New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft MB-310 Exam - Topic 1 Question 16 Discussion

Actual exam question for Microsoft's MB-310 exam
Question #: 16
Topic #: 1
[All MB-310 Questions]

You are configuring vendor collaboration security roles for external vendors. You manually set up a vendor contact.

You need to assign the Vendor (external) role to this vendor.

Which tasks can this vendor perform?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

0/2000 characters
Lyndia
4 months ago
Not sure about the user account request thing, sounds too powerful for vendors.
upvoted 0 times
...
Francoise
4 months ago
Totally agree, they should have access to modify their own info!
upvoted 0 times
...
Felix
4 months ago
Wait, can they really delete contacts they created? That seems risky.
upvoted 0 times
...
Essie
5 months ago
I think they can also modify contact info, right?
upvoted 0 times
...
Roxane
5 months ago
Vendors can maintain invoices, that's a key task.
upvoted 0 times
...
Staci
5 months ago
I believe they can view and modify contact person information, but I'm a bit uncertain about the extent of those modifications.
upvoted 0 times
...
Chantell
5 months ago
I practiced a similar question, and I feel like they definitely can't delete contact persons they created.
upvoted 0 times
...
Lili
5 months ago
I think they can maintain vendor collaboration invoices, but I need to double-check if that's part of their role.
upvoted 0 times
...
Dalene
5 months ago
I remember that the Vendor (external) role has limited permissions, so I'm not sure if they can request a new user account.
upvoted 0 times
...
Roy
5 months ago
Based on the description of the insider threat program, UEBA seems like the best fit. It's designed to identify malicious user behavior, which is exactly what the security engineer is looking for. I'll mark that as my answer.
upvoted 0 times
...
Edward
5 months ago
I'm confident the answer is C. The question specifically mentions "business as usual access", which implies the minimum permissions required for regular database operations, not full administrative control.
upvoted 0 times
...
Jamey
5 months ago
Hmm, I'm a bit unsure about this one. I'll need to think through the different options and how they impact network traffic.
upvoted 0 times
...
Cary
5 months ago
Hmm, I'm a bit confused by this one. I know we need to do something with the network configuration, but I'm not sure which of these options is the correct pre-requisite. I'll have to think it through step-by-step.
upvoted 0 times
...
Mollie
5 months ago
Wait, I'm confused. Is thermal fatigue really just about temperature variations, or could it also be caused by excessive thermal growth or physical activity in the heat? I'm not totally sure on this one.
upvoted 0 times
...
Bulah
5 months ago
Hmm, I'm a bit unsure about this one. The options seem pretty similar, and I want to make sure I don't accidentally choose the wrong answer. I'll need to think this through carefully.
upvoted 0 times
...
Kallie
5 months ago
Okay, let me see here. I remember learning about acpid in my Linux class, so I think that's the right answer. But I'll double-check the other options just to be sure.
upvoted 0 times
...
Bette
5 months ago
I think option C could backfire since it involves supporting the opposition; they might not even have the same priorities, right?
upvoted 0 times
...

Save Cancel