
SC 900 - English 1to3
Authored by Ethel Pasquel Romero
Computers
1st Grade
Used 35+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
An organization has deployed Microsoft 365 applications to all employees. Who is responsible for the security of the personal data relating to these employees?
The organization
Microsoft, the SaaS provider
There's shared responsibility between an organization and Microsoft.
2.
MULTIPLE CHOICE QUESTION
2 mins • 5 pts
The human resources organization wants to ensure that stored employee data is encrypted. Which security mechanism would they use?
Hashing
Encryption in transit
Encryption at rest
3.
MULTIPLE CHOICE QUESTION
2 mins • 5 pts
Authentication is the process of doing what?
Verifying that a user or device is who they say they are.
The process of profiling user behavior.
Enabling federated services.
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
When explaining the benefits of Windows Hello for Business, which of the following statements is true?
Windows Hello is an authentication feature built into Windows Server 2012 R2.
Windows Hello is an alternative to multifactor authentication.
Windows Hello for Business is more secure because it uses a PIN or biometric data to authenticate users and always uses key-based or certificate-based authentication.
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
An organization has much of its application data in Azure. The security admin wants to use the encryption capabilities in Azure. Which service would the admin use to store the application’s secrets?
Transparent data encryption.
Secrets management.
Azure Key Vault.
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A lead admin for an organization is looking to protect against malicious threats posed by email messages, links (URLs), and collaboration tools. Which solution from the Microsoft 365 Defender suite is best suited for this purpose?
Microsoft Defender for Office 365.
Microsoft Defender for Endpoint.
Microsoft Defender for Identity.
7.
MULTIPLE CHOICE QUESTION
2 mins • 5 pts
Which of the following measures might an organization implement as part of the defense in-depth security methodology?
Locating all its servers in a single physical location.
Multifactor authentication for all users.
Ensuring there's no segmentation of your corporate network.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?