Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . text message (SMS)B . Microsoft Authenticator appC . email verificationD . phone callE . security questionView AnswerAnswer: A,B,D Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-methods

March 13, 2022 No Comments READ MORE +

Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft SharePoint Online site that contain a specific key word?

Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft SharePoint Online site that contain a specific key word?A . AuditB . Compliance ManagerC . Content SearchD . AlertsView AnswerAnswer: C Explanation: The Content Search tool in the Security & Compliance Center can...

March 12, 2022 No Comments READ MORE +

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point

HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: No Phishing scams are external threats. Box 2: Yes Insider risk management is a compliance solution in Microsoft 365. Box...

March 11, 2022 No Comments READ MORE +

What are two capabilities of Microsoft Defender for Endpoint? Each correct selection presents a complete solution. NOTE: Each correct selection is worth one point.

What are two capabilities of Microsoft Defender for Endpoint? Each correct selection presents a complete solution. NOTE: Each correct selection is worth one point.A . automated investigation and remediationB . transport encryptionC . shadow IT detectionD . attack surface reductionView AnswerAnswer: A,D Explanation: Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint? view=o365-worldwide

March 10, 2022 No Comments READ MORE +

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point

HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Graphical user interface, text, application Description automatically generated

March 10, 2022 No Comments READ MORE +

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point

HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Graphical user interface, text, application, email Description automatically generated Box 1: No Compliance Manager tracks Microsoft managed controls, customer-managed controls, and shared...

November 10, 2021 No Comments READ MORE +

Which security methodology does this represent?

You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure. Which security methodology does this represent?A . threat modelingB . identity as the security perimeterC . defense in depthD . the shared responsibility modelView AnswerAnswer: C Explanation: Reference: https://docs.microsoft.com/en-us/learn/modules/secure-network-connectivity-azure/2-what-is-defense-in-depth

November 10, 2021 No Comments READ MORE +

Select the answer that correctly completes the sentence

HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: Text, letter Description automatically generated

November 10, 2021 No Comments READ MORE +

Which two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Which two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . Display policy tips to users who are about to violate your organization’s policies.B . Enable disk encryption on...

November 9, 2021 No Comments READ MORE +

Select the answer that correctly completes the sentence

HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: Graphical user interface, application Description automatically generated

November 9, 2021 No Comments READ MORE +