FREE MS-900 Module 02 Questions and Answers
For PTG Ltd., Maurice serves as the Office 365 administrator. Before sending any updates to the entire firm, he has been instructed to complete security and compliance reviews. Which choice from the list below ought to George use to fulfill the requirement?
Maurice should use "Targeted Releases" to fulfill the requirement of completing security and compliance reviews before sending updates to the entire firm. Targeted Releases, also known as "Targeted Release for select users," is a feature in Office 365 that allows administrators to roll out new updates, features, and changes to a limited subset of users before making them available to the entire organization. By selecting this option, Maurice can choose a group of users who will receive the updates early. This provides an opportunity to test and review the updates for security and compliance concerns before deploying them to the entire firm. It helps ensure that any potential issues are identified and addressed before the updates reach a wider audience, maintaining the security and compliance standards of PTG Ltd.
A Microsoft 365 outage that impacts the entire region is experienced by a business. The service is healthy, as you can see from the Service Health Dashboard. You must locate information in Service Health Dashboard that explains what transpired during the outage after the situation has been fixed. Which should you employ?
To locate information in the Service Health Dashboard that explains what transpired during a Microsoft 365 outage after the situation has been fixed, you should employ a "Post-Incident Review (PIR)." A Post-Incident Review (PIR) is a process where a detailed analysis is conducted after an incident or outage has been resolved. The purpose of the PIR is to identify the root causes, impacts, actions taken to mitigate the issue, and lessons learned from the incident. It helps in understanding what happened, why it happened, and how to prevent similar incidents in the future.
When a user accesses a federated third-party application, PTG Ltd., which makes use of Microsoft 365, wants to ask them for extra verification. Additionally, it's vital to refrain from asking users for more authentication when they enter Microsoft Outlook. You've been tasked with coming up with a workable solution that satisfies these demands. What choice from the list should be used to fulfill the requirement?
The solution that should be used to fulfill the requirement of asking users for extra verification when accessing a federated third-party application while refraining from asking for more authentication when entering Microsoft Outlook is "Conditional Access." Conditional Access is a feature in Microsoft 365 that enables organizations to implement specific access controls and policies based on various conditions. In this scenario, PTG Ltd. can configure Conditional Access policies to target users accessing federated third-party applications. They can require additional verification steps, such as multi-factor authentication (MFA), when accessing these applications to ensure heightened security.
Signals are combined, choices are made, and organizational policies are enforced through conditional access. One of the features of ______________ is conditional access.
One of the features of "Azure Active Directory (AAD) Premium 1" is conditional access. In the context of identity and access management, conditional access refers to the capability to apply specific access controls and policies based on certain conditions or criteria. This ensures that users are granted access to resources only under predefined circumstances, enhancing security and compliance within an organization's digital environment.
James is employed by TPT Ltd. as a Microsoft 365 administrator. In compliance with the provisions of the General Data Protection Regulation (GDPR), one of the employees seeks personal information. For the employee, he must retrieve the information. Which choice from the list below should he pick in order to fulfill the requirement?
James should pick "Create a data subject request case" in order to fulfill the requirement of providing personal information to an employee in compliance with the General Data Protection Regulation (GDPR). A data subject request case is a mechanism by which organizations handle requests from individuals (data subjects) to access their personal data that is being processed by the organization. Under GDPR, individuals have the right to request access to their personal data and receive information about how their data is being used. By creating a data subject request case, James can properly manage and document the process of providing the requested personal information to the employee while ensuring compliance with GDPR regulations. This helps organizations demonstrate transparency and accountability in their data processing practices.
What information is required in order to integrate Microsoft 365 Usage Analytics to Power BI?
Which two Intune remote actions are accessible when Configuration Manager and Intune are set up for co-management?
Please select 2 correct answers
Administrators can turn on the ______________ option for Microsoft 365 Activity Reports to lessen the risk associated with personally identifiable information.
Administrators can turn on the "anonymization" option for Microsoft 365 Activity Reports to lessen the risk associated with personally identifiable information (PII). Anonymization involves replacing or removing identifying information from data, making it more difficult to trace back to individual users. By enabling anonymization in activity reports, administrators can protect user privacy while still gaining insights into user activity and usage patterns within Microsoft 365 services. This is particularly important when dealing with sensitive data and ensuring compliance with privacy regulations.
PTG Ltd. is getting ready to switch to Microsoft Azure and Office 365. Peter has been tasked with finding a cloud provider that offers website hosting as part of the process. Which choice from the list below should he pick in order to fulfill the requirement?
Peter should pick "Platform as a Service (PaaS)" to fulfill the requirement of finding a cloud provider that offers website hosting as part of the process. Platform as a Service (PaaS) is a cloud computing service model that provides a platform and environment for developers to build, deploy, and manage applications without having to manage the underlying infrastructure. PaaS offerings often include website hosting services, where developers can easily deploy and host websites without worrying about managing the server hardware, operating system, or networking components. This allows PTG Ltd. to focus on developing and maintaining their website applications while leveraging the cloud provider's infrastructure and management capabilities. Microsoft Azure, which PTG Ltd. is considering, offers PaaS services that include website hosting through offerings like Azure App Service.
Which of the following is the acronym for GDPR?
The acronym "GDPR" stands for "General Data Protection Regulation." It is a comprehensive data protection regulation enacted by the European Union (EU) to safeguard the privacy and personal data of EU citizens.
Users recently complained that they were unable to access specific SharePoint sites. You are required to rate Microsoft 365's current state of health. Which option from the list would you pick to satisfy the requirement?
To assess the current state of health for Microsoft 365 services, I would choose the "Service health page." This page provides real-time information about the status of various Microsoft 365 services, including SharePoint Online. It displays information about ongoing incidents, planned maintenance, and historical data on service disruptions. By checking the Service health page, you can quickly determine if there are any reported issues affecting SharePoint access and get updates on their resolution progress. This information helps you communicate effectively with users and stakeholders about the status of the services and the steps being taken to address any problems.
Marlon is employed by PTG Ltd. as a Compliance Administrator. He has been requested to look for users who have visited particular SharePoint sites. What instrument should Marlon use in this situation?
In this situation, Marlon should use the "Audit log search" instrument to find users who have visited particular SharePoint sites. Audit log search is a feature within Microsoft 365 (including SharePoint Online) that allows administrators and compliance personnel to search and view audit logs for various activities and events performed by users within the organization. This includes actions such as accessing SharePoint sites, modifying files, sharing documents, and more. By utilizing the audit log search, Marlon can filter the logs to find information about user visits to specific SharePoint sites, helping to fulfill the request to identify users who have accessed those sites. This feature assists organizations in maintaining security, compliance, and accountability by tracking user activities and actions within their digital environment.
What does the word "scalable" refer to when discussing cloud services?
When discussing cloud services, the term "scalable" refers to the capability of a system or service to efficiently handle an increase or decrease in workload or demand. Specifically, it means being able to add or reduce service capacity on demand without significantly affecting performance, functionality, or user experience. Scalability is a key characteristic of cloud services that allows them to adapt to changing usage patterns and resource needs, ensuring that the system can handle varying levels of traffic and workload without compromising performance or availability. This flexibility is one of the main advantages of cloud computing, as it allows organizations to optimize resource usage and costs while meeting the requirements of their users.
Microsoft 365 has been installed by PTG Ltd. Dan pointed out places where several Microsoft 365 services may be enhanced. Dan has been invited to formally submit his enhancement recommendations to Microsoft. He should submit a feature request using which of the following tools.
Dan should submit a feature request using the "UserVoice site" to formally submit his enhancement recommendations for Microsoft 365 services. UserVoice is a platform used by Microsoft to collect feedback and feature requests from users and customers. It allows individuals to suggest improvements, new features, and changes they'd like to see in Microsoft products and services. By using the UserVoice site, Dan can provide his enhancement recommendations directly to Microsoft's development and product teams. This helps Microsoft gather input from the user community and consider these suggestions when planning future updates and enhancements to their products, including the Microsoft 365 suite.
Which interface is used to obtain Microsoft 365 Activity Reports?
The interface used to obtain Microsoft 365 Activity Reports is the "Microsoft 365 Admin Center." This is where administrators can access various reports that provide insights into user activities, usage patterns, security incidents, and other important information within the Microsoft 365 environment. The reports available in the Microsoft 365 Admin Center help organizations monitor and manage their services effectively.
Daniel is employed with PTG Ltd. Recently, he was instructed to use Windows Autopilot to deploy Windows 10 devices inside the corporate environment. He has been requested to offer a solution to make sure that users' remote access to data saved in OneDrive for Business is maintained. Solution: Daniel recommends enabling multi-factor authentication for users of Microsoft Azure AD. Does the proposed approach successfully achieve the desired result?
The proposed approach of enabling multi-factor authentication (MFA) for users of Microsoft Azure AD would help achieve the desired result of maintaining secure remote access to data saved in OneDrive for Business during Windows Autopilot deployment. Multi-factor authentication (MFA) adds an extra layer of security by requiring users to provide two or more authentication factors before they can access their accounts. This significantly enhances the protection of user accounts and sensitive data, especially when accessed remotely. By enabling MFA for users of Microsoft Azure AD, PTG Ltd. ensures that even if someone gains unauthorized access to a user's device, they would still need the additional authentication factor to access the user's OneDrive for Business data.