لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What are customers responsible for when evaluating security in a software as a service (SaaS) cloud services model?
A. pplications
B. etwork controls
C. perating systems
D. ccounts and identities
عرض الإجابة
اجابة صحيحة: D
السؤال #2
What can you protect by using the information protection solution in the Microsoft 365 compliance center?
A. computers from zero-day exploits
B. users from phishing attempts
C. files from malware and viruses
D. sensitive data from being exposed to unauthorized users
عرض الإجابة
اجابة صحيحة: D
السؤال #3
What is a use case for implementing information barrier policies in Microsoft 365?
A. to restrict unauthenticated access to Microsoft 365
B. to restrict Microsoft Teams chats between certain groups within an organization
C. to restrict Microsoft Exchange Online email between certain groups within an organization
D. to restrict data sharing to external email recipients
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which Microsoft portal provides information about how Microsoft manages privacy, compliance, and security?
A. Microsoft Service Trust Portal
B. Compliance Manager
C. Microsoft 365 compliance center
D. Microsoft Support
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft SharePoint Onlinesite that contain a specific key word?
A. Audit
B. Compliance Manager
C. Content Search
D. Alerts
عرض الإجابة
اجابة صحيحة: C
السؤال #6
What are three uses of Microsoft Cloud App Security? Each correct answer presents a complete solution.NOTE: Each correct selection is worth one point.
A. to discover and control the use of shadow IT
B. to provide secure connections to Azure virtual machines
C. to protect sensitive information hosted anywhere in the cloud
D. to provide pass-through authentication to on-premises applications
E. to prevent data leaks to noncompliant apps and limit access to regulated data
عرض الإجابة
اجابة صحيحة: ACE
السؤال #7
What can you use to provision Azure resources across multiple subscriptions in a consistent manner?
A. Azure Defender
B. Azure Blueprints
C. Azure Sentinel
D. Azure Policy
عرض الإجابة
اجابة صحيحة: B
السؤال #8
What can be created in Active Directory Domain Services (AD DS)?
A. ine-of-business (106) applications that require modem authentication
B. ob devices
C. omputer accounts
D. oftware as a service (SaaS) applications that require modem authentication
عرض الإجابة
اجابة صحيحة: D
السؤال #9
What do you use to provide real-time integration between Azure Sentinel and another security source?
A. Azure AD Connect
B. a Log Analytics workspace
C. Azure Information Protection
D. a connector
عرض الإجابة
اجابة صحيحة: D
السؤال #10
In a hybrid identity model, what can you use to sync identities between Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD)?
A. Active Directory Federation Services (AD FS)
B. Azure Sentinel
C. Azure AD Connect
D. Azure Ad Privileged Identity Management (PIM)
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Which two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
A. Display policy tips to users who are about to violate your organization’s policies
B. Enable disk encryption on endpoints
C. Protect documents in Microsoft OneDrive that contain sensitive information
D. Apply security baselines to devices
عرض الإجابة
اجابة صحيحة: A
السؤال #12
When you enable Azure AD Multi-Factor Authentication (MFA), how many factors are required for authentication?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Which Microsoft Purview solution can be used to identify data leakage?
A. nsider risk management
B. ompliance Manager
C. ommunication compliance
D. Discovery
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Which Microsoft 365 feature can you use to restrict users from sending email messages that contain lists of customers andtheir associated credit card numbers?
A. retention policies
B. data loss prevention (DLP) policies
C. conditional access policies
D. information barriers
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for Standardization (ISO)?
A. the Microsoft Endpoint Manager admin center
B. Azure Cost Management + Billing
C. Microsoft Service Trust Portal
D. the Azure Active Directory admin center
عرض الإجابة
اجابة صحيحة: C
السؤال #16
What can you specify in Microsoft 365 sensitivity labels?
A. how long files must be preserved
B. when to archive an email message
C. which watermark to add to files
D. where to store files
عرض الإجابة
اجابة صحيحة: C
السؤال #17
In a Core eDiscovery workflow, what should you do before you can search for content?
A. Create an eDiscovery hold
B. Run Express Analysis
C. Configure attorney-client privilege detection
D. Export and download results
عرض الإجابة
اجابة صحيحة: A
السؤال #18
To which type of resource can Azure Bastion provide secure access?
A. Azure Files
B. Azure SQL Managed Instances
C. Azure virtual machines
D. Azure App Service
عرض الإجابة
اجابة صحيحة: C
السؤال #19
Which three authentication methods can Microsoft Entra users use to reset their password? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
A. ext message to a phone
B. ertificate
C. obile app notification
D. ecurity questions
E. icture password
عرض الإجابة
اجابة صحيحة: ACD
السؤال #20
Which Azure Active Directory (Azure AD) feature can you use to evaluate group membership and automatically remove users that no longer require membership in a group?
A. access reviews
B. managed identities
C. conditional access policies
D. Azure AD Identity Protection
عرض الإجابة
اجابة صحيحة: A
السؤال #21
What is the purpose of Azure Active Directory (Azure AD) Password Protection?
A. to control how often users must change their passwords
B. to identify devices to which users can sign in without using multi-factor authentication (MFA)
C. to encrypt a password by using globally recognized encryption standards
D. to prevent users from using specific words in their passwords
عرض الإجابة
اجابة صحيحة: D
السؤال #22
HOTSPOT Select the answer that correctly completes the sentence.
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: