A company is planning to use Microsoft Defender XDR.
The company needs to protect Windows 10 client computers from malicious viruses. The company also needs to identify unauthorized cloud apps that are used by end users.
You need to identify the Microsoft Defender XDR solutions that meet the requirements.
Which two solutions should you choose? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Answer : C, D
: 139
A business acquaintance from another company sends you a document that is encrypted by Azure Information Protection (AIP).
You are unable to open the document because the user account cannot be authenticated by the company's Azure Active Directory.
You need to access the document.
What should you do?
Answer : A
https://docs.microsoft.com/en-us/azure/information-protection/rms-for-individuals
A company uses Microsoft 365.
Thecompany wants to provide workflows of business tasks that connect to Microsoft Outlook and Microsoft Teams.
You need to choose a solution that meets the requirement.
Which solution should you choose?
Answer : A
You need to identify which Microsoft platforms provide hybrid capacities for migratingfrom an on premises deployment. Which two platforms provide hybrid capabilities for migration? Each correct answer provides a complete solution.
NOTE: Each correct selection & worth one point.
Answer : A, C
https://docs.microsoft.com/en-us/office365/enterprise/architecture-of-microsoft-hybrid-cloud-scenarios
A company has 250 employees.
You need to migrate all users to Microsoft 365 and meet the following requirements:
Provide auser-centric licensing solution for all users.
Manage devices from a single location.
Minimize licensing costs.
Which licensing model should you use?
Answer : A
https://products.office.com/en-za/compare-all-microsoft-office-products?tab=2
https://docs.microsoft.com/en-us/microsoft-365/business/support/microsoft-365-business-faqs
A company deploys Microsoft 365.
The company plans to use sensitivity labels.
You need to identify the capabilities of sensitivity labels.
What are three capabilitiesof sensitivity labels? Each correct answer presents part of the solution.
NOTE:Each correct selection is worth one point.
Answer : A, D, E
With sensitivity labels you can classify and help protect your sensitive content. Protection options include labels, watermarks, and encryption.
https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide
A company is planning to use Microsoft Threat Protection.
The company needs to protect Windows 10 client computers from malicious viruses. The company also needs to identify unauthorized cloud apps that are used by end users.
You need to identify the Microsoft Threat Protection solutions that meet the requirements.
Which two solutions should you choose? Each correct answer presents part of the solution.
NOTE:Each correct selection is worth one point.
Answer : B, D