Microsoft 365 Security, Compliance, and Deployment Flashcards
Acronym | Definition |
---|---|
What is Multi-Factor Authentication MFA and why is it important | MFA adds an extra layer of security by requiring two or more forms of authentication |
Name three key security features of Microsoft 365 | Microsoft Defender for Office 365 Advanced Threat Protection and Conditional Access |
What is FastTrack for Microsoft 365 | FastTrack helps organizations plan deploy and adopt Microsoft 365 services |
How does Microsoft 365 handle data loss prevention DLP | DLP prevents sensitive information from being shared externally or mishandled |
What is the purpose of the Microsoft 365 Security and Compliance Center | It provides tools to manage compliance policies and monitor security risks |
How does Microsoft 365 ensure data encryption | Microsoft 365 uses encryption at rest and in transit to protect data |
What is Conditional Access in Microsoft 365 | Conditional Access controls access based on user conditions such as location or device |
What is included in Microsoft Defender for Office 365 | Protection against phishing malware and business email compromise |
What are the key tools for deployment in Microsoft 365 | Tools include FastTrack Microsoft Endpoint Manager and Configuration Manager |
What compliance standards does Microsoft 365 support | Microsoft 365 supports GDPR HIPAA ISO 27001 and more |
What is the role of Intune in Microsoft 365 security | Intune manages mobile devices apps and access policies |
How does Microsoft 365 support secure remote work | Through VPN-less access MFA and secure file sharing |
What are the steps for deploying Microsoft 365 | Plan the deployment configure tenant settings assign licenses and roll out to users |
What is Zero Trust in Microsoft 365 security | Zero Trust assumes no implicit trust and verifies every request as if it originates from an open network |
What support options does Microsoft offer for businesses using Microsoft 365 | Options include online documentation community support and premium support plans |
Front
Name three key security features of Microsoft 365
Click the card to flip
Back
Microsoft Defender for Office 365 Advanced Threat Protection and Conditional Access
Front
What is Conditional Access in Microsoft 365
Back
Conditional Access controls access based on user conditions such as location or device
Front
What compliance standards does Microsoft 365 support
Back
Microsoft 365 supports GDPR HIPAA ISO 27001 and more
Front
How does Microsoft 365 handle data loss prevention DLP
Back
DLP prevents sensitive information from being shared externally or mishandled
Front
What is included in Microsoft Defender for Office 365
Back
Protection against phishing malware and business email compromise
Front
What is the purpose of the Microsoft 365 Security and Compliance Center
Back
It provides tools to manage compliance policies and monitor security risks
Front
How does Microsoft 365 ensure data encryption
Back
Microsoft 365 uses encryption at rest and in transit to protect data
Front
How does Microsoft 365 support secure remote work
Back
Through VPN-less access MFA and secure file sharing
Front
What is FastTrack for Microsoft 365
Back
FastTrack helps organizations plan deploy and adopt Microsoft 365 services
Front
What are the key tools for deployment in Microsoft 365
Back
Tools include FastTrack Microsoft Endpoint Manager and Configuration Manager
Front
What support options does Microsoft offer for businesses using Microsoft 365
Back
Options include online documentation community support and premium support plans
Front
What is Multi-Factor Authentication MFA and why is it important
Back
MFA adds an extra layer of security by requiring two or more forms of authentication
Front
What is the role of Intune in Microsoft 365 security
Back
Intune manages mobile devices apps and access policies
Front
What is Zero Trust in Microsoft 365 security
Back
Zero Trust assumes no implicit trust and verifies every request as if it originates from an open network
Front
What are the steps for deploying Microsoft 365
Back
Plan the deployment configure tenant settings assign licenses and roll out to users
1/15