You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/describe-identity-protection-governance-capabilities/5a-describe-entra-permissions-management.yml
- content: "Your organization has implemented important changes in their customer facing web-based applications. You want to ensure that any user who wishes to access these applications agrees to the legal disclaimers. Which Microsoft Entra feature should you implement?"
18
-
choices:
19
-
- content: "Entitlement management."
20
-
isCorrect: false
21
-
explanation: "Incorrect. Entitlement management automates access request workflows, access assignments, reviews, and expiration but doesn't address the business requirement for users to agree to terms of use."
22
-
- content: "Microsoft Entra Terms of Use."
23
-
isCorrect: true
24
-
explanation: "Correct. Microsoft Entra Terms of Use presents information to users before they access data and can be configured to require users to accept the terms of use."
25
-
- content: "Identity Protection."
26
-
isCorrect: false
27
-
explanation: "Incorrect. Identity Protection is a tool that allows organizations to utilize security signals to identify potential threats."
28
-
29
-
- content: "An organization is project-oriented with employees often working on more than one project at a time. Which solution is best suited to managing user access to this organization’s resources?"
30
-
choices:
31
-
- content: "Microsoft Entra Terms of Use."
32
-
isCorrect: false
33
-
explanation: "Incorrect. Microsoft Entra Terms of Use presents information to users before they access data but doesn't manage access rights."
34
-
- content: "Identity Protection."
35
-
isCorrect: false
36
-
explanation: "Incorrect. Identity Protection is a tool that allows organizations to utilize security signals to identify potential threats."
37
-
- content: "Entitlement management."
38
-
isCorrect: true
39
-
explanation: "Correct. Entitlement management is well suited to handling project-based access needs. Entitlement management automates access requests, access assignments, reviews, and expiration for bundles of resources relevant to a project."
40
-
41
-
- content: "An organization has recently conducted a security audit and found that four people who have left were still active and assigned global admin roles. The users have now been deleted but the IT organization has been asked to recommend a solution to prevent a similar security lapse happening in future. Which solution should they recommend?"
42
-
choices:
43
-
- content: "Entitlement management."
44
-
isCorrect: false
45
-
explanation: "Incorrect. Entitlement management automates access request workflows, access assignments, reviews, and expiration but doesn't prevent users who have left the organization retaining access rights."
46
-
- content: "Privileged Identity Management."
47
-
isCorrect: true
48
-
explanation: "Correct. Privileged Identity Management mitigates the risks of excessive, unnecessary, or misused access permissions."
49
-
- content: "Identity Protection."
50
-
isCorrect: false
51
-
explanation: "Incorrect. Identity Protection allows you to detect identity-based risk but doesn't mitigate the risk of inappropriate privileges being assigned to users who have left the organization."
52
-
53
-
- content: "Your IT organization recently discovered that several user accounts in the finance department have been compromised. The CTO has asked for a solution to reduce the impact of compromised user accounts. The IT admin team is looking into Microsoft Entra features. Which one should they recommend?"
54
-
choices:
55
-
- content: "Identity Protection."
56
-
isCorrect: true
57
-
explanation: "Correct. Microsoft Entra ID Protection helps organizations detect, investigate, and remediate identity-based risks. This includes user risk, the probability that a given identity or account is compromised, and sign-in risk, the probability that a given authentication request isn't authorized by the identity owner."
58
-
- content: "Conditional Access."
59
-
isCorrect: false
60
-
explanation: "Incorrect. Conditional Access policies are used to enforce organizational rules for access."
61
-
- content: "Entitlement management."
62
-
isCorrect: false
63
-
explanation: "Incorrect. Entitlement management is an Azure tool that automates access to the applications and data needed for someone to be productive in a particular project or role."
64
-
65
-
- content: An organization is adopting a multicloud strategy and struggling with managing access permissions. They want to implement least privilege access across their entire infrastructure. What should they do to ensure secure and compliant access to their expanding cloud estate?
explanation: Incorrect. These models can be inconsistent and may not provide the level of control needed for a Zero Trust security strategy.
70
-
- content: Manually review and adjust permissions for each identity and resource on a regular basis.
71
-
isCorrect: false
72
-
explanation: Incorrect. This approach isn't scalable and doesn't provide comprehensive visibility or control over permissions.
73
-
- content: Implement a cloud infrastructure entitlement management (CIEM) product like Microsoft Entra Permissions Management that provides comprehensive visibility and control over permissions for any identity and any resource in Microsoft Azure, Amazon Web Services (AWS) and Google Cloud Platform (GCP).
74
-
isCorrect: true
75
-
explanation: Correct. This product helps organizations address the Zero Trust principle of least privilege access by detecting, automatically right-sizing (remediating), and continuously monitoring unused and excessive permissions.
- content: "Your organization has implemented important changes in their customer facing web-based applications. You want to ensure that any user who wishes to access these applications agrees to the legal disclaimers. Which Microsoft Entra feature should you implement?"
18
+
choices:
19
+
- content: "Entitlement management."
20
+
isCorrect: false
21
+
explanation: "Incorrect. Entitlement management automates access request workflows, access assignments, reviews, and expiration but doesn't address the business requirement for users to agree to terms of use."
22
+
- content: "Microsoft Entra Terms of Use."
23
+
isCorrect: true
24
+
explanation: "Correct. Microsoft Entra Terms of Use presents information to users before they access data and can be configured to require users to accept the terms of use."
25
+
- content: "Identity Protection."
26
+
isCorrect: false
27
+
explanation: "Incorrect. Identity Protection is a tool that allows organizations to utilize security signals to identify potential threats."
28
+
29
+
- content: "An organization is project-oriented with employees often working on more than one project at a time. Which solution is best suited to managing user access to this organization’s resources?"
30
+
choices:
31
+
- content: "Microsoft Entra Terms of Use."
32
+
isCorrect: false
33
+
explanation: "Incorrect. Microsoft Entra Terms of Use presents information to users before they access data but doesn't manage access rights."
34
+
- content: "Identity Protection."
35
+
isCorrect: false
36
+
explanation: "Incorrect. Identity Protection is a tool that allows organizations to utilize security signals to identify potential threats."
37
+
- content: "Entitlement management."
38
+
isCorrect: true
39
+
explanation: "Correct. Entitlement management is well suited to handling project-based access needs. Entitlement management automates access requests, access assignments, reviews, and expiration for bundles of resources relevant to a project."
40
+
41
+
- content: "An organization has recently conducted a security audit and found that four people who have left were still active and assigned global admin roles. The users have now been deleted but the IT organization has been asked to recommend a solution to prevent a similar security lapse happening in future. Which solution should they recommend?"
42
+
choices:
43
+
- content: "Entitlement management."
44
+
isCorrect: false
45
+
explanation: "Incorrect. Entitlement management automates access request workflows, access assignments, reviews, and expiration but doesn't prevent users who have left the organization retaining access rights."
46
+
- content: "Privileged Identity Management."
47
+
isCorrect: true
48
+
explanation: "Correct. Privileged Identity Management mitigates the risks of excessive, unnecessary, or misused access permissions."
49
+
- content: "Identity Protection."
50
+
isCorrect: false
51
+
explanation: "Incorrect. Identity Protection allows you to detect identity-based risk but doesn't mitigate the risk of inappropriate privileges being assigned to users who have left the organization."
52
+
53
+
- content: "Your IT organization recently discovered that several user accounts in the finance department have been compromised. The CTO has asked for a solution to reduce the impact of compromised user accounts. The IT admin team is looking into Microsoft Entra features. Which one should they recommend?"
54
+
choices:
55
+
- content: "Identity Protection."
56
+
isCorrect: true
57
+
explanation: "Correct. Microsoft Entra ID Protection helps organizations detect, investigate, and remediate identity-based risks. This includes user risk, the probability that a given identity or account is compromised, and sign-in risk, the probability that a given authentication request isn't authorized by the identity owner."
58
+
- content: "Conditional Access."
59
+
isCorrect: false
60
+
explanation: "Incorrect. Conditional Access policies are used to enforce organizational rules for access."
61
+
- content: "Entitlement management."
62
+
isCorrect: false
63
+
explanation: "Incorrect. Entitlement management is an Azure tool that automates access to the applications and data needed for someone to be productive in a particular project or role."
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/describe-identity-protection-governance-capabilities/includes/5a-describe-entra-permissions-management.md
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/describe-identity-protection-governance-capabilities/includes/7-summary-resources.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,10 @@
1
-
In this module, you learned how Microsoft Entra ID provides tools to help you protect and govern identities. You learned about identity life-cycle management and how Identity Protection can detect potential identity risks. Finally, you learned how solutions such as access reviews, privileged identity management, and permissions management all help organizations adhere to the concepts of least privilege access, a core principle of a Zero Trust security strategy.
1
+
In this module, you learned how Microsoft Entra ID provides tools to help you protect and govern identities. You learned about identity life-cycle management and how Identity Protection can detect potential identity risks. Finally, you learned how solutions such as access reviews and privileged identity management help organizations adhere to the concepts of least privilege access, a core principle of a Zero Trust security strategy.
2
2
3
3
Now that you've completed this module, you're able to:
4
4
5
5
- Describe the capabilities of Microsoft Entra ID Governance.
6
6
- Describe Privileged Identity Management (PIM).
7
7
- Describe the capabilities of Microsoft Entra ID Protection.
8
-
- Describe permissions management.
9
8
10
9
### Learn more
11
10
@@ -18,5 +17,4 @@ For more information about the topics raised in this module, see:
0 commit comments