Microsoft 365 Fundamentals MS-900 Practice Test 10

Microsoft 365 Fundamentals (MS-900) Quiz Practice test

1 / 20

A company needs real-time monitoring and automated response for suspicious activities across Microsoft 365 and third-party cloud services. Which solution provides extended detection and response (XDR) for this scenario?

2 / 20

A company needs to ensure that Microsoft 365 tenant administrators do not have permanent privileged access and must request access only when needed. Which feature should they implement?

3 / 20

A company wants to ensure that all devices connecting to Microsoft 365 services meet security compliance requirements before accessing corporate data. Which solution provides real-time device compliance enforcement?

4 / 20

An IT administrator needs to enforce compliance with specific encryption policies when users send sensitive emails externally. However, they also need a way for external recipients to securely reply to those emails. What Microsoft 365 feature enables this?

5 / 20

A company is migrating to Microsoft 365 and wants to ensure secure authentication for all users while minimizing user friction. Which Microsoft 365 feature provides a balance between security and ease of use?

6 / 20

A company wants to track failed login attempts and detect potential brute-force attacks across Microsoft 365. Which tool provides this visibility?

7 / 20

A company wants to detect compromised administrator accounts and block them from accessing Microsoft 365 until verified. What feature can help?

8 / 20

An organization needs to prevent users from copying data from company-managed Microsoft 365 apps to personal applications on their devices. Which tool should they use?

9 / 20

A company wants to analyze malicious activities within Microsoft Teams and prevent phishing attacks inside chat messages. Which solution should they use?

10 / 20

A company wants to restrict high-risk users from accessing Microsoft 365 resources based on real-time risk analysis. Which security control should they configure?

11 / 20

A company needs to ensure that data deleted from SharePoint Online and OneDrive is recoverable for up to 10 years due to legal regulations. Which Microsoft 365 feature should they configure?

12 / 20

A company wants to block employees from accessing risky cloud applications that are not approved by IT. Which Microsoft 365 security tool can help enforce this?

13 / 20

A company needs to automatically encrypt all emails containing sensitive financial information before they leave the organization. What feature should they configure?

14 / 20

Which Microsoft 365 solution can help an organization detect and investigate potential insider threats based on user activities and communications?

15 / 20

An organization needs to analyze security risks across their entire Microsoft 365 environment and receive prioritized recommendations for improvement. Which tool provides this?

16 / 20

A company wants to secure external file sharing by allowing external users to access shared content but not download or copy it. Which Microsoft 365 feature should they use?

17 / 20

An IT administrator needs to ensure that Microsoft 365 user identities remain secure by detecting suspicious login activities and automatically responding to high-risk sign-ins. What should they configure?

18 / 20

A company wants to automate incident response by integrating Microsoft 365 security alerts with an external SIEM solution. What should they use?

19 / 20

A multinational company wants to ensure their Microsoft 365 tenant complies with regional data residency laws. Which Microsoft 365 capability helps manage this?

20 / 20

A company needs to enforce access policies based on user behavior and risk level while integrating with Microsoft Defender for Cloud Apps. Which Microsoft 365 feature should they use?

Your score is

The average score is 0%

0%