Bash, the Crucial Exams Chat Bot
AI Bot
Microsoft 365 Security and Compliance Flashcards
Microsoft 365 Administrator Expert MS-102 Flashcards
| Front | Back |
| How can administrators monitor risky sign-ins | Through Azure AD Identity Protection. |
| How do sensitivity labels function in Microsoft 365 | They classify and protect documents and emails. |
| How does Microsoft Advanced Encryption protect data | It encrypts stored and transmitted data to secure against unauthorized access. |
| How does Microsoft Endpoint Manager enhance security | It manages devices and applications with security policies. |
| How does the Anti-Malware feature in Microsoft 365 protect users | It scans and filters emails for malicious software threats. |
| How does Threat Analytics benefit organizations | It provides actionable insights for mitigating security threats. |
| What are information barriers | Rules that restrict communication between groups for compliance reasons. |
| What does ATP stand for in Microsoft 365 security | Advanced Threat Protection. |
| What does Azure AD Conditional Access enforce | Access requirements based on users and devices. |
| What does Conditional Access in Microsoft 365 allow | It enables access management based on user and device conditions. |
| What does Custom Permissions Management in Microsoft 365 allow | Administrators to define specific roles and access controls. |
| What does Defender for Identity detect | Suspicious activity and identity-based threats in your network. |
| What does device compliance policies enforce | Security requirements on users' devices accessing resources. |
| What does Microsoft Defender for Endpoint protect against | It protects devices from advanced cyber threats. |
| What does retention policy in Microsoft 365 manage | The lifecycle of email, files, and other content. |
| What does the Microsoft Purview tool specialize in | Comprehensive data governance and compliance across Microsoft services. |
| What does the term "multi-factor authentication (MFA)" refer to | A security feature requiring multiple verification methods. |
| What does the term "Safe Links" in Microsoft Defender refer to | Protection against malicious links in email and documents. |
| What does the term "Secure Score Improvement Actions" refer to | It suggests tasks to enhance your organization's security. |
| What feature blocks malware attachments in emails | Safe Attachments in Microsoft Defender. |
| What is Microsoft Secure Score | A measurement tool to evaluate and improve security posture in Microsoft 365 |
| What is Secure Score's purpose | To assess and track your organization's security posture. |
| What is the function of the Compliance Score | It measures how well your organization meets regulatory requirements. |
| What is the Microsoft Cloud App Security tool used for | To provide visibility, control, and security for cloud applications. |
| What is the purpose of Compliance Manager in Microsoft 365 | To help manage regulatory compliance requirements. |
| What is the purpose of eDiscovery in Microsoft 365 | To find and export data for legal and compliance reasons. |
| What is the purpose of Microsoft Sentinel in security management | To provide a cloud-native SIEM for detecting and responding to threats. |
| What is the purpose of Service Level Encryption in Microsoft 365 | To provide an additional layer of encryption managed by the organization. |
| What is the purpose of the Security & Compliance Center in Microsoft 365 | A hub for managing security and compliance tasks efficiently. |
| What is the role of Azure Active Directory in Microsoft 365 security | It provides identity and access management for users. |
| What is the role of data classification in Microsoft 365 | Categorizing information for better governance and protection. |
| What is the role of Microsoft Graph in security and compliance | It provides data and insights for managing security and compliance efficiently. |
| What is the role of Privileged Identity Management (PIM) in Microsoft 365 | It provides oversight and control over privileged account access. |
| What is Zero Trust in the context of Microsoft 365 security | A security model based on the principle of "never trust, always verify". |
| What tool helps detect and investigate insider risks | Microsoft Insider Risk Management. |
| Which Microsoft tool helps protect against phishing attacks | Microsoft Defender for Office 365. |
| Which report gives an overview of security and compliance trends over time | Security & Compliance Dashboard reports. |
| Which tool can administrators use to prevent accidental data sharing | Data Loss Prevention (DLP) policies. |
| Which tool helps assess risks in third-party apps | Microsoft Cloud App Security Discovery. |
This deck focuses on implementing security controls, managing compliance features, and understanding security policies within Microsoft 365.