Chapter 9, Understanding Security and Compliance Concepts with Microsoft 365
- A: Recommend security configurations for Microsoft 365 services.; C: Provide configuration steps for security recommendations or links to configuration controls.
- A: Define application-based security policies.; C: Wipe the managed application profile.
- B: Azure portal
- C: Microsoft Endpoint Manager admin center
- A: Microsoft 365 Groups; Bb: Security groups; C: Mail-enabled security groups; E: Distribution lists
- B: Only cases that they created or are assigned to them
- A: All cases
- A: Identity; C: Data; F: Device; G: Apps
- B: New and existing external users
- A: They can have the same level of permissiveness as SharePoint sharing controls.; C: They can be less permissive than SharePoint sharing controls.
- A: Two-stage recycle bin; C: Preservation Hold Library; D: Versioning
- C: The on-premises Active Directory password control settings are synchronized to AAD.
- C: AIP...