Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft 365 Mobility and Security – Exam Guide MS-101

You're reading from   Microsoft 365 Mobility and Security ‚Äö√Ñ√¨ Exam Guide MS-101 Explore threat management, governance, security, compliance, and device services in Microsoft 365

Arrow left icon
Product type Paperback
Published in Nov 2019
Publisher Packt
ISBN-13 9781838984656
Length 312 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Nate Chamberlain Nate Chamberlain
Author Profile Icon Nate Chamberlain
Nate Chamberlain
Arrow right icon
View More author details
Toc

Table of Contents (22) Chapters Close

Preface 1. Section 1: Modern Device Services FREE CHAPTER
2. Implementing Mobile Device Management (MDM) 3. Managing Device Compliance 4. Planning for Devices and Apps 5. Planning Windows 10 Deployment 6. Section 2: Microsoft 365 Security Threat Management
7. Implementing Cloud App Security (CAS) 8. Implementing Threat Management 9. Implementing Windows Defender ATP 10. Managing Security Reports and Alerts 11. Section 3: Microsoft 365 Governance Compliance
12. Configuring Data Loss Prevention (DLP) 13. Implementing Azure Information Protection (AIP) 14. Managing Data Governance 15. Managing Auditing 16. Managing eDiscovery 17. Section 4: Mock Exams
18. Mock Exam 1
19. Mock Exam 2
20. Assessments 21. Another Book You May Enjoy

Mock Exam 1

  1. Answers: F, A, B
    Enable-AadrmSuperUserFeature enables the Super User Feature and you can add a user with Add-AadrmSuperUser. The completed PowerShell code would look like this:
Enable-AadrmSuperUserFeature
Add-AadrmSuperUser -EmailAddress "marlon.jackson@contoso.com"

More information: https://docs.microsoft.com/en-us/azure/information-protection/configure-super-users.

  1. Answer: A
    You cannot move data once Microsoft Defender ATP has been configured. You need to offboard the devices and onboard them again.

More information: https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy.

  1. Answer: D
    Mail flow rules in the Exchange admin center allow you to check email subject lines (and message bodies) for specific words or phrases. Then, you can apply a number of actions, including encryption. With AIP, you can...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image