Topic 3 Flashcards
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- With Advanced Audit in Microsoft 365, you can identify when email items were accessed
- Advanced Audit in Microsoft 365 supports the same retention period of audit logs as core auditing
- Advanced Audit in Microsoft 365 allocates customer-dedicated bandwidth for accessing audit data
- With Advanced Audit in Microsoft 365, you can identify when email items were accessed → Yes
- Advanced Audit in Microsoft 365 supports the same retention period of audit logs as core auditing → No
- Advanced Audit in Microsoft 365 allocates customer-dedicated bandwidth for accessing audit data → Yes
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Azure Active Directory (Azure AD) Identity Protection can add users to groups based on the users’ risk level
- Azure Active Directory (Azure AD) Identity Protection can detect whether user credentials were leaked to the public
- Azure Active Directory (Azure AD) Identity Protection can be used to invoke Multi-Factor Authentication based on a user’s risk level
- Azure Active Directory (Azure AD) Identity Protection can add users to groups based on the users’ risk level → No
- Azure Active Directory (Azure AD) Identity Protection can detect whether user credentials were leaked to the public → Yes
- Azure Active Directory (Azure AD) Identity Protection can be used to invoke Multi-Factor Authentication based on a user’s risk level → Yes
Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft SharePoint Online site that contain a specific key word?
A. Audit
B. Compliance Manager
C. Content Search
D. Alerts
C. Content Search
Select the answer that correctly completes the sentence.
- Azure Defender
- Microsoft Purview Compliance Portal
- The Microsoft Defender portal
- Microsoft Endpoint Manager
↘
provides a central location for managing information protection, information governance, and data loss prevention (DLP) policies.
Microsoft Purview Compliance Portal
Which Microsoft 365 feature can you use to restrict users from sending email messages that contain lists of customers and their associated credit card numbers?
A. retention policies
B. data loss prevention (DLP) policies
C. conditional access policies
D. information barriers
B. data loss prevention (DLP) policies
Select the answer that correctly completes the sentence.
- Customer Lockbox
- Information barriers
- Privileged Access Management (PAM)
- Sensitivity labels
↘
can be used to provide Microsoft Support Engineers with access to an organization’s data stored in Microsoft Exchange Online, SharePoint Online, and OneDrive for Business.
- Customer Lockbox
In a Core eDiscovery workflow, what should you do before you can search for content?
A. Create an eDiscovery hold.
B. Run Express Analysis.
C. Configure attorney-client privilege detection.
D. Export and download results.
A. Create an eDiscovery hold.
Which Microsoft portal provides information about how Microsoft manages privacy, compliance, and security?
A. Microsoft Service Trust Portal
B. Compliance Manager
C. Microsoft 365 compliance center
D. Microsoft Support
A. Microsoft Service Trust Portal
What can you protect by using the information protection solution in the Microsoft 365 compliance center?
A. computers from zero-day exploits
B. users from phishing attempts
C. files from malware and viruses
D. sensitive data from being exposed to unauthorized users
D. sensitive data from being exposed to unauthorized users
What can you specify in Microsoft 365 sensitivity labels?
A. how long files must be preserved
B. when to archive an email message
C. which watermark to add to files
D. where to store files
C. which watermark to add to files
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- You can use Advanced Audit in Microsoft 365 to view billing details
- You can use Advanced Audit in Microsoft 365 to view the contents of an email message
- You can use Advanced Audit in Microsoft 365 to identify when a user uses the search bar in Outlook on the web to search for items in a mailbox
- You can use Advanced Audit in Microsoft 365 to view billing details → No
- You can use Advanced Audit in Microsoft 365 to view the contents of an email message → No
- You can use Advanced Audit in Microsoft 365 to identify when a user uses the search bar in Outlook on the web to search for items in a mailbox → Yes
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- You can add a resource lock to an Azure subscription
- You can add only one resource lock to an Azure resource
- You can delete a resource group containing resources that have resource locks
- You can add a resource lock to an Azure subscription → Yes
- You can add only one resource lock to an Azure resource → No
- You can delete a resource group containing resources that have resource locks → No
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Users can apply sensitivity labels manually
- Multiple sensitivity labels can be applied to the same file
- A sensitivity label can apply a watermark to a Microsoft Word document
- Users can apply sensitivity labels manually → Yes
- Multiple sensitivity labels can be applied to the same file → No
- A sensitivity label can apply a watermark to a Microsoft Word document → Yes
Which two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365?
A. Display policy tips to users who are about to violate your organization’s policies.
B. Enable disk encryption on endpoints.
C. Protect documents in Microsoft OneDrive that contain sensitive information.
D. Apply security baselines to devices.
A. Display policy tips to users who are about to violate your organization’s policies.
C. Protect documents in Microsoft OneDrive that contain sensitive information.
Select the answer that correctly completes the sentence.
Compliance Manager assesses compliance data _______ for an organization.
↘
- continually
- monthly
- on-demand
- quarterly
continually
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Sensitivity labels can be used to encrypt documents
- Sensitivity labels can add headers and footers to documents
- Sensitivity labels can apply watermarks to emails
- Sensitivity labels can be used to encrypt documents → Yes
- Sensitivity labels can add headers and footers to documents → Yes
- Sensitivity labels can apply watermarks to emails → No
Which Microsoft 365 compliance feature can you use to encrypt content automatically based on specific conditions?
A. Content Search
B. sensitivity labels
C. retention policies
D. eDiscovery
B. sensitivity labels
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Compliance Manager tracks only customer-managed controls
- Compliance Manager provides predefined templates for creating assessments
- Compliance Manager can help you assess whether data adheres to specific data protection standards
- Compliance Manager tracks only customer-managed controls → No
- Compliance Manager provides predefined templates for creating assessments → Yes
- Compliance Manager can help you assess whether data adheres to specific data protection standards → Yes
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- You can use the insider risk management solution to detect phishing scams
- You can access the insider risk management solution from the Microsoft 365 compliance center
- You can use the insider risk management solution to detect data leaks by unhappy employees
- You can use the insider risk management solution to detect phishing scams → No
- You can access the insider risk management solution from the Microsoft 365 compliance center → Yes
- You can use the insider risk management solution to detect data leaks by unhappy employees → Yes
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Azure Policy supports automatic remediation
- Azure Policy can be used to ensure that new resources adhere to corporate standards
- Compliance evaluation in Azure Policy occurs only when a target resource is created or modified
- Azure Policy supports automatic remediation → Yes
- Azure Policy can be used to ensure that new resources adhere to corporate standards → Yes
- Compliance evaluation in Azure Policy occurs only when a target resource is created or modified → No
- Same as question 155-
Match the Microsoft 365 insider risk management workflow step to the appropriate task.
Steps
- Action
- Investigate
- Triage
Answer Area
- Review and filter alerts
- Create cases in the Case dashboard
- Send a reminder of corporate policies to users
Action → Send a reminder of corporate policies to users
Investigate → Create cases in the Case dashboard
Triage → Review and filter alerts
Which two cards are available in the Microsoft 365 Defender portal?
A. Devices at risk
B. Compliance Score
C. Service Health
D. User Management
E. Users at risk
A. Devices at risk
E. Users at risk
What should you use to ensure that the members of an Azure Active Directory group use multi-factor authentication (MFA) when they sign in?
A. Azure role-based access control (Azure RBAC)
B. Azure Active Directory (Azure AD) Privileged Identity Management (PIM)
C. Azure Active Directory (Azure AD) Identity Protection
D. a conditional access policy
D. a conditional access policy
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- Azure Active Directory (Azure AD) Identity Protection generates risk detections once a user is authenticated
- Azure Active Directory (Azure AD) Identity Protection assigns a risk level of Low, Medium, or High to each risk event
- A user risk in Azure Active Directory (Azure AD) Identity Protection represents the probability that a given identity or account is compromised
- Azure Active Directory (Azure AD) Identity Protection generates risk detections once a user is authenticated → Yes
- Azure Active Directory (Azure AD) Identity Protection assigns a risk level of Low, Medium, or High to each risk event → Yes
- A user risk in Azure Active Directory (Azure AD) Identity Protection represents the probability that a given identity or account is compromised → Yes