CloudPass LogoCloud Pass
AWSGoogle CloudMicrosoftCiscoCompTIADatabricks
Certifications
AWSGoogle CloudMicrosoftCiscoCompTIADatabricks
  1. Cloud Pass
  2. Microsoft
  3. Microsoft SC-300
Microsoft SC-300

Microsoft

Microsoft SC-300

383+ Practice Questions with AI-Verified Answers

Microsoft Identity and Access Administrator

Free questions & answersReal Exam Questions
AI-powered explanationsDetailed Explanation
Real exam-style questionsClosest to the Real Exam
Browse 383+ Questions

AI-Powered

Triple AI-Verified Answers & Explanations

Every Microsoft SC-300 answer is cross-verified by 3 leading AI models to ensure maximum accuracy. Get detailed per-option explanations and in-depth question analysis.

GPT Pro
Claude Opus
Gemini Pro
Per-option explanations
In-depth question analysis
3-model consensus accuracy

Exam Domains

Implement and manage user identitiesWeight 23%
Implement authentication and access managementWeight 28%
Plan and implement workload identitiesWeight 25%
Plan and automate identity governanceWeight 24%

Practice Questions

1
Question 1
(Select 2)

You have an Azure Active Directory (Azure AD) tenant named contoso.com. You plan to bulk invite Azure AD business-to-business (B2B) collaboration users. Which two parameters must you include when you create the bulk invite? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Correct. The email address is required to identify the external recipient and to create/send the B2B invitation. In bulk invite CSV templates, this is the primary required field (often “Invited user email address”). Azure AD uses it to deliver the invitation message and to associate the guest user object with the external identity.

Correct. The redirection URL (invite redirect URL) is required in the bulk invite process to define where the user is sent after redeeming the invitation. This is a standard required column in the Azure portal bulk invite CSV template and aligns with the invitation API concept of an “inviteRedeemUrl/redirect URL” destination.

Incorrect. A username is not a required parameter for B2B bulk invitations. Guest users are primarily identified by their email address, and Azure AD can derive or generate user principal name details for the guest object. You may optionally provide display name, but “username” is not a required bulk invite parameter.

Incorrect. A shared key is not used in Azure AD B2B collaboration invitations. Shared keys are typically associated with network security scenarios (e.g., IPsec pre-shared keys) or certain app secrets, not with inviting guest users to an Entra tenant.

Incorrect. You do not set a password when inviting B2B collaboration users. External users authenticate using their own identity provider (their home Entra tenant, Microsoft account, or federated IdP). Password-based provisioning would apply to creating local member accounts, not B2B guest invitations.

Question Analysis

Core concept: This question tests Azure AD (Microsoft Entra ID) B2B collaboration bulk invitations. Bulk invite is commonly performed via the Azure portal (Bulk invite users) or via Microsoft Graph/PowerShell using a CSV. The goal is to create guest user objects and send invitation emails so external users can redeem and access shared apps/resources. Why the answer is correct: For a bulk invite to work, Azure AD must know (1) who to invite and (2) where to send them after they redeem the invitation. Therefore, the CSV (or request payload) must include the invited user’s email address (the identity used to deliver the invitation and create the guest user) and a redirection URL (often called invite redirect URL) that determines the post-redemption landing page. In the portal CSV template, these map to fields like “Invited user email address” and “Invite redirect URL”. Without the email address, there is no target recipient. Without a redirect URL, the invitation flow lacks a defined destination and the bulk invite creation is not valid per the template requirements. Key features and best practices: B2B invitations create a guest user (UserType=Guest) and can optionally include display name, custom message, and group/app assignment after redemption. Use a redirect URL that is allowed and appropriate (e.g., MyApps, an app URL, or a specific landing page). From a Well-Architected Framework perspective (Security and Operational Excellence), standardize the invitation process (CSV template, automation via Graph), and ensure governance controls like access reviews, entitlement management, and guest restrictions are in place. Common misconceptions: Many assume “username” or “password” is required because they think they are creating a local account. In B2B, the external user authenticates with their own identity provider (Microsoft account, another Entra tenant, federated IdP, etc.), so you do not set a password. “Shared key” is unrelated (more common in VPN/Wi-Fi concepts). Exam tips: For SC-300, remember: B2B guest onboarding is invitation-based. Required fields typically include the invited user’s email and an invite redirect URL. Passwords are not part of B2B invites. Also distinguish B2B collaboration (guests) from B2B direct connect and from creating member users in your tenant.

2
Question 2

You have an Azure Active Directory (Azure AD) tenant that contains a user named SecAdmin1. SecAdmin1 is assigned the Security administrator role. SecAdmin1 reports that she cannot reset passwords from the Azure AD Identity Protection portal. You need to ensure that SecAdmin1 can manage passwords and invalidate sessions on behalf of non-administrative users. The solution must use the principle of least privilege. Which role should you assign to SecAdmin1?

Authentication administrator is the least-privileged role intended for managing authentication-related tasks, including resetting passwords for non-administrative users and managing authentication methods. It aligns with the requirement to remediate user access issues (password reset, session invalidation) without granting broader privileged capabilities over admin accounts.

Helpdesk administrator can reset passwords for many users and perform basic user support tasks, but it is generally broader than required for strictly authentication remediation. In least-privilege scenarios, Microsoft expects you to choose Authentication administrator when the need is specifically password/authentication management rather than general helpdesk user administration.

Privileged authentication administrator can reset passwords and manage authentication for privileged (administrative) accounts as well as non-admins. Because the requirement explicitly limits actions to non-administrative users, this role is more powerful than necessary and violates the principle of least privilege unless admin credential remediation is required.

Security operator is oriented toward security monitoring and operational response (reviewing alerts, investigating security events) and does not provide the directory permissions needed to reset user passwords or revoke sessions. It would not solve the reported inability to perform password-related actions in Identity Protection.

Question Analysis

Core concept: This question tests Microsoft Entra ID (Azure AD) administrative roles and least-privilege delegation for user credential operations, specifically password reset and session revocation. It also touches Identity Protection operational tasks, where some actions require directory roles beyond Security Administrator. Why the answer is correct: To allow SecAdmin1 to reset passwords and invalidate sessions for non-administrative users, the most appropriate least-privileged role is Authentication administrator. This role is designed to manage authentication methods and perform password resets for non-admin users. It also supports actions commonly needed during incident response for standard users, such as forcing sign-in again by revoking refresh tokens (invalidate sessions). Security administrator focuses on security policy and monitoring (including Identity Protection configuration and investigation) but does not inherently grant the ability to reset user passwords. Key features / best practices: Authentication administrator provides targeted permissions for authentication and credential-related tasks without granting broad user management rights. In the Azure Well-Architected Framework (Security pillar), least privilege and separation of duties are key: assign Security Administrator for security policy/alerts and Authentication Administrator for credential remediation. For higher-risk scenarios (e.g., resetting admin passwords), use Privileged Authentication Administrator, ideally via Privileged Identity Management (PIM) with just-in-time activation, approval, and auditing. Common misconceptions: Helpdesk Administrator is often assumed to be the right choice for password resets, but it typically includes broader user management capabilities than necessary and may not align as cleanly with authentication-specific remediation. Privileged Authentication Administrator sounds like the “best” for password tasks, but it is intentionally more powerful (including admin accounts) and violates least privilege for the stated requirement (non-administrative users only). Security Operator is focused on security operations and does not grant password reset rights. Exam tips: When you see “reset passwords” and “invalidate sessions,” think authentication-focused roles. If the scope is non-admin users, choose Authentication administrator. If the scope includes admins or privileged accounts, choose Privileged authentication administrator. Always map the requirement to the smallest role that satisfies it, and remember that Security Administrator does not equal credential administrator.

3
Question 3

You have an Azure Active Directory (Azure AD) tenant that contains the following objects: ✑ A device named Device1 ✑ Users named User1, User2, User3, User4, and User5 ✑ Groups named Group1, Group2, Group3, Group4, and Group5

The groups are configured as shown in the following table.

NameTypeMembership typeMembers
Group1SecurityAssignedUser1, User3, Group2, Group3
Group2SecurityDynamic UserUser2
Group3SecurityDynamic DeviceDevice1
Group4Microsoft 365AssignedUser4
Group5Microsoft 365Dynamic UserUser5

To which groups can you assign a Microsoft Office 365 Enterprise E5 license directly?

Correct. Group1 is a Security group with Assigned membership, which is a supported target for group-based licensing. Group4 is a Microsoft 365 group with Assigned membership, which is also supported for direct license assignment. Both groups are user-oriented and can have Microsoft 365 E5 assigned so that direct user members inherit the license. The other groups are excluded because they use dynamic membership or device-based membership, which are not valid in this scenario.

Incorrect. This option includes Group2, Group3, and Group5, which are not valid targets for direct license assignment in this scenario. Group3 is a Dynamic Device group, and Microsoft 365 E5 is a user license, so device groups are immediately invalid. Group2 and Group5 are dynamic groups, which are not supported here for direct group-based licensing. Because it includes unsupported groups, the option is wrong.

Incorrect. Group1 is valid and Group2 is not. In addition, this option omits Group4, which is a valid Microsoft 365 group with Assigned membership. Since it both includes an unsupported group and excludes a supported one, it cannot be correct.

Incorrect. Group1 is valid, but it is not the only valid group. Group4 is also a supported target because it is a Microsoft 365 group with Assigned membership. Therefore this option is too narrow.

Incorrect. Although Group1 and Group4 are valid, Group2 and Group5 are Dynamic User groups and are not valid for direct license assignment in this scenario. Group3 is correctly excluded, but the inclusion of unsupported dynamic groups still makes the option incorrect. Therefore the full set listed in this option is not valid.

Question Analysis

Core concept: This question tests Microsoft Entra ID (Azure AD) group-based licensing support by group type and membership type. Group-based licensing lets you assign product licenses such as Microsoft 365 E5 to a supported group so eligible user members inherit the license automatically. Why correct: Only groups that are supported for group-based licensing can receive a direct license assignment. In this scenario, Group1 is a Security group with Assigned membership and Group4 is a Microsoft 365 group with Assigned membership, so both are valid targets. Group2 and Group5 use Dynamic User membership, and Group3 uses Dynamic Device membership; these dynamic groups are not valid for direct group-based license assignment. Key features: - Supported targets are user-based groups that Azure AD licensing can process directly. - Assigned Security groups are valid for group-based licensing. - Assigned Microsoft 365 groups are also valid for group-based licensing. - Device-based groups cannot be used because Microsoft 365 E5 is a user license, not a device license. Common misconceptions: - Seeing "Dynamic User" and assuming it is valid because the members are users. The issue is not only member type, but whether that group membership model is supported for direct license assignment. - Assuming all Azure AD group types can be licensed. In practice, exam questions often distinguish assigned groups from unsupported dynamic/device scenarios. - Assuming nested groups matter here. Nested membership does not make an unsupported group type valid for licensing. Exam tips: - First eliminate any device-based group when the license is clearly user-based. - Then verify whether the group type and membership model are supported for group-based licensing. - On SC-300, pay close attention to distinctions between Security vs Microsoft 365 groups and Assigned vs Dynamic membership.

4
Question 4

You have a Microsoft 365 tenant. All users have mobile phones and laptops. The users frequently work from remote locations that do not have Wi-Fi access or mobile phone connectivity. While working from the remote locations, the users connect their laptop to a wired network that has internet access. You plan to implement multi-factor authentication (MFA). Which MFA authentication method can the users use from the remote location?

A verification code from the Microsoft Authenticator app is correct because the app can generate one-time passcodes offline using TOTP. After the app is registered, the code is produced locally on the device and does not require Wi-Fi, mobile data, or cellular service. In this scenario, the user signs in from the laptop using the wired internet connection and enters the code displayed on the phone. This directly satisfies the requirement to use MFA from a remote location where the phone has no connectivity.

Security questions are not an MFA authentication method used for Microsoft 365 sign-in in this scenario. They are generally associated with self-service password reset or account recovery workflows rather than as a standard second factor for authentication. Even if available in some identity-related processes, they do not represent the appropriate MFA method being asked about here. Therefore, they do not meet the requirement for Microsoft 365 MFA access from the remote location.

Voice is incorrect because voice-based MFA requires the user to receive a phone call on their mobile phone or another registered phone number. In the scenario, users are in locations without mobile phone connectivity, so the call cannot be delivered. Unlike Authenticator verification codes, voice authentication depends on real-time telecom network access. As a result, it would fail in the described remote environment.

SMS is incorrect because text-message-based MFA requires cellular connectivity to receive the verification code. The scenario explicitly states that the remote locations do not have mobile phone connectivity, so the SMS message would not arrive. Although the laptop has wired internet access, that does not help the phone receive a text message. Therefore, SMS cannot be relied on as the MFA method in this situation.

Question Analysis

Core concept: This question tests your understanding of which Microsoft Entra ID / Microsoft 365 MFA methods work when users do not have mobile network connectivity or Wi-Fi on their phones, but do have internet access on their laptops through a wired connection. The key is identifying an MFA method that does not depend on receiving a phone call, text message, or a live push notification to the mobile device. Why the answer is correct: A verification code from the Microsoft Authenticator app can be generated offline using time-based one-time password (TOTP) functionality. The app does not need an active internet connection or mobile signal to display these rotating codes once it has already been registered to the user's account. In the scenario, users can sign in on their laptops over the wired internet connection and then enter the code shown in the Authenticator app on their phones. This makes it the only listed option that remains usable when the phone has no Wi-Fi or cellular connectivity. Key features / configurations: - Microsoft Authenticator supports offline verification codes based on TOTP. - Offline code generation works after the app has been enrolled and configured for the user. - SMS-based MFA requires cellular service to receive text messages. - Voice-based MFA requires phone connectivity to receive a call. - Security questions are not a standard MFA method for Microsoft 365 sign-in in this context. - The laptop's internet connectivity is sufficient for the sign-in transaction, while the phone only needs to display the locally generated code. Common misconceptions: - Many candidates confuse Authenticator push notifications with Authenticator verification codes. Push notifications require connectivity, but verification codes do not. - Some assume any phone-based MFA method works as long as the laptop has internet access. That is incorrect because SMS and voice depend on the phone receiving a message or call. - Security questions are often mistaken for a valid MFA option in Microsoft 365 sign-in scenarios, but they are not used here as a standard second factor. - Candidates may overlook that the phone can still be used offline if the method is based on locally generated codes. Exam tips: - Distinguish between online MFA methods and offline-capable MFA methods. - Microsoft Authenticator verification codes can work without phone connectivity. - SMS and voice always require the phone to receive something over a network. - Push notification approval is different from entering a code from the app. - When a question mentions no Wi-Fi or mobile signal on the phone, think offline TOTP code generation.

5
Question 5

You have a Microsoft Exchange organization that uses an SMTP address space of contoso.com. Several users use their contoso.com email address for self-service sign-up to Azure Active Directory (Azure AD). You gain global administrator privileges to the Azure AD tenant that contains the self-signed users. You need to prevent the users from creating user accounts in the contoso.com Azure AD tenant for self-service sign-up to Microsoft 365 services. Which PowerShell cmdlet should you run?

Set-MsolCompanySettings is the correct cmdlet because it modifies tenant-wide company settings in Azure AD. The restriction on email-based self-service sign-up for users in your organization's domain is a company-level control, not a federation or per-domain trust setting. Using this cmdlet allows an administrator to prevent additional contoso.com users from creating unmanaged or self-service accounts tied to Microsoft 365 services. This matches the requirement to stop account creation behavior across the tenant rather than changing how users authenticate.

Set-MsolDomainFederationSettings configures details for a federated domain (issuer URI, sign-in URL, signing certificate, etc.). It controls how authentication is performed for a domain that is already federated, but it does not prevent users from performing self-service sign-up. It’s relevant to AD FS/IdP integration, not blocking viral sign-up behavior.

Update-MsolFederatedDomain is typically used to update federation metadata/certificates for a federated domain (for example, after changing AD FS token-signing certificates). Like other federation cmdlets, it impacts authentication configuration and trust maintenance, not whether users can create accounts through self-service sign-up to Microsoft 365.

Set-MsolDomain manages domain-level properties such as setting a domain as default, changing authentication type (managed/federated), or other domain configuration tasks. While domain configuration is important for identity management, it does not provide the tenant-wide control required to disable self-service sign-up for Microsoft 365 services.

Question Analysis

Core concept: This question tests controlling “self-service sign-up” (also called email-based self-service sign-up) in Microsoft Entra ID. When users sign up with an email in a verified domain (contoso.com), Entra can create unmanaged/viral users in that tenant. Administrators can restrict this behavior using tenant-level authorization policy settings. Why the answer is correct: Update-MgPolicyAuthorizationPolicy is the Microsoft Graph PowerShell cmdlet used to modify the tenant’s Authorization Policy. One of the key controls in this policy is whether users are allowed to create (register) accounts via self-service sign-up for Microsoft 365 and other apps. By updating the authorization policy to disable user sign-up/creation, you prevent additional contoso.com users from creating accounts in that tenant through self-service sign-up. Key features / configurations: - Authorization policy is a tenant-wide control plane for user capabilities (for example, whether users can register apps, invite guests, or perform certain self-service actions). - Disabling self-service sign-up aligns with Azure Well-Architected Framework security principles (reduce attack surface, enforce centralized identity lifecycle, and prevent shadow IT/identity sprawl). - In real environments, this is commonly paired with verified domain ownership, controlled user provisioning (HR-driven or IT-driven), and governance controls (access reviews, lifecycle workflows). Common misconceptions: - Domain settings (Update-MgDomain) manage domain properties (verification, authentication type, etc.) but do not directly toggle self-service sign-up behavior. - Federation configuration (Update-MgDomainFederationConfiguration) affects how users authenticate (federated vs managed) and is not the control for blocking viral sign-ups. - Permission grant policy exclusion (Update-MgPolicyPermissionGrantPolicyExclude) relates to consent and permission grants, not account creation. Exam tips: For SC-300, remember: “self-service sign-up / viral users” is typically controlled by tenant-level policies (Authorization Policy) rather than domain objects. If the question is about preventing users from creating accounts or restricting self-service behaviors, look for authorization policy / user settings controls. If it’s about authentication method (federation/managed), then domain federation cmdlets are relevant.

Want to practice all questions on the go?

Download Cloud Pass — includes practice tests, progress tracking & more.

6
Question 6

You have a Microsoft 365 tenant that uses the domain named fabrikam.com. The Guest invite settings for Azure Active Directory (Azure AD) are configured as shown in the exhibit. (Click the Exhibit tab.)

A user named [email protected] shares a Microsoft SharePoint Online document library to the users shown in the following table. Name Email Description User1 User1@contoso.com A guest user in fabrikam.com User2 User2@outlook.com A user who has never accessed resources in fabrikam.com User3 User3@fabrikam.com A user in fabrikam.com Which users will be emailed a passcode?

Part 1:

Admins and users in the guest inviter role can invite

Admins and users in the Guest Inviter role can invite: Yes. In Azure AD External Identities, the “Guest invite settings” include an option that explicitly allows administrators and users assigned the Guest Inviter role to invite external users. This is a common baseline configuration because it limits who can create guest accounts while still enabling delegated invitations without requiring full admin rights. Why not No? If this were set to No, only admins (or potentially no one, depending on the configuration) could invite, and the Guest Inviter role would be ineffective for invitations. In most exam exhibits for this question type, the setting is enabled, and the presence of the Guest Inviter role in the statement implies it is permitted. Practical impact: With this enabled, a user sharing from SharePoint can trigger a B2B invitation only if they are an admin or have the Guest Inviter role (or if other invite settings also allow members/guests).

Part 2:

Members can invite

Members can invite: No. This setting controls whether standard member users (regular internal users) can invite external guests into the directory. When set to No, only admins and/or users in the Guest Inviter role can invite. This is a common security posture aligned with least privilege (Azure Well-Architected Framework: Security pillar), because uncontrolled guest invitations can increase risk (data oversharing, unmanaged external identities). Why not Yes? If members could invite, then any internal user could create guest accounts simply by sharing content externally, which is often restricted in regulated environments. The question’s scenario focuses on guest invite settings and passcodes, and typically the exhibit for such questions shows members are not allowed to invite. Operational note: Even if SharePoint sharing is enabled, Azure AD guest invitation policy can still block the creation of new guest objects by members, preventing external sharing that relies on new guest invitations.

Part 3:

Guests can invite

Guests can invite: No. This setting determines whether existing guest users can invite additional external users. In most organizations, this is disabled to prevent “viral” growth of external access and to keep governance controls (access reviews, entitlement management, sponsorship) manageable. Why not Yes? Allowing guests to invite other guests can create a chain of external access that is harder to audit and govern, and it can bypass intended business approval processes. For SC-300, the expected best practice is that guests should not be able to invite unless there is a specific collaboration requirement and compensating controls. Effect on the scenario: This setting doesn’t directly decide who gets an email passcode, but it affects whether certain users are even able to initiate invitations/sharing that creates new guest accounts.

Part 4:

Email One-Time Passcode for guests

When enabled, Email one-time passcode (OTP) lets Azure AD authenticate B2B guest users who do not have another supported identity provider. It is intended for users who cannot sign in with an Azure AD account, a federated identity, or a Microsoft account. Therefore, an Outlook.com user would normally authenticate with their Microsoft account rather than receive an email OTP. This setting being enabled is still correctly identified as Yes, but it does not mean every external user will be sent a passcode.

Part 5:

Enable guest self-service sign up via user flows (Preview)

Enable guest self-service sign up via user flows (Preview): No. This setting relates to Azure AD External Identities self-service sign-up using user flows (a capability associated with External Identities/B2C-style experiences). It is separate from standard B2B invitation and SharePoint sharing flows. In many Microsoft 365 tenant configurations, this preview feature is not enabled by default and is often shown as disabled in exam exhibits. Why not Yes? Enabling it would allow certain self-service sign-up experiences for external users through user flows, but it is not required for SharePoint external sharing invitations. The question’s focus is on guest invite settings and Email OTP, not on building user flows. Exam tip: Don’t confuse “self-service sign-up via user flows” with “Email one-time passcode.” OTP is an authentication fallback for B2B; user flows are a separate external identity onboarding mechanism.

7
Question 7

You have 2,500 users who are assigned Microsoft Office 365 Enterprise E3 licenses. The licenses are assigned to individual users. From the Groups blade in the Azure Active Directory admin center, you assign Microsoft 365 Enterprise E5 licenses to the users. You need to remove the Office 365 Enterprise E3 licenses from the users by using the least amount of administrative effort. What should you use?

The Identity Governance blade is used for features such as entitlement management, access reviews, and lifecycle-based access control. It is not intended for bulk removal of Microsoft 365 product licenses from users. Although Identity Governance helps manage who should have access to resources, it does not provide the direct licensing administration capabilities needed in this scenario. Therefore, it does not meet the requirement for efficiently removing Office 365 Enterprise E3 licenses.

The Set-AzureAdUser cmdlet is not the appropriate tool for removing Microsoft 365 license assignments. User license management in Azure AD typically requires license-specific cmdlets or portal-based licensing tools rather than a generic user property modification cmdlet. Even if PowerShell were used, handling 2,500 users through scripting would generally involve more effort and complexity than using the Licenses blade. Since the question asks for the least administrative effort, this is not the best answer.

The Licenses blade in the Azure Active Directory admin center is the correct choice because it is designed for centralized management of product licenses across the tenant. It allows administrators to review license assignments by SKU and identify whether licenses are assigned directly or through groups. In this scenario, where 2,500 users already have direct Office 365 Enterprise E3 assignments, the Licenses blade provides the most efficient way to remove those assignments without handling each user individually. This aligns with the requirement to use the least amount of administrative effort.

The Set-WindowsProductKey cmdlet is unrelated to Azure AD or Microsoft 365 user licensing. It is used for Windows operating system activation and product key management, not for assigning or removing Office 365 or Microsoft 365 subscription licenses. This option does nothing to manage Azure AD user license assignments. As a result, it is clearly not suitable for the scenario.

Question Analysis

Core concept: This question tests knowledge of Azure Active Directory (Microsoft Entra ID) license management, specifically how to efficiently remove directly assigned user licenses after assigning licenses through a group-based licensing model. It focuses on choosing the administrative method that minimizes manual effort for a large number of users. Why the answer is correct: The users currently have Office 365 Enterprise E3 licenses assigned directly to individual accounts, and they were later assigned Microsoft 365 Enterprise E5 licenses through the Groups blade using group-based licensing. To remove the old directly assigned E3 licenses from many users with the least administrative effort, the appropriate tool is the Licenses blade in the Azure Active Directory admin center. The Licenses blade provides centralized visibility into which users and groups have a given SKU assigned and allows administrators to manage and remove direct license assignments at scale. This is much more efficient than modifying users one by one with PowerShell. Key features / configurations: - Azure AD / Microsoft Entra ID Licenses blade provides tenant-wide license management. - It shows which products are assigned directly versus through groups. - Group-based licensing simplifies ongoing license assignment for large user populations. - Direct-assigned licenses can be reviewed and removed centrally from the licensing interface. - Microsoft 365 Enterprise E5 includes services that overlap with Office 365 Enterprise E3, so retaining both may be unnecessary and waste licenses. Common misconceptions: - Candidates often confuse group-based license assignment with automatic removal of older direct licenses. Assigning a new license through a group does not automatically remove an existing direct assignment. - Some assume PowerShell is always the best answer for bulk administration, but exam questions that emphasize least administrative effort often favor a built-in portal feature designed for centralized management. - Identity Governance is related to access lifecycle, entitlement management, and access reviews, not bulk removal of product licenses. - Set-WindowsProductKey is unrelated because it manages Windows product keys, not Microsoft 365 or Azure AD user licensing. Exam tips: - If the question asks for the least administrative effort, prefer built-in bulk management features over per-user scripting when available. - Use the Licenses blade for centralized Microsoft 365/Azure AD license administration. - Remember that group-based licensing assigns licenses, but old direct assignments may still need separate cleanup. - Distinguish between identity lifecycle tools and licensing tools. - Eliminate obviously unrelated cmdlets or services by checking whether they operate on Azure AD user licenses.

8
Question 8

HOTSPOT - You have a Microsoft 365 tenant named contoso.com. Guest user access is enabled. Users are invited to collaborate with contoso.com as shown in the following table.

From the External collaboration settings in the Azure Active Directory admin center, you configure the Collaboration restrictions settings as shown in the following exhibit.

From a Microsoft SharePoint Online site, a user invites [email protected] to the site. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. Hot Area:

Part 1:

User with email User1@outlook.com has the user type Guest and has not accepted the invitation to the Enterprise application.

Yes. User1@outlook.com is in the Outlook.com domain, which is explicitly included in the tenant’s Collaboration restrictions allow list ("Allow invitations only to the specified domains"). Therefore, inviting User1 is permitted and the guest object can exist in the directory even if the user has not yet redeemed (accepted) the invitation. The important distinction is between (1) being invited/created as a Guest user in the directory and (2) redeeming the invitation. A guest can appear with userType=Guest before acceptance; however, until redemption, the user typically cannot complete sign-in to access assigned resources. The restriction setting does not prevent the guest object from existing for an allowed domain; it only blocks invitations to non-allowed domains.

Part 2:

User with email User2@fabrikam.com has the user type Guest and has accepted the invitation to the Enterprise application.

No. With "Allow invitations only to the specified domains" and only Outlook.com listed, invitations to fabrikam.com are not allowed. That means a new invitation to User2@fabrikam.com should be blocked, and the user should not be able to newly accept an invitation under this restriction. In many exam scenarios, if a fabrikam.com guest is described as already accepted, that would only be possible if the guest was invited and redeemed before the restriction was put in place, or if another mechanism created the guest. But based on the configuration shown and the intent of the question, fabrikam.com is not an allowed domain for invitations, so the statement as presented should be treated as not true under the current restrictions.

Part 3:

Select the correct answer(s) in the image below.

question-image

Pass. The image indicates the tenant is set to the most restrictive option: "Allow invitations only to the specified domains" and the specified/target domain shown is Outlook.com. This is the critical control that drives the rest of the answers: Outlook.com addresses can be invited; other domains cannot be invited. On SC-300, when you see this setting, immediately map it to: allowed domains = can invite; all other domains = invitation blocked. Then evaluate each user’s email domain and whether they are a new invite versus an already-existing guest. That approach is exactly what is needed to answer the remaining sub-questions.

Part 4:

User1 can accept the invitation and gain access to the enterprise application.

Yes. Because User1@outlook.com is in the allowed domain list, the invitation can be sent and the user can redeem (accept) it. After acceptance, the guest can authenticate in your tenant and, if assigned/authorized, access the enterprise application. Collaboration restrictions do not prevent acceptance for allowed domains; they are designed to prevent inviting (and typically redeeming) users from non-approved domains. Assuming the enterprise application assignment (or group assignment) is in place and there are no additional blocks (Conditional Access, user disabled, etc.), User1 should be able to accept and then gain access.

Part 5:

User2 can access the enterprise application.

No. The correct answer is No only if User2 was never able to become a valid redeemed guest under the scenario being evaluated. However, collaboration restrictions primarily control whether new B2B invitations can be sent to specific domains; they do not automatically revoke access for guests who already exist in the directory and have already redeemed an invitation. If User2@fabrikam.com had already accepted the invitation before the restriction was configured, User2 could typically still access the enterprise application if permissions remained assigned. Therefore, the reason should not be that the current allow list by itself blocks an already accepted guest from signing in. The explanation must distinguish between blocking new invitations and revoking existing guest access.

Part 6:

User3 can accept the invitation and gain access to the SharePoint site.

No. The External collaboration setting is configured to allow invitations only to the specified domains, and the only allowed domain shown is Outlook.com. Therefore, only guests with an Outlook.com email address can be newly invited and redeem invitations. Because this statement is about User3 rather than User1, and User3 is not the Outlook.com guest referenced in the scenario, User3 would not be able to accept the invitation unless User3's domain were also on the allow list. The current explanation is incorrect because it answers for User1 instead of User3 and does not evaluate User3's eligibility under the restriction.

9
Question 9

DRAG DROP - You have an on-premises Microsoft Exchange organization that uses an SMTP address space of contoso.com. You discover that users use their email address for self-service sign-up to Microsoft 365 services. You need to gain global administrator privileges to the Azure Active Directory (Azure AD) tenant that contains the self-signed users. Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. Select and Place:

Part 1:

Select the correct answer(s) in the image below.

question-image

Pass. The correct sequence to gain global admin in a self-service (unmanaged/viral) tenant is the admin takeover process: 1) Create a self-signed user account in the Azure AD tenant (a user in the unmanaged tenant using contoso.com). 2) Sign in to the Microsoft 365 admin center with that user. 3) Respond to the “Become the admin” message (this initiates takeover and prompts for domain verification). 4) Create a TXT record in the contoso.com DNS zone to prove domain ownership and complete verification. Why other listed actions are wrong/not needed: “Add the domain name” in the admin center is typically part of managed tenant setup, but in takeover the domain is already present in the tenant; the critical step is verifying ownership via the TXT record prompted by the takeover flow. “Remove the domain name” is unrelated and would not grant admin rights; it could also disrupt users/services.

10
Question 10

HOTSPOT - You have an Azure Active Directory (Azure AD) tenant that contains a group named Group3 and an administrative unit named Department1. Department1 has the users shown in the Users exhibit. (Click the Users tab.)

diagram

Department1 has the groups shown in the Groups exhibit. (Click the Groups tab.)

Department1 has the user administrator assignments shown in the Assignments exhibit. (Click the Assignments tab.)

diagram

The members of Group2 are shown in the Group2 exhibit. (Click the Group2 tab.)

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. Hot Area:

Part 1:

Select the correct answer(s) in the image below.

question-image

The Groups exhibit shows that Department1 contains Group1 and Group2. This matters because an administrative unit-scoped User Administrator can manage groups that are members of that administrative unit. The image is not asking a meta Pass/Fail question in the original exam context; it is simply supporting evidence for the later statements. Therefore, the current treatment as a meta-check is incorrect.

Part 2:

Select the correct answer(s) in the image below.

question-image

The Group2 exhibit shows that User3 and User4 are direct members of Group2. This is important because membership in a group that belongs to an administrative unit does not automatically make those users members of the administrative unit itself. The image is supporting context for evaluating Admin1's scope, not a separate Pass/Fail knowledge check. Therefore, the current treatment as a meta-check is incorrect.

Part 3:

Admin1 can reset the passwords of User3 and User4.

Admin1 has the User Administrator role scoped only to the Department1 administrative unit. Department1 contains User1 and User2 as users, but User3 and User4 appear only as members of Group2 and are not shown as members of the administrative unit. Administrative unit membership is separate from group membership, so being inside Group2 does not place User3 or User4 in Department1. Therefore, Admin1 cannot reset the passwords of User3 and User4, so the correct answer is No.

Part 4:

Admin1 can add User1 to Group 2.

Admin1 is a User Administrator scoped to Department1, and Group2 is a group contained in that administrative unit. A User Administrator scoped to an administrative unit can manage the groups within that unit, including updating membership for those groups. User1 is also in Department1, so both the target group and the user being added are within the administrative unit's scope. Therefore, Admin1 can add User1 to Group2, so the correct answer is Yes.

Part 5:

Admin 2 can reset the password of User1.

Admin2 has the User Administrator role with Directory scope, which applies across the entire Azure AD tenant. Directory-scoped assignments are not limited by administrative unit boundaries. Since User1 is a normal user in the tenant and there is no indication of a protected privileged role, Admin2 can reset User1's password. Therefore, the correct answer is Yes.

Want to practice all questions on the go?

Download Cloud Pass — includes practice tests, progress tracking & more.

11
Question 11

You configure Azure Active Directory (Azure AD) Password Protection as shown in the exhibit. (Click the Exhibit tab.)

You are evaluating the following passwords: ✑ Pr0jectlitw@re ✑ T@ilw1nd ✑ C0nt0s0 Which passwords will be blocked?

Part 1:

Select the correct answer(s) in the image below.

question-image

A is correct because, with the configuration shown, the evaluated passwords will be blocked by Azure AD Password Protection. Why they are blocked: - "Pr0jectlitw@re" contains two banned terms with common substitutions: "Pr0ject" matches the banned word "project" (0→o, case-insensitive), and "litw@re" matches "Litware" (@→a). Azure AD Password Protection’s fuzzy matching is designed to catch exactly these patterns. - "T@ilw1nd" is a leet variation of "Tailwind" (@→a, 1→i). This is a close match to the banned term "Tailwind". - "C0nt0s0" is a leet variation of "Contoso" (0→o). This is a close match to the banned term "Contoso". Why "Fail" is wrong: the exhibit clearly shows Enforce custom list = Yes and Mode = Enforced, so these passwords are not merely logged; they are actively rejected.

12
Question 12

Your company has a Microsoft 365 tenant. The company has a call center that contains 300 users. In the call center, the users share desktop computers and might use a different computer every day. The call center computers are NOT configured for biometric identification. The users are prohibited from having a mobile phone in the call center. You need to require multi-factor authentication (MFA) for the call center users when they access Microsoft 365 services. What should you include in the solution?

A named network location is an IP-based Conditional Access condition (trusted location) used to include/exclude networks or bypass MFA on corporate ranges. It does not provide MFA by itself and cannot satisfy a requirement to “require MFA.” It’s useful to reduce prompts or restrict access to the call center network, but you still need an actual MFA method (e.g., FIDO2) to complete MFA challenges.

Microsoft Authenticator is a common MFA method (push notifications, OTP, passwordless), but it requires a mobile phone. The scenario explicitly prohibits mobile phones in the call center, making this option infeasible. Even if users had phones outside the call center, they would be unable to complete MFA while working, leading to lockouts and operational issues.

Windows Hello for Business is a strong authentication method tied to a specific device and typically uses biometrics or a device PIN backed by TPM keys. In a shared-desktop environment where users switch computers daily and the PCs are not configured for biometrics, WHfB is not practical. It also generally requires device enrollment and per-user provisioning on each device, which is operationally heavy for 300 rotating users.

FIDO2 tokens (security keys) are ideal for shared workstations and restricted environments. They provide phishing-resistant MFA without phones or biometrics, and users can authenticate on any compatible computer by inserting the key and using a PIN/touch. They integrate with Microsoft Entra ID authentication methods and can be enforced via Conditional Access for Microsoft 365 access, meeting the requirement reliably.

Question Analysis

Core concept: This question tests selecting an MFA method that works under strict environmental constraints and aligns with Microsoft Entra ID (Azure AD) authentication methods and Conditional Access. The scenario is a shared-device call center with no biometrics and no mobile phones, but MFA is required for Microsoft 365. Why the answer is correct: FIDO2 security keys (tokens) provide strong, phishing-resistant MFA without requiring a phone or a specific PC. Each user can carry a hardware key, plug it into any shared desktop (USB-A/USB-C/NFC depending on the key and device), and complete MFA using a PIN or touch. This fits the call center model where users rotate computers daily and cannot use mobile devices. It also avoids biometrics (which are not available) while still enabling a modern, high-assurance factor. Key features / configuration points: - Enable FIDO2 security key authentication method in Microsoft Entra ID. - Register keys per user (self-service registration or assisted enrollment). - Use Conditional Access to require MFA for the call center user group when accessing Microsoft 365 cloud apps. - Prefer phishing-resistant authentication (often a CA authentication strength policy) to reduce token theft and MFA fatigue attacks. - Operationally, maintain spare keys and a secure issuance/revocation process (identity governance best practice). Common misconceptions: A named network location is not an MFA method; it is a Conditional Access signal used to trust or restrict access by IP ranges. It can reduce MFA prompts (e.g., bypass MFA on trusted networks) but cannot satisfy “require MFA” by itself. Microsoft Authenticator requires a mobile device, which is prohibited. Windows Hello for Business typically relies on device-bound keys and commonly uses biometrics or a PIN on a specific enrolled device; it is not suitable for users roaming across shared desktops without biometric configuration. Exam tips: When you see “no phones” and “shared PCs,” think hardware-based methods like FIDO2. Also distinguish between “signals/conditions” (named locations) and “authentication methods” (Authenticator, WHfB, FIDO2). For Microsoft 365 access, the enforcement mechanism is usually Conditional Access, but the question asks what to include to meet MFA under the constraints—so choose the viable factor.

13
Question 13

HOTSPOT - You have a custom cloud app named App1 that is registered in Azure Active Directory (Azure AD). App1 is configured as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point. Hot Area:

Part 1:

Select the correct answer(s) in the image below.

question-image

The image shows the key enterprise application settings for App1: Enabled for users to sign-in is set to Yes, User assignment required is set to No, and Visible to users is set to Yes. These settings are sufficient to determine both who can access the app and whether it appears in user-facing portals. Because the screenshot clearly provides the needed configuration values, the item is answerable from the exhibit alone. The selected response is therefore appropriate.

Part 2:

[answer choice] can access App1 from the homepage URL.

All users can access App1 from the homepage URL. Reasoning: In an Enterprise application, “User assignment required?” determines whether users must be explicitly assigned to the app to sign in. The exhibit shows User assignment required = No. That means any user in the tenant can attempt to access/sign in to the application (for example by navigating directly to the homepage URL or initiating an OAuth/SAML sign-in), assuming no other restrictions (Conditional Access, app roles enforced by the app itself, etc.). Why the other options are wrong: - No one: incorrect because sign-in is enabled and assignment is not required. - Only Owners: owners manage the app registration/enterprise app but are not the only users who can sign in when assignment isn’t required. - Only Users and groups: that would be true only if User assignment required were set to Yes.

Part 3:

App1 will appear in the Microsoft Office 365 app launcher for [answer choice].

App1 will appear in the Microsoft Office 365 app launcher for all users. Reasoning: App tiles appear for users who both (1) have access to the app and (2) the app is set to be visible. The exhibit shows Visible to users? = Yes, which allows the app to be shown in user-facing portals. Because User assignment required = No, all users effectively have access without needing explicit assignment. Therefore, the app can appear for all users in the Microsoft 365 app launcher (and similarly in My Apps). Why the other options are wrong: - No one: would be true if Visible to users were No or if sign-in were disabled. - Only Owners: ownership doesn’t control launcher visibility. - Only Users and groups: would apply if assignment were required; it is not in this configuration.

14
Question 14

HOTSPOT - You have an Azure Active Directory (Azure AD) tenant that contains a user named User1 and the groups shown in the following table.

In the tenant, you create the groups shown in the following table.

diagram

Which members can you add to GroupA and GroupB? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Hot Area:

Part 1:

Group1 has Membership type Assigned.

Yes. A group with Membership type Assigned supports direct, manual membership management. That means you can add eligible directory objects as members (subject to the group’s type constraints). For a Security group with Assigned membership, you can add users, devices, and (importantly for this scenario) other security groups as nested members. This is commonly used to simplify access assignments (for example, assigning a nested security group to an Azure role or an enterprise application). Why not “No”: “No” would be correct only if the membership type were Dynamic User or Dynamic Device, because dynamic groups do not allow manual additions/removals—membership is computed from the dynamic rule. Since Group1 is explicitly stated as Assigned, it is eligible to be added where group nesting is supported (for example, into another Security group).

Part 2:

Group2 has Membership type Dynamic User.

No. A group with Membership type Dynamic User cannot be added as a member to another group in the way an assigned security group can be nested. Dynamic groups are rule-driven containers: their membership is calculated automatically based on user attributes, and they are not intended to be used as nested members in other groups. Additionally, dynamic groups have restrictions around what they can contain and how they are managed: you cannot manually add members to a dynamic group, and you generally cannot use a dynamic group itself as a “member object” inside another group to create nested membership. For exam purposes, treat dynamic groups as non-nestable membership sources. Therefore, selecting “No” reflects the platform constraint and avoids assuming you can nest a dynamic user group inside another group to indirectly grant access.

Part 3:

Group3 has Membership type Dynamic Device.

No. A group with Membership type Dynamic Device is also rule-based and is not used as a nested member inside other groups. Dynamic Device groups are evaluated based on device attributes (for example, deviceOSType, deviceOwnership, or extension attributes) and automatically include devices that match the rule. Because the group’s membership is computed, Azure AD does not support treating the dynamic device group itself as a member object to be added into another group for nesting scenarios. Also, even if a target group supports devices as members, that is different from adding a device object directly; it does not imply you can add a dynamic device group as a nested group. So the correct choice is “No” to reflect that dynamic groups are not eligible for nesting as members.

Part 4:

Group4 has Membership type Assigned.

Yes. Group4 has Membership type Assigned, which means it is a manually managed group and can be added as a member where the target group type supports group nesting. In Azure AD, assigned Security groups are the primary group type that supports nesting (security group inside another security group). This is a common operational pattern: you create role-based or application-based security groups and then nest departmental or functional security groups inside them to reduce administrative effort and align with least privilege. Why not “No”: “No” would apply if Group4 were dynamic (user/device) or if the target group type did not support groups as members (for example, Microsoft 365 groups). But the question here is only whether an Assigned group is eligible in principle—so “Yes” is correct.

Part 5:

GroupA: ______

GroupA is a Security group with Assigned membership. Security groups support adding users and (nested) security groups as members. From the options provided, you can add: - User1 (a user object) - Group1 (Assigned security group) - Group4 (Assigned security group) You cannot add Group2 (Dynamic User) or Group3 (Dynamic Device) as nested members because dynamic groups are rule-driven and not supported as nested group members. Therefore, the correct set is “User1, Group1, and Group4 only” (Option D). Other options are wrong because they include Group2 and/or Group3, which are dynamic groups and not eligible to be added as members to GroupA.

Part 6:

GroupB: ______

GroupB is a Microsoft 365 group with Assigned membership. Microsoft 365 groups are collaboration groups (used by Teams, Outlook groups, SharePoint, Planner) and do not support adding other groups as members (no nested groups). Membership is intended to be individual users (and potentially guests), not groups. So, from the candidate objects listed (User1 and Group1/Group2/Group3/Group4), only User1 can be added directly as a member. Even though Group1 and Group4 are Assigned, and even though GroupA (security) would allow nesting, Microsoft 365 groups do not. Hence the correct answer is “User1 only” (Option A). All other options are incorrect because they include one or more groups as members of a Microsoft 365 group, which is not supported.

15
Question 15

You have a Microsoft 365 tenant. All users have computers that run Windows 10. Most computers are company-owned and joined to Azure Active Directory (Azure AD). Some computers are user- owned and are only registered in Azure AD. You need to prevent users who connect to Microsoft SharePoint Online on their user-owned computer from downloading or syncing files. Other users must NOT be restricted. Which policy type should you create?

Incorrect. A Defender for Cloud Apps (MCAS) activity policy with Office 365 governance actions is primarily for responding to detected activities (e.g., after a file is shared externally) and applying governance actions like suspend user or revoke sessions. It is not the primary mechanism to preemptively prevent SharePoint Online downloads/sync based on device ownership/state during the session.

Correct. An Azure AD Conditional Access policy with session controls (Conditional Access App Control) integrates with Defender for Cloud Apps to enforce real-time controls in SharePoint Online. This enables “block download/sync on unmanaged devices” while still allowing browser access. You can scope the policy to specific users/groups and exclude others, meeting the requirement that only user-owned (unmanaged) devices are restricted.

Incorrect. Client apps conditions in Conditional Access help control which client types can authenticate (browser, mobile/desktop apps) and can block legacy authentication. However, they do not provide the granular capability to allow SharePoint access yet prevent downloading or syncing files specifically on unmanaged devices. That action-level control is achieved via session controls with Defender for Cloud Apps.

Incorrect. An app discovery policy in Defender for Cloud Apps is used to discover and assess cloud apps in use (Shadow IT) based on traffic logs from network devices. Governance actions here relate to app management/discovery workflows, not enforcing SharePoint Online session restrictions like blocking downloads/sync for unmanaged devices.

Question Analysis

Core concept: This question tests Azure AD Conditional Access (CA) with session controls (Microsoft Defender for Cloud Apps integration) to enforce real-time restrictions in SharePoint Online based on device state (managed vs unmanaged). In Microsoft 365, “block download/sync on unmanaged devices” is implemented via CA session controls, not by simply blocking the app. Why the answer is correct: You have two device populations: company-owned Azure AD joined (managed/trusted) and user-owned Azure AD registered (unmanaged). The requirement is to prevent download/sync only when users access SharePoint Online from user-owned/unmanaged devices, while not restricting others. A CA policy can target SharePoint Online (and optionally OneDrive) and apply conditions such as Device state (e.g., require device to be marked compliant or Hybrid/Azure AD joined) and then use session controls to enforce “Use Conditional Access App Control.” With Defender for Cloud Apps, you can apply the “Block download” control for SharePoint Online sessions on unmanaged devices while still allowing web access (view/edit in browser). This aligns with Zero Trust and Azure Well-Architected security principles: least privilege and conditional, risk-based access. Key features / configuration notes: - Create a CA policy scoped to SharePoint Online (and OneDrive if needed). - Assign to the relevant users/groups (exclude users who must not be restricted). - Conditions: include all device platforms as needed; use device filters or require “device to be marked as compliant” to distinguish managed vs unmanaged. - Access controls: typically allow access. - Session controls: enable “Use Conditional Access App Control” and configure Defender for Cloud Apps session policy to block download/sync on unmanaged devices. Common misconceptions: Many assume “client apps conditions” can block sync/download. Client apps conditions can restrict legacy auth or specific client types, but they don’t provide granular “allow web but block download” behavior. Also, Cloud App Security activity/app discovery policies are for detection/governance after events or for discovering apps via logs, not for enforcing SharePoint session download restrictions in real time. Exam tips: If the requirement is “allow access but restrict actions (download, copy, print) in SaaS,” think CA session controls + Defender for Cloud Apps (Conditional Access App Control). If the requirement is simply “block access,” standard CA grant controls may suffice. Always map “unmanaged device” to “not compliant/not joined” and use exclusions to avoid impacting other users.

Want to practice all questions on the go?

Download Cloud Pass — includes practice tests, progress tracking & more.

16
Question 16

You have an Azure Active Directory (Azure AD) tenant named contoso.com. All users who run applications registered in Azure AD are subject to conditional access policies. You need to prevent the users from using legacy authentication. What should you include in the conditional access policies to filter out legacy authentication attempts?

Cloud apps or actions determines which resource(s) the policy applies to (e.g., Exchange Online, SharePoint, Azure management). While you can target Exchange Online to reduce exposure, this condition does not identify whether the sign-in used legacy/basic authentication. You still need Client apps to distinguish legacy protocols from modern authentication flows.

User risk is an Entra ID Identity Protection signal indicating the likelihood that a user account is compromised (based on detections like leaked credentials). It is useful for requiring password change or blocking high-risk users, but it does not classify authentication methods or protocols, so it can’t specifically filter legacy authentication attempts.

Client apps is the correct condition to filter legacy authentication attempts. By selecting “Other clients” (and optionally “Exchange ActiveSync clients”), you target sign-ins using legacy/basic authentication protocols that don’t support modern auth. You can then block access, effectively preventing users from using legacy authentication across the targeted apps.

Sign-in risk is an Identity Protection signal about the risk level of a particular sign-in (e.g., unfamiliar location, atypical travel, anonymous IP). It helps drive adaptive access decisions like requiring MFA or blocking risky sign-ins. However, it does not detect whether the client used legacy/basic authentication, so it’s not the right filter.

Question Analysis

Core concept: This question tests Microsoft Entra ID (Azure AD) Conditional Access conditions used to detect and control legacy authentication. Legacy authentication refers to older client protocols that don’t support modern authentication (OAuth 2.0/OpenID Connect) and therefore can’t enforce MFA and other controls reliably (for example: IMAP, POP, SMTP AUTH, older Office clients using basic auth). Why the answer is correct: To filter out (target) legacy authentication attempts in a Conditional Access policy, you use the Client apps condition. In Conditional Access, “Client apps” lets you specify whether the sign-in is coming from: - Browser - Mobile apps and desktop clients - Exchange ActiveSync clients - Other clients (this is the key category for legacy/basic auth) By selecting “Other clients” (and often also Exchange ActiveSync if applicable) you can create a policy that applies specifically to legacy authentication attempts and then block access. This directly addresses the requirement to prevent users from using legacy authentication. Key features / configuration notes: - Create a Conditional Access policy with Users/Groups targeted appropriately. - Under Conditions > Client apps, select “Other clients” (and optionally “Exchange ActiveSync clients” depending on your environment). - Under Access controls, choose “Block access.” - This aligns with Zero Trust and the Azure Well-Architected Framework security pillar by reducing exposure to weak authentication methods. - In parallel, many organizations also disable basic auth at the workload level where possible (e.g., Exchange Online authentication policies) for defense in depth. Common misconceptions: Risk conditions (user risk/sign-in risk) are Identity Protection signals and are not designed to identify protocol type (legacy vs modern). Cloud apps/actions targets the resource (e.g., Exchange Online, SharePoint) but doesn’t distinguish the authentication protocol used. The protocol distinction is made via Client apps. Exam tips: For SC-300, remember: “legacy auth” in Conditional Access almost always maps to Conditions > Client apps > Other clients. If the question says “filter out legacy authentication attempts,” think “Client apps condition,” then block. Also be aware that legacy auth can bypass MFA, so blocking it is a common baseline control.

17
Question 17

HOTSPOT - You have an Azure Active Directory (Azure AD) tenant that contains Azure AD Privileged Identity Management (PIM) role settings for the User administrator role as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point. Hot Area:

Part 1:

Activation maximum duration (hours) is 8 hour(s).

Yes. The exhibit’s PIM settings for the User administrator role show the Activation maximum duration configured as 8 hours. In PIM, this value sets the maximum time an eligible activation can remain active before it automatically expires and the user loses the elevated permissions. Why others are wrong: Selecting “No” would imply the configured maximum duration is something other than 8 hours (for example 1 hour, 4 hours, or 24 hours), which would contradict the displayed role settings. Also note that this is not related to assignment expiration (eligible/active assignment duration); it is specifically the activation session duration for an eligible user after they activate the role.

Part 2:

Require justification on activation is Yes.

Yes. The exhibit indicates “Require justification on activation” is enabled. This means when an eligible user activates the User administrator role, they must enter a business justification (free text) as part of the activation workflow. Why others are wrong: “No” would only be correct if the setting were disabled. Justification is an activation-time control (JIT elevation) and is separate from “Require justification on active assignment,” which applies when an admin assigns the role as Active. Exams often try to confuse these two similarly named settings—ensure you’re reading the Activation section, not the Assignment section.

Part 3:

Require ticket information on activation is No.

Yes. The statement says “Require ticket information on activation is No.” This matches the exhibit where ticketing is not required during activation. In PIM, ticket information typically integrates with ITSM processes (for example, requiring a change/request ticket number) to support auditability. Why others are wrong: Choosing “No” would mean ticket information is required (set to Yes), which would force users to provide ticket details at activation time. Also, ticket requirement is independent of justification and MFA; you can require any combination of these controls.

Part 4:

On activation, require Azure MFA is Yes.

Yes. The exhibit shows “On activation, require Azure MFA” enabled. This means an eligible user must complete MFA as part of the activation process (or have a valid MFA claim per Conditional Access/session state) before the role becomes active. Why others are wrong: “No” would only be correct if MFA were not required for activation. Also, this setting is different from “Require Azure Multi-Factor Authentication on active assignment,” which applies to making an assignment Active. Here, it’s explicitly an activation-time requirement for eligible users.

Part 5:

Require approval to activate is Yes.

Yes. The exhibit indicates “Require approval to activate” is enabled. With this setting, an eligible user’s activation request does not immediately grant the role; it enters a pending state until an approver approves it. Why others are wrong: “No” would mean self-activation is allowed (subject to other controls like MFA/justification). Approval is a strong governance control used for high-impact roles and aligns with least privilege and separation of duties.

Part 6:

Approvers is None.

No. If “Require approval to activate” is set to Yes, then approvers must be configured (one or more users or groups). The exhibit shows approvers are configured (not None). In PIM, an approval workflow cannot function without approvers. Why others are wrong: Answering “Yes” would imply the approver list is empty. That would be inconsistent with a working approval requirement and inconsistent with the exhibit. In real deployments, if approvers were truly none, activation requests would be blocked because there would be nobody to approve them.

Part 7:

Allow permanent eligible assignment is No.

Yes. The exhibit shows “Allow permanent eligible assignment” is set to No. That means when assigning the User administrator role as Eligible, the assignment must have an end date/time; it cannot be indefinite. Why others are wrong: “No” would indicate permanent eligible assignments are allowed, which would weaken governance (users could remain eligible forever). Disallowing permanent eligibility is a common identity governance control to ensure periodic review and to reduce standing privilege exposure over time.

Part 8:

Expire eligible assignments after is 15 day(s).

Yes. The exhibit indicates eligible assignments expire after 15 days. Because permanent eligible assignment is not allowed, PIM enforces a time-bound eligible assignment duration, and the configured value is 15 days. Why others are wrong: “No” would mean the eligible assignment expiration is not 15 days (for example, 30 days or 1 year). Also, do not confuse this with activation maximum duration (8 hours). Eligible assignment duration controls how long the user remains eligible to activate; activation duration controls how long the role stays active after activation.

Part 9:

Allow permanent active assignment is No.

Yes. The exhibit shows “Allow permanent active assignment” is set to No. This means you cannot assign the User administrator role as Active indefinitely; any active assignment must be time-bound. Why others are wrong: “No” would imply permanent active assignments are allowed, which would create standing privilege and is generally discouraged for privileged roles. PIM is designed to minimize always-on access; time-bound active assignments are a governance mechanism when active assignment is necessary (for example, during a project).

Part 10:

Expire active assignments after is 1 month(s).

Yes. The exhibit shows active assignments expire after 1 month. Since permanent active assignment is not allowed, PIM requires an expiration, and the configured duration is one month. Why others are wrong: “No” would mean the active assignment expiration is different. Also, this is not the same as the activation duration (8 hours). Active assignment expiration applies to users assigned as Active (standing role membership for a limited period), not to eligible users activating JIT.

Part 11:

Require Azure Multi-Factor Authentication on active assignment is No.

Yes. The statement says “Require Azure Multi-Factor Authentication on active assignment is No,” and the exhibit shows that MFA is not required when creating an active assignment. This setting governs the administrative action of assigning the role as Active. Why others are wrong: “No” would mean MFA is required for active assignment. Note the nuance: even if MFA is not required for the assignment action, you can still require MFA for activation (which is enabled here). These are separate controls in PIM.

Part 12:

Require justification on active assignment is No.

Yes. The exhibit indicates “Require justification on active assignment” is disabled (No). That means when an admin assigns the User administrator role as Active, they are not forced by PIM to enter a justification. Why others are wrong: “No” would imply justification is required for active assignment. Again, don’t confuse this with “Require justification on activation,” which is enabled and applies to eligible users activating the role.

Part 13:

A user who requires access to the User administration role must perform multi-factor authentication (MFA) every ______.

8 hours. The exhibit requires Azure MFA on activation and sets the activation maximum duration to 8 hours. Practically, an eligible user must perform MFA each time they activate the role, and each activation can last up to 8 hours. After 8 hours, the activation expires and the user must re-activate (and therefore satisfy MFA again) to regain the role. Why the other options are wrong: 15 days and 1 month are assignment expiration values (eligible and active assignment lifetimes). They do not define how frequently MFA is performed. MFA is tied to activation events (and potentially Conditional Access session policies), not to the eligible/active assignment expiration timers.

Part 14:

Before an eligible user can perform a task that requires the User administrator role, the activation must be approved by a ______.

When 'Require approval to activate' is enabled in PIM, activation must be approved by the users or groups listed in the Approvers setting for that role. The exhibit indicates that the approver configured is a permanently assigned User administrator, so that is the required approver before activation can complete. Global Administrator or Privileged Role Administrator can manage PIM settings, but they are not automatically the activation approvers unless explicitly configured. Therefore, the approval depends on the configured approver list, not on general administrative privilege alone.

18
Question 18

You need to meet the authentication requirements for leaked credentials. What should you do?

Correct. Password Hash Synchronization in Azure AD Connect synchronizes a hash of the on-prem AD DS password to Entra ID. Identity Protection uses this to detect leaked credentials by comparing the hash (in a protected manner) to known compromised credential datasets. This is a common prerequisite for leaked credential risk detection in hybrid environments and improves security monitoring and response capabilities.

Incorrect. Azure AD Password Protection helps prevent users from choosing weak or commonly used passwords by enforcing a banned password list (and optional custom terms) during password change/reset. It does not provide the Identity Protection “leaked credentials” risk detection signal, which is about identifying credentials already exposed externally, not blocking poor password choices.

Incorrect. Authentication method policies in Entra ID control which authentication methods users can register and use (for example, Microsoft Authenticator, FIDO2, SMS). While important for MFA and SSPR hardening, these policies do not enable leaked credential detection. The leaked credential signal depends on password hash availability in Entra ID, not on method selection.

Incorrect. Enabling federation with PingFederate makes PingFederate the authentication authority for the domain. In federated scenarios, Entra ID typically does not validate the user’s password directly, and password hashes are not available in Entra ID for Identity Protection’s leaked credential detection. Federation can be used for SSO requirements, but it does not meet the leaked credential detection prerequisite.

Question Analysis

Core concept: This question targets Microsoft Entra ID (Azure AD) Identity Protection’s leaked credentials detection and the prerequisite authentication architecture needed for it to work. Leaked credentials detection relies on having a password hash representation available in Entra ID so Microsoft can compare it (in a privacy-preserving way) against known compromised credential sets. Why the answer is correct: Enabling Password Hash Synchronization (PHS) in Azure AD Connect ensures that a hash of the on-premises AD DS password is synchronized to Entra ID. Identity Protection uses this cloud-side password hash to detect “leaked credentials” risk events for hybrid users. Without PHS, Entra ID does not have the necessary password hash material for those users, and leaked credential detection cannot be performed (or is significantly limited) because authentication is handled elsewhere (for example, via federation). Key features / best practices: PHS is a sign-in method and also a foundational capability for several security features. It supports hybrid identity resilience (cloud authentication fallback) and enables Identity Protection risk detections that depend on password hashes. From an Azure Well-Architected Framework security perspective, PHS helps strengthen identity posture by enabling continuous risk evaluation and automated remediation (for example, user risk policies requiring password change or MFA). In practice, many organizations use PHS even when they primarily use Pass-through Authentication, specifically to unlock Identity Protection capabilities. Common misconceptions: Azure AD Password Protection is about blocking weak/banned passwords at change/reset time, not detecting already-compromised passwords in the wild. Authentication method policies control which MFA/SSPR methods are allowed, but they don’t provide the leaked-credential signal. Federation with PingFederate moves authentication to the federated IdP and generally reduces Entra ID’s ability to evaluate password-based risk signals for those users. Exam tips: For SC-300, remember: “Leaked credentials” detection is tied to having password hashes in Entra ID. If you see Identity Protection + leaked credentials + hybrid identities, look for Password Hash Synchronization as the enabling requirement. Also distinguish between preventive controls (Password Protection) and detective controls (Identity Protection risk detections).

19
Question 19

HOTSPOT - You need to configure the assignment of Azure AD licenses to the Litware users. The solution must meet the licensing requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Hot Area:

Part 1:

Azure AD Connect settings to modify: ______

Correct answer: A. Directory Extensions. Directory Extensions in Azure AD Connect is the setting used to synchronize additional on-premises AD DS attributes to Azure AD as extension attributes. This is commonly required when licensing (or other cloud controls) must be driven by an attribute that is not part of the default sync set. Once synchronized, those attributes can be used in Azure AD for dynamic group rules, access decisions, and governance processes. Why not B (Domain Filtering): Domain filtering controls which on-premises AD domains are included in synchronization. It does not control which attributes are synchronized, so it won’t help meet licensing requirements based on user properties. Why not C (Optional Features): Optional features enable specific hybrid capabilities (for example, password writeback, group writeback, device writeback, Exchange hybrid). They are not the mechanism for adding/syncing extra user attributes needed for dynamic licensing logic.

Part 2:

Assign Azure AD licenses to: ______

Correct answer: C. An Azure Active Directory group that has the Dynamic User membership type. Dynamic User groups are the best choice when licenses must be assigned automatically based on user attributes or rules. Azure AD group-based licensing supports assigning licenses to security groups and Microsoft 365 groups that contain users directly, and dynamic user groups are commonly used to automate that membership. Option A is incorrect because nested groups are not processed for group-based licensing. Option B is not inherently invalid for licensing, but it requires manual membership management and would not satisfy a requirement for automatic, attribute-based assignment as effectively as a Dynamic User group.

20
Question 20

HOTSPOT - You have an Azure Active Directory (Azure AD) tenant that has the default App registrations settings. The tenant contains the users shown in the following table. Name Role Admin1 Application administrator Admin2 Application developer Admin3 Cloud application administrator User1 User You purchase two cloud apps named App1 and App2. The global administrator registers App1 in Azure AD. You need to identify who can assign users to App1, and who can register App2 in Azure AD. What should you identify? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Hot Area:

Part 1:

Can assign users to App1: ______

Assigning users to App1 is done on the enterprise application (service principal). Application Administrator and Cloud Application Administrator can manage enterprise applications, including user and group assignment, so Admin1 and Admin3 can perform this task. Application Developer can manage application registrations they create and, for applications they own, can manage aspects of the corresponding enterprise application, including assignment; therefore Admin2 is also included. User1 has no admin role and is not stated to be an owner of App1, so User1 cannot assign users to App1.

Part 2:

Can register App2 in Azure AD: ______

Registering App2 in Azure AD refers to creating an app registration (an application object) in the tenant. The question explicitly states the tenant has the default App registrations settings. By default, Microsoft Entra ID allows non-admin users to register applications (“Users can register applications” = Yes). With that default setting, any authenticated user can create an app registration, not only administrators. That means Admin1, Admin2, Admin3, and User1 can all register App2. Options that limit registration to only Admin1 and/or Admin3 would be correct only if the tenant setting were changed to restrict app registrations to admins, or if additional governance controls were applied. Since the question says default settings, the broadest option is correct.

Practice Tests

Practice Test #1

50 Questions·100 min·Pass 700/1000

Practice Test #2

50 Questions·100 min·Pass 700/1000

Practice Test #3

50 Questions·100 min·Pass 700/1000

Other Microsoft Certifications

Microsoft AI-102

Microsoft AI-102

Associate

PL-300: Microsoft Power BI Data Analyst

PL-300: Microsoft Power BI Data Analyst

Microsoft AI-900

Microsoft AI-900

Fundamentals

Microsoft SC-200

Microsoft SC-200

Associate

Microsoft AZ-104

Microsoft AZ-104

Associate

Microsoft AZ-900

Microsoft AZ-900

Fundamentals

Microsoft DP-900

Microsoft DP-900

Fundamentals

Microsoft SC-900

Microsoft SC-900

Fundamentals

Microsoft AZ-305

Microsoft AZ-305

Expert

Microsoft AZ-204

Microsoft AZ-204

Associate

Microsoft AZ-500

Microsoft AZ-500

Associate

Start Practicing Now

Download Cloud Pass and start practicing all Microsoft SC-300 exam questions.

Get it on Google PlayDownload on the App Store
Cloud PassCloud Pass

IT Certification Practice App

Get it on Google PlayDownload on the App Store

Certifications

AWSGCPMicrosoftCiscoCompTIADatabricks

Legal

FAQPrivacy PolicyTerms of Service

Company

ContactDelete Account

© Copyright 2026 Cloud Pass, All rights reserved.

Want to practice all questions on the go?

Get the app

Download Cloud Pass — includes practice tests, progress tracking & more.