Microsoft 365 Fundamentals Practice Test (MS-900)
Use the form below to configure your Microsoft 365 Fundamentals Practice Test (MS-900). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Microsoft 365 Fundamentals MS-900 Information
The Microsoft 365 Fundamentals (MS-900) certification is an entry-level credential designed for individuals looking to demonstrate foundational knowledge of Microsoft's cloud services. This certification focuses on core concepts of Microsoft 365, including cloud computing models, productivity solutions, collaboration tools, security, compliance, and pricing structures. It provides a broad understanding of Microsoft 365's offerings, which makes it an excellent starting point for individuals new to cloud services or Microsoft technologies.
The certification exam covers four key areas: cloud concepts, core Microsoft 365 services and concepts, security, compliance, and trust in Microsoft 365, as well as Microsoft 365 pricing and support. Candidates are expected to understand the different types of cloud services—SaaS, PaaS, and IaaS—and how these services are integrated into Microsoft 365. This includes being familiar with the productivity capabilities of apps like Microsoft Word, Excel, PowerPoint, Outlook, and OneDrive, as well as the collaboration solutions offered through Teams, SharePoint, and Exchange. Candidates also learn about Microsoft’s endpoint management tools and deployment models, providing a foundational understanding of how these services are used in both hybrid and cloud-based environments.
Security, compliance, and trust are critical components of the Microsoft 365 Fundamentals certification. Candidates are introduced to security features such as Microsoft Defender, which offers a suite of tools to protect data, devices, and identities. They also learn about compliance features like Microsoft Purview, which helps organizations maintain regulatory compliance through solutions like data loss prevention and eDiscovery. Additionally, identity and access management services such as Microsoft Entra ID, multi-factor authentication (MFA), and conditional access policies ensure secure access to Microsoft 365 services.
Another key focus of the certification is pricing and licensing. Candidates explore various billing and pricing models available for Microsoft 365, including enterprise agreements and cloud solution providers. Understanding the different support options available, such as how to create a support request or interpret service health status, is also covered, ensuring that individuals can manage and troubleshoot Microsoft 365 services effectively.
The Microsoft 365 Fundamentals certification is designed for a wide range of individuals, including business decision-makers, IT professionals, and those new to Microsoft’s cloud ecosystem. By earning this certification, individuals can better understand the value that Microsoft 365 brings to businesses, from its productivity tools to its robust security and compliance features. This foundational knowledge serves as a stepping stone for further certifications or more specialized roles within the Microsoft ecosystem.
For more details on the exam topics and to access resources for studying, candidates can refer to the official study guide provided by Microsoft. Additionally, more information about the Microsoft 365 Fundamentals certification itself, including practice assessments and exam details, can be found on the Microsoft certification page.
This certification is ideal for those looking to gain a fundamental understanding of cloud services and Microsoft 365, providing a solid foundation for further career advancement or deeper technical roles.
Free Microsoft 365 Fundamentals MS-900 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Describe cloud conceptsDescribe Microsoft 365 apps and servicesDescribe security, compliance, privacy, and trust in Microsoft 365Describe Microsoft 365 pricing, licensing, and support
A company wants to purchase Microsoft 365 services and prefers to work with a partner that offers personalized support and flexible billing options.
Which purchasing model should they choose?
Purchase licenses through a Cloud Solution Provider
Use the Microsoft Open License program
Buy directly from Microsoft with direct billing
Enter into an Enterprise Agreement with Microsoft
Answer Description
Purchasing licenses through a Cloud Solution Provider allows companies to work with a Microsoft partner that can offer personalized support and flexible billing options. The partner provides value-added services and can tailor offerings to the company's specific needs.
An Enterprise Agreement is typically suited for larger organizations and involves a direct agreement with Microsoft, lacking the personalized third-party support.
Buying directly from Microsoft with direct billing does not provide the additional support and flexibility offered by a partner.
The Microsoft Open License program is for perpetual licenses and is being phased out, making it less suitable for cloud services like Microsoft 365.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the benefits of working with a Cloud Solution Provider?
What is the difference between an Enterprise Agreement and purchasing through a CSP?
What is the Microsoft Open License program and why is it being phased out?
Your organization needs to prevent sensitive data like credit card numbers and Social Security numbers from being shared outside the company through email or cloud storage services.
Which Microsoft Purview feature should you implement to achieve this goal?
Sensitivity labels
Retention labels
Data Loss Prevention (DLP) policies
Microsoft Defender for Office 365
Answer Description
Data Loss Prevention (DLP) policies are designed to identify, monitor, and protect sensitive information across your organization. By implementing DLP policies in Microsoft Purview, you can prevent users from accidentally or intentionally sharing confidential data externally via email or cloud services.
Sensitivity labels help classify and protect information by applying labels that enforce encryption and access restrictions, but they do not actively block data sharing.
Retention labels manage the lifecycle of content, ensuring data is kept or deleted as required, but they do not prevent data from being shared.
Microsoft Defender for Office 365 provides threat protection against malware and phishing attacks but does not focus on preventing the external sharing of sensitive information.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Data Loss Prevention (DLP) policies?
How do DLP policies work in Microsoft Purview?
What is the difference between DLP policies and sensitivity labels?
An organization wants to minimize disruptions caused by Windows updates by introducing updates to different groups of users over time and monitoring for issues before broader deployment. Which deployment strategy should the IT administrator implement to achieve this goal?
Enroll user devices in the Windows Insider Program
Disable automatic updates and install updates manually
Configure devices to receive updates according to the organization's schedule
Set up deployment rings to deliver updates in phases
Answer Description
Setting up deployment rings to deliver updates in phases is the best strategy. Deployment rings allow the IT administrator to stagger the rollout of Windows updates to different groups within the organization. This phased approach helps identify and address any issues early on in a smaller group before deploying updates more widely, thereby minimizing potential disruptions.
Disabling automatic updates and installing updates manually is inefficient and can lead to inconsistencies and security vulnerabilities due to delayed updates. It doesn't provide a structured method for testing updates prior to full deployment.
Enrolling user devices in the Windows Insider Program exposes them to pre-release versions of Windows that may be unstable and are intended for testing purposes, not for minimizing disruptions in a production environment.
Configuring devices to receive updates according to the organization's schedule without a phased rollout does not allow for early detection of issues in a controlled subset of devices. If problems occur with the updates, the entire organization could be affected simultaneously, which does not align with the goal of minimizing disruptions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are deployment rings?
How does phased deployment minimize disruptions?
What risks are associated with disabling automatic updates?
Your organization currently has Microsoft 365 E3 licenses assigned to users. Management wants to enable advanced security features that are not included in the E3 plan. What is the most appropriate way to provide these capabilities to users?
Reassign the existing E3 licenses to other users and buy new licenses for the desired features.
Assign feature licenses available as add-ons to users.
Enable advanced security features in the admin center settings.
Purchase and assign Microsoft 365 E5 licenses to users.
Answer Description
To provide advanced security features not included in the Microsoft 365 E3 plan, assigning feature licenses available as add-ons to users is the most appropriate approach. Add-on licenses allow organizations to enhance their base licenses with additional functionalities without the need to upgrade to a higher-tier plan, making it a cost-effective solution. Purchasing and assigning Microsoft 365 E5 licenses to users would include the desired features but would be more expensive and may offer unnecessary additional features. Reassigning existing E3 licenses and purchasing new licenses does not efficiently address the requirement. Enabling advanced security features in the admin center settings without proper licensing is against Microsoft's licensing policies.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are feature licenses in Microsoft 365?
What advanced security features can be added with add-on licenses?
How do add-on licenses compare to upgrading to higher-tier plans?
A company needs to offer remote access to Windows desktops for their employees, and they prefer a solution that minimizes management complexity and infrastructure setup. Which Microsoft service should they choose?
Microsoft Intune
Azure Virtual Desktop
Windows 365
Windows Autopilot
Answer Description
Windows 365 provides Cloud PCs that deliver a full Windows experience streamed from the cloud, with simplified setup and management. It allows organizations to provide remote desktops to employees without the need to manage complex virtual desktop infrastructure (VDI). Azure Virtual Desktop (AVD) offers similar functionality but requires more intricate setup and ongoing management. Microsoft Intune is for device management, and Windows Autopilot is for deploying and configuring devices; neither provides remote desktop services.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Cloud PCs?
How does Windows 365 simplify management compared to Azure Virtual Desktop?
What are the use cases for Microsoft Intune and Windows Autopilot?
An organization needs a Microsoft 365 solution that helps them identify personal data across their environment, manage privacy risks, and comply with data protection regulations.
Which solution should they use?
Microsoft Priva
Microsoft Entra ID
Microsoft Purview
Microsoft Defender for Endpoint
Answer Description
Microsoft Priva is the correct answer. It is a privacy-management solution designed to help organizations govern personal data, manage privacy risks, and comply with regulations like the GDPR. It provides tools to identify personal data, manage data minimization policies, and automate Data Subject Requests (DSRs).
Microsoft Purview is a comprehensive suite of solutions for information protection, data governance, and compliance management. While it provides the foundational capabilities that Priva uses, Microsoft Priva is the specific solution designed for dedicated privacy management operations.
Microsoft Defender for Endpoint is an endpoint security solution that protects devices from threats and is not designed for data privacy management.
Microsoft Entra ID is a solution for managing identities and access control. It does not provide tools for managing personal data privacy as described in the scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What features does Microsoft Priva offer for managing personal data?
How does Microsoft Priva differ from Microsoft Purview?
What are the implications of not using a tool like Microsoft Priva for personal data management?
A company is planning to adopt Microsoft 365 services. They have a significant number of users and are looking for a purchasing option that offers cost-effective pricing for large organizations. They desire flexibility to adjust their services over time and prefer to have a direct contractual relationship with the provider. They are also willing to commit to a longer-term agreement. Which purchasing option would best meet their requirements?
Enter into an Enterprise Agreement
Use a Microsoft Products and Services Agreement (MPSA)
Purchase through a Cloud Solution Provider
Buy subscriptions directly online through the Microsoft 365 admin center
Answer Description
An Enterprise Agreement is designed for organizations with a substantial number of users (typically 500 or more). It offers volume licensing discounts, flexibility to adjust services, and involves a direct contractual relationship with Microsoft over a multi-year term. This makes it cost-effective and adaptable for large organizations. Purchasing through a Cloud Solution Provider involves working with a third-party partner rather than directly with Microsoft, which might not meet the company's preference for a direct relationship. Buying subscriptions online through the Microsoft 365 admin center is more suitable for smaller organizations and does not offer volume discounts or long-term agreements. The Microsoft Products and Services Agreement (MPSA) is intended for organizations seeking transactional purchasing without a long-term commitment, which doesn't align with the company’s willingness to engage in a longer-term agreement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the benefits of an Enterprise Agreement for large organizations?
How does the commitment term in an Enterprise Agreement impact pricing?
What is the difference between an Enterprise Agreement and a Microsoft Products and Services Agreement (MPSA)?
Which Microsoft Entra ID feature allows users to regain access to their accounts without IT assistance?
Multi-factor authentication
Self-service password reset
Conditional Access
Privileged Identity Management
Answer Description
Self-service password reset (SSPR) enables users to reset their own passwords and unlock their accounts without needing help from the IT support team. This feature reduces support costs and minimizes downtime for users. Multi-factor authentication (MFA) adds an extra layer of security but does not provide self-service account recovery. Conditional Access controls access based on conditions but does not allow users to regain access on their own. Privileged Identity Management is used to manage and monitor elevated access permissions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main benefits of using Self-Service Password Reset (SSPR)?
How does Multi-Factor Authentication (MFA) work alongside SSPR?
Can Self-Service Password Reset (SSPR) be used in combination with Conditional Access?
A start-up wants Microsoft to maintain the operating system, middleware, and runtime environment for its new web app, while the developers manage the code and data. Which cloud service category best fits this requirement?
Infrastructure as a Service
Desktop as a Service
Software as a Service
Platform as a Service
Answer Description
Platform as a Service (PaaS) hands over responsibility for the operating system, middleware, and runtime components to the provider, leaving the customer to handle the application and data. Infrastructure as a Service (IaaS) still requires the customer to manage the OS and middleware, which conflicts with the scenario. Software as a Service (SaaS) would give Microsoft control of the entire application stack—including the app itself—so the developers would not be able to deploy their own code. Desktop as a Service is not one of the three main service categories assessed on MS-900 and does not align with building and hosting custom web applications.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Platform as a Service (PaaS)?
How is PaaS different from Infrastructure as a Service (IaaS)?
What are some common use cases of PaaS?
A company wants to enhance security by requiring additional authentication when users access Microsoft 365 services from outside their corporate network. However, they want users accessing services from within the corporate network to experience seamless sign-in. Which feature of Microsoft's identity and access management solutions should they implement to meet these requirements?
Configure Conditional Access policies
Implement Just-in-Time access
Set up Password Protection
Enable Multi-Factor Authentication for users
Answer Description
Configuring Conditional Access policies allows the company to enforce Multi-Factor Authentication (MFA) based on specific conditions, such as the user's location. By setting up a policy that requires MFA for sign-ins from outside the corporate network, they enhance security for external access while allowing internal users to sign in without additional prompts. Enabling MFA for users would require everyone to complete MFA regardless of location, which does not provide a seamless experience for internal users. Password Protection helps prevent the use of compromised passwords but does not differentiate access based on location. Just-in-Time access is related to privileged access management and does not address conditional authentication based on network location.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Conditional Access policies in Microsoft 365?
How does Multi-Factor Authentication (MFA) work in conjunction with Conditional Access?
What are the benefits of using Conditional Access compared to just enabling MFA for all users?
A company aims to simplify the deployment of new Windows devices by allowing employees to receive devices directly and have them automatically configured with the company's settings and applications upon connecting to the network, reducing the need for IT staff to set up each device manually. Which Microsoft 365 feature enables this streamlined deployment process?
Windows Autopilot
Endpoint Analytics
Microsoft Intune
Microsoft Endpoint Configuration Manager
Answer Description
Windows Autopilot is designed to streamline the deployment of new Windows devices by automating the configuration process. It allows devices to be shipped directly to employees, and when connected to the network, the devices automatically configure themselves with the organization's policies, settings, and applications without IT intervention. Microsoft Intune provides device management and security after devices are deployed but does not by itself automate the initial device setup in this manner. Microsoft Endpoint Configuration Manager is a traditional on-premises solution that typically requires IT staff to image and configure devices manually. Endpoint Analytics provides insights into device performance and user experience but does not handle the deployment or configuration of new devices.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Windows Autopilot?
How does Windows Autopilot work in terms of device configuration?
What is the difference between Microsoft Intune and Windows Autopilot?
An organization wants to leverage cloud computing for scalability but needs to keep sensitive data within its own data center. Which cloud deployment model best fits this requirement?
Multi-cloud
Hybrid cloud
Public cloud
Private cloud
Answer Description
Hybrid cloud combines on-premises infrastructure with cloud services, allowing organizations to keep sensitive data in their own data centers while utilizing the scalability and flexibility of cloud computing. Public cloud uses shared cloud resources and may not meet the requirement of retaining data on-premises. Private cloud involves dedicated cloud infrastructure but is typically hosted off-site unless the organization invests in building its own, which can be costly. Multi-cloud refers to using multiple cloud providers and does not inherently ensure data remains on-premises.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main characteristics of a hybrid cloud?
How does a private cloud differ from a hybrid cloud?
What are the potential challenges of using a hybrid cloud model?
Your company wants to monitor and analyze security threats and suspicious activities within your on-premises directory services environment.
Which Microsoft 365 solution should you use to address this concern?
Microsoft Defender for Identity
Microsoft Defender for Endpoint
Microsoft Defender for Cloud Apps
Microsoft Defender for Office 365
Answer Description
Microsoft Defender for Identity is designed to monitor and protect on-premises Active Directory environments by detecting security threats and suspicious activities. It analyzes user behavior and activities to identify advanced threats, compromised users, and insider threats.
Microsoft Defender for Endpoint focuses on protecting endpoint devices like laptops and mobile devices from threats.
Microsoft Defender for Office 365 safeguards email and collaboration tools from malware and phishing attacks.
Microsoft Defender for Cloud Apps provides security for cloud applications by offering visibility and control over data travel.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What specific features does Microsoft Defender for Identity offer?
How does Microsoft Defender for Identity analyze user behavior?
Can you explain the differences between the various Microsoft Defender solutions?
You are asked to provide your company's management with data on how employees are using email, cloud storage, and collaboration tools within Microsoft 365 to optimize productivity.
As the administrator, which feature within Microsoft 365 should you use to obtain detailed user activity reports?
The Microsoft 365 Defender portal
Microsoft 365 Service Health Dashboard
Reports in the Microsoft 365 Admin Center
Microsoft Entra ID Access Reviews
Answer Description
Reports in the Microsoft 365 Admin Center offers administrators comprehensive reports on user activities across various Microsoft 365 services, such as Exchange Online for email, OneDrive for cloud storage, and Microsoft Teams for collaboration. These reports help in analyzing usage patterns and making informed decisions to improve productivity.
The Microsoft 365 Defender portal focuses on security-related insights and threat management, not general usage statistics for productivity.
Microsoft Entra ID Access Reviews are used for reviewing user access permissions to ensure the right people have the right access, but they do not provide overall usage activity reports.
The Microsoft 365 Service Health Dashboard shows the health status of Microsoft services but doesn't offer user activity data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of user activity reports can I find in the Microsoft 365 Admin Center?
How often are the reports in the Microsoft 365 Admin Center updated?
Can I customize the reports in the Microsoft 365 Admin Center?
Which statement best describes the primary purpose of Microsoft Purview Data Loss Prevention (DLP) policies in Microsoft 365?
They restrict all employees from accessing any content that contains sensitive information within the organization.
They monitor and, when necessary, block or warn users to prevent the unintentional or unauthorized sharing of sensitive data with inappropriate recipients or locations.
They provide a mechanism for placing content on hold to meet eDiscovery and legal retention requirements.
They automatically encrypt every document that contains sensitive information, regardless of how it is used or shared.
Answer Description
The correct answer is: DLP policies monitor user actions and, when necessary, warn, block, or otherwise prevent users from unintentionally or intentionally sharing sensitive data with unauthorized recipients or locations. DLP is designed to stop data leakage-particularly to external parties-not to keep all internal users from viewing sensitive content or to provide legal holds or universal encryption.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Data Loss Prevention (DLP) policies?
How does Microsoft Purview implement DLP policies?
What is the difference between accessing and sharing sensitive data in the context of DLP?
Gnarly!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.