For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point

HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View Answer Answer: Explanation: Graphical user interface, text, application, email Description automatically generated Box 1: No Compliance Manager tracks Microsoft managed controls, customer-managed controls, and shared controls. Box 2:...

Continue reading

Which security methodology does this represent?

You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure. Which security methodology does this represent?A . threat modelingB . identity as the security perimeterC . defense in depthD . the shared responsibility model View Answer Answer: C Explanation: Reference: https://docs.microsoft.com/en-us/learn/modules/secure-network-connectivity-azure/2-what-is-defense-in-depth...

Which two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Which two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . Display policy tips to users who are about to violate your organization’s policies.B . Enable disk encryption on endpoints.C . Protect documents...

Continue reading

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . text message (SMS)B . Microsoft Authenticator appC . email verificationD . phone callE . security question View Answer Answer: A,B,D Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-methods...

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point

HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View Answer Answer: Explanation: Graphical user interface, text, application, email Description automatically generated Box 1: Yes The MailItems Accessed event is a mailbox auditing action and is triggered when...

Continue reading

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point

HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View Answer Answer: Explanation: Graphical user interface, text, application, email Description automatically generated Box 1: Yes A certificate is required that provides a private and a public key. Box...

Continue reading