
multi s1
Quiz
•
Geography
•
Professional Development
•
Practice Problem
•
Easy
John Doe
Used 2+ times
FREE Resource
Enhance your content in a minute
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You need to receive a security alert when a user attempts to sign in from a location that was never used by the other users in your organization to sign in. Which anomaly detection policy should you use?
Impossible travel
Activity from anonymous IP addresses
Activity from infrequent country
Malware detection
Answer explanation
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365. You have Microsoft SharePoint Online sites that contain sensitive documents. The documents contain customer account numbers that each consists of 32 alphanumeric characters. You need to create a data loss prevention (DLP) policy to protect the sensitive documents. What should you use to detect which documents are sensitive?
SharePoint search
a hunting query in Microsoft 365 Defender
Azure Information Protection
RegEx pattern matching
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Your company uses line-of-business apps that contain Microsoft Office VBA macros. You need to prevent users from downloading and running additional payloads from the Office VBA macros as additional child processes. Which two commands can you run to achieve the goal? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Your company uses Microsoft Defender for Endpoint. The company has Microsoft Word documents that contain macros. The documents are used frequently on the devices of the company's accounting team. You need to hide false positive in the Alerts queue, while maintaining the existing security posture. Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point
Resolve the alert automatically.
Hide the alert.
Create a suppression rule scoped to any device
Create a suppression rule scoped to a device group.
Generate the alert.
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
You have the following advanced hunting query in Microsoft 365 Defender
You need to receive an alert when any process disables System Restore on a device managed by Microsoft Defender during the last 24 hours. Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Create a detection rule
Create a suppression rule
Add | order by Timestamp to the query.
Replace DeviceProcessEvents with DeviceNetworkEvents
Add DeviceId and ReportId to the output of the query.
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
You are investigating a potential attack that deploys a new ransomware strain. You have three custom device groups. The groups contain devices that store highly sensitive information. You plan to perform automated actions on all devices. You need to be able to temporarily group the machines to perform actions on the devices. Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Assign a tag to the device group.
Add the device users to the admin role.
Add a tag to the machines.
Create a new device group that has a rank of 1
Create a new admin role.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are configuring Microsoft Defender for Identity integration with Active Directory. From the Microsoft Defender for identity portal, you need to configure several accounts for attackers to exploit. Solution: From Entity tags, you add the accounts as Honeytoken accounts. Does this meet the goal?
Yes
No
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Vui là chính
Quiz
•
University - Professi...
19 questions
Life Lines Of National Economy Part 1
Quiz
•
10th Grade - Professi...
20 questions
LIMA
Quiz
•
University - Professi...
20 questions
l'Italia e la TV
Quiz
•
KG - Professional Dev...
17 questions
Mineral and Energy Resources Part 2
Quiz
•
10th Grade - Professi...
20 questions
The Greatest Flags Quiz Ever!
Quiz
•
4th Grade - Professio...
20 questions
Flags
Quiz
•
Professional Development
21 questions
GK
Quiz
•
Professional Development
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Geography
44 questions
Would you rather...
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
14 questions
Valentine's Day Trivia!
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
11 questions
NFL Football logos
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development
