Questions

Use the following questions to test your knowledge of this chapter. You can find the answers in Chapter 22Assessment Answers:

  1. You can use _______________ to manipulate exported Audit Log data.
    1. PowerGraph
    2. Power Query
    3. Microsoft 365 Admin Center
    4. SharePoint Admin Center
  2. The ______________ contains a record of all of the sharing activities that are performed in Office 365.
    1. Unified Audit Log
    2. SharePoint Sharing Log
    3. OneDrive Activity Monitoring Service
    4. Microsoft 365 Secure Log
  3. The Unified Audit Log is enabled by default.
    1. True
    2. False
  4. Identify two methods we can use to enable the Unified Audit Log.
    1. Security & Compliance Center
    2. Microsoft 365 Admin Center
    3. Set-AdminAuditLogConfig -UnifiedAuditLogIngestionEnabled $true
    4. Enable-UnifiedAdminAuditLog -UnifiedAuditLogIngestionEnabled $true
  5. You can prevent apps that use basic authentication from accessing OneDrive for Business.
    1. True
    2. False
  1. As a security measure, your Security Administrator has requested that you restrict access to OneDrive for Business from your corporate network. What two places can you administer this setting?
    1. OneDrive for Business | Device Access | Control access based on network location
    2. SharePoint Online Admin Center | Policies Access Control | Network Location
    3. OneDrive for Business Sharing and Security
    4. SharePoint Online Admin Center | Policies Sharing
  2. The Security Administrator for your organization has requested that you restrict inactivity. What setting should you configure?
    1. Network location
    2. Modern authentication timeout
    3. Idle session sign-out
    4. Azure AD multi-factor authentication
  3. Your Compliance Administrator wants you to configure OneDrive for Business so that it implements encryption for data at rest. What should you do?
    1. Configure the OneDrive client to automatically encrypt data.
    2. Nothing. Data at rest is already encrypted.
    3. Configure the SharePoint Online service with a new managed key.
    4. Configure Azure AD with a new managed key. 
  4. Identify two methods that you can use to manage OneDrive for Business on mobile devices.
    1. Office 365 Mobile Device Management
    2. Azure AD Secure Score
    3. Conditional Access
    4. OneDrive for Business Sharing and Security control slider
  5. Your Security Administrator has requested that you configure OneDrive for Business so that the default setting for new sharing links requires users to enter email addresses manually or select them from the Global Address List. Which setting should you configure?
    1. Allow or block sharing with people on specific domains
    2. Shareable: Anyone with the link
    3. Internal: Only people in your organization
    4. Direct: Specific people
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset