MS 900 Fundamentals

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A company uses Microsoft 365 for email. The company plans to implement a solution for employees who leave the company. Currently, user accounts of terminated employees are deleted immediately. Mailbox content for terminated employees must be retained for 90 days and then deleted. You need to identify solutions that meet the requirements .What are two possible ways to achieve this goal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Apply a Litigation Hold to the mailbox. B. Recover the inactive mailbox. C. Restore the inactive mailbox. D. Apply a retention policy to the mailbox.

A. Apply a Litigation Hold to the mailbox. D. Apply a retention policy to the mailbox. A: You can place a mailbox on Litigation hold to retain all mailbox content, including deleted items and the original versions of modified items. When you place a user mailbox on Litigation hold, content in the user's archive mailbox (if it's enabled) is also retained. When you create a hold, you can specify a hold duration (also called a time-based hold) so that deleted and modified items are retained for a specified period and then permanently deleted from the mailbox. Or you can just retain content indefinitely (called an infinite hold) or until the Litigation hold is removed. D: In Exchange Online, you can use archive policies to automatically move mailbox items to personal (on-premises) or cloud-based archives. Archive policies are retention tags that use the Move to Archive retention action.You can modify retention tags included in the default policy to meet your business requirements. For example, you can modify the archive DPT to move items to the archive after three years instead of two. Reference:https://docs.microsoft.com/en-us/microsoft-365/compliance/create-a-litigation-hold?view=o365-worldwide https://docs.microsoft.com/en-us/exchange/security-and-compliance/modify-archive-policies

You are a Microsoft 365 administrator for a company. You need to identify security vulnerabilities by using the Office 365 Attack Simulator. Which three attack simulations are available? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Brute-force password B. Cross-site scripting C. Password-spray D. Denial-of-service E. Display name spear-phishing

A. Brute-force password C. Password-spray E. Display name spear-phishing https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/attack-simulator

A business acquaintance from another company sends you a document that is encrypted by Azure Information Protection (AIP).You are unable to open the document because the user account cannot be authenticated by the companyג€™s Azure Active Directory. You need to access the document. What should you do? A. Implement Azure Rights Management (RMS) for individuals for the user account. B. Implement Information Rights Management (IRM) for the Office application. C. Upgrade your account to include AIP for Office 365.

A. Implement Azure Rights Management (RMS) for individuals for the user account. https://docs.microsoft.com/en-us/azure/information-protection/rms-for-individuals

A company plans to purchase Microsoft 365 Enterprise licenses. Which two options can you use? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. through a Cloud Solution Provider (CSP) B. from the Microsoft website using a corporate credit card C. from the Microsoft retail store D. with an Enterprise Agreement (EA) subscription from Microsoft

A. through a Cloud Solution Provider (CSP) D. with an Enterprise Agreement (EA) subscription from Microsoft

You are the Azure administrator for a company. The company uses only Platform as a Service (PaaS).You need to identify which solution components Microsoft must manage and which solution components your IT staff must manage. Match each management owner to its component. To answer, drag the responsible party from the column on the left to its component on the right. Each party may be used once, more than once, or not at all. - Applications - Operating Systems - Storage - Application Data Parties: - IT Staff - Microsoft

Applications- IT Staff Operating Systems- Microsoft Storage- Microsoft Application Data- IT Staff

You are the Microsoft 365 administrator for a company. Your company plans to migrate from on-premises to a hybrid cloud deployment. You are required to make sure that the Microsoft platform used for the migration offers hybrid abilities.Which of the following options meet the requirement? -A) Microsoft Office Delve -B) Microsoft SharePoint -C) Microsoft Yammer -D)Microsoft Skype For Business -E) Microsoft Teams

B) Microsoft SharePoint D)Microsoft Skype For Business

Your organization plans to deploy Microsoft 365 in a hybrid scenario. You need to ensure that employees can use a smart card for authentication. Which hybrid identity solution should you implement? A. password hash synchronization with single sign-on B. Active Directory Federation Services (AD FS) C. PingFederate and federation integration D. pass-through authentication and single sign-on

B. Active Directory Federation Services (AD FS) https://docs.microsoft.com/en-us/azure/security/azure-ad-choose-authn

You are the Microsoft 365 administrator for a company. You need to ensure that users receive a warning message if they select links in emails that might be unsafe. What should you do? A. Use Windows PowerShell to install the latest antimalware engine updates B. Enable Microsoft Office 365 Advanced Threat Protection C. Use the Microsoft Exchange Admin Center to configure a new spam-filter policy D. Use the Microsoft Exchange Admin Center to create a new antimalware policy

B. Enable Microsoft Office 365 Advanced Threat Protection

Your company has a Microsoft Office 365 subscription. As an administrator for this subscription, you are educating users on which component to use to register their personal home device with the company. Which of the following is the component that should be used? A. Microsoft Azure AD Identity Protection B. Enterprise Mobility + Security C. Microsoft Teams D. Microsoft Yammer

B. Enterprise Mobility + Security

A company uses Microsoft cloud services. You need to change the update channels for the Microsoft 365 Apps for enterprise by using a Microsoft supported method. Which two methods can you use? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Windows 10 Update Assistant B. Group Policy C. Client app D. Office Deployment Tool E. Readiness Toolkit

B. Group Policy D. Office Deployment Tool

A company has an on-premises application server. The company wants to use some of the services in Microsoft 365 with the on-premises application server. You need to choose a cloud deployment model that meets the requirement .What should you choose? A. Private B. Hybrid C. Public

B. Hybrid

A company deploys Microsoft Azure AD. You enable multi-factor authentication. You need to inform users about the multi-factor authentication methods that they can use. Which of the following methods is NOT a valid multi-factor authentication method in Microsoft 365? A. Receive an automated call on the desk phone that includes a verification code B. Insert a small card in to a desktop computer and provide a PIN code when prompted C. Receive a call on a mobile phone and select the pound sign (#) when prompted D. Receive an SMS text message that includes a verification code

B. Insert a small card in to a desktop computer and provide a PIN code when prompted

A company uses Microsoft 365.The company must identify which cloud apps and services are used in the company. You need to identify which service can be used to find this information. Which service should you use? A. Microsoft Defender for Office 365 B. Microsoft Cloud App Security C. Azure Security Center D. Azure Active Directory

B. Microsoft Cloud App Security

Your company plans to move their Server environment to the cloud. You have been tasked with identifying a cloud model that allows for the current email environment to be upgraded, while also reducing server and application maintenance. You need to make sure that the requirements are met. Solution: You recommend the Platform as a service (PaaS) model. Does the solution meet the goal? A. Yes B. No

B. No

Your company is planning to migrate to Microsoft Azure and Microsoft 365.You are required to identify a cloud service that allows for website hosting. Which of the following is the model you should choose? A. Software as a Service (SaaS) B. Platform as a Service (PaaS) C. Infrastructure as a Service (IaaS) D. Container as a Service (CaaS)

B. Platform as a Service (PaaS)

A company uses Microsoft 365. The company wants to improve their compliance score based on Microsoft recommendations. You need to identify the task that has the largest impact to the compliance score. Which task should you choose? A. Detective discretionary B. Preventative mandatory C. Corrective discretionary D. Corrective mandatory

B. Preventative mandatory

A company uses Microsoft 365.The company needs to label emails and documents that contain confidential text. You need to identify a feature that meets this requirement. Which feature should you choose? A. Customer Key B. Sensitivity label C. Microsoft Outlook rule D. Retention label

B. Sensitivity label

HOTSPOT -A company is creating their Windows as a service (WaaS) strategy. You need to determine which type of release should be used. The company will validate quality updates in an early release prior to a combined security release through: - B Releases - Non security releases - C releases - Out of band releases

C releases IT admins have the option to test and validate production-quality releases ahead of the planned B release for the following month. These updates are optional, cumulative, non-security preview releases known as C releases. These releases are only offered to the most recent, supported versions of Windows. Quality updates are provided on a monthly schedule, as two types of releases: 1. Non-security releases 2. Combined security + non-security releases Non-security releases provide IT admins an opportunity for early validation of that content prior to the combined release. Releases can also be provided outside of the monthly schedule when there is an exceptional need. * OOB releases Out-of-band (OOB) releases might be provided to fix a recently identified issue or vulnerability. They are used in atypical cases when an issue is detected and cannot wait for the next monthly release, because devices must be updated immediately to address security vulnerabilities or to resolve a quality issue impacting many devices. * B releases Most people are familiar with what is commonly referred to as Patch Tuesday or Update Tuesday.ג€‰These updates are released on the second Tuesday of each month, and are known as theג€‰B release (where ג€Bג€ג€‰refers to the second week in the month). B releases are typically published at 10:00 AM Pacific Time (PST/PDT). Because they are cumulative, B releases include both new and previously released security fixes, along with non-security content introduced in the prior monthג€™sPreview C release (see the next section). These updates help keep Windows devices secure and compliant by deploying stability fixes and addressing security vulnerabilities. B releases are mandatory.

Your company has a Microsoft 365 subscription. After a Microsoft 365 outage, the Service Health Dashboard indicates no issues with the service. You check the Service Health Dashboard and observe that the service is healthy. You then access the Post-Incident Review (PIR).Which of the following is the maximum time, after an incident has been resolved, that you have to wait for a preliminary Post-Incident Review (PIR) to be delivered via your Service Health Dashboard? A. 12 hours. B. 24 hours. C. 48 hours. D. 5 business days.

C. 48 hours.

A company plans to migrate to Microsoft 365. Firstline employees need to be able to collaborate by using Microsoft Yammer, SharePoint Online, and Teams. You must minimize costs. Which subscription type should you use? A. E3 B. ProPlus C. F3 D. Personal

C. F3 https://docs.microsoft.com/en-us/office365/servicedescriptions/office-365-platform-service-description/office-365-plan-options https://www.microsoft.com/en-us/microsoft-365/enterprise/f3?activetab=pivot%3aoverviewtab

Your company is planning to migrate to Microsoft Azure and Microsoft 365.You are required to identify a cloud service that allows for the deployment of a Linux virtual machine.Which of the following is the model you should choose? A. Software as a Service (SaaS) B. Platform as a Service (PaaS) C. Infrastructure as a Service (IaaS) D. Container as a Service (CaaS)

C. Infrastructure as a Service (IaaS)

Your company makes use of Microsoft 365 in their environment. You have been tasked with making sure that members of the Global Administrators group are protected. The feature you use should achieve this by making use of dynamic risk profiles. Which of the following is a feature you should use? A. Mobile application protection policy. B. Device configuration policy. C. Microsoft Azure AD Privilege Identity Protection. D. Microsoft Azure AD Conditional Access.

C. Microsoft Azure AD Privilege Identity Protection.

You are the Microsoft 365 administrator for a company.You need to customize a usage report for Microsoft Yammer.Which two tools can you use? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Microsoft SQL Server Analysis Services B. Microsoft SQL Server Reporting Services C. Microsoft Power BI in a browser D. Microsoft Power BI Desktop E. Microsoft Visual Studio

C. Microsoft Power BI in a browser D. Microsoft Power BI Desktop

Your company has a Microsoft Office 365 subscription. As an administrator for this subscription, you are educating new users on which component to use for audio and visual communications with colleagues. Which of the following is the component that should be used? A. Microsoft Exchange Online B. Enterprise Mobility + Security C. Microsoft Teams D. Microsoft SharePoint Online

C. Microsoft Teams

Y or N Compliance manager evaluates both Microsoft and Customer controls compliance manager allows you to assign individuals within the organization to be responsible for the control Compliance manager provides the ability to take actions to address issues from within the service trust portal

Compliance manager evaluates both Microsoft and Customer controls Y compliance manager allows you to assign individuals within the organization to be responsible for the control Y Compliance manager provides the ability to take actions to address issues from within the service trust portal N

Y or N Customers can purchase M365 and pay monthly using a Credit Card Customers can purchase M365 and pay annually using a Credit Card Customers can purchase M365 through an Azure cloud solution provider

Customers can purchase M365 and pay monthly using a Credit Card -Y Customers can purchase M365 and pay annually using a Credit Card -Y Customers can purchase M365 through an Azure cloud solution provider -Y

A company deploys Microsoft Azure AD. You enable multi-factor authentication. You need to inform users about the multi-factor authentication methods that they can use. Which of the following methods is NOT a valid multi-factor authentication method in Microsoft 365? A. Receive an automated call on the desk phone that includes a verification code. B. Use the Microsoft Authenticator mobile application to receive a notification and authenticate. C. Receive a call on a phone. D. Enter a Windows 10 PIN code when prompted.

D. Enter a Windows 10 PIN code when prompted.

You are the Microsoft 365 administrator for a company. You need to track scheduled maintenance events in Microsoft 365 admin center. Where can you track these events? A. Reports B. Support C. Service Health D. Message Center

D. Message Center

A company uses Microsoft 365. You need to identify new Microsoft 365 features that have released to General Availability in the last month. Which tool should you choose? A. SharePoint Online landing page B. Azure portal C. Security & Compliance Center D. Microsoft 365 Roadmap

D. Microsoft 365 Roadmap

You need to determine the lifecycle of products and features in Microsoft 365.What should you use? A. support.microsoft.com B. Microsoft Lifecycle Services C. docs.microsoft.com D. Microsoft 365 Roadmap

D. Microsoft 365 Roadmap

You need to determine the release date of Microsoft 365 features. What should you use? A. Office Deployment Tool release history B. Microsoft 365 admin center C. Microsoft System Center D. Microsoft 365 Roadmap E. Windows Insider program

D. Microsoft 365 Roadmap

A company has a Microsoft 365 subscription. Employees are permitted to use devices that the company does not own to access company data in the cloud. You need to restrict employees from copying data to personal OneDrive folders. What should you use? A. Information Rights Management B. Microsoft Azure Security Center C. Microsoft Defender for Office 365 D. Microsoft Endpoint Manager

D. Microsoft Endpoint Manager

A company uses Microsoft 365.The company wants to create a workflow that integrates with Microsoft Teams. What should you use to create the workflow? A. Dynamics 365 Customer Service B. Power BI C. Power Automate D. SharePoint Online E. Dynamics 365 Commerce

D. SharePoint Online

You are a Microsoft 365 administrator for a company. Microsoft plans to release a new feature for Microsoft Excel. You need to ensure that the feature becomes available for employees to install as soon as possible. To which release channel should you subscribe? A. Microsoft release B. Standard release C. Office 365 team release D. Targeted release

D. Targeted release

You are the Microsoft 365 administrator for a company. You install Microsoft Office 365 ProPlus on five devices. You deactivate the Microsoft Office 365 ProPlus license on one device. Which task can you perform on the deactivated device? A. Edit a column B. Create a document C. Co-author a document D. View a document

D. View a document There are several versions of this question in the exam. The question has two possible correct answers:1. View a document2. Print a document

A retail company is planning to upgrade their Windows 7 point-of-sale terminals to Windows 10.You have been informed that the terminals should only be upgraded again after a minimum of five years. Your solution has to allow for the scheduling of upgrades and updates to be executed consistently for al devices, while also keeping costs to a minimum. Which of the following is the version of windows you should upgrade to? A. Windows 10 Home B. Windows 10 Pro C. Windows 10 Enterprise D. Windows 10 Enterprise LTSC

D. Windows 10 Enterprise LTSC

A company uses Microsoft 365.Employees frequently work from home. They must be able to access custom applications that are not installed on their personal laptops. You need to identify a solution that meets the requirement. Which solution should you choose? A. Microsoft Access B. Power Virtual Agent C. Microsoft Remote Assist D. Windows Virtual Desktop E. Microsoft Teams

D. Windows Virtual Desktop

A company is evaluating virtualization services. You need to determine the difference between Microsoft 365 and Azure Virtual Desktop. Which feature is unique to Microsoft 365? A. Users can sign into a dedicated virtual machine. B. Users can rename their assigned virtual machine. C. Administrators can assign users to the local administrators group on the virtual machine. D. Administrators can connect the virtual machine to an on-premises network. E. Administrators can manage the virtual machines by using Microsoft Endpoint Manager.

E. Administrators can manage the virtual machines by using Microsoft Endpoint Manager.

A company deploys Microsoft 365.You notice improvements that can be made to some Microsoft 365 services. You need to submit a formal feature request to Microsoft with your suggestions for improvements. Which tool should you use? A. Microsoft Office Support site B. Security & Compliance Center C. Microsoft 365 Roadmap site D. Feedback Hub app E. UserVoice site

E. UserVoice site https://regarding365.com/microsoft-uservoice-sites-b4793aa6d496

Y or N Infrastructure as a service provides servers, virtual machines, storage, networks, and operating systems to customers. Platform as a service (Paas) provides an environment for building, testing, and deploying software applications Software as a service provides an environment that is centrally hosted and managed for customers.

Infrastructure as a service provides servers, virtual machines, storage, networks, and operating systems to customers. N- IaaS does not include operating systems Platform as a service (Paas) provides an environment for building, testing, and deploying software applications Y Software as a service provides an environment that is centrally hosted and managed for customers. Y

Y Or N It is possible to connect Cloud services to on-premises server resources Scaling cloud- hosted infrastructure components includes expanding Azure server resources and networking components.

It is possible to connect Cloud services to on-premises server resources Yes Scaling cloud- hosted infrastructure components includes expanding Azure server resources and networking components. Yes

Refer to Graph You are the Microsoft 365 administrator for a company. Which option should you select on the Microsoft 365 Roadmap page to display all general availability features for SharePoint Online? In development Rolling Out Launched

Launched

A company uses Microsoft 365 services that include Microsoft eDiscovery. Microsoft E discovery can be used to identify email content needed as evidence in legal case Microsoft eDiscovery can be used to search for specific documents that are stored in Sharepoint online Microsoft eDiscovery can be used to ensure that documents in Sharepoint sites are retained for seven years and then deleted.

Microsoft E discovery can be used to identify email content needed as evidence in legal case -Y Microsoft eDiscovery can be used to search for specific documents that are stored in Sharepoint online -N Microsoft eDiscovery can be used to ensure that documents in Sharepoint sites are retained for seven years and then deleted. -N

Y or N Microsoft Endpoint manager helps manage and monitor Android OS- based mobile devices Microsoft endpoint manager helps manage and monitor windows 10 personal desktop computers Microsoft endpoint manager is used to manage company- owned devices only

Microsoft Endpoint manager helps manage and monitor Android OS- based mobile devices Y Microsoft endpoint manager helps manage and monitor windows 10 personal desktop computers Y Microsoft endpoint manager is used to manage company- owned devices only N Box 1: You can manage Android devices in Microsoft Intune.Use the Microsoft Endpoint Manager admin center Dashboard to display overall details about the devices and client apps in your Intune tenant. Dashboards provide a way for you to create a focused and organized view in the Microsoft Endpoint Manager admin center. Use dashboards as a workspace where you can quickly launch tasks for day-to-day operations and monitor resources.Note: Microsoft Intune, which is a part of Microsoft Endpoint Manager, provides the cloud infrastructure, the cloud-based mobile device management (MDM), cloud-based mobile application management (MAM), and cloud-based PC management for your organization. Box 2: Yes -Microsoft intune is not just for mobile devices, it can be used for laptop and desktop management as well. Box 3: No -Microsoft Intune enables mobile device management for:Personal devices, including personally owned phones, tablets, and PCs.Corporate-owned devices, including phones, tablets, and PCs owned by your organization and distributed to employees and students for use at work or school.

Y or N Microsoft MyAnylytics supports Microsoft PowerBI templates Microsoft MyAnylytics supports Microsoft outlook add-ins Microsoft Workplace Analytics supports weekly email digests

Microsoft MyAnylytics supports Microsoft PowerBI templates N Microsoft MyAnylytics supports Microsoft outlook add-ins Y Microsoft Workplace Analytics supports weekly email digests N https://docs.microsoft.com/en-us/workplace-analytics/myanalytics/use/add-in https://docs.microsoft.com/en-us/workplace-analytics/myanalytics/mya-landing-page https://docs.microsoft.com/en-us/workplace-analytics/index-orig

A company needs to optimize the search functionality of important information from meetings. You need to recommend a solution for the company. A user that needs to automatically create a transcript of a recorded meeting should use: Microsoft Sharepoint Microsoft Viva Microsoft Stream Microsoft Publisher Microsoft Word

Microsoft Stream You can generate automatic captions and a transcript for your Microsoft Stream (Classic) videos.

Y or N Platform as a service services include O365, Microsoft Intune, and Dynamics 365 Infrastructure as a service enables users to build server-based workloads in the cloud Software as a service consists of IT workloads that run on customer virtual machines

Platform as a service services include O365, Microsoft Intune, and Dynamics 365 No Infrastructure as a service enables users to build server-based workloads in the cloud Yes Software as a service consists of IT workloads that run on customer virtual machines No

Match: Cloud Service Modules - Saas - Paas - Iaas Cloud Service: Power Apps Microsoft 365 apps Azure virtual machines

Power Apps - Paas Microsoft 365 apps - Saas Azure virtual machines - Iaas

A company deploys Microsoft Intune. An employee loses a Windows 10 device that contains corporate data. You need to ensure that the corporate data on the device is secured as quickly as possible. Which four options can you use? To answer, select the appropriate actions in the answer area. NOTE: Each correct selection is worth one point. Graph Needed:

Retire Wipe Delete Fresh

A company is investigating Microsoft cloud services. Y or N Servers in public cloud are owned and operated by the hosting company Storage in a public cloud is owned and operated by the hosting company Microsoft Azure is an example of Public Cloud

Servers in public cloud are owned and operated by the hosting company Y Storage in a public cloud is owned and operated by the hosting company Y Microsoft Azure is an example of Public Cloud Y

Y or N The M365 user portal allows users to install desktop apps, use web apps, and share files in OneDrive. The M265 Admin center allows administrators to manage applications and services available to users.

The M365 user portal allows users to install desktop apps, use web apps, and share files in OneDrive. Y The M265 Admin center allows administrators to manage applications and services available to users. Y

An organization migrates to Microsoft 365. The company has an on-premises infrastructure that includes Exchange Server and Active Directory Domain Services. Client devices run Windows 7. You need to determine which products require the purchase of Microsoft 365 licenses for new employees. Which product licenses should the company purchase? Windows 10 pro upgrade - Required - Not required MS Office Professional - Required - Not required Windows Server - required - not required MS exchange client access - required -not required

Windows 10 pro upgrade - Not required MS Office Professional - Required Windows Server - required MS exchange client access - required https://docs.microsoft.com/en-us/microsoft-365/enterprise/migration-microsoft-365-enterprise-workload#result

Y or N You can assign apps to devices that are not enrolled with Microsoft Intune You can assign wrapped apps, or apps that incorporate the intune SDK, only if the device is enrolled with Intune You can install available apps from the web- based company portal app regardless of whether the device if enrolled with Intune.

You can assign apps to devices that are not enrolled with Microsoft Intune N You can assign wrapped apps, or apps that incorporate the Intune SDK, only if the device is enrolled with Intune N You can install available apps from the web- based company portal app regardless of whether the device if enrolled with Intune. Y Box 1: No -You can only assign apps to devices that are enrolled with Intune. You cannot assign apps to devices that are not enrolled with Intune. Box 2: No -You can assign wrapped apps or apps that incorporate the Intune SDK to devices that are not enrolled with Intune. Box 3: Yes -You can install available apps from the web-based Company Portal to devices that are enrolled with Intune and devices that are not enrolled with Intune.Reference:https://docs.microsoft.com/en-us/mem/intune/apps/apps-deploy

A company plans to implement Microsoft Defender for Office 365. Y or N You can configure MS defender for O365 policies to set the appropriate level of protection for your organization You can use automated investigation and response (AIR) capabilities to start a security playbook for an automated investigation You can configure the MS defender for O365 attack simulator to identify vulnerable users to help prevent a real attack

You can configure MS defender for O365 policies to set the appropriate level of protection for your organization Y You can use automated investigation and response (AIR) capabilities to start a security playbook for an automated investigation Y You can configure the MS defender for O365 attack simulator to identify vulnerable users to help prevent a real attack Y

A company has a Microsoft 365 E5 subscription. The company plans to use eDiscovery to meet legal discovery requirements. Y or N You can create eDiscovery cases to preserve data in exchange online mailboxes members of the discovery management role group have permissions to export messages you can create one eDiscovery case to preserve data in an exchange server mailbox and a OneDrive for Business Site

You can create eDiscovery cases to preserve data in exchange online mailboxes -Y members of the discovery management role group have permissions to export messages -Y you can create one eDiscovery case to preserve data in an exchange server mailbox and a OneDrive for Business Site -N https://docs.microsoft.com/en-us/office365/securitycompliance/ediscovery#ediscoverycases https://docs.microsoft.com/en-us/office365/securitycompliance/manage-ediscovery-cases https://docs.microsoft.com/en-us/office365/securitycompliance/assign-ediscovery-permissions

Y or N You can manage Azure AD-joined machines by using group policy Azure AD requires integration with Active Directory Domain Services by using Secure lightweight Directory Access Azure AD supports Azure AD authentication Library authentication

You can manage Azure AD-joined machines by using group policy - N Azure AD requires integration with Active Directory Domain Services by using Secure lightweight Directory Access -Y Azure AD supports Azure AD authentication Library authentication -N

Y or N You can purchase additional storage capacity on demand Cloud services are guaranteed to be available 100 percent of the time Cloud services use less energy than an enterprise on premises datacenter

You can purchase additional storage capacity on demand y Cloud services are guaranteed to be available 100 percent of the time N Cloud services use less energy than an enterprise on premises datacenter Y

Your company uses Microsoft 365 services Y or N You can read, like, and reply to Microsoft Yammer conversations from Microsoft outlook inbox you can add a MS stream tab to a MS teams channel You can book meetings and reject conflicting meetings by using a MS Sharepoint site colander.

You can read, like, and reply to Microsoft Yammer conversations from Microsoft outlook inbox -Y you can add a MS stream tab to a MS teams channel -Y You can book meetings and reject conflicting meetings by using a MS Sharepoint site colander. -Y

Y or N You can secure Web apps that are published through Azure AD applications proxy by using Multi factor authentication (MFA) in the cloud You can secure web apps that are published through Azure AD application proxy by using MFA server on Premises

You can secure Web apps that are published through Azure AD applications proxy by using Multi factor authentication (MFA) in the cloud Y You can secure web apps that are published through Azure AD application proxy by using MFA server on Premises N

Y or N You can track the activity of files that are accessed in a Sharepoint team site A Sharepoint team site is created when you create a M365 group A M365 group is created when you create a new Sharepoint team site

You can track the activity of files that are accessed in a Sharepoint team site y A Sharepoint team site is created when you create a M365 group y A M365 group is created when you create a new Sharepoint team site y

A company is evaluating Microsoft 365.You need to describe Microsoft 365 security principles. Select the answer that correctly completes the sentence. The model that assumes a security breach from an uncontrolled network is______________: Zero trust Secure by default Zero Day Secure score

Zero trust

A company plans to use Microsoft 365. The company needs to determine licensing costs. Y or N - A MS cloud solution provider can be used to get MS 365 plan licensing costs The MS Azure pricing calculator can be used to get MS 365 plan licensing costs

- A MS cloud solution provider can be used to get MS 365 plan licensing costs -Y The MS Azure pricing calculator can be used to get MS 365 plan licensing costs -N

Your organization is considering subscribing to Microsoft 365.You need to educate stakeholders about how Microsoft 365 components enable effective collaboration. Match each Microsoft 365 service to the best service description. To answer, drag the appropriate services to the correct descriptions. Each service may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. Services: - Microsoft Teams - OneDrive for Business - Sharepoint Online - Microsoft Yammer - Office 365 ProPlus Description: - A chat based workspace that facilitates real-time collaboration and enables members of an organization to have conversations and create work plans. - A cloud service that enables you to store and protect files, share files with others, access files from anywhere using an app or web-browser, and restore all files to a previous date and time. - a cloud service that enables you to store, organize , add third party apps, access information from almost any device, allow sharing with external people by default, all by using a web browser. - a private social network that you can use to efficiently resolve support issues and gather feedback on projects and documents

- A chat based workspace that facilitates real-time collaboration and enables members of an organization to have conversations and create work plans. - MS Teams - A cloud service that enables you to store and protect files, share files with others, access files from anywhere using an app or web-browser, and restore all files to a previous date and time. - OneDrive - a cloud service that enables you to store, organize , add third party apps, access information from almost any device, allow sharing with external people by default, all by using a web browser. - Sharepoint Online - a private social network that you can use to efficiently resolve support issues and gather feedback on projects and documents - Microsoft yammer

Your company has a Microsoft Office 365 ProPlus subscription. You are required to make use of Microsoft Azure Information Protection for document classification and protection. Which of the following options should you use to achieve your goal? Answer by dragging the correct options from the list to the answer area. Select and Place: - Add an Azure subscription to MS 365 tenant - Enable the default Microsoft Azure AD privilege identity protection policy - Install the Azure information protection client - Create a custom Azure information protection policy with the confidential label - Enable the default azure information protection policy

- Add an Azure subscription to MS 365 tenant - - Enable the default azure information protection policy

You are a member of a Microsoft Office 365 group named Sales. You create a proposal for a customer by using Word Online. All team members must be able to review and make changes to the proposal at the same time. After the proposal is completed, you must share the final document with the customer in read-only format. You need to ensure that the customer sees the most recent versions of the document. Which three actions should you perform in sequence? - Add the proposal to the sales team site in Sharepoint Online - Create a sharing Link to the proposal with read-only access - Add proposal to OnDrive for Business - Email the customer and include the proposal as an attachment - Email the custoemr and include the link to the document

- Add the proposal to the sales team site in Sharepoint Online - Create a sharing Link to the proposal with read-only access - Email the customer and include the link to the document

A company uses Microsoft 365.A manager wants to increase the efficiency of team members. You need to identify the tools that can help improve team effectiveness. Tools: - MyAnalytics - Workplace Analytics - Microsoft Teams - Power Platform Requirement: - Analyze collective insight into the effectiveness of meetings that team members attend - Automatically recommend actions to individuals within Microsoft Outlook that can potentially increase productivity.

- Analyze collective insight into the effectiveness of meetings that team members attend Workplace Analytics - Automatically recommend actions to individuals within Microsoft Outlook that can potentially increase productivity. MyAnalytics

Q 196- Graph needed A company uses Microsoft 365 Business to address its compliance needs. A customer requests a complete disclosure of all personal data that relates to them.You need to create a new data subject request (DSR) case and ensure that compliance managers can view all DSR case findings.In which two areas must you perform actions? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

- Apps Discovery Reports - Manage E discovery access

A company needs to protect documents and emails by automatically applying classifications and labels. You must minimize costs. What should the company implement? To answer, select the appropriate option in the answer area. The company should implement: - Azure information protection P1 - Azure information protection P2 - Microsoft 365 E3

- Azure information protection P2

Your company has a Microsoft Office 365 subscription. As an administrator for this subscription, you have been tasked with acquiring added licenses. You do, however, need to be assigned the necessary admin role .Which of the following are admin roles that could achieve your goal? Answer by dragging the correct options from the list to the answer area. Select and Place: - Billing Admin Role - User Admin Role - Global Admin Role - Helpdesk Admin Role

- Billing Admin Role - Global Admin Role

Match each Microsoft 365 feature to its availability. Features Private View Public View General Availability Availability: - Can be turned on for evaluation - Available to Specific customers - compliance testing completed - Available for Purchases

- Can be turned on for evaluation Public - Available to Specific customers Private - compliance testing completed Private - Available for Purchases General

A company plans to deploy collaboration tools for employees. The company does not plan to deploy a hybrid environment. You need to identify the features that are available in Teams and Skype for Business Server. Match each environment to its feature. Environments: Teams Only Skype for business server only Teams and Skype for Business Server Environment - Centralizing Archiving - Broadcast Meetings - Federated meetings

- Centralizing Archiving Teams Only - Broadcast Meetings Teams and Skype for Business Server - Federated meetings Teams and Skype for Business Server

You are the Microsoft 365 administrator for a company. The company supports an aggressive rollout of features. You need to release features as soon as they are released. Which feature phase should you use for each development step? Feature Phase - Private - Public - General Availability Development Step: - Complete Compliance testing - Complete Q and A testing for recently released features - Prepare QA results and End-user documentation

- Complete Compliance testing - Private - Complete Q and A testing for recently released features - Public - Prepare QA results and End-user documentation - General Availability

A company plans to migrate to a hybrid cloud infrastructure. You need to determine where to manage the environment after the migration is complete. Match each item to the location where it will be managed. Configuration Locations M365 only On premises only Both M365 and on premises Option - Configure Multi-factor authentication for cloud services -configure email disclaimers -configure compliance -Set frequency of Microsoft office 365 updates

- Configure Multi-factor authentication for cloud services Both M365 and on premises -configure email disclaimers Both M365 and on premises -configure compliance M365 only -Set frequency of Microsoft office 365 updates On premises only

Your company uses Microsoft 365 with a business support plan.You need to identify Service Level Agreements (SLAs) from Microsoft for the support plan.What response can you expect for each event type? To answer, drag the appropriate responses to the correct event types. Each response may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. NOTE: Each correct selection is worth one point Response: -Continuously with a one-hour response time -During Business hours with no commitment for response time -Continuously with no commitment for response time -continuously with a next-day response time Event type: - Critical -High -Noncritical

- Critical: -Continuously with a one-hour response time -High-During Business hours with no commitment for response time -Noncritical -During Business hours with no commitment for response time

A company deploys Microsoft 365.You need to identify the appropriate cloud service for each requirement. Cloud Services: Microsft Intune Windows information protection Azure information protection scanner Requirement: - Detect sensitive content when files are uploaded to cloud storage devices - Detect sensitive data across third party software as a Service Saas apps.

- Detect sensitive content when files are uploaded to cloud storage devices Azure information protection scanner - Detect sensitive data across third party software as a Service Saas apps. - Windows information protection

A furniture distribution company uses Microsoft 365.The company would like to optimize employee interaction in Microsoft Teams company wide. You need to determine a solution. Solutions: Customer Insights Viva Insights Engaged Insights Supply chain insights Requirement: - Determine the number of meetings in which an individual joined on time and refrained from Multitasking during the meeting - Empower business leaders to address critical questions about the supply chain operations and boost employee engagement through the outcomes page in MS teams

- Determine the number of meetings in which an individual joined on time and refrained from Multitasking during the meeting Engaged Insights - Empower business leaders to address critical questions about the supply chain operations and boost employee engagement through the outcomes page in MS teams Supply chain insights

A company has Microsoft Surface devices that run Windows 10. The company plans to deploy devices by using Windows AutoPilot. You need to import a CSV file to ensure that the devices are ready for deployment. In the Microsoft 365 Device Management portal, which two blades should you use? - Dashboard - Device Enrollment - Device compliance - Device configuration - Devices - Software updates - client apps - conditional access - users - groups - roles

- Device Enrollment - Devices

You are the Microsoft 365 administrator for a company. The company plans to upgrade client operating systems to Windows 10.You need to explain the concepts of Windows as a Service (WaaS) to the management team. Match each term to its definition. Terms: Windows Insider Previews: Servicing Channels: Deployment rings Definition: - Early builds that are released to the public during the feature-development phase - A method for controlling the frequency at which organizations deploy windows 10 features - A method of gradually deploying windows 10 features by using multiple sets of targeted services

- Early builds that are released to the public during the feature-development phase Windows Insider Previews: - A method for controlling the frequency at which organizations deploy windows 10 features Servicing Channels: - A method of gradually deploying windows 10 features by using multiple sets of targeted services Deployment rings

An organization plans to deploy Microsoft 365 in a hybrid scenario. You need to provide a recommendation based on some common identity and access management scenarios. The solution must minimize costs. Match each solution to its appropriate scenario. Solutions AD Federation Services (AD FS) PingFedertae and federation integration Password hash Synchronization with single sign on Pass through authentication and single sign on Scenario - Enable a federation option for authentication in a hybrid environment -Allow administrators to reset user passwords in MS AZURE AD -Support non federated users who authenticate with on-premises AD, and support multi factor authentication

- Enable a federation option for authentication in a hybrid environment AD Federation Services (AD FS) -Allow administrators to reset user passwords in MS AZURE AD Password hash Synchronization with single sign on -Support non federated users who authenticate with on-premises AD, and support multi factor authentication Pass through authentication and single sign on https://docs.microsoft.com/en-us/azure/security/azure-ad-choose-authn https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-password-hash-synchronization https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-pta

A company plans to deploy Microsoft 365.You need to identify differences between the features in Exchange Online and Exchange Server. Match the appropriate features to the corresponding supported environments. Support Environments : - Exchange server only - Exchange server online - Exchange server and Exchange online Feature: - Exchange web services (EWS) access to accounts - Custom EWS throttling settings - Information rights management, archiving, and legal holds

- Exchange web services (EWS) access to accounts Exchange server and Exchange online - Custom EWS throttling settings Exchange server only - Information rights management, archiving, and legal holds Exchange server and Exchange online

You are the Microsoft 365 administrator for a company. You need to identify the different features of MyAnalytics and Workspace Analytics. What are the different features? Applications: MyAnalytics Workspace Analytics Feature: - Included in office 365 E5 licenses - Can be purchased only as an add-on license - Provides employee work and Collaboration metrics - Permits upload of custom organizational data - provides team work and collaboration metrics

- Included in office 365 E5 licenses MyAnalytics - Can be purchased only as an add-on license Workspace Analytics - Provides employee work and Collaboration metrics MyAnalytics - Permits upload of custom organizational data Workspace Analytics - provides team work and collaboration metrics Workspace Analytics

Your company has a Microsoft 365 subscription. You have been tasked making sure that the IT department users can obtain Office 365 preview features prior to it being deployed to the rest of the companyג€™s users. Which of the following are the two actions that would meet your goal? Answer by dragging the correct options from the list to the answer area. Select and Place: - Instruct all users to sign up for office insider - Instruct IT users to sign up for Office Insider - Set the update preference to targeted release for select users in the organizational profile - Set the update preferences to targeted release for everyone in the organizational profile. - Set the update preference to standard in the organizational profile.

- Instruct IT users to sign up for Office Insider - Set the update preference to targeted release for select users in the organizational profile

A company uses Microsoft 365. The company has an application that runs on a device that does not have internet access. The device can only be updated manually every two years. You need to determine how you should update the device .Select the answer that correctly completes the sentence. Deploy and Update Windows as a service (Waas) to this device by using: - General availability Channel - Long term servicing channel - Window's insider program -Microsoft Intune

- Long term servicing channel Long-Term Servicing Channel (LTSC) With the Long-Term Servicing Channel, a new major version of Windows Server is released every 2-3 years. Users are entitled to 5 years of mainstream support and 5 years of extended support. This channel provides systems with a long servicing option and functional stability, and can be installed with Server Core orServer with Desktop Experience installation options. Deployments of the LTSC of Windows Server are not affected by Semi-Annual Channel releases. The Long-Term Servicing Channel will continue to receive security and non-security updates, but it will not receive the new features and functionality. Reference:https://docs.microsoft.com/en-us/windows-server/get-started/servicing-channels-comparison

A company is evaluating threat protection in Microsoft 365. Y or N - MS 365 defender for endpoint can block malware on Windows 10 devices - MS 365 defender for O365 is a solution that can detect malicious emails - MS365 defender for endpoint requires a separate installations for Windows 10 devices

- MS 365 defender for endpoint can block malware on Windows 10 devices -Y - MS 365 defender for O365 is a solution that can detect malicious emails -Y - MS365 defender for endpoint requires a separate installations for Windows 10 devices -Y

Match: You are a Microsoft 365 administrator for a company. A customer submits a data subject request (DSR) to delete customer information in compliance with General Data Protection Regulation (GDPR). You must place legal holds on related data whenever possible. You need to respond to the request by searching for the customerג€™s data in various Microsoft 365 tools. How should you search for the data? Search Methods: Content Search E discovery In the App M365 Application - Microsoft Sharepoint Online - Microsoft Access -Microsoft Outlook - Microsoft Power Apps

- Microsoft Sharepoint Online Content Search E discovery - Microsoft Access In the App -Microsoft Outlook Content Search E discovery - Microsoft Power Apps In the App

For each of the following statements, select Yes if the statement is true. Otherwise, select No. - Microsoft cloud services offer significant energy savings for Microsoft and its customers. - Lower costs, no hardware maintenance, near-unlimited scalability, and high reliability are all advantages of a private cloud. - Microsoft Cloud services offer security options and have the ability to provision resources quickly.

- Microsoft cloud services offer significant energy savings for Microsoft and its customers. -yes - Lower costs, no hardware maintenance, near-unlimited scalability, and high reliability are all advantages of a private cloud. -No - Microsoft Cloud services offer security options and have the ability to provision resources quickly. -Yes

A company plans to adopt Microsoft cloud solutions. You need to identify which platform is appropriate for each solution component. Which platform should you select? Platforms Dynamics 365 Microsoft Azure Solution Component: - Microsoft- developed customer relationship management application - Windows Virtual machine - Microsoft- developed enterprise resource planning application

- Microsoft- developed customer relationship management application Dynamics 365 - Windows Virtual machine Microsoft Azure - Microsoft- developed enterprise resource planning application Dynamics 365 Box 1: Dynamics 365 -Why use Dynamics 365 for CRM?With Dynamics 365, you get a flexible solution thatג€™s customizable to suit your business requirements. Choose a stand-alone application to meet the needs of a specific line of business or use multiple CRM tools that work together as a powerful integrated solution. Box 2: Microsoft Azure - Box 3: Dynamics 365 -Transform your business with Microsoft Dynamics 365ג€"intelligent business solutions that seamlessly integrate ERP capabilities. Based in the cloud, Dynamics365 apps help break down silos across your business by giving your team a unified view of operations.Reference:https://dynamics.microsoft.com/en-us/crm/what-is-crm/https://dynamics.microsoft.com/en-us/erp/enterprise-resource-planning-system/

Your company is changing their existing IT environment to Microsoft 365.Which of the following are benefits of the change? Answer by dragging the correct options from the list to the answer area. Select and Place: - Predictable Microsoft Licensing Costs - Decreased Service Scalability - Increased Service scalability - Decrease on premises infrastructure maintenance

- Predictable Microsoft Licensing Costs - Increased Service scalability - Decrease on premises infrastructure maintenance

Match Scenario to Platform Option: Scenario: - Provide Physical access to the hardware - Do not require patching of Operating Systems - Monitor usage of the file storage Platform: - On-Premises Only - Cloud Only - Both cloud and on premises

- Provide Physical access to the hardware On-Premises Only - Do not require patching of Operating Systems Cloud Only - Monitor usage of the file storage Both cloud and on premises

Match: Cloud Models: Private, Public, Hybrid Requirement: - Provide an on demand sandbox environment - Provide failover capabilities between local resources that you manage and resources in other regions - Deploy virtual machines that use custom peripheral devices.

- Provide an on demand sandbox environment Public - Provide failover capabilities between local resources that you manage and resources in other regions Public - Deploy virtual machines that use custom peripheral devices. Hybrid

Match Requirements to Cloud Model - Provide an on-demand sandbox environment - Provide failover capabilities between resources that you manage and resources in other regions. - Deploy Virtual machines that support USB devices ----------------- Private Hybrid Public

- Provide an on-demand sandbox environment Public - Provide failover capabilities between resources that you manage and resources in other regions. Public - Deploy Virtual machines that support USB devices Private

A company is evaluating Microsoft Viva.You need to recommend the appropriate Microsoft Viva modules.Which module should you use? Modules: - Insights - Topics - Connections - Learning Feature - Provides a Unified app in MS teams that includes Workplace Analytics, MyAnalytics and Glint - Uses Artificial intelligence to identify knowledge and experts in a company and displays then in MS teams - Provides centralized collaboration for users by using a company-branded app in MS teams

- Provides a Unified app in MS teams that includes Workplace Analytics, MyAnalytics and Glint - Insights - Uses Artificial intelligence to identify knowledge and experts in a company and displays then in MS teams - Topics - Provides centralized collaboration for users by using a company-branded app in MS teams - Connections

A company is migrating to Microsoft 365.You need to recommend solutions for the company. Which Microsoft 365 Apps apps should you use? Apps: - Microsoft Excel - Microsoft OneNote - Microsoft Power point - Microsoft Word Feature: - Provides a service to help you find and incorporate reliable sources and connect with automatic bibliography updates - Provides a service that uses machine learning and natural language processing for advanced proofing and editing - Provides a service that matches content in a slide to professionally designed layout recommendations

- Provides a service to help you find and incorporate reliable sources and connect with automatic bibliography updates - Microsoft OneNote - Provides a service that uses machine learning and natural language processing for advanced proofing and editing - Microsoft Word - Provides a service that matches content in a slide to professionally designed layout recommendations - Microsoft Power point Box 1: Microsoft OneNote -What does Microsoft OneNote do?OneNote is a digital notebook that automatically saves and syncs your notes as you work. Type information in your notebook or insert it from other apps and web pages. Take handwritten notes or draw your ideas. Use highlighting and tags for easy follow-up. Box 2: Microsoft Word -A new feature now being rolled out in Editor in Word can use more sophisticated AI to offer suggestions for rewriting full sentences rather than offering spelling or grammar fixes one at a time. In internal evaluations, it was nearly 15 percent more effective than previous approaches in catching mistakes commonly made by people who have dyslexia, Microsoft says.Thatג€™s largely because the deep learning algorithms that can offer those rewrites were trained on large and diverse datasets, including documents written in the real world by people with dyslexia, rather than a narrow and finite set of linguistic rules. Box 3: Microsoft PowerPoint -

A company plans to deploy a compliance solution in Microsoft 365.Match each compliance solution to its description. Compliance Solutions - Records Management - Insider Risk management - Advanced E discovery Compliance description: - Provides policies to automatically apply retention labels to documents in an organization - Provides policies to discover and act on malicious and inadvertent risk activities in an organization - Provides a workflow to preserve, collect, and manage content for an organizations internal and external investigations

- Provides policies to automatically apply retention labels to documents in an organization Records Management - Provides policies to discover and act on malicious and inadvertent risk activities in an organization Insider Risk management - Provides a workflow to preserve, collect, and manage content for an organizations internal and external investigations Advanced E discovery

Drag and Drop : An automobile repair company uses Microsoft Bookings. Customers can schedule appointments for automobile services with technicians. Match each component to its description. Components: -Booking Calendar - Booking Page - Staff Page - Services Page Description: - Schedule vacation time for technicians and business closures for the company - Schedule Customers appointments - View a technicians working hours

- Schedule vacation time for technicians and business closures for the company Booking Calendar - Schedule Customers appointments Booking Page - View a technicians working hours Staff Page

Users report that they are unable to access specific SharePoint sites. You need to view the current health of Microsoft 365. What should you do? To answer, select the appropriate option in the answer area. Navigate to the___________________ -Service request history page - Service health page - Sharepoint product page - Threat management dashboard

- Service health page

Match: Scenarios: - Exchange Online Integrated with on Premises Skype for Business Server - Customer Web and Mobile Application Securely connected to an on-premises Data Store - Server- Based workloads on a virtual machine connected to an on -premises network Service: - Software as a Service - Platform as a service - Infrastructure as a service

- Software as a Service: Exchange Online Integrated with on Premises Skype for Business Server - Platform as a service: Customer Web and Mobile Application Securely connected to an on-premises Data Store - Infrastructure as a service: Server- Based workloads on a virtual machine connected to an on -premises network

A company is migrating to Microsoft 365.The company is evaluating collaboration integrations in Microsoft Teams. Integrations: - Power Virtual agents - Power Apps - Power Automate - Power BI Feature: - Users can create chatbots without writing any code and publish the bots in MS teams - Users can create and reference apps by using tabs in MS teams - Users can create flows to automate tasks that can be triggered from MS teams

- Users can create chatbots without writing any code and publish the bots in MS teams - Power Virtual agents - Users can create and reference apps by using tabs in MS teams - Power Apps - Users can create flows to automate tasks that can be triggered from MS teams - Power Automate

What happens when you enable external access by using the Microsoft 365 admin portal? To answer, select the appropriate options in the answer area. When you enable external Access, _________________________________________ - Users can send sharing invitations for specific content - data becomes available to anonymous users - you must configure active directory federation services (AD FS) - the everyone group is applied to all shares and granted full control

- Users can send sharing invitations for specific content

You are investigating Microsoft 365 services and capabilities. Match each scenario to its Microsoft 365 service. M365 Services: Exchange Online Microsoft Teams Microsoft Stream Scenario: - Users need to communicate in email, use a calendar, and store contacts - Users need a central hub for meetings, chat, contact, and calling

- Users need to communicate in email, use a calendar, and store contacts Exchange Online - Users need a central hub for meetings, chat, contact, and calling Microsoft Teams

A company is evaluating the licenses that are available in Microsoft 365.The company needs to minimize licensing costs. Match each license to its requirement. Licenses: Microsoft 365 Business premium MS 365 E3 MS 365 E5 MS 365 F3 Requirement: - Users require mailbox and will use office web and mobile apps to access the mailbox - Users require a mailbox and will use outlook and mobile apps to access the mailbox - Users require a windows 10 enterprise license and a mailbox. They will use outlook to access the mailbox. - Users require a windows 10 enterprise license, a phone system license, and a mailbox. They will use Outlook to access the mailbox

- Users require mailbox and will use office web and mobile apps to access the mailbox - MS 365 F3 - Users require a mailbox and will use outlook and mobile apps to access the mailbox -Microsoft 365 Business premium - Users require a windows 10 enterprise license and a mailbox. They will use outlook to access the mailbox. -MS 365 E3 - Users require a windows 10 enterprise license, a phone system license, and a mailbox. They will use Outlook to access the mailbox -MS 365 E5

A company is evaluating Microsoft 365.You need to determine the Microsoft Viva analytics capabilities. Briefing emails in MS outlook and the MyAnalytics dashboard are all features of Microsoft: - Viva connections - Viva insights - Viva learning - Viva Topics

- Viva insights

Match Platform as a service Software as a service Infrastructure as a service - Website hosting - A virtual machine that runs Linux - Document storage that uses OneDrive for Business

- Website hosting , Paas - A virtual machine that runs Linux, Iaas - Document storage that uses OneDrive for Business, Saas

You are the Microsoft 365 administrator for a company. Which release types are used for each deployment scenario? Deployment Scenarios : - Widespread deployment - Limited deployment for short duration -Limited deployment to a small number of organizations for a short duration Release Type - Private release - Public release - General availability

- Widespread deployment General availability - Limited deployment for short duration Public release -Limited deployment to a small number of organizations for a short duration Private release

An organization is considering migrating resources to the cloud. The company does not plan to deploy Microsoft Azure ExpressRoute or site-to-site VPNs. You need to identify which workloads you can migrate to the cloud. Which workloads you can migrate to the cloud? Actions: Migrate to the cloud Remain on premises Workload: - you have a legacy application that requires connectivity with an on premises data store - You need to deploy an external facing website - You need to deploy a Microsoft Sharepoint collaboration site for partners

- you have a legacy application that requires connectivity with an on premises data store Remain on premises - You need to deploy an external facing website Migrate to the cloud - You need to deploy a Microsoft Sharepoint collaboration site for partners Migrate to the cloud

You are the Microsoft 365 administrator for a company. You need to identify available cloud security features. Features: Cloud discovery dashboard Microsoft Azure AD conditional access Microsoft Azure security Center Microsoft Azure information protection Description -Classify and label emails and documents in the organization - Block user from accessing cloud apps from certain devices

-Classify and label emails and documents in the organization Microsoft Azure information protection - Block user from accessing cloud apps from certain devices Microsoft Azure AD conditional access

A company is investigating cloud solution provider (CSP) pricing models for Microsoft cloud services.Match each CSP pricing model to its definition. CSP Pricing models: -Direct Bill -Indirect reseller -Enterprise agreement - Microsoft open Definition: -Partners purchase MS products and subscriptions from MS and Sell them through their in-house sales staff - Providers purchase MS products and subscriptions from MS and sell them to customers through other third parties

-Partners purchase MS products and subscriptions from MS and Sell them through their in-house sales staff -Direct Bill - Providers purchase MS products and subscriptions from MS and sell them to customers through other third parties -Indirect reseller

Y or N A cloud provider can provide maintenance and security protection for server hardware a cloud storage provider can include built in redundancy and automatic logging A cloud provider can manage on premises resources hardware

A cloud provider can provide maintenance and security protection for server hardware Y a cloud storage provider can include built in redundancy and automatic logging Y A cloud provider can manage on premises resources hardware N

Y or N A company must have high reliable internet in order to adopt MS365 A company that wants to use a high Single license for users with desktop computers and mobile devices should use Microsoft 365 licensing

A company must have high reliable internet in order to adopt MS365 -Y A company that wants to use a high Sigle license for users with desktop computers and mobile devices should use Microsoft 365 licensing -Y

Y or N A sensitivity label can be used to prevent data loss from windows devices by turning on the endpoint protection in Microsoft Intune You can use a sensitivity label to mark the content of documents by adding a custom watermark After a sensitivity level is applied, the content of the document is encrypted, but the content of email is not encrypted

A sensitivity label can be used to prevent data loss from windows devices by turning on the endpoint protection in Microsoft Intune Y You can use a sensitivity label to mark the content of documents by adding a custom watermark Y After a sensitivity level is applied, the content of the document is encrypted, but the content of email is not encrypted N

You are a Microsoft 365 administrator for a company. Employees use Microsoft Office 365 ProPlus to create documents. You need to implement document classification and protection by using Microsoft Azure Information Protection. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point . A. Add an Azure subscription to your Microsoft 365 tenant B. Install the Azure Information Protection client C. Create a custom Azure Information Protection policy with the Confidential label D. Enable the default Azure Information Protection policy E. Install the Rights Management Service client

A. Add an Azure subscription to your Microsoft 365 tenant D. Enable the default Azure Information Protection policy

Your company has a Microsoft Office 365 subscription. As an administrator for this subscription, you have been tasked with recommending a solution that forces cloud-based applications to use the same credentials as on-premises applications. Which of the following should you recommend? A. Azure AD Connect. B. Configuration Manager. C. Windows AutoPilot. D. Azure AD Application Proxy.

A. Azure AD Connect.

Your company purchases Microsoft 365 E3 and Azure AD P2 licenses. You need to provide identity protection against login attempts by unauthorized users. What should you implement? A. Azure AD Identity Protection B. Azure AD Privileged Identity Management C. Azure Information Protection D. Azure Identity and Access Management

A. Azure AD Identity Protection

A company uses Microsoft 365.Users who are based on-premises must be able to reset their own passwords. The company plans to purchase Azure Active Directory (AD) licenses. You need to identify the Azure AD licenses that meet this requirement. Which two Azure AD licenses should you choose? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Azure AD Premium P2 B. Azure AD Free C. Office 365 apps D. Azure AD Premium P1

A. Azure AD Premium P2 D. Azure AD Premium P1 https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-sspr-licensing

A company deploys Microsoft 365.You must implement conditional access to restrict access to administrative accounts when users authenticate from specific locations. You need to select the lowest cost license that meets the requirement. Which license should you choose? A. Azure Active Directory Premium P1 B. Azure Active Directory Premium P2 C. Azure Active Directory Free D. Azure Active Directory B2B

A. Azure Active Directory Premium P1 Explanation: Conditional access policies require an Azure AD Premium P1 license.

A company uses Microsoft 365.You need to assign licenses to users. Which two portals can you use? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Azure Active Directory admin center B. Microsoft Compliance Manager C. Microsoft 365 admin center D. Security & Compliance Center

A. Azure Active Directory admin center C. Microsoft 365 admin center

A company plans to implement an insider risk solution in Microsoft 365. The company needs to implement a solution that meets the following requirements:✑ Uses machine learning to identify email risks.✑ Provides workflows to remediate email risks.✑ Provides a dashboard to display email risks, actions, and trends. You need to identify a solution that meets the requirements. Which solution should you select? A. Communication compliance policies B. Core eDiscovery cases C. Advanced eDiscovery cases D. Sensitivity labels

A. Communication compliance policies

A company uses Microsoft 365.The company wants users to be prompted for additional verification when they access a federated third-party application. However, users must not be prompted for additional verification when they access Microsoft Outlook. You need to identify a solution that meets the requirements. Which solution should you choose? A. Conditional Access B. Multi-factor authentication (MFA) C. Active Directory Federation Services (AD FS) D. Self-service password reset (SSPR

A. Conditional Access

A company uses Azure Active Directory. The company requires that authentication requests from client applications that do not support modern authentication are blocked. You need to identify the policy that meets the requirement. Which policy should you select? A. Conditional Access B. Multi-factor authentication registration C. Sign-in risk D. User risk

A. Conditional Access https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview

You are the Microsoft 365 administrator for a company. An employee requests personal data under General Data Protection Regulation (GDPR) guidelines. You need to retrieve data for the employee. What should you do? A. Create a data subject request case. B. Create a retention policy. C. Create a data-loss prevention policy. D. Create a GDPR assessment.

A. Create a data subject request case

After acquiring a Microsoft 365 E5 subscription, you are tasked with applying security features. You are currently configuring a security feature that allows you to control how a Microsoft support engineer accesses information during a help session. Which of the following is the feature you are configuring? A. Customer Lockbox. B. Data Governance. C. Data Loss Prevention. D. Microsoft Office 365 Advanced Threat Protection.

A. Customer Lockbox.

A company plans to migrate to Microsoft 365.You need to advise the company about how Microsoft provides protection in a multitenancy environment. What are three ways that Microsoft provides protection? Each correct answer presents part of the solution. (Choose three.) NOTE: Each correct selection is worth one point. A. Customer content at rest is encrypted on the server by using BitLocker. B. Microsoft Azure AD provides authorization and role-based access control at the tenant layer. C. Customer content at rest is encrypted on the server by using transport-layer security (TLS). D. Microsoft Azure AD provides authorization and role-based access control at the transport layer. E. Mailbox databases in Microsoft Exchange Online contain only mailboxes from a single tenant. F. Mailbox databases in Microsoft Exchange Online contain mailboxes from multiple tenants.

A. Customer content at rest is encrypted on the server by using BitLocker. B. Microsoft Azure AD provides authorization and role-based access control at the tenant layer. F. Mailbox databases in Microsoft Exchange Online contain mailboxes from multiple tenants.

A company deploys Microsoft Azure AD. You run the Identity Secure Score report. The report displays five security items. Which three security items on the report have the most impact on the score? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point . A. Enable policy to block legacy authentication. B. Enable user risk policy. C. Require multi-factor authentication for all users. D. Delete/block accounts not used in last 30 days. E. Do not expire passwords.

A. Enable policy to block legacy authentication. B. Enable user risk policy. C. Require multi-factor authentication for all users.

A company uses Microsoft 365 Analytics. The company wants employees to complete top priority work by:✑ Scheduling up to two hours every day to spend on top priority work.✑ Silencing chats in Microsoft Teams during this time. Which feature should you use? A. Focus plans B. Work patterns C. Digests D. Habit playbooks E. Insights add-ins

A. Focus plans

A company is planning to implement Microsoft 365.The company has not purchased licenses from Microsoft. You need to recommend a licensing solution. Which licensing solution should you recommend? A. Full user subscription licenses B. Step-up user subscription licenses C. Add-on user subscription licenses D. From Software Assurance (SA) user subscription licenses

A. Full user subscription licenses

A company plans to migrate to Microsoft 365. Corporate devices run Windows 7 or Windows 10.You must upgrade all devices to use Office 365 ProPlus and minimize costs. You need to standardize corporate device deployments. Which three actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. Implement Windows AutoPilot B. Deploy policies by using Configuration Manager C. Upgrade all devices to Windows 10 D. Deploy policies by using Microsoft Intune E. Instruct users to download and install a Windows Installer package for Office 365 ProPlus

A. Implement Windows AutoPilot C. Upgrade all devices to Windows 10 D. Deploy policies by using Microsoft Intune

Your company is evaluating the differences between deployments of Office 365 ProPlus and Office 2016.You need to determine the installation features of each deployment.Which installation feature is unique to Office 365 ProPlus? A. Installation can be completed by using Click-to-Run. B. Installation can be completed by using System Center Configuration Manager. C. Installation is available in both 32-bit and 64-bit versions. D. Installation is on the userג€™s local computer.

A. Installation can be completed by using Click-to-Run

You are the Microsoft 365 administrator for a company. Users in the IT department must receive new Office 365 preview features before the features are deployed to other users in the company. You need to ensure only the users in the IT department receive preview features. Which two actions should you perform? Each correct answer represents part of the solution. NOTE: Each correct selection is worth one point. A. Instruct users to navigate to http://insider.office.com and sign up for Office Insider. B. Instruct users to update Office ProPlus. C. In the organizational profile, set the update preference to Targeted release for selected users. D. Instruct users to uninstall Office ProPlus and then reinstall the software. E. In the organizational profile, set the update preference to Standard release.

A. Instruct users to navigate to http://insider.office.com and sign up for Office Insider. C. In the organizational profile, set the update preference to Targeted release for selected users.

You are employed as a Microsoft 365 administrator. Your company plans to make use of MyAnalytics. You need to identify the different features of MyAnalytics and Workspace Analytics. Which of the following are features of MyAnalytics? (Choose all that apply.) A. It can only be acquired as an added reference-on license. B. It provides team work and collaboration metrics. C. It is included in the Office 365 ProPlus license. D. It provides employee work and collaboration metrics

A. It can only be acquired as an added reference-on license.

A company is considering using Microsoft cloud services. You need to determine which mobility features Microsoft Intune supports. Which three features does Microsoft Intune support? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. It provides mobile application management (MAM) capabilities. B. It upgrades operating systems on mobile phone devices. C. It provides mobile device management (MDM) capabilities. D. It deploys operating systems to mobile phone devices. E. It deploys applications to mobile phone devices.

A. It provides mobile application management (MAM) capabilities. C. It provides mobile device management (MDM) capabilities. E. It deploys applications to mobile phone devices.

What are three capabilities of Security and Compliance Center? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Management of e-discovery cases, holds, and exports B. Assessment and auditing of Active Directory event logs C. Prevention of data loss for Exchange Online and SharePoint Online D. Assessment and auditing of on-premises firewall logs E. Threat management by using email filtering and anti-malware software

A. Management of e-discovery cases, holds, and exports C. Prevention of data loss for Exchange Online and SharePoint Online E. Threat management by using email filtering and anti-malware software

A small advertising company has 250 employees. You need to migrate all users to Microsoft 365 and meet the following requirements: ✑ Provide a user-centric licensing solution for all users. ✑ Manage devices from a single location. ✑ Minimize licensing costs. Which licensing model should you use? A. Microsoft 365 Business B. Microsoft 365 Education C. Microsoft 365 Enterprise E3 D. Microsoft 365 Enterprise E5

A. Microsoft 365 Business https://products.office.com/en-za/compare-all-microsoft-office-products?tab=2 https://docs.microsoft.com/en-us/microsoft-365/business/support/microsoft-365-business-faqs

An organization is researching Microsoft 365 licensing. The organization must buy licenses that include Microsoft Intune. You need to determine which licenses meet the requirements. Which three licenses can you choose? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Microsoft 365 Business Premium B. Microsoft 365 Business Basic C. Microsoft 365 Business Standard D. Microsoft 365 F3 E. Microsoft 365 E3

A. Microsoft 365 Business Premium D. Microsoft 365 F3 E. Microsoft 365 E3 Intune license is including under following products: Microsoft 365 E5 - Microsoft 365 E3 - Enterprise Mobility + Security E5 Enterprise Mobility + Security E3 Microsoft 365 Business Premium - Microsoft 365 F1 - Microsoft 365 F3 - Microsoft 365 Government G5 - Microsoft 365 Government G3 - Intune for Education (Microsoft 365 Education A5 / A3) Reference:https://www.manishbangia.com/types-of-intune-licenses/

Your company makes use of Microsoft 365 in their environment. You have been tasked with making sure that admin roles are protected. The feature you use should achieve this by requiring approvals. Which of the following is a feature you should use? A. Mobile application protection policy. B. Microsoft Azure AD Identity Protection. C. Microsoft Azure AD Privilege Identity Protection. D. Microsoft Azure AD Conditional Access.

A. Microsoft Azure AD Identity Protection.

Your company has a Microsoft Office 365 subscription. As an administrator for this subscription, you are required to configure the use of a cloud security feature that allows for emails and documents to be classified and labeled. Which of the following is the feature you should use? A. Microsoft Azure Information Protection. B. Microsoft Azure AD Identity Protection. C. Microsoft Azure AD Privilege Identity Protection. D. Intune App Protection.

A. Microsoft Azure Information Protection.

A company plans to deploy a solution to manage its Windows 10 computers. Some computers are connected to the corporate network and some computers are connected to the internet, The solution must meet the following requirements:✑ Deploy an operating system to the computers.✑ Join the computer to an on-premises Active Directory domain.✑ Install Windows updates to the computers. You need to identify a solution that meets the requirements. Which solution should you choose? A. Microsoft Endpoint Manager B. Microsoft Intune C. Windows Autopilot D. Configuration Manager

A. Microsoft Endpoint Manager Endpoint Manager includes the services and tools you use to manage and monitor mobile devices, desktop computers, virtual machines, embedded devices, and servers. Endpoint Manager combines services, including Microsoft Intune, Configuration Manager, Desktop Analytics, co-management, and Windows Autopilot.

You are the desktop administrator for an organization. You need to ensure that Office 365 ProPlus is installed on all employee computers. Which three tools can you use to deploy Office 365 ProPlus? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Microsoft Intune B. System Center Operations Manager C. Windows Installer (MSI) package D. System Center Configuration Manager E. Office Deployment Tool

A. Microsoft Intune D. System Center Configuration Manager E. Office Deployment Tool Microsoft Intune allows you to to deploy Office 365 ProPlus applications to Windows 10 devices from the cloud. System Center Configuration Manager allows you to deploy Office 365 ProPlus to client computers from a local source, using your Configuration Manager distribution points. The Office Deployment Tool (ODT) allows you to deploy Office 365 ProPlus to client computers from the Office Content Delivery Network (CDN) or from a shared folder on your network.

A company uses Microsoft 365. The company needs to remotely encrypt devices. You need to identify which solution meets the requirement. Which solution should you choose? A. Microsoft Intune B. Retention labels C. Azure Information Protection scanner D. Sensitivity labels

A. Microsoft Intune Use Intune to configure BitLocker Drive Encryption on devices that run Windows 10.

Your company has a Microsoft Office 365 subscription. You need to co-author files with other users. Which tool should you use? A. Microsoft SharePoint Online B. Microsoft Skype for Business Online C. Microsoft Office Delve D. Microsoft Exchange Online

A. Microsoft SharePoint Online

You need to identify which Microsoft platforms provide hybrid capabilities for migrating from an on-premises deployment. Which two platforms provide hybrid capabilities for migration? Each correct answer provides a complete solution. NOTE: Each correct selection is worth one point. A. Microsoft Skype for Business B. Microsoft Yammer C. Microsoft Exchange D. Microsoft Teams

A. Microsoft Skype for Business C. Microsoft Exchange

After experiencing security breaches with on-premises servers, a company is considering migrating to Microsoft 365 for their security solutions. What are three security-related benefits of moving to Microsoft 365? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Microsoft employs a full-time team of penetration testers to identify vulnerabilities. B. Microsoft 365 prevents all attackers from gaining access to company data. C. Microsoft simplifies infrastructure management to help detect and respond to threats. D. Microsoft 365 monitors all customers for threats to prevent attacks. E. Microsoft 365 can troubleshoot security issues by accessing customer data without explicit permission from the customer.

A. Microsoft employs a full-time team of penetration testers to identify vulnerabilities. C. Microsoft simplifies infrastructure management to help detect and respond to threats. D. Microsoft 365 monitors all customers for threats to prevent attacks

You are the Microsoft 365 administrator for a company. The company runs SharePoint Server and Exchange Server in an on-premises datacenter. The site collection for the finance department is currently encrypted using third-party software. You need to move as many services to Microsoft 365 as possible. What should you do? A. Migrate all SharePoint data and Exchange mailboxes to Microsoft 365. B. Leave SharePoint data for finance department users on-premises. Migrate all other SharePoint data and Exchange mailboxes to Microsoft 365. C. Leave mailboxes for finance department users on-premises. Migrate all other SharePoint data and Exchange mailboxes to Microsoft 365. D. Leave SharePoint data and mailboxes for finance department users on-premises. Migrate all other SharePoint data and Exchange mailboxes to Microsoft 365.

A. Migrate all SharePoint data and Exchange mailboxes to Microsoft 365.

You use Microsoft 365 Usage Analytics.You need to know the number of users who are active today and were also active last month.Which adoption metric should you use? A. MoMReturningUsers B. EnabledUsers C. ActiveUsers D. CumulativeActiveUsers

A. MoMReturningUsers

A company is evaluating Microsoft Azure Conditional Access policies. You reed to determine which scenarios Conditional Access policies support. Which three scenarios should you select? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Multi-factor authentication B. Self-service password reset capabilities C. Hybrid Azure Active Directory joined device D. Blocked access to Microsoft 365 services for unverified users E. BitLocker deployment

A. Multi-factor authentication C. Hybrid Azure Active Directory joined device D. Blocked access to Microsoft 365 services for unverified users AC: Common Azure Conditional Access policies decisions* Block access Most restrictive decision - * Grant access Least restrictive decision, can still require one or more of the following options: Require multi-factor authentication Require device to be marked as compliant Require Hybrid Azure AD joined device Require approved client app - Require app protection policy (preview) D: For customers with access to Identity Protection, user risk can be evaluated as part of a Conditional Access policy. User risk represents the probability that a given identity or account is compromised.Reference:

You need to consider the underlined segment to establish whether it is accurate. You are a Microsoft 365 administrator for a company whose employees are allowed to access corporate information located in the cloud via their personal devices. You have been tasked with making sure that employees are prohibited from copying this information to their personal OneDrive folders. You should make use of Intune App Protection. Select ג€No adjustment requiredג€ if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option. A. No adjustment required B. Information Rights Management C. Microsoft Azure AD Privilege Identity Protection D. Microsoft Azure AD Identity Protection

A. No adjustment required

You need to consider the underlined segment to establish whether it is accurate. You have been tasked with acquiring Microsoft 365 Enterprise licenses for your organization. You should contact a Cloud Solution Provider (CSP) or subscribe to a Microsoft Enterprise Agreement (EA).Select ג€No adjustment requiredג€ if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option. Which two options can you use? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. No adjustment required B. contact a Cloud Solution Provider (CSP) or use a company credit card via the Microsoft website C. subscribe to a Microsoft Enterprise Agreement (EA) or visit a Microsoft retail store D. use a company credit card via the Microsoft website or visit a Microsoft retail store subscription from

A. No adjustment required

You need to consider the underlined segment to establish whether it is accurate. Your company has a Microsoft Office 365 subscription. As an administrator for this subscription, you want to check what the repercussions are if the availability terms of the Microsoft Office 365 services are not satisfied. You analyze the Service Level agreement. Select ג€No adjustment requiredג€ if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option. A. No adjustment required. B. analyze the Microsoft Cloud agreement C. access Data Governance D. analyze the Microsoft Enterprise agreement

A. No adjustment required.

You need to consider the underlined segment to establish whether it is accurate. To ensure that when a new Microsoft Word feature is available for worker to install as soon as it becomes available, you should subscribe to the Targeted release channel. Select ג€No adjustment requiredג€ if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option. A. No adjustment required. B. Standard release C. Semi-annual D. Annual

A. No adjustment required.

Your company has a Microsoft Office 365 subscription. As an administrator for this subscription, you have been tasked with assigning Microsoft 365 licenses for a department where users need to collaborate with other users and also check their job schedules on a weekly basis. The department does not, however, require office desktop products to complete tasks.Which of the following is the license that would help you achieve this? A. Office 365 F1 B. Microsoft 365 E1 C. Office 365 E3 D. Office 365 E5

A. Office 365 F1

Your organization plans to deploy a subscription-based licensing model of Microsoft Office to devices. You must use group policy to enforce Office application settings. You need to deploy Office to the enterprise. Which version of Office should you deploy? A. Office 365 ProPlus B. Office Professional Plus 2016 C. Office Online D. Office Home and Business 2016

A. Office 365 ProPlus https://products.office.com/en-za/business/compare-more-office-365-for-business-plans

A company implements Microsoft 365. The company needs to deploy Microsoft 365 Apps for enterprise to their client computers from the cloud. You need to identify the solution that meets the requirement. Which solution should you select? A. Office Deployment Tool B. Windows Update C. Microsoft Remote Connectivity Analyzer D. Microsoft FastTrack

A. Office Deployment Tool

A company uses Microsoft 365. The company wants to provide workflows of business tasks that connect to Microsoft Outlook and Microsoft Teams. You need to choose a solution that meets the requirement. Which solution should you choose? A. Power Automate B. Microsoft Bookings C. Microsoft Planner D. Power BI

A. Power Automate

A company uses Microsoft 365.The company wants to automate an approval process for invoices by using Microsoft Teams. You need to identify the solution to create the workflow. Which three solutions can achieve the goal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Power Automate B. Power Virtual Agents C. Power BI D. Microsoft Forms E. Power Apps

A. Power Automate B. Power Virtual Agents E. Power Apps

A company plans to deploy automated workflows for managers to approve. You need to determine which Microsoft 365 products allow access to personal workflows. Which two products should the managers use? Each correct answer presents a partial solution. NOTE: Each correct selection is worth one point. A. Power Automate B. Microsoft Excel C. Yammer D. Microsoft Teams

A. Power Automate D. Microsoft Teams Explanation:Power Automate is the new name for Microsoft Flow.

A company is purchasing a Microsoft 365 subscription to replace the current on-premises IT infrastructure. You need to identify the impacts of subscribing to Microsoft 365.Which three outcomes can the company expect? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Predictable Microsoft licensing costs B. Increased Exchange Server Client Access License (CAL) costs C. Increased Windows Server Client Access License (CAL) costs D. Increased service scalability E. Decreased on-premises infrastructure maintenance

A. Predictable Microsoft licensing costs D. Increased service scalability E. Decreased on-premises infrastructure maintenance

You are the Microsoft 365 administrator for a company. You install Microsoft Office 365 ProPlus on five devices. You deactivate one device. Which task can you perform on the deactivated device? A. Print a document. B. Leave a comment in a document. C. Start a new document from a template. D. Set properties on a document.

A. Print a document. There are several versions of this question in the exam. The question has two possible correct answers:1. View a document2. Print a document

An organization uses Microsoft 365 Business to secure their data. Many users install the organizationג€™s data on their personal tablets and phones. You need to protect the organizationג€™s data stored on usersג€™ devices. Which three features support device security? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Remotely wiping company data B. Enabling Advanced Threat Protection for users C. Disabling the device remotely D. Automatically deleting files after 90 days of inactivity E. Requiring users to have a PIN on their device

A. Remotely wiping company data D. Automatically deleting files after 90 days of inactivity E. Requiring users to have a PIN on their device You can manage many of the Microsoft 365 Business security features in the admin center, which gives you a simplified way to turn these features on or off. In the admin center, you can do the following: ✑ Set application management settings for Android or iOS devices. These settings include deleting files from an inactive device after a set period, encrypting work files, requiring that users set a PIN, and so on. ✑ Set application protection settings for Windows 10 devices. These settings can be applied to company data on both company-owned, or personally owned devices. ✑ Set device protection settings for Windows 10 devices .You can enable BitLocker encryption to help protect data in case a device is lost or stolen, and enable Windows Exploit Guard to provide advanced protection against ransomware. ✑ Remove company data from devices. You can remotely wipe company data if a device is lost, stolen, or an employee leaves your company.✑ Reset Windows 10 devices to their factory settings. You can reset any Windows 10 devices that have device protection settings applied to them. Reference:https://docs.microsoft.com/en-us/microsoft-365/business/security-features

A company deploys Microsoft 365.The company plans to use sensitivity labels. You need to identify the capabilities of sensitivity labels. What are three capabilities of sensitivity labels? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. Sensitivity labels can be customized. B. Sensitivity labels can ensure that a document is retained indefinitely. C. Sensitivity labels can trigger disposition reviews. D. Sensitivity labels can be used to encrypt documents. E. Sensitivity labels can automatically be applied to documents.

A. Sensitivity labels can be customized. D. Sensitivity labels can be used to encrypt documents. E. Sensitivity labels can automatically be applied to documents.

You are the Microsoft 365 administrator for a company. Your company wants to learn more about what happens if the availability terms of the Microsoft Office 365 services are not met. Where can you find this information? A. Service Level agreement B. Microsoft Services agreement C. Microsoft Cloud agreement D. Microsoft Products and Services agreement E. Microsoft Enterprise agreement

A. Service Level agreement

You are a companyג€™s Microsoft 365 administrator. You need to retrieve the following information:✑ an assessment of your tenantג€™s security status for a given regulation✑ a list of audit and assessment reports on Microsoftג€™s cloud services Which two portals have this information? Each correct answer presents a partial solution. NOTE: Each correct selection is worth one point. A. Service Trust Portal B. Azure portal C. Compliance Center D. SharePoint admin center

A. Service Trust Portal C. Compliance Center https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-with-service-trust-portal?view=o365-worldwide https://docs.microsoft.com/en-us/microsoft-365/compliance/microsoft-365-compliance-center?view=o365-worldwide

Your company makes use of Platform as a Service (PaaS) for their Azure solution. Which of the following options are components that Microsoft are responsible for? (Choose all that apply). A. Storage. B. Databases. C. Applications. D. Operating system.

A. Storage. B. Databases. D. Operating system.

You deploy Enterprise Mobility + Security E5 and assign Microsoft 365 licenses to all employees. Employees must not be able to share documents or forward emails that contain sensitive information outside the company. You need to enforce the file sharing restrictions. What should you do? A. Use Microsoft Azure Information Protection to define a label. Associate the label with an Azure Rights Management template that prevents the sharing of files or emails that are marked with the label. B. Create a Microsoft SharePoint Online content type named Sensitivity. Apply the content type to other content types in Microsoft 365. Create a Microsoft Azure Rights Management template that prevents the sharing of any content where the Sensitivity column value is set to Sensitive. C. Use Microsoft Azure Information Rights Protection to define a label. Associate the label with an Active Directory Rights Management template that prevents the sharing of files or emails that are marked with the label. D. Create a label named Sensitive. Apply a Data Layer Protection policy that notifies users when their document contains personally identifiable information (PII).

A. Use Microsoft Azure Information Protection to define a label. Associate the label with an Azure Rights Management template that prevents the sharing of files or emails that are marked with the label.

A company assigns a Microsoft 365 license to each employee. You need to install Microsoft Office 365 ProPlus on each employee laptop computer. Which three methods can you use? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Use System Center Configuration Manager (SCCM) to deploy Office 365 ProPlus from a local distribution source. B. Use System Center Configuration Manager (SCCM) to deploy Office 365 ProPlus from an Office Windows Installer (MSI) package. C. Download the Office 365 ProPlus Windows Installer (MSI) package. Install Office 365 ProPlus from a local distribution source. D. Use the Office Deployment Tool (ODT) to download installation files to a local distribution source. Install Office 365 ProPlus by using the downloaded files. E. Enable users to download and install Office 365 ProPlus from the Office 365 portal.

A. Use System Center Configuration Manager (SCCM) to deploy Office 365 ProPlus from a local distribution source. D. Use the Office Deployment Tool (ODT) to download installation files to a local distribution source. Install Office 365 ProPlus by using the downloaded files. E. Enable users to download and install Office 365 ProPlus from the Office 365 portal.

You are the Microsoft 365 administrator for a company. You deploy Windows 10 to all devices by using Windows Autopilot. You need to ensure that employees can install Microsoft Office 365 ProPlus on their devices. What are two possible ways to achieve this goal? Each correct answer presents a part of a solution. NOTE: Each correct selection is worth one point. A. Use the self-install option on the Office 365 dashboard B. Download and install the Office ProPlus Windows Installer (MSI) package C. Enable auto-deployment of Office 365 apps for all devices D. Update the Windows AutoPilot deployment profile to include the Office 365 apps

A. Use the self-install option on the Office 365 dashboard C. Enable auto-deployment of Office 365 apps for all devices

A company is evaluating Microsoft 365.You need to describe the features of Microsoft Bookings. What are two features of Microsoft Bookings? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. Uses Microsoft Teams for virtual meetings. B. Provides SMS notification for appointments. C. Uses Yammer for virtual meetings. D. Provides phone call notification for appointments.

A. Uses Microsoft Teams for virtual meetings. B. Provides SMS notification for appointments.

A company is evaluating Microsoft 365. You need to identify the features of Microsoft Stream. What are three features of Microsoft Stream? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. Video files are stored in SharePoint Online. B. Video files are stored in Yammer. C. Video files are stored in Exchange Online. D. Video files can be accessed from Microsoft Teams. E. Video files can be accessed from Yammer.

A. Video files are stored in SharePoint Online. D. Video files can be accessed from Microsoft Teams. E. Video files can be accessed from Yammer. A: New version of Microsoft stream (July 2022).Where will video files be stored?Videos in Stream (on SharePoint) will be stored in the same place you store your Office files, in Teams, SharePoint, OneDrive, and Yammer. Stream will enhance those videosג€"powering the playback and adding intelligent video experiences on top.ADE: Video and audio files will be stored on the SharePoint files platform within Microsoft 365 like all other file types. Already today, SharePoint powers file experiences for Microsoft Teams, OneDrive, Yammer, and Outlook.

You are an IT director that is evaluating the capabilities of Microsoft Viva Insights. You need to describe the capabilities to the key stakeholders. Which three capacities describe Viva Insights? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Viva Insights integrates directly with Microsoft Yammer. B. You can add Viva Insights as an app in Microsoft Teams. C. Microsoft Outlook includes an add-in for Viva Insights. D. A web-based dashboard is available for Viva Insights. E. Insights integrates directly with Microsoft Bookings.

A. Viva Insights integrates directly with Microsoft Yammer. B. You can add Viva Insights as an app in Microsoft Teams. C. Microsoft Outlook includes an add-in for Viva Insights. How does Yammer fit into Microsoft Viva?Just as within Microsoft 365, Yammer contributes much of the content, connections, and conversations within Microsoft Viva. Currently, this includes Viva Topics and Viva Connections.The Microsoft Viva Insights app in Microsoft Teams shows you personalized recommendations that help you do your best work.Open the Viva Insights Outlook add-in by selecting the Viva Insights icon on the Outlook Home ribbon. If you are using Outlook on the web, open an email message, select the ellipsis (...) in the top-right corner of your email message, and then select Viva Insights.

A company deploys Windows 10 to all devices. Feature updates to Windows as a service must be installed as frequently as possible. Which Windows 10 service channel installs updates most frequently? A. Windows Insider Program Servicing channel B. Long-term Servicing channel C. Semi-Annual Servicing channel

A. Windows Insider Program Servicing channel

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements. You have been tasked with deploying Microsoft Office to company using a subscription-based licensing model. The version of Office you deploy should allow for Office application settings to be enforced via group policy. Solution: You deploy Office 365 ProPlus. Does the solution meet the goal? A. Yes B. No

A. Yes

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements. You have been tasked with deploying Microsoft 365 for your company in a hybrid configuration. You want to make sure that a smart card can be used by staff for authentication purposes. Solution: You configure the use of Active Directory Federation Services (AD FS) as the hybrid identity solution. Does the solution meet the goal? A. Yes B. No

A. Yes

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements. You have recently made use of Windows Autopilot to deploy Windows 10 devices in your companyג€™s environment. You have been asked to make sure that data that stored in OneDrive for Business is available to users from remote locations. Solution: You inform users that they should use their Microsoft Azure AD credentials to sign in to their devices. Does the solution meet the goal? A. Yes B. No

A. Yes

Your company plans to move their Server environment to the cloud. You have been tasked with identifying a cloud model that allows for the current email environment to be upgraded, while also reducing server and application maintenance. You need to make sure that the requirements are met. Solution: You recommend the Software as a service (SaaS) model. Does the solution meet the goal? A. Yes B. No

A. Yes

A company has a Microsoft 365 subscription and a Microsoft Azure support plan. You need to implement only Azure services for which Microsoft provides technical support. Which two types of services and features can you implement? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. general availability B. targeted release C. public preview D. private preview

A. general availability C. public preview

You are a Microsoft 365 administrator for a company. What are two ways that you can ensure data security? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. service-level encryption using customer-provided key B. tenant-dedicated Microsoft Azure AD encryption using customer-provided key C. single-tenant infrastructure partitions for sensitive data D. data transfer using transport-layer security (TLS)

A. service-level encryption using customer-provided key D. data transfer using transport-layer security (TLS)

A company uses Microsoft 365. The company is considering using MyAnalytics. You need to identify the features of MyAnalytics. What are two features of MyAnalytics? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. suggestions in Microsoft Outlook to review outstanding tasks B. suggestions in Microsoft Teams to delay delivery of chat messages C. suggestions in Microsoft Outlook to delay delivery of emails D. suggestions in Teams to review outstanding tasks

A. suggestions in Microsoft Outlook to review outstanding tasks C. suggestions in Microsoft Outlook to delay delivery of emails

Y or N Adopting cloud applications reduces the number of on premises servers and services to manage For remote users, accessing applications stored in the cloud is easier than accessing applications stored on a company network. A loss of internet connectivity will not significantly impact functionality for users accessing applications and services in the cloud

Adopting cloud applications reduces the number of on premises servers and services to manage y For remote users, accessing applications stored in the cloud is easier than accessing applications stored on a company network. y A loss of internet connectivity will not significantly impact functionality for users accessing applications and services in the cloud n

An organization has a Microsoft 365 subscription. You plan to implement multi-factor authentication. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point Y or N After Users are enrolled in Multifactor authentication, they must configure a second authentication factor the next time they sign in Enabling multifactor authentication requires an additional subscription purchase complete multifactor authentication by using text messages, a smartphone app, or a phone call.

After Users are enrolled in Multifactor authentication, they must configure a second authentication factor the next time they sign in Y Enabling multifactor authentication requires an additional subscription purchase N complete multifactor authentication by using text messages, a smartphone app, or a phone call. Y

An organization plans to deploy Microsoft Office to all employees. You need to select the appropriate Office plans and minimize costs. Office plans - O365 Pro Plus - Office Standard Option: Automatically install updates and new features Install on more than one laptop or mobile phone

Automatically install updates and new features -O365 Pro Plus Install on more than one laptop or mobile phone -O365 Pro Plus

Y or N Azure virtual desktop (formerly windows virtual desktop) provides users access to a full desktop through web browser Azure virtual desktop (formerly windows virtual desktop) provides user access to virtualized application in the cloud Azure virtual desktop (formerly windows virtual desktop) provides users access to a full desktop environment when the users device is offline.

Azure virtual desktop (formerly windows virtual desktop) provides users access to a full desktop through web browser y Azure virtual desktop (formerly windows virtual desktop) provides user access to virtualized application in the cloud y Azure virtual desktop (formerly windows virtual desktop) provides users access to a full desktop environment when the users device is offline. n

Y or N Azure virtual machine is an infrastructure as a service (Iaas) Solution Sharepoint Online is an Iaas Solution Microsoft Teams is an Iaas Solution

Azure virtual machine is an infrastructure as a service (Iaas) Solution Y Sharepoint Online is an Iaas Solution N Microsoft Teams is an Iaas Solution N

You need to consider the underlined segment to establish whether it is accurate. All applications will remain in a hybrid environment after migrating to Microsoft Azure. Select -No adjustment required- if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option. A. No adjustment required. B. Applications that manage sensitive information C. Applications where access requires a USB-token device D. All legacy applications

B. Applications that manage sensitive information

A company is evaluating Microsoft 365. You need to determine the principles of Zero Trust. Which two principles should you identify? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. Identify potential change B. Assume breach C. Verify explicitly D. Implement change

B. Assume breach C. Verify explicitly Assume breach -Building our processes and systems assuming that a breach has already happened or soon will. This means using redundant security mechanisms, collecting system telemetry, using it to detect anomalies, and wherever possible, connecting that insight to automation to allow you to prevent, respond and remediate in near-real-time. Verify explicitly -To verify explicitly means we should examine all pertinent aspects of access requests instead of assuming trust based on a weak assurance like network location.Examine the identity, endpoint, network, and resource then apply threat intelligence and analytics to assess the context of each access request.

A company deploys Microsoft 365.The company needs to deploy a solution that meets the following requirements:✑ allows access to Microsoft 365 only from corporate networks✑ allows access to Microsoft 365 only from corporate-owned devices✑ requires additional verification during authentication You need to identify a solution that meets the requirements. What should you select? A. Multi-factor authentication B. Conditional Access C. Azure Active Directory hybrid identity D. Self-service password reset

B. Conditional Access

You are the Microsoft 365 administrator for a company. A user experiences an issue with SharePoint Online. You need to resolve the issue. Which two options can you use? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Go to the SharePoint admin center and create a support request. B. Contact Microsoft technical support by telephone. C. Create a new service request from the Microsoft 365 admin center. D. Create a service request from the SharePoint portal.

B. Contact Microsoft technical support by telephone. C. Create a new service request from the Microsoft 365 admin center.

You are a Microsoft 365 administrator for a company. You need to ensure that company documents are marked as confidential. You must prevent employees from sharing documents with people outside the company. What are two possible ways to achieve the goal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Validate outbound emails by using DomainKeys Identified Mail (DKIM) B. Create sensitive information types C. Configure Secure/Multipurpose Internet Mail Extensions (S/MIME) settings for Outlook D. Create a data-loss prevention policy E. Apply sensitivity labels to documents

B. Create sensitive information types E. Apply sensitivity labels to documents B: Sensitive information types can also be used with the Azure Information Protection scanner to classify and protect files on premises. Sensitive information types define how the automated process recognizes specific information types such as health service numbers and credit card numbers. E: With sensitivity labels you can classify and help protect your sensitive content. Protection options include labels, watermarks, and encryption.

You manage a local Active Directory Domain Services environment. Your company purchases an Enterprise E1 license for all users. You need to implement self-service password reset. You want to achieve this goal while minimizing costs. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. Upgrade your subscription to Azure AD Premium P2. B. Deploy Azure AD Connect. C. Deploy Azure Information Protection. D. Upgrade your subscription to Azure AD Premium P1.

B. Deploy Azure AD Connect. D. Upgrade your subscription to Azure AD Premium P1.

A company has offices in multiple regions. The company has a Microsoft 365 subscription. The company is developing a line-of-business (LOB) app. The app must meet the following requirements.✑ Ensure availability regardless of an employeeג€™s location.✑ Track the devices on which the app is installed by using Microsoft cloud services.✑ Minimize costs. What should you do? A. Copy the app to Microsoft OneDrive. Allow employees to download and install the app from One Drive. B. Deploy the app to all devices by using Microsoft Intune. C. Copy the app to local servers. Allow employees to download and install the app from the servers. D. Deploy the app to all devices by using group policy.

B. Deploy the app to all devices by using Microsoft Intune.

A company is developing their Windows as a service (WaaS) strategy. The company wants to roll out the most recently released Windows updates to specific devices before rolling them out to other devices. You need to recommend the correct feature to meet the requirement. Which feature should you recommend? A. Servicing channels B. Deployment rings C. Insider Preview builds D. Servicing stack updates E. Group policies

B. Deployment rings

A company is planning to use Microsoft 365 Defender. The company needs to protect Windows 10 client computers from malicious viruses. The company also needs to identify unauthorized cloud apps that are used by end users. You need to identify the Microsoft 365 Defender solutions that meet the requirements. Which two solutions should you choose? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. A. Microsoft Defender for Identity B. Microsoft Defender for Endpoint C. Microsoft Defender for Office 365 D. Microsoft Cloud App Security

B. Microsoft Defender for Endpoint D. Microsoft Cloud App Security

Your company has a Microsoft Office 365 subscription. As an administrator for this subscription, you have been tasked with recommending a solution that prohibits users from copying corporate information from managed applications installed on unmanaged devices. Which of the following should you recommend? A. Windows Virtual Desktop. B. Microsoft Intune. C. Windows AutoPilot. D. Azure AD Application Proxy.

B. Microsoft Intune

A company is evaluating Microsoft 365 Apps. The company needs to track all travel reservations and itineraries for its team members by project in a single file. Each project must have its own tab. You need to recommend the correct solution for the company. Which solution should you recommend? A. Microsoft Access B. Microsoft OneNote C. Microsoft Word D. Microsoft OneDrive E. Microsoft Publisher

B. Microsoft OneNote

Your company has a Microsoft Office 365 subscription. You have been tasked with removing customer information in compliance with General Data Protection Regulation (GDPR), after the customer generated data subject request (DSR). You want to make sure that legal holds are placed on relevant information if the opportunity arises. You want to start searching for the clientג€™s information by using Content Search eDiscovery. Which of the following applications can be searched with this method? (Choose two.) A. Microsoft PowerApps B. Microsoft Outlook C. Microsoft Access D. Microsoft SharePoint Online

B. Microsoft Outlook D. Microsoft SharePoint Online

A company uses Microsoft 365 to track progress and issues for construction projects. Project tasks must be tracked within a Microsoft-maintained unified interface that can be shared and updated across multiple users. You need to recommend a solution for the company. What should you recommend? A. Microsoft Outlook B. Microsoft Planner C. Microsoft Stream D. Microsoft To Do

B. Microsoft Planner

A company is evaluating Microsoft 365.The company needs an add-on licensing solution that will protect against privacy risks. You need to determine a solution. Which solution should you use? A. Azure Monitor B. Microsoft Priva C. Safe Attachments D. Microsoft Purview

B. Microsoft Priva Explanation: Microsoft Priva- A privacy management solution that proactively identifies and helps protect against privacy risks, empower employees to make smart data handling decisions, and automate and manage subject requests at scale. Reference :https://www.microsoft.com/en-ww/security/business/privacy/priva-privacy-management-software?market=af

A company has Microsoft 365.The company needs to secure their environment. They start by identifying the highest risks to security according to Microsoft. You need to identify the security changes that are recommended by Microsoft 365.Which tool should you choose? A. Microsoft Intune B. Microsoft Secure Score C. Azure Information Protection scanner D. Advanced Threat Analytics E. Microsoft 365 compliance center

B. Microsoft Secure Score

A company plans to deploy a collaboration solution that allows users inside and outside the company access to the same documents, tasks, and conversations. You need to identify which product meets the requirement. Which product should you select? A. Outlook 365 B. Microsoft Teams C. Microsoft OneDrive D. Exchange Online

B. Microsoft Teams

Your company plans to acquire a Microsoft 365 subscription. One of the services included in the subscription is described as a private social network that can be used to effectively sort out support problems. It can also be used to collect feedback on projects and documents. Which of the following is the service being described above? A. Microsoft Teams. B. Microsoft Yammer. C. Microsoft Office Delve. D. Microsoft SharePoint Online.

B. Microsoft Yammer.

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements You have been tasked with deploying Microsoft 365 for your company in a hybrid configuration. You want to make sure that a smart card can be used by staff for authentication purposes. Solution: You configure the use of password hash synchronization with single-on as the hybrid identity solution. Does the solution meet the goal? A. Yes B. No

B. No

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements. You have been tasked with deploying Microsoft 365 for your company in a hybrid configuration. You want to make sure that a smart card can be used by staff for authentication purposes. Solution: You configure the use of pass-through authentication and single sign-on as the hybrid identity solution. Does the solution meet the goal? A. Yes B. No

B. No

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements. You have been tasked with deploying Microsoft Office to company using a subscription-based licensing model. The version of Office you deploy should allow for Office application settings to be enforced via group policy. Solution: You deploy Office Professional Plus 2016.Does the solution meet the goal? A. Yes B. No

B. No

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements. You have recently made use of Windows Autopilot to deploy Windows 10 devices in your company's environment. You have been asked to make sure that data that stored in OneDrive for Business is available to users from remote locations. Solution: You enable Microsoft Azure AD multi-factor authentication for the users. Does the solution meet the goal? A. Yes B. No

B. No

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements. You have recently made use of Windows Autopilot to deploy Windows 10 devices in your companyג€™s environment. You have been asked to make sure that data that stored in OneDrive for Business is available to users from remote locations. Solution: You enroll the devices in Microsoft Intune. Does the solution meet the goal? A. Yes B. No

B. No

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.You have been tasked with deploying Microsoft Office to company using a subscription-based licensing model.The version of Office you deploy should allow for Office application settings to be enforced via group policy.Solution: You deploy Office Home and Business 2016.Does the solution meet the goal? A. Yes B. No

B. No

Your company plans to move their Server environment to the cloud. You have been tasked with identifying a cloud model that allows for the current email environment to be upgraded, while also reducing server and application maintenance. You need to make sure that the requirements are met. Solution: You recommend the Infrastructure as a service (IaaS) model. A. Yes B. No

B. No

Your company plans to purchase a Microsoft 365 subscription. The company requires intranet and team sites. You need to select a Microsoft 365 subscription that provides the required features. Which two subscriptions can you use? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Office 365 Home B. Office 365 Business Premium C. Office 365 Business D. Office 365 Business Essentials

B. Office 365 Business Premium D. Office 365 Business Essentials

You have been tasked with configuring a data governance strategy that allows for data classification. It should also allow for these classifications to be enforced. Which of the following should form part of your strategy? (Choose two.) A. Apply Microsoft SharePoint permissions. B. Publish labels. C. Configure Microsoft Outlook Mail Tips. D. Apply supervision policies. E. Apply retention policies. F. Apply preservation policies.

B. Publish labels. D. Apply supervision policies.

You are the Office 365 administrator for a company. You encounter a problem in your tenant. You launch the Microsoft 365 admin center and select Create a new service request. You need to get help resolving your problem through the admin center. Which three actions can you perform from the admin center? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Receive a Microsoft technical support phone number to speak with a Microsoft support technician. B. Request a Microsoft service technician to contact you by using email. C. Use the query text box to type information about your problem and receive links to help documentation. D. Schedule a time for a Microsoft service technician to call you. E. Chat with a live Microsoft service engineer.

B. Request a Microsoft service technician to contact you by using email. C. Use the query text box to type information about your problem and receive links to help documentation. D. Schedule a time for a Microsoft service technician to call you.

A company deploys Exchange Online and SharePoint Online. You must audit and assessment reports for the Microsoft 365 cloud services that the company uses. You need to provide the required documents. Which Microsoft site should you use to obtain this information? A. Compliance Manager B. Service Trust Portal C. Office 365 Security and Compliance Center D. Azure portal

B. Service Trust Portal

You need to move videos to a Microsoft 365 tenant and ensure that the contents are automatically transcribed. Which Microsoft 365 service should you use? A. Yammer B. Stream C. Flow

B. Stream Microsoft Stream is used for video services, and includes deep search within automatic audio transcription. Reference:https://docs.microsoft.com/en-us/stream/office-365-video-feature-breakdown

Your company intends to deploy a number of Microsoft Surface devices that run Windows 10, using Windows AutoPilot. You have been tasked with preparing the devices for the deployment by importing a CSV file via the Microsoft 365 Device Management portal. Which of the following combinations of blades will help you achieve your goal? A. The Dashboard and Device Configuration blades. B. The Device Enrollment and Devices blades. C. The Device Enrollment and Devices Compliance blades. D. The Device Compliance and Device Configuration blades.

B. The Device Enrollment and Devices blades.

You need to reduce the amount of time that the IT team spends on user support. What are three possible ways to achieve this goal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Enable Microsoft Office 365 Customer Lockbox B. Upgrade all client devices to Windows 10 C. Use Windows AutoPilot to deploy devices D. Deploy Microsoft MyAnalytics to devices E. Deploy Microsoft Office 365 Professional Plus to all client devices

B. Upgrade all client devices to Windows 10 C. Use Windows AutoPilot to deploy devices E. Deploy Microsoft Office 365 Professional Plus to all client devices

A company uses Microsoft 365.Employees report that their searches are failing in Microsoft Outlook. You need to determine the reason the searches are failing. What are two possible ways to achieve this goal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. View the mailboxes list in the Exchange admin center. B. View the Exchange Online advisories in the Service health dashboard. C. View the email activity in the usage reports. D. Submit a service request in Support Assistant.

B. View the Exchange Online advisories in the Service health dashboard. D. Submit a service request in Support Assistant.

A retail company is planning to upgrade their Windows 7 point-of-sale terminals to Windows 10.You have been informed that the terminals should only be upgraded again after a minimum of five years. Your solution has to allow for the scheduling of upgrades and updates to be executed consistently for al devices, while also keeping costs to a minimum. Which of the following is the servicing tool that you should use? A. Windows Autopilot B. Windows Server Update Services C. Microsoft Intune D. Azure AD Connect

B. Windows Server Update Services

A company is moving to Microsoft Azure. Some applications cannot be moved. You need to identify which applications will remain in a hybrid environment after the migration. Which applications will remain in a hybrid environment? A. applications that manage sensitive information B. applications that use a USB-token device to control access C. legacy applications that use a message-based interface D. a new server that runs several line-of-business applications

B. applications that use a USB-token device to control access

A company that has 50 employees plans to purchase a Microsoft 365 Business subscription. Which two payment methods are available? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. PayPal B. automatic bank transfer C. Enterprise Agreement D. credit card or debit card

B. automatic bank transfer D. credit card or debit card https://docs.microsoft.com/en-us/office365/admin/subscriptions-and-billing/pay-for-your-subscription?view=o365-worldwide

A company is evaluating Microsoft 365 services. You need to determine which payment options are supported with a billing profile. Which three options are supported? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. money order B. debit card C. check D. cash E. credit card

B. debit card C. check E. credit card

You need to deploy an application to Microsoft Infrastructure as a Service (IaaS).Which three features are part of IaaS? Each correct answer presents a complete solution.NOTE: Each correct selection is worth one point. A. business analytics B. real-time monitoring C. operating system D. servers and storage E. firewall and network security

B. real-time monitoring D. servers and storage E. firewall and network security

Y or N By default, all MS 365 subscribers are configured for targeted release to enable or disable targeted releases in an organization, select each user who should receive early access to features an functionality from a list To enable MS office insider release in an organization, select each user who should receive preview access to features and functionality from a list

By default, all MS 365 subscribers are configured for targeted release -N to enable or disable targeted releases in an organization, select each user who should receive early access to features an functionality from a list -Y To enable MS office insider release in an organization, select each user who should receive preview access to features and functionality from a list -N https://docs.microsoft.com/en-us/deployoffice/change-management-for-office-365-clients https://docs.microsoft.com/en-us/office365/admin/manage/release-options-in-office-365?view=o365-worldwide#set-up-the-release-option-in-the-microsoft-365- admin-center

An organization plans to deploy Microsoft Office 2019 or Office 365 ProPlus. What are two advantages of Office 365 ProPlus? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Features remain constant through the lifetime of the applications. B. Office 365 ProPlus includes downgrade rights. C. A single license may be deployed to multiple devices. D. Fully functional Office mobile apps are free to install and use.

C. A single license may be deployed to multiple devices. D. Fully functional Office mobile apps are free to install and use. ✑ A single subscription of Office 365 ProPlus allows you to install Office 365 on up to 5 devices. ✑ Office 365 ProPlus includes a fully functional, cloud-based online version that is free to use, though it does not require any installation. Incorrect Answers: Office 365 subscriptions (E3, E5, etc.) do not allow for downgrading. Office 365 ProPlus is updates automatically. Updates include updates to existing features as well as new features being added to the product. Reference: https://xo.xello.com.au/blog/office-365-proplus-top-business-benefits-for-users https://support.office.com/en-us/article/what-s-new-in-office-online-fc1de049-98f3-46da-a5aa-da4a19c3e909?ui=en-US&rs=en-US&ad=US

Your company makes use of Platform as a Service (PaaS) for their Azure solution. Which of the following options are components that your IT employees are responsible for? A. Networks. B. Databases. C. Applications. D. Servers.

C. Applications.

A company plans to migrate on-premises infrastructure to the cloud. What are three benefits of migrating to the cloud? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Reduce configuration requirements on desktop computers. B. Reduce on-site network latency. C. Automate data backup and disaster recovery. D. Scale and extend applications. E. Eliminate the cost of buying server hardware.

C. Automate data backup and disaster recovery. D. Scale and extend applications. E. Eliminate the cost of buying server hardware.

A company is planning to migrate to Microsoft 365.The company requires a service that meets the following requirements:✑ Aggregates third-party training content and internal company content.✑ Allows managers to assign, track, and report on training. You need to recommend a Microsoft Viva solution that meets the requirements. Which solution should you recommend? A. Microsoft Viva Topics B. Microsoft Viva Insights C. Microsoft Viva Learning D. Microsoft Viva Connections

C. Microsoft Viva Learning Keep your team engaged and up to date with necessary skills without the need to coordinate learning across platforms. You can recommend learning content to individuals, share content with your team, and track the reported completion status of learning that you've recommended.Viva Learning can integrate with select third-party content providers and learning management systems.

You need to ensure that the process by which users sign in to Microsoft 365 confirms the identity of the user. Which feature should you use? A. mobile application management (MAM) B. Microsoft Defender for Office 365 C. Multi-Factor Authentication (MFA) D. data loss prevention (DLP) policies

C. Multi-Factor Authentication (MFA) Multi-Factor Authentication (MFA) is a two-step identity verification system that can be used to authenticate users.

Your company has a Microsoft Office 365 subscription. As an administrator for this subscription, you have been tasked with assigning Microsoft 365 licenses to users in a department where audio-conferencing is not required. The department does, however, require office desktop products to complete tasks. Which of the following is the license that would help you achieve this? A. Office 365 ProPlus B. Microsoft 365 E1 C. Office 365 E3 D. Office 365 E5

C. Office 365 E3

A company is evaluating Microsoft 365.You need to determine the deployment methods for Microsoft 365 Apps. Which two tools can you use? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Microsoft Support and Recovery Assistant B. Office Customization Tool C. Office Deployment Tool D. Microsoft Deployment Toolkit

C. Office Deployment Tool D. Microsoft Deployment Toolkit

A company experiences a Microsoft 365 outage that affects an entire region. You check the Service Health Dashboard and observe that the service is healthy. After the incident is resolved, you need to find information in Service Health Dashboard that describes what happened during the outage. What should you use? A. Message Center B. incident closure summary C. Post-Incident Review (PIR) D. service request

C. Post-Incident Review (PIR)

A company uses Microsoft 365.The company wants to create a chat bot for integration with Microsoft Teams. You need to identify a solution to create the chat bot. Which solution should you choose? A. Remote Assist B. Dynamics 365 Customer Service C. Power Virtual Agent D. Dynamics 365 Guides

C. Power Virtual Agent

A company uses Microsoft 365.The company requires that you implement least privileged access. You need to recommend solutions that meet the requirements. Which two solutions should you recommend? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Device compliance B. IP address range restrictions C. Privileged Access Workstations (PAW) devices D. Just-in-time (JIT) access

C. Privileged Access Workstations (PAW) devices D. Just-in-time (JIT) access C: Privileged Access Workstation (PAW) ג€" This is the highest security configuration designed for extremely sensitive roles that would have a significant or material impact on the organization if their account was compromised. The PAW configuration includes security controls and policies that restrict local administrative access and productivity tools to minimize the attack surface to only what is absolutely required for performing sensitive job tasks. This makes the PAW device difficult for attackers to compromise because it blocks the most common vector for phishing attacks: email and web browsing. D: As shown in the diagram, privileged access management builds on the protection provided with native encryption of Microsoft 365 data and the role-based access control security model of Microsoft 365 services. When used with Azure AD Privileged Identity Management, these two features provide access control with just-in-time access at different scopes.

A company is a Microsoft 365 reseller. The company does not provide managed services or direct customer support. You need to provide licenses for customers and earn commissions for each license sold. What should you do? A. Buy licenses for customers by using the Microsoft admin portal. B. Sign up as a Cloud Solution Provider direct reseller. C. Sign up as a Cloud Solution Provider indirect reseller. D. Buy licenses for customers from a Microsoft Authorized distributor.

C. Sign up as a Cloud Solution Provider indirect reseller Reference: https://docs.microsoft.com/en-us/partner-center/enrolling-in-the-csp-program

A company has an Exchange Server environment. The company plans to migrate to the cloud. You need to recommend a cloud model that meets the following requirements:✑ Upgrade the existing email environment✑ Minimize server and application maintenance Which model should you recommend? A. Platform as a service (PaaS) B. Windows as a service (WaaS) C. Software as a service (SaaS) D. Infrastructure as a service (IaaS)

C. Software as a service (SaaS)

This question requires that you evaluate the underlined text to determine if it is correct. Microsoft 365 is a Platform as a service (PaaS).Review the underlined text. If it makes the statement correct, select ג€No change is needed.ג€ If the statement is incorrect, select the answer choice that makes the statement correct. A. Infrastructure as a service (IaaS) B. Windows as a service (WaaS) C. Software as a service (Saas) D. No change is needed

C. Software as a service (Saas) Microsoft 365 is SaaS, which provides an online version of MS Office Suite (Office Web Apps) along with SharePoint Server, Exchange Server and Lync Server.

A company has a Microsoft 365 subscription that includes Office apps. A user has identified a new issue while working with an app. When the user attempts to create a support request, the following message displays: You need to determine the cause of the error message. What is the cause? A. The user account is disabled. B. The user does not have a license assigned for the app. C. The user account is not a member of the global admin role. D. The company does not have Premier support.

C. The user account is not a member of the global admin role.

You are the network administrator of a company. The Microsoft 365 tenant contains sensitive information. Employees must verify their identities when they sign into Microsoft 365 by providing information in addition to their Azure AD password. You need to select the tools that employees can use to verify their identities. Which two tools should you select? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Customer Lockbox for Office 365 B. Azure Security Center C. Windows Hello for Business D. Microsoft Authenticator

C. Windows Hello for Business D. Microsoft Authenticator Two-step authentication can be implemented by using Windows Hello for Business or Microsoft Authenticator. Reference: https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-manage-in-organization https://support.microsoft.com/en-us/help/4026727/microsoft-account-how-to-use-the-microsoft-authenticator-ap

You are the Microsoft 365 administrator for a company. All staff must use Microsoft Outlook to access corporate email. When users access Outlook on mobile devices, they must use a PIN to open the application. You need to implement a Microsoft Intune policy to enforce the security requirements. Which policy should you use? A. device compliance B. device configuration C. app protection D. app configuration

C. app protection

You are the Microsoft 365 administrator for a company. Which two admin roles can purchase more licenses? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. service administrator B. user management administrator C. global administrator D. billing administrator

C. global administrator D. billing administrator

Which type of cloud model provides access to Microsoft Office apps? A. platform as a service (PaaS) B. infrastructure as a service (IaaS) C. software as a service (SaaS)

C. software as a service (SaaS)

You are the Microsoft Office 365 administrator for a company. You need to perform security and compliance reviews before new updates are distributed to the entire company. What should you implement? A. standard releases B. Microsoft 365 Enterprise Test Lab C. targeted releases D. FastTrack

C. targeted releases

You administer a Microsoft 365 tenant.You need to be able to quickly identify the status of each service by its icon.Which service status is associated with each icon? Refer to Graph Statuses : -Incident -Advisory -Service is healthy Icon: Check mark Upside down exclamation Yield

Check mark-Service is healthy blue Upside down exclamation- Advisory Red Yield - Incident

You need to configure a data governance solution for your company. The solution must meet the following requirements:✑ Classify documents✑ Ensure that classifications are enforced✑ Delete documents that are no longer used Which actions should you perform? Requirements: Classify Documents - Publish Labels - Define file and folder structures - Apply MS Sharepoint permissions Ensure that classifications are enforced - Apply supervision policies - Configuration document approval - Configure Microsoft Outlook Mail tips Delete Documents that are no longer used: - Apply retention policies - Apply preservation policies - Configure the Microsoft Sharepoint second stage recycle bin

Classify Documents - Publish Labels Ensure that classifications are enforced - Apply supervision policies Delete Documents that are no longer used: - Apply retention policies

You are the Microsoft 365 administrator for a company. You need to identify available cloud security features. Match each feature to the correct description. Features: Cloud Discovery dashboard Microsoft Azure AD conditional Access Microsoft Azure Security Center Microsoft Azure information Protection Description: Classify and label emails and documents in the organization Block Users from accessing cloud apps from certain devices Provide insight into which apps are being used in the organization and the risk levels for apps Manage security policies, monitor attacks against virtual machines, and provide remediation for vulnerabilities.

Classify and label emails and documents in the organization - Microsoft Azure information Protection Block Users from accessing cloud apps from certain devices - Microsoft Azure AD conditional Access Provide insight into which apps are being used in the organization and the risk levels for apps - Cloud Discovery dashboard Manage security policies, monitor attacks against virtual machines, and provide remediation for vulnerabilities. - Microsoft Azure Security Center

Y or N Cloud app security identifies the cloud apps, infrastructure as a service, and platform as a services on organization policies cloud app securities detects unusual behavior across apps and multiple users as well as potential ransomware cloud app security prevents data leaks from noncompliant apps and limits access to regulated data

Cloud app security identifies the cloud apps, infrastructure as a service, and platform as a services on organization policies -Y cloud app securities detects unusual behavior across apps and multiple users as well as potential ransomware -Y cloud app security prevents data leaks from noncompliant apps and limits access to regulated data -Y

Y or N Cloud computing delivers software on demand Cloud computing provides backup and recovery cloud computing enables low-cost infrastructure scaling

Cloud computing delivers software on demand y Cloud computing provides backup and recovery y cloud computing enables low-cost infrastructure scaling y

Y or N Cloud solutions providers can bill customers for MS 365 licenses on an annual basis Cloud solution providers can provide 30 day trial licenses to customers Cloud solution providers can only charge customers for licenses that the customers use

Cloud solutions providers can bill customers for MS 365 licenses on an annual basis -Y Cloud solution providers can provide 30 day trial licenses to customers -Y Cloud solution providers can only charge customers for licenses that the customers use -Y

Y or N Companies that have recently invested in hardware and software can use a hybrid cloud model companies that have few on premises resources can use a hybrid cloud model

Companies that have recently invested in hardware and software can use a hybrid cloud model y companies that have few on premises resources can use a hybrid cloud model y

Company Options: Company A- computing resources run on systems used by this company only Company B- Computing resources run on systems that are shared with multiple companies Company C- Computing resources run on systems with an on prem exchange server Match each cloud model to the appropriate company. To answer, drag the appropriate cloud model from the column on the left to the company on the right. Each cloud model may be used once, more than once, or not at all. Private Public Hybrid

Company A- computing resources run on systems used by this company only Private Company B- Computing resources run on systems that are shared with multiple companies Public Company C- Computing resources run on systems with an on prem exchange server Hybrid

DRAG DROP -A company plans to deploy Microsoft 365. Collaboration solutions: - Microsoft Forms - Microsoft planner - Azure AD premium P2 - Microsoft Delve Description: Create online surveys and polls and track the responses in real time Create, assign, and track tasks and work items

Create online surveys and polls and track the responses in real time - Microsoft Forms - Create, assign, and track tasks and work items Microsoft planner

This question requires that you evaluate the underlined text to determine if it is correct. You use Microsoft Intune for device management. You must determine how many devices run each operating system. You must launch Intune and navigate to the Mobile Apps blade. Select the correct answer if the underlined text does not make the statement correct. Select ג€No change is neededג€ if the underlined text makes the statement correct. A. Device configuration B. Device compliance C. No change is needed D. Devices

D. Devices

A company has a Microsoft 365 subscription. You deploy Windows 10 devices by using Windows Autopilot. You need to ensure that team members can access data that is stored in OneDrive for Business when team members are at remote sites. What should you do? A. Enroll team members in Microsoft Azure AD multi-factor authentication. B. Add the devices to Microsoft 365 using the Devices tile. C. Enroll devices in Microsoft Intune. D. Direct team members to sign in to their devices using their Microsoft Azure AD credentials.

D. Direct team members to sign in to their devices using their Microsoft Azure AD credentials.

A company plans to deploy a customer relationship management (CRM) solution. The solution must provide enterprise resource planning (ERP) integration as well as artificial intelligence (AI) tools. You need to choose a solution that meets the requirements. What should you choose? A. SharePoint Online B. Microsoft 365 C. Power Platform D. Dynamics 365

D. Dynamics 365

A company is developing their Windows as a service (WaaS) strategy. The company needs to preview features from Microsoft in the development cycle as soon as possible. You need to select the correct solution .Which solution should you use? A. Servicing channels B. Proof of concept C. Deployment rings D. Flighting

D. Flighting In the past, when Microsoft developed new versions of Windows, it typically released technical previews near the end of the process, when Windows was nearly ready to ship. With Windows 10, new features will be delivered to the Windows Insider community as soon as possible ג€" during the development cycle, through a process called flighting ג€" so that organizations can see exactly what Microsoft is developing and start their testing as soon as possible.Flighting is the process of running Windows Insider Preview Builds on your device. When you run these early versions of Windows and give us feedback, you can help us shape the future of Windows. Once you've registered for the program, you can run Insider Preview builds on as many devices as you want, each in the channel of your choice.

You are a Microsoft 365 administrator for a company. You use products that are in private preview, public preview, or general availability (GA).You need to determine at which phases you can receive support from the Microsoft 365 admin center. For which product phase or phases can you receive support? A. GA, private preview, and public preview B. GA and private preview only C. GA only D. GA and public preview only E. public preview and private preview only

D. GA and public preview only Support for Preview services and features is provided only for ג€Public Previewג€ programs. Azure Support plans do not cover non-Public Previews services. Reference: https://azure.microsoft.com/en-us/support/faq/ https://www.rmsource.com/blogsite/Pages/Microsoft-Azure---Public-Preview-Release-Status.aspx

A company plans to send surveys and polls to their customers. The company needs to view responses and collect feedback from the surveys and polls. You need to identify which product meets the requirements. Which product should you select? A. Microsoft 365 Apps for enterprise B. SharePoint C. Microsoft Teams D. Microsoft Forms

D. Microsoft Forms

After acquiring a Microsoft 365 E5 subscription, you are tasked with applying security features. You are currently configuring a security feature that allows you to protect against unidentified malware, viruses, and malicious URLs. Which of the following is the feature you are configuring? A. Microsoft Azure AD Identity Protection. B. Data Governance. C. Microsoft Azure AD Conditional Access. D. Microsoft Office 365 Advanced Threat Protection.

D. Microsoft Office 365 Advanced Threat Protection.

Your company plans to acquire a Microsoft 365 subscription. One of the services included in the subscription is described as a cloud service that allows you to do the following:✑ Store and protect files.✑ Share files.✑ Make use of an app or web-browser to access files from anywhere.✑ Restore files to an earlier date and time. Which of the following is the service being described above? A. Office 365 Pro Plus. B. Microsoft Yammer. C. Microsoft Office Delve. D. Microsoft OneDrive for Business.

D. Microsoft OneDrive for Business.

A group of employees and users outside the company must be able to collaborate on a project in real time by using a whiteboard. In the Microsoft 365 admin portal, which Office 365 product should you configure? A. Microsoft Yammer B. Microsoft Office Delve C. Microsoft SharePoint Online D. Microsoft Teams

D. Microsoft Teams

You are the Microsoft 365 administrator for a company. Your company plans to open a new office in the United Kingdom. You need to provide penetration test and security assessment reports for the new office. Where can you locate the required reports? A. Data Governance page of the Security and Compliance portal B. Compliance Manager page of the Services Trust portal C. Data Loss Prevention page of the Security and Compliance portal D. Regional Compliance page of the Services Trust portal

D. Regional Compliance page of the Services Trust portal

A company uses Microsoft 365. The company cancels a subscription that has a traditional add-on associated to it. The add-on has an expiration date that is different than its associated subscription. You need to determine what happens to the add-on. What happens to the add-on? A. The add-on will remain until its expiration date is reached. B. The add-on will be automatically transferred to another active subscription. C. The add-on will remain until manually canceled by the company. D. The add-on is immediately canceled with the subscription.

D. The add-on is immediately canceled with the subscription. There are two types of add-ons: Traditional add-ons are linked to a specific subscription. If you cancel the subscription, the associated add-on is also canceled. Standalone add-on subscriptions appear as a separate subscription on the Your products page and have their own expiration date.

A company plans to purchase Microsoft 365. You need to give management an overview of the Microsoft 365 pricing model. Which of the following describes how the company will be billed for Microsoft 365? A. The company will be billed according to the amount of computing resources it uses each month across all users. B. The company will make a single payment for Microsoft 365, after which it owns the license for Microsoft 365 and can use it in an unlimited fashion. C. The company will be billed annually for a single Microsoft 365 license that can be shared among all employees. D. The company will be billed according to the number of user licenses acquired.

D. The company will be billed according to the number of user licenses acquired.

Your company has a Microsoft Office 365 subscription. As an administrator for this subscription, you have been tasked with recommending a solution that will allow users to make use of unsuited applications on their Windows 10 devices. Which of the following should you recommend? A. Azure AD Connect. B. Configuration Manager. C. Windows AutoPilot. D. Windows Virtual Desktop.

D. Windows Virtual Desktop.

You use Microsoft Business Products. When you try to create a support request, you receive the following message: You don't have permission to access this page or perform this action. You need to determine the cause of the error message. What is the cause? A. Your password is expired B. Your account is disabled C. Your company does not have Premier support D. Your account is not a member of the global admin role

D. Your account is not a member of the global admin role

You need to consider the underlined segment to establish whether it is accurate. To retrieve data for employees who request personal data under General Data Protection Regulation (GDPR) guidelines, you have to create a GDPR assessment. Select ג€No adjustment requiredג€ if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option. What should you do? A. No adjustment required B. mobile application protection policy C. device configuration policy D. data subject request case

D. data subject request case

You are a Microsoft 365 administrator for a company. Several users report that they receive emails which have a PDF attachment. The PDF attachment launches malicious code. You need to remove the message from inboxes and disable the PDF threat if an affected document is opened. Which feature should you implement? A. Microsoft Exchange Admin Center block lists B. Sender Policy Framework C. Advanced Threat Protection anti-phishing D. zero-hour auto purge E. DKIM signed messages with mail flow rules

D. zero-hour auto purge In Microsoft 365 organizations with mailboxes in Exchange Online, zero-hour auto purge (ZAP) is an email protection feature that retroactively detects and neutralizes malicious phishing, spam, or malware messages that have already been delivered to Exchange Online mailboxes.

An organization plans to deploy Microsoft Intune. Y or N Data protection can be selectively applied to applications Microsoft Intune can define where corporate data is stored Once a device is registered with Microsoft Intune, Device wipe will include the users personal data.

Data protection can be selectively applied to applications Y Microsoft Intune can define where corporate data is stored Y Once a device is registered with Microsoft Intune, Device wipe will include the users personal data. N

Y or N Dynamics 365 is an infrastructure as a service solution A Microsoft 365 subscription includes a free subscription to Dynamics 365 Dynamics 365 has an integrated customer relationship management CRM application that uses Microsoft 365 apps

Dynamics 365 is an infrastructure as a service solution N A Microsoft 365 subscription includes a free subscription to Dynamics 365 N Dynamics 365 has an integrated customer relationship management CRM application that uses Microsoft 365 apps N Box 1: No -Dynamics 365 is SaaS - Box 2: No -Dynamics 365 is not part of Microsoft 365 Box 3: No -A connector can be used to connect to Dynamics 365 data but Dynamics 365 does not have Microsoft 365 apps.

A company is evaluating Microsoft's virtualization services. Which feature is unique to Windows 365? A. Users can connect to a virtual machine by using the Microsoft Remote Desktop app. B. Users can connect to a virtual machine by using a web site. C. A virtual machine can authenticate users to Active Directory Domain Services (AD DS). D. A virtual machine can be provisioned from a custom image. E. A virtual machine is automatically provisioned after assigning a license to a user.

E. A virtual machine is automatically provisioned after assigning a license to a user. Windows 365 is a cloud-based service that automatically creates a new type of Windows virtual machine (Cloud PCs) for your end users. Each Cloud PC is assigned to an individual user and is their dedicated Windows device. Windows 365 provides the productivity, security, and collaboration benefits of Microsoft 365.

You are evaluating Office 365 ProPlus for a company. Y or N Employees must use a browser to co-author documents, spreadsheets, and presentations Employees can edit documents, spreadsheets, and presentations by using a browser or desktop app Employees can use mobile devices, tablets, and laptops to edit documents, spreadsheets, and presentations

Employees must use a browser to co-author documents, spreadsheets, and presentations N Employees can edit documents, spreadsheets, and presentations by using a browser or desktop app Y Employees can use mobile devices, tablets, and laptops to edit documents, spreadsheets, and presentations Y

A company plans to migrate from a Microsoft volume licensing model to a subscription-based model. Updates to devices must meet the following requirements: Engineering: application and operating system updates to laptop computers and mobile phones must start from an on premises server Sales: Laptop computers and mobile phones must be updated periodically and not require an on premises server Finance: Laptop computers and mobile phones must be updated periodically and monitored by using a single system Developers: Choose when updates are installed You need to recommend the appropriate servicing models to update employee laptop computers and mobile phones. Which servicing models should you recommend? Services Models: - Windows Update (stand-alone) - Windows Update for Business - Windows server update services - System center configuration manager Team: Engineering Sales Finance App developers

Engineering- Windows server update services Sales -Windows Update for Business Finance -System center configuration manager App developers -Windows Update (stand-alone)

Y or N Files that are stored in OneDrive can be opened from File explore without the need for files to persist on the users devices OneDrive supports hybrid scenarios with Sharepoint on-premises and cloud applications OneDrive requires that data be stored at a location closest to a users region

Files that are stored in OneDrive can be opened from File explore without the need for files to persist on the users devices Y OneDrive supports hybrid scenarios with Sharepoint on-premises and cloud applications Y OneDrive requires that data be stored at a location closest to a users region N

A company plans to change from supporting servers on-premises to using Microsoft 365 services. You need to determine which Microsoft 365 workload is appropriate to replace each on-premises service. Which workloads should you use? Get updates on the latest news and announcements from and intranet site hosted on an internal web server - Sharepoint online -Microsoft Stream - OneDrive for Business - Microsoft Delve View Videos hosted on internal web server - Microsoft Planner - Microsoft Flow - Microsoft Stream - PowerApps Store and retrieve shared documents on a locale file server - Microsoft flow - Power BI - Microsoft Stream - Sharepoint Online Store documents in a personalized folder on a local file server - OneDrive for business - Microsoft To-Do - MyAnalystics - Microsoft Stream Chat with other employees by using an on-premises Skype for business server - Microsoft bookings - Microsoft People - Microsoft Teams - Sway

Get updates on the latest news and announcements from and intranet site hosted on an internal web server - Sharepoint online View Videos hosted on internal web server - Microsoft Stream Store and retrieve shared documents on a locale file server - Sharepoint Online Store documents in a personalized folder on a local file server - OneDrive for business Chat with other employees by using an on-premises Skype for business server - Microsoft Teams

A company plans to deploy Microsoft 365.You need to identify the appropriate collaboration solution for each task Host Meetings with employees and guests: - Microsoft Teams - Azure DevOps - Sharepoint Online - Dynamics 365 Deploy a web page for a team or project: - Microsoft Teams - Sharepoint Online - Dynamics 365 - Microsoft 365 apps Manage team and work progress on a project - Microsoft teams - Sharepoint Online - Microsoft Planner - Dynamics 365

Host Meetings with employees and guests: - Microsoft Teams Deploy a web page for a team or project: - Sharepoint Online Manage team and work progress on a project - Microsoft Planner

A company uses Microsoft 365.The company requires the sales team to record all live demonstrations for training purposes. You need to select the Microsoft tool that the sales team should use for each requirement. Host an record a live event for customers to discuss new product offerings: -Dynamics 365 Sales - Microsoft teams - Microsoft Sway Store recorded presentations and create searchable closed captions and speech to text information for the files. - Microsoft Stream - Microsoft Sway - Power Automate - Microsoft OneDrive

Host an record a live event for customers to discuss new product offerings: - Microsoft teams Store recorded presentations and create searchable closed captions and speech to text information for the files. - Microsoft Stream

Drag and Drop Offerings: Booking Calendar Booking Page Staff Page Services Page Cloud Service Iaas Paas Saas

Iaas- Services Page Paas- Booking Page Saas- Booking Calendar

You need to identify which reports provide the information that the company requests. Which reports should you select? Reports: Active users Forms pro activity Supervisory review Data loss prevention Information: Identifies the number of product licenses assigned to employees Identifies the rules applied to information that is classified as sensitive

Identifies the number of product licenses assigned to employees Active users Identifies the riles applied to information that is classified as sensitive Data loss prevention

A company is evaluating solutions to improve their customer service capabilities. When customers call the company, they should be directly routed to the appropriate customer service person. You need to recommend solutions for the company's requirements. Which solutions should you recommend? Implement Direct routing: - Microsoft Teams Phone - Outlook People - Yammer - Microsoft Viva Connect the correct customer service associate to a customer. - Microsoft Viva - Outlook People - Microsoft Teams Phone - Microsoft Stream

Implement Direct routing: - Microsoft Teams Phone Connect the correct customer service associate to a customer. - Microsoft Viva Box 1: Microsoft Teams Phone -Microsoft Teams Phone supports Direct Routing. Box 2: Microsoft Viva -Microsoft Viva is an employee experience platform that brings together communications, knowledge, learning, resources, and insights in the flow of work. Powered by Microsoft 365 and experienced through Microsoft Teams, Viva fosters a culture that empowers employees and teams to be their best from anywhere.

A company plans to deploy Microsoft Intune. Which types of apps can be managed by Intune? Y or N Intune Supports management of apps from third party stores Intune supports volume licensing of IOS and Android Store apps Intune supports the management of line-of-business and Public-facing apps

Intune Supports management of apps from third party stores N Intune supports volume licensing of IOS and Android Store apps Y Intune supports the management of line-of-business and Public-facing apps Y

A company plans to deploy Microsoft Intune. Which scenarios can you implement by using Intune? Y or N Intune app protection can protect access to exchange server on-premises mailboxes Intune app protection policies support apps that connect to on-premises Microsoft Sharepoint server Intune app protection policies require a mobile device management solution

Intune app protection can protect access to exchange server on-premises mailboxes -Y Intune app protection policies support apps that connect to on-premises Microsoft Sharepoint server -N Intune app protection policies require a mobile device management solution -N Box 1: Yes -You can protect access to Exchange on-premises mailboxes by creating Intune app protection policies for Outlook for iOS/iPadOS and Android enabled with hybrid Modern Authentication. Box 2: No -App protection policies are not supported for other apps that connect to on-premises Exchange or SharePoint services. Box 3: No -App protection policies can be configured for apps that run on devices that are not enrolled in any mobile device management solution: These devices are typically employee owned devices that aren't managed or enrolled in Intune or other MDM solutions.Reference:https://docs.microsoft.com/en-us/intune/app-protection-policy

Y or N Licensing through a cloud solution provider CSP allows you to purchase nonperpetual software for on-premises use. Licensing through a cloud solution provider (CSP) allows you to receive a discount based on volume Licensing through a cloud solution provider (CSP) allows you to receive technical support on your MS services from a certified partner.

Licensing through a cloud solution provider CSP allows you to purchase nonperpetual software for on-premises use. -Y Licensing through a cloud solution provider (CSP) allows you to receive a discount based on volume -Y Licensing through a cloud solution provider (CSP) allows you to receive technical support on your MS services from a certified partner. -Y https://partner.microsoft.com/en-us/licensing

A company uses Microsoft 365 and Windows 10.You need to identify which servicing tools the company should use for Windows 10. Servicing Tools: Windows Update Microsoft Endpoint configuration Manager Servicing tool Description: Limited control over feature updates and the ability to manually defer updates. Full control over feature updates and Multiple deployment options.

Limited control over feature updates and the ability to manually defer updates. Windows Update Full control over feature updates and Multiple deployment options. Microsoft Endpoint configuration Manager

You are a Microsoft 365 administrator for a company. You need to recommend an appropriate Microsoft Office 365 plan for a customer that minimizes costs. Which subscription plans should you recommend? O365 plans: ProPlus Enterprise E1 Enterprise E2 Enterprise E5 O365 Features: Local copy of Microsoft outlook that connects to an exchange server instance Search and discovery with Delve eDiscovery with in-pace, hold and export Advanced eDiscovery with in-place search, hold , export, and analytics

Local copy of Microsoft outlook that connects to an exchange server instance -ProPlus Search and discovery with Delve - Enterprise E1 eDiscovery with in-pace, hold and export - Enterprise E2 Advanced eDiscovery with in-place search, hold , export, and analytics - Enterprise E5

You have a hybrid environment that includes Microsoft Azure AD. On-premises applications use Active Directory Domain Services (AD DS) for authentication. You need to determine which authentication methods to use. Match each feature to its authentication source. Authentication sources - AD DS only - Azure AD only - AD DS ands Azure AD Client Feature Log onto devices by using Windows Hello Log on to devices that are managed by MS Intune Sign in to Outlook on the web by using multi-factor authentication

Log onto devices by using Windows Hello - AD DS ands Azure AD Log on to devices that are managed by MS Intune - AD DS ands Azure AD Sign in to Outlook on the web by using multi-factor authentication - Azure AD only https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-identity-verification

Y or N M 365 information protection and compliance solutions help organizations comply with regulatory compliance requirements M365 provides security and information protection for single tenant organizations that are located in multiple regions a mail enabled security group is used for collaboration and includes a group email and shared workspace

M 365 information protection and compliance solutions help organizations comply with regulatory compliance requirements M365 provides security and information protection for single tenant organizations that are located in multiple regions a mail enabled security group is used for collaboration and includes a group email and shared workspace Box 1: Yes -Microsoft Purview Compliance Manager is a feature in the Microsoft Purview compliance portal that helps you manage your organizationג€™s compliance requirements with greater ease and convenience. Compliance Manager can help you throughout your compliance journey, from taking inventory of your data protection risks to managing the complexities of implementing controls, staying current with regulations and certifications, and reporting to auditors. Box 2: Yes -Also for multi-tenant organizations in single or multiple regions. Box 3: Yes -Microsoft 365 Groups are used for collaboration between users, both inside and outside your company. With each Microsoft 365 Group, members get a group email and shared workspace for conversations, files, and calendar events, Stream, and a Planner.Note: A mail-enabled security group can be used to distribute messages and to grant access permissions to resources in Active Directory.A mail-enabled security group has a group email address. Reference:https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager?view=o365-worldwide https://docs.microsoft.com/en-us/power-platform/admin/multiple-online-environments-tenants https://docs.microsoft.com/en-us/microsoft-365/admin/create-groups/compare-groups?view=o365-worldwide#mail-enabled-security-groups

A company is evaluating M365: Y or N M365 Dynamics provides a remote assistance solution M365 Dynamics provides a customer relationship management solution M365 Dynamics provides an endpoint protection security solution.

M365 Dynamics provides a remote assistance solution Y M365 Dynamics provides a customer relationship management solution Y M365 Dynamics provides an endpoint protection security solution. N

Y or N M365 applications can access Dynamics 365 Data by using existing connectors Microsoft Teams allows you to access customer information in Dynamics 365. Power Platform allows you to build custom apps to automate processes in Dynamics 365.

M365 applications can access Dynamics 365 Data by using existing connectors y Microsoft Teams allows you to access customer information in Dynamics 365. y Power Platform allows you to build custom apps to automate processes in Dynamics 365. y Box 1: Yes -The Microsoft Dataverse connector is used to connect to Dynamics 365 data Box 2: Yes -Microsoft Teams users get license-free access to Dynamics 365 data Box 3: Yes -The Microsoft Dataverse connector allows you to connect Power Platform to Dynamic 365 data

A company plans to deploy Microsoft 365 Apps. Y or N M365 apps can be deployed from the cloud M365 apps can be deployed from an on premises network share M365 apps can be deployed by using endpoint configuration manager

M365 apps can be deployed from the cloud y M365 apps can be deployed from an on premises network share y M365 apps can be deployed by using endpoint configuration manager y

Y or N MS 365 global administrators use MS workspace analytics to examine network traffic patterns for troubleshooting purposes MS workspace analytics can be helpful in understanding the usage patterns of various MS 365 services MS workplace analytics helps business examine the work of teams so that they can be more productive

MS 365 global administrators use MS workspace analytics to examine network traffic patterns for troubleshooting purposes Y MS workspace analytics can be helpful in understanding the usage patterns of various MS 365 services Y MS workplace analytics helps business examine the work of teams so that they can be more productive Y

Y or N MS could app security can integrate with multiple clouds Microsoft cloud app security can be used to assess the regulatory compliance of cloud apps Microsoft Cloud app Security can provide behavioral analytics and anomaly detection

MS could app security can integrate with multiple clouds -Y Microsoft cloud app security can be used to assess the regulatory compliance of cloud apps -Y Microsoft Cloud app Security can provide behavioral analytics and anomaly detection -Y

Y or N MS service Trust portal provides audit reports MS service trust portal provides penetration test reports MS service trust portal allows for the configuration of conditional access policies

MS service Trust portal provides audit reports - Y MS service trust portal provides penetration test reports -N MS service trust portal allows for the configuration of conditional access policies -N https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-with-service-trust-portal?view=o365-worldwide

A company has Microsoft 365 and uses Microsoft Endpoint Manager. You need to identify the endpoint management tool associated with each action. Which tool should you identify for each action? Tools: Software Center Configuration Manager Microsoft Intune Autopilot Requirement: Manage employees personal devices from the cloud Manage power settings for on-premises servers

Manage employees personal devices from the cloud Microsoft Intune Manage power settings for on-premises servers Configuration Manager

A company is evaluating Microsoft cloud service offerings. Drag and Drop Offerings: Microsoft Azure virtual Network Microsoft Azure logic apps Microsoft dynamics 365 Cloud Service: Iaas Paas Saas

Microsoft Azure virtual Network Iaas Microsoft Azure logic apps Paas Microsoft dynamics 365 Saas Box 1: Microsoft Azure virtual networkMicrosoft announced the release of Windows Azure Virtual Machines, an Infrastructure-as-a-Service (IaaS) offering in Windows Azure. Box 2: Microsoft Azure Logic AppsAzure Logic Apps is a cloud-based platform for creating and running automated workflows that integrate your apps, data, services, and systems. With this platform, you can quickly develop highly scalable integration solutions for your enterprise and business-to-business (B2B) scenarios. As a member of AzureIntegration Services, Azure Logic Apps simplifies the way that you connect legacy, modern, and cutting-edge systems across cloud, on premises, and hybrid environments. Box 3: Microsoft Dynamics 365 -Dynamics 365 is a set of interconnected, modular Software-as-a-Service (SaaS) applications and services designed to both transform and enable your core customers, employees, and business activities.Reference:

Y or N Microsoft Bookings can modify or cancel an existing booking Microsoft bookings can only use a corporate website to create a booking Microsoft Bookings can create a booking based on users schedule

Microsoft Bookings can modify or cancel an existing booking y Microsoft bookings can only use a corporate website to create a booking n Microsoft Bookings can create a booking based on users schedule y

Y or N Microsoft Defender for cloud apps integrates with intelligent security graph to generate Microsoft Defender for Identity Alerts Microsoft Defender for cloud apps integrates with secure score to report the availability security feature that may reduce risk Microsoft defender for cloud apps integrates with Microsoft power BI to automate a response when alerts are triggered

Microsoft Defender for cloud apps integrates with intelligent security graph to generate Microsoft Defender for Identity Alerts Y Microsoft Defender for cloud apps integrates with secure score to report the availability security feature that may reduce risk Y Microsoft defender for cloud apps integrates with Microsoft power BI to automate a response when alerts are triggered Y

Y or N Microsoft Information Protection provides the ability to apply sensitive labels in office apps Microsoft information protection helps administrators track sensitive information on Windows devices Microsoft information protection works with data stored in Microsoft Azure and on-premises

Microsoft Information Protection provides the ability to apply sensitive labels in office apps -Y Microsoft information protection helps administrators track sensitive information on Windows devices -Y Microsoft information protection works with data stored in Microsoft Azure and on-premises Y

Y or N Microsoft Intune allows companies to manage users personal devices that have been enrolled in Azure AD Microsoft Intune allows companies to manage organization-owned phones Microsoft Intune can use conditional access policies

Microsoft Intune allows companies to manage users personal devices that have been enrolled in Azure AD y Microsoft Intune allows companies to manage organization-owned phones y Microsoft Intune can use conditional access policies y

Y or N Microsoft defender for endpoint detects advanced attacks and automates investigation and remediation of security insights Microsoft defender for O 365 helps protect against malicious attachments and links that are sent through email Microsoft cloud app security provides client virtual private network VPN access to 365 services

Microsoft defender for endpoint detects advanced attacks and automates investigation and remediation of security insights Y Microsoft defender for O 365 helps protect against malicious attachments and links that are sent through email Y Microsoft cloud app security provides client virtual private network VPN access to 365 services N

Y or N Microsoft endpoint manager includes the Intune connector for azure active directory MS endpoint manager includes the Intune exchange connector MS endpoint manager can manage and monitor mobile devices

Microsoft endpoint manager includes the Intune connector for azure active directory -Y MS endpoint manager includes the Intune exchange connector -N MS endpoint manager can manage and monitor mobile devices -Y

A company is evaluating Microsoft cloud services. Y or N Microsoft teams can run as a service on premises Microsoft exchange server 2019 can run as a service on premises Microsoft bookings can run as a service within the cloud.

Microsoft teams can run as a service on premises N Microsoft exchange server 2019 can run as a service on premises Y Microsoft bookings can run as a service within the cloud. Y

Y or N Multi Factor Authentication MFA supports single sign on by allowing a user to access Microsoft 365 services using only a username and password MFA enabled accounts can be compromised with only a stolen username and password MFA protects against blue force attacks

Multi Factor Authentication MFA supports single sign on by allowing a user to access Microsoft 365 services using only a username and password N MFA enabled accounts can be compromised with only a stolen username and password N MFA protects against blue force attacks Y

Y or N MyAnalytics recommends outstanding tasks based on emails that you have received in the last 14 days MyAnalytics recommends scheduling email delivery based on the working hours of the recipient Workplace MyAnalytics recommends shortening one-hour meetings that you schedule by 15 minutes

MyAnalytics recommends outstanding tasks based on emails that you have received in the last 14 days Y MyAnalytics recommends scheduling email delivery based on the working hours of the recipient Y Workplace MyAnalytics recommends shortening one-hour meetings that you schedule by 15 minutes Y

Y or N OneDrive for Business provides version control for shared documents Power Automate provides automated workflows between apps Sharepoint provides shared colanders and shared task lists

OneDrive for Business provides version control for shared documents Y Power Automate provides automated workflows between apps Y Sharepoint provides shared colanders and shared task lists Y

A company plans to use Microsoft 365 Defender. Which services should you use? Services: MS cloud app Security MS defender for endpoint MS defender for O365 Requirement: Protect against malicious links in email Identify unprotected windows servers

Protect against malicious links in email -MS defender for O365 Identify unprotected windows servers -MS defender for endpoint

Y or N Protected emails can be read on any device when using Azure information protection with exchange online Users can configure custom permissions in File Explore when using azure information protection You can protect information shared with internal and external users by using azure information protection

Protected emails can be read on any device when using Azure information protection with exchange online Y Users can configure custom permissions in File Explore when using azure information protection Y You can protect information shared with internal and external users by using azure information protection Y

A company uses Microsoft 365.You need to identify the appropriate report for each definition.Which report should you choose for each definition? Reports: Threat protection Status Malware Detections Discover Shadow IT Requirement: Provide information about malicious emails detected by exchange online Provide information about email received that contains software designed to disrupt or damage computers Provide information about unauthorized cloud applications

Provide information about malicious emails detected by exchange online - Threat protection Status Provide information about email received that contains software designed to disrupt or damage computers - Malware Detections Provide information about unauthorized cloud applications - Discover Shadow IT

A company purchases Microsoft 365 E5.You need to determine which security features you should implement. Which features should you implement? Features: Microsoft Office 265 secure score Customer Lockbox Microsoft Defender for Office 365 Data Loss prevention Scenario Provide recommendations to reduce risk Control how a Microsoft support engineer accesses data during a help session Protect against unknown malware, viruses, and harmful URLS Identify sensitive data and create policies that help prevent users from accidently or intentionally sharing the data

Provide recommendations to reduce risk - Microsoft Office 265 secure score Control how a Microsoft support engineer accesses data during a help session - Customer Lockbox Protect against unknown malware, viruses, and harmful URLS - Microsoft Defender for Office 365 Identify sensitive data and create policies that help prevent users from accidently or intentionally sharing the data - Data Loss prevention

A company uses Microsoft 365.You need to identify billing and purchasing features in Microsoft 365. Features: Billing profile Billing invoice Subscription license Definition: Provides customization of invoices and payment options Provides summary of charges

Provides customization of invoices and payment options -Billing profile Provides summary of charges -Billing invoice

DRAG DROP - A company plans to use the reports that are available in Microsoft 365 usage analytics. Match each report to its description. Reports: Communication Collaboration Mobility Storage Usage Description: Provides number of active users and the primary activities of each product for the last 12 months Identifies patterns in the use of Microsoft teams and yammer among users Identifies the number of documents that are shared internally or externally

Provides number of active users and the primary activities of each product for the last 12 months Usage Identifies patterns in the use of Microsoft teams and yammer among users Communication Identifies the number of documents that are shared internally or externally Collaboration Usage ג€" Offers a drill-down view into the volume of active users and the key activities for each product for the last 12 months. Use the reports in this section to learn how people in your organization are using Microsoft 365. Communication ג€" You can see at a glance whether people in your organization prefer to stay in touch by using Teams, Yammer, email, or Skype calls. You can observe if there are shifts in patterns in the use of communication tools among your employees. Collaboration ג€" See how people in your organization use OneDrive and SharePoint to store documents and collaborate with each other, and how these trends evolve month over month. You can also see how many users shared documents internally or externally and how many users used SharePoint sites or OneDrive accounts, broken out by owners and other collaborators. Storage ג€" Use this report to track cloud storage for mailboxes, OneDrive, and SharePoint sites. Mobility ג€" Track which clients and devices people use to connect to email, Teams, Skype, or Yammer.

company plans to deploy Azure Active Directory (Azure AD). The company needs to purchase the appropriate Azure AD license or licenses while minimizing the cost. Match each Azure AD license to its requirement. Licenses: Azure AD Free Azure AD Premium P1 Azure AD Premium P2 Requirement Provides self-service password change for cloud users Provides self service group management for on premises and cloud users Provides Multi factor authentication for cloud users

Provides self-service password change for cloud users -Azure AD Free Provides self service group management for on premises and cloud users - Azure AD Premium P1 Provides Multi factor authentication for cloud users -Azure AD Free

A company that uses Microsoft 365 plans to deploy updates to computers. You need to choose the appropriate update channel based on each requirement. Which update channel should you use for each requirement? Update Channels: - Current - Monthly Enterprise - Semi Annual Enterprise Requirement: Provides the newest features as soon as they are ready Provides the newest feature updates on a schedule Provides the most amount of time to test feature updates

Provides the newest features as soon as they are ready - Current Provides the newest feature updates on a schedule - Monthly Enterprise Provides the most amount of time to test feature updates - Semi Annual Enterprise

A company is using Microsoft cloud services. You need to select the correct reports in the Microsoft 365 admin center. Match: Reports- Email Activity Mailbox Usage Email Apps Usage Active Users Definition: Report that shows the number of meeting integrations by users Report that shows the amount of storage used by users Report that shows the number of unique users that use outlook on the web

Report that shows the number of meeting integrations by users Email Activity Report that shows the amount of storage used by users Mailbox Usage Report that shows the number of unique users that use outlook on the web Email Apps Usage Box 1: Email activity -The Activity chart enables you to understand the trend of the amount of email activity going on in your organization. You can understand the split of email send, email read, email received, meeting created, or meeting interacted activities.Incorrect:You can use the Active Users report to find out how many product licenses are being used by individuals in your organization, and drill down for information about which users are using what products. This report can help administrators identify underutilized products or users that might need additional training or information. Box 2: Mailbox usage -The Mailbox usage report provides information about users with a user mailbox and the level of activity by each based on the email send, read, create appointment, send meeting, accept meeting, decline meeting and cancel meeting activity. It also provides information about how much storage has been consumed by each user mailbox, and how many of them are approaching storage quotas. Box 3: Email apps usage -In the email apps usage report, you can see how many email apps are connecting to Exchange Online. You can also see the version information of Outlook apps that users are using, which will allow you to follow up with those who are using unsupported versions to install supported versions of Outlook.

You are a Microsoft 365 administrator. You need to implement the appropriate features for each scenario. What should you implement? Scenario: Restrict access to Microsoft Outlook by using a Pin - Mobile application protection policy - Device configuration policy Secure members of the global administrators group by using dynamic risk policies: - Microsoft Azure AD identity protection - Microsoft Azure AD privilege Identity Management - Microsoft Azure AD domain services Secure Administrative roles by requiring approvals: - Microsoft Azure AD identity protection - Microsoft Azure AD privilege identity management - Microsoft Azure AD domain services

Restrict access to Microsoft Outlook by using a Pin - Mobile application protection policy Secure members of the global administrators group by using dynamic risk policies: - Microsoft Azure AD identity protection Secure Administrative roles by requiring approvals: - Microsoft Azure AD privilege identity management

You are the Microsoft 365 administrator for a company.Which Microsoft 365 components should employees use?Match each component to its task. To answer, drag the appropriate components from the column on the left to the tasks on the right. Each component may be used once, more than once, or not at all. Components: Windows 10 Enterprise Microsoft Exchange Online Microsoft Sharepoint Online Microsoft Teams Microsoft Enterprise Mobility + Security Task: Send an email to a distribution list Author a document at the same time as someone else and use document versioning Hold a voice and video conversations with other employees Register a personal device with the company View a personal calendar

Send an email to a distribution list -Microsoft Exchange Online Author a document at the same time as someone else and use document versioning -Microsoft Sharepoint Online Hold a voice and video conversations with other employees - Microsoft Teams Register a personal device with the company - Microsoft Enterprise Mobility + Security View a personal calendar - Microsoft Exchange Online

Y or N Sensitivity labels can be applied automatically and can also prompt users to apply a recommended label. Sensitivity labels can be used to restrict sharing of information on Sharepoint sites to external users Sensitivity labels can be used to manage conditional access policies for unmanaged devices

Sensitivity labels can be applied automatically and can also prompt users to apply a recommended label. -Y Sensitivity labels can be used to restrict sharing of information on Sharepoint sites to external users -Y Sensitivity labels can be used to manage conditional access policies for unmanaged devices -N

You are recommending strategies for a hybrid work environment. Y or N Support from managers is critical to making hybrid work a success Sharepoint online provides insights for managers and leaders to understand employee wellbeing and engagement workers can define a flexible work policy that gives people a choice in how, when, and where they work

Support from managers is critical to making hybrid work a success Y Sharepoint online provides insights for managers and leaders to understand employee wellbeing and engagement N workers can define a flexible work policy that gives people a choice in how, when, and where they work Y Box 1: Yes - Box 2: No -Instead use Microsoft Viva.With Microsoft Viva, weג€™re creating an employee experience platform that brings together employee engagement, learning and training, wellbeing experiences, and knowledge discovery directly in the flow of work. Employee engagement entails keeping people up to date on company news, making company resources readily accessible, and enabling people to connect across the organization to create communities and share knowledge. Box 3: Yes -

A company uses Microsoft Viva Insights. Y or N System administrators can access the insight of the other users from the viva insights app in MS teams Managers can access the insight of other users from the viva insight app on MS teams the insights in the viva insights app are based on a users exchange online mailbox data

System administrators can access the insight of the other users from the viva insights app in MS teams -N Managers can access the insight of other users from the viva insight app on MS teams -N the insights in the viva insights app are based on a users exchange online mailbox data -Y Box 1: No -The insights for individuals that this app presents are completely personal and private. Personal insights in the app are for your eyes only; neither your manager nor the system administration can see your insights. Box 2: No - Box 3: Yes -The personal insights and actions in the Viva Insights app are based on your Exchange Online mailbox data, such as email and calendar data. The insights are derived from data that isג€‰already availableג€‰to you in your Exchange Online mailbox. For example, if you want to determine what commitments you made to others, you could manually review each email in your mailbox. The Insights app simply saves you from this tedious process. Reference:https://docs.microsoft.com/en-us/viva/insights/personal/teams/viva-teams-app

You need to ensure that all users in your tenant have access to the earliest release of updates in Microsoft 365.Which organizational release option should you use? To answer, select the appropriate options in the answer area. Use the _____________________ Targeted release for entire organization Standard release targeted release for select users first release

Targeted release for entire organization

A company uses Microsoft 365.The company has the following requirements: ✑ Team 1 users need to use web-based email and calendaring. ✑ Team 2 users need to use email and calendaring. They also need to hold telephone calls with clients and host online meetings. ✑ Team 3 users need access to tools that provide task and shift management ✑ Licensing costs need to be minimized. Match each license to the appropriate users. Licneses: MS365 E3 MS 365 E5 Ms 365 F3 User Team 1 Team 2 Team 3

Team 1- Ms 365 F3 Team 2- MS 365 E5 Team 3-Ms 365 F3 https://www.microsoft.com/en-us/microsoft-365/enterprise/office-365-f3?activetab=pivot%3aoverviewtab https://www.microsoft.com/en-us/microsoft-365/enterprise/e5?activetab=pivot%3aoverviewtab

A company uses M 365 Y or N The M365 roadmap portal displays the specific month and year that a new feature of Microsoft teams will be generally available. The Microsoft 365 roadmap portal displays the specific day and month that a new feature of Microsoft Yammer will be available in a company's tenant. The Microsoft 365 roadmap portal allows for a company to provide feedback about specific Microsoft Office 365 features that are listed in the portal.

The M365 roadmap portal displays the specific month and year that a new feature of Microsoft teams will be generally available. Y The Microsoft 365 roadmap portal displays the specific day and month that a new feature of Microsoft Yammer will be available in a company's tenant. Y The Microsoft 365 roadmap portal allows for a company to provide feedback about specific Microsoft Office 365 features that are listed in the portal. Y

Y or N The MS 365 Roadmap portal lists MS 365 features that are in development The MS 365 roadmap portal lists Windows server features that are in development The MS 365 roadmap portal list Azure Active directory features that will be implemented

The MS 365 Roadmap portal lists MS 365 features that are in development -Y The MS 365 roadmap portal lists Windows server features that are in development -N The MS 365 roadmap portal list Azure Active directory features that will be implemented -Y

Y or N The MS Authenticator app allows users to sign in to any platform or browser by receiving a phone notification. Windows hello provides users with biometric authentication based on facial recognition or fingerprint matching Fast identity online (FIDO) allows users to sign in without a username or password by using OAuth hardware tokens

The MS Authenticator app allows users to sign in to any platform or browser by receiving a phone notification. - N Windows hello provides users with biometric authentication based on facial recognition or fingerprint matching -Y Fast identity online (FIDO) allows users to sign in without a username or password by using OAuth hardware tokens -N

Y or N The MS365 compliance center assesses a company's risk against industry and international regulations and standards M365 compliance manager is a component of the service trust portal Customers can use MS 365 compliance manager to grant a MS engineer access to perform a specific task

The MS365 compliance center assesses a company's risk against industry and international regulations and standards Y M365 compliance manager is a component of the service trust portal Y Customers can use MS 365 compliance manager to grant a MS engineer access to perform a specific task N

Y or N The Microsoft 365 user portal allows users to install desktop apps, use web apps, and share files in OneDrive The Microsoft 365 admin center allows administrators to manage applications and services available to users

The Microsoft 365 user portal allows users to install desktop apps, use web apps, and share files in OneDrive Y The Microsoft 365 admin center allows administrators to manage applications and services available to users Y

DRAG DROP - A company is evaluating the differences between Microsoft Exchange on-premises and Exchange online. You need to select the appropriate product for each requirement. Which product should you select? Products: Exchange Online Exchange On-premises Requirement: The company needs to directly apply security updates to the exchange server application The company needs to use M365 groups to send and receive email The company needs to use Microsoft Bookings

The company needs to directly apply security updates to the exchange server application Exchange Online The company needs to use M365 groups to send and receive email Exchange On-premises The company needs to use Microsoft Bookings Exchange On-premises

A company uses the Microsoft Intune Connector for Active Directory in Microsoft Endpoint Manager. Y or N The connector adds entries to on-premises Active Directory domains for computers that enroll by using windows autopilot the connector allows device access to Microsoft exchange servers if devices are compliant with preset intune policies the connector processes certificate requests from devices that use certificates for authentication

The connector adds entries to on-premises Active Directory domains for computers that enroll by using windows autopilot -Y the connector allows device access to Microsoft exchange servers if devices are compliant with preset Intune policies -N the connector processes certificate requests from devices that use certificates for authentication -Y Box 1: Yes -You can use Intune and Windows Autopilot to set up hybrid Azure Active Directory (Azure AD)-joined devices.The Intune Connector for your Active Directory creates autopilot-enrolled computers in the on-premises Active Directory domain. Box 2: No -Need the Intune Exchange connector as well. Box 3: Yes -Use certificates with Intune to authenticate your users to applications and corporate resources through VPN, Wi-Fi, or email profiles. When you use certificates to authenticate these connections, your end users won't need to enter usernames and passwords, which can make their access seamless. Certificates are also used for signing and encryption of email using S/MIME. Reference:https://docs.microsoft.com/en-us/mem/autopilot/windows-autopilot-hybrid https://docs.microsoft.com/en-us/mem/intune/protect/exchange-connector-install https://docs.microsoft.com/en-us/mem/intune/protect/certificates-configure

Y or N The direct Billing Cloud solution Provider (CSP) model allows customers to purchase licenses directly from MS The direct Bill cloud solution provider CSP model allows a single organizational point of contact for technical support The direct bill Cloud solution provider (CSP) model allows a single organizational point of contact for billing

The direct Billing Cloud solution Provider (CSP) model allows customers to purchase licenses directly from MS -N The direct Bill cloud solution provider CSP model allows a single organizational point of contact for technical support -Y The direct bill Cloud solution provider (CSP) model allows a single organizational point of contact for billing -Y

You add a comment to a Word document that includes the @ sign and a userג€™s name. Y or N The email notification that the user receives displays a preview of the document text and the associated comment When the user clicks the link in the email, the document opens to comment in the file The user can respond to the comment in the document directly from the email.

The email notification that the user receives displays a preview of the document text and the associated comment Y When the user clicks the link in the email, the document opens to comment in the file Y The user can respond to the comment in the document directly from the email. Y

A company uses Microsoft Teams. Y or N Third party apps can be installed in Microsoft Teams Custom Apps created by a company can be installed in Microsoft Teams Microsoft store apps can be installed in Microsoft teams

Third party apps can be installed in Microsoft Teams Y Custom Apps created by a company can be installed in Microsoft Teams Y Microsoft store apps can be installed in Microsoft teams N Box 1: Yes -Microsoft is allowing third-party app developers to integrate into the Microsoft Teams meeting experience for the first time. The new developer-focused features will let apps integrate into Teams meetings during video calls, and even before and after meetings. You can purchase third-party apps for Teams. Box 2: Yes - Box 3: No -You purchase and manage the apps through Microsoft Teams admin center.

Match: Tools: Azure AD Identity Protection Azure Advanced threat protection Microsoft Exchange Online Protection O365 Threat Intelligence Requirement: Use Artificial intelligence to detect anomalies and suspicious incidents Identify and detect malicious insider actions to make it more difficult to compromise user credentials Protect against spam and help prevent messaging policy violations Scan emails and URLs to identify impersonations and malicious files.

Use Artificial intelligence to detect anomalies and suspicious incidents - O365 Threat Intelligence Identify and detect malicious insider actions to make it more difficult to compromise user credentials - Azure AD Identity Protection Protect against spam and help prevent messaging policy violations -Microsoft Exchange Online Protection Scan emails and URLs to identify impersonations and malicious files - Azure Advanced threat protection

Match: Cloud Service - Infrastructure as a service - Software a s a service - Windows as a service Requirement: Use Microsoft Outlook on the Web Test Microsoft Insider preview branch versions of windows software Deploy Virtual machines quickly

Use Microsoft Outlook on the Web Software a s a service Test Microsoft Insider preview branch versions of windows software Windows as a service Deploy Virtual machines quickly Infrastructure as a service

Your company has a Microsoft 365 subscription. You need to implement security policies to ensure that sensitive data is protected. Which tools should you use? Tools: Compliance Manager Identity and access management Information rights management Scenario: Use the MS authentication app to enable multi-factor authentication Classify documents to restrict permission to content Use a dashboard for data protection recommendations Provide auditors and regulators with reports on data protection skills

Use the MS authentication app to enable multi-factor authentication -Identity and access management Classify documents to restrict permission to content -Information rights management Use a dashboard for data protection recommendations -Compliance Manager Provide auditors and regulators with reports on data protection skills -Compliance Manager

You plan to deploy the Report Message add-in to Microsoft Outlook. How can you deploy the add-in? Use the services and add ins menu in the Microsoft 365 admin center to deploy the add in Create a Microsoft Intune application policy to deploy the add in Use configuration manager to deploy the add in

Use the services and add ins menu in the Microsoft 365 admin center to deploy the add in Y Create a Microsoft Intune application policy to deploy the add in N Use configuration manager to deploy the add in N https://docs.microsoft.com/en-us/office365/securitycompliance/enable-the-report-message-add-in

Match each authentication identity to its scenario. Authentication Identities: Azure Active Directory Identity Only Azure directory identity only Azure active directory identity and Azure directory identity Scenario Used to provide authentication for M365 services Used to provide authentication for exchange server

Used to provide authentication for M365 services -Azure Active Directory Identity Only Used to provide authentication for exchange server -Azure active directory identity and Azure directory identity

You are the Microsoft Office 365 administrator for a company.The company has the following requirements:✑ Users must be able to use incompatible applications on a Windows 10 device.Cloud-based applications must use the same credentials as on-premises applications. ✑ Users must be prevented from copying company data from managed applications installed on unmanaged devices. You need to determine which technologies should be used for each requirement. Which technologies should be used? Users Must be able to use incompatible applications on a windows 10 device: - Windows Virtual Desktop - Azure AD application Proxy - Azure AD connect - Microsoft Intune Cloud based applications must use the same credentials as on-premises applications: - Windows Virtual Desktop - Azure AD application Proxy - Azure AD connect - Microsoft Intune Users must be prevented from copying company data from managed applications installed on unmanaged devices. - Windows Virtual Desktop - Azure AD application Proxy - Azure AD connect - Microsoft Intune

Users Must be able to use incompatible applications on a windows 10 device: - Windows Virtual Desktop Cloud based applications must use the same credentials as on-premises applications: - Azure AD connect Users must be prevented from copying company data from managed applications installed on unmanaged devices. - Microsoft Intune

You are a Microsoft 365 administrator for a company. The company implements federated authentication. Y or N Users have the same password in the cloud and on premises Users sign in again to access M365 You can configure federated authentication to require a smart card

Users have the same password in the cloud and on premises Y Users sign in again to access M365 N You can configure federated authentication to require a smart card Y

A company plan to deploy Microsoft 365 services. You need to choose the appropriate cloud service for each requirement. Cloud Services: - Exchange online - Microsoft Teams - Yammer - Microsoft Stream Requirement: Users must be able to chat, host meetings, and make calls with internal and external users Users must be able to create posts, tag people and communities, and use social tagging

Users must be able to chat, host meetings, and make calls with internal and external users Microsoft Teams Users must be able to create posts, tag people and communities, and use social tagging Yammer

Y or N Using OneDrive for business as a target for backups is an example of a platform as a service Paas Using OneDrive for business in Office 365 excel online to open excel files is an example of software as a service (Saas)

Using OneDrive for business as a target for backups is an example of a platform as a service Paas No Using OneDrive for business in Office 365 excel online to open excel files is an example of software as a service (Saas) Yea

You manage point-of-sale terminals that run Windows 7.You must upgrade the terminals to Windows 10. Terminals will not be upgraded again for at least five years. You have the following requirements: ✑ Perform consistent scheduling of upgrades across all devices. ✑ Minimize costs. You need to prepare for the upgrades. What should you use? Windows 10 version: - Windows 10 Pro - Windows 10 Home - Windows 10 Enterprise - Windows 10 Enterprise LTSC Servicing Channel - Semi-annual channel - Long-term servicing channel - semi annual channel (targeted) - Insider Servicing tool: - Microsoft Intune - Windows Autopilot - Windows Server update services - System center configuration

Windows 10 version: - Windows 10 Enterprise LTSC Servicing Channel - Long-term servicing channel Servicing tool: - Windows Server update services

Y or N With cloud-only identities, Azure AD connect synchronizes accounts from an on premises active directory domain services AD DS domain to MS 365 With Hybrid identities, user accounts in azure AD can have a password hash of the user account in an on premises AD DS domain

With cloud-only identities, Azure AD connect synchronizes accounts from an on premises active directory domain services AD DS domain to MS 365 -N With Hybrid identities, user accounts in azure AD can have a password hash of the user account in an on premises AD DS domain -Y

A company uses Microsoft 365.The company needs information about the collaboration patterns that impact employee productivity. You need to identify the solution that meets the requirement. Which solution should you choose? A. MyAnalytics B. Workplace Analytics C. Microsoft 365 admin center D. Azure Analytics

Workplace Analytics

You implement Microsoft Azure Information Protection. Y or N You can supplement the default templates to apply restrictive controls Classification and protection information is available for on-premises file servers Installing the Azure information protection client installs an information protection bar to Microsoft excel

You can supplement the default templates to apply restrictive controls -Y Classification and protection information is available for on-premises file servers -Y Installing the Azure information protection client installs an information protection bar to Microsoft excel -Y

Y or N You can use Microsoft Teams and Sharepoint newsfeed to provide enterprise social features in Sharepoint. You can disable the enterprise social collaboration feature in Sharepoint You can use different enterprise social collaboration services in Sharepoint simultaneously.

You can use Microsoft Teams and Sharepoint newsfeed to provide enterprise social features in Sharepoint. Y You can disable the enterprise social collaboration feature in Sharepoint Y You can use different enterprise social collaboration services in Sharepoint simultaneously. N Box 1: Yes -Your SharePoint newsfeed is where you can see what your co-workers are doing throughout your work day and share ideas and observations as they occur to you. You can change what you share with the newsfeed settings.Depending on your newsfeed settings, the feed may also send emails to you to notify you of events, such as when someone mentions you in a post, and it may show your activities, such as when youג€™ve started following someone. You control email notifications and which of your activities you want to share with others. Box 2: Yes -The option to hide Newsfeed was removed under Show or Hide Options. You can choose to Use Yammer.com service to hide Newsfeed if your organization do not have Yammer license. However, by doing this, users still can access Newsfeed via URL. So, we suggest you follow the steps below to disable Newsfeed activities.1. Sign in to Office 365 with your work or school account.2. Go to the SharePoint admin center.3. Select user profiles.4. Under My Site Settings, click Setup My Sites.5. In the Newsfeed section, select or clear the Enable activities in My Site newsfeeds check box.6. Click OK. Box 3: No -Office 365 includes two options for enterprise social features in SharePoint: Yammer and Newsfeed. The SharePoint administrator selects which option users see when they click Conversations in SharePoint. By default, users see Newsfeed.

Y or N You can use co management if you use configuration manager to deploy apps and need to deploy conditional access policies You can use windows autopilot to manage Microsoft office, Microsoft Edge, and windows settings by using administrative policies You can use Desktop Analytics if you use configuration manager and need to identify application compatibility issues with windows 10 feature updates.

You can use co management if you use configuration manager to deploy apps and need to deploy conditional access policies Y You can use windows autopilot to manage Microsoft office, Microsoft Edge, and windows settings by using administrative policies N You can use Desktop Analytics if you use configuration manager and need to identify application compatibility issues with windows 10 feature updates. Y

A company plans to implement Microsoft Information Protection (MIP). Y or N You can use sensitivity labels to allow users in another organization to review the content of an encrypted email for a specified number of days You can use sensitivity labels to add watermark to the body of an email You can use sensitivity labels to protect content in MS teams sites, MS 365 groups, and Sharepoint sites

You can use sensitivity labels to allow users in another organization to review the content of an encrypted email for a specified number of days -Y You can use sensitivity labels to add watermark to the body of an email -Y You can use sensitivity labels to protect content in MS teams sites, MS 365 groups, and Sharepoint sites -Y

Y or N You can use sensitivity labels to encrypt emails and documents You can use sensitivity labels to control read and write access to a word document as well as permission levels to modify the contents Sensitivity labels can apply watermarks within a word document to indicate that the document is for internal company use only.

You can use sensitivity labels to encrypt emails and documents Y You can use sensitivity labels to control read and write access to a word document as well as permission levels to modify the contents Y Sensitivity labels can apply watermarks within a word document to indicate that the document is for internal company use only. Y


संबंधित स्टडी सेट्स

Chapter 22: Care of Patients with Cancer

View Set

Chapter 8: Capital Accumulation and Population Growth

View Set

Chapter 33: The Child with an Emotional or Behavioral Condition

View Set

Humana Life and Health Insurance Terms

View Set

Geography Chapter 9 Middle America

View Set