Practice Test Flashcards
When you log in to the Microsoft Purview compliance portal as a compliance data administrator, which of the following compliance solutions would you see in the Solutions catalog? Select three options.
a. Communication compliance
b. Microsoft 365 compliance center
c. Insider risk management
d. Data loss prevention
e. Microsoft 365 Defender
a. Communication compliance
c. Insider risk management
d. Data loss prevention
Which of the following statements about sign-in risk and user risk is TRUE?
a. User risk denotes a probability that the account owner did not authorize
b. Sign-in risk denotes a probability that the identity owner did not perform the authentication request
c. Sign-in risk represents the probability that an account is compromised
d. Azure AD Identity Protection calculates the user risks in real life
b. Sign-in risk denotes a probability that the identity owner did not perform the authentication request
Microsoft Sentinel ingests data to provide intelligent security analytics across your enterprise. Where is the ingested data stored?
a. Azure Data Explorer
b. Azure Log Analytics workspace
c. Azure Data Lake storage
d. Azure Monitor
b. Azure Log Analytics workspace
To learn Azure, you sign up for a free Azure subscription. Which Azure AD role is assigned to you?
a. Account Administrator
b. Owner
c. Global Admin
d. Global Administrator
d. Global Administrator
CIA is a way to think about security trade-offs. What does the initialism CIA stand for?
a. Credentials, Integrity, Accessibility
b. Confidentiality, Integrity, Availability
c. Confidentiality, Integrity, Accessibility
d. Credentials, Integrity, Availability
b. Confidentiality, Integrity, Availability
A customer moves his on-premises workloads to the cloud. After the migration, Microsoft takes care of Compute and Storage, while the customer still takes care of his organization’s identities.
Where do you think he has hosted his workload?
a. IaaS
b. SaaS
c. PaaS
d. He could have hosted anywhere on IaaS or SaaS or PaaS
d. He could have hosted anywhere on IaaS or SaaS or PaaS
You authenticate organizational users who access SharePoint farm (in the company’s data centers) and SaaS apps like Dynamics 365.
Which of the following is NOT an authentication method used to achieve hybrid identity?
a. Pass-through synchronization
b. Pass-through authentication
c. Federation
d. Password hash synchronization
a. Pass-through synchronization
This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
Your organization has purchased the Microsoft Defender for Office 365 (Plan 2) subscription for the entire tenant. You need to view information about the current cybersecurity issues and prepare a plan to protect your organization from such threats.
Solution: You look for the information under Threat Explorer in the Microsoft 365 Defender portal.
Does the solution meet the stated goal?
a. Yes
b. No
b. No
This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
Your organization has purchased the Microsoft Defender for Office 365 (Plan 2) subscription for the entire tenant. You need to view information about the current cybersecurity issues and prepare a plan to protect your organization from such threats.
Solution: You look for the information under Attack Simulator in the Microsoft 365 Defender portal.
Does the solution meet the stated goal?
A. Yes
B. No
B. No
This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
Your organization has purchased the Microsoft Defender for Office 365 (Plan 2) subscription for the entire tenant. You need to view information about the current cybersecurity issues and prepare a plan to protect your organization from such threats.
Solution: You look for the information under Threat Trackers in the Microsoft 365 Defender portal.
Does the solution meet the stated goal?
a. Yes
b. No
a. Yes
To establish a minimum level of protection for your company’s assets, you enable security defaults in Azure AD.
Which of the following security features do they NOT enforce?
a. Requiring users to perform multi-factor authentication registration within 14 days
b. Blocking legacy authentication protocols like IMAP, SMTP
c. Protecting access to Azure Powershell with MFA
d. Requiring users to perform multi-factor authentication for every sign-in
d. Requiring users to perform multi-factor authentication for every sign-in
Which software/service is the identity & access management solution in the Microsoft Cloud?
a. Azure Active Directory
b. Azure AD Identity Protection
c. Azure AD Connect
d. Active Directory Federation Services
a. Azure Active Directory
Azure AD Identity Protection calculates the user risk/sign-risk. Which of the following risk detections is an example of a user risk?
a. Anonymous IP address
b. Atypical travel
c. Password spray
d. Leaked credentials
d. Leaked credentials
The users in your organization receive email messages from external networks in their company’s inbox. Some of emails are received with file attachments.
You need to ensure that users can access the attached files only after they are verified for malicious content. Which minimum plan of Microsoft Defender for Office 365 would you need to purchase?
a. Microsoft Defender for Office 365 Plan 2
b. Microsoft Defender for Office 365 Plan 1
c. Microsoft Defender for Office 365 Premium
d. None of the plans offer this feature
b. Microsoft Defender for Office 365 Plan 1
You use Teams in your organization for internal communication. Microsoft scans your messages to show relevant ads to give you a good user experience.
Does it violate Microsoft’s privacy principle?
a. Yes
b. No
a. Yes
You have workloads hosted in Windows & Linux VMs on Azure, AWS, and on-premises environments.
Which of the following services helps you to scan for vulnerabilities against external threats?
a. Microsoft Defender for Endpoint
b. Microsoft Defender for Cloud
c. Microsoft Defender for Cloud Apps
d. Microsoft 365 Defender
b. Microsoft Defender for Cloud
Cloud security posture refers to a company’s security status of its assets (hardware and software) against cyber threats.
Which of the following tools helps you to strengthen the company’s security posture?
a. Azure Defender
b. Microsoft Defender for Cloud
c. Microsoft Defender for Cloud Apps
d. Microsoft 365 Defender
b. Microsoft Defender for Cloud
You manage users who access resources in both the cloud and the on-premises environments (hybrid scenario). As an admin, you enable them to reset their passwords.
What is the minimum Azure Active Directory edition required to ensure that those updated passwords are written back to the on-premises Active Directory Domain Services?
a. Azure Active Directory Free
b. Azure Active Directory Premium P1
c. Azure Active Directory Premium P2
d. Office 365 Apps
b. Azure Active Directory Premium P1
A user wants to listen to music. So, he logs into the Spotify app with his Google account.
Based on the above scenario, which of the following is NOT True?
a. Azure AD used by Spotify trusts Google
b. There is a trust relationship between Spotify’s Azure AD and Google
c. Google trusts Spotify’s Azure AD
d. The user does not need a separate username and password to log into Spotify
c. Google trusts Spotify’s Azure AD
Which of the following concepts presumes that you shouldn’t trust anyone, even in your internal organizational networks?
a. Zero-trust model
b. The Principle of Least Privilege
c. Principle of need to know
d. Trust but verify
a. Zero-trust model
Which of the following components enables you to score a group of controls from a specific regulation in the Microsoft Purview Compliance Manager?
a. Templates
b. Assessments
c. Improvement Actions
d. Control family
b. Assessments
Microsoft Sentinel is a scalable, cloud-native SIEM/SOAR solution. What do the acronyms stand for?
a. Security Incident Event Management (SIEM), Security Orchestration Automated Response
b. Security Information Event Management (SIEM), Security Orchestration Automated Response (SOAR)
c. Security Incident Event Management (SIEM), Security Orchestration Automated Response (SOAR)
d. Security Information Event Management (SIEM), Security Orchestration Autonomous Response (SOAR)
b. Security Information Event Management (SIEM), Security Orchestration Automated Response (SOAR)
A few years back, Taylor joined your organization as an IT analyst. Over the course of several years, she takes additional roles and responsibilities as she moves through the organizational ladder.
How do you automate her changing access needs in Azure AD?
a. With dynamic groups
b. With security groups
c. With assigned groups
d. With privileged access groups
a. With dynamic groups