Skip Navigation Links
 

Microsoft - MS-900: Microsoft 365 Fundamentals

Sample Questions

Question: 190
Measured Skill: Describe core Microsoft 365 services and concepts (30-35%)

You are evaluating Office 365 ProPlus for a company.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

(NOTE: Each correct selection is worth one point.)

www.cert2brain.com

AEmployees must use a browser to co-author documents, spreadsheets, ...: Yes
Employees can edit documents, spreadsheets, and presentations by ...: Yes
Employees can use mobile devices, tablets, and laptops to edit documents, ...: Yes
B Employees must use a browser to co-author documents, spreadsheets, ...: Yes
Employees can edit documents, spreadsheets, and presentations by ...: Yes
Employees can use mobile devices, tablets, and laptops to edit documents, ...: No
C Employees must use a browser to co-author documents, spreadsheets, ...: Yes
Employees can edit documents, spreadsheets, and presentations by ...: No
Employees can use mobile devices, tablets, and laptops to edit documents, ...: No
D Employees must use a browser to co-author documents, spreadsheets, ...: No
Employees can edit documents, spreadsheets, and presentations by ...: Yes
Employees can use mobile devices, tablets, and laptops to edit documents, ...: No
E Employees must use a browser to co-author documents, spreadsheets, ...: No
Employees can edit documents, spreadsheets, and presentations by ...: Yes
Employees can use mobile devices, tablets, and laptops to edit documents, ...: Yes
F Employees must use a browser to co-author documents, spreadsheets, ...: No
Employees can edit documents, spreadsheets, and presentations by ...: No
Employees can use mobile devices, tablets, and laptops to edit documents, ...: No

Correct answer: E

Explanation:

With Office and OneDrive or SharePoint, multiple people can work together on a Word document, Excel spreadsheet, or PowerPoint presentation. When everyone is working at the same time, that's called co-authoring.

Co-authoring is available for documents stored in OneDrive or SharePoint.

To co-author with others, you need:

  • A shared storage area   OneDrive, OneDrive for work or school, SharePoint and SharePoint Server are shared storage areas which enable co-authoring.

  • Apps that support co-authoring   Word and PowerPoint on all devices and versions more recent than Office 2010 support co-authoring. The Excel mobile apps and the latest version of Excel for Microsoft 365 also support co-authoring.

  • A co-authoring friendly document    Co-authoring is only supported on modern file formats including: .docx (Word), .pptx (PowerPoint), and .xlsx (Excel).

  • Edit permissions for co-authors    All co-authors must have permission to access and edit the documents.

Reference: Document collaboration and co-authoring

Question: 191
Measured Skill: Describe core Microsoft 365 services and concepts (30-35%)

A company has Microsoft 365 and uses Microsoft Endpoint Manager.

You need to identify the endpoint management tool associated with each action.

Which tool should you identify for each action?

(To answer, drag the appropriate tools to the correct actions. Each tool may be used once, more than once, or not at all. NOTE: Each correct selection is worth one point.)

www.cert2brain.com

AManage employees' personal devices from the cloud: Software Center
Manage power settings for on premises servers: Configuration Manager
B Manage employees' personal devices from the cloud: Configuration Manager
Manage power settings for on premises servers: Microsoft Intune
C Manage employees' personal devices from the cloud: Configuration Manager
Manage power settings for on premises servers: Software Center
D Manage employees' personal devices from the cloud: Microsoft Intune
Manage power settings for on premises servers: Autopilot
E Manage employees' personal devices from the cloud: Microsoft Intune
Manage power settings for on premises servers: Configuration Manager
F Manage employees' personal devices from the cloud: Autopilot
Manage power settings for on premises servers: Microsoft Intune

Correct answer: E

Explanation:

Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM). You control how your organization’s devices are used, including mobile phones, tablets, and laptops. You can also configure specific policies to control applications. For example, you can prevent emails from being sent to people outside your organization. Intune also allows people in your organization to use their personal devices for school or work. On personal devices, Intune helps make sure your organization data stays protected, and can isolate organization data from personal data.

Intune is part of Microsoft's Enterprise Mobility + Security (EMS) suite. Intune integrates with Azure Active Directory (Azure AD) to control who has access, and what they can access. It also integrates with Azure Information Protection for data protection. It can be used with the Microsoft 365 suite of products. For example, you can deploy Microsoft Teams, OneNote, and other Microsoft 365 apps to devices.

Microsoft Endpoint Configuration Manager (Configuration Manager, also known as ConfigMgr or SCCM), formerly System Center Configuration Manager and Systems Management Server (SMS) is a systems management software product for managing large groups of computers running Windows NT, Windows Embedded, macOS (OS X), Linux or UNIX, as well as Windows Phone, Symbian, iOS and Android mobile operating systems. Configuration Manager provides remote control, patch management, software distribution, operating system deployment, network access protection and hardware and software inventory.

This article explains how to set up power management in Configuration Manager:

Configure power management in Configuration Manager

Question: 192
Measured Skill: Explain security, compliance, privacy, and trust in Microsoft 365 (30-35%)

A company plans to deploy a compliance solution in Microsoft 365.

Match each compliance solution to its description.

(To answer, drag the appropriate compliance solution from the column on the left to its description on the right. Each compliance solution may be used once, more than once, or not at all. NOTE: Each correct match is worth one point.)

www.cert2brain.com

AP1: Records management
P2: Insider risk management
P3: Advanced eDiscovery
B P1: Records management
P2: Advanced eDiscovery
P3: Insider risk management
C P1: Insider risk management
P2: Records management
P3: Advanced eDiscovery
D P1: Insider risk management
P2: Advanced eDiscovery
P3: Records management
E P1: Advanced eDiscovery
P2: Insider risk management
P3: Records management
F P1: Advanced eDiscovery
P2: Records management
P3: Insider risk management

Correct answer: A

Explanation:

Organizations of all types require a records-management solution to manage regulatory, legal, and business-critical records across their corporate data. Records management in Microsoft 365 helps an organization manage their legal obligations, provides the ability to demonstrate compliance with regulations, and increases efficiency with regular disposition of items that are no longer required to be retained, no longer of value, or no longer required for business purposes.

Insider risk management is a compliance solution in Microsoft 365 that helps minimize internal risks by enabling you to detect, investigate, and act on malicious and inadvertent activities in your organization. Insider risk policies allow you to define the types of risks to identify and detect in your organization, including acting on cases and escalating cases to Microsoft Advanced eDiscovery if needed. Risk analysts in your organization can quickly take appropriate actions to make sure users are compliant with your organization's compliance standards.

The Advanced eDiscovery solution in Microsoft 365 builds on the existing eDiscovery and analytics capabilities in Office 365. This new solution, called Advanced eDiscovery, provides an end-to-end workflow to preserve, collect, review, analyze, and export content that's responsive to your organization's internal and external investigations. It also lets legal teams manage the entire legal hold notification workflow to communicate with custodians involved in a case.

References:

Learn about records management in Microsoft 365

Learn about insider risk management in Microsoft 365

Overview of the Advanced eDiscovery solution in Microsoft 365

Question: 193
Measured Skill: Explain security, compliance, privacy, and trust in Microsoft 365 (30-35%)

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

(NOTE: Each correct selection is worth one point.)

www.cert2brain.com

AMulti-factor authentication (MFA) supports ...: Yes
MFA-enabled accounts can be compromised with ...: Yes
MFA protects against brute-force attacks: Yes
B Multi-factor authentication (MFA) supports ...: Yes
MFA-enabled accounts can be compromised with ...: Yes
MFA protects against brute-force attacks: No
C Multi-factor authentication (MFA) supports ...: Yes
MFA-enabled accounts can be compromised with ...: No
MFA protects against brute-force attacks: Yes
D Multi-factor authentication (MFA) supports ...: No
MFA-enabled accounts can be compromised with ...: Yes
MFA protects against brute-force attacks: Yes
E Multi-factor authentication (MFA) supports ...: No
MFA-enabled accounts can be compromised with ...: No
MFA protects against brute-force attacks: Yes
F Multi-factor authentication (MFA) supports ...: No
MFA-enabled accounts can be compromised with ...: No
MFA protects against brute-force attacks: No

Correct answer: E

Explanation:

Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to enter a code on their cellphone or to provide a fingerprint scan.

If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the password is weak or has been exposed elsewhere, is it really the user signing in with the username and password, or is it an attacker? When you require a second form of authentication, security is increased as this additional factor isn't something that's easy for an attacker to obtain or duplicate.

Azure AD Multi-Factor Authentication works by requiring two or more of the following authentication methods:

  • Something you know, typically a password.
  • Something you have, such as a trusted device that is not easily duplicated, like a phone or hardware key.
  • Something you are - biometrics like a fingerprint or face scan.
Reference: How it works: Azure AD Multi-Factor Authentication

Question: 194
Measured Skill: Explain security, compliance, privacy, and trust in Microsoft 365 (30-35%)

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

(NOTE: Each correct selection is worth one point.)

www.cert2brain.com

AYou can use sensitivity labels to encrypt emails and documents: Yes
You can use sensitivity labels to control read and write access ...: Yes
Sensitivity labels can apply watermarks within a Word document to ...: Yes
B You can use sensitivity labels to encrypt emails and documents: Yes
You can use sensitivity labels to control read and write access ...: Yes
Sensitivity labels can apply watermarks within a Word document to ...: No
C You can use sensitivity labels to encrypt emails and documents: Yes
You can use sensitivity labels to control read and write access ...: No
Sensitivity labels can apply watermarks within a Word document to ...: No
D You can use sensitivity labels to encrypt emails and documents: No
You can use sensitivity labels to control read and write access ...: Yes
Sensitivity labels can apply watermarks within a Word document to ...: No
E You can use sensitivity labels to encrypt emails and documents: No
You can use sensitivity labels to control read and write access ...: Yes
Sensitivity labels can apply watermarks within a Word document to ...: Yes
F You can use sensitivity labels to encrypt emails and documents: No
You can use sensitivity labels to control read and write access ...: No
Sensitivity labels can apply watermarks within a Word document to ...: No

Correct answer: A

Explanation:

Sensitivity labels from the Microsoft Information Protection solution let you classify and protect your organization's data, while making sure that user productivity and their ability to collaborate isn't hindered.

In order to prevent data loss, you would use a data loss prevention (DLP) policy or apply retention labels.

Sensitivity labels allow to encrypt emails and documents to prevent unauthorized people from accessing this data. Sensitivity labels also allow to mark the content when you use Office apps, by adding watermarks, headers, or footers to email or documents that have the label applied.

Reference: Learn about sensitivity labels



 
Tags: exam, examcollection, exam simulation, exam questions, questions & answers, training course, study guide, vce, braindumps, practice test
 
 

© Copyright 2014 - 2021 by cert2brain.com