Detect threats and protect information in cloud apps using Microsoft Defender for Cloud Apps Microsoft Quiz Answers

Get Detect threats and protect information in cloud apps using Microsoft Defender for Cloud Apps Microsoft Quiz Answers

This learning path investigates Microsoft Defender for Cloud Apps, discovery, information protection and threat detection at an intermediate level.

Prerequisites:

  • Experience working with Microsoft 365 services
  • Experience working with Microsoft Azure
  • Fundamental knowledge of Microsoft Defender for Cloud Apps

Enroll on Microsoft

Module 1: Implement Microsoft Defender for Cloud Apps Cloud Discovery

Learn how to configure Cloud Discovery in Microsoft Defender for Cloud Apps, to integrate with Microsoft Defender for Endpoint, and how to integrate with non-Microsoft systems.

Learning objectives:

In this module, you will:

  • Use the Cloud Discovery interactive guide to help protect your apps
  • Implement Cloud Discovery policies
  • Configure Defender for Cloud Apps in Microsoft Defender for Endpoint
  • Configure the Defender for Cloud Apps log collector
  • Integrate Defender for Cloud Apps with non-Microsoft systems

Prerequisites:

  • Experience working with Microsoft 365 services
  • Experience working with Azure
  • Knowledge of security concepts, risks, and mitigations
  • Microsoft Defender for Cloud Apps fundamentals or equivalent

This module is part of these learning paths:

Quiz 1: Knowledge check

Q1. Which of the following Defender for Cloud Apps policy types has the category of Cloud Discovery?

  • Activity policy
  • App discovery policy
  • File policy

Q2. An administrator is creating an app discovery policy. The administrator wants to configure factors that determine when a policy match is triggered. Which of the following is available a policy match trigger?

  • App tag
  • Number of devices
  • Risk score

Q3. An administrator at Contoso wants to track app usage on Windows 10 devices in your organization. Devices are connected by both WiFi and or remote users, VPN. Which of the following integrations should be selected to help track app usage on Windows 10 devices?

  • Zscaler
  • Corrata
  • Defender for Endpoint

Module 2: Protect information in real time with Microsoft Defender for Cloud Apps

Learn to configure information protection in Microsoft Defender for Cloud Apps and protect data stored in all locations, including non-Microsoft services. Learn how to restrict external users and unauthorized browsers, how to label or quarantine files, and how to apply information protection policies.

Learning objectives:

In this module, you will:

  • Connect Box, Salesforce, and GitHub to Microsoft Defender for Cloud Apps.
  • Protect storage apps and implement malware detection.
  • Configure read-only mode for external users.
  • Block unauthorized browsers from accessing corporate web apps.
  • Use admin quarantine to investigate files.
  • Automatically apply labels to sensitive files.
  • Implement information protection policies.

Prerequisites:

  • Experience working with Microsoft 365 services
  • Experience working with Azure
  • Knowledge of security concepts, risks, and mitigations
  • Microsoft Defender for Cloud Apps fundamentals or equivalent

This module is part of these learning paths:

Quiz 1: Knowledge check

Q1. What additional configuration is necessary once you have connected GitHub before you create Microsoft Defender for Cloud Apps Policies?

  • You must encrypt the GitHub API.
  • You must host the GitHub service in Microsoft Azure.
  • No additional steps are necessary.

Q2. How often do Microsoft Defender for Cloud Apps file policies scan files?

  • Continually
  • Daily
  • Weekly

Q3. What is the most straightforward way to create a malware detection policy in Microsoft Defender for Cloud Apps?

  • A malware detection policy already exists but must be enabled.
  • You must create a new policy with a Malware type
  • A malware detection policy already exists and is already enabled.

Q4. To effectively configure read-only mode for external users what is the minimum number of policies that you should create?

  • 1.
  • 2.
  • 3.

Q5. How can TOR browsers be blocked from accessing corporate resources from any device?

  • Create a policy that blocks the dark web.
  • By creating a policy with a user agent string that filters out all browser requests not matching an approved browser.
  • Block installation of TOR browsers.

Q6. What happens when a file is quarantined?

  • It is deleted.
  • It depends on the file storage solution.
  • It is scanned by anti-virus software.

Q7. What happens to Azure Information Protection classification labels when a file is shared outside of your organization?

  • The classification labels are retained if the file is exported.
  • The classification labels are altered to notes.
  • The classification labels are deleted

Module 3: Detect threats with Microsoft Defender for Cloud Apps

Learn to identify, mitigate, and automatically remediate security threats by using Microsoft Defender for Cloud Apps and Microsoft Defender for Identity.

Learning objectives:

In this module, you will:

  • Create threat protection policies in Defender for Cloud Apps
  • Integrate Defender for Cloud Apps with Microsoft Defender for Identity
  • Detect threats and manage alerts
  • Detect malware and configure automatic remediation

Prerequisites:

  • Experience working with Microsoft 365 services
  • Experience working with Azure
  • Knowledge of security concepts, risks, and mitigations
  • Microsoft Defender for Cloud Apps fundamentals or equivalent

This module is part of these learning paths:

Quiz 1: Knowledge check

Q1. Which type of policy should an administrator use in Defender for Cloud Apps to detect a login from a risky IP address?

  • Anomaly detection policy.
  • Activity policy.
  • OAuth app policy.

Q2. Which of the following should an administrator consider integrating with Defender for Cloud Apps in order to get insights into security risks posed to their on-premises AD DS?

  • Azure AD Identity Protection.
  • Microsoft Defender for Endpoint.
  • Microsoft Defender for Identity.

Q3. An administrator wants to start detecting malware using Defender for Cloud Apps. Which of the following represents their best approach to achieving this?

  • The administrator doesn’t need to do anything. Malware detection is enabled out of the box in Defender for Cloud Apps
  • The administrator must create a malware detection policy from an activity log search.
  • The administrator must enable the Malware detection policy in the list of policies in the Defender for Cloud Apps portal.
Conclusion:

I hope this Detect threats and protect information in cloud apps using Microsoft Defender for Cloud Apps Microsoft Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.

This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.

Keep Learning!

More Coding Solutions >>

LeetCode Solutions

Hacker Rank Solutions

CodeChef Solutions

Leave a Reply

Your email address will not be published. Required fields are marked *