Questions
Answer the following questions to test your knowledge of the information in this chapter. You can find the answers in the Assessments section at the end of this book:
- Can you allow trusted IP addresses to bypass MFA?
a) Yes
b) No
- Can MFA be enabled using Conditional Access policies?
a) Yes
b) No
- Are fraud alerts part of the MFA server (on-premises) offering?
a) Yes
b) No