Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Microsoft MS-900 - Microsoft 365 Fundamentals

Page: 4 / 13
Total 413 questions

A company is evaluating security capabilities of Microsoft Sentinel.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

A company purchases Microsoft 365 E5.

You need to determine which security features you should implement.

Which features should you implement? To answer, drag the appropriate features to the correct scenarios. Each feature may be used once, more than once, or not at all. You may need to drag the split bar between panes or scrollto view content.

NOTE:Each correct selection is worth one point.

You are the Microsoft 365 administrator for a company. The company supports an aggressive rollout of features.

You need to release features as soon as they are released.

Which feature phase should you use for each development step? To answer, drag the appropriate feature phases to the correct development steps. Each feature phase may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content

NOTE: Each correct selection is worth one point.

You are the Microsoft 365 administrator for a company. You deploy Windows 10 to all devices by using Windows Autopilot.

You need to ensure that employees can install Microsoft Office 365 ProPlus on their devices.

What are two possible ways to achieve this goal? Each correct answer presentsa part of a solution.

NOTE: Each correct selection is worth one point.

A.

Use the self-install option on the Office 365 dashboard

B.

Download and install the Office ProPlus Windows Installer (MSI) package

C.

Enable auto-deployment of Office 365 apps for all devices

D.

Update the Windows AutoPilot deployment profile to include the Office 365 apps

A company deploys Microsoft Azure AD. You enable multi-factor authentication.

You need to inform users about the multi-factor authentication methods that they can use.

Which of the following methods isNOTa valid multi-factor authentication methodin Microsoft 365?

A.

Receive an automated call on the desk phone that includes a verification code.

B.

Use the Microsoft Authenticator mobile application to receive a notification and authenticate.

C.

Receive a call on a phone.

D.

Enter a Windows 10 PINcode when prompted.

Your organization is considering subscribing to Microsoft 365.

You need to educate stakeholders about how Microsoft 365 component enable effective collaboration.

Match each Microsoft 365 service to the most appropriate service description. To answer, drag the appropriate services to the correct descriptions. Each service may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE:Each correct match is worth onepoint.

A company uses Microsoft 365 services thatinclude Microsoft eDiscovery.

Instructions: For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE:Each correct selection is worth one point.

A company is migrating to Microsoft 365.

The company is reviewing the billing account options in Microsoft 365.

You need to recommend a billing accountoptions.Which billing account type should you recommend?

A company is purchasing a Microsoft 365 subscription to replace the current on premises IT infrastructure.

You need to identify the impacts of subscribing to Microsoft 365.

Which three outcomes can the company expect? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

A.

Predictable Microsoft licensing costs

B.

Increased Exchange Server Client Access license (CAL) costs

C.

Increased Windows Server Client Access License (CAL) costs

D.

Increased service scalability

E.

Decreased on-premises infrastructure maintenance

A company plans to implement an insider risk solution in Microsoft 365.

The company needs toimplement a solution that meets the following requirements:

• Uses machine learning to identify email risks.

• Provides workflows to remediate email risks.

• Provides a dashboard to display email risks, actions, and trends.

You need to identify a solution that meets the requirements. Which solution should you select?

A.

Core eDiscovery cases

B.

Sensitivity labels

C.

Communication compliance policies

D.

Advanced eDiscovery cases