HOTSPOT - You have a Microsoft 365 tenant.
You need to identify users who have leaked credentials.
The solution must meet the following requirements: -> Identify sign-ins by users who are suspected of having leaked credentials.
-> Flag the sign-ins as a high-risk event.
-> Immediately enforce a control to mitigate the risk, while still allowing the user to access applications.
What should you use? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area: