SC-300 Exam QuestionsBrowse all questions from this exam

SC-300 Exam - Question 239


You have an Azure AD tenant.

You configure User consent settings to allow users to provide consent to apps from verified publishers.

You need to ensure that the users can only provide consent to apps that require low impact permissions.

What should you do?

Show Answer
Correct Answer: D

To ensure that users can only provide consent to apps that require low impact permissions, you should configure permission classifications in Azure AD. This allows you to categorize permissions into different levels of impact such as low, medium, or high. By doing so, you can enforce policies that restrict users to only consenting to apps with low impact permissions.

Discussion

9 comments
Sign in to comment
einkaufacsOption: D
Aug 1, 2023

I go with D https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/configure-permission-classifications?pivots=portal

EmnCoursOption: D
Aug 15, 2023

I go with D https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/configure-permission-classifications?pivots=portal

haazybanjOption: D
Nov 6, 2023

To ensure that users can only provide consent to apps that require low impact permissions, you should configure permission classifications in your Azure AD tenant. Configuring permission classifications allows you to classify the permissions requested by apps into different impact levels, such as low, medium, or high. By assigning the appropriate impact level to each permission, you can control which apps users are allowed to consent to based on the impact level of the requested permissions

KrissB
Aug 11, 2023

D looks like the better answer, when creating a custom app policy you need to define the Permissions Classification: https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/manage-app-consent-policies?pivots=ms-powershell. However this is overly complex as it seems the easiest thing to do is just select the radial to allow user consent to apps from trusted publishers, default impact is low. https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/configure-user-consent?pivots=portal

northgaterebel
Aug 26, 2023

I agree. There should be an answer of "Do Nothing" because once you select "Allow user consent for apps from verified publishers" it is already configured as desired. Awful question.

shuhaidawahab
Oct 14, 2023

The correct answer is D. Configure permission classifications. To ensure that the users can only provide consent to apps that require low impact permissions, you need to configure permission classifications in Azure AD. Permission classifications allow you to identify the impact that different permissions have according to your organization’s policies and risk evaluations.

JzxOption: D
Sep 13, 2023

D. Configure permission classifications: Azure AD allows you to classify the permissions requested by apps into three categories: low, medium, and high impact. By configuring these permission classifications, you can define which permissions fall into each category. This enables you to ensure that users can only provide consent to apps requesting permissions classified as "low impact." This approach helps control the level of access users can grant to apps, aligning with your requirement.

JCkD4Ni3LOption: D
Oct 25, 2023

Configure permission classifications for this...

hml_2024
Sep 3, 2024

This is from ChatGPT. To ensure that users can only provide consent to apps that require low impact permissions, you should: **D. Configure permission classifications.** By configuring permission classifications, you can categorize the permissions requested by applications into different levels of impact (e.g., low, medium, high). You can then configure policies that allow users to consent only to apps that require low impact permissions, ensuring that users cannot authorize apps that request higher-risk permissions without admin approval.

Obi_Wan_JacobyOption: D
Apr 16, 2025

Answer D. Configure permission classifications