1. Microsoft Entra documentation, "Security defaults in Microsoft Entra ID": This document explicitly states the relationship between security defaults and Conditional Access.
Section: "Disabling security defaults"
Content: "If you have Conditional Access policies enabled in your directory, security defaults will be unavailable to you... To enable security defaults, you must disable all Conditional Access policies." This supports the correct answer (C).
2. Microsoft Entra documentation, "Microsoft Entra built-in roles": This source details the permissions for different administrative roles.
Section: "Security Administrator"
Content: Lists "manage security defaults" as a permission for this role.
Section: "Authentication Administrator"
Content: Permissions are limited to setting or resetting authentication methods for users. It does not include managing security defaults, which invalidates option (D).
3. Microsoft Entra documentation, "Administrative units in Microsoft Entra ID": This document explains the purpose and limitations of administrative units.
Section: "Administrative unit management scenarios"
Content: It clarifies that AUs are for delegating permissions over a subset of directory objects (users, groups, devices). Tenant-wide settings like security defaults are managed at the directory level, not within an AU scope. This further invalidates the scoping in option (D).