23 33 answer 40your network contains an on premises

This preview shows page 24 - 27 out of 35 pages.

We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Systems Architecture
The document you are viewing contains questions related to this textbook.
Chapter 12 / Exercise 12
Systems Architecture
Burd
Expert Verified
23/ 33Answer:40.Your network contains an on-premises Active Directory forest. You discover that when users change jobs within your company, the membership of the user group are not updated. As a result the users can resources that are no longer relevant to their job. You plan to integrate Active Directory and Azure Active Directory (Azure AD) by using Azure AD Connect. You need to recommend a solution to ensure that group owners are emailed monthly m** the group membership they manage. What should you include in the recommendation? A. Azure AD Identify Protection B. Tenant Restrictions C. Azure AD access reviews D. conditional access policies Answer:C 41.DRAG DROP You need to design an architecture to capture the creation of users and the assignment of roles. The captured data must be stored in Azure Cosmos DB. Which Azure services should you include in the design? To answer, drag the appropriate services to the correct targets. Each service may be used once. more than once, or not at all. You need to drag the split bar between panes or scroll to view content. NOTE. Each correct selection worth one point.
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Systems Architecture
The document you are viewing contains questions related to this textbook.
Chapter 12 / Exercise 12
Systems Architecture
Burd
Expert Verified
The safer , easier way to help you pass any IT exams.A company named Contoso, Ltd. has an Azure Active Directory (Azure AD) tenant that uses the BAsic license. You plan t deploy two applications to Azure. The application has the requirements shown in the following table. Which authentication Strategy should you recommend for each application? To answer, drag the appropriate authentication strategies to the correct applications. Each authentication strategy may be used once more than once, or not at all. You may need to drag the split bar between panes or scroll to view content NOTE: Each correct selection is worth one point.
25/ 3343.You have an Azure subscription that contains a custom application named Application was developed by an external company named fabric, Ltd. Developers at Fabrikam were assigned role-based access control (RBAV) permissions to the Application components. All users are licensed for the Microsoft 365 E5 plan. You need to recommends a solution to verify whether the Faricak developers still require permissions to Application1. The solution must the following requirements. * To the manager of the developers, send a monthly email message that lists the access permissions to Application1. * If the manager does not verify access permission, automatically revoke that permission. * Minimize development effort. What should you recommend?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture