Practice Assessment for Exam MS-900: Microsoft 365 Fundamentals Flashcards
(50 cards)
A company plans to use Microsoft 365.
The company expresses the need to use Microsoft Software Assurance.
You need to recommend the pricing model that includes the Microsoft Software Assurance benefit.
Which pricing model should you recommend?
Microsoft Volume Licensing
Software Assurance is available as part of the Microsoft Volume Licensing benefits. The Cloud Solution Provider pricing model involves a Microsoft partner providing technical and billing services but does not include Software Assurance benefits. Microsoft Online Service Program is an alternative name of the Web Direct pricing model, which involves the pay-as-you-go billing that offers convenience and flexibility but does not include the Microsoft Volume Licensing benefits. The Web Direct pricing model involves pay-as-you-go billing, which offers convenience and flexibility, but does not include the Microsoft Volume Licensing benefits.
A company plans to implement Microsoft 365 for 500 employees.
Employees work from desktop and laptop computers and need to use the Microsoft Office desktop applications.
You need to recommend the appropriate subscription plan.
Which subscription plan should you recommend?
Microsoft 365 E3
Microsoft 365 Enterprise E3 is suitable for organizations with more than 300 employees and includes desktop Office applications. Microsoft 365 F3 is meant for frontline-workers, who must use tablet and mobile devices for their work. It does not include desktop Office applications. Microsoft 365 Business cannot be used by companies with more than 300 employees.
A company plans to transition to Microsoft 365.
The company is an on-premises software assurance customer and needs a base license type that offers cloud relevant software assurance benefits.
You need to recommend a user subscription license (USL).
Which license should you recommend?
From SA USLs
From SA USLs are for on-premises software assurance customers who want to migrate to the cloud. Add-on USLs are for on-premises software customers who want to try Microsoft 365 cloud products without giving up their on-premises solution. Full USLs are for first time buyers of Microsoft’s products and services or for on-premises customers without software assurance. Step Up USLs are for existing Microsoft 365 customers who want to upgrade their level of service.
A company has an existing Microsoft Volume Licensing agreement and is operating exclusively in an on-premises environment.
The company plans to use Microsoft 365.
You need to recommend a user subscription licensing (USL) option that allows the company to leverage existing benefits while transitioning to Microsoft 365.
Which licensing option should you recommend?
From SA USLs
From SA USLs is intended for existing Volume Licensing customers, including the ability to leverage Software Assurance benefits. Add-on USLs are intended for on-premises customers without Volume Licensing that want to purchase Microsoft 365 services. Full USLs is intended for new customers without existing licensing agreements. Step Up USLs is intended for customers that need to upgrade their existing Microsoft 365 services.
A company uses Microsoft 365.
The company records a monthly uptime percentage below 95%.
Which percentage of service credit can the company receive from Microsoft?
100 percent
The percentage credit that a company can receive is based on the monthly uptime percentage. Monthly uptime percentage of:
Below 99.9% grants 25% credit.
Below 99% grants 50% credit.
Below 95% grants 100% credit.
A company recently subscribed to Microsoft 365.
The company wants to drive user adoption of the new Microsoft 365 services.
You need to recommend a support option for the company.
Which support option should you recommend?
FastTrack
FastTrack support service helps customers onboard to Microsoft 365 and supports the company to drive adoption of Microsoft 365 services in the company. Pre-sales is a support service provided to help the company with understanding more about Microsoft 365 services before the purchase is made. Community-based support is a free support service provided by members of the community. Microsoft Unified support is a 24/7 support service provided for your Microsoft 365 service for as-needed technical support.
A company uses Microsoft 365.
The company help desk receives calls about errors when users access Office Online apps. The help desk team suspects it is a service issue.
You need to direct the help desk team to the location in the Microsoft 365 admin center to obtain more information about the issue.
Which location should you identify?
Health
The Health area in the admin center is the place where information about the current health of Microsoft services can be found. The Support area can be useful for raising a support ticket with Microsoft if there is no indication of current service health issues. The Settings area displays information about the company’s domain setup. The Reports area displays adoption score and usage reports. The Support area shows information about service requests created with Microsoft support.
A company implements Microsoft 365.
The company has concerns about the encryption and classification of information and removal of Shadow IT in the organization.
You need to recommend a Zero Trust methodology pillar solution.
Which two pillars should you recommend? Each correct answer represents part of a complete solution.
Data
Applications
In the data pillar, security is focused on resolving the concern of Shadow IT by ensuring that all applications in the organization are centrally managed. In the applications pillar, security is focused on resolving the concern of Shadow IT by ensuring that all applications in the organization are centrally managed. The infrastructure pillar focuses on improving security at the infrastructure layer through the assessment of version and configurations. In the networks pillar, security is focused on the protection of network layer through segmentation and micro-segmentation.
A company uses Microsoft 365.
The company expresses the need to adopt the concept of assumed breach and mitigate it.
You need to recommend the access type to implement.
Which access should you recommend?
network segmentation
Network segmentation is one the most common techniques that is used to implement the principle of assumed breach. External firewalls are not considered sufficient in the context of the principle of assumed breach since they are based on the premise that the breach has not taken place yet. Just-in-time access is part of the implementation of the least privileged access principle. Password-based authentication is no longer viewed as a sufficient way to protect access to secured resources and is not part of the implementation of the principle of assumed breach.
A company uses Microsoft 365.
The company needs real-time policy evaluation to involve access control through segmentation.
You need to recommend the primary component of the Zero Trust model that needs to be configured.
Which primary component do you recommend?
Network
Network-based protection relies on such components as internal segmentation and micro-segmentation. Granularity in apps-based protection is typically based on roles. Device-based protection relies on device risk and compliance state. Infrastructure-based protection relies on such components as just-in-time (JIT) and version control.
A company implements Microsoft 365.
The company needs to allow external sharing with partners and vendors. The company requires the default configuration available to achieve this goal.
You need to recommend a cloud identity provider.
Which two providers should you recommend? Each correct answer presents a complete solution.
Microsoft Entra ID
Microsoft account
By default, guests can use their existing Microsoft Entra ID work or school accounts and their Microsoft account to redeem the B2B collaboration invitations received. Facebook federation can be configured for self-service sign up when building an app. It cannot be used as a sign in option to redeem external collaboration invitations. Active Directory is an on-premises directory service, which cannot be used to fulfill external sharing requirements.
A company is planning the user login process for access to Microsoft 365.
The company needs to document the login process stages. You need to explain the process that verifies if a username and password combination is correct.
Which named process should you explain?
Authentication
Authentication is the process of verifying if the provided credentials are correct. Authorization occurs after authentication, and defines, for an identity that has already been authenticated, to which resources access should be granted or denied. Zero Trust is an approach that assumes that all requests come from an open and untrusted network. The Shared responsibility model is a way to shift the security responsibilities between the customer and the cloud provider.
A company implements Microsoft 365.
The company has a new remote work policy for employees.
You need to recommend a solution that meets the following requirements:
Employees can only access company resources from specific locations.
Extra authentication factors are included.
Which solution should you recommend?
Conditional Access
Microsoft Entra ID Conditional Access includes location-based policies and multifactor authentications. JIT access does not include extra authentication methods and location policies. JIT is part of implementing the principle of least privilege access. Federation does not include extra authentication methods and location policies. It allows users authenticated by one identity provider, such as Microsoft Entra ID, to access resources that are controlled by other identity providers. Micro-segmentation does not include extra authentication methods and location policies. Micro-segmentation is a network-based control mechanism.
A company uses Microsoft Entra ID as an authentication platform.
Active Directory is not integrated with Microsoft Entra ID. The company needs to use Microsoft Defender to check potentially compromised users.
You need to recommend a solution.
Which solution should you recommend?
Defender for Identity
Defender for Identity is a solution that uses the Active Directory data as signals to identify suspicious activities. Defender for Office 365 protects against threats in email messages. Defender for Cloud Apps operates as an intermediary between the cloud user and cloud provider, mediating the requests sent to the cloud providers. Defender for Endpoint is used to protect devices (endpoints), integrating with Microsoft Intune, Defender for Cloud, and other services.
A company implements Microsoft 365.
The company’s security team needs to understand threat signals for Microsoft 365 products and services. You need to recommend a solution that meets the following requirements:
Provide the first line of defense in the stack.
Automated investigation and remediation of breaches.
Provide capabilities for network protection.
Which solution should you recommend?
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint provides the first line of defense in the stack, automated investigation, and remediation of breaches and network protection. Microsoft Defender for Office 365 protects organizations from malicious emails, URLs, and collaborative tools. It does not provide capabilities for network protection. Microsoft Defender for Identity protects the organization from malicious identity attacks. It does not provide capabilities for network protection. Microsoft Defender for Cloud Apps provides advanced threat protection to cloud apps.
A company authenticates by using Active Directory for its on-premises applications and resources. The company uses Microsoft 365.
The company requires single sign-on (SSO) with smart cards or certificates for the cloud apps and on-premises objects.
You need to recommend a Microsoft Entra ID authentication method.
Which authentication method should you recommend?
Federated
Federated authentication is a recommended authentication for companies with complex requirements that cannot be met by Microsoft Entra ID. User authentication validation happens on the company’s Active Directory single sign-on (SSO) with smart cards or certificates, which is supported through federated authentication. Password hash synchronization, pass-through authentication, and passwordless authentication do not support SSO with smart cards or certificates.
Password hash synchronization enables users to sign in to on-premises and cloud applications using the same password. This ensures that the user’s authentication takes place in Microsoft Entra ID rather than the company’s on-premises Active Directory. Pass-through authentication enables users to sign in to on-premises and cloud applications using the same password. This authentication type validates the user’s password against the company’s on-premises Active Directory, not Microsoft Entra ID. Passwordless authentication is a more convenient way to authenticate because passwords are completely removed and replaced by something you have, something you are, or something you own.
A company uses Microsoft Entra ID.
Internal authenticated users who try to access company apps outside the designated IP range must be blocked.
You need to recommend a Microsoft Entra ID feature the company should use.
Which feature should you recommend?
Conditional access
Conditional access provides an additional layer of security for authenticated users who try to access company apps and data. Access can be restricted based on several signals, which include user or group membership, named location information, device application, real-time risk detection, user risks, cloud apps, or actions. After the policy is applied, a decision is reached whether to block access, grant access, or require additional verification. User flows are used to create sign in and sign-up policies for external identities (Microsoft Entra ID B2C). External identities help companies manage external users. Role-based access is used to assign a collection of permissions to a user.
A company uses Microsoft Entra ID.
The help desk receives multiple requests for password changes from employees.
You need to recommend a solution to avoid these requests.
Which Microsoft Entra ID feature should you recommend?
self-service password reset
Microsoft Entra ID self-service password reset is a Microsoft Entra ID feature that allows users to reset and update their passwords. Multifactor authentication, password hash synchronization, and pass-through authentication do not provide this capability. They are features of Microsoft Entra ID, but each provides a different function. Multifactor authentication creates an additional layer of security after authentication. Password hash synchronization enables authentication for on-premises Active Directory objects in Microsoft Entra ID. Pass-through authentication enables sign-in to both on-premises and cloud applications using the same password.
A company uses Microsoft 365.
The company requires a tool to understand its current security posture.
You recommend Microsoft Secure Score.
You need to describe its capabilities.
Which three capabilities should you describe? Each correct answer presents a complete solution.
Secure Score provides improvement actions on the current security posture.
Companies can use Secure Score to measure their current security posture across apps, identities, and devices.
Secure Score can be used to set key performance indicators (KPIs) for the company’s security posture.
Secure Score is one of the tools in the Microsoft Defender portal. It shows the company’s current security posture. The higher the Secure Score, the better the company’s security posture.
A company uses Microsoft 365.
The company wants to monitor the following activities:
suspicious behaviors of employees
details of mailbox attacks and user involved attacks
breach activities on devices
You need to identify which admin portal the company should use.
Which admin portal should you identify?
Microsoft 365 Defender portal
Microsoft 365 Defender portal is used to manage and monitor security across apps, data, identities, and infrastructure. The Exchange admin portal, SharePoint admin center, and Microsoft Purview compliance portal cannot be used to manage or monitor these attacks. The Exchange admin portal is used to manage advanced email settings, such as quarantine, encryption, and mail flow rules. The SharePoint admin center is used to manage sites, sharing, and storage for SharePoint and OneDrive. The Purview compliance portal is used to help the company understand its compliance needs.
A company uses Microsoft 365.
The company wants protection against insider risks, such as IP theft and data leaks.
You need to recommend a service that provides this type of protection.
What should you recommend?
Microsoft Purview
Microsoft Purview Insider Risk Management uses indicators from Microsoft 365 and third parties to detect potentially risky activity. It uses logs from Microsoft 365 and Microsoft Graph, allowing a company to identify risks and take action to mitigate the risks. Protecting against IP theft requires understanding the content of data stored and how it is shared, which is not offered by Microsoft Defender for Endpoint. The Priva Privacy Risk Management feature can detect overexposed data and data transfers but does not block them. It only notifies users who must decide which action to take themselves. The Service Trust Portal demonstrates how Microsoft cloud services protect customer’s data. It provides information rather than actual protection against IP theft and data leaks.
A company uses Microsoft 365.
The company requires documentation that confirms Microsoft cloud services will protect company data.
You need to recommend a tool that provides the documentation.
Which tool should you recommend?
Service Trust Portal
The Service Trust Portal is the repository of artifacts documenting how Microsoft cloud services protect company data. Whitepapers, certifications, reports, and other documents are available from the portal.
Secure Score offers a score, along with recommendations to improve a company’s security posture. Purview offers means for a company to manage its compliance needs, with tools to handle information governance, information protection, and others. Finally, eDiscovery solutions are intended to allow searching through application content, being available for Microsoft OneDrive, Teams, SharePoint, and Exchange, among others.
A company needs to implement Microsoft productivity solutions for its 500 employees.
The company has high speed internet access from its locations to the cloud. Remote workers have high speed internet access to the cloud.
Internet connectivity uptime is not 100%.
Users must be able to:
Collaborate within documents and workbooks.
Create relational databases.
You need to recommend a solution.
Which solution should you recommend?
Microsoft 365 Enterprise
Relational databases can be created using Microsoft Access, available as a desktop-only application. Enterprise subscriptions allow for more than 300 employees, covering the 500 employee’s requirement. Microsoft 365 web apps for business or enterprise do not offer Microsoft Access, which would allow the creation of relational databases, as it is a desktop-only application. Microsoft 365 web apps (for business or enterprise) do not offer Microsoft Access, which would allow the creation of relational databases, as it is a desktop-only application. Furthermore, business subscriptions are available only with up to 300 licenses. Although Microsoft Access is available as a desktop-only application in Microsoft 365 Business, it is available for organizations having only up to 300 subscriptions.
A company implements Microsoft 365.
The company needs to enable team leads to manage the tasks for team members.
You need to recommend a solution that meets the following requirements:
Assign a task to multiple team members.
Manage tasks in a Calendar view.
Visualize the progress of individual and team tasks in a Charts view.
Which Microsoft 365 app should you recommend?
Planner
Planner provides the team lead and team members the ability to manage tasks in a structured manner by creating a plan and buckets, for organizing assigned tasks. Tasks can be displayed in different views such as Charts and Calendar. To Do manages your to do list on a day-to-day basis. OneDrive is a cloud library for file storage and sharing. Bookings provides an easy way to manage the scheduling of appointments. To Do, OneDrive, and Bookings do not support task management.