exam questions

Exam AZ-103 All Questions

View all questions & answers for the AZ-103 exam

Exam AZ-103 topic 5 question 2 discussion

Actual exam question from Microsoft's AZ-103
Question #: 2
Topic #: 5
[All AZ-103 Questions]

You have an Azure Active Directory (Azure AD) tenant.
All administrators must enter a verification code to access the Azure portal.
You need to ensure that the administrators can access the Azure portal only from your on-premises network.
What should you configure?

  • A. an Azure AD Identity Protection user risk policy.
  • B. the multi-factor authentication service settings.
  • C. the default for all the roles in Azure AD Privileged Identity Management
  • D. an Azure AD Identity Protection sign-in risk policy
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Myfeltf65
Highly Voted 5 years, 2 months ago
D is the correct answer. This is conditional access
upvoted 15 times
certificatores
5 years, 2 months ago
conditional access is supported by Multifactor authentication. so B is correct since it fills both conditions
upvoted 8 times
FrancisFerreira
5 years, 2 months ago
Conditional Access != MFA Even more when the alternative speaks of "MFA Service Settings". In there you can only set a handful of stuff, like App Passwords, Trusted IPs, Athentication Methods, etc. I agree that the answer is somewhere in the scope of Conditional Access, but that doesn't relate to MFA Service Settings whatsoever.
upvoted 3 times
Duvy
5 years, 1 month ago
D definitely correct We need to look at this question systematically. Even though they put the line about requiring MFA to sign in, its irrelevant if you've been blocked from accessing that resource so MFA doesn't even apply until you're on prem and trying to get to the azure portal. The main thing this question is trying to achieve here is blocking the resource. They just through MFA in to confuse or mislead you.
upvoted 2 times
...
...
...
...
1337Troll
Highly Voted 5 years, 2 months ago
Answer D is what is closest to the truth, as some IP restrictions are included inside the sign in risk policy. MFA settings is wrong, you only can set there IPs from where MFA is skipped (trusted locations). See here for sign in policy: https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-risks#sign-in-risk
upvoted 12 times
docent
5 years, 1 month ago
Correct. Trusted IPs only relate to where you have MFA prompt or not, it will not prevent you from logging in. Closest to the truth is D.
upvoted 1 times
...
...
Bill1023
Most Recent 3 years, 4 months ago
Well B should be correct. All administrators much enter verification code ...mean they have MFA which provide verification code. As part of MFA access you can configure which locations can access be allowed from. Sign in risk policy determines a risk score based on where/how sign in happened from . https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection
upvoted 1 times
...
Sten111
4 years, 7 months ago
testing
upvoted 1 times
...
Thi
4 years, 7 months ago
D. an Azure AD Identity Protection sign-in risk policy
upvoted 1 times
...
LeonSKanady
4 years, 8 months ago
It should be D ( an Azure AD Identity Protection sign-in risk policy ) " When configuring location as a condition, organizations can choose to include or exclude locations. These named locations may include the public IPv4 network information, country or region, or even unknown areas that don't map to specific countries or regions. Only IP ranges can be marked as a trusted location. " https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-access-conditions#sign-in-risk
upvoted 1 times
...
root4rise
4 years, 8 months ago
The given answer is correct - B This is about Configuring MFA trusted IPs You can also configure IP address ranges representing your organization's local intranet in the multi-factor authentication service settings. This feature enables you to configure up to 50 IP address ranges. The IP address ranges are in CIDR format. " https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition
upvoted 2 times
...
jjkidd72
4 years, 9 months ago
Answer not in the dang list. 'Conditional Access' policy!
upvoted 2 times
...
cloud_master_boss
4 years, 9 months ago
Sign-in risk policy Identity Protection analyzes signals from each sign-in, both real-time and offline, and calculates a risk score based on the probability that the sign-in wasn't performed by the user. Administrators can make a decision based on this risk score signal to enforce organizational requirements. Administrators can choose to block access, allow access, or allow access but require multi-factor authentication. ans:C
upvoted 1 times
cloud_master_boss
4 years, 9 months ago
I mean ans:D
upvoted 1 times
...
...
_syamantak
4 years, 10 months ago
We need to use Conditional Access Policy to achive both multi-factor authentication (first part of the requirement) and the trusted IP location (second part of the requirement). Under Conditional access, setup a trusted location based on IPs form corporate network. Create a new conditional policy with as below: 1. Users: Administrator group 2. Cloud Apps: Microsoft Azure Management (Portal access) 3. Condition: Choose location -> include the trusted IP 4. Access control: Grant Access with MFA Now, conditional Access is part of Azure Advanced Identity Protection. So acswer should be C.
upvoted 2 times
...
Tenison
4 years, 10 months ago
Given answer B is correct.
upvoted 1 times
...
Shades
4 years, 11 months ago
Sign in Risk policy seems more appropriate because it can trigger the control for Multi Factor authentication if the sign is is detected from outside of the on premise network.
upvoted 1 times
...
Jer0i
4 years, 11 months ago
Correct answer is D. Read this; https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-policies You enforce both MFA & Location based MFA only allows you to set trusted locations, not define locations from which one must login from.
upvoted 2 times
Abdelbj
4 years, 10 months ago
you didn't see this : https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-getstarted#choose-verification-options ? there is a section where you can add trusted IPs (in this case we will add the On-premise network IPs)
upvoted 1 times
...
...
Hanuman
4 years, 11 months ago
Its D because sign-in risk policy supports MFA.
upvoted 1 times
azurelearn
4 years, 11 months ago
no https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition
upvoted 1 times
...
...
remz
4 years, 11 months ago
enabling MFA have nothing to do with restrictions!!!! its D
upvoted 2 times
remz
4 years, 11 months ago
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-policies u choose location from here
upvoted 1 times
...
...
xyz3783
4 years, 11 months ago
Answer is B. MFA Service Settings https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings#:~:text=In%20the%20Azure%20portal%2C%20search,Select%20Mark%20as%20trusted%20location.
upvoted 1 times
SnoopyDog
4 years, 10 months ago
B is correct. https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings Check MFA Service Settings
upvoted 1 times
...
...
Sahul
4 years, 12 months ago
My mistake. B is the right one which is MFA where we can set up Trusted IPs.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...