SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start

ms-900


🇬🇧
In English
Created:


Public


0 / 5  (0 ratings)



» To start learning, click login

1 / 25

[Front]


Can increase or decrease resources on demand.
[Back]


scalable

Practice Known Questions

Stay up to date with your due questions

Complete 5 questions to enable practice

Exams

Exam: Test your skills

Test your skills in exam mode

Learn New Questions

Dynamic Modes

SmartIntelligent mix of all modes
CustomUse settings to weight dynamic modes

Manual Mode [BETA]

The course owner has not enabled manual mode
Specific modes

Learn with flashcards
multiple choiceMultiple choice mode
SpeakingAnswer with voice
TypingTyping only mode

ms-900 - Leaderboard

1 user has completed this course

No users have played this course yet, be the first


ms-900 - Details

Levels:

Questions:

167 questions
🇬🇧🇬🇧
Public, Private, Hybrid
List 3 Cloud deployment models
Iaas, paas, saas
3 types of cloud services
Self-Healing
This ability allows a system to perceive it is not working properly and, without human intervention, make adjustments to restore normal operations?
1. Office 365 2. Windows 10 enterprise 3. Enterprise Moility and Security
What are the 3 core components of an M365 E3 or E5 Subscription?
1.. Microsoft Intune, A 2. Azure AD Premium, and 3. Azure Rights Management.
What are the 3 major components of Enterprise Mobility + Security (EMS)
It provides: 1. intelligent security, 2. simplified updates, 3. flexible management, and 4. enhanced productivity tools.
How does Windows 10 meets the needs of large and midsize organizations? (4 items)
This dictates how United States federal agencies protect information.
What is the Federal Information Security Modernization Act (FISMA)?
This addresses how private sector organizations collect, use, and disclose personal information in regard to commercial business.
What is The The Personal Information Protection and Electronic Documents Act (PIPEDA)?
This protects nonpublic personal information.
What is The Gramm–Leach–Bliley Act (GLBA)?
1) Self install 2) Office deployment tool 3) Configuration manager
3 ways to install Microsoft 365 Apps for enterprise (office pro plus)
AAD Identity protectinon monitors Sign in from an atypical location based on the user's recent sign-ins. What is it called?
What is and which security tool monitors this risk protection type: Atypical travel?
AAD Identity protectinon monitors this? Malware linked IP address Sign in from a malware linked IP address
What is and which security tool monitors this risk protection type: Malware linked IP address
AAD Identity protectinon monitors this? This risk detection indicates that the user's valid credentials have been leaked
What is and which security tool monitors this risk protection type: Leaked Credentials
Microsoft's internal and external threat intelligence sources have identified a known attack pattern
What is and which security tool monitors this risk protection type: Azure AD threat intelligence
Information about Microsoft 365 activities, users, files or folders, and more
What do you see in the information protection Audit log.?