exam questions

Exam AZ-303 All Questions

View all questions & answers for the AZ-303 exam

Exam AZ-303 topic 6 question 24 discussion

Actual exam question from Microsoft's AZ-303
Question #: 24
Topic #: 6
[All AZ-303 Questions]

You have an Azure Active Directory (Azure AD) tenant.
All administrators must enter a verification code to access the Azure portal.
You need to ensure that the administrators can access the Azure portal only from your on-premises network.
What should you configure?

  • A. the default for all the roles in Azure AD Privileged Identity Management
  • B. an Azure AD Identity Protection user risk policy
  • C. an Azure AD Identity Protection sign-in risk policy
  • D. the multi-factor authentication service settings
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️
References:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Tripp_F
Highly Voted 3 years, 11 months ago
The question states that all administrators MUST enter a MFA code to login, and that they may only login from on-prem. MFA service settings only contains the option to skip MFA for trusted IPs. I believe the answer they're looking for is: C: An Azure AD Identity Protection sign-in risk policy
upvoted 18 times
gizda2
3 years, 7 months ago
This one!
upvoted 3 times
...
...
BoxGhost
Highly Voted 3 years, 10 months ago
The correct solution would be conditional access. All of the answers are wrong. I think there is a typo somewhere, this looks like a duplicate of a previous question where the goal is to prevent users on-premise from being prompted for MFA, in which case D is correct here.
upvoted 10 times
J4U
3 years, 9 months ago
Correct. It should be through CA, require MFA by default and exclude on-prem location. There are no service settings in MFA.
upvoted 1 times
max_n
3 years, 8 months ago
Answer is C Administrators can also choose to create a custom Conditional Access policy including sign-in risk as an assignment condition. Ref: https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-policies
upvoted 3 times
...
...
...
max_n
Most Recent 3 years, 8 months ago
Answer is C Administrators can also choose to create a custom Conditional Access policy including sign-in risk as an assignment condition. Ref: https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-policies
upvoted 1 times
...
syu31svc
3 years, 9 months ago
D is correct the default for all the roles in Azure AD Privileged Identity Management - Privileged Identity Management (PIM) is a service in Azure Active Directory (Azure AD) that enables you to manage, control, and monitor access to important resources in your organization. an Azure AD Identity Protection user risk policy - Identity Protection can calculate what it believes is normal for a user's behavior and use that to base decisions for their risk. an Azure AD Identity Protection sign-in risk policy - Identity Protection analyzes signals from each sign-in, both real-time and offline, and calculates a risk score based on the probability that the sign-in wasn't performed by the user. Administrators can make a decision based on this risk score signal to enforce organizational requirements. Administrators can choose to block access, allow access, or allow access but require multi-factor authentication.
upvoted 2 times
...
certpro
3 years, 10 months ago
Given answer is correct : D : https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings#mfa-service-settings Set TrustedIP through MFA Service settings.
upvoted 7 times
Spooky7
3 years, 7 months ago
This setting is to skip MFA for given IPs range, have nothing to do with not allowing to authenticate outside of that IPs range
upvoted 3 times
...
...
pentium75
3 years, 10 months ago
Something is wrong here. A is nonsense. B, C and D only affect the strength of the logon (like, is second factor required), but they do not prevent logon from untrusted IP completely.
upvoted 1 times
...
rdemontis
3 years, 10 months ago
From the text of the question it seems to want to prevent administrators from accessing from any other location other than the on-premises corporate network. Furthermore, access from the on-premises network must necessarily take place with MFA. Although I don't understand the meaning of this scenario, I don't see how a sign-in risk policy can be applied as the reliability of the origin of access to the azure portal would be calculated by Azure itself and not by us. How does Azure understand that access is from a different network than the corporate one? To do this, you need to configure the location. But at that point what need do we have to use a sign-in risk policy? Just configure Conditions to set up an allowed location and set GRANT to request MFA. So I think D is the correct answer
upvoted 2 times
...
vharsh16
3 years, 11 months ago
Answer is correct, use trusted IP.
upvoted 3 times
...
dummyvm
3 years, 11 months ago
C https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-policies
upvoted 1 times
...
Yiannisthe7th
3 years, 11 months ago
"All administrators must enter a verification code to access the Azure portal". MFA service settings can't achieve it beacuse it bypasses the multi-factor authentication as per MS docs. Seems like Option C is a better choice.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...