You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" MS-900 Practice Test 5 "
0 of 60 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
MS-900
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking view questions. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Answered
Review
Question 1 of 60
1. Question
You are the administrator of your organization. The marketing team has requested the ability to create a survey and send it to external respondents. Which Office 365 application is best suited to perform this task?
Correct
Incorrect
Unattempted
Question 2 of 60
2. Question
You want to limit the number of devices that can be enrolled by each user to two devices each. Within Microsoft Intune what functionality would you configure to implement this?
Correct
Incorrect
Unattempted
Question 3 of 60
3. Question
The available groups that you can use within Office 365, include; Security Groups, Shared Mailbox Groups, _____ and _____.
Correct
In the Groups section of the Microsoft 365 admin center, you can create and manage these types of groups:
Microsoft 365 groups (formerly Office 365 groups) are used for collaboration between users, both inside and outside your company.
Distribution groups are used for sending notifications to a group of people.
Security groups are used for granting access to resources such as SharePoint sites.
Mail-enabled security groups are used for granting access to resources such as SharePoint and emailing notifications to those users.
Shared mailboxes are used when multiple people need access to the same mailbox, such as a piece of company information or support email address.
Incorrect
In the Groups section of the Microsoft 365 admin center, you can create and manage these types of groups:
Microsoft 365 groups (formerly Office 365 groups) are used for collaboration between users, both inside and outside your company.
Distribution groups are used for sending notifications to a group of people.
Security groups are used for granting access to resources such as SharePoint sites.
Mail-enabled security groups are used for granting access to resources such as SharePoint and emailing notifications to those users.
Shared mailboxes are used when multiple people need access to the same mailbox, such as a piece of company information or support email address.
Unattempted
In the Groups section of the Microsoft 365 admin center, you can create and manage these types of groups:
Microsoft 365 groups (formerly Office 365 groups) are used for collaboration between users, both inside and outside your company.
Distribution groups are used for sending notifications to a group of people.
Security groups are used for granting access to resources such as SharePoint sites.
Mail-enabled security groups are used for granting access to resources such as SharePoint and emailing notifications to those users.
Shared mailboxes are used when multiple people need access to the same mailbox, such as a piece of company information or support email address.
Question 4 of 60
4. Question
What do you need to implement/configure to allow Microsoft Intune to manage Apple devices?
Correct
Incorrect
Unattempted
Question 5 of 60
5. Question
When assigning a policy you can either include or exclude groups
Correct
Incorrect
Unattempted
Question 6 of 60
6. Question
MAM requires Intune device enrollment.
Correct
Incorrect
Unattempted
Question 7 of 60
7. Question
You have already deployed Office 365 within your organization. You now need to deploy Microsoft Intune. Which of these set-up steps will you still need to complete?
Correct
Incorrect
Unattempted
Question 8 of 60
8. Question
With the Cloud Identity model the user accounts are stored in Microsoft Azure___________
Correct
Incorrect
Unattempted
Question 9 of 60
9. Question
In order to use the extensive reporting features of Desktop Analytics, you will need to create resources in the Azure admin center.
Correct
Incorrect
Unattempted
Question 10 of 60
10. Question
Users can connect their Microsoft mobile applications to their organization’s process by doing what?
Correct
Incorrect
Unattempted
Question 11 of 60
11. Question
When you remove an Office 365 license from a user for how long is the associated user’s data retained, by default?
Correct
Incorrect
Unattempted
Question 12 of 60
12. Question
Within Intune which policy types have precedence?
Correct
Incorrect
Unattempted
Question 13 of 60
13. Question
The User Administrator can
Correct
Incorrect
Unattempted
Question 14 of 60
14. Question
An employee is leaving your company. They have used their own device to access corporate data. You need to ensure that all corporate data is wiped from the enrolled device. What Microsoft Intune remote action would you use?
Correct
Incorrect
Unattempted
Question 15 of 60
15. Question
You can manage groups within Office 365 by using the Microsoft 365 admin center and_______________.
Correct
Incorrect
Unattempted
Question 16 of 60
16. Question
Which of the following is the best description for a Federated Identity model?
Correct
Incorrect
Unattempted
Question 17 of 60
17. Question
Your company has 200 remote users who have laptops that run Windows 10. The users store files in Microsoft OneDrive for Business.
You are configuring new laptops that will be deployed to the users. The new laptops have a smaller hard disk than the current laptops.
You need to minimize the amount of disk space used by OneDrive on the new laptops.
Mobile Device Management provides functionality to manage devices using profiles. What can you manage using Microsoft Intune device profiles?
Correct
Incorrect
Unattempted
Question 19 of 60
19. Question
You need to create a profile for every ______________ you wish to manage when configuring MDM.
Correct
Incorrect
Unattempted
Question 20 of 60
20. Question
You host a live event. After the live event, users who were unable to attend want to view the recording. Which Office 365 application is suited to accomplish this task?
Correct
Incorrect
Unattempted
Question 21 of 60
21. Question
You can view the past _____ days of Health History in the Microsoft 365 admin center.
Correct
Incorrect
Unattempted
Question 22 of 60
22. Question
You are working as an Office 365 Administrator. You want to ensure that you have the latest health information for Office 365. What app can you use to receive notifications to your smartphone?
Correct
Incorrect
Unattempted
Question 23 of 60
23. Question
The default setting for the number of days in which a password expires is _____ days.
Correct
Incorrect
Unattempted
Question 24 of 60
24. Question
What is the name of the tool that allows you to sync user identity data between Active Directory and Azure Active Directory?
Correct
Incorrect
Unattempted
Question 25 of 60
25. Question
Other than the Global Administrator which another administrator role has the permission to purchase licenses?
Correct
Incorrect
Unattempted
Question 26 of 60
26. Question
Within the Microsoft 365 admin center, what is the name of the feature that allows you to see information on feature updates and scheduled maintenance?
Correct
Incorrect
Unattempted
Question 27 of 60
27. Question
The MDM Authority has two settings that you can configure. What are these settings?
Correct
Incorrect
Unattempted
Question 28 of 60
28. Question
You have a Microsoft 365 subscription.
You need to add a user named Admin1 as an administrator of the Microsoft OneDrive for
Business site of a user named User1.
What should you do?
Correct
Incorrect
Unattempted
Question 29 of 60
29. Question
You need to enable an internal social networking platform to allow users to communicate informally. Which Office 365 application is best suited to accomplish this?
Correct
Incorrect
Unattempted
Question 30 of 60
30. Question
Before you start to enroll devices you need to set the MDM Authority.
Correct
Incorrect
Unattempted
Question 31 of 60
31. Question
Conditional Access policies use Controls to decide if access should be granted, What is the other element of Conditional Access policies?
Correct
Incorrect
Unattempted
Question 32 of 60
32. Question
Once you have created a new policy in Microsoft Intune how will you deploy the policy?
Correct
Incorrect
Unattempted
Question 33 of 60
33. Question
You need to enable your users to create and manage projects using the Office 365 suite. Which Office 365 application is best suited to accomplish this task?
Correct
A planner can be used to create simple projects or plans and allows for participating to assign and manage tasks. The planner can be integrated into teams.
Incorrect
A planner can be used to create simple projects or plans and allows for participating to assign and manage tasks. The planner can be integrated into teams.
Unattempted
A planner can be used to create simple projects or plans and allows for participating to assign and manage tasks. The planner can be integrated into teams.
Question 34 of 60
34. Question
When you sign-up for Office 365 the first user created is the Global Administrator
Correct
Incorrect
Unattempted
Question 35 of 60
35. Question
What is the most common form of identity authentication?
Correct
Incorrect
Unattempted
Question 36 of 60
36. Question
You can use the Microsoft 365 admin center to request a support call from Microsoft to help with any Office 365 issues.
Correct
Incorrect
Unattempted
Question 37 of 60
37. Question
Within the Microsoft 365 admin center the View Service History page shows Health History for the last 7 and _____ days.
Correct
Incorrect
Unattempted
Question 38 of 60
38. Question
By default the Microsoft 365 admin center shows _____ days of Health History.
Correct
Incorrect
Unattempted
Question 39 of 60
39. Question
Within Microsoft Intune, you can manage devices and apps using ______ and _____.
Correct
Incorrect
Unattempted
Question 40 of 60
40. Question
Microsoft Enterprise Mobility+Â Security features rely on ___________ -driven security.
Correct
Incorrect
Unattempted
Question 41 of 60
41. Question
A new setting was introduced with Windows 10 1803 that allows you to set policy precedence between Intune policies and Group Policy. What is the name of the setting?
Correct
Incorrect
Unattempted
Question 42 of 60
42. Question
Risk-based Conditional Access is a feature of
Correct
Most users have a normal behavior that can be tracked, when they fall outside of this norm it could be risky to allow them to just sign in. You may want to block that user or maybe just ask them to perform multi-factor authentication to prove that they are really who they say they are.
A sign-in risk represents the probability that a given authentication request isn’t authorized by the identity owner. Organizations with Azure AD Premium P2 licenses can create Conditional Access policies incorporating Azure AD Identity Protection sign-in risk detections.
More Information: https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-conditional-access-policy-risk
Incorrect
Most users have a normal behavior that can be tracked, when they fall outside of this norm it could be risky to allow them to just sign in. You may want to block that user or maybe just ask them to perform multi-factor authentication to prove that they are really who they say they are.
A sign-in risk represents the probability that a given authentication request isn’t authorized by the identity owner. Organizations with Azure AD Premium P2 licenses can create Conditional Access policies incorporating Azure AD Identity Protection sign-in risk detections.
More Information: https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-conditional-access-policy-risk
Unattempted
Most users have a normal behavior that can be tracked, when they fall outside of this norm it could be risky to allow them to just sign in. You may want to block that user or maybe just ask them to perform multi-factor authentication to prove that they are really who they say they are.
A sign-in risk represents the probability that a given authentication request isn’t authorized by the identity owner. Organizations with Azure AD Premium P2 licenses can create Conditional Access policies incorporating Azure AD Identity Protection sign-in risk detections.
More Information: https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-conditional-access-policy-risk
Question 43 of 60
43. Question
Microsoft Defender Advanced Threat Protection can protect Mac OS-based computers
Which of the following is NOT a feature of Desktop Analytics?
Correct
Desktop Analytics is a cloud-based service that integrates with Configuration Manager. The service provides insight and intelligence for you to make more informed decisions about the update readiness of your Windows clients.
Use Desktop Analytics with Configuration Manager to:
Create an inventory of apps running in your organization
Assess app compatibility with the latest Windows 10 feature updates
Identify compatibility issues, and receive mitigation suggestions based on cloud-enabled data insights
Create pilot groups that represent the entire application and driver estate across a minimal set of devices
Deploy Windows 10 to pilot and production-managed devices
Incorrect
Desktop Analytics is a cloud-based service that integrates with Configuration Manager. The service provides insight and intelligence for you to make more informed decisions about the update readiness of your Windows clients.
Use Desktop Analytics with Configuration Manager to:
Create an inventory of apps running in your organization
Assess app compatibility with the latest Windows 10 feature updates
Identify compatibility issues, and receive mitigation suggestions based on cloud-enabled data insights
Create pilot groups that represent the entire application and driver estate across a minimal set of devices
Deploy Windows 10 to pilot and production-managed devices
Unattempted
Desktop Analytics is a cloud-based service that integrates with Configuration Manager. The service provides insight and intelligence for you to make more informed decisions about the update readiness of your Windows clients.
Use Desktop Analytics with Configuration Manager to:
Create an inventory of apps running in your organization
Assess app compatibility with the latest Windows 10 feature updates
Identify compatibility issues, and receive mitigation suggestions based on cloud-enabled data insights
Create pilot groups that represent the entire application and driver estate across a minimal set of devices
Deploy Windows 10 to pilot and production-managed devices
Question 45 of 60
45. Question
Microsoft 365 Usage Analytics can be imported into which two tools or services?
Vini is a compliance administrator for ABC company and she has been asked to perform a search for users who have accessed certain SharePoint sites. Which tool should Vini use?
In order to reduce exposure for personally identifiable information, administrators can enable what feature for Microsoft 365 Activity Reports?
Correct
User-level details can be deliberately hidden in the Office 365 Admin Center when generating reports through a feature called Anonymization. We can use this feature when generating reports like OneDrive or usage reports without showing names and email addresses. In this way, user identities are protected.
Incorrect
User-level details can be deliberately hidden in the Office 365 Admin Center when generating reports through a feature called Anonymization. We can use this feature when generating reports like OneDrive or usage reports without showing names and email addresses. In this way, user identities are protected.
Unattempted
User-level details can be deliberately hidden in the Office 365 Admin Center when generating reports through a feature called Anonymization. We can use this feature when generating reports like OneDrive or usage reports without showing names and email addresses. In this way, user identities are protected.
Which three verification methods of the following choices are official choices for Azure MFA?
Correct
When a user signs in to an application or service and receives an MFA prompt, they can choose from one of their registered forms of additional verification. An administrator could require registration of these Azure Multi-Factor Authentication verification methods, or the user can access their own My Profile to edit or add verification methods.
The following additional forms of verification can be used with Azure Multi-Factor Authentication:
Microsoft Authenticator app
OATH Hardware token
SMS
Voice call
When a user signs in to an application or service and receives an MFA prompt, they can choose from one of their registered forms of additional verification. An administrator could require registration of these Azure Multi-Factor Authentication verification methods, or the user can access their own My Profile to edit or add verification methods.
The following additional forms of verification can be used with Azure Multi-Factor Authentication:
Microsoft Authenticator app
OATH Hardware token
SMS
Voice call
When a user signs in to an application or service and receives an MFA prompt, they can choose from one of their registered forms of additional verification. An administrator could require registration of these Azure Multi-Factor Authentication verification methods, or the user can access their own My Profile to edit or add verification methods.
The following additional forms of verification can be used with Azure Multi-Factor Authentication:
Microsoft Authenticator app
OATH Hardware token
SMS
Voice call
Users can be managed using groups. What else can be managed using groups?
Correct
Intune uses the Azure Active Directory (Azure AD) groups to manage devices and users. As an Intune admin, you can set up groups to suit your organizational needs. Create groups to organize users or devices by geographic location, department, or hardware characteristics. Use groups to manage tasks at scale. For example, you can set policies for many users or deploy apps to a set of devices.
You can add the following types of groups:
Assigned groups – Manually add users or devices into a static group.
Dynamic groups (Requires Azure AD Premium) – Automatically add users or devices to user groups or device groups based on an expression you create.
For example, when a user is added with the manager title, the user is automatically added to an All manager’s user group. Or, when a device has the iOS/iPadOS device OS type, the device is automatically added to an All iOS/iPadOS devices group.
Incorrect
Intune uses the Azure Active Directory (Azure AD) groups to manage devices and users. As an Intune admin, you can set up groups to suit your organizational needs. Create groups to organize users or devices by geographic location, department, or hardware characteristics. Use groups to manage tasks at scale. For example, you can set policies for many users or deploy apps to a set of devices.
You can add the following types of groups:
Assigned groups – Manually add users or devices into a static group.
Dynamic groups (Requires Azure AD Premium) – Automatically add users or devices to user groups or device groups based on an expression you create.
For example, when a user is added with the manager title, the user is automatically added to an All manager’s user group. Or, when a device has the iOS/iPadOS device OS type, the device is automatically added to an All iOS/iPadOS devices group.
Unattempted
Intune uses the Azure Active Directory (Azure AD) groups to manage devices and users. As an Intune admin, you can set up groups to suit your organizational needs. Create groups to organize users or devices by geographic location, department, or hardware characteristics. Use groups to manage tasks at scale. For example, you can set policies for many users or deploy apps to a set of devices.
You can add the following types of groups:
Assigned groups – Manually add users or devices into a static group.
Dynamic groups (Requires Azure AD Premium) – Automatically add users or devices to user groups or device groups based on an expression you create.
For example, when a user is added with the manager title, the user is automatically added to an All manager’s user group. Or, when a device has the iOS/iPadOS device OS type, the device is automatically added to an All iOS/iPadOS devices group.
Question 53 of 60
53. Question
When using the Active Hours feature, within Windows Update, what is the maximum length of time that can be set as ‘active hours’?
Correct
You can stop Windows 10 from restarting your PC automatically to apply updates while you’re actively using it.
Although there’s not an option in the Settings app to disable updates entirely, Windows 10 ships with “active hours,” which is a feature meant to make updates less intrusive by letting you specify the time you’ll be working on your computer. This means that if an update is pending, the reboot will occur outside the active hours.
The maximum amount of time you can set is 18 hours. If you specify a range that’s more than that, it’ll be marked as invalid
Incorrect
You can stop Windows 10 from restarting your PC automatically to apply updates while you’re actively using it.
Although there’s not an option in the Settings app to disable updates entirely, Windows 10 ships with “active hours,” which is a feature meant to make updates less intrusive by letting you specify the time you’ll be working on your computer. This means that if an update is pending, the reboot will occur outside the active hours.
The maximum amount of time you can set is 18 hours. If you specify a range that’s more than that, it’ll be marked as invalid
Unattempted
You can stop Windows 10 from restarting your PC automatically to apply updates while you’re actively using it.
Although there’s not an option in the Settings app to disable updates entirely, Windows 10 ships with “active hours,” which is a feature meant to make updates less intrusive by letting you specify the time you’ll be working on your computer. This means that if an update is pending, the reboot will occur outside the active hours.
The maximum amount of time you can set is 18 hours. If you specify a range that’s more than that, it’ll be marked as invalid
Question 54 of 60
54. Question
Microsoft Secure score actions are grouped into which four categories
Correct
Microsoft Secure Score is a measurement of an organization’s security posture, with a higher number indicating more improvement actions taken.
Microsoft Secure Score improvement actions are organized into groups:
Identity (Azure Active Directory accounts & roles)
Data (Microsoft Information Protection)
Device (Microsoft Defender ATP, known as Microsoft Secure Score for Devices)
App (email and cloud apps, including Office 365 and Microsoft Cloud App Security)
Infrastructure (no improvement actions for now)
Microsoft Secure Score is a measurement of an organization’s security posture, with a higher number indicating more improvement actions taken.
Microsoft Secure Score improvement actions are organized into groups:
Identity (Azure Active Directory accounts & roles)
Data (Microsoft Information Protection)
Device (Microsoft Defender ATP, known as Microsoft Secure Score for Devices)
App (email and cloud apps, including Office 365 and Microsoft Cloud App Security)
Infrastructure (no improvement actions for now)
Microsoft Secure Score is a measurement of an organization’s security posture, with a higher number indicating more improvement actions taken.
Microsoft Secure Score improvement actions are organized into groups:
Identity (Azure Active Directory accounts & roles)
Data (Microsoft Information Protection)
Device (Microsoft Defender ATP, known as Microsoft Secure Score for Devices)
App (email and cloud apps, including Office 365 and Microsoft Cloud App Security)
Infrastructure (no improvement actions for now)
If you want users to review their own personal work habit analytics. Which service should you direct them to?
Correct
Microsoft MyAnalytics is an application designed to help employees and their managers gain insight into how workers spend their time, with the goal of optimizing tasks and making them more efficient.
Incorrect
Microsoft MyAnalytics is an application designed to help employees and their managers gain insight into how workers spend their time, with the goal of optimizing tasks and making them more efficient.
Unattempted
Microsoft MyAnalytics is an application designed to help employees and their managers gain insight into how workers spend their time, with the goal of optimizing tasks and making them more efficient.
Question 56 of 60
56. Question
Rose is a SharePoint administrator for ABC company. Rose has been asked to allow OneDrive users to share documents with external users who have already been added to ABC company’s AAD tenant. Which option should Rose choose?
Correct
Incorrect
Unattempted
Question 57 of 60
57. Question
Identify four areas that My Analytics reports on
Correct
Incorrect
Unattempted
Question 58 of 60
58. Question
To fully manage a device using a Mobile Device Management service, what initial action needs to be completed?
Correct
You can manage different aspects of devices using the features built into Intune. This approach is called Mobile device management (MDM). Users “enroll” their devices, and use certificates to communicate with Intune. As an IT administrator, you push apps on devices, restrict devices to a specific operating system, block personal devices, and more. If a device is ever lost or stolen, you can also remove all data from the device.
More Info: https://docs.microsoft.com/en-us/mem/intune/fundamentals/what-is-device-management
Incorrect
You can manage different aspects of devices using the features built into Intune. This approach is called Mobile device management (MDM). Users “enroll” their devices, and use certificates to communicate with Intune. As an IT administrator, you push apps on devices, restrict devices to a specific operating system, block personal devices, and more. If a device is ever lost or stolen, you can also remove all data from the device.
More Info: https://docs.microsoft.com/en-us/mem/intune/fundamentals/what-is-device-management
Unattempted
You can manage different aspects of devices using the features built into Intune. This approach is called Mobile device management (MDM). Users “enroll” their devices, and use certificates to communicate with Intune. As an IT administrator, you push apps on devices, restrict devices to a specific operating system, block personal devices, and more. If a device is ever lost or stolen, you can also remove all data from the device.
More Info: https://docs.microsoft.com/en-us/mem/intune/fundamentals/what-is-device-management
SharePoint Online document lifecycle has three terms related to it. Can you identify those terms
Correct
Versioning is the method by which successive iterations of a document are numbered and saved in SharePoint.
To support retention, SharePoint and OneDrive create a Preservation Hold library if one doesn’t exist. You can view this library on the Site contents page in the top-level site of the site collection. Most users can’t view the Preservation Hold library because it’s visible only to site collection administrators.
The Site Collection (Second-Stage) Recycle Bin gives the administrator of a site collection greater control over deleted items by providing a second-stage safety net before an item is permanently deleted from a site. When you delete an item from your Recycle Bin, the item is sent to a second stage Recycle Bin (also known as the Site Collection (Second-Stage) Recycle Bin) that the administrator of the site collection manages.
Incorrect
Versioning is the method by which successive iterations of a document are numbered and saved in SharePoint.
To support retention, SharePoint and OneDrive create a Preservation Hold library if one doesn’t exist. You can view this library on the Site contents page in the top-level site of the site collection. Most users can’t view the Preservation Hold library because it’s visible only to site collection administrators.
The Site Collection (Second-Stage) Recycle Bin gives the administrator of a site collection greater control over deleted items by providing a second-stage safety net before an item is permanently deleted from a site. When you delete an item from your Recycle Bin, the item is sent to a second stage Recycle Bin (also known as the Site Collection (Second-Stage) Recycle Bin) that the administrator of the site collection manages.
Unattempted
Versioning is the method by which successive iterations of a document are numbered and saved in SharePoint.
To support retention, SharePoint and OneDrive create a Preservation Hold library if one doesn’t exist. You can view this library on the Site contents page in the top-level site of the site collection. Most users can’t view the Preservation Hold library because it’s visible only to site collection administrators.
The Site Collection (Second-Stage) Recycle Bin gives the administrator of a site collection greater control over deleted items by providing a second-stage safety net before an item is permanently deleted from a site. When you delete an item from your Recycle Bin, the item is sent to a second stage Recycle Bin (also known as the Site Collection (Second-Stage) Recycle Bin) that the administrator of the site collection manages.
Use Page numbers below to navigate to other practice tests