exam questions

Exam MS-100 All Questions

View all questions & answers for the MS-100 exam

Exam MS-100 topic 4 question 13 discussion

Actual exam question from Microsoft's MS-100
Question #: 13
Topic #: 4
[All MS-100 Questions]

HOTSPOT -
You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table.

Multi-factor authentication (MFA) is configured to use 131.107.5.0/24 as trusted IPs.
The tenant contains the named locations shown in the following table.

You create a conditional access policy that has the following configurations:
✑ Users and groups assignment: All users
✑ Cloud apps assignment: App1
✑ Conditions: Include all trusted locations
✑ Grant access: Require multi-factor authentication
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

Show Suggested Answer Hide Answer
Suggested Answer:
Box 1: Yes -
131.107.50.10 is in a Trusted Location so the conditional access policy applies. The policy requires MFA. However, User1's MFA status is disabled. The MFA requirement in the conditional access policy will override the user's MFA status of disabled. Therefore, User1 must use MFA.
Box 2: Yes.
131.107.20.15 is in a Trusted Location so the conditional access policy applies. The policy requires MFA so User2 must use MFA.
Box 3: Yes.
131.107.5.5 is an MFA Trusted IP so that counts as a Trusted Location in the conditional access policy. The ג€All Trusted Locationsג€ setting includes MFA Trusted
IPs. Therefore, the conditional access policy applies so User2 must use MFA.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Gus01
Highly Voted 4 years, 2 months ago
3rd Box should be no as IP not from Trusted Location so Policy does not apply Subnet 131.107.5.5 is not in the range of 131.107.50.0/24
upvoted 18 times
mitsios96
3 years, 9 months ago
He is enforced to do so as a user, though
upvoted 2 times
...
J0J0
4 years ago
Regardless, whether that's a typo or what. User2 is enforced to use MFA
upvoted 5 times
Paolo2022
2 years, 7 months ago
You misunderstand the meaning of that status: "Enforced" doesn't imply that trusted IP settings are overruled. And 131.107.5.5 is part of the trusted IP range of 131.107.5.0/24. https://learn.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-userstates#azure-ad-multi-factor-authentication-user-states
upvoted 2 times
...
...
qhuy199
1 year, 5 months ago
If both per-user MFA and Conditional Access policies are configured in the tenant, you will need to add trusted IPs to the Conditional Access policy and update the MFA service settings. >> Trust IP, in this case seem not be refered.
upvoted 1 times
...
rfox321
3 years, 8 months ago
Wrong - When MFA is enforced PER user, it will enforce MFA regardless.
upvoted 3 times
Storm
3 years, 5 months ago
You are so wrong ;-) MFA is enforced exept if user has an IP in a MFA trusted location, in this case 131.107.5.0/24
upvoted 3 times
BoxGhost
3 years, 2 months ago
https://www.petervanderwoude.nl/post/conditional-access-and-named-locations/#:~:text=The%20biggest%20difference%20is%20the,feature%20configuration%20of%20conditional%20access. Trusted IPs is a feature configuration of multi-factor authentication, while named locations is a feature configuration of conditional access.
upvoted 1 times
...
morito
3 years ago
I dont think thats correct. Per this article from microsoft: https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition. Specifically this section: Sign-ins from trusted named locations improve the accuracy of Azure AD Identity Protection's risk calculation, lowering a user's sign-in risk when they authenticate from a location marked as trusted. Additionally, trusted named locations can be targeted in Conditional Access policies.
upvoted 1 times
...
...
...
...
prepre
Highly Voted 4 years, 2 months ago
User 2 has MFA 'ENFORCED' they will always be required to enter it, even if their location doesn't apply to the policy.
upvoted 6 times
One111
2 years, 6 months ago
No, enforced is old status for users who configured MFA method. Enabled is for those who can configure and disabled for those who can't configure. This ca be listed with msol PowerShell or in old mfa console.
upvoted 2 times
...
...
One111
Most Recent 1 year, 9 months ago
3xY All trusted locations This option applies to: All locations marked as trusted locations. MFA Trusted IPs, if configured.
upvoted 1 times
...
justabasicuser
2 years, 2 months ago
"Multi-factor authentication (MFA) is configured to use 131.107.5.0/24 as trusted IPs" Means that the user does not need to use MFA coming from that range. Due to this being a MFA trusted IP and not a CAP trusted location the CAP is not applied. Answer is YYN
upvoted 1 times
...
Feyenoord
2 years, 3 months ago
Because all trusted locations/ip's are included into the CA policy all users have to do MFA. MFA settings per user don't matter anymore. I just tested this scenario.
upvoted 3 times
...
Everlastday
2 years, 5 months ago
On Exam 03.01.2023
upvoted 3 times
...
Startkabels
2 years, 6 months ago
Hahaha, trick question! CA policy includes all users and all trusted IP's, everyone has to use MFA. Stupid question though.
upvoted 4 times
...
bill1982
2 years, 11 months ago
Answer is N,Y,Y All trusted locations are included (not Excluded)- meaning any one from those location and only from those locations will be granted access with condition of Require MFA. if you have IP other than 131.107.5.0/24 rage then this policy will not apply. As for User2, MFA is enabled per user basis so will prompt for MFA regardless of condtional Access policy.
upvoted 4 times
...
Stiobhan
3 years ago
Even though User 1 has MFA disabled, the conditional access policy will still apply and require MFA be used. User 1 will need to sort out the disabled status before accessing App1 (raise a ticket with IT 🤣)
upvoted 1 times
...
Nilz76
3 years, 2 months ago
This question was in my exam on 06/April/2022. I passed.
upvoted 2 times
...
Iamrandom
3 years, 5 months ago
from the documentation: If needed, you can instead enable each account for per-user Azure AD Multi-Factor Authentication. When users are enabled individually, they perform multi-factor authentication each time they sign in (with some exceptions, such as when they sign in from trusted IP addresses or when the remember MFA on trusted devices feature is turned on). https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-userstates so answer 3 is NO. Also, "Enforced" means that the user has completed the MFA Registration process.: from the same link: All users start out Disabled. When you enroll users in per-user Azure AD Multi-Factor Authentication, their state changes to Enabled. When enabled users sign in and complete the registration process, their state changes to Enforced. Administrators may move users between states, including from Enforced to Enabled or Disabled.
upvoted 2 times
...
kanag1
3 years, 5 months ago
The given answer is correct !
upvoted 3 times
...
fko1978
3 years, 9 months ago
If user 2 wasnt enforced to use MFA the 3rd box should say no, but in this case all boxes are yes
upvoted 3 times
Storm
3 years, 5 months ago
Wrong - Multi-factor authentication (MFA) is configured to use 131.107.5.0/24 as trusted IPs.
upvoted 1 times
...
...
Nico95
3 years, 10 months ago
key word on the exhibit is: Conditions: "INCLUDE" all trusted locations That is why answer is YES. Agreed that in general we do configure trusted location to EXCLUDE from being forced to use MFA, but this was not the Q
upvoted 5 times
itmaster
3 years, 2 months ago
trusted locations are only 2. This has nothing to do with trusted IPs in MFA settings
upvoted 1 times
...
...
spg987
3 years, 10 months ago
In exam today
upvoted 5 times
...
Nasser
3 years, 10 months ago
The first box should be NO because the MFA feature is disabled for the user1, even if the conditional policy force him to use MFA, but he couldn't because the MFA is not enabled at the first place
upvoted 3 times
Storm
3 years, 5 months ago
Why comment, when you are just guessing ?
upvoted 2 times
...
...
melatocaroca
4 years, 1 month ago
They do tell use that Named locations have been configured to block not included IP ranges, but to create location you need to include one IP range 1 Open the Azure portal and navigate to Azure Active Directory > Conditional access > Named locations; 2 On the Named locations blade, click New location to open the New blade; 3 On the New blade, provide a Name and IP range, and click Create; https://www.petervanderwoude.nl/post/conditional-access-and-named-locations/ Locations are designated in the Azure portal under Azure Active Directory > Security > Conditional Access > Named locations. These named network locations may include locations like an organization's headquarters network ranges, VPN network ranges, or ranges that you wish to block. Named locations can be defined by IPv4/IPv6 address ranges or by countries. https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition https://docs.microsoft.com/en-us/answers/questions/31819/trusted-locations-mfa-conditional-access-not-apply.html answer should be YES | YES | YES.
upvoted 4 times
josepedroche
2 years, 4 months ago
Agree with You All user (assignment) connecting to App1 (cloudApp) requires MFA (grant Access). Also, we are "including" trusted location (for user 1&2)...We are no excepting the trusted locations...
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...