Microsoft 365 Security and Compliance Flashcards
Microsoft 365 Administrator Expert MS-102 Flashcards

| Front | Back |
| How can administrators monitor risky sign-ins | Through Azure AD Identity Protection. |
| How do sensitivity labels function in Microsoft 365 | They classify and protect documents and emails. |
| How does Microsoft Advanced Encryption protect data | It encrypts stored and transmitted data to secure against unauthorized access. |
| How does Microsoft Endpoint Manager enhance security | It manages devices and applications with security policies. |
| How does the Anti-Malware feature in Microsoft 365 protect users | It scans and filters emails for malicious software threats. |
| How does Threat Analytics benefit organizations | It provides actionable insights for mitigating security threats. |
| What are information barriers | Rules that restrict communication between groups for compliance reasons. |
| What does ATP stand for in Microsoft 365 security | Advanced Threat Protection. |
| What does Azure AD Conditional Access enforce | Access requirements based on users and devices. |
| What does Conditional Access in Microsoft 365 allow | It enables access management based on user and device conditions. |
| What does Custom Permissions Management in Microsoft 365 allow | Administrators to define specific roles and access controls. |
| What does Defender for Identity detect | Suspicious activity and identity-based threats in your network. |
| What does device compliance policies enforce | Security requirements on users' devices accessing resources. |
| What does Microsoft Defender for Endpoint protect against | It protects devices from advanced cyber threats. |
| What does retention policy in Microsoft 365 manage | The lifecycle of email, files, and other content. |
| What does the Microsoft Purview tool specialize in | Comprehensive data governance and compliance across Microsoft services. |
| What does the term "multi-factor authentication (MFA)" refer to | A security feature requiring multiple verification methods. |
| What does the term "Safe Links" in Microsoft Defender refer to | Protection against malicious links in email and documents. |
| What does the term "Secure Score Improvement Actions" refer to | It suggests tasks to enhance your organization's security. |
| What feature blocks malware attachments in emails | Safe Attachments in Microsoft Defender. |
| What is Microsoft Secure Score | A measurement tool to evaluate and improve security posture in Microsoft 365 |
| What is Secure Score's purpose | To assess and track your organization's security posture. |
| What is the function of the Compliance Score | It measures how well your organization meets regulatory requirements. |
| What is the Microsoft Cloud App Security tool used for | To provide visibility, control, and security for cloud applications. |
| What is the purpose of Compliance Manager in Microsoft 365 | To help manage regulatory compliance requirements. |
| What is the purpose of eDiscovery in Microsoft 365 | To find and export data for legal and compliance reasons. |
| What is the purpose of Microsoft Sentinel in security management | To provide a cloud-native SIEM for detecting and responding to threats. |
| What is the purpose of Service Level Encryption in Microsoft 365 | To provide an additional layer of encryption managed by the organization. |
| What is the purpose of the Security & Compliance Center in Microsoft 365 | A hub for managing security and compliance tasks efficiently. |
| What is the role of Azure Active Directory in Microsoft 365 security | It provides identity and access management for users. |
| What is the role of data classification in Microsoft 365 | Categorizing information for better governance and protection. |
| What is the role of Microsoft Graph in security and compliance | It provides data and insights for managing security and compliance efficiently. |
| What is the role of Privileged Identity Management (PIM) in Microsoft 365 | It provides oversight and control over privileged account access. |
| What is Zero Trust in the context of Microsoft 365 security | A security model based on the principle of "never trust, always verify". |
| What tool helps detect and investigate insider risks | Microsoft Insider Risk Management. |
| Which Microsoft tool helps protect against phishing attacks | Microsoft Defender for Office 365. |
| Which report gives an overview of security and compliance trends over time | Security & Compliance Dashboard reports. |
| Which tool can administrators use to prevent accidental data sharing | Data Loss Prevention (DLP) policies. |
| Which tool helps assess risks in third-party apps | Microsoft Cloud App Security Discovery. |
About the Flashcards
Flashcards for the Microsoft 365 Administrator Expert exam guide you through the essential security and compliance features of Microsoft 365, giving you quick recall of what each tool does and when to use it. Each card highlights definitions, purposes, and best-practice scenarios so you can connect product names like Secure Score, ATP, and Conditional Access with their real-world tasks.
Review identity safeguards such as MFA, PIM, and Azure AD Identity Protection; master data governance with retention policies, sensitivity labels, and eDiscovery; and strengthen endpoint defenses using Microsoft Defender, Endpoint Manager, and Zero Trust concepts. The deck also covers threat analytics, Cloud App Security, Sentinel SIEM, dashboards, and compliance scoring to round out your exam preparation.
Topics covered in this flashcard deck:
- Identity & access controls
- Threat protection tools
- Data loss prevention
- Information governance & eDiscovery
- Endpoint and device security
- Security analytics & reporting