ms-900
🇬🇧
In English
In English
Practice Known Questions
Stay up to date with your due questions
Complete 5 questions to enable practice
Exams
Exam: Test your skills
Test your skills in exam mode
Learn New Questions
Manual Mode [BETA]
The course owner has not enabled manual mode
Specific modes
Learn with flashcards
multiple choiceMultiple choice mode
SpeakingAnswer with voice
TypingTyping only mode
ms-900 - Leaderboard
ms-900 - Details
Levels:
Questions:
167 questions
🇬🇧 | 🇬🇧 |
Scaling up, adding more cpu's or ram to a single server | Vertical Scaling |
Scaling out, adding more servers that work together with other servers. Eg. have multiple servers handle incoming requests. | Horizontal Scaling |
The ability to do things more efficiently or at a lower-cost per unit when operating at a larger scale. | Economies of scale |
Server, storage, networking, backup & archiving, disaster recovery, datacentre, technical personel costs | List 6 costs in Capex server |
Public, Private, Hybrid | List 3 Cloud deployment models |
Iaas, paas, saas | 3 types of cloud services |
1. Business case 2. Requirments 3. Migration 4. Testing 5. Deployment 6. Operate (devops) 7. Improve | What are the 7 steps in a cloud migration? |
Total cost of ownership and return on investment. We need to use these when communicating value to an orginization. We need to calculate these values for them. | What is TCO and ROI and why are they important |
Self-Healing | This ability allows a system to perceive it is not working properly and, without human intervention, make adjustments to restore normal operations? |
1. Education - Affordiable solution for education providers 2. Business - For small businesses for up to 300 users 3. Enterprise - Complete solution for larer organizations | What are the 3 major types of M365 and describe them |
1. Office 365 2. Windows 10 enterprise 3. Enterprise Moility and Security | What are the 3 core components of an M365 E3 or E5 Subscription? |
1.. Microsoft Intune, A 2. Azure AD Premium, and 3. Azure Rights Management. | What are the 3 major components of Enterprise Mobility + Security (EMS) |
Designed to help manage and protect users, devices, apps, and data in a mobile-first, cloud-first world | WHat is EMS designed for? |
Cloud service provider | Whats a CSP? |
1. Unlocks creativity 2. Built for Teamwork 3. Integrated for Simplicity 4. Intelligent security | What are the 4 primary value adds of Microosft 365 |
Microsoft Endpoint Manager is an integrated solution for managing all of your devices. Microsoft brings together Configuration Manager and Intune with simplified licensing. | What is Microsoft Endpoint Configuration Manager? |
Configuration Manager Intune Desktop Analytics Autopilot Other features in the Device Management Admin Console | What 5 components does Microsoft endpoint manager make up? |
It provides: 1. intelligent security, 2. simplified updates, 3. flexible management, and 4. enhanced productivity tools. | How does Windows 10 meets the needs of large and midsize organizations? (4 items) |
This is next generation malware and hacking defense to help protect against threats, including zero-day attacks. It provides a hardened platform that can help prevent encounters, isolate threats, and control the execution of malicious apps and content. | What is Windows 10 threat protection? What does it protect against? |
WHat protects user identities against pass-the-hash and pass-the-ticket attacks, helping you move to a world without passwords. | What is windows 10 Identity protection and what does it protect against? |
This is a biometric authentication tool that strengthens authentication and helps guard against potential spoofing. | What is windows hello? |
This helps protect sensitive information against leaks. When you combine Windows 10 with Azure Information Protection and Office 365, you get a sophisticated solution that meets the highest requirements for data loss prevention with minimal input. | What is Windows 10 Information protection, what does it protect? |
You can install this from a network share or directly from the internet. | How do you install Office 365 pro plus? |
The Service Organization Controls. | What is SOC? |
THis is the Federal Risk and authorization Management program. | What is the FedRAMP? |
This dictates how United States federal agencies protect information. | What is the Federal Information Security Modernization Act (FISMA)? |
This covers the use or disclosure of student education records, including student information sent in email or email attachments. | What is The Family Educational Rights and Privacy Act (FERPA)? |
This addresses how private sector organizations collect, use, and disclose personal information in regard to commercial business. | What is The The Personal Information Protection and Electronic Documents Act (PIPEDA)? |
This protects nonpublic personal information. | What is The Gramm–Leach–Bliley Act (GLBA)? |
As soon as possible — during the development cycle, through a process called flighting — so that organizations can see exactly what Microsoft is developing and start their testing as soon as possible. | How often are updates for the WIndows insider service? |
->Feature updates that add new functionality twice per year, -> quality updates that provide security and reliability fixes at least once a month. | With Windows 10, what are the two release types? |
This is a group of tools that allow you to manage your companies infrastructure. It allows you to manage PC's and Mobile devices and install office. | SCCM (system centre 2016) |
1) Self install 2) Office deployment tool 3) Configuration manager | 3 ways to install Microsoft 365 Apps for enterprise (office pro plus) |
Use this to security feature to secure identities to reach zero trust. This is the bedrock upon which a secure digital estate is built. | Identity and access management |
This security feature helps to stop damaging attacks with integrated and automated security. | Threat protection |
Use this security feature to Locate and classify information anywhere it lives | Information Protection |
Use this security feature to strenthen your security posture with insights and guidance | Security Management |
These are Analytics for your cloud apps and services, helping security teams better understand the protections for critical data across cloud apps. | What is Microsoft Cloud app security? |
Name of windows service that covers: Identities, endpoints, user data, Cloud apps, Infrastructure | Microsoft Threat Protection covers these five areas |
These 3 reports are in which security app? Risky users Risky sign-ins Risk detections | 3 key Reports available in Azure Identity protections |
THis protection requires users be a Security Reader, Security Operator, Security Administrator, Global Reader, or Global Administrator in order to access. | What security roles allow for Azure identity protection? |
AAD Identity protectinon monitors Sign in from an atypical location based on the user's recent sign-ins. What is it called? | What is and which security tool monitors this risk protection type: Atypical travel? |
AAD Identity protectinon monitors this? Sign in from an anonymous IP address (for example: Tor browser, anonymizer VPNs). What is it called? | What is and which security tool monitors this risk protection type: Anonymous IP address? |
AAD Identity protectinon monitors this? Sign in with properties What is and which security tool monitors this risk protection type: we've not seen recently for the given user. | What is and which security tool monitors this risk protection type: Unfamiliar sign-in properties |
AAD Identity protectinon monitors this? Malware linked IP address Sign in from a malware linked IP address | What is and which security tool monitors this risk protection type: Malware linked IP address |
AAD Identity protectinon monitors this? This risk detection indicates that the user's valid credentials have been leaked | What is and which security tool monitors this risk protection type: Leaked Credentials |
Microsoft's internal and external threat intelligence sources have identified a known attack pattern | What is and which security tool monitors this risk protection type: Azure AD threat intelligence |
BitLocker and credential guard help protect the integrity of the boot process and user credentials. Windows Hello uses biometric authentication (fingerprints and facial recognition) to guard against potential spoofing. Windows Information Protection (WIP) helps protect enterprise apps and data against accidental data leaks on both enterprise-owned and personal devices. | What are 3 built-in security protections to help safeguard against viruses, phishing, and malware in windows 10? |
This matches, false positives and overrides, and links to create or edit policies | What is Data loss prevention? |
Information about sent and received email messages, recent alerts, top senders and recipients, email forwarding reports, and more | What is information protection Mail flow.? |
Information about how labels are applied, labels classified as records, label trends, and more | What is information protection Data governance? |
Tools and guidance to facilitate ease in discovering, governing, protecting, and monitoring the personal data in your organization. | What is information protection Data privacy? |
Information about Microsoft 365 activities, users, files or folders, and more | What do you see in the information protection Audit log.? |
FedRAMP reports, governance, risk and compliance reports, ISO information security management reports, and Service Organization Controls audit and assessment reports | What are in the information protection Compliance reports? |
Where can you find Real-time reports to help you keep on top of issues with users, devices, apps, and infrastructure? | Microsoft security centre |
Where you can find Insights and recommendations to help you improve your security posture and take advantage of Microsoft 365 security features. | Microsoft security centre |
Where you configure device and data policies to help you better manage your organization. | Microsoft security centre |