New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Acompany uses Microsoft cloud services. The company needs to protect against security breaches. You need to follow Microsoft's approach to security. Which approach should you use?

A.

Will never breach security of specific applications

B.

Will never breach the perimeter network

C.

Will never breach security

D.

Will only breach the perimeter network

E.

Will breach security

You arethe Microsoft 365 administrator for a company.You need to ensure that users receive a warning message if they select links in emails that might be unsafe.

What should you do?

A.

Use Windows PowerShell to install the latest antimalware engine updates

B.

Enable Microsoft Office 365 Advanced Threat Protection

C.

Use the Microsoft Exchange Admin Center to configure a new spam-filter policy

D.

Use the Microsoft Exchange Admin Center to create a new antimalware policy

You are evaluating Office 365 ProPlus for a company.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE:Each correct selection is worth one point.

You need to identify the software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) services provided by Microsoft 365.

What type of cloud service model does each cloud service represent?

To answer, drag the appropriate cloud service models to the correct cloud services. Each cloud service model may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE:Each correct selection is worth one point.

You are a Microsoft 365 administrator for a company.

Several users report that they receive emails which have a PDF attachment. The PDF attachment launches malicious code.

You need to remove the message from inboxes and disable the PDF threat if an affected document is opened.

Which feature should you implement?

A.

Microsoft Exchange Admin Center block lists

B.

Sender Policy Framework

C.

Advanced Threat Protection anti-phishing

D.

zero-hour auto purge

E.

DKIM signed messages with mail flow rules

A company plans to use Microsoft 365. The company needs to determine licensing costs.

Instructions: For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE:Each correct selection is worth one point.

A company plans to implement Microsoft 365 to manage projects and appointments with customers.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

: 127 HOTSPOT

You manage point-of-sale terminals that run Windows 7.

You must upgrade the terminals to Windows 10. Terminals must not be upgraded again for at least five years. You have thefollowing requirements:

    Perform consistent scheduling of upgrades and updates across all devices.

    Minimize costs.

You need to prepare for the upgrades.

What should you use? To answer, select the appropriate options in the answer area.

NOTE:Each correct selection is worth one point.

A company is exploring the meetings functionality in Microsoft Teams.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

You are investigating Microsoft 365 services and capabilities.

Match each scenario to itsMicrosoft 365 service. To answer, drag the appropriate Microsoft 365 service from the column on the left to its scenario on the right. Each Microsoft 365 service may be used once, more than once, or not at all.

NOTE:Each correct match is worth one point.