Buscar
Estás en modo de exploración. debe iniciar sesión para usar MEMORY

   Inicia sesión para empezar

ms-900


🇬🇧
In Inglés
Creado:


Public


0 / 5  (0 calificaciones)



» To start learning, click login

1 / 25

[Front]


Can increase or decrease resources on demand.
[Back]


scalable

Practique preguntas conocidas

Manténgase al día con sus preguntas pendientes

Completa 5 preguntas para habilitar la práctica

Exámenes

Examen: pon a prueba tus habilidades

Pon a prueba tus habilidades en el modo de examen

Aprenda nuevas preguntas

Modos dinámicos

InteligenteMezcla inteligente de todos los modos
PersonalizadoUtilice la configuración para ponderar los modos dinámicos

Modo manual [beta]

El propietario del curso no ha habilitado el modo manual
Modos específicos

Aprende con fichas
elección múltipleModo de elección múltiple
Expresión oralResponde con voz
EscrituraModo de solo escritura

ms-900 - Marcador

1 usuario ha completado este curso

Ningún usuario ha jugado este curso todavía, sé el primero


ms-900 - Detalles

Niveles:

Preguntas:

167 preguntas
🇬🇧🇬🇧
Public, Private, Hybrid
List 3 Cloud deployment models
Iaas, paas, saas
3 types of cloud services
Self-Healing
This ability allows a system to perceive it is not working properly and, without human intervention, make adjustments to restore normal operations?
1. Office 365 2. Windows 10 enterprise 3. Enterprise Moility and Security
What are the 3 core components of an M365 E3 or E5 Subscription?
1.. Microsoft Intune, A 2. Azure AD Premium, and 3. Azure Rights Management.
What are the 3 major components of Enterprise Mobility + Security (EMS)
It provides: 1. intelligent security, 2. simplified updates, 3. flexible management, and 4. enhanced productivity tools.
How does Windows 10 meets the needs of large and midsize organizations? (4 items)
This dictates how United States federal agencies protect information.
What is the Federal Information Security Modernization Act (FISMA)?
This addresses how private sector organizations collect, use, and disclose personal information in regard to commercial business.
What is The The Personal Information Protection and Electronic Documents Act (PIPEDA)?
This protects nonpublic personal information.
What is The Gramm–Leach–Bliley Act (GLBA)?
1) Self install 2) Office deployment tool 3) Configuration manager
3 ways to install Microsoft 365 Apps for enterprise (office pro plus)
AAD Identity protectinon monitors Sign in from an atypical location based on the user's recent sign-ins. What is it called?
What is and which security tool monitors this risk protection type: Atypical travel?
AAD Identity protectinon monitors this? Malware linked IP address Sign in from a malware linked IP address
What is and which security tool monitors this risk protection type: Malware linked IP address
AAD Identity protectinon monitors this? This risk detection indicates that the user's valid credentials have been leaked
What is and which security tool monitors this risk protection type: Leaked Credentials
Microsoft's internal and external threat intelligence sources have identified a known attack pattern
What is and which security tool monitors this risk protection type: Azure AD threat intelligence
Information about Microsoft 365 activities, users, files or folders, and more
What do you see in the information protection Audit log.?