exam questions

Exam SC-300 All Questions

View all questions & answers for the SC-300 exam

Exam SC-300 topic 2 question 46 discussion

Actual exam question from Microsoft's SC-300
Question #: 46
Topic #: 2
[All SC-300 Questions]

HOTSPOT
-

You have an Azure AD tenant that contains the users shown in the following table.



You have the Azure AD Identity Protection policies shown in the following table.



You review the Risky users report and the Risky sign-ins report and perform actions for each user as shown in the following table.



For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Show Suggested Answer Hide Answer
Suggested Answer:

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
doch
Highly Voted 1 year, 10 months ago
N N N User 1 No The User Risk = Low. Then User risk policy blocked access. User 2 No The Sign-in Risk = Unknown. But it is Confirm Safe so we can ignore this. The User risk = Medium. The user risk policy block access. User 3 No User 3 User Risk is dismissed, but anonymous IP address risk (this is Sign-in Risk) is still at High level. Hence the sign-in risk policy blocked the access. https://learn.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-risks#nonpremium-sign-in-risk-detections
upvoted 28 times
ExamStudy68
1 year, 8 months ago
I think NNY - User 3 sign in report shows dismiss user risk https://learn.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-remediate-unblock#risk-remediation
upvoted 6 times
...
c18525f
1 year, 9 months ago
This question might be deprecated. In Azure activity logs, activity from an anonymous IP address would typically be classified as a medium or high severity event, depending on the specific circumstances. However there I could not find information about the circumstances anymore. Machine learning stuff :/ - what do you think ?
upvoted 2 times
...
...
ThotSlayer69
Highly Voted 1 year, 10 months ago
User1 can sign in by using multi-factor authentication (MFA): No - Blocked access prevents self-remediation through password resets & Azure AD MFA User2 can sign in by using multi-factor authentication (MFA): No - Blocked access prevents self-remediation through password resets & Azure AD MFA User3 can sign in from an anonymous IP address: Yes - Anonymous IP address sign-in risk is Medium
upvoted 18 times
Nail
1 month, 2 weeks ago
Agreed. Link for last answer: "The risk level for this risk event type is “Medium” because in itself an anonymous IP is not a strong indication of an account compromise.
upvoted 1 times
...
...
naveenbio
Most Recent 3 days, 19 hours ago
No. Compromised user1, regardless of risk level. No. Compromised user2, regardless of risk level. No.User 3, High sign-in risk due to anonymous IP, even with dismissed user risk.
upvoted 1 times
...
RemmyT
6 months, 1 week ago
No No No Made a High Risk Sign policy that block access. Tried to login from TOR browser with two different accounts. Error message: You cannot access this right now Your sign-in was successful, but does not meet the criteria to access this resource. For example, you might be signing in from a browser, app or location that is restricted by your admin. Anonymous IP address Calculated in real-time. This risk detection type indicates sign-ins from an anonymous IP address (for example, Tor browser or anonymous VPN). These IP addresses are typically used by actors who want to hide their sign-in information (IP address, location, device, and so on) for potentially malicious intent. https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#anonymous-ip-address
upvoted 1 times
...
ItzVerified
7 months, 2 weeks ago
User1 can sign in by using multi-factor authentication (MFA): No - Blocked access prevents self-remediation through password resets & Azure AD MFA User2 can sign in by using multi-factor authentication (MFA): No - Blocked access prevents self-remediation through password resets & Azure AD MFA User3 can sign in from an anonymous IP address: Yes - Anonymous IP address sign-in risk is Medium + User 3 has the following action performed on his account : "Dismiss User Risk"
upvoted 1 times
...
ANiMOSiTYOP
9 months, 2 weeks ago
No, No, Yes User1: The User Risk Policy for User1 specifies the User Risk as "Low and above" and the control as "Block Access". Therefore, User1 would not be allowed to sign in even via multi-factor authentication (MFA) since the policy is set to block access. User2: The User Risk Policy for User2 specifies the User Risk as "Low and above" and once the user is confirmed compromised, the policy as "Block Access" applies. Hence, User2 would not be allowed to sign in even via MFA after being confirmed as compromised. User3: The User Risk for User3 is dismissed. This means User3 can sign in from any location including anonymously. In case the Sign-in Risk becomes High, then User3 would not be allowed to sign in as per the Sign-in Risk Policy.
upvoted 6 times
...
Shena2021
1 year, 2 months ago
1. User1 can sign in by using multi-factor authentication (MFA). - No: User1's status is "Confirm user compromised," so access is blocked. 2. User2 can sign in by using multi-factor authentication (MFA). - No: User2's status is "Confirm sign-in safe," which means their access is allowed without MFA. 3. User3 can sign in from an anonymous IP address. - Yes: User3's status is "Dismiss user risk," and there's no mention of IP restrictions, so they can sign in from an anonymous IP address.
upvoted 9 times
curtmcgirt
12 months ago
#2 is No, but not because of "confirm sign in safe." that sign in confirmation is only for the sign-in, and doesn't change user2's *user risk* from medium, and (user risk low and above) is (blocked), even before we confirm user2 compromised two steps after confirming the sign-in safe.
upvoted 1 times
...
Nivos23
1 year, 1 month ago
I agree, thanks for the explanation N N y
upvoted 2 times
Nivos300
1 year, 1 month ago
I agree N N Y
upvoted 2 times
...
...
...
EmnCours
1 year, 3 months ago
N N Y
upvoted 1 times
...
Tweety1972
1 year, 4 months ago
Box 1: No - User canNOT sign in. The status is "Confirm user compromised". Upon receiving this feedback, we move the sign-in and user risk state to Confirmed compromised and risk level to High. Box 2: No - User can sign in. The status is "Confirm sign-in safe". Upon receiving this feedback, we move the sign-in (not the user) risk state to Confirmed safe and the risk level to None. BUT the last line says "Confirm user compromised". If the user is already remediated, don't select Confirm compromised because it moves the sign-in and user risk state to Confirmed compromised and risk level to High. Box 3: Yes - User CAN sign in A Dismiss user risk on the user level closes the user risk and all past risky sign-ins and risk detections.
upvoted 4 times
...
b233f0a
1 year, 5 months ago
My thoughts User 1 - No User Risk Action is "Confirm user compromised" User 2 - Yes User risk action is "Confirmed sign-in safe" Upon receiving Confirm Safe dfeedback Identity Pritection sets Risk Level to None - https://learn.microsoft.com/en-us/azure/active-directory/identity-protection/troubleshooting-identity-protection-faq#how-do-the-feedback-mechanisms-in-identity-protection-work User 3 - Yes User Risk action is "Dismiss user risk" so this is good. What level of Sign-in risk is assigned to Anonymous IP is not known, but I'm guessing that this should not be High "Microsoft doesn't provide specific details about how risk is calculated." https://learn.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection#risk-levels
upvoted 4 times
...
dule27
1 year, 5 months ago
No No Yes
upvoted 2 times
...
wsrudmen
1 year, 10 months ago
NO - User1 is now at High risk level after confirming user is compromised. Then User risk policy blocked access. NO - Sign-in of User 2 is safe. So we can bypass Sign-in risk policy Risk level of User2 is High due to the last action, so User risk policy block the access YES - User3 has "Dismiss risk User" so User Risk policy is bypassed. anonymous IP address is a risk, but context is missing to know if it's considered as an high risk. Maybe it's an outdated question when there were fix values defined by Microsoft for risk type. Anonymous IP was ranked as medium. Now we don't know how Microsoft calculates the risk level. https://www.rebeladmin.com/2020/11/step-by-step-guide-how-to-configure-sign-in-risk-based-azure-conditional-access-policies/
upvoted 7 times
topzz
1 year, 8 months ago
agree with this
upvoted 1 times
...
dobriv
1 year, 9 months ago
OK, but Anonymous IP is Sign-in Risk, not User Risk, so I think the third should be NO.
upvoted 2 times
dobriv
1 year, 7 months ago
Correction - The risk level for this risk event type is “Medium” because in itself an anonymous IP is not a strong indication of an account compromise. So, the 3-rd one is YES.
upvoted 2 times
...
...
...
Halwagy
1 year, 10 months ago
the user risk policy is block access N N Y
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago