Questions

Answer the following questions to test your knowledge of this chapter.  You can find the answers in Assessment Answers:

  1. Identify two features or capabilities of the Secure Score.
    1. Recommend security configurations for Microsoft 365 services
    2. Track user security policies
    3. Provide configuration steps for security recommendations or links to configuration controls
    4. Administer user risk policies
  2. Identify two features of Intune Mobile Application Management.
    1. Define application-based security policies
    2. Wipe managed device
    3. Wipe managed application profile
    4. Require device PIN
  3. Where is Intune managed?
    1. Microsoft 365 admin center
    2. Azure portal
    3. Security & Compliance Center
    4. Intune Control Panel
  4. Where is Microsoft Mobile Device Management managed?
    1. Microsoft 365 admin center
    2. Azure portal
    3. Security & Compliance Center
    4. Intune Control Panel
  5. Identify the four types of groups available in Microsoft 365.
    1. Office 365 groups
    2. Security groups
    3. Mail-enabled security groups
    4. Domain local groups
    5. Distribution List Groups
    6. Global groups
    7. Universal groups
    8. Local groups
  1. eDiscovery managers can see what?
    1. All cases
    2. Only cases that they created or are assigned to them
  2. eDiscovery administrators can see what?
    1. All cases
    2. Only cases that they created or are assigned to them
  3. Secure Score actions are grouped into which four categories?
    1. Identity
    2. Network
    3. Data
    4. Windows
    5. Azure
    6. Device
    7. Apps
    8. Multi-factor authentication
  4. You are the SharePoint administrator for your organization. You need to allow OneDrive users to share documents with external users who have already been added to your organization's Azure Active Directory tenant. Which option should you choose?
    1. Anyone
    2. New and existing external users
    3. Existing external users
    4. Only people in your organization
  5. Identify the two true statements about OneDrive sharing controls.
    1. They can be the same level of permissiveness as SharePoint sharing controls.
    2. They can be more permissive than SharePoint sharing controls.
    3. They can be less permissive than SharePoint sharing controls.
    4. They must be the same as the SharePoint sharing controls.
  6. Which three terms apply to the SharePoint online document life cycle?
    1. Two-stage recycle bin
    2. Azure AD recycle bin
    3. Preservation Hold Library
    4. Versioning
  1. When deploying Azure Active Directory Connect Password Hash synchronization, what happens to the Azure AD Password Policy?
    1. Nothing.
    2. The Azure AD password policy wins.
    3. The on-premises Active Directory password control settings are synchronized to Azure AD.
    4. Organizations must choose which password policy controls to deploy.
  2. You are a security manager for your organization. You need to configure document classification. Which tool should you use?
    1. Classification explorer
    2. Azure Information Protection
    3. Azure Identity Protection
    4. Exchange Data Loss Prevention Policies
  3. In which two ways does Microsoft 365 encrypt data?
    1. At rest
    2. At bay
    3. In transit
    4. In utero
  4. Password change management recommends customers configure ______________ so that password changes in Azure are updated in the on-premises Active Directory.
    1. Password change management
    2. Password write-back
    3. Exchange hybrid write-back
    4. Privileged identity management
  5. Microsoft Defender Advanced Threat Protection can protect Mac OS-based computers.
    1. True
    2. False
  6. You are the compliance administrator for your organization and need to perform a search for users who have accessed certain SharePoint sites. Which tool should you use?
    1. Microsoft 365 admin center
    2. Audit Log Search
    3. SharePoint Report Server
    4. SharePoint Admin Center
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.133.228