You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" MS-900 Practice Test 6 "
0 of 60 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
MS-900
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking view questions. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Answered
Review
Question 1 of 60
1. Question
Which service manages the sending out of alert email messages for Microsoft Intune?
Which two of the following authentication methods does not depend on the availability of the on-premises infrastructure?
Correct
A cloud-only identity uses user accounts that exist only in Azure AD. Cloud identity is typically used by small organizations that do not have on-premises servers or do not use AD DS to manage local identities.
Password hash synchronization is one of the sign-in methods used to accomplish a hybrid identity. Azure AD Connect synchronizes a hash, of the hash, of a user’s password from an on-premises Active Directory instance to a cloud-based Azure AD instance. You sign in to the service by using the same password you use to sign in to your on-premises Active Directory instance.
Incorrect
A cloud-only identity uses user accounts that exist only in Azure AD. Cloud identity is typically used by small organizations that do not have on-premises servers or do not use AD DS to manage local identities.
Password hash synchronization is one of the sign-in methods used to accomplish a hybrid identity. Azure AD Connect synchronizes a hash, of the hash, of a user’s password from an on-premises Active Directory instance to a cloud-based Azure AD instance. You sign in to the service by using the same password you use to sign in to your on-premises Active Directory instance.
Unattempted
A cloud-only identity uses user accounts that exist only in Azure AD. Cloud identity is typically used by small organizations that do not have on-premises servers or do not use AD DS to manage local identities.
Password hash synchronization is one of the sign-in methods used to accomplish a hybrid identity. Azure AD Connect synchronizes a hash, of the hash, of a user’s password from an on-premises Active Directory instance to a cloud-based Azure AD instance. You sign in to the service by using the same password you use to sign in to your on-premises Active Directory instance.
Question 3 of 60
3. Question
You are a compliance officer for your organization. You need to implement a policy to schedule the periodic verification of Azure Active Directory group memberships. Which tool will help you achieve this objective?
Correct
Azure Active Directory (Azure AD) access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments. User’s access can be reviewed on a regular basis to make sure only the right people have continued access.
More Info: https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview
Incorrect
Azure Active Directory (Azure AD) access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments. User’s access can be reviewed on a regular basis to make sure only the right people have continued access.
More Info: https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview
Unattempted
Azure Active Directory (Azure AD) access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments. User’s access can be reviewed on a regular basis to make sure only the right people have continued access.
More Info: https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview
Question 4 of 60
4. Question
Identify two statements about OneDrive sharing controls
Correct
Incorrect
Unattempted
Question 5 of 60
5. Question
When authenticating a user under Azure MFA which three of the following are official concepts?
Correct
Azure Multi-Factor Authentication works by requiring two or more of the following authentication methods:
Something you know, typically a password.
Something you have, such as a trusted device that is not easily duplicated, like a phone or hardware key.
Something you are – biometrics like a fingerprint or face scan.
Azure Multi-Factor Authentication works by requiring two or more of the following authentication methods:
Something you know, typically a password.
Something you have, such as a trusted device that is not easily duplicated, like a phone or hardware key.
Something you are – biometrics like a fingerprint or face scan.
Azure Multi-Factor Authentication works by requiring two or more of the following authentication methods:
Something you know, typically a password.
Something you have, such as a trusted device that is not easily duplicated, like a phone or hardware key.
Something you are – biometrics like a fingerprint or face scan.
You are a Microsoft 365 Administrator for your organization. As a part of the business initiative, you have been asked for both aggregate data and detailed dashboards of where your organization stands in relation to Microsoft 365 adoption. Which tools would be most helpful in providing this data?
Correct
Use Microsoft 365 usage analytics within Power BI to gain insights on how your organization is adopting the various services within Microsoft 365 to communicate and collaborate
You can easily see the activity reports to understand how people in your business are using Microsoft 365 services. For example, you can identify who is using a service a lot and reaching quotas, or who may not need a Microsoft 365 license at all.
A combination of both these tools will reflect where your organization stands in relation to adopting Microsoft 365.
Incorrect
Use Microsoft 365 usage analytics within Power BI to gain insights on how your organization is adopting the various services within Microsoft 365 to communicate and collaborate
You can easily see the activity reports to understand how people in your business are using Microsoft 365 services. For example, you can identify who is using a service a lot and reaching quotas, or who may not need a Microsoft 365 license at all.
A combination of both these tools will reflect where your organization stands in relation to adopting Microsoft 365.
Unattempted
Use Microsoft 365 usage analytics within Power BI to gain insights on how your organization is adopting the various services within Microsoft 365 to communicate and collaborate
You can easily see the activity reports to understand how people in your business are using Microsoft 365 services. For example, you can identify who is using a service a lot and reaching quotas, or who may not need a Microsoft 365 license at all.
A combination of both these tools will reflect where your organization stands in relation to adopting Microsoft 365.
Question 8 of 60
8. Question
The_______________________________is a one-stop shop to manage and complete tasks for your mobile devices. This workspace includes the services used for device management, including Intune and Azure Active Directory, and to also manage client apps.
Correct
The Microsoft Endpoint Manager admin center is where you can find the Microsoft Intune service, as well as other device management related settings. Understanding the features available in Intune will help you accomplish various Mobile Device Management (MDM) and Mobile Application Management (MAM) tasks. https://docs.microsoft.com/en-us/mem/intune/fundamentals/what-is-device-management
Incorrect
The Microsoft Endpoint Manager admin center is where you can find the Microsoft Intune service, as well as other device management related settings. Understanding the features available in Intune will help you accomplish various Mobile Device Management (MDM) and Mobile Application Management (MAM) tasks. https://docs.microsoft.com/en-us/mem/intune/fundamentals/what-is-device-management
Unattempted
The Microsoft Endpoint Manager admin center is where you can find the Microsoft Intune service, as well as other device management related settings. Understanding the features available in Intune will help you accomplish various Mobile Device Management (MDM) and Mobile Application Management (MAM) tasks. https://docs.microsoft.com/en-us/mem/intune/fundamentals/what-is-device-management
Question 9 of 60
9. Question
Password change management recommends customers configure _________________ so that password changes in Azure are updated in the on-premises Active Directory
Correct
Password writeback is a feature of Azure AD Connect which ensures that when a password changes in Azure AD (password change, self-service password reset, or an administrative charge to a user password) it is written back to the local AD – if they meet the on-premises AD password policy.
Incorrect
Password writeback is a feature of Azure AD Connect which ensures that when a password changes in Azure AD (password change, self-service password reset, or an administrative charge to a user password) it is written back to the local AD – if they meet the on-premises AD password policy.
Unattempted
Password writeback is a feature of Azure AD Connect which ensures that when a password changes in Azure AD (password change, self-service password reset, or an administrative charge to a user password) it is written back to the local AD – if they meet the on-premises AD password policy.
Question 10 of 60
10. Question
Identify four types of Groups available with Microsoft 365.
Correct
In the Groups section of the Microsoft 365 admin center, you can create and manage these types of groups:
Microsoft 365 groups (formerly Office 365 groups) are used for collaboration between users, both inside and outside your company.
Distribution groups are used for sending notifications to a group of people.
Security groups are used for granting access to resources such as SharePoint sites.
Mail-enabled security groups are used for granting access to resources such as SharePoint and emailing notifications to those users.
Shared mailboxes are used when multiple people need access to the same mailbox, such as company information or support email address.
In the Groups section of the Microsoft 365 admin center, you can create and manage these types of groups:
Microsoft 365 groups (formerly Office 365 groups) are used for collaboration between users, both inside and outside your company.
Distribution groups are used for sending notifications to a group of people.
Security groups are used for granting access to resources such as SharePoint sites.
Mail-enabled security groups are used for granting access to resources such as SharePoint and emailing notifications to those users.
Shared mailboxes are used when multiple people need access to the same mailbox, such as company information or support email address.
In the Groups section of the Microsoft 365 admin center, you can create and manage these types of groups:
Microsoft 365 groups (formerly Office 365 groups) are used for collaboration between users, both inside and outside your company.
Distribution groups are used for sending notifications to a group of people.
Security groups are used for granting access to resources such as SharePoint sites.
Mail-enabled security groups are used for granting access to resources such as SharePoint and emailing notifications to those users.
Shared mailboxes are used when multiple people need access to the same mailbox, such as company information or support email address.
MyAnalytics is a personalized dashboard that provides a summary of the hours one spends in meetings, using email, “focusing,” and working after hours, as well as suggestions on how to reduce unproductive meeting times and post-schedule work.
In essence, it analyzes how users spend their time and with whom they spend it.
Incorrect
MyAnalytics is a personalized dashboard that provides a summary of the hours one spends in meetings, using email, “focusing,” and working after hours, as well as suggestions on how to reduce unproductive meeting times and post-schedule work.
In essence, it analyzes how users spend their time and with whom they spend it.
Unattempted
MyAnalytics is a personalized dashboard that provides a summary of the hours one spends in meetings, using email, “focusing,” and working after hours, as well as suggestions on how to reduce unproductive meeting times and post-schedule work.
In essence, it analyzes how users spend their time and with whom they spend it.
Question 12 of 60
12. Question
Identify two features or capabilities of the Secure Score?
Correct
Microsoft Secure Score is a measurement of an organization’s security posture, with a higher number indicating more improvement actions taken. It can be found at https://security.microsoft.com/securescore in the Microsoft 365 security center.
Secure Score helps organizations:
Report on the current state of the organization’s security posture.
Improve their security posture by providing discoverability, visibility, guidance, and control.
Compare with benchmarks and establish key performance indicators (KPIs).
More Info: https://docs.microsoft.com/en-us/microsoft-365/security/mtp/microsoft-secure-score?view=o365-worldwide
Incorrect
Microsoft Secure Score is a measurement of an organization’s security posture, with a higher number indicating more improvement actions taken. It can be found at https://security.microsoft.com/securescore in the Microsoft 365 security center.
Secure Score helps organizations:
Report on the current state of the organization’s security posture.
Improve their security posture by providing discoverability, visibility, guidance, and control.
Compare with benchmarks and establish key performance indicators (KPIs).
More Info: https://docs.microsoft.com/en-us/microsoft-365/security/mtp/microsoft-secure-score?view=o365-worldwide
Unattempted
Microsoft Secure Score is a measurement of an organization’s security posture, with a higher number indicating more improvement actions taken. It can be found at https://security.microsoft.com/securescore in the Microsoft 365 security center.
Secure Score helps organizations:
Report on the current state of the organization’s security posture.
Improve their security posture by providing discoverability, visibility, guidance, and control.
Compare with benchmarks and establish key performance indicators (KPIs).
More Info: https://docs.microsoft.com/en-us/microsoft-365/security/mtp/microsoft-secure-score?view=o365-worldwide
Question 13 of 60
13. Question
Which area of the admin center do you use to create Alerts?
Correct
To create an alert policy, open the Office 365 Admin Center, and click on the Security option. When the Security & Compliance screen appears, expand the Alerts section, and then click on Dashboard. This will cause Office 365 to a list of existing alert policies. To create a new alert policy, on the dashboard click on the New Alert Policy button, shown in below Figure
Incorrect
To create an alert policy, open the Office 365 Admin Center, and click on the Security option. When the Security & Compliance screen appears, expand the Alerts section, and then click on Dashboard. This will cause Office 365 to a list of existing alert policies. To create a new alert policy, on the dashboard click on the New Alert Policy button, shown in below Figure
Unattempted
To create an alert policy, open the Office 365 Admin Center, and click on the Security option. When the Security & Compliance screen appears, expand the Alerts section, and then click on Dashboard. This will cause Office 365 to a list of existing alert policies. To create a new alert policy, on the dashboard click on the New Alert Policy button, shown in below Figure
Question 14 of 60
14. Question
TRUE OR FALSE
Microsoft Cloud App Security rates apps from 1 to 10. Low-risk apps are rated 10.
Microsoft 365 Activity Reports are accessed through which interface?
Correct
Incorrect
Unattempted
Question 16 of 60
16. Question
Which two of the listed methods allow you to configure authentication where password validation will happen on-premises.
Correct
AD FS provides simplified, secured identity federation and Web single sign-on (SSO) capabilities. Federation with Azure AD or O365 enables users to authenticate using on-premises credentials and access all resources in the cloud. As a result, it becomes important to have a highly available AD FS infrastructure to ensure access to resources both on-premises and in the cloud.
Azure Active Directory (Azure AD) Pass-through Authentication allows your users to sign in to both on-premises and cloud-based applications using the same passwords. This feature provides your users with a better experience – one less password to remember and reduces IT helpdesk costs because your users are less likely to forget how to sign in.
This feature is an alternative to Azure AD Password Hash Synchronization, which provides the same benefit of cloud authentication to organizations. However, certain organizations wanting to enforce their on-premises Active Directory security and password policies can choose to use Pass-through Authentication instead.
Incorrect
AD FS provides simplified, secured identity federation and Web single sign-on (SSO) capabilities. Federation with Azure AD or O365 enables users to authenticate using on-premises credentials and access all resources in the cloud. As a result, it becomes important to have a highly available AD FS infrastructure to ensure access to resources both on-premises and in the cloud.
Azure Active Directory (Azure AD) Pass-through Authentication allows your users to sign in to both on-premises and cloud-based applications using the same passwords. This feature provides your users with a better experience – one less password to remember and reduces IT helpdesk costs because your users are less likely to forget how to sign in.
This feature is an alternative to Azure AD Password Hash Synchronization, which provides the same benefit of cloud authentication to organizations. However, certain organizations wanting to enforce their on-premises Active Directory security and password policies can choose to use Pass-through Authentication instead.
Unattempted
AD FS provides simplified, secured identity federation and Web single sign-on (SSO) capabilities. Federation with Azure AD or O365 enables users to authenticate using on-premises credentials and access all resources in the cloud. As a result, it becomes important to have a highly available AD FS infrastructure to ensure access to resources both on-premises and in the cloud.
Azure Active Directory (Azure AD) Pass-through Authentication allows your users to sign in to both on-premises and cloud-based applications using the same passwords. This feature provides your users with a better experience – one less password to remember and reduces IT helpdesk costs because your users are less likely to forget how to sign in.
This feature is an alternative to Azure AD Password Hash Synchronization, which provides the same benefit of cloud authentication to organizations. However, certain organizations wanting to enforce their on-premises Active Directory security and password policies can choose to use Pass-through Authentication instead.
Question 17 of 60
17. Question
What kind of tool is PowerBI?
Correct
Power BIÂ is a collection of software services, apps, and connectors that work together to turn your unrelated sources of data into coherent, visually immersive, and interactive insights. Your data may be an Excel spreadsheet or a collection of cloud-based and on-premises hybrid data warehouses. Power BI lets you easily connect to your data sources, visualize and discover what’s important, and share that with anyone or everyone you want.
Hence Power BIÂ can be considered as a data visualization tool.
Incorrect
Power BIÂ is a collection of software services, apps, and connectors that work together to turn your unrelated sources of data into coherent, visually immersive, and interactive insights. Your data may be an Excel spreadsheet or a collection of cloud-based and on-premises hybrid data warehouses. Power BI lets you easily connect to your data sources, visualize and discover what’s important, and share that with anyone or everyone you want.
Hence Power BIÂ can be considered as a data visualization tool.
Unattempted
Power BIÂ is a collection of software services, apps, and connectors that work together to turn your unrelated sources of data into coherent, visually immersive, and interactive insights. Your data may be an Excel spreadsheet or a collection of cloud-based and on-premises hybrid data warehouses. Power BI lets you easily connect to your data sources, visualize and discover what’s important, and share that with anyone or everyone you want.
Hence Power BIÂ can be considered as a data visualization tool.
What is the name of the tool that manages synchronization between Azure Active Directory and Active Directory Domain Services?
Correct
Azure AD Connect is the Microsoft tool designed to meet and accomplish your hybrid identity goals. It provides the following features:
Password hash synchronization – A sign-in method that synchronizes a hash of a user’s on-premises AD password with Azure AD.
Pass-through authentication – A sign-in method that allows users to use the same password on-premises and in the cloud, but doesn’t require the additional infrastructure of a federated environment.
Federation integration – Federation is an optional part of Azure AD Connect and can be used to configure a hybrid environment using an on-premises AD FS infrastructure. It also provides AD FS management capabilities such as certificate renewal and additional AD FS server deployments.
Synchronization – Responsible for creating users, groups, and other objects. As well as, making sure identity information for your on-premises users and groups is matching the cloud. This synchronization also includes password hashes.
Health Monitoring – Azure AD Connect Health can provide robust monitoring and provide a central location in the Azure portal to view this activity.
Incorrect
Azure AD Connect is the Microsoft tool designed to meet and accomplish your hybrid identity goals. It provides the following features:
Password hash synchronization – A sign-in method that synchronizes a hash of a user’s on-premises AD password with Azure AD.
Pass-through authentication – A sign-in method that allows users to use the same password on-premises and in the cloud, but doesn’t require the additional infrastructure of a federated environment.
Federation integration – Federation is an optional part of Azure AD Connect and can be used to configure a hybrid environment using an on-premises AD FS infrastructure. It also provides AD FS management capabilities such as certificate renewal and additional AD FS server deployments.
Synchronization – Responsible for creating users, groups, and other objects. As well as, making sure identity information for your on-premises users and groups is matching the cloud. This synchronization also includes password hashes.
Health Monitoring – Azure AD Connect Health can provide robust monitoring and provide a central location in the Azure portal to view this activity.
Unattempted
Azure AD Connect is the Microsoft tool designed to meet and accomplish your hybrid identity goals. It provides the following features:
Password hash synchronization – A sign-in method that synchronizes a hash of a user’s on-premises AD password with Azure AD.
Pass-through authentication – A sign-in method that allows users to use the same password on-premises and in the cloud, but doesn’t require the additional infrastructure of a federated environment.
Federation integration – Federation is an optional part of Azure AD Connect and can be used to configure a hybrid environment using an on-premises AD FS infrastructure. It also provides AD FS management capabilities such as certificate renewal and additional AD FS server deployments.
Synchronization – Responsible for creating users, groups, and other objects. As well as, making sure identity information for your on-premises users and groups is matching the cloud. This synchronization also includes password hashes.
Health Monitoring – Azure AD Connect Health can provide robust monitoring and provide a central location in the Azure portal to view this activity.
Question 20 of 60
20. Question
What action do you need to complete to grant users the right to use an app?
Correct
Prior to assigning the app to a user, you must create a user, create a group, and enroll a device.
You can then use Intune to add and assign a client app to your company’s workforce/user. Remember one of the admin’s priorities is to ensure that end-users have access to the apps they need to do their work.
Incorrect
Prior to assigning the app to a user, you must create a user, create a group, and enroll a device.
You can then use Intune to add and assign a client app to your company’s workforce/user. Remember one of the admin’s priorities is to ensure that end-users have access to the apps they need to do their work.
Unattempted
Prior to assigning the app to a user, you must create a user, create a group, and enroll a device.
You can then use Intune to add and assign a client app to your company’s workforce/user. Remember one of the admin’s priorities is to ensure that end-users have access to the apps they need to do their work.
Question 21 of 60
21. Question
Which identifier is used to register devices with the Windows AutoPilot Deployment Service?
Correct
Before deploying a device using Windows Autopilot, the device must be registered with the Windows Autopilot deployment service. Ideally, this registration is performed by the OEM, reseller, or distributor from which the devices were purchased. The device hardware ID is required as an identifier in such a case to simplify the concept. In reality, the process is more complex and has been explained in below link
Incorrect
Before deploying a device using Windows Autopilot, the device must be registered with the Windows Autopilot deployment service. Ideally, this registration is performed by the OEM, reseller, or distributor from which the devices were purchased. The device hardware ID is required as an identifier in such a case to simplify the concept. In reality, the process is more complex and has been explained in below link
Unattempted
Before deploying a device using Windows Autopilot, the device must be registered with the Windows Autopilot deployment service. Ideally, this registration is performed by the OEM, reseller, or distributor from which the devices were purchased. The device hardware ID is required as an identifier in such a case to simplify the concept. In reality, the process is more complex and has been explained in below link
Question 22 of 60
22. Question
Identify two features of Intune Mobile Application Management.
Correct
As an IT admin, you can use Microsoft Intune to manage the client apps that your company’s workforce uses. This functionality is in addition to managing devices and protecting data.
Require device PIN and Wipe managed device are features of MDM.
More Info: https://docs.microsoft.com/en-us/mem/intune/apps/app-management
Incorrect
As an IT admin, you can use Microsoft Intune to manage the client apps that your company’s workforce uses. This functionality is in addition to managing devices and protecting data.
Require device PIN and Wipe managed device are features of MDM.
More Info: https://docs.microsoft.com/en-us/mem/intune/apps/app-management
Unattempted
As an IT admin, you can use Microsoft Intune to manage the client apps that your company’s workforce uses. This functionality is in addition to managing devices and protecting data.
Require device PIN and Wipe managed device are features of MDM.
More Info: https://docs.microsoft.com/en-us/mem/intune/apps/app-management
Question 23 of 60
23. Question
You are an IT administrator for a company. You have been asked to configure an authentication method where users are authenticated on-premises. Which option would suit best to achieve this objective?
Correct
AD FS provides simplified, secured identity federation and Web single sign-on (SSO) capabilities. Federation with Azure AD or O365 enables users to authenticate using on-premises credentials and access all resources in the cloud. As a result, it becomes important to have a highly available AD FS infrastructure to ensure access to resources both on-premises and in the cloud.
Incorrect
AD FS provides simplified, secured identity federation and Web single sign-on (SSO) capabilities. Federation with Azure AD or O365 enables users to authenticate using on-premises credentials and access all resources in the cloud. As a result, it becomes important to have a highly available AD FS infrastructure to ensure access to resources both on-premises and in the cloud.
Unattempted
AD FS provides simplified, secured identity federation and Web single sign-on (SSO) capabilities. Federation with Azure AD or O365 enables users to authenticate using on-premises credentials and access all resources in the cloud. As a result, it becomes important to have a highly available AD FS infrastructure to ensure access to resources both on-premises and in the cloud.
Question 24 of 60
24. Question
In order to connect Microsoft 365 Usage Analytics to Power BI, what data must you provide?
Correct
Incorrect
Unattempted
Question 25 of 60
25. Question
Unmanned devices, such as kiosks and digital signs need, to be assigned a license.
Within Compliance Manager, which tool can be used to manage documents for legal cases?
Correct
Electronic discovery, or eDiscovery, is the process of identifying and delivering electronic information that can be used as evidence in legal cases. You can use eDiscovery tools in Microsoft 365 to search for content in Exchange Online mailboxes, Microsoft 365 Groups, Microsoft Teams, SharePoint Online and OneDrive for Business sites, and Skype for Business conversations, and Yammer teams.
More information: https://docs.microsoft.com/en-us/microsoft-365/compliance/ediscovery?view=o365-worldwide
Incorrect
Electronic discovery, or eDiscovery, is the process of identifying and delivering electronic information that can be used as evidence in legal cases. You can use eDiscovery tools in Microsoft 365 to search for content in Exchange Online mailboxes, Microsoft 365 Groups, Microsoft Teams, SharePoint Online and OneDrive for Business sites, and Skype for Business conversations, and Yammer teams.
More information: https://docs.microsoft.com/en-us/microsoft-365/compliance/ediscovery?view=o365-worldwide
Unattempted
Electronic discovery, or eDiscovery, is the process of identifying and delivering electronic information that can be used as evidence in legal cases. You can use eDiscovery tools in Microsoft 365 to search for content in Exchange Online mailboxes, Microsoft 365 Groups, Microsoft Teams, SharePoint Online and OneDrive for Business sites, and Skype for Business conversations, and Yammer teams.
More information: https://docs.microsoft.com/en-us/microsoft-365/compliance/ediscovery?view=o365-worldwide
Question 27 of 60
27. Question
Windows AutoPilot can be used with which operating system?
When deploying Azure Active Directory Connect Password Hash synchronization, what happens to the Azure AD Password Policy?
Correct
Password hash synchronization is one of the sign-in methods used to accomplish a hybrid identity. Azure AD Connect synchronizes a hash, of the hash, of a user’s password from an on-premises Active Directory instance to a cloud-based Azure AD instance.
When password hash synchronization is enabled, the password complexity policies in your on-premises Active Directory instance override complexity policies in the cloud for synchronized users. You can use all of the valid passwords from your on-premises Active Directory instance to access Azure AD services.
More Info: https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-password-hash-synchronization
Incorrect
Password hash synchronization is one of the sign-in methods used to accomplish a hybrid identity. Azure AD Connect synchronizes a hash, of the hash, of a user’s password from an on-premises Active Directory instance to a cloud-based Azure AD instance.
When password hash synchronization is enabled, the password complexity policies in your on-premises Active Directory instance override complexity policies in the cloud for synchronized users. You can use all of the valid passwords from your on-premises Active Directory instance to access Azure AD services.
More Info: https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-password-hash-synchronization
Unattempted
Password hash synchronization is one of the sign-in methods used to accomplish a hybrid identity. Azure AD Connect synchronizes a hash, of the hash, of a user’s password from an on-premises Active Directory instance to a cloud-based Azure AD instance.
When password hash synchronization is enabled, the password complexity policies in your on-premises Active Directory instance override complexity policies in the cloud for synchronized users. You can use all of the valid passwords from your on-premises Active Directory instance to access Azure AD services.
More Info: https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-password-hash-synchronization
Question 29 of 60
29. Question
When using Microsoft Intune, apps can be protected by using which policies?
Correct
App protection policies (APP) are rules that ensure an organization’s data remains safe or contained in a managed app
Incorrect
App protection policies (APP) are rules that ensure an organization’s data remains safe or contained in a managed app
Unattempted
App protection policies (APP) are rules that ensure an organization’s data remains safe or contained in a managed app
Question 30 of 60
30. Question
The cost of a Microsoft 365 subscription will depend on the SKU purchased and any add-in services purchased. Which other factor affects the cost?
Correct
The total cost of Microsoft 365 subscription for an organization will depend on the SKU’s purchased, any add-in services purchased & the number of users.
Incorrect
The total cost of Microsoft 365 subscription for an organization will depend on the SKU’s purchased, any add-in services purchased & the number of users.
Unattempted
The total cost of Microsoft 365 subscription for an organization will depend on the SKU’s purchased, any add-in services purchased & the number of users.
Question 31 of 60
31. Question
Self-Service password reset can update on-premise and cloud passwords?
Correct
Azure Active Directory (Azure AD) self-service password reset (SSPR) gives users the ability to change or reset their password, with no administrator or help desk involvement. If a user’s account is locked or they forget their password, they can follow prompts to unblock themselves and get back to work.
Password reset is subject to conditions or requirements configured(e.g. security questions) by administrators. After successful validation, user passwords can also be written back to an on-premise identity AD environment.
Incorrect
Azure Active Directory (Azure AD) self-service password reset (SSPR) gives users the ability to change or reset their password, with no administrator or help desk involvement. If a user’s account is locked or they forget their password, they can follow prompts to unblock themselves and get back to work.
Password reset is subject to conditions or requirements configured(e.g. security questions) by administrators. After successful validation, user passwords can also be written back to an on-premise identity AD environment.
Unattempted
Azure Active Directory (Azure AD) self-service password reset (SSPR) gives users the ability to change or reset their password, with no administrator or help desk involvement. If a user’s account is locked or they forget their password, they can follow prompts to unblock themselves and get back to work.
Password reset is subject to conditions or requirements configured(e.g. security questions) by administrators. After successful validation, user passwords can also be written back to an on-premise identity AD environment.
Question 32 of 60
32. Question
The general SLA for Microsoft 365 availability is expressed as
Organizations can choose Microsoft GCC if they meet this requirement?
Correct
To meet the unique and evolving requirements of the United States Federal, State, Local, and Tribal governments, as well as contractors holding or processing data on behalf of the US Government, Microsoft offers Office 365 US Government Community (GCC) services. Available through multiple channels including Volume Licensing, interested organizations go through a validation process to ensure eligibility before an environment is established. Trials are available to only US Government entities at this time.
Incorrect
To meet the unique and evolving requirements of the United States Federal, State, Local, and Tribal governments, as well as contractors holding or processing data on behalf of the US Government, Microsoft offers Office 365 US Government Community (GCC) services. Available through multiple channels including Volume Licensing, interested organizations go through a validation process to ensure eligibility before an environment is established. Trials are available to only US Government entities at this time.
Unattempted
To meet the unique and evolving requirements of the United States Federal, State, Local, and Tribal governments, as well as contractors holding or processing data on behalf of the US Government, Microsoft offers Office 365 US Government Community (GCC) services. Available through multiple channels including Volume Licensing, interested organizations go through a validation process to ensure eligibility before an environment is established. Trials are available to only US Government entities at this time.
Question 34 of 60
34. Question
The feature that allows just-in-time rights management and access rights elevation is which of the following?
Correct
Just-in-Time Privileged Access Management (JIT PAM) is the method by which organizations can enforce “true” least privilege, to drastically reduce the threat surface.
Privileged Identity Management provides time-based and approval-based role activation to mitigate the risks of excessive, unnecessary, or misused access permissions on resources that you care about. Here are some of the key features of Privileged Identity Management:
Provide just-in-time privileged access to Azure AD and Azure resources
Assign time-bound access to resources using start and end dates
Require approval to activate privileged roles
Enforce multi-factor authentication to activate any role
Use justification to understand why users activate
Get notifications when privileged roles are activated
Conduct access reviews to ensure users still need roles
Download audit history for internal or external audit
Incorrect
Just-in-Time Privileged Access Management (JIT PAM) is the method by which organizations can enforce “true” least privilege, to drastically reduce the threat surface.
Privileged Identity Management provides time-based and approval-based role activation to mitigate the risks of excessive, unnecessary, or misused access permissions on resources that you care about. Here are some of the key features of Privileged Identity Management:
Provide just-in-time privileged access to Azure AD and Azure resources
Assign time-bound access to resources using start and end dates
Require approval to activate privileged roles
Enforce multi-factor authentication to activate any role
Use justification to understand why users activate
Get notifications when privileged roles are activated
Conduct access reviews to ensure users still need roles
Download audit history for internal or external audit
Unattempted
Just-in-Time Privileged Access Management (JIT PAM) is the method by which organizations can enforce “true” least privilege, to drastically reduce the threat surface.
Privileged Identity Management provides time-based and approval-based role activation to mitigate the risks of excessive, unnecessary, or misused access permissions on resources that you care about. Here are some of the key features of Privileged Identity Management:
Provide just-in-time privileged access to Azure AD and Azure resources
Assign time-bound access to resources using start and end dates
Require approval to activate privileged roles
Enforce multi-factor authentication to activate any role
Use justification to understand why users activate
Get notifications when privileged roles are activated
Conduct access reviews to ensure users still need roles
Download audit history for internal or external audit
Question 35 of 60
35. Question
Office 365 Attack Simulator is a part of __________________________.
Correct
If your organization has Office 365 Advanced Threat Protection (ATP) Plan 2, which includes Threat Investigation and Response capabilities, you can use Attack Simulator in the Security & Compliance Center to run realistic attack scenarios in your organization. These simulated attacks can help you identify and find vulnerable users before a real attack impacts your bottom line.
Incorrect
If your organization has Office 365 Advanced Threat Protection (ATP) Plan 2, which includes Threat Investigation and Response capabilities, you can use Attack Simulator in the Security & Compliance Center to run realistic attack scenarios in your organization. These simulated attacks can help you identify and find vulnerable users before a real attack impacts your bottom line.
Unattempted
If your organization has Office 365 Advanced Threat Protection (ATP) Plan 2, which includes Threat Investigation and Response capabilities, you can use Attack Simulator in the Security & Compliance Center to run realistic attack scenarios in your organization. These simulated attacks can help you identify and find vulnerable users before a real attack impacts your bottom line.
Question 36 of 60
36. Question
You are a security administrator for ABC company. ABC Company’s CIO has asked you to automate a process to check on group memberships and remove stale accounts from groups. Which tool or feature would you use to fulfill the requirement?
You are a security auditor with ABC company. You discover that several users in your organization are using passwords which can be considered poor as they contain the name of your company. Which tool/feature would you use to prevent users from choosing passwords that contain specific words?
What are the two characteristics of the public cloud? Each correct answer presents a complete solution.
Correct
Cloud does provide (D) metered pricing, as you pay for the resources you use. IT also provides a self-managed service, as you can use the portal to add, change, and also remove the resources you need when you need them. Hardware is shared among public cloud clients, so it is NOT dedicated. Connections on the cloud are SECURED, so it (unsecured connections) does not apply to Public Cloud. Storage is virtually unlimited on the cloud, so “limited storage” does not apply either.
Incorrect
Cloud does provide (D) metered pricing, as you pay for the resources you use. IT also provides a self-managed service, as you can use the portal to add, change, and also remove the resources you need when you need them. Hardware is shared among public cloud clients, so it is NOT dedicated. Connections on the cloud are SECURED, so it (unsecured connections) does not apply to Public Cloud. Storage is virtually unlimited on the cloud, so “limited storage” does not apply either.
Unattempted
Cloud does provide (D) metered pricing, as you pay for the resources you use. IT also provides a self-managed service, as you can use the portal to add, change, and also remove the resources you need when you need them. Hardware is shared among public cloud clients, so it is NOT dedicated. Connections on the cloud are SECURED, so it (unsecured connections) does not apply to Public Cloud. Storage is virtually unlimited on the cloud, so “limited storage” does not apply either.
Question 39 of 60
39. Question
You are a network administrator for ABC company. The CIO of ABC company has asked you to provide remote access to internal applications securely using existing AAD Conditional Access policies. Which tool would you use to achieve the objective?
Correct
When the need arises to securely provide access for internal line-of-business apps to people outside your network Azure Application Proxy can be used to achieve this goal. It is a great alternative to VPN’s (Virtual Private Network) which needs complicated VPN tunnel configuration.
One added benefit is that applications configured to use Azure Application Proxy can also take advantage of Azure MFA.
Incorrect
When the need arises to securely provide access for internal line-of-business apps to people outside your network Azure Application Proxy can be used to achieve this goal. It is a great alternative to VPN’s (Virtual Private Network) which needs complicated VPN tunnel configuration.
One added benefit is that applications configured to use Azure Application Proxy can also take advantage of Azure MFA.
Unattempted
When the need arises to securely provide access for internal line-of-business apps to people outside your network Azure Application Proxy can be used to achieve this goal. It is a great alternative to VPN’s (Virtual Private Network) which needs complicated VPN tunnel configuration.
One added benefit is that applications configured to use Azure Application Proxy can also take advantage of Azure MFA.
Question 40 of 60
40. Question
This question requires that you evaluate the “Italicized” text to determine if it is correct.
An organization that hosts its infrastructure in a private cloud can decommission its data center.
Instructions: Review the” Italicized” text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice that makes the statement correct.
Correct
The only alternative that makes it possible for the company, to shut down its servers is to be 100% hosted on the cloud, specifically is the public cloud
Incorrect
The only alternative that makes it possible for the company, to shut down its servers is to be 100% hosted on the cloud, specifically is the public cloud
Unattempted
The only alternative that makes it possible for the company, to shut down its servers is to be 100% hosted on the cloud, specifically is the public cloud
Question 41 of 60
41. Question
Identify 3 best practices for determining the licensing strategy for your organization.
Correct
Determining and implementing the best strategy includes:
Define baseline
Define service requirements
Define personas
Consider add ons
Incorrect
Determining and implementing the best strategy includes:
Define baseline
Define service requirements
Define personas
Consider add ons
Unattempted
Determining and implementing the best strategy includes:
Define baseline
Define service requirements
Define personas
Consider add ons
Question 42 of 60
42. Question
You are an IT director for a medium-sized commercial organization with 220 employees. You have to decide on a cost-effective solution from Microsoft 365 services range for your users. Which option out of the following would be the best choice?
Correct
Incorrect
Unattempted
Question 43 of 60
43. Question
This question requires that you evaluate the underlined text to determine if it is correct.
When planning to migrate a public website to Azure, you must plan to pay monthly usage costs.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice that makes the statement correct.
Correct
In Azure, you only pay for outbound traffic which is charged in GB as you are entitled to 5GB in a month but afterward you pay for data being transferred out. However, with inbound data traffic into your environment, this is free.
Incorrect
In Azure, you only pay for outbound traffic which is charged in GB as you are entitled to 5GB in a month but afterward you pay for data being transferred out. However, with inbound data traffic into your environment, this is free.
Unattempted
In Azure, you only pay for outbound traffic which is charged in GB as you are entitled to 5GB in a month but afterward you pay for data being transferred out. However, with inbound data traffic into your environment, this is free.
Question 44 of 60
44. Question
You are an IT administrator for ABC company. You have been advised to identify important factors while performing a Cost-benefit analysis while deciding on a cloud solution. Please identify 4 of them.
The Service Desk Team in your company has indicated that they spend a lot of time helping users reset their passwords as they keep forgetting them. In order to improve the productivity of your Service Desk Team which feature can you implement as a Global Administrator.
Correct
Self -service password reset (SSPR) feature allows user to reset their passwords from anywhere through internet browser.
Self-Service Password Reset (SSPR)Â is an Azure Active Directory (AD) feature that enables users to reset their passwords without contacting IT staff for help. The users can quickly unblock themselves and continue working no matter where they are or time of day. By allowing the employees to unblock themselves, your organization can reduce the non-productive time and high support costs for most common password-related issues.
More information: https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-deployment
Incorrect
Self -service password reset (SSPR) feature allows user to reset their passwords from anywhere through internet browser.
Self-Service Password Reset (SSPR)Â is an Azure Active Directory (AD) feature that enables users to reset their passwords without contacting IT staff for help. The users can quickly unblock themselves and continue working no matter where they are or time of day. By allowing the employees to unblock themselves, your organization can reduce the non-productive time and high support costs for most common password-related issues.
More information: https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-deployment
Unattempted
Self -service password reset (SSPR) feature allows user to reset their passwords from anywhere through internet browser.
Self-Service Password Reset (SSPR)Â is an Azure Active Directory (AD) feature that enables users to reset their passwords without contacting IT staff for help. The users can quickly unblock themselves and continue working no matter where they are or time of day. By allowing the employees to unblock themselves, your organization can reduce the non-productive time and high support costs for most common password-related issues.
More information: https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-sspr-deployment
Question 46 of 60
46. Question
Tenant isolation refers to which of the following concepts?
Correct
One of the primary benefits of cloud computing is the concept of a shared, common infrastructure across numerous customers simultaneously, leading to economies of scale. This concept is called multi-tenancy. Tenant isolation here refers to the separation of organizational data in a multi-tenant environment.
Incorrect
One of the primary benefits of cloud computing is the concept of a shared, common infrastructure across numerous customers simultaneously, leading to economies of scale. This concept is called multi-tenancy. Tenant isolation here refers to the separation of organizational data in a multi-tenant environment.
Unattempted
One of the primary benefits of cloud computing is the concept of a shared, common infrastructure across numerous customers simultaneously, leading to economies of scale. This concept is called multi-tenancy. Tenant isolation here refers to the separation of organizational data in a multi-tenant environment.
Question 47 of 60
47. Question
Microsoft Cloud App Discovery can be used to do which of the following?
Correct
“Shadow IT” refers to applications being used without the consent of the organization. Security teams often need to understand what applications are being used in business and it is when they actually discover such applications.
With Microsoft Cloud App Discovery, administrators can import firewalls and proxy logs that help them in which apps are being used when these logs are analyzed for traffic.
Incorrect
“Shadow IT” refers to applications being used without the consent of the organization. Security teams often need to understand what applications are being used in business and it is when they actually discover such applications.
With Microsoft Cloud App Discovery, administrators can import firewalls and proxy logs that help them in which apps are being used when these logs are analyzed for traffic.
Unattempted
“Shadow IT” refers to applications being used without the consent of the organization. Security teams often need to understand what applications are being used in business and it is when they actually discover such applications.
With Microsoft Cloud App Discovery, administrators can import firewalls and proxy logs that help them in which apps are being used when these logs are analyzed for traffic.
Question 48 of 60
48. Question
Your company hosts an accounting named App1 that is used by all the customers of the company.
App1 has low usage during the first three weeks of each month and very high usage during the last week of each month.
Which benefit of Azure Cloud Services supports cost management for this type of usage pattern?
Correct
Elastic computing is the ability to quickly expand or decrease computer processing, memory, and storage resources to meet changing demands without worrying about capacity planning and engineering for peak usage. Typically controlled by system monitoring tools, elastic computing matches the number of resources allocated to the number of resources actually needed without disrupting operations. With cloud elasticity, a company avoids paying for unused capacity or idle resources and doesnÂ’t have to worry about investing in the purchase or maintenance of additional resources and equipment.
Elastic computing is the ability to quickly expand or decrease computer processing, memory, and storage resources to meet changing demands without worrying about capacity planning and engineering for peak usage. Typically controlled by system monitoring tools, elastic computing matches the number of resources allocated to the number of resources actually needed without disrupting operations. With cloud elasticity, a company avoids paying for unused capacity or idle resources and doesnÂ’t have to worry about investing in the purchase or maintenance of additional resources and equipment.
Elastic computing is the ability to quickly expand or decrease computer processing, memory, and storage resources to meet changing demands without worrying about capacity planning and engineering for peak usage. Typically controlled by system monitoring tools, elastic computing matches the number of resources allocated to the number of resources actually needed without disrupting operations. With cloud elasticity, a company avoids paying for unused capacity or idle resources and doesnÂ’t have to worry about investing in the purchase or maintenance of additional resources and equipment.
Compliance Manager has a number of templates, prepopulated with the controls which are managed by both the customer and Microsoft. Does the Compliance Manager allow customers to import custom templates?
Correct
Microsoft Compliance Manager (preview)Â is a free workflow-based risk assessment tool in the Microsoft Service Trust Portal for managing regulatory compliance activities related to Microsoft cloud services. Part of your Microsoft 365, Office 365, or Azure Active Directory subscription, Compliance Manager helps you manage regulatory compliance within the shared responsibility model for Microsoft cloud services.
Microsoft Compliance Manager does allow for importing custom templates as shown in the below picture
Incorrect
Microsoft Compliance Manager (preview)Â is a free workflow-based risk assessment tool in the Microsoft Service Trust Portal for managing regulatory compliance activities related to Microsoft cloud services. Part of your Microsoft 365, Office 365, or Azure Active Directory subscription, Compliance Manager helps you manage regulatory compliance within the shared responsibility model for Microsoft cloud services.
Microsoft Compliance Manager does allow for importing custom templates as shown in the below picture
Unattempted
Microsoft Compliance Manager (preview)Â is a free workflow-based risk assessment tool in the Microsoft Service Trust Portal for managing regulatory compliance activities related to Microsoft cloud services. Part of your Microsoft 365, Office 365, or Azure Active Directory subscription, Compliance Manager helps you manage regulatory compliance within the shared responsibility model for Microsoft cloud services.
Microsoft Compliance Manager does allow for importing custom templates as shown in the below picture
Question 50 of 60
50. Question
Identify three of the encryption technologies or platforms used to secure data in Microsoft 365 from the following:
Correct
The encryption process encodes your data (referred to as plaintext) into ciphertext. Unlike plaintext, ciphertext can’t be used by people or computers unless and until the ciphertext is decrypted. Decryption requires an encryption key that only authorized users to have. Encryption helps ensure that only authorized recipients can decrypt your content. Content includes files, email messages, calendar entries, and so on.
With Office 365, your data is encrypted at rest and in transit, using several strong encryption protocols, and technologies that include Bitlocker, Transport Layer Security/Secure Sockets Layer (TLS/SSL), Internet Protocol Security (IPSec), and Advanced Encryption Standard (AES).
Incorrect
The encryption process encodes your data (referred to as plaintext) into ciphertext. Unlike plaintext, ciphertext can’t be used by people or computers unless and until the ciphertext is decrypted. Decryption requires an encryption key that only authorized users to have. Encryption helps ensure that only authorized recipients can decrypt your content. Content includes files, email messages, calendar entries, and so on.
With Office 365, your data is encrypted at rest and in transit, using several strong encryption protocols, and technologies that include Bitlocker, Transport Layer Security/Secure Sockets Layer (TLS/SSL), Internet Protocol Security (IPSec), and Advanced Encryption Standard (AES).
Unattempted
The encryption process encodes your data (referred to as plaintext) into ciphertext. Unlike plaintext, ciphertext can’t be used by people or computers unless and until the ciphertext is decrypted. Decryption requires an encryption key that only authorized users to have. Encryption helps ensure that only authorized recipients can decrypt your content. Content includes files, email messages, calendar entries, and so on.
With Office 365, your data is encrypted at rest and in transit, using several strong encryption protocols, and technologies that include Bitlocker, Transport Layer Security/Secure Sockets Layer (TLS/SSL), Internet Protocol Security (IPSec), and Advanced Encryption Standard (AES).
Question 51 of 60
51. Question
When opening a service ticket, which severity level is used to indicate a significant loss or degradation of services, requiring immediate attention?
You have an on-premises network that contains 100 servers.
You need to recommend a solution that provides additional resources to your users. The solution must minimize capital and operational expenditure costs.
What should you include in the recommendation?
Correct
Private Cloud is indeed the correct answer, and here is why: The on-premise solution that they already have can already be seen as a private cloud. The most cost-effective way is indeed to add a public cloud to their current network. Now the real question is in the last sentence “What should you include in the recommendation?”. Even if you want to recommend a hybrid cloud, which would minimize CapEx and OpEx, a hybrid cloud is made up of both public- and a private
Incorrect
Private Cloud is indeed the correct answer, and here is why: The on-premise solution that they already have can already be seen as a private cloud. The most cost-effective way is indeed to add a public cloud to their current network. Now the real question is in the last sentence “What should you include in the recommendation?”. Even if you want to recommend a hybrid cloud, which would minimize CapEx and OpEx, a hybrid cloud is made up of both public- and a private
Unattempted
Private Cloud is indeed the correct answer, and here is why: The on-premise solution that they already have can already be seen as a private cloud. The most cost-effective way is indeed to add a public cloud to their current network. Now the real question is in the last sentence “What should you include in the recommendation?”. Even if you want to recommend a hybrid cloud, which would minimize CapEx and OpEx, a hybrid cloud is made up of both public- and a private
Question 53 of 60
53. Question
Compliance Manager contains built-in templates for which three standards?
Correct
Incorrect
Unattempted
Question 54 of 60
54. Question
You are an IT, administrator, for a commercial organization with more than 15000 employees. Which Microsoft 365 product service family is the best option for your organization?
Correct
Incorrect
Unattempted
Question 55 of 60
55. Question
You plan to migrate a web application to Azure. The web application is accessed by external users.
You need to recommend a cloud deployment solution to minimize the amount of administrative effort used to manage the web application.
What should you include in the recommendation?
Correct
It is a custom web app deployed to Azure the answers is PasS. If it was a Microsoft product, then it could be a SaaS. Otherwise, your own apps deployed into the cloud run on PaaS ( they just provide the environment, “platform”)
Incorrect
It is a custom web app deployed to Azure the answers is PasS. If it was a Microsoft product, then it could be a SaaS. Otherwise, your own apps deployed into the cloud run on PaaS ( they just provide the environment, “platform”)
Unattempted
It is a custom web app deployed to Azure the answers is PasS. If it was a Microsoft product, then it could be a SaaS. Otherwise, your own apps deployed into the cloud run on PaaS ( they just provide the environment, “platform”)
Question 56 of 60
56. Question
Which cloud deployment solution is used for Azure virtual machines and Azure SQL databases? To answer, select the appropriate options in the answer area(Select Two).
Correct
Azure SQL Database is a relational database-as-a-service (DBaaS) hosted in Azure that falls into the industry category of Platform-as-a-Service (PaaS).
Microsoft recently announced the release of Windows Azure Virtual Machines, an Infrastructure-as-a-Service (IaaS) offering in Windows Azure.
Incorrect
Azure SQL Database is a relational database-as-a-service (DBaaS) hosted in Azure that falls into the industry category of Platform-as-a-Service (PaaS).
Microsoft recently announced the release of Windows Azure Virtual Machines, an Infrastructure-as-a-Service (IaaS) offering in Windows Azure.
Unattempted
Azure SQL Database is a relational database-as-a-service (DBaaS) hosted in Azure that falls into the industry category of Platform-as-a-Service (PaaS).
Microsoft recently announced the release of Windows Azure Virtual Machines, an Infrastructure-as-a-Service (IaaS) offering in Windows Azure.
Question 57 of 60
57. Question
Identify four licensing models which can be used to acquire Microsoft 365 services
Correct
The Cloud Solution Provider(CS) program helps you go beyond reselling licenses to being more involved in your customers’ businesses.
The Microsoft Enterprise Agreement offers the best value to organizations with 500 or more users or devices that want a manageable volume licensing program that gives them the flexibility to buy cloud services and software licenses under one agreement.
Microsoft Open programs, Open Value, and Open License are a simple, cost-effective way for small and midsize organizations to acquire the latest Microsoft technology.
The Microsoft Services Provider License Agreement (SPLA) is for service providers and independent software vendors (ISVs) who want to license the latest eligible Microsoft software products to provide software services and hosted applications to end customers.
Incorrect
The Cloud Solution Provider(CS) program helps you go beyond reselling licenses to being more involved in your customers’ businesses.
The Microsoft Enterprise Agreement offers the best value to organizations with 500 or more users or devices that want a manageable volume licensing program that gives them the flexibility to buy cloud services and software licenses under one agreement.
Microsoft Open programs, Open Value, and Open License are a simple, cost-effective way for small and midsize organizations to acquire the latest Microsoft technology.
The Microsoft Services Provider License Agreement (SPLA) is for service providers and independent software vendors (ISVs) who want to license the latest eligible Microsoft software products to provide software services and hosted applications to end customers.
Unattempted
The Cloud Solution Provider(CS) program helps you go beyond reselling licenses to being more involved in your customers’ businesses.
The Microsoft Enterprise Agreement offers the best value to organizations with 500 or more users or devices that want a manageable volume licensing program that gives them the flexibility to buy cloud services and software licenses under one agreement.
Microsoft Open programs, Open Value, and Open License are a simple, cost-effective way for small and midsize organizations to acquire the latest Microsoft technology.
The Microsoft Services Provider License Agreement (SPLA) is for service providers and independent software vendors (ISVs) who want to license the latest eligible Microsoft software products to provide software services and hosted applications to end customers.
Question 58 of 60
58. Question
Data Residency answers which of the following questions?
Correct
Data residency is related to where geographically your data is located.
Data residency option :
With this option, customers with data residency requirements can request early migration of their organization’s core customer data at rest to their new datacenter geo
Incorrect
Data residency is related to where geographically your data is located.
Data residency option :
With this option, customers with data residency requirements can request early migration of their organization’s core customer data at rest to their new datacenter geo
Unattempted
Data residency is related to where geographically your data is located.
Data residency option :
With this option, customers with data residency requirements can request early migration of their organization’s core customer data at rest to their new datacenter geo
Question 59 of 60
59. Question
Which of these is not a way to view service status updates for Microsoft 365?
Correct
How to check service health
1)Go to the Microsoft 365 admin center at https://admin.microsoft.com, and sign in with an admin account. To view service health, in the admin center, go to Health > Service health, or select the Service health card on the Home dashboard. The dashboard card indicates whether there is an active service issue and links to the detailed service health page.
2)For Microsoft 365 updates on Twitter, please follow @MSFT365Status.
3)If there are issues preventing you from signing in to your Office 365 service health dashboard. View your Microsoft 365 Service health on status.office365.com.
Incorrect
How to check service health
1)Go to the Microsoft 365 admin center at https://admin.microsoft.com, and sign in with an admin account. To view service health, in the admin center, go to Health > Service health, or select the Service health card on the Home dashboard. The dashboard card indicates whether there is an active service issue and links to the detailed service health page.
2)For Microsoft 365 updates on Twitter, please follow @MSFT365Status.
3)If there are issues preventing you from signing in to your Office 365 service health dashboard. View your Microsoft 365 Service health on status.office365.com.
Unattempted
How to check service health
1)Go to the Microsoft 365 admin center at https://admin.microsoft.com, and sign in with an admin account. To view service health, in the admin center, go to Health > Service health, or select the Service health card on the Home dashboard. The dashboard card indicates whether there is an active service issue and links to the detailed service health page.
2)For Microsoft 365 updates on Twitter, please follow @MSFT365Status.
3)If there are issues preventing you from signing in to your Office 365 service health dashboard. View your Microsoft 365 Service health on status.office365.com.
Question 60 of 60
60. Question
Which Microsoft 365 tool can organizations use to track their progress against industry compliance standards?
Correct
What is Compliance Manager
Microsoft Compliance Manager (preview)Â is a free workflow-based risk assessment tool in the Microsoft Service Trust Portal for managing regulatory compliance activities related to Microsoft cloud services. Part of your Microsoft 365, Office 365, or Azure Active Directory subscription, Compliance Manager helps you manage regulatory compliance within the shared responsibility model for Microsoft cloud services.
More Information: https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager-overview?view=o365-worldwide
Incorrect
What is Compliance Manager
Microsoft Compliance Manager (preview)Â is a free workflow-based risk assessment tool in the Microsoft Service Trust Portal for managing regulatory compliance activities related to Microsoft cloud services. Part of your Microsoft 365, Office 365, or Azure Active Directory subscription, Compliance Manager helps you manage regulatory compliance within the shared responsibility model for Microsoft cloud services.
More Information: https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager-overview?view=o365-worldwide
Unattempted
What is Compliance Manager
Microsoft Compliance Manager (preview)Â is a free workflow-based risk assessment tool in the Microsoft Service Trust Portal for managing regulatory compliance activities related to Microsoft cloud services. Part of your Microsoft 365, Office 365, or Azure Active Directory subscription, Compliance Manager helps you manage regulatory compliance within the shared responsibility model for Microsoft cloud services.
More Information: https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager-overview?view=o365-worldwide
Use Page numbers below to navigate to other practice tests