You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" SC-900 Practice Test 1 "
0 of 59 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
SC-900
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking view questions. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
Answered
Review
Question 1 of 59
1. Question
Select True/False:
In all Azure cloud deployment types, managing the security of information and data is the responsibility of the organizations
Which Microsoft portal provides information about how Microsoft manages privacy, compliance and security?
Correct
The correct answer is:
C. Microsoft Service Trust Portal
Here’s why:
Microsoft 365 compliance center: This is primarily for managing compliance within your organization using Microsoft 365 tools.
Compliance Manager: This is a deprecated service. While it might have existed in the past, it’s not the current source for information on Microsoft’s privacy, compliance, and security practices.
Microsoft Support: While Microsoft Support offers valuable resources, it’s not the central location for information on these broader topics.
Microsoft Service Trust Portal: This portal is the official source for information on how Microsoft manages privacy, compliance, and security for its cloud services. It provides detailed documentation, whitepapers, certifications, and risk assessments.
Therefore, the Microsoft Service Trust Portal is the most appropriate resource to learn about Microsoft’s approach to privacy, compliance, and security for its cloud services.
Microsoft 365 compliance center: This is primarily for managing compliance within your organization using Microsoft 365 tools.
Compliance Manager: This is a deprecated service. While it might have existed in the past, it’s not the current source for information on Microsoft’s privacy, compliance, and security practices.
Microsoft Support: While Microsoft Support offers valuable resources, it’s not the central location for information on these broader topics.
Microsoft Service Trust Portal: This portal is the official source for information on how Microsoft manages privacy, compliance, and security for its cloud services. It provides detailed documentation, whitepapers, certifications, and risk assessments.
Therefore, the Microsoft Service Trust Portal is the most appropriate resource to learn about Microsoft’s approach to privacy, compliance, and security for its cloud services.
Microsoft 365 compliance center: This is primarily for managing compliance within your organization using Microsoft 365 tools.
Compliance Manager: This is a deprecated service. While it might have existed in the past, it’s not the current source for information on Microsoft’s privacy, compliance, and security practices.
Microsoft Support: While Microsoft Support offers valuable resources, it’s not the central location for information on these broader topics.
Microsoft Service Trust Portal: This portal is the official source for information on how Microsoft manages privacy, compliance, and security for its cloud services. It provides detailed documentation, whitepapers, certifications, and risk assessments.
Therefore, the Microsoft Service Trust Portal is the most appropriate resource to learn about Microsoft’s approach to privacy, compliance, and security for its cloud services.
_______________ provides a central location for managing information protection, information governance, and data loss prevention policies.
Correct
The Microsoft 365 Compliance center – The Microsoft 365 compliance center brings together all of the tools and data that are needed to help understand and manage an organization’s compliance needs.
The Microsoft 365 Compliance center – The Microsoft 365 compliance center brings together all of the tools and data that are needed to help understand and manage an organization’s compliance needs.
The Microsoft 365 Compliance center – The Microsoft 365 compliance center brings together all of the tools and data that are needed to help understand and manage an organization’s compliance needs.
_____________________ in the Microsoft 365 security center is used to identify devices that are affected by an alert.
Correct
Incidents: See the broader story of an attack by connecting the dots seen on individual alerts on entities. You’ll know exactly where an attack started, what devices are impacted, who was affected, and where the threat has gone.
Incorrect answers:
Classification: Help protect data loss by adding labels to classify documents, email messages, sites, and more. When a label is applied (automatically or by the user), the content or site is protected based on the settings you choose. For example, you can create labels that encrypt files, add content marking, and control user access to specific sites.
Policies: Set up policies to manage devices, protect against threats, and receive alerts about various activities in your organization.
Secure Score: Improve your overall security posture with Microsoft Secure Score. This page provides an all up summary of the different security features and capabilities you’ve enabled, and includes recommendations for areas to improve. https://docs.microsoft.com/en-us/learn/modules/describe-security-management-capabilities-of-microsoft-365/2-describe-explore-security-center?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-security-solutions
Incorrect
Incidents: See the broader story of an attack by connecting the dots seen on individual alerts on entities. You’ll know exactly where an attack started, what devices are impacted, who was affected, and where the threat has gone.
Incorrect answers:
Classification: Help protect data loss by adding labels to classify documents, email messages, sites, and more. When a label is applied (automatically or by the user), the content or site is protected based on the settings you choose. For example, you can create labels that encrypt files, add content marking, and control user access to specific sites.
Policies: Set up policies to manage devices, protect against threats, and receive alerts about various activities in your organization.
Secure Score: Improve your overall security posture with Microsoft Secure Score. This page provides an all up summary of the different security features and capabilities you’ve enabled, and includes recommendations for areas to improve. https://docs.microsoft.com/en-us/learn/modules/describe-security-management-capabilities-of-microsoft-365/2-describe-explore-security-center?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-security-solutions
Unattempted
Incidents: See the broader story of an attack by connecting the dots seen on individual alerts on entities. You’ll know exactly where an attack started, what devices are impacted, who was affected, and where the threat has gone.
Incorrect answers:
Classification: Help protect data loss by adding labels to classify documents, email messages, sites, and more. When a label is applied (automatically or by the user), the content or site is protected based on the settings you choose. For example, you can create labels that encrypt files, add content marking, and control user access to specific sites.
Policies: Set up policies to manage devices, protect against threats, and receive alerts about various activities in your organization.
Secure Score: Improve your overall security posture with Microsoft Secure Score. This page provides an all up summary of the different security features and capabilities you’ve enabled, and includes recommendations for areas to improve. https://docs.microsoft.com/en-us/learn/modules/describe-security-management-capabilities-of-microsoft-365/2-describe-explore-security-center?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-security-solutions
Azure Defender provides security alerts and advanced threat protection for virtual machines, SQL databases, containers, web applications, your network, and more. https://docs.microsoft.com/en-us/azure/security-center/azure-defender
Incorrect answers:
provides an inventory of unmonitored virtual machines – Azure Defender for servers provides protection for all servers if it is enabled
identifies the regulatory compliance status of Azure resources- This is done by Compliance Manager
identifies user accounts that are granted elevated Privilege – Azure Defender has no such functionality
Incorrect
Azure Defender provides security alerts and advanced threat protection for virtual machines, SQL databases, containers, web applications, your network, and more. https://docs.microsoft.com/en-us/azure/security-center/azure-defender
Incorrect answers:
provides an inventory of unmonitored virtual machines – Azure Defender for servers provides protection for all servers if it is enabled
identifies the regulatory compliance status of Azure resources- This is done by Compliance Manager
identifies user accounts that are granted elevated Privilege – Azure Defender has no such functionality
Unattempted
Azure Defender provides security alerts and advanced threat protection for virtual machines, SQL databases, containers, web applications, your network, and more. https://docs.microsoft.com/en-us/azure/security-center/azure-defender
Incorrect answers:
provides an inventory of unmonitored virtual machines – Azure Defender for servers provides protection for all servers if it is enabled
identifies the regulatory compliance status of Azure resources- This is done by Compliance Manager
identifies user accounts that are granted elevated Privilege – Azure Defender has no such functionality
Question 11 of 59
11. Question
What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?
What are the 3 uses of Microsoft Cloud App security?
Correct
The Cloud App Security framework
MCAS is built on a framework that provides the following capabilities:
Discover and control the use of Shadow IT: Identify the cloud apps, and IaaS and PaaS services used by your organization. Investigate usage patterns, assess the risk levels and business readiness of more than 16,000 SaaS apps against more than 80 risks.
Protect your sensitive information anywhere in the cloud: Understand, classify, and protect the exposure of sensitive information at rest. Use out-of-the-box policies and automated processes to apply controls in real time across all your cloud apps.
Protect against cyberthreats and anomalies: Detect unusual behavior across cloud apps to identify ransomware, compromised users, or rogue applications, analyze high-risk usage, and remediate automatically to limit risks.
Assess your cloud apps’ compliance: Assess if your cloud apps meet relevant compliance requirements, including regulatory compliance and industry standards. Prevent data leaks to non-compliant apps and limit access to regulated data. https://docs.microsoft.com/en-us/learn/modules/describe-threat-protection-with-microsoft-365-defender/6-describe-microsoft-cloud-app-security?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-security-solutions
Incorrect
The Cloud App Security framework
MCAS is built on a framework that provides the following capabilities:
Discover and control the use of Shadow IT: Identify the cloud apps, and IaaS and PaaS services used by your organization. Investigate usage patterns, assess the risk levels and business readiness of more than 16,000 SaaS apps against more than 80 risks.
Protect your sensitive information anywhere in the cloud: Understand, classify, and protect the exposure of sensitive information at rest. Use out-of-the-box policies and automated processes to apply controls in real time across all your cloud apps.
Protect against cyberthreats and anomalies: Detect unusual behavior across cloud apps to identify ransomware, compromised users, or rogue applications, analyze high-risk usage, and remediate automatically to limit risks.
Assess your cloud apps’ compliance: Assess if your cloud apps meet relevant compliance requirements, including regulatory compliance and industry standards. Prevent data leaks to non-compliant apps and limit access to regulated data. https://docs.microsoft.com/en-us/learn/modules/describe-threat-protection-with-microsoft-365-defender/6-describe-microsoft-cloud-app-security?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-security-solutions
Unattempted
The Cloud App Security framework
MCAS is built on a framework that provides the following capabilities:
Discover and control the use of Shadow IT: Identify the cloud apps, and IaaS and PaaS services used by your organization. Investigate usage patterns, assess the risk levels and business readiness of more than 16,000 SaaS apps against more than 80 risks.
Protect your sensitive information anywhere in the cloud: Understand, classify, and protect the exposure of sensitive information at rest. Use out-of-the-box policies and automated processes to apply controls in real time across all your cloud apps.
Protect against cyberthreats and anomalies: Detect unusual behavior across cloud apps to identify ransomware, compromised users, or rogue applications, analyze high-risk usage, and remediate automatically to limit risks.
Assess your cloud apps’ compliance: Assess if your cloud apps meet relevant compliance requirements, including regulatory compliance and industry standards. Prevent data leaks to non-compliant apps and limit access to regulated data. https://docs.microsoft.com/en-us/learn/modules/describe-threat-protection-with-microsoft-365-defender/6-describe-microsoft-cloud-app-security?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-security-solutions
Question 18 of 59
18. Question
Select True/False
Microsoft Intune can be used to manage Android devices.
Select True/False
Microsoft Intune can be used to manage organization-owned devices and personal devices
Correct
Intune also allows people in your organization to use their personal devices for school or work. On personal devices, Intune helps make sure your organization data stays protected, and can isolate it from personal data.
With Intune, admins can:
– Support a diverse mobile environment and manage iOS/iPadOS, Android, Windows, and macOS devices securely.
– Set rules and configure settings on personal and organization-owned devices to access data and networks.
– Deploy and authenticate apps for both on-premises and mobile devices.
– Protect your company information by controlling the way users access and share information.
– Be sure devices and apps are compliant with your security requirements. https://docs.microsoft.com/en-us/learn/modules/describe-endpoint-security-with-microsoft-intune/2-describe-what-intune?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-security-solutions
Incorrect
Intune also allows people in your organization to use their personal devices for school or work. On personal devices, Intune helps make sure your organization data stays protected, and can isolate it from personal data.
With Intune, admins can:
– Support a diverse mobile environment and manage iOS/iPadOS, Android, Windows, and macOS devices securely.
– Set rules and configure settings on personal and organization-owned devices to access data and networks.
– Deploy and authenticate apps for both on-premises and mobile devices.
– Protect your company information by controlling the way users access and share information.
– Be sure devices and apps are compliant with your security requirements. https://docs.microsoft.com/en-us/learn/modules/describe-endpoint-security-with-microsoft-intune/2-describe-what-intune?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-security-solutions
Unattempted
Intune also allows people in your organization to use their personal devices for school or work. On personal devices, Intune helps make sure your organization data stays protected, and can isolate it from personal data.
With Intune, admins can:
– Support a diverse mobile environment and manage iOS/iPadOS, Android, Windows, and macOS devices securely.
– Set rules and configure settings on personal and organization-owned devices to access data and networks.
– Deploy and authenticate apps for both on-premises and mobile devices.
– Protect your company information by controlling the way users access and share information.
– Be sure devices and apps are compliant with your security requirements. https://docs.microsoft.com/en-us/learn/modules/describe-endpoint-security-with-microsoft-intune/2-describe-what-intune?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-security-solutions
Question 21 of 59
21. Question
Which two cards are available in the Microsoft 365 security center?
Correct
By default, cards are grouped by the following categories:
Identities – user accounts and credentials.
Data – email and document contents.
Devices – computers, mobile phones, and other devices.
Apps – programs and attached online services.
In the example below, the cards are grouped by category. The first category is Identities where you find two cards, Users at risk and Global admins. The second category is Data where you find two cards, Users with the most shared files and Third-party DLP policy matches
You can group cards by topic, which will rearrange the cards and group them into the following areas:
Risk – cards that highlight entities, such as accounts and devices, that might be at risk. These cards also highlight possible sources of risk, such as new threat campaigns and privileged cloud apps.
Detection trends – cards that highlight new threat detections, anomalies, and policy violations.
Configuration and health – cards that cover the configuration and deployment of security controls, including device onboarding states to management services.
Other – all cards not categorized under other topics. https://docs.microsoft.com/en-us/learn/modules/describe-security-management-capabilities-of-microsoft-365/4-explore-security-reports-dashboards
Incorrect
By default, cards are grouped by the following categories:
Identities – user accounts and credentials.
Data – email and document contents.
Devices – computers, mobile phones, and other devices.
Apps – programs and attached online services.
In the example below, the cards are grouped by category. The first category is Identities where you find two cards, Users at risk and Global admins. The second category is Data where you find two cards, Users with the most shared files and Third-party DLP policy matches
You can group cards by topic, which will rearrange the cards and group them into the following areas:
Risk – cards that highlight entities, such as accounts and devices, that might be at risk. These cards also highlight possible sources of risk, such as new threat campaigns and privileged cloud apps.
Detection trends – cards that highlight new threat detections, anomalies, and policy violations.
Configuration and health – cards that cover the configuration and deployment of security controls, including device onboarding states to management services.
Other – all cards not categorized under other topics. https://docs.microsoft.com/en-us/learn/modules/describe-security-management-capabilities-of-microsoft-365/4-explore-security-reports-dashboards
Unattempted
By default, cards are grouped by the following categories:
Identities – user accounts and credentials.
Data – email and document contents.
Devices – computers, mobile phones, and other devices.
Apps – programs and attached online services.
In the example below, the cards are grouped by category. The first category is Identities where you find two cards, Users at risk and Global admins. The second category is Data where you find two cards, Users with the most shared files and Third-party DLP policy matches
You can group cards by topic, which will rearrange the cards and group them into the following areas:
Risk – cards that highlight entities, such as accounts and devices, that might be at risk. These cards also highlight possible sources of risk, such as new threat campaigns and privileged cloud apps.
Detection trends – cards that highlight new threat detections, anomalies, and policy violations.
Configuration and health – cards that cover the configuration and deployment of security controls, including device onboarding states to management services.
Other – all cards not categorized under other topics. https://docs.microsoft.com/en-us/learn/modules/describe-security-management-capabilities-of-microsoft-365/4-explore-security-reports-dashboards
Question 22 of 59
22. Question
Select True/False:
Conditional access policies can use the device state as a signal
Correct
Conditional Access signals
Conditional Access can use the following signals to control the who, what, and where of the policy:
User or group membership. Policies can be targeted to specific users and groups (including admin roles), giving administrators fine-grained control over access.
Named location information. Named location information can be created using IP address ranges, and used when making policy decisions. Also, administrators can opt to block or allow traffic from an entire country’s IP range.
Device. Users with devices of specific platforms or marked with a specific state can be used.
Application. Users attempting to access specific applications can trigger different Conditional Access policies.
Real-time sign-in risk detection. Signals integration with Azure AD Identity Protection allows Conditional Access policies to identify risky sign-in behavior. Policies can then force users to perform password changes or multifactor authentication to reduce their risk level or be blocked from access until an administrator takes manual action.
Cloud apps or actions. Cloud apps or actions can include or exclude cloud applications or user actions that will be subject to the policy.
User risk. For customers with access to Identity Protection, user risk can be evaluated as part of a Conditional Access policy. User risk represents the probability that a given identity or account is compromised. User risk can be configured for high, medium, or low probability. https://docs.microsoft.com/en-us/learn/modules/explore-access-management-capabilities/2-describe-conditional-access-its-benefits?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-identity-access-management-solutions
Incorrect
Conditional Access signals
Conditional Access can use the following signals to control the who, what, and where of the policy:
User or group membership. Policies can be targeted to specific users and groups (including admin roles), giving administrators fine-grained control over access.
Named location information. Named location information can be created using IP address ranges, and used when making policy decisions. Also, administrators can opt to block or allow traffic from an entire country’s IP range.
Device. Users with devices of specific platforms or marked with a specific state can be used.
Application. Users attempting to access specific applications can trigger different Conditional Access policies.
Real-time sign-in risk detection. Signals integration with Azure AD Identity Protection allows Conditional Access policies to identify risky sign-in behavior. Policies can then force users to perform password changes or multifactor authentication to reduce their risk level or be blocked from access until an administrator takes manual action.
Cloud apps or actions. Cloud apps or actions can include or exclude cloud applications or user actions that will be subject to the policy.
User risk. For customers with access to Identity Protection, user risk can be evaluated as part of a Conditional Access policy. User risk represents the probability that a given identity or account is compromised. User risk can be configured for high, medium, or low probability. https://docs.microsoft.com/en-us/learn/modules/explore-access-management-capabilities/2-describe-conditional-access-its-benefits?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-identity-access-management-solutions
Unattempted
Conditional Access signals
Conditional Access can use the following signals to control the who, what, and where of the policy:
User or group membership. Policies can be targeted to specific users and groups (including admin roles), giving administrators fine-grained control over access.
Named location information. Named location information can be created using IP address ranges, and used when making policy decisions. Also, administrators can opt to block or allow traffic from an entire country’s IP range.
Device. Users with devices of specific platforms or marked with a specific state can be used.
Application. Users attempting to access specific applications can trigger different Conditional Access policies.
Real-time sign-in risk detection. Signals integration with Azure AD Identity Protection allows Conditional Access policies to identify risky sign-in behavior. Policies can then force users to perform password changes or multifactor authentication to reduce their risk level or be blocked from access until an administrator takes manual action.
Cloud apps or actions. Cloud apps or actions can include or exclude cloud applications or user actions that will be subject to the policy.
User risk. For customers with access to Identity Protection, user risk can be evaluated as part of a Conditional Access policy. User risk represents the probability that a given identity or account is compromised. User risk can be configured for high, medium, or low probability. https://docs.microsoft.com/en-us/learn/modules/explore-access-management-capabilities/2-describe-conditional-access-its-benefits?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-identity-access-management-solutions
Question 23 of 59
23. Question
Select True/False:
Conditional access policies apply before first-factor authentication is complete
Select True/False
Conditional access policies can trigger multi-factor authentication(MFA) if a user attempts to access specific application
Correct
Conditional Access signals
Conditional Access can use the following signals to control the who, what, and where of the policy:
User or group membership. Policies can be targeted to specific users and groups (including admin roles), giving administrators fine-grained control over access.
Named location information. Named location information can be created using IP address ranges, and used when making policy decisions. Also, administrators can opt to block or allow traffic from an entire country’s IP range.
Device. Users with devices of specific platforms or marked with a specific state can be used.
Application. Users attempting to access specific applications can trigger different Conditional Access policies.
Real-time sign-in risk detection. Signals integration with Azure AD Identity Protection allows Conditional Access policies to identify risky sign-in behavior. Policies can then force users to perform password changes or multifactor authentication to reduce their risk level or be blocked from access until an administrator takes manual action.
Cloud apps or actions. Cloud apps or actions can include or exclude cloud applications or user actions that will be subject to the policy.
User risk. For customers with access to Identity Protection, user risk can be evaluated as part of a Conditional Access policy. User risk represents the probability that a given identity or account is compromised. User risk can be configured for high, medium, or low probability. https://docs.microsoft.com/en-us/learn/modules/explore-access-management-capabilities/2-describe-conditional-access-its-benefits?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-identity-access-management-solutions
Incorrect
Conditional Access signals
Conditional Access can use the following signals to control the who, what, and where of the policy:
User or group membership. Policies can be targeted to specific users and groups (including admin roles), giving administrators fine-grained control over access.
Named location information. Named location information can be created using IP address ranges, and used when making policy decisions. Also, administrators can opt to block or allow traffic from an entire country’s IP range.
Device. Users with devices of specific platforms or marked with a specific state can be used.
Application. Users attempting to access specific applications can trigger different Conditional Access policies.
Real-time sign-in risk detection. Signals integration with Azure AD Identity Protection allows Conditional Access policies to identify risky sign-in behavior. Policies can then force users to perform password changes or multifactor authentication to reduce their risk level or be blocked from access until an administrator takes manual action.
Cloud apps or actions. Cloud apps or actions can include or exclude cloud applications or user actions that will be subject to the policy.
User risk. For customers with access to Identity Protection, user risk can be evaluated as part of a Conditional Access policy. User risk represents the probability that a given identity or account is compromised. User risk can be configured for high, medium, or low probability. https://docs.microsoft.com/en-us/learn/modules/explore-access-management-capabilities/2-describe-conditional-access-its-benefits?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-identity-access-management-solutions
Unattempted
Conditional Access signals
Conditional Access can use the following signals to control the who, what, and where of the policy:
User or group membership. Policies can be targeted to specific users and groups (including admin roles), giving administrators fine-grained control over access.
Named location information. Named location information can be created using IP address ranges, and used when making policy decisions. Also, administrators can opt to block or allow traffic from an entire country’s IP range.
Device. Users with devices of specific platforms or marked with a specific state can be used.
Application. Users attempting to access specific applications can trigger different Conditional Access policies.
Real-time sign-in risk detection. Signals integration with Azure AD Identity Protection allows Conditional Access policies to identify risky sign-in behavior. Policies can then force users to perform password changes or multifactor authentication to reduce their risk level or be blocked from access until an administrator takes manual action.
Cloud apps or actions. Cloud apps or actions can include or exclude cloud applications or user actions that will be subject to the policy.
User risk. For customers with access to Identity Protection, user risk can be evaluated as part of a Conditional Access policy. User risk represents the probability that a given identity or account is compromised. User risk can be configured for high, medium, or low probability. https://docs.microsoft.com/en-us/learn/modules/explore-access-management-capabilities/2-describe-conditional-access-its-benefits?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-identity-access-management-solutions
Question 25 of 59
25. Question
Conditional access policies can use __________________________ as a signal that provides the ability to control sessions in real time.
Select True/False
A user risk in Azure Active Directory(Azure AD) Identity Protection represents the probability that a given identity or account is compromised
Select True/False:
Conditional access policies can be used to block access to an application based on the location of the user
Correct
Conditional Access signals
Conditional Access can use the following signals to control the who, what, and where of the policy:
User or group membership. Policies can be targeted to specific users and groups (including admin roles), giving administrators fine-grained control over access.
Named location information. Named location information can be created using IP address ranges, and used when making policy decisions. Also, administrators can opt to block or allow traffic from an entire country’s IP range.
Device. Users with devices of specific platforms or marked with a specific state can be used.
Application. Users attempting to access specific applications can trigger different Conditional Access policies.
Real-time sign-in risk detection. Signals integration with Azure AD Identity Protection allows Conditional Access policies to identify risky sign-in behavior. Policies can then force users to perform password changes or multifactor authentication to reduce their risk level or be blocked from access until an administrator takes manual action.
Cloud apps or actions. Cloud apps or actions can include or exclude cloud applications or user actions that will be subject to the policy.
User risk. For customers with access to Identity Protection, user risk can be evaluated as part of a Conditional Access policy. User risk represents the probability that a given identity or account is compromised. User risk can be configured for high, medium, or low probability https://docs.microsoft.com/en-us/learn/modules/explore-access-management-capabilities/2-describe-conditional-access-its-benefits?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-identity-access-management-solutions
Incorrect
Conditional Access signals
Conditional Access can use the following signals to control the who, what, and where of the policy:
User or group membership. Policies can be targeted to specific users and groups (including admin roles), giving administrators fine-grained control over access.
Named location information. Named location information can be created using IP address ranges, and used when making policy decisions. Also, administrators can opt to block or allow traffic from an entire country’s IP range.
Device. Users with devices of specific platforms or marked with a specific state can be used.
Application. Users attempting to access specific applications can trigger different Conditional Access policies.
Real-time sign-in risk detection. Signals integration with Azure AD Identity Protection allows Conditional Access policies to identify risky sign-in behavior. Policies can then force users to perform password changes or multifactor authentication to reduce their risk level or be blocked from access until an administrator takes manual action.
Cloud apps or actions. Cloud apps or actions can include or exclude cloud applications or user actions that will be subject to the policy.
User risk. For customers with access to Identity Protection, user risk can be evaluated as part of a Conditional Access policy. User risk represents the probability that a given identity or account is compromised. User risk can be configured for high, medium, or low probability https://docs.microsoft.com/en-us/learn/modules/explore-access-management-capabilities/2-describe-conditional-access-its-benefits?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-identity-access-management-solutions
Unattempted
Conditional Access signals
Conditional Access can use the following signals to control the who, what, and where of the policy:
User or group membership. Policies can be targeted to specific users and groups (including admin roles), giving administrators fine-grained control over access.
Named location information. Named location information can be created using IP address ranges, and used when making policy decisions. Also, administrators can opt to block or allow traffic from an entire country’s IP range.
Device. Users with devices of specific platforms or marked with a specific state can be used.
Application. Users attempting to access specific applications can trigger different Conditional Access policies.
Real-time sign-in risk detection. Signals integration with Azure AD Identity Protection allows Conditional Access policies to identify risky sign-in behavior. Policies can then force users to perform password changes or multifactor authentication to reduce their risk level or be blocked from access until an administrator takes manual action.
Cloud apps or actions. Cloud apps or actions can include or exclude cloud applications or user actions that will be subject to the policy.
User risk. For customers with access to Identity Protection, user risk can be evaluated as part of a Conditional Access policy. User risk represents the probability that a given identity or account is compromised. User risk can be configured for high, medium, or low probability https://docs.microsoft.com/en-us/learn/modules/explore-access-management-capabilities/2-describe-conditional-access-its-benefits?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-identity-access-management-solutions
Question 36 of 59
36. Question
Select True/False
Conditional access policies can be applied only to users who have Azure Active Directory (Azure AD) joined devices
Correct
Device
A device is a piece of hardware, such as mobile devices, laptops, servers, or printer. Device identities can be set up in different ways in Azure AD, to determine properties such as who owns the device. Managing devices in Azure AD allows an organization to protect its assets by using tools such as Microsoft Intune to ensure standards for security and compliance. Azure AD also enables single sign-on to devices, apps, and services from anywhere through these devices.
There are multiple options for getting devices into Azure AD:
Azure AD registered devices can be Windows 10, iOS, Android, or macOS devices. Devices that are Azure AD registered are typically owned personally, rather than by the organization. They’re signed in with a personal Microsoft account or another local account.
Azure AD joined devices exist only in the cloud. Azure AD joined devices are owned by an organization and signed in with their account. Users sign in to their devices with their Azure AD or synced Active Directory work or school accounts. You can configure Azure AD joined devices for all Windows 10 devices (except Windows 10 Home).
Hybrid Azure AD joined devices can be Windows 7, 8.1, or 10, or Windows Server 2008, or newer. Devices that are hybrid Azure AD joined are owned by an organization and signed in with an Active Directory Domain Services account belonging to that organization. They exist in the cloud and on-premises. https://docs.microsoft.com/en-us/learn/modules/explore-basic-services-identity-types/4-describe-identity-types
Conditional access policies can be applied to any of the above. https://docs.microsoft.com/en-us/learn/modules/explore-access-management-capabilities/2-describe-conditional-access-its-benefits?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-identity-access-management-solutions
Incorrect
Device
A device is a piece of hardware, such as mobile devices, laptops, servers, or printer. Device identities can be set up in different ways in Azure AD, to determine properties such as who owns the device. Managing devices in Azure AD allows an organization to protect its assets by using tools such as Microsoft Intune to ensure standards for security and compliance. Azure AD also enables single sign-on to devices, apps, and services from anywhere through these devices.
There are multiple options for getting devices into Azure AD:
Azure AD registered devices can be Windows 10, iOS, Android, or macOS devices. Devices that are Azure AD registered are typically owned personally, rather than by the organization. They’re signed in with a personal Microsoft account or another local account.
Azure AD joined devices exist only in the cloud. Azure AD joined devices are owned by an organization and signed in with their account. Users sign in to their devices with their Azure AD or synced Active Directory work or school accounts. You can configure Azure AD joined devices for all Windows 10 devices (except Windows 10 Home).
Hybrid Azure AD joined devices can be Windows 7, 8.1, or 10, or Windows Server 2008, or newer. Devices that are hybrid Azure AD joined are owned by an organization and signed in with an Active Directory Domain Services account belonging to that organization. They exist in the cloud and on-premises. https://docs.microsoft.com/en-us/learn/modules/explore-basic-services-identity-types/4-describe-identity-types
Conditional access policies can be applied to any of the above. https://docs.microsoft.com/en-us/learn/modules/explore-access-management-capabilities/2-describe-conditional-access-its-benefits?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-identity-access-management-solutions
Unattempted
Device
A device is a piece of hardware, such as mobile devices, laptops, servers, or printer. Device identities can be set up in different ways in Azure AD, to determine properties such as who owns the device. Managing devices in Azure AD allows an organization to protect its assets by using tools such as Microsoft Intune to ensure standards for security and compliance. Azure AD also enables single sign-on to devices, apps, and services from anywhere through these devices.
There are multiple options for getting devices into Azure AD:
Azure AD registered devices can be Windows 10, iOS, Android, or macOS devices. Devices that are Azure AD registered are typically owned personally, rather than by the organization. They’re signed in with a personal Microsoft account or another local account.
Azure AD joined devices exist only in the cloud. Azure AD joined devices are owned by an organization and signed in with their account. Users sign in to their devices with their Azure AD or synced Active Directory work or school accounts. You can configure Azure AD joined devices for all Windows 10 devices (except Windows 10 Home).
Hybrid Azure AD joined devices can be Windows 7, 8.1, or 10, or Windows Server 2008, or newer. Devices that are hybrid Azure AD joined are owned by an organization and signed in with an Active Directory Domain Services account belonging to that organization. They exist in the cloud and on-premises. https://docs.microsoft.com/en-us/learn/modules/explore-basic-services-identity-types/4-describe-identity-types
Conditional access policies can be applied to any of the above. https://docs.microsoft.com/en-us/learn/modules/explore-access-management-capabilities/2-describe-conditional-access-its-benefits?ns-enrollment-type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-identity-access-management-solutions
Question 37 of 59
37. Question
_______________ enables collaboration with business partners from external organizations such as suppliers, partners and vendors. External users appear as guest users in the directory.
With Windows Hello for Business, a user’s biometric data used for authentication _______________
Correct
is stored on a local device only
Windows Hello for Business stores biometric data locally on the device where it was enrolled. This ensures enhanced security as the biometric data is not transmitted to any external servers, including Azure Active Directory.
Incorrect
is stored on a local device only
Windows Hello for Business stores biometric data locally on the device where it was enrolled. This ensures enhanced security as the biometric data is not transmitted to any external servers, including Azure Active Directory.
Unattempted
is stored on a local device only
Windows Hello for Business stores biometric data locally on the device where it was enrolled. This ensures enhanced security as the biometric data is not transmitted to any external servers, including Azure Active Directory.
Question 39 of 59
39. Question
Which Microsoft 365 compliance centre feature can you use to identify all the documents on a Microsoft SharePoint Online site that contains a specific key word?
Correct
Content search- Use Content search to quickly find email in Exchange mailboxes, documents in SharePoint sites and OneDrive locations, and instant messaging conversations in Microsoft Teams and Skype for Business.
Audit – Use the Audit log to investigate common support and compliance issues.
Alerts – to view and resolve alerts
Compliance Manager – to see your compliance score and start managing compliance for your organization. https://docs.microsoft.com/en-us/microsoft-365/compliance/microsoft-365-compliance-center?view=o365-worldwide
Incorrect
Content search- Use Content search to quickly find email in Exchange mailboxes, documents in SharePoint sites and OneDrive locations, and instant messaging conversations in Microsoft Teams and Skype for Business.
Audit – Use the Audit log to investigate common support and compliance issues.
Alerts – to view and resolve alerts
Compliance Manager – to see your compliance score and start managing compliance for your organization. https://docs.microsoft.com/en-us/microsoft-365/compliance/microsoft-365-compliance-center?view=o365-worldwide
Unattempted
Content search- Use Content search to quickly find email in Exchange mailboxes, documents in SharePoint sites and OneDrive locations, and instant messaging conversations in Microsoft Teams and Skype for Business.
Audit – Use the Audit log to investigate common support and compliance issues.
Alerts – to view and resolve alerts
Compliance Manager – to see your compliance score and start managing compliance for your organization. https://docs.microsoft.com/en-us/microsoft-365/compliance/microsoft-365-compliance-center?view=o365-worldwide
Question 40 of 59
40. Question
Which score measures an organization’s progress in completing actions that help reduce risks associated to data protection and regulatory standards?
Select True/False
You can use Advanced Audit in Microsoft 365 to identify when a user uses the search bar in Outlook on the web to search for items in a mailbox
Select True/False:
You can delete a resource group containing resources that have resource locks
Correct
FALSE
You cannot delete a resource group containing resources that have resource locks. Resource locks are designed to prevent accidental deletion or modification of critical resources. To delete a resource group with locked resources, you must first remove the resource locks.
You cannot delete a resource group containing resources that have resource locks. Resource locks are designed to prevent accidental deletion or modification of critical resources. To delete a resource group with locked resources, you must first remove the resource locks.
You cannot delete a resource group containing resources that have resource locks. Resource locks are designed to prevent accidental deletion or modification of critical resources. To delete a resource group with locked resources, you must first remove the resource locks.
__________________ can be used to provide Microsoft Support Engineers with access to an organization’s data stored in Microsoft Exchange , SharePoint Online and OneDrive for Business