You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" MS-900 Practice Test 7 "
0 of 64 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
MS-900
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking on “View Answers” option.
Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
Answered
Review
Question 1 of 64
1. Question
The Blue Widget Corporation is planning its migration to the cloud. The organization uses an on-prem Exchange solution, Microsoft Skype for Business, and Yammer. Which two solutions offer hybrid capabilities that can be used to facilitate a migration to the cloud?
Correct
Yammer does not offer hybrid because it is not available on-prem to begin with.
Visit the URLÂ below for more information on architecting solutions:
You are the Microsoft 365 administrator for the Blue Widget Corporation. The organization currently hosts all of its environment in the on-prem datacenter.
Which type of cloud model should you deploy in order to provide an on-demand sandbox environment, while minimizing costs?
Correct
While a private cloud could also be used to provide on-demand environments, leveraging a public cloud to do so is less expensive because it doesn‘t require the hardware to support the cloud infrastructure.
While a private cloud could also be used to provide on-demand environments, leveraging a public cloud to do so is less expensive because it doesn‘t require the hardware to support the cloud infrastructure.
While a private cloud could also be used to provide on-demand environments, leveraging a public cloud to do so is less expensive because it doesn‘t require the hardware to support the cloud infrastructure.
After a recent vulnerability and security assessment, the Blue Widget Corporation determined that it has to do more to protect against malicious login attempts. As part of this effort, the organization purchased Microsoft 365 Enterprise, along with Azure ADÂ P2 licenses for all users.
What solution below should you deploy in order to provide identity protection against malicious login attempts?
Correct
Identity Protection is a tool that allows organizations to automate the detection and remediation of identity-based risks, investigate risks using data in the portal, and export risk detection data to third-party utilities for further analysis:
Identity Protection is a tool that allows organizations to automate the detection and remediation of identity-based risks, investigate risks using data in the portal, and export risk detection data to third-party utilities for further analysis:
Identity Protection is a tool that allows organizations to automate the detection and remediation of identity-based risks, investigate risks using data in the portal, and export risk detection data to third-party utilities for further analysis:
After signing up for Microsoft 365, the Blue Widget Corporation hired you on as the Microsoft 365 administrator. You‘ve been tasked with ensuring that the Marketing department users can collaborate with users from a partner company on a project in real time, using a whiteboard.
Which Office 365 product can you leverage to make this happen?
Correct
Microsoft Whiteboard is a free-form, digital canvas where people, content, and ideas come together. Whiteboard integration in Microsoft Teams meetings is powered by the Whiteboard web app, which lets Teams meeting participants draw, sketch, and write together on a shared digital canvas.
Users can share a whiteboard to make it available to all participants in a Teams meeting. That same whiteboard is simultaneously available in all the Whiteboard applications on Windows 10, iOS, and the web app.
Microsoft Whiteboard is a free-form, digital canvas where people, content, and ideas come together. Whiteboard integration in Microsoft Teams meetings is powered by the Whiteboard web app, which lets Teams meeting participants draw, sketch, and write together on a shared digital canvas.
Users can share a whiteboard to make it available to all participants in a Teams meeting. That same whiteboard is simultaneously available in all the Whiteboard applications on Windows 10, iOS, and the web app.
Microsoft Whiteboard is a free-form, digital canvas where people, content, and ideas come together. Whiteboard integration in Microsoft Teams meetings is powered by the Whiteboard web app, which lets Teams meeting participants draw, sketch, and write together on a shared digital canvas.
Users can share a whiteboard to make it available to all participants in a Teams meeting. That same whiteboard is simultaneously available in all the Whiteboard applications on Windows 10, iOS, and the web app.
As the Microsoft 365 admin for the Blue Widget Corporation, you are ultimately responsible for supporting the organization‘s Microsoft 365 environment. Your junior admin has come to you and mentioned he is having problems with a new Azure AD feature that recently became available in public preview.
Will Microsoft provide formal support for the feature?
Correct
Microsoft Customer Support Services will supply support services during public preview, but normal service level agreements do not apply.
The Blue Widget Corporation recently purchased a Microsoft 365 subscription. You‘ve been hired as the new Microsoft 365 administrator and tasked with setting up an intranet and several team sites for a few different departments.
Which two subscriptions below will make this possible?
Correct
SharePoint Online facilitates intranets and team sites. Business Basic, Business Standard, and Business Premium (not listed as a choice) all offer SharePoint Online.
SharePoint Online facilitates intranets and team sites. Business Basic, Business Standard, and Business Premium (not listed as a choice) all offer SharePoint Online.
SharePoint Online facilitates intranets and team sites. Business Basic, Business Standard, and Business Premium (not listed as a choice) all offer SharePoint Online.
The Blue Widget Corporation needs to roll out Microsoft 365 Apps for Enterprise to its entire user base. You‘ve been tasked, as the admin, to get this done. Of the 4 statements below, which ones are true statements? Choose two.
Correct
Each user can install the Office apps on up to 5 PCs or Macs, and online versions of Word, Excel, PowerPoint, and OneNote for iOS and Android on up to 5 mobile devices and 5 tablets.
Each user can install the Office apps on up to 5 PCs or Macs, and online versions of Word, Excel, PowerPoint, and OneNote for iOS and Android on up to 5 mobile devices and 5 tablets.
Each user can install the Office apps on up to 5 PCs or Macs, and online versions of Word, Excel, PowerPoint, and OneNote for iOS and Android on up to 5 mobile devices and 5 tablets.
As the Microsoft 365 admin for the Blue Widget Corporation, you are ultimately responsible for supporting the organization‘s Microsoft 365 environment. Your junior admin has come to you and mentioned he tried to open a support ticket with Microsoft for a new Azure AD feature that recently became available; however, Microsoft could not offer support.
Which option below is the most likely reason why support could not be provided by Microsoft?
Correct
During private preview, Microsoft invites a few customers to take part in early access to new concepts and features. This phase does not include formal support.
During private preview, Microsoft invites a few customers to take part in early access to new concepts and features. This phase does not include formal support.
During private preview, Microsoft invites a few customers to take part in early access to new concepts and features. This phase does not include formal support.
The Blue Widget Corporation has purchased a Microsoft 365 subscription. To ensure users can access their data in OneDrive for Business when working at remote sites, what must you do? The Windows 10 laptops for the users were all deployed via Windows Autopilot.
Correct
Signing into a laptop using an Azure AD account allows the user to access OneDrive.
Incorrect
Signing into a laptop using an Azure AD account allows the user to access OneDrive.
Unattempted
Signing into a laptop using an Azure AD account allows the user to access OneDrive.
Question 14 of 64
14. Question
The Blue Widget Corporation is planning a deployment of Office. Which version(s) of Office can be installed via Click-to-Run?
The Blue Widget Corporation has deployed several VMs to a virtual network in Azure, Exchange Online, and a site-to-site VPN from the on-prem datacenter to the Azure virtual network hosting the VMs.
Which types of services has the organization deployed?
Correct
Virtual machines, virtual networks, and VPNs are IaaS. Exchange is SaaS.
After deploying Microsoft Azure AD, the Blue Widget Corporation wishes to enable multi-factor authentication for all users. Which authentication method below is not a valid MFA authentication method in Microsoft 365?
Correct
All options, except for smart card / PIN, are valid authentication methods for MFA:
The Blue Widget Corporation wants to deploy a subscription-based version of Microsoft Office to all users. Management also wants to ensure that Office‘s application settings are enforced via Group Policy. You‘ve been asked which version of Office the organization should deploy.
What do you tell management?
Correct
Microsft 365 Apps for Enterprise is the only subscription-based option listed.
As the Microsoft 365 admin for the Blue Widget Corporation, you‘ve been tasked with deploying Microsoft 365 Apps for Enterprise to all users in the organization. To ensure all your users receive the latest updates when they‘re released broadly to all customers, what must you do?
Correct
The standard release option is the default option where you and your users receive the latest updates when they‘re released broadly to all customers.
The Blue Widget Corporation has hired you on as the Microsoft 365 admin. A new junior admin, Steve, has also been hired on. You‘ve been asked to deploy Microsoft 365 Apps for Enterprise.
After deploying Microsoft 365 Apps for Enterprise, you want to setup document classification and protection with Azure Information Protection (AIP).
What steps below must you take to implement the required classification and protection of documents? Choose two.
Correct
When you enable AIP, a default policy is created. To enable AIP, you must have an Azure subscription. Visit the URL below for information on the default policy:
When you enable AIP, a default policy is created. To enable AIP, you must have an Azure subscription. Visit the URL below for information on the default policy:
When you enable AIP, a default policy is created. To enable AIP, you must have an Azure subscription. Visit the URL below for information on the default policy:
The Blue Widget Corporation has had some problems with critical data being copied to personal devices and those personal devices being lost. To help address this, the organization has purchased a Microsoft 365 subscription and hired you on to ensure users can no longer copy company data from the cloud to their personal devices.
Which solution below can you use to prevent company data from saving to the local storage of the users‘ devices?
Correct
InTune App Protection can be used to limit where corporate data is copied. Visit the URLÂ below to learn more about app protection policies:
You‘ve been asked to deploy Azure cloud services for the Blue Widget Corporation. The server-based workloads that you plan to run on virtual machines in Azure would be considered:
Correct
Azure virtual machines are considered infrastructure-as-a-service:
The Blue Widget Corporation uses an on-prem Exchange Server solution for email. You‘ve been hired to migrate email to the cloud so the organization can upgrade its existing email solution while, at the same time, minimizing server and application maintenance. Which model below fits those needs?
Correct
By migrating to Exchange Online, which is a SaaS offering, you can minimize maintenance tasks, since Exchange Online is maintained by Microsoft.
As the administrator for the Blue Widget Corporation, you‘ve been asked to customize the out-of-box-experience for new Windows 10 machines that are deployed, and to deploy the organization‘s corporate applications. Which solution below can help you achieve this?
Correct
If you manage customer devices, you may need to customize the out-of-box experience (OOBE) for the customer‘s users. You can pre-configure new devices with Windows Autopilot profiles before delivering the devices to customers and apply new profiles to devices customers have already purchased.
If you manage customer devices, you may need to customize the out-of-box experience (OOBE) for the customer‘s users. You can pre-configure new devices with Windows Autopilot profiles before delivering the devices to customers and apply new profiles to devices customers have already purchased.
If you manage customer devices, you may need to customize the out-of-box experience (OOBE) for the customer‘s users. You can pre-configure new devices with Windows Autopilot profiles before delivering the devices to customers and apply new profiles to devices customers have already purchased.
You are the Microsoft 365 admin for the Blue Widget Corporation. You‘ve been asked to ensure that all users can use MyAnalytics to see how they are spending their time at work. All users in the organization have an E5 license assigned to them. What steps should you take to ensure MyAnalytics is available to all users?
Correct
To configure MyAnalytics, you must assign licenses with a MyAnalytics service plan and then configure access at the tenant level or at the user level. No agents are needed.
To configure MyAnalytics, you must assign licenses with a MyAnalytics service plan and then configure access at the tenant level or at the user level. No agents are needed.
To configure MyAnalytics, you must assign licenses with a MyAnalytics service plan and then configure access at the tenant level or at the user level. No agents are needed.
As the Microsoft 365 administrator for the Blue Widget Corporation, you‘ve been asked to recommend a tool or service that identifies and detects advanced threats and compromised identities. Which security tool should you recommend?
Correct
Azure Advanced Threat Protection (ATP) is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
Azure Advanced Threat Protection (ATP) is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
Azure Advanced Threat Protection (ATP) is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
You are the Microsoft 365 administrator for the Blue Widget Corporation. Management has come to you and informed you that the organization will be opening an office in the UK. As part of the planning for this new office, you‘ve been asked to provide security assessment reports for the new office. Where can you get these reports?
Correct
You can get the necessary reports from the Regional Compliance page of the Service Trust portal:
Your manager at the Blue Widget Corporation has come to you and asked you to ensure that user logins are secure. The organization wants you to force people to login with more than just a username and password. Which solution should you implement to accomplish this?
Correct
Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to enter a code on their cellphone or to provide a fingerprint scan.
If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the password is weak or has been exposed elsewhere, is it really the user signing in with the username and password, or is it an attacker? When you require a second form of authentication, security is increased as this additional factor isn‘t something that‘s easy for an attacker to obtain or duplicate.
Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to enter a code on their cellphone or to provide a fingerprint scan.
If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the password is weak or has been exposed elsewhere, is it really the user signing in with the username and password, or is it an attacker? When you require a second form of authentication, security is increased as this additional factor isn‘t something that‘s easy for an attacker to obtain or duplicate.
Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to enter a code on their cellphone or to provide a fingerprint scan.
If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the password is weak or has been exposed elsewhere, is it really the user signing in with the username and password, or is it an attacker? When you require a second form of authentication, security is increased as this additional factor isn‘t something that‘s easy for an attacker to obtain or duplicate.
The Blue Widget Corporation uses Microsoft Intune to manage mobile devices for all users. Steve, in Marketing, has lost his Windows 10 device. Because it contains important corporate data, what can you do to secure that lost data as quickly as possible?
Correct
The Wipe action restores a device to its factory default settings. The user data is kept if you choose the Retain enrollment state and user account checkbox. Otherwise, all data, apps, and settings will be removed.
The Wipe action restores a device to its factory default settings. The user data is kept if you choose the Retain enrollment state and user account checkbox. Otherwise, all data, apps, and settings will be removed.
The Wipe action restores a device to its factory default settings. The user data is kept if you choose the Retain enrollment state and user account checkbox. Otherwise, all data, apps, and settings will be removed.
You are the admin for the Blue Widget Corporation. On Monday morning, numerous users stop by your cubicle and tell you that they have received a strange email that included a PDF attachment. The PDF attachment launches malicious code when clicked on. Which feature or tool would help mitigate these threats?
Correct
Azure Advanced Threat Protection (ATP) is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
Azure Advanced Threat Protection (ATP) is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
Azure Advanced Threat Protection (ATP) is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
You are the Microsoft 365 administrator for the Blue Widget Corporation. Your organization has rolled out Microsoft 365 Apps for Enterprise. Your manager has asked you to ensure that the organization‘s users receive no feature updates unless those updates have been vetted and tested by IT staff first. How can you ensure no users (except for IT) receive the updates until they have been tested?
Correct
A good practice is to leave the majority of users in Standard release and IT Pros and power users in Targeted release to evaluate new features and prepare teams to support business users and executives.
A good practice is to leave the majority of users in Standard release and IT Pros and power users in Targeted release to evaluate new features and prepare teams to support business users and executives.
A good practice is to leave the majority of users in Standard release and IT Pros and power users in Targeted release to evaluate new features and prepare teams to support business users and executives.
You are the admin for the Blue Widget Corporation. You‘ve been asked to give a presentation at the next steering committee meeting to demonstrate the user adoption of the various services in Microsoft 365 within the organization.
Which tool or feature could you use to obtain this information?
Correct
Use Microsoft 365 usage analytics within Power BI to gain insights on how your organization is adopting the various services within Microsoft 365 to communicate and collaborate. You can visualize and analyze Microsoft 365 usage data, create custom reports and share the insights within your organization and gain insights into how specific regions or departments are utilizing Microsoft 365.
Use Microsoft 365 usage analytics within Power BI to gain insights on how your organization is adopting the various services within Microsoft 365 to communicate and collaborate. You can visualize and analyze Microsoft 365 usage data, create custom reports and share the insights within your organization and gain insights into how specific regions or departments are utilizing Microsoft 365.
Use Microsoft 365 usage analytics within Power BI to gain insights on how your organization is adopting the various services within Microsoft 365 to communicate and collaborate. You can visualize and analyze Microsoft 365 usage data, create custom reports and share the insights within your organization and gain insights into how specific regions or departments are utilizing Microsoft 365.
You are the administrator for the Blue Widget Corporation. The organization has rolled out Microsoft 365 Apps for Enterprise to all users. Which action below is part of a solution to enable document protection via Azure Information Protection, along with document classification?
Correct
When the protection service for Azure Information Protection is activated for your organization, administrators and users can start to protect important data by using applications and services that support this information protection solution. Administrators can also manage and monitor protected documents and emails that your organization owns.
When the protection service for Azure Information Protection is activated for your organization, administrators and users can start to protect important data by using applications and services that support this information protection solution. Administrators can also manage and monitor protected documents and emails that your organization owns.
When the protection service for Azure Information Protection is activated for your organization, administrators and users can start to protect important data by using applications and services that support this information protection solution. Administrators can also manage and monitor protected documents and emails that your organization owns.
As the admin for the Blue Widget Corporation, you‘ve been asked to ensure that any time a user accesses Outlook on a mobile device, that user is prompted to enter a PIN in order to open Outlook. Which InTune policy below should you implement to ensure users are prompted for a PIN whenever they launch Outlook from a mobile device?
Correct
The Personal Identification Number (PIN) is a passcode used to verify that the correct user is accessing the organization‘s data in an application. Intune prompts for the user‘s app PIN when the user is about to access “corporate” data. In multi-identity apps such as Word, Excel, or PowerPoint, the user is prompted for their PIN when they try to open a “corporate” document or file.
The Personal Identification Number (PIN) is a passcode used to verify that the correct user is accessing the organization‘s data in an application. Intune prompts for the user‘s app PIN when the user is about to access “corporate” data. In multi-identity apps such as Word, Excel, or PowerPoint, the user is prompted for their PIN when they try to open a “corporate” document or file.
The Personal Identification Number (PIN) is a passcode used to verify that the correct user is accessing the organization‘s data in an application. Intune prompts for the user‘s app PIN when the user is about to access “corporate” data. In multi-identity apps such as Word, Excel, or PowerPoint, the user is prompted for their PIN when they try to open a “corporate” document or file.
As the admin of the Blue Widget Corporation, you‘ve asked your coworker, who is also an admin, to ensure documents and emails are protected automatically through the use of classifications and labels. Because the organization is so cost-conscious, the costs associated with the solution must be minimized.
Your coworker implements Information Rights Management.
Does this achieve your goals?
Correct
This does not achieve your goals. Instead, Azure Information Protection Premium P2 should be implemented. Learn more about AIP at the URLÂ below:
Incorrect
This does not achieve your goals. Instead, Azure Information Protection Premium P2 should be implemented. Learn more about AIP at the URLÂ below:
Unattempted
This does not achieve your goals. Instead, Azure Information Protection Premium P2 should be implemented. Learn more about AIP at the URLÂ below:
Question 37 of 64
37. Question
The Blue Widget Corporation has subscribed to Microsoft 365 and has assigned a Microsoft 365 license to every user. You‘ve been asked to ensure Microsoft 365 Apps for Enterprise is installed on every employee‘s computer.
Which method below can be used to install Microsoft 365 Apps for Enterprise?
Correct
You can use all of the methods mentioned to install. Visit the URL below for details on each method:
The Blue Widget Corporation needs to ensure that its data is secure. You are the admin for the organization. Your IT Director has come to you and asked for a recommendation.
Of the 4 options below, there are 2 that will ensure data security for the Blue Widget Corporation. Which ones are they?
Correct
This question is tricky. While deploying Azure Key Vault is part of any data encryption strategy, simply deploying Key Vault provides no protection. A Microsoft 365 data partition is not relevant. See the URLÂ below for more security best practices:
This question is tricky. While deploying Azure Key Vault is part of any data encryption strategy, simply deploying Key Vault provides no protection. A Microsoft 365 data partition is not relevant. See the URLÂ below for more security best practices:
This question is tricky. While deploying Azure Key Vault is part of any data encryption strategy, simply deploying Key Vault provides no protection. A Microsoft 365 data partition is not relevant. See the URLÂ below for more security best practices:
As the administrator for the Blue Widget Corp, you have been tasked with managing the Microsoft 365 Apps for Enterprise deployment for all users. Before your users receive Microsoft 365 Apps for Enterprise updates, your IT users need to perform security and compatibility testing on the new version being released.
Which option release below should you configure for ITÂ users?
Correct
Targeted release is used to allow some or all users to begin using the latest features early, ahead of those on the standard release. Visit the URL below for more details:
Targeted release is used to allow some or all users to begin using the latest features early, ahead of those on the standard release. Visit the URL below for more details:
Targeted release is used to allow some or all users to begin using the latest features early, ahead of those on the standard release. Visit the URL below for more details:
The Blue Widget Corporation has decided to deploy the Microsoft Office to its user base. You are the administrator for the organizations and your manager has asked you for a recommendation on what version of Office to deploy. He wants you to suggest a version that offers subscription-based licensing.
Which version below offers subscription-based licensing?
Correct
Microsoft 365 Apps (formerly Office 365 ProPlus) is available on a subscription basis. See the URL below for pricing:
Management at the Blue Widget Corporation has come to you and asked you to identify security vulnerabilities. To perform this task, which tool should you use?
Correct
If your organization has Office 365 Advanced Threat Protection (ATP) Plan 2, which includes Threat Investigation and Response capabilities, you can use Attack Simulator in the Security & Compliance Center to run realistic attack scenarios in your organization. These simulated attacks can help you identify and find vulnerable users before a real attack impacts your bottom line.
If your organization has Office 365 Advanced Threat Protection (ATP) Plan 2, which includes Threat Investigation and Response capabilities, you can use Attack Simulator in the Security & Compliance Center to run realistic attack scenarios in your organization. These simulated attacks can help you identify and find vulnerable users before a real attack impacts your bottom line.
If your organization has Office 365 Advanced Threat Protection (ATP) Plan 2, which includes Threat Investigation and Response capabilities, you can use Attack Simulator in the Security & Compliance Center to run realistic attack scenarios in your organization. These simulated attacks can help you identify and find vulnerable users before a real attack impacts your bottom line.
As the administrator for the Blue Widget Corporation, you‘ve been invited into the planning meetings to discuss a migration to Azure. You‘ve been asked for your opinion on what workloads could be migrated to Azure. However, the caveat is that the organizations does NOT want to deploy any sort of connectivity between the on-prem networks and Azure. This means no site-to-site VPN and no ExpressRoute.
With that knowledge, which on-prem workloads could the organization migrate to Azure?
Correct
With no VPNÂ in place, you can only migrate resources to the cloud if they have no dependency on any on-prem resources. That being the case, you can migrate external facing websites and SharePoint sites. Since the HRÂ app needs access to the on-prem database that has to remain on-prem for some reason, the HRÂ app cannot move to the cloud.
Incorrect
With no VPNÂ in place, you can only migrate resources to the cloud if they have no dependency on any on-prem resources. That being the case, you can migrate external facing websites and SharePoint sites. Since the HRÂ app needs access to the on-prem database that has to remain on-prem for some reason, the HRÂ app cannot move to the cloud.
Unattempted
With no VPNÂ in place, you can only migrate resources to the cloud if they have no dependency on any on-prem resources. That being the case, you can migrate external facing websites and SharePoint sites. Since the HRÂ app needs access to the on-prem database that has to remain on-prem for some reason, the HRÂ app cannot move to the cloud.
Question 43 of 64
43. Question
You have been hired as a junior admin for the Blue Widget Corporation. As the junior admin, you have NOT been assigned the Global Administrator role, yet.
Earlier this morning, you tried to purchase licenses for a couple new employees that were onboarded, but you could not.
Which role must you be assigned in order to purchase licenses?
Correct
You must be either a Global admin or a Billing admin to purchase licenses:
You have been hired as a junior admin for the Blue Widget Corporation. You have been assigned the Global Administrator role.
You need to purchase licenses for a couple new employees that were onboarded this morning. Which additional role must you be assigned in order to purchase licenses?
Correct
You must be either a Global admin or a Billing admin to purchase licenses:
Your ITÂ Director at the Blue Widget Corporation has come to you and asked you to enable multi-factor authentication for all users. The organization has already deployed Azure AD.
Which of the following multi-factor authentication methods can users leverage?
Correct
There are many different authentication options available for MFA users. Visit the URLÂ below for the complete list:
After deploying Exchange Online and SharePoint Online, the Blue Widget Corporation has asked you to perform an audit. You need to provide audit reports and even assessment reports for the Microsoft 365 cloud services in use by the corporation.
Of the 4 options below, which site should you use to obtain the necessary audit and assessment information?
Correct
The Service Trust Portal allows you to review the available independent audit reports for Microsoft‘s Cloud services, which provide information about compliance with data protection standards and regulatory requirements, such as International Organization for Standardization (ISO), Service Organization Controls (SOC), National Institute of Standards and Technology (NIST), Federal Risk and Authorization Management Program (FedRAMP), and the General Data Protection Regulation (GDPR).
The Service Trust Portal allows you to review the available independent audit reports for Microsoft‘s Cloud services, which provide information about compliance with data protection standards and regulatory requirements, such as International Organization for Standardization (ISO), Service Organization Controls (SOC), National Institute of Standards and Technology (NIST), Federal Risk and Authorization Management Program (FedRAMP), and the General Data Protection Regulation (GDPR).
The Service Trust Portal allows you to review the available independent audit reports for Microsoft‘s Cloud services, which provide information about compliance with data protection standards and regulatory requirements, such as International Organization for Standardization (ISO), Service Organization Controls (SOC), National Institute of Standards and Technology (NIST), Federal Risk and Authorization Management Program (FedRAMP), and the General Data Protection Regulation (GDPR).
Steve is an executive-level employee at the Blue Widget Corporation, which has deployed Microsoft 365 Apps for Enterprise to all its users. Steve uses 5 different laptops. He‘s just come to you with a sixth laptop and is requesting that you install Microsoft 365 Apps for Enterprise on it.
Before activating the Microsoft 365 Apps for Enterprise license on this 6th laptop, you deactivate it on one of the other 5 laptops.
Once you deactivate the other laptop, what will Steve be able to do with Microsoft 365 Apps for Enterprise on that laptop?
Correct
When a license is deactivated, the software operates in reduced functionality mode. In reduced functionality mode, Microsoft 365 Apps remains installed on the device, but users can only view and print their documents.
When a license is deactivated, the software operates in reduced functionality mode. In reduced functionality mode, Microsoft 365 Apps remains installed on the device, but users can only view and print their documents.
When a license is deactivated, the software operates in reduced functionality mode. In reduced functionality mode, Microsoft 365 Apps remains installed on the device, but users can only view and print their documents.
Jen is an HR executive at the Blue Widget Corporation. She has an Office 365 E3 license assigned to her. How many devices can she install Microsoft 365 Apps for Enterprise on?
Correct
With the Office 365 E3 license, Jen can install Office apps on up to five PCs or Macs, five tablets, and five phones:
The Blue Widget Corporation is a cutting edge organization. In line with it‘s cutting edge philosophy, management has asked you, as the Microsoft 365 admin, to ensure that all Microsoft 365 Apps for Enterprise users see the latest updates as soon as they are available.
Which release channel offers this capability?
Correct
With this option, you and your users can be the first to see the latest updates and help shape the product by providing early feedback. You can choose to have individuals or the entire organization receive updates early.
With this option, you and your users can be the first to see the latest updates and help shape the product by providing early feedback. You can choose to have individuals or the entire organization receive updates early.
With this option, you and your users can be the first to see the latest updates and help shape the product by providing early feedback. You can choose to have individuals or the entire organization receive updates early.
The Blue Widget Corporation requires desktop-based versions of Outlook, Word, and Excel for its users. Exchange Online is also required. Which solution below meets this need at the lowest cost?
Correct
While Standard and Premium both meet the need for the desktop-based apps and Exchange Online, Standard does so at a lower cost:
You are the Microsoft 365 administrator for the Blue Widget Corporation. The organization currently hosts all of its environment in the on-prem datacenter.
Which type of cloud model should you deploy if you wish to deploy VMs that leverage certain proprietary peripheral devices, while minimizing costs?
Correct
Since Azure VMs don‘t support connection of proprietary hardware peripherals, apps that require servers with these proprietary devices attached will need to remain on servers on-prem. However, the other resources can be migrated to the cloud. This would result in a hybrid environment.
Since Azure VMs don‘t support connection of proprietary hardware peripherals, apps that require servers with these proprietary devices attached will need to remain on servers on-prem. However, the other resources can be migrated to the cloud. This would result in a hybrid environment.
Since Azure VMs don‘t support connection of proprietary hardware peripherals, apps that require servers with these proprietary devices attached will need to remain on servers on-prem. However, the other resources can be migrated to the cloud. This would result in a hybrid environment.
You are the admin for the Blue Widget Corporation. Jennifer, a user in Marketing, has come to you with a problem. She received a document from someone she knows from another company that the Blue Widget Corp works with regularly. The document that Jennifer received was encrypted by Azure Information Protection.
When Jennifer tried to open the document, she could not because the user account of the document sender couldn‘t be authenticated by the other company‘s Azure Active Directory.
What can you do to open the document?
Correct
RMS for individuals is a free self-service subscription for users who need to open files that have been protected by Azure Information Protection. If these users cannot be authenticated by Azure Active Directory, this free sign-up service can create an account in Azure Active Directory for a user. As a result, these users can now authenticate by using their company email address and then read the protected files on computers or mobile devices.
RMS for individuals is a free self-service subscription for users who need to open files that have been protected by Azure Information Protection. If these users cannot be authenticated by Azure Active Directory, this free sign-up service can create an account in Azure Active Directory for a user. As a result, these users can now authenticate by using their company email address and then read the protected files on computers or mobile devices.
RMS for individuals is a free self-service subscription for users who need to open files that have been protected by Azure Information Protection. If these users cannot be authenticated by Azure Active Directory, this free sign-up service can create an account in Azure Active Directory for a user. As a result, these users can now authenticate by using their company email address and then read the protected files on computers or mobile devices.
The Blue Widget Company has experienced a spate of successful phishing attacks over the last several months. As a result, they have reached out to you for help. They have asked you what can be done to warn users when they click a potentially unsafe link in an email.
Which option below will ensure users receive a warning when they click on an unsafe link in an email?
Correct
ATP Safe Links provides time-of-click verification of URLs, for example, in emails messages and Office files. Protection is ongoing and applies across your messaging and Office environment. Links are scanned for each click: safe links remain accessible and malicious links are dynamically blocked.
ATP Safe Links provides time-of-click verification of URLs, for example, in emails messages and Office files. Protection is ongoing and applies across your messaging and Office environment. Links are scanned for each click: safe links remain accessible and malicious links are dynamically blocked.
ATP Safe Links provides time-of-click verification of URLs, for example, in emails messages and Office files. Protection is ongoing and applies across your messaging and Office environment. Links are scanned for each click: safe links remain accessible and malicious links are dynamically blocked.
The Blue Widget Corporation is trying to minimize calls to the HelpDesk. A large portion of calls that find their way to the HelpDesk involve password resets.
Which option below is a prerequisite for enabling self-service password reset for all users, including hybrid users that have been synced to Azure ADÂ from the on-prem AD?
Correct
Standalone Microsoft 365 Basic and Standard licensing plans don‘t support SSPR with on-premises writeback. The on-premises writeback feature requires Azure AD Premium P1, Premium P2, or Microsoft 365 Business Premium. Visit the URLÂ below for more information:
Standalone Microsoft 365 Basic and Standard licensing plans don‘t support SSPR with on-premises writeback. The on-premises writeback feature requires Azure AD Premium P1, Premium P2, or Microsoft 365 Business Premium. Visit the URLÂ below for more information:
Standalone Microsoft 365 Basic and Standard licensing plans don‘t support SSPR with on-premises writeback. The on-premises writeback feature requires Azure AD Premium P1, Premium P2, or Microsoft 365 Business Premium. Visit the URLÂ below for more information:
The external sharing features of Microsoft SharePoint allow users inside your organization to share content with people outside the organization by ____________________.
Correct
When users share with people outside the organization, an invitation is sent to the person in email, which contains a link to the shared item:
After being asked by the Blue Widget Corporation to identify security vulnerabilities, you launch the Attack Simulator in ATP. Which choices below are campaigns that you can run? Choose two.
Correct
Attack Simulator can be used to simulate phishing and password attacks:
You are the Microsoft 365 administrator for the Blue Widget Corporation. The organization currently hosts all of its environment in the on-prem datacenter.
Which type of cloud model should you deploy in order to allow failover between local resources and resources in other regions, while minimizing costs?
Correct
Hybrid clouds combine on-premises infrastructure, or private clouds, with public clouds so organizations can reap the advantages of both. In a hybrid cloud, data and applications can move between private and public clouds for greater flexibility and more deployment options:
Hybrid clouds combine on-premises infrastructure, or private clouds, with public clouds so organizations can reap the advantages of both. In a hybrid cloud, data and applications can move between private and public clouds for greater flexibility and more deployment options:
Hybrid clouds combine on-premises infrastructure, or private clouds, with public clouds so organizations can reap the advantages of both. In a hybrid cloud, data and applications can move between private and public clouds for greater flexibility and more deployment options:
The Blue Widget Corporation wants to make it possible for its end users to better-collaborate. Management wants users to be able to co-author files. Which product below will allow users to do this?
Correct
SharePoint provides a rich collaboration environment where people inside and outside your organization can work together, coauthoring documents:
The Blue Widget Corporation has hired you to make recommendations for their migration to the cloud. Upper management wants to leverage only SaaS offerings. You are asked if migrating email to Exchange Online accomplishes this. You are also asked if migrating the in-house applications to VMs in Azure accomplishes this.
The Blue Widget Corporation has been having ongoing problems with stolen passwords, probably due to several successful phishing attacks. Management has asked you to deploy a solution that Microsoft 365 confirms the identity of users when they sign in to the service.
What feature below provides this functionality?
Correct
Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to enter a code on their cellphone or to provide a fingerprint scan.
If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the password is weak or has been exposed elsewhere, is it really the user signing in with the username and password, or is it an attacker? When you require a second form of authentication, security is increased as this additional factor isn‘t something that‘s easy for an attacker to obtain or duplicate.
Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to enter a code on their cellphone or to provide a fingerprint scan.
If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the password is weak or has been exposed elsewhere, is it really the user signing in with the username and password, or is it an attacker? When you require a second form of authentication, security is increased as this additional factor isn‘t something that‘s easy for an attacker to obtain or duplicate.
Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to enter a code on their cellphone or to provide a fingerprint scan.
If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the password is weak or has been exposed elsewhere, is it really the user signing in with the username and password, or is it an attacker? When you require a second form of authentication, security is increased as this additional factor isn‘t something that‘s easy for an attacker to obtain or duplicate.
The Blue Widget Corporation has hired you as the new Microsoft 365 administrator. You‘ve been asked to ensure that IT users get to test out new Microsoft 365 Apps for Enterprise preview features before those new features are rolled out to the rest of the user base.
Which solution below helps achieve this goal? The Blue Widget Corporation has hired you as the new Microsoft 365 administrator. You‘ve been asked to ensure that IT users get to test out new Microsoft 365 Apps for Enterprise preview features before those new features are rolled out to the rest of the user base.
Which solution below helps achieve this goal?
Correct
If you set up the targeted release option in the admin center, you can define specific users, usually power users, to receive early access to features and functionality:
If you set up the targeted release option in the admin center, you can define specific users, usually power users, to receive early access to features and functionality:
If you set up the targeted release option in the admin center, you can define specific users, usually power users, to receive early access to features and functionality:
After getting hired as the admin of the Blue Widget Corporation, you are asked by a user for personal data that falls under GDPRÂ guidelines.
What do you need to do to retrieve this personal data for the user?
Correct
A formal request by a data subject to a controller to take an action on their personal data is called a Data Subject Request or DSR. The controller is obligated to promptly consider each DSR and provide a substantive response either by taking the requested action or by providing an explanation for why the DSR cannot be accommodated by the controller.
A formal request by a data subject to a controller to take an action on their personal data is called a Data Subject Request or DSR. The controller is obligated to promptly consider each DSR and provide a substantive response either by taking the requested action or by providing an explanation for why the DSR cannot be accommodated by the controller.
A formal request by a data subject to a controller to take an action on their personal data is called a Data Subject Request or DSR. The controller is obligated to promptly consider each DSR and provide a substantive response either by taking the requested action or by providing an explanation for why the DSR cannot be accommodated by the controller.