Question 39:
HOTSPOT - You have a Microsoft 365 tenant. You need to identify users who have leaked credentials. The solution must meet the following requirements: ✑ Identify sign-ins by users who are suspected of having leaked credentials. ✑ Flag the sign-ins as a high-risk event. ✑ Immediately enforce a control to mitigate the risk, while still allowing the user to access applications. What should you use? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Hot Area: