Microsoft 365 Certified Endpoint Administrator (MD-102) Practice Test

Disable ads (and more) with a membership for a one time $4.99 payment

Prepare for the Microsoft 365 Certified Endpoint Administrator exam. Utilize flashcards and multiple choice questions with hints and explanations. Get exam-ready now!

Practice this question and more.


What type of access policy should be used to enable user access to specific applications in Azure AD?

  1. Conditional Access

  2. Multi-factor Authentication

  3. Identity Protection

  4. Device Compliance

The correct answer is: Conditional Access

The correct type of access policy for enabling user access to specific applications in Azure AD is Conditional Access. This policy allows administrators to control how users access resources and applications based on specific conditions, such as user location, device status, or risk level. Conditional Access is essential for enhancing security while ensuring that users have the necessary access to applications necessary for performing their jobs. For example, if a user tries to access a sensitive application from an untrusted location or device, Conditional Access can require them to meet additional requirements, such as logging in with multi-factor authentication or using a compliant device. This granular control helps to protect the organization's resources while providing flexibility for legitimate users. Other policies, while important, serve different purposes. Multi-factor Authentication is primarily focused on adding an additional layer of security for user sign-ins rather than managing comprehensive access to specific applications. Identity Protection's role revolves around monitoring and responding to incidents related to identity risks within the organization. Device Compliance ensures that only secured and compliant devices can access corporate resources, but it does not specifically handle user access to applications directly. By utilizing Conditional Access, organizations can create a balanced environment that maintains security without compromising user accessibility, allowing access to applications based on well-defined policies and conditions.