View Mode
Q: 9
You are investigating a suspected data theft incident and need to answer two separate questions: 1. Who changed several Entra admin roles and consented a suspicious enterprise application? 2. What potentially sensitive actions a specific user took across Exchange Online, SharePoint, and Teams in the last 30 days? Multiple engineers propose di[erent approaches to pull the necessary evidence while maintaining a clear separation between directory-level configuration changes and cross- workload user activity. Which proposed approach best uses the appropriate tools for each part of this investigation?
Options
Question 9 of 35

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE