Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
We live in an always connected, technology-driven world. Efficient security management is the foundation to managing your assets – in the cloud, on-premises, or across a hybrid environment. You need to proactively manage and secure your organization’s identities, devices, end points (both apps and data), and IT infrastructure. Microsoft 365 helps you secure your infrastructure with a focus on visibility, control, and guidance, and helps you consolidate from a plethora of specialized functions and tools, leveraging the shared intelligence, to keep your security teams focused on the most critical insights for their workloads. This learning path can help you prepare for the Microsoft 365 Certified: Security Administrator Associate and Microsoft 365 Certified: Enterprise Administration Expert certifications.
Prerequisites:
Learn how the security management tools from Microsoft help you protect your organization’s users, devices, and data.
Learning objectives:
In this module, you will learn how to:
Prerequisites:
Q1. Which service available in the Microsoft 365 Defender portal is designed to help optimize your organization’s overall security health by providing a summary of different security features and capabilities?
Q2. What feature is used to proactive search for malware, suspicious files, and activities?
Q3. What feature determines the cards shown on a user’s personal home page in the Microsoft Defender 365 portal?
Learn how to take advantage of the reporting and insights available through the Microsoft 365 Defender portal to drive organizational security health.
Learning objectives:
In this module, you will learn how to:
Prerequisites:
Q1. What are the four categories found in the Security report in the Microsoft 365 Defender portal?
Q2. As a security administrator you are tasked with identifying how many DLP matches happened in your third-party cloud services. What section in the Security reporting would you use to find the information?
Q3. Microsoft Secure Score provides intelligent recommendations surfaced from each of the below except:
Learn how Microsoft Defender for Office 365 helps safeguard your organization against unknown malware, viruses, and harmful email links and attachments.
Learning objectives:
In this module, you will learn how to:
Prerequisites:
Q1. What are two of the most common phishing attacks made on an organization?
Q2. The Contoso organization has Office 365 Enterprise E5 for all users. The security administrator has defined specific anti-phishing policies for the finance department but hasn’t applied those policies elsewhere. Which of the following is true?
Q3. What anti-phishing policy option should be used to ensure an outside attacker can’t impersonate the CEO of your organization?
Learn how to mitigate end-point threats by using Windows 10 security features.
Learning objectives:
In this module, you’ll learn how to:
Prerequisites:
Q1. An employee in the finance department reports unusual behavior when they launch a PowerPoint file. They notice a command prompt gets launched in the background. As a security administrator, what can you implement to prevent unknown or malicious behavior like this from occurring?
Q2. As the security administrator of Contoso you decide to monitor executable scripts running in mail. The Research & Development department says that it needs you to allow executable scripts to run in its mail. What would be the best solution to keep all of Contoso protected and secured?
Q3. Which of the following Windows 10 security features focuses on securing organizational identities and passwords?
I hope this Manage security with Microsoft 365 Microsoft Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.
This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.
Keep Learning!
More Coding Solutions >>