Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

MS-900 Exam Dumps - Microsoft 365 Fundamentals

Go to page:
Question # 9

Instructions: For each of the following statement, select Yes if the statement is true. Otherwise, Select No.

Full Access
Question # 10

Instructions: For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE:Each correct selection is worth one point.

Full Access
Question # 11

STION NO: 120DRAG DROP

You are the Microsoft 365 administrator for a company that uses only on-premises resources. The company does not have a private cloud.

You need to deploy cloud-based resources for the company that minimizes costs.

Which cloudmodels should you use? To answer, drag the appropriate cloud models to the correct requirements. Each cloud model may be used one, more than once, or not at all.

You may need to drag the split bar between panes or scroll to view content.

NOTE:Eachcorrect selection is worth one point.

Full Access
Question # 12

A company deploys Microsoft Azure AD. You enable multi-factor authentication.

You need to inform users about the multi-factor authentication methods that they can use.

Which of the following methods is NOT a valid multi-factor authentication method in Microsoft 365?

A.

Receive an automated call on thedesk phone that includes a verification code

B.

Insert a small card in to a desktop computer and provide a PIN code when prompted

C.

Receive a call on a mobile phone and select the pound sign (#) when prompted

D.

Receive an SMS text message that includes averification code

Full Access
Question # 13

You are a Microsoft 365 administrator for a company. The company implementsfederated authentication and Azure AD Connect.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE:Each correct selection is worth one point.

Full Access
Question # 14

Acompany uses Microsoft cloud services. The company needs to protect against security breaches. You need to follow Microsoft's approach to security. Which approach should you use?

A.

Will never breach security of specific applications

B.

Will never breach the perimeter network

C.

Will never breach security

D.

Will only breach the perimeter network

E.

Will breach security

Full Access
Question # 15

You are a Microsoft 365 administrator.

You need to implement the appropriate features for each scenario.

What should you implement? To answer, select the appropriate options in the answer area.

NOTE:Each correctselection is worth one point.

Full Access
Question # 16

Acompany is evaluating solutions to improve their customer service capabilities.

When customers call the company. they should be directly routed to the appropriate customer service person

You need to recommend solutions for the company’s requirements.

Which solutions should you recommend? TO answer, select the appropriate options in the answer area.

Full Access
Go to page:

Hot Exams