DRAG DROP -
You are implementing conditional access policies.
You must evaluate the existing Azure Active Directory (Azure AD) risk events and risk levels to configure and implement the policies.
You need to identify the risk level of the following risk events:
-> Users with leaked credentials
-> Impossible travel to atypical locations
-> Sign-ins from IP addresses with suspicious activity
Which level should you identify for each risk event? To answer, drag the appropriate levels to the correct risk events. Each level may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
Azure AD Identity protection can detect six types of suspicious sign-in activities:
-> Users with leaked credentials
Sign-ins from anonymous IP addresses
-> Impossible travel to atypical locations
-> Sign-ins from infected devices
-> Sign-ins from IP addresses with suspicious activity
-> Sign-ins from unfamiliar locations
These six types of events are categorized in to 3 levels of risks " High, Medium & Low: