exam questions

Exam SC-300 All Questions

View all questions & answers for the SC-300 exam

Exam SC-300 topic 6 question 2 discussion

Actual exam question from Microsoft's SC-300
Question #: 2
Topic #: 6
[All SC-300 Questions]

You need to meet the authentication requirements for leaked credentials.
What should you do?

  • A. Enable password hash synchronization in Azure AD Connect.
  • B. Configure Azure AD Password Protection.
  • C. Configure an authentication method policy in Azure AD.
  • D. Enable federation with PingFederate in Azure AD Connect.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Val_0
Highly Voted 3 years, 5 months ago
@spinnetho - the correct answer is A - https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-risks#common-questions
upvoted 26 times
...
Hot_156
Highly Voted 2 years, 1 month ago
Selected Answer: A
The question is Tricky! it mentions "meet authentication requirements" and if you just read this and go back up to read the "Authentication Requirements" there is nothing that mentioned anything related to needing PHS. HOWEVER!!!!!! If you read the whole question again "You need to meet the authentication requirements FOR LEAVK CREDENTIALS", you realize there is nothing that mentioned LEAKED CREDENTIALS on the "Authentications Requirements" related to it. The answer is A because none of the other ones has anything to do with LEAKED CREDENTIALS. You don't use B for anything related to LEAKED CREDENTIALS - You would use this one for addressing the requirement You don't use C for anything related to LEAKED CREDENTIALS You don't use D for anything related to LEAKED CREDENTIALS I had to read this multiple times!!! LOL
upvoted 10 times
...
photon99
Most Recent 4 months, 1 week ago
Selected Answer: A
Correct Answer is PHS required for leaked credentials, because Password Protection compares against a fixed list. On-premises deployment of Microsoft Entra Password Protection uses the same global and custom banned password lists that are stored in Microsoft Entra ID. https://learn.microsoft.com/en-us/entra/identity/authentication/concept-password-ban-bad-on-premises
upvoted 1 times
...
a6792d4
5 months, 1 week ago
Protect against leaked credentials and add resilience against outages The simplest and recommended method for enabling cloud authentication for on-premises directory objects in Microsoft Entra ID is to enable password hash synchronization (PHS).
upvoted 1 times
...
Sneekygeek
8 months, 4 weeks ago
Selected Answer: A
I think A actually makes a lot of sense since the case study mentions they use pass-through auth with hash sync disabled. This would mean that Azure AD doesn't know the password hash and can't compare it with the hashes from the leaked credentials list. Once you enable the hash sync, Azure can start comparing the password hashes to the hashes from the leaked creds list.
upvoted 4 times
Sneekygeek
8 months, 4 weeks ago
This article also points this out specifically. https://learn.microsoft.com/bs-latn-ba/entra/identity/hybrid/connect/whatis-phs
upvoted 2 times
...
...
Er_01
9 months ago
Enabling PTH sync does nothing to solve for question. Automatically detect and remediate externally leaked credentials. It is needed to allow for other steps that do. Yet another bad question that forces you make unstated assumptions to determine the "best" answer.
upvoted 1 times
...
AK_1234
1 year ago
Catch is " leaked credentials" . B is correct.
upvoted 2 times
Nyamnyam
11 months, 2 weeks ago
I also thought initially that Passwor Protection should be correct, based on its global banned password. But in the online documentation, MSFT notes: The global banned password list isn't based on any third-party data sources, including compromised password lists. So, yes, after all, MSFT obviously uses another tricks in Entra ID Protection (P1 and P2) to "Detect risks" such as "Leaked credentials". But for this it needs the data, and this can only be the password hashes, or hashes of hashes, as they say, but who knows exactly ;) https://learn.microsoft.com/en-us/entra/id-protection/overview-identity-protection#detect-risks
upvoted 1 times
...
...
dule27
1 year, 3 months ago
Selected Answer: A
A. Enable password hash synchronization in Azure AD Connect.
upvoted 1 times
...
DeepMoon
2 years ago
The Users with leaked credentials report in Azure AD warns of username and password pairs, which have been exposed publically. An incredible volume of passwords is leaked via phishing, malware, and password reuse on third-party sites that are later breached. Microsoft finds many of these leaked credentials and will tell you, in this report, if they match credentials in your organization – but only if you enable password hash sync or have cloud-only identities. https://learn.microsoft.com/en-us/azure/security/fundamentals/steps-secure-identity#protect-against-leaked-credentials-and-add-resilience-against-outages
upvoted 3 times
...
Efficia
2 years, 3 months ago
Selected Answer: A
Password hash synchronization "Risk detections like leaked credentials require the presence of password hashes for detection to occur. For more information about password hash synchronization, see the article, Implement password hash synchronization with Azure AD Connect sync." https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-risks#password-hash-synchronization
upvoted 5 times
...
sapien45
2 years, 3 months ago
Password Hash Sync also enables leaked credential detection for your hybrid accounts. Microsoft works alongside dark web researchers and law enforcement agencies to find publicly available username/password pairs. If any of these pairs match those of our users, the associated account is moved to high risk.
upvoted 1 times
...
Jun143
2 years, 7 months ago
just pass the exam today. This came in the question.
upvoted 3 times
...
WS_21
2 years, 7 months ago
Selected Answer: A
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-risks#leaked-credentials
upvoted 1 times
...
stromnessian
2 years, 8 months ago
Selected Answer: A
It's A. Everyone knows that leaked credentials detection comes with PHS, right? Not sure why all the debate. Next question...
upvoted 5 times
...
andersonlrlima
2 years, 9 months ago
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad-on-premises#design-principles The software isn't dependent on other Azure AD features. For example, Azure AD password hash sync (PHS) isn't related or required for Azure AD Password Protection.
upvoted 2 times
...
Jdburner
2 years, 10 months ago
This clearly states that PSH isn't required https://docs.microsoft.com/en-us/learn/modules/manage-user-authentication/5-deploy-manage-password-protection
upvoted 1 times
007Ali
2 years, 9 months ago
PHS is not required for "Password Protection" which enables the use of a "Custom Banned Password List" on prem. To protect against the requirement of "Leaked Passwords" an Identity Protection / User Risk Policy is required and that requires passwords in Azure AD, therefore PHS is required.
upvoted 5 times
...
...
girikedar
2 years, 10 months ago
Azure ad password protection is configured when there is requirement of including Banned password. how can anyone configure leaked credential in banned password section so the answer should be Password Hash Synchronization. as a same time if there was no password hash synchronization option in answer section the it should be answer D
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago