Which metric should you use?
You use Microsoft 365 Usage Analytics. You need to know the number of users who are active today and were also active last month. Which metric should you use?A . MoMReturningUsersB . EnabledUsersC . ActiveUsersD . CumulativeActiveUsersView AnswerAnswer: A Explanation: References: https://docs.microsoft.com/en-us/office365/admin/usage-analytics/active-user-in-usage-reports? view=o365-worldwide
Which two platforms provide hybrid capabilities for migration?
You need to identify which Microsoft platforms provide hybrid capabilities for migrating from an on-premises deployment. Which two platforms provide hybrid capabilities for migration? Each correct answer provides a complete solution. (Choose two.) NOTE: Each correct selection is worth one point.A . Microsoft Skype for BusinessB . Microsoft YammerC ....
Which three methods can you use?
A company assigns a Microsoft 365 license to each employee. You need to install Microsoft Office 365 ProPlus on each employee device. Which three methods can you use? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . Use System Center Configuration Manager (SCCM)...
Which three actions should you perform?
A company plans to migrate to Microsoft 365. Corporate devices run Windows 7 or Windows 10. You must upgrade all devices to use Office 365 ProPlus and minimize costs. You need to standardize corporate device deployments. Which three actions should you perform? Each correct answer presents part of the solution....
A company has a Microsoft 365 E5 subscription. The company plans to use eDiscovery to meet legal discovery requirements
HOTSPOT A company has a Microsoft 365 E5 subscription. The company plans to use eDiscovery to meet legal discovery requirements. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: References: https://docs.microsoft.com/en-us/office365/securitycompliance/ediscovery#ediscoverycases https://docs.microsoft.com/en-us/office365/securitycompliance/manage-ediscovery-cases...
Which technologies should be used?
HOTSPOT You are the Microsoft Office 365 administrator for a company. The company has the following requirements: - Users must be able to use incompatible applications on a Windows 10 device. - Cloud-based applications must use the same credentials as on-premises applications. - Users must be prevented from copying company...
You are the Microsoft 365 administrator for a company. Your company plans to open a new office in the United Kingdom. You need to provide penetration test and security assessment reports for the new office. Where can you locate the required reports?
You are the Microsoft 365 administrator for a company. Your company plans to open a new office in the United Kingdom. You need to provide penetration test and security assessment reports for the new office. Where can you locate the required reports?A . Data Governance page of the Security and...
Which workloads you can migrate to the cloud?
DRAG DROP An organization is considering migrating resources to the cloud. The company does not plan to deploy Microsoft Azure ExpressRoute or site-to-site VPNs. You need to identify which workloads you can migrate to the cloud. Which workloads you can migrate to the cloud? To answer, drag the appropriate actions...
Which two options should you select on the Microsoft 365 Roadmap page?
HOTSPOT You are the Microsoft 365 administrator for a company. You need to find all general availability features for SharePoint Online. Which two options should you select on the Microsoft 365 Roadmap page? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one...
Which of the following methods is NOT a valid multi-factor authentication method in Microsoft 365?
A company deploys Microsoft Azure AD. You enable multi-factor authentication. You need to inform users about the multi-factor authentication methods that they can use. Which of the following methods is NOT a valid multi-factor authentication method in Microsoft 365?A . Receive an automated call on the desk phone that includes...