0% found this document useful (0 votes)
193 views4 pages

SC200 Lab 1 - With Answers

This document contains 10 multiple choice questions and their answers related to configuring and using Microsoft 365 Defender. The questions cover topics like where to find sign-in logs, the purpose of applying preset security policies, recommended actions for errors, and how to manage standard protection settings. The answers are found in the tasks and documentation for the Microsoft 365 Defender lab scenario.

Uploaded by

d
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
193 views4 pages

SC200 Lab 1 - With Answers

This document contains 10 multiple choice questions and their answers related to configuring and using Microsoft 365 Defender. The questions cover topics like where to find sign-in logs, the purpose of applying preset security policies, recommended actions for errors, and how to manage standard protection settings. The answers are found in the tasks and documentation for the Microsoft 365 Defender lab scenario.

Uploaded by

d
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Question 1

Where can you find the sign-in logs for Azure AD when using Microsoft 365 Defender?
A. Threat protection dashboard
B. Security & Compliance Center
C. Microsoft 365 Defender Threat Hunting
D. Azure AD Identity Protection

Answer: C. Microsoft 365 Defender Threat Hunting


(Found in Task 1: Obtain Your Microsoft 365 Credentials)

Question 2
What is the primary purpose of applying preset security policies in Microsoft Defender
for Office 365?
A. To configure user permissions
B. To enforce device compliance
C. To protect against email threats
D. To manage software updates

Answer: C. To protect against email threats


(Found in Lab Scenario)

Question 3
What action should you take if you receive the message "The operation could not be
completed" while signing in?
A. Contact Microsoft support immediately
B. Click OK to continue
C. Restart the virtual machine
D. Reset the tenant password
Answer: B. Click OK to continue
(Found in Task 2: Apply Microsoft Defender for Office 365 preset security policies)

Question 4
What are the recommended actions if you receive an error about the hydration status of
your tenant while managing preset security policies?
A. Ignore the error
B. Refresh the browser using Ctrl+F5
C. Reboot the WIN1 virtual machine
D. Wait for the hydration status to enable by default

Answer: B. Refresh the browser using Ctrl+F5


(Found in Task 2: Apply Microsoft Defender for Office 365 preset security policies)

Question 5
What type of protection does DMARC/DKIM/SPF provide in the Microsoft Defender for
Office 365 email filtering stack?
A. Malware protection
B. Ransomware protection
C. Email authentication to prevent spoofing
D. Data loss prevention

Answer: C. Email authentication to prevent spoofing


(Found in Microsoft Defender for Office 365 filtering stack explained)

Question 6
When configuring the 'Standard protection' in Microsoft Defender for Office 365, which
type of policies are applied?
A. Anti-virus and device control policies
B. Anti-spam, anti-malware, and anti-phishing policies
C. Data retention and eDiscovery policies
D. Identity and access management policies

Answer: B. Anti-spam, anti-malware, and anti-phishing policies


(Found in Task 2: Apply Microsoft Defender for Office 365 preset security policies)

Question 7
What is the password for the Admin user on the WIN1 virtual machine?
A. admin@WWLx971111.onmicrosoft.com
B. Pa55w.rd
C. u^5aUJ2B=2x4%%Pg
D. Admin@1234

Answer: B. Pa55w.rd
(Found in Task 2: Apply Microsoft Defender for Office 365 preset security policies)

Question 8
What should you do if you see a coffee mug image and a message indicating that new
spaces for your data are being prepared?
A. Close the browser and start over
B. Wait approximately 5 minutes for the process to finish
C. Immediately turn off the virtual machine
D. Click on 'Turn new features on' again

Answer: B. Wait approximately 5 minutes for the process to finish


(Found in Task 3: Preparing the Microsoft 365 Defender workspace)

Question 9
Who owns the tenants provided as part of the Microsoft 365 Defender lab?
A. The student using the tenant
B. The instructor-led training provider
C. Microsoft Corporation
D. The Authorized Lab Hosting provider

Answer: C. Microsoft Corporation


(Found in Lab Scenario)

Question 10
What should you select under 'Preset Security Policies' to manage protection settings
for 'Standard protection'?
A. Strict protection
B. Manage service settings
C. Threat policy settings
D. Manage protection settings

Answer: D. Manage protection settings


(Found in Task 2: Apply Microsoft Defender for Office 365 preset security policies)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy