ExamGecko
Home Home / Microsoft / MS-900

Microsoft MS-900 Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











Your company purchases Microsoft 365 E3 and Azure AD P2 licenses.

You need to provide identity protection against login attempts by unauthorized users.

What should you implement?

A.

Azure AD Identity Protection

A.

Azure AD Identity Protection

Answers
B.

Azure AD Privileged Identity Management

B.

Azure AD Privileged Identity Management

Answers
C.

Azure Information Protection

C.

Azure Information Protection

Answers
D.

Azure Identity and Access Management

D.

Azure Identity and Access Management

Answers
Suggested answer: A

Explanation:

Reference: https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview

You are a Microsoft 365 administrator for a company. Employees use Microsoft Office 365 ProPlus to create documents. You need to implement document classification and protection by using Microsoft Azure Information Protection. Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

Add an Azure subscription to your Microsoft 365 tenant

A.

Add an Azure subscription to your Microsoft 365 tenant

Answers
B.

Install the Azure Information Protection client

B.

Install the Azure Information Protection client

Answers
C.

Create a custom Azure Information Protection policy with the Confidential label

C.

Create a custom Azure Information Protection policy with the Confidential label

Answers
D.

Enable the default Azure Information Protection policy

D.

Enable the default Azure Information Protection policy

Answers
E.

Install the Rights Management Service client

E.

Install the Rights Management Service client

Answers
Suggested answer: A, D

Explanation:

Reference: https://docs.microsoft.com/en-us/azure/information-protection/requirements https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-default

A company deploys Microsoft Azure AD. You run the Identity Secure Score report. The report displays five security items. Which three security items on the report have the most impact on the score? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

A.

Enable policy to block legacy authentication.

A.

Enable policy to block legacy authentication.

Answers
B.

Enable user risk policy.

B.

Enable user risk policy.

Answers
C.

Require multi-factor authentication for all users.

C.

Require multi-factor authentication for all users.

Answers
D.

Delete/block accounts not used in last 30 days.

D.

Delete/block accounts not used in last 30 days.

Answers
E.

Do not expire passwords.

E.

Do not expire passwords.

Answers
Suggested answer: A, B, C

Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender/microsoft-secure-score?view=o365-worldwide

A company deploys Microsoft Azure AD. You enable multi-factor authentication.

You need to inform users about the multi-factor authentication methods that they can use.

Which of the following methods is NOT a valid multi-factor authentication method in Microsoft 365?

A.

Receive an automated call on the desk phone that includes a verification code.

A.

Receive an automated call on the desk phone that includes a verification code.

Answers
B.

Use the Microsoft Authenticator mobile application to receive a notification and authenticate.

B.

Use the Microsoft Authenticator mobile application to receive a notification and authenticate.

Answers
C.

Receive a call on a phone.

C.

Receive a call on a phone.

Answers
D.

Enter a Windows 10 PIN code when prompted.

D.

Enter a Windows 10 PIN code when prompted.

Answers
Suggested answer: D

You deploy Enterprise Mobility + Security E5 and assign Microsoft 365 licenses to all employees.

Employees must not be able to share documents or forward emails that contain sensitive information outside the company. You need to enforce the file sharing restrictions.

What should you do?

A.

Use Microsoft Azure Information Protection to define a label. Associate the label with an Azure Rights Management template that prevents the sharing of files or emails that are marked with the label.

A.

Use Microsoft Azure Information Protection to define a label. Associate the label with an Azure Rights Management template that prevents the sharing of files or emails that are marked with the label.

Answers
B.

Create a Microsoft SharePoint Online content type named Sensitivity. Apply the content type to other content types in Microsoft 365. Create a Microsoft Azure Rights Management template that prevents the sharing of any content where the Sensitivity column value is set to Sensitive.

B.

Create a Microsoft SharePoint Online content type named Sensitivity. Apply the content type to other content types in Microsoft 365. Create a Microsoft Azure Rights Management template that prevents the sharing of any content where the Sensitivity column value is set to Sensitive.

Answers
C.

Use Microsoft Azure Information Rights Protection to define a label. Associate the label with an Active Directory Rights Management template that prevents the sharing of files or emails that are marked with the label.

C.

Use Microsoft Azure Information Rights Protection to define a label. Associate the label with an Active Directory Rights Management template that prevents the sharing of files or emails that are marked with the label.

Answers
D.

Create a label named Sensitive. Apply a Data Layer Protection policy that notifies users when their document contains personally identifiable information (PII).

D.

Create a label named Sensitive. Apply a Data Layer Protection policy that notifies users when their document contains personally identifiable information (PII).

Answers
Suggested answer: A

You manage a local Active Directory Domain Services environment. Your company purchases an Enterprise E1 license for all users. You need to implement self-service password reset. You want to achieve this goal while minimizing costs. Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

Upgrade your subscription to Azure AD Premium P2.

A.

Upgrade your subscription to Azure AD Premium P2.

Answers
B.

Deploy Azure AD Connect.

B.

Deploy Azure AD Connect.

Answers
C.

Deploy Azure Information Protection.

C.

Deploy Azure Information Protection.

Answers
D.

Upgrade your subscription to Azure AD Premium P1.

D.

Upgrade your subscription to Azure AD Premium P1.

Answers
Suggested answer: B, D

You are a Microsoft 365 administrator for a company.

What are two ways that you can ensure data security? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

A.

service-level encryption using customer-provided key

A.

service-level encryption using customer-provided key

Answers
B.

tenant-dedicated Microsoft Azure AD encryption using customer-provided key

B.

tenant-dedicated Microsoft Azure AD encryption using customer-provided key

Answers
C.

single-tenant infrastructure partitions for sensitive data

C.

single-tenant infrastructure partitions for sensitive data

Answers
D.

data transfer using transport-layer security (TLS)

D.

data transfer using transport-layer security (TLS)

Answers
Suggested answer: A, D

You are a Microsoft 365 administrator for a company.

You need to identify security vulnerabilities by using the Office 365 Attack Simulator.

Which three attack simulations are available? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

Brute-force password

A.

Brute-force password

Answers
B.

Cross-site scripting

B.

Cross-site scripting

Answers
C.

Password-spray

C.

Password-spray

Answers
D.

Denial-of-service

D.

Denial-of-service

Answers
E.

Display name spear-phishing

E.

Display name spear-phishing

Answers
Suggested answer: A, C, E

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/attack-simulator

Your organization plans to deploy Microsoft 365 in a hybrid scenario.

You need to ensure that employees can use a smart card for authentication.

Which hybrid identity solution should you implement?

A.

password hash synchronization with single sign-on

A.

password hash synchronization with single sign-on

Answers
B.

Active Directory Federation Services (AD FS)

B.

Active Directory Federation Services (AD FS)

Answers
C.

PingFederate and federation integration

C.

PingFederate and federation integration

Answers
D.

pass-through authentication and single sign-on

D.

pass-through authentication and single sign-on

Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/security/azure-ad-choose-authn

You need to ensure that the process by which users sign in to Microsoft 365 confirms the identity of the user. Which feature should you use?

A.

mobile application management (MAM)

A.

mobile application management (MAM)

Answers
B.

Advanced Threat Protection (ATP)

B.

Advanced Threat Protection (ATP)

Answers
C.

Multi-Factor Authentication (MFA)

C.

Multi-Factor Authentication (MFA)

Answers
D.

data loss prevention (DLP) policies

D.

data loss prevention (DLP) policies

Answers
Suggested answer: C

Explanation:

Multi-Factor Authentication (MFA) is a two-step identity verification system that can be used to authenticate users.

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-mfa-howitworks

Total 403 questions
Go to page: of 41