Free SC-300 Exam Braindumps (page: 26)

Page 25 of 103

HOTSPOT (Drag and Drop is not supported)
You have two Microsoft Entra tenants named contoso.com and fabrikam.com.
Contoso.com contains the users shown in the following table.
Contoso.com contains the groups shown in the following table.
You configure cross-tenant synchronization from contoso.com to fabrikam.com and enable cross-tenant synchronization for User3 and Group2.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.


  1. See Explanation section for answer.

Answer(s): A

Explanation:



You have a Microsoft Exchange organization that uses an SMTP address space of contoso.com.
Several users use their contoso.com email address for self-service sign-up to Microsoft Entra.
You gain global administrator privileges to the Microsoft Entra tenant that contains the self-signed users.
You need to prevent the users from creating user accounts in the contoso.com Microsoft Entra tenant for self-service sign-up to Microsoft 365 services.
Which PowerShell cmdlet should you run?

  1. Update-MgPolicyAuthorizationPolicy
  2. Update-MgDomain
  3. Update-MgPolicyPermissionGrantPolicyExclude
  4. Update-MgDomainFederationConfiguration

Answer(s): A



You have a Microsoft Entra tenant that contains the users shown in the following table.
You add an enterprise application named App1 and configure the following Self-service settings:
• Allow users to request access to this application: Yes
• To which group should assigned users be added: Group1
• Require approval before granting access to this application: Yes
• Who is allowed to approve access to this application: User2
Which users can request access to App1?

  1. User3 only
  2. User2 and User3 only
  3. User1 and User3 only
  4. User1, User2, and User3

Answer(s): D



HOTSPOT (Drag and Drop is not supported)
You have a Microsoft Entra tenant that contains the users shown in the following table.
The tenant contains the identities shown in the following table.
Which users can create custom security attributes, and to which identities can the attributes be assigned? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.


  1. See Explanation section for answer.

Answer(s): A

Explanation:






Post your Comments and Discuss Microsoft SC-300 exam with other Community members:

SC-300 Exam Discussions & Posts