You configure an anti-phishing policy as shown in the following exhibit

HOTSPOT You configure an anti-phishing policy as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: References: https://docs.microsoft.com/en-us/office365/securitycompliance/set-up-anti-phishing-policies#learn-about-atp-anti-phishing-policy-options

May 16, 2021 No Comments READ MORE +

What should you do from the Security & Compliance admin center?

Your company has a Microsoft 365 E5 subscription. Users in the research department work with sensitive data. You need to prevent the research department users from accessing potentially unsafe websites by using hyperlinks embedded in email messages and documents. Users in other departments must not be restricted. What should you...

May 16, 2021 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

May 16, 2021 No Comments READ MORE +

Does this meet the goal?

: 228 You have a Microsoft 365 subscription. You discover that some external users accessed center for a Microsoft SharePoint site. You modify the sharePoint sharing policy to prevent sharing, outside your organization. You need to be notified if the SharePoint sharing policy is modified in the future. Solution: From...

May 15, 2021 No Comments READ MORE +

What should you do?

HOTSPOT You need to meet the Intune requirements for the Windows 10 devices. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: References: https://docs.microsoft.com/en-us/intune/windows-enroll

May 15, 2021 No Comments READ MORE +

Your company has a Microsoft 36S subscription that uses an Azure Active Directory (Azure AD) tenant named contoso.com. The company stores 2 TBs of data in SharePoint Online document libraries

HOTSPOT Your company has a Microsoft 36S subscription that uses an Azure Active Directory (Azure AD) tenant named contoso.com. The company stores 2 TBs of data in SharePoint Online document libraries. The tenant has the labels shown in the following table. From the Azure portal, you active unified labeling. For...

May 15, 2021 No Comments READ MORE +

You have a Microsoft 365 subscription that contains the users in the following table

HOTSPOT You have a Microsoft 365 subscription that contains the users in the following table. In Microsoft Endpoint Manager, you create two device type restrictions that have the settings shown in the following table. In Microsoft Endpoint Manager, you create three device limit restrictions that have the settings shown in...

May 15, 2021 No Comments READ MORE +

What is the minimum number of data sources and log collectors you should create from Microsoft Cloud App Security?

HOTSPOT You need to meet the technical requirement for log analysis. What is the minimum number of data sources and log collectors you should create from Microsoft Cloud App Security? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:...

May 15, 2021 No Comments READ MORE +

You have a Microsoft 365 subscription that contains all the user data

HOTSPOT You have a Microsoft 365 subscription that contains all the user data. You plan to create the retention policy shown in the Locations exhibit. (Click the Locations tab.) You configure the Advanced retention settings as shown in the Retention exhibit. (Click the Retention tab.) The locations specified in the...

May 14, 2021 No Comments READ MORE +

Which devices will support the ASR rules?

You have a Microsoft 365 E5 tenant that contains the devices shown in the following table. You plan to implement attack surface reduction (ASR) rules . Which devices will support the ASR rules?A . Device 1, Device2, and Device3 onlyB . Device3onryC . Device2 and Device3 onlyD . Device1, Device2,...

May 14, 2021 No Comments READ MORE +