exam questions

Exam MS-100 All Questions

View all questions & answers for the MS-100 exam

Exam MS-100 topic 1 question 33 discussion

Actual exam question from Microsoft's MS-100
Question #: 33
Topic #: 1
[All MS-100 Questions]

Your company has an Enterprise E5 subscription of Microsoft 365.
You have been tasked with making sure that sales department users are compelled to make use of multi-factor authentication for all cloud-based applications.
Which of the following actions should you take?

  • A. You should create an DLP.
  • B. You should create a new app registration.
  • C. You should create a session policy.
  • D. You should create a sign-in risk policy.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️
References:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-sign-in-risk-policy

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
YClaveria
Highly Voted 3 years, 6 months ago
The how-to is in the provided reference: https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-configure-risk-policies#sign-in-risk-with-conditional-access .... 6. Under Cloud apps or actions > Include, select All cloud apps. 7. Under Conditions > Sign-in risk, set Configure to Yes. Under Select the sign-in risk level this policy will apply to a. Select High and Medium. b. Select Done. 8. Under Access controls > Grant, select Grant access, Require multi-factor authentication, and select Select. ...
upvoted 14 times
Storm
3 years, 2 months ago
Why would you assume that our sales personnel has done anything to be recognized by MS as risky users ???
upvoted 10 times
...
...
TimurKazan
Highly Voted 3 years, 5 months ago
actually this is implemented in conditional access policies. I don think it has something to do with sign in risk policies regarding cloud apps
upvoted 9 times
extrankie
3 years, 3 months ago
Conditional access should be best be approach but risky policy also force MFA
upvoted 2 times
...
...
osxzvkwpfcfxobqjby
Most Recent 1 year, 8 months ago
Selected Answer: D
Conditional access with session option is only working with "supported apps". So, at the moment your only option is D. To make sure it applies to all users in the group you select all options High to noRisk. https://learn.microsoft.com/nl-nl/azure/active-directory/conditional-access/concept-conditional-access-session#application-enforced-restrictions
upvoted 2 times
...
Rednevi
1 year, 11 months ago
Selected Answer: C
C. You should create a session policy. By creating a session policy, you can define and enforce specific settings for user sessions. In this case, you can configure the session policy to require multi-factor authentication for all cloud-based applications accessed by sales department users. This policy will ensure that users are prompted for an additional authentication factor when accessing these applications, enhancing security. Creating a DLP (Data Loss Prevention) policy is not directly related to enforcing multi-factor authentication. Creating a new app registration or a sign-in risk policy does not directly address the requirement of compelling sales department users to use multi-factor authentication for all cloud-based applications. Therefore, the most appropriate action to achieve the specified goal is to create a session policy.
upvoted 2 times
...
Don123
2 years, 2 months ago
D. You should create a sign-in risk policy To make sure that sales department users are compelled to make use of multi-factor authentication for all cloud-based applications, you should create a sign-in risk policy. A sign-in risk policy can be used to require multi-factor authentication for users based on certain conditions or risk level, such as location, device, IP address, and more. This can be done using Azure Active Directory Conditional Access in the Azure portal and you can use the cloud based subscription to apply this policy.
upvoted 2 times
...
Startkabels
2 years, 5 months ago
Selected Answer: B
Id vote D: Force sales uses to do MFA. Risk-policy doesnt do that cause risk is determined automatically and if there is no risk there is no MFA. I would use Conditional Access to achieve that but first you need to register those cloud apps in AzureAD to use as a condition for the policy. So apply to Sales users and apply to the registered app and always force MFA. Makes sense to me..
upvoted 1 times
...
Startkabels
2 years, 5 months ago
Id vote B: We need to force sales uses to do MFA for cloud apps. Risk-policy doesnt do that cause risk is determined automatically and if there is no risk there is no MFA. I would use Conditional Access to achieve it but first you need to register those cloud apps in AzureAD to use as a condition for the policy. So apply to Sales users and apply to the registered app and always force MFA. Makes sense to me..
upvoted 1 times
...
Monk16
2 years, 6 months ago
Answer is D It would be conditional access policy if that was an option for sure. But as its not. You create a Sign in risk policy which which forces MFA on the user when there is no risk. Obviously this is silly as you normally use a risk policy with a risk level of medium or high and block the connection for example. But this fits best
upvoted 1 times
...
Pha0691
2 years, 7 months ago
Risk-based policies If your organization uses Azure AD Identity Protection to detect risk signals, consider using risk-based policies instead of named locations. Policies can be created to force password changes when there is a threat of compromised identity or require MFA when a sign-in is deemed at risk such as leaked credentials, sign-ins from anonymous IP addresses, and more. Risk policies include: Require all users to register for Azure AD Multi-Factor Authentication Require a password change for users that are high-risk Require MFA for users with medium or high sign in risk https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-getstarted
upvoted 1 times
...
hussain2000
3 years ago
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-sign-in-risk-policy here it is boys D is the answer
upvoted 3 times
...
Storm
3 years, 2 months ago
There is no way we can force all sales personel to be risky users... I have no idea why people are upvoting suggestions to create a risk policy that requires MFA for all users with medium or high risk level... I think we can assume that the people we have hired in out sales department are not doing impossible travel, logging in from unknown Ip's or other stuff that would make them risky... The correct answer should be conditional access policy...
upvoted 7 times
HenriksDisciple
3 years ago
This is the truth.
upvoted 1 times
...
Frede
3 years ago
You are correct Sir!
upvoted 1 times
...
...
joergsi
3 years, 2 months ago
if you follow this link: https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-getstarted you will find: Risk-based policies If your organization uses Azure AD Identity Protection to detect risk signals, consider using risk-based policies instead of named locations. Policies can be created to force password changes when there is a threat of compromised identity or require multifactor authentication when a sign-in is deemed risky by events such as leaked credentials, sign-ins from anonymous IP addresses, and more. Risk policies include: - Require all users to register for Azure AD MFA - Require a password change for users that are high-risk - Require MFA for users with medium or high sign-in risk => D is correct
upvoted 2 times
...
Tuno
3 years, 6 months ago
I would say the answer is correct: “ The sign-in risk policy detects suspicious actions that come along with the sign-in. It is focused on the sign-in activity itself and analyzes the probability that the sign-in may not have been performed by the user. The sign-in risk checks for things like whether a user has signed in from an unfamiliar location or unfamiliar IP address. You can then choose to require MFA for users based on the risk level of their sign-ins.”
upvoted 2 times
...
Rlcky
3 years, 6 months ago
i think the right answer is to create a session policy https://docs.microsoft.com/en-us/cloud-app-security/session-policy-aad
upvoted 1 times
joergsi
3 years, 2 months ago
If you follow the link, you will find this requirement for session policy : Azure AD Premium P1 license, or the license required by your identity provider (IdP) solution => We don't have this license!
upvoted 1 times
NrdAlrt
1 year, 9 months ago
Actually, yes we do. Even E3 includes Azure AD Premium P1. E5 includes AADP P2. After researching all the arguments here, "Session based" is the best way to narrowly push MFA on a group for use of a specific application along a specific access vector... which is the nature of this question when you consider how much effort they went to list specifics all the way down to the specific license.
upvoted 1 times
...
...
...
fofo1960
3 years, 7 months ago
I am not sure that this is correct answer
upvoted 1 times
...
Noie
3 years, 8 months ago
It is not possible to CREATE a sign-in risk policy. Only configure and activate is possible.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago