Manage security with Microsoft 365 Microsoft Quiz Answers

Get Manage security with Microsoft 365 Microsoft Quiz Answers

We live in an always connected, technology-driven world. Efficient security management is the foundation to managing your assets – in the cloud, on-premises, or across a hybrid environment. You need to proactively manage and secure your organization’s identities, devices, end points (both apps and data), and IT infrastructure. Microsoft 365 helps you secure your infrastructure with a focus on visibility, control, and guidance, and helps you consolidate from a plethora of specialized functions and tools, leveraging the shared intelligence, to keep your security teams focused on the most critical insights for their workloads. This learning path can help you prepare for the Microsoft 365 Certified: Security Administrator Associate and Microsoft 365 Certified: Enterprise Administration Expert certifications.

Prerequisites:

  • Basic understanding of Microsoft 365.

Enroll on Microsoft

Module 1: Overview of security management in Microsoft 365 Defender

Learn how the security management tools from Microsoft help you protect your organization’s users, devices, and data.

Learning objectives:

In this module, you will learn how to:

  • Describe what operations and capabilities are available in the Microsoft 365 Defender portal
  • Explain what technologies are connected by the Microsoft 365 Defender portal

Prerequisites:

Quiz 1: Summary and knowledge check

Q1. Which service available in the Microsoft 365 Defender portal is designed to help optimize your organization’s overall security health by providing a summary of different security features and capabilities?

  • Microsoft 365 security assessment
  • Microsoft Secure Score
  • Microsoft Risk Assessment
  • Azure Information Protection Scanner

Q2. What feature is used to proactive search for malware, suspicious files, and activities?

  • Classification
  • The Alerts tab
  • Hunting
  • Permissions

Q3. What feature determines the cards shown on a user’s personal home page in the Microsoft Defender 365 portal?

  • Shared global administration accounts
  • Workplace Analytics
  • MyAnalytics
  • Role-based access control

Module 2: Use reporting in the Microsoft 365 Defender portal

Learn how to take advantage of the reporting and insights available through the Microsoft 365 Defender portal to drive organizational security health.

Learning objectives:

In this module, you will learn how to:

  • Understand the reporting available in the Microsoft 365 Defender portal.
  • Define the detection sources used for reporting and monitoring.
  • Explain how Microsoft Secure Score recommendations are calculated.

Prerequisites:

Quiz 1: Summary and knowledge check

Q1. What are the four categories found in the Security report in the Microsoft 365 Defender portal?

  • Identities, data, end points, apps
  • Identities, compliance, devices, apps
  • Azure AD, data, devices, apps
  • Identities, data, devices, apps

Q2. As a security administrator you are tasked with identifying how many DLP matches happened in your third-party cloud services. What section in the Security reporting would you use to find the information?

  • Microsoft Defender for Cloud Apps
  • End points
  • Data
  • Apps

Q3. Microsoft Secure Score provides intelligent recommendations surfaced from each of the below except:

  • Azure Active Directory
  • Office Security Center
  • Microsoft Defender for Cloud

Module 3: Protect mail with Microsoft Defender for Office 365

Learn how Microsoft Defender for Office 365 helps safeguard your organization against unknown malware, viruses, and harmful email links and attachments.

Learning objectives:

In this module, you will learn how to:

  • Understand the protection available using Microsoft Defender for Office 365 policies
  • Define mail protection using Microsoft Defender for Office 365 policies

Prerequisites:

Quiz 1: Summary and knowledge check

Q1. What are two of the most common phishing attacks made on an organization?

  • Distributed denial of service (DDoS) and spam
  • Malicious attachments and DDoS
  • Spam and malicious hyperlinks
  • Malicious attachments and hyperlinks

Q2. The Contoso organization has Office 365 Enterprise E5 for all users. The security administrator has defined specific anti-phishing policies for the finance department but hasn’t applied those policies elsewhere. Which of the following is true?

  • Microsoft Defender for Office 365 anti-phishing protection policies for finance are automatically applied to all Contoso users.
  • Microsoft Defender for Office 365 advanced anti-phishing protection is in place for finance, while all other Contoso users are protected by the default anti-phishing protection.
  • Microsoft Defender for Office 365 anti-phishing protection is in place for finance and all newly created users, but not for the rest of Contoso.
  • Microsoft Defender for Office 365 anti-phishing protection is in place for only the finance department.

Q3. What anti-phishing policy option should be used to ensure an outside attacker can’t impersonate the CEO of your organization?

  • Add impersonation policy
  • Add users to protect
  • Add trusted senders and domains
  • Add domains to protect

Module 4: Secure Windows 10 endpoints

Learn how to mitigate end-point threats by using Windows 10 security features.

Learning objectives:

In this module, you’ll learn how to:

  • Describe the Windows 10 endpoint security features available
  • Define attack surface reduction for Windows 10 endpoints
  • Explain how Windows Defender Antivirus stops suspicious behaviors

Prerequisites:

Quiz 1: Summary and knowledge check

Q1. An employee in the finance department reports unusual behavior when they launch a PowerPoint file. They notice a command prompt gets launched in the background. As a security administrator, what can you implement to prevent unknown or malicious behavior like this from occurring?

  • Roll out Microsoft Defender for Endpoint
  • Enable Windows Defender Firewall
  • Implement attack surface reduction rules

Q2. As the security administrator of Contoso you decide to monitor executable scripts running in mail. The Research & Development department says that it needs you to allow executable scripts to run in its mail. What would be the best solution to keep all of Contoso protected and secured?

  • Create an attack surface reduction rule for all users that blocks executable content from their webmail, but create an audit for the R&D department.
  • Create an attack surface reduction rule for all users that blocks executable content from their webmail and email, but create an audit for the R&D department.
  • Create an attack surface reduction rule for all users that audits executable content from their webmail and email.

Q3. Which of the following Windows 10 security features focuses on securing organizational identities and passwords?

  • Windows Hello
  • Windows Defender Credential Guard
  • Azure Information Protection Scanner
Conclusion:

I hope this Manage security with Microsoft 365 Microsoft Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.

This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.

Keep Learning!

More Coding Solutions >>

LeetCode Solutions

Hacker Rank Solutions

CodeChef Solutions

Leave a Reply

Your email address will not be published. Required fields are marked *