exam questions

Exam MS-101 All Questions

View all questions & answers for the MS-101 exam

Exam MS-101 topic 2 question 105 discussion

Actual exam question from Microsoft's MS-101
Question #: 105
Topic #: 2
[All MS-101 Questions]

You have a Microsoft 365 E5 subscription.
You need to identify which users accessed Microsoft Office 365 from anonymous IP addresses during the last seven days.
What should you do?

  • A. From the Microsoft 365 Defender portal, view the Threat tracker.
  • B. From the Microsoft 365 admin center, view the Usage report.
  • C. From Microsoft Defender for Cloud Apps, select Users and accounts.
  • D. From the Azure Active Directory admin center, view the Risky sign-ins report.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ilma_nl
Highly Voted 2 years, 9 months ago
answer should be: D Azure active directory risky signs
upvoted 12 times
...
dapkor
Most Recent 1 year, 11 months ago
https://security.microsoft.com/cloudapps/activity-log C
upvoted 2 times
...
Meebler
2 years, 3 months ago
D. From the Azure Active Directory admin center, view the Risky sign-ins report. The Risky sign-ins report in the Azure Active Directory admin center allows you to view information about any sign-ins that are considered high risk. This includes sign-ins from anonymous IP addresses. You can filter the report to show sign-ins from the last seven days and export the data to further analyze it if necessary. Therefore, this is the correct option for identifying which users accessed Microsoft Office 365 from anonymous IP addresses during the last seven days.
upvoted 2 times
EsamiTopici
2 years, 3 months ago
Why not C? he would work also for this task
upvoted 1 times
...
...
den5_pepito83
2 years, 4 months ago
in exam 5.2.2023
upvoted 2 times
...
RNG60FR
2 years, 6 months ago
Selected Answer: D
https://learn.microsoft.com/en-us/azure/active-directory/authentication/tutorial-risk-based-sspr-mfa. Identity protection will show a detection type of "Activity from anonymous IP addresses." and we can select the past time like 7 days as a filter from the Risky sign-ins portal.
upvoted 2 times
...
ServerBrain
2 years, 7 months ago
Selected Answer: C
Well, if the provided link substantiates the answer given, why not go with that? Especially when your suggested answer has no url reference..
upvoted 2 times
dapkor
1 year, 11 months ago
https://security.microsoft.com/cloudapps/activity-log
upvoted 1 times
...
...
JerryZy
2 years, 9 months ago
DDDDD for sure
upvoted 2 times
...
RenegadeOrange
2 years, 9 months ago
Selected Answer: D
Risky sign-ins.
upvoted 1 times
RenegadeOrange
2 years, 9 months ago
Actually you can go to Cloud Apps, Users and Groups, select a user and select the 3 dots and select "view related activity", it then opens the activity log showing where they logged in from with IP address. so both solutions would work.
upvoted 4 times
Jakub2023
2 years, 1 month ago
If this is as you say, then I would always go with the answer provided here. Only choose differently, if there's a compelling reason to assume the given answer is not correct (AND there is a clear indication that another answer is right).
upvoted 1 times
...
...
...
Gloomer
2 years, 9 months ago
Selected Answer: D
D 100%
upvoted 1 times
...
Arlecchino
2 years, 9 months ago
Selected Answer: D
Isn't this D?
upvoted 1 times
...
ajiejeng
2 years, 9 months ago
Selected Answer: D
answer D
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...