DRAG DROP
Match the Microsoft Defender for Office 365 feature to the correct description.
To answer, drag the appropriate feature from the column on the left to its description on the right. Each feature may be used once, more than once, or not at all.
NOTE: Each correct match is worth one point.
Select and Place:
HOTSPOT
Select the answer that correctly completes the sentence.
Hot Area:
HOTSPOT
Select the answer that correctly completes the sentence.
Hot Area:
HOTSPOT
Select the answer that correctly completes the sentence.
Hot Area:
HOTSPOT
Select the answer that correctly completes the sentence.
Hot Area:
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
HOTSPOT
Select the answer that correctly completes the sentence.
Hot Area:
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point
Hot Area:
What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?
A. automated remediation
B. automated investigation
C. advanced hunting
D. network protection
You receive an email that contains a list of words that will be used for a sensitive information type.
You need to create a file that can be used as the source of a keyword dictionary.
In which format should you save the list?
A. a JSON file that has an element for each word
B. an ACCDB database file that contains a table named Dictionary
C. an XML file that contains a keyword tag for each word
D. a CSV file that contains words separated by commas
You have a Microsoft 365 tenant that uses trainable classifiers.
You are creating a custom trainable classifier.
You collect 300 sample file types from various geographical locations to use as seed content. Some of the file samples are encrypted.
You organize the files into categories as shown in the following table.
Which file categories can be used as seed content?
A. Category2, Category3, and Category5 only
B. Category1 and Category3 only
C. Category4 and Category6 only
D. Category4 and Category5 only
You have an Azure subscription that contains a Log Analytics workspace.
You need to onboard Microsoft Sentinel.
What should you do first?
A. Create a hunting query.
B. Correlate alerts into incidents.
C. Connect to your security sources.
D. Create a custom detection rule.
Which three forms of verification can be used with Azure AD Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.
NOTE: Each correct answer is worth one point.
A. security questions
B. the Microsoft Authenticator app
C. SMS messages
D. a smart card
E. Windows Hello for Business
You need to ensure repeatability when creating new resources in an Azure subscription. What should you use?
A. Microsoft Sentinel
B. Azure Policy
C. Azure Batch
D. Azure Blueprints