The requirement is:
“Require admin approval for application access to organizational data.”
According to the Microsoft SC-300 exam guide and Microsoft documentation on “Configure consent settings for applications”, Azure AD provides User consent settings under Enterprise applications → Consent and permissions to control how applications can request permissions to access organizational data.
By default, users can consent to allow apps to access organizational data on their behalf, which can create security risks. To ensure tighter control, administrators can:
Disable user consent entirely, or
Require admin consent workflow so that when users try to grant an app access, it must first be approved by an administrator.
The SC-300 study materials explicitly describe:
“To require administrator approval before an app can access organizational data, configure the User consent settings to use the admin consent workflow.”
This aligns perfectly with the stated requirement — to ensure admin approval is required before apps gain access to organizational data.
Other options are incorrect:
Authentication methods manage MFA and SSPR, not app consent.
Access packages are part of Identity Governance for resource access, not app consent.
Application Proxy publishes on-premises apps, not related to app consent permissions.