them is determined by the application's sign-in type. Since App1 has no user, the application permission is the only correct choice.

4. Microsoft Entra documentation, "Microsoft Entra built-in roles."

Section: "Role descriptions"

Content: This document describes the purpose of built-in roles, such as managing users, applications, or billing. It clarifies that these roles are for administrative access to the directory, which is distinct from granting an application permission to access data via an API like Microsoft Graph.

Question 28

You have a Microsoft 365 subscription that contains the users shown in the following table. SC-300 exam question From the tenan1, you configure a naming policy for groups. Which users are affected by the naming policy?
Options
A: User2 only
B: User3only
C: User2 and User3 only
D: User3 and User4 only
E: User1, User2, and User3 only
F: User1, User2, User3, and User4
Show Answer
Correct Answer:
User3 and User4 only
Explanation
A Microsoft 365 (Azure AD) group naming policy is enforced for every user except those who hold one of the following directory roles: Global Administrator, User Account Administrator, Partner Tier 1 Support, or Partner Tier 2 Support. In the table, User1 is a Global Administrator and User2 is a User Account (User) Administrator, so both are exempt. User3 (Groups Administrator) and User4 (no exempt role) do not appear in the exemption list; therefore every group they create must follow the tenant-wide naming policy.
Why Incorrect Options are Wrong

A. User2 is exempt as a User Account Administrator.

B. User3 is affected, but User4 is also affected, so option B is incomplete.

C. User2 is exempt; policy also applies to User4, so option C is wrong.

E. User1 and User2 hold exempt roles, so policy does not affect them.

F. User1 and User2 are exempt; policy only affects 3 and 4.

References

1. Microsoft Docs โ€“ โ€œConfigure naming policy for Microsoft 365 Groups,โ€ Section: โ€œWho can override the policyโ€

https://learn.microsoft.com/azure/active-directory/enterprise-users/groups-naming-policy#who-can-override-the-policy

(lists Global Administrator, User Account Administrator, Partner Tier 1/2 Support as exempt)

2. Microsoft Docs โ€“ โ€œDirectory rolesโ€

https://learn.microsoft.com/azure/active-directory/roles/delegate-directory-administration#role-descriptions

(confirms Groups Administrator is not in the exempt list)

3. Microsoft 365 Identity & Services (MS-102) Official Courseware, Module 5 โ€œImplement Group Lifecycle Management,โ€ p. 12-13

(explains enforcement of naming policy and exemption of specified roles)

Question 29

HOTSPOT You have a Microsoft 365 E5 subscription. You need to configure app consent for the subscription. The solution must meet the following requirements: โ€ข Disable user consent to apps. โ€ข Configure admin consent workflow for apps. Which portal should you use for each requirement? To answer, select the appropriate options in the answer are a. NOTE Each correct selection is worth one point SC-300 exam question

Show Answer
Correct Answer:

DISABLE USER CONSENT TO APPS: MICROSOFT 365 ADMIN CENTER

CONFIGURE ADMIN CONSENT WORKFLOW FOR APPS: MICROSOFT ENTRA ADMIN CENTER

Explanation

The settings for app consent are managed across two primary portals depending on the specific task.

  1. Disabling user consent to apps is an organization-wide setting. This configuration is managed within the Microsoft 365 admin center under Settings > Org settings > Services, where you can find the "User consent to apps" option. This setting provides a straightforward way for administrators to turn off the ability for non-admin users to grant consent to applications.
  2. The admin consent workflow is a more granular identity and access management feature. It enables users to request administrator approval for apps they cannot consent to themselves. This workflow, including its configuration and the management of requests, is a core feature of Microsoft Entra ID and is configured exclusively in the Microsoft Entra admin center under Enterprise applications > Consent and permissions.

References

Microsoft Learn. (2024). Manage user consent to apps in Microsoft 365. "As a global administrator, you can turn user consent off to prevent users from granting applications access to your organization's data... 1. In the Microsoft 365 admin center, go to Settings > Org settings > Services, and then select User consent to apps."

Microsoft Learn. (2024). Configure the admin consent workflow. "Enable the admin consent workflow to allow users to request access to applications that require admin consent... Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator. 2. Browse to Identity > Applications > Enterprise applications > Consent and permissions > Admin consent settings."

Question 30

DRAG DROP You have an Azure subscription that is linked to a Microsoft Entra tenant named contoso.com. The subscription contains a group named Group1 and a virtual machine named VM1. You need to meet the following requirements: โ€ข Enable a system-assigned managed identity for VM1. โ€ข AddVM1 to Group1. How should you complete the PowerShell script? To answer, drag the appropriate cmdlets to the correct targets. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. NOTE: Each correct selection is worth one point. SC-300 exam question

Show Answer
Correct Answer:

BOX 1:GET-AZVM

BOX 2:GET-AZADSERVICEPRINCIPAL

Explanation

The PowerShell script aims to enable a system-assigned managed identity for the virtual machine VM1 and then add that identity to Group1.

  1. First Command: The script first needs to retrieve the VM object to work with. The $vm = Get-AzVM -ResourceGroupName myResourceGroup -Name vm1 command uses the Get-AzVM cmdlet to fetch the Azure virtual machine named vm1 from the specified resource group and stores it in the $vm variable.
  2. Second Command: After the system-assigned identity is enabled on VM1 using Update-AzVM, an enterprise application, also known as a service principal, is created in Microsoft Entra ID. To add this identity to a group, we must first retrieve this service principal object. The $displayname = Get-AzADServicePrincipal -displayname "vm1" command uses the Get-AzADServicePrincipal cmdlet to find the service principal that has the same display name as the VM.

The rest of the script then correctly uses these objects to add the VM's managed identity to the target group.

References

Microsoft Learn: The official documentation for configuring managed identities for Azure resources on a VM using PowerShell outlines this exact sequence of commands. It specifies using Get-AzVM to retrieve the VM object and Update-AzVM with the -IdentityType SystemAssigned parameter to enable the identity. It then shows the use of Get-AzADServicePrincipal to get the service principal for the newly created managed identity before adding it to a group.

Source: Configure managed identities for Azure resources on a VM using PowerShell, "System-assigned managed identity" section.

Microsoft Learn: The documentation for the Get-AzVM cmdlet confirms its purpose is to "get the properties of a virtual machine."

Source: Get-AzVM (Az.Compute).

Microsoft Learn: The documentation for the Get-AzADServicePrincipal cmdlet confirms its function is to get an "Azure Active Directory service principal." It is the standard cmdlet for retrieving the service principal associated with a managed identity.

Source: Get-AzADServicePrincipal (Az.Resources).

Question 31

HOTSPOT You have Microsoft Entra tenant that contains a group named Group3 and an administrative unit named Department1. Department has the users shown in the Users exhibit. (Click the Users tab.) SC-300 exam question Department1 has the groups shown in the Groups exhibit (Click the Groups tab.) SC-300 exam question The User Administrator role assignments are shown in the Assignments exhibit. (Click the Assignments tab.) SC-300 exam question The members of Group2 are shown in the Group2 exhibit. (Click the Group2 tab.) SC-300 exam question For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. SC-300 exam question

Show Answer
Correct Answer:

NO

NO

YES

Explanation

Admin1 can reset the passwords of User3 and User4: No. Admin1 is a User Administrator scoped to the Department1 Administrative Unit (AU). This role allows Admin1 to manage only the users who are direct members of that AU. Although Group2 is in the AU, its members (User3 and User4) are not. Therefore, Admin1 lacks the permissions to reset their passwords.

Admin1 can add User1 to Group3: No. While Admin1 can manage User1 (who is in the AU), Group3 is not shown to be within the Department1 AU. An administrator whose permissions are scoped to an AU cannot modify objects, such as the membership of a group, that are outside of that AU's scope.

Admin3 can reset the password of User1: Yes. Admin3 holds the User Administrator role with a Directory (tenant-wide) scope. This gives Admin3 permissions over all non-administrator users in the entire Microsoft Entra tenant, including User1, irrespective of User1's membership in an administrative unit.


References

Microsoft Entra documentation, "Administrative units in Microsoft Entra ID": This document details the scoping mechanism. It states, "An administrator that is assigned to the scope of an administrative unit can manage members only within that administrative unit." This supports the reasoning for the first two statements.

Microsoft Entra documentation, "User Administrator - Microsoft Entra built-in roles": This document outlines the permissions for the User Administrator role, which include resetting passwords and managing group memberships. The behavior in the question is determined by how the scope (AU vs. Directory) is applied to these permissions, confirming the logic for all three statements.

Question 32

You have an Azure subscription named Sub1 that contains a user named User1. You need to ensure that User1 can purchase a Microsoft Entra Permissions Management license for Sub1. The solution must follow the principle of least privilege. Which role should you assign to User1?
Options
A: User Access Administrator
B: Permissions Management Administrator
C: Billing Administrator
D: Global Administrator
Show Answer
Correct Answer:
Billing Administrator
Explanation
The task is to purchase a Microsoft Entra Permissions Management license, which is a billing-related activity. The Billing Administrator role is specifically designed to manage billing tasks, including making purchases, managing subscriptions, and handling invoices. Assigning this role grants User1 the necessary permissions to buy the license without providing excessive administrative rights over other aspects of the Azure environment. This choice directly adheres to the principle of least privilege by granting only the permissions required to perform the specified task.
Why Incorrect Options are Wrong

A. User Access Administrator: This role manages user access to Azure resources by assigning roles. It does not include permissions for purchasing services or managing billing.

B. Permissions Management Administrator: This role is used to manage settings within the Microsoft Entra Permissions Management service after it has been purchased and enabled, not to purchase the license itself.

D. Global Administrator: While a Global Administrator can purchase licenses, this role has the highest level of permissions across all Microsoft cloud services. Assigning it for a purchasing task violates the principle of least privilege.

References

1. Microsoft Entra built-in roles - Billing Administrator: Microsoft Learn. (2023). "Billing administrator". Microsoft Entra ID documentation. "Makes purchases, manages subscriptions, manages support tickets, and monitors service health." This confirms the role's purpose aligns with the question's requirement.

2. Enable Microsoft Entra Permissions Management: Microsoft Learn. (2023). "Enable Permissions Management in your organization". Microsoft Entra documentation. Under the "Prerequisites" section, it states: "To enable Permissions Management, you must have a Global Administrator or Billing Administrator role." This explicitly lists the two roles capable of the task, and applying the principle of least privilege makes Billing Administrator the correct choice.

3. Principle of Least Privilege: Microsoft Learn. (2023). "Best practices for Azure RBAC". Azure documentation. This document emphasizes assigning users "only the access they need to do their jobs," which supports selecting the most narrowly scoped role (Billing Administrator) over a broader one (Global Administrator).

Question 33

You have three Azure subscriptions that are linked to a single Microsoft Entra tenant. You need to evaluate and remediate the risks associated with highly privileged accounts. The solution must minimize administrative effort. What should you use?
Options
A: Microsoft Entra Verified ID
B: Privileged Identify Management (PIM)
C: Global Secure Access
D: Microsoft Entra Permissions Management
Show Answer
Correct Answer:
Privileged Identify Management (PIM)
Explanation
Microsoft Entra Privileged Identity Management (PIM) is a service that enables you to manage, control, and monitor access to important resources in your organization. It provides time-based and approval-based role activation to mitigate the risks of excessive, unnecessary, or misused access permissions on sensitive resources. PIM allows you to discover who has privileged roles, enforce on-demand, just-in-time (JIT) access, require approval for activation, and conduct access reviews to ensure users still need the roles. This directly addresses the requirement to evaluate and remediate risks for highly privileged accounts with minimal administrative overhead through its automated policy enforcement and review capabilities.
Why Incorrect Options are Wrong

A. Microsoft Entra Verified ID: This service is for creating and managing decentralized, verifiable credentials. It is used to prove identity, not to manage privileged access within a tenant.

C. Global Secure Access: This is a Security Service Edge (SSE) solution that secures access to the internet and corporate resources. It focuses on network security, not on managing privileged identity roles.

D. Microsoft Entra Permissions Management: This is a Cloud Infrastructure Entitlement Management (CIEM) solution for discovering and right-sizing permissions across multicloud environments (Azure, AWS, GCP). While it evaluates permissions, PIM is the primary tool for remediating standing privileged access in Azure/Entra via JIT activation.

---

References

1. Microsoft Entra documentation, "What is Privileged Identity Management?": "Microsoft Entra Privileged Identity Management (PIM) is a service that enables you to manage, control, and monitor access to important resources in your organization... PIM provides time-based and approval-based role activation to mitigate the risks of excessive, unnecessary, or misused access permissions on sensitive resources."

Source: Microsoft Learn, learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-configure.

2. Microsoft Entra documentation, "Microsoft Entra Permissions Management overview": "Microsoft Entra Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities... across Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP)." This highlights its multicloud focus, distinguishing it from PIM's primary role within Azure and Microsoft Entra.

Source: Microsoft Learn, learn.microsoft.com/en-us/entra/permissions-management/overview.

3. Microsoft Entra documentation, "Overview of Microsoft Entra Verified ID": "Microsoft Entra Verified ID is a managed verifiable credentials service based on open standards."

Source: Microsoft Learn, learn.microsoft.com/en-us/entra/verified-id/decentralized-identifier-overview.

4. Microsoft Entra documentation, "What is Global Secure Access?": "Microsoft's Security Service Edge (SSE) solution is called Global Secure Access... The solution unifies access control for any app or resource, from any location, device, or identity."

Source: Microsoft Learn, learn.microsoft.com/en-us/entra/global-secure-access/overview-global-secure-access.

Question 34

You have accounts for the following cloud platforms: โ€ข Azure โ€ข Alibaba Cloud โ€ข Amazon Web Services (AWS) โ€ข Google Cloud Platform (GCP) You configure an A2ure subscription to use Microsoft Entra Permissions Management to manage the permissions in Azure only. Which additional cloud platforms can be managed by using Permissions Management?
Options
A: AWS only
B: Alibaba Cloud and AWS only
C: Alibaba Cloud and GCP only
D: AWS and GCP only
E: Alibaba Cloud, AWS, and GCP
Show Answer
Correct Answer:
AWS and GCP only
Explanation
Microsoft Entra Permissions Management is a Cloud Infrastructure Entitlement Management (CIEM) solution designed to provide comprehensive visibility and control over permissions across multicloud infrastructures. According to official Microsoft documentation, the service supports Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP). Since the user has already configured it for Azure, the additional cloud platforms from the provided list that can be managed are AWS and GCP. Alibaba Cloud is not a supported platform for this service.
Why Incorrect Options are Wrong

A. AWS only: This is incorrect because Microsoft Entra Permissions Management also supports Google Cloud Platform (GCP).

B. Alibaba Cloud and AWS only: This is incorrect because Alibaba Cloud is not a supported platform for Microsoft Entra Permissions Management.

C. Alibaba Cloud and GCP only: This is incorrect because Alibaba Cloud is not a supported platform for Microsoft Entra Permissions Management.

E. Alibaba Cloud, AWS, and GCP: This is incorrect because Alibaba Cloud is not a supported platform for Microsoft Entra Permissions Management.

References

1. Microsoft Learn. (2024). What is Microsoft Entra Permissions Management? Microsoft Docs. Retrieved from https://learn.microsoft.com/en-us/entra/permissions-management/overview. In the main overview section, the document states, "Microsoft Entra Permissions Management (Permissions Management) is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities... across multicloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP)."

2. Microsoft Learn. (2024). Onboard Amazon Web Services (AWS) accounts. Microsoft Docs. Retrieved from https://learn.microsoft.com/en-us/entra/permissions-management/onboard-aws. This document provides the specific steps for onboarding AWS, confirming its support.

3. Microsoft Learn. (2024). Onboard a Google Cloud Platform (GCP) project. Microsoft Docs. Retrieved from https://learn.microsoft.com/en-us/entra/permissions-management/onboard-gcp. This document provides the specific steps for onboarding GCP, confirming its support.

Question 35

You have a Microsoft Entra tenant that has a Microsoft Entra ID P1 license. You need to review the Microsoft Entra ID sign-in logs to investigate sign-ins that occurred in the past. For how long does Microsoft Entra ID store events in the sign-in logs?
Options
A: 14 days
B: 30 days
C: 90days
D: 365 days
Show Answer
Correct Answer:
30 days
Explanation
The data retention period for Microsoft Entra ID reports is dependent on the license associated with the tenant. For tenants with a premium license, specifically Microsoft Entra ID P1 or P2, the sign-in activity reports are retained for 30 days. This allows administrators to query, analyze, and investigate sign-in events that have occurred within the past month. To retain data for longer periods, it must be routed to an Azure storage account or integrated with Azure Monitor logs.
Why Incorrect Options are Wrong

A. 14 days is not a standard retention period for Microsoft Entra ID sign-in logs for any license tier.

C. 90 days is the retention period for Audit logs in a premium (P1/P2) tenant, not for sign-in logs.

D. 365 days is not a default retention period. This duration can be achieved by exporting logs to a service like Azure Monitor Log Analytics and configuring a custom retention policy.

References

1. Microsoft Entra documentation. (2023). How long does Microsoft Entra ID store reporting data? Microsoft Learn. Retrieved from https://learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-reports-data-retention.

Reference details: The table under the section "How long does Microsoft Entra ID store the data?" explicitly states that for the "Sign-ins" report type, the retention for "Microsoft Entra ID P1" and "Microsoft Entra ID P2" licenses is "30 Days".

2. Microsoft Entra documentation. (2023). What are Microsoft Entra activity logs? Microsoft Learn. Retrieved from https://learn.microsoft.com/en-us/entra/identity/monitoring-health/concept-activity-logs.

Reference details: Under the "Sign-in logs" section, it states, "If you have a license for Microsoft Entra ID P1 or P2, you can retain sign-in logs for 30 days."

Shopping Cart
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail $6 DISCOUNT on YOUR PURCHASE