<< Prev Question Next Question >>

Question 14/42

Match the Microsoft 365 insider risk management workflow step to the appropriate task.
To answer, drag the appropriate step from the column on the left to its task on the right. Each step may be used once, more than once, or not at all.
NOTE: Each correct match is worth one point.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (42q)
Question 1: For each of the following statements, select Yes if the stat...
Question 2: Select the answer that correctly completes the sentence. (Ex...
Question 3: For each of the following statements, select Yes if the stat...
Question 4: What should you use to ensure that the members of an Azure A...
Question 5: Which three authentication methods can be used by Azure Mult...
Question 6: For each of the following statements, select Yes if the stat...
Question 7: Select the answer that correctly completes the sentence. (Ex...
Question 8: Select the answer that correctly completes the sentence. (Ex...
Question 9: Select the answer that correctly completes the sentence. (Ex...
Question 10: Select the answer that correctly completes the sentence. (Ex...
Question 11: For each of the following statements, select Yes if the stat...
Question 12: In the Microsoft Cloud Adoption Framework for Azure, which t...
Question 13: What can you use to scan email attachments and forward the a...
Question 14: Match the Microsoft 365 insider risk management workflow ste...
Question 15: For each of the following statements, select Yes if the stat...
Question 16: Which Microsoft 365 compliance feature can you use to encryp...
Question 17: What can you use to provide threat detection for Azure SQL M...
Question 18: What are two capabilities of Microsoft Defender for Endpoint...
Question 19: Select the answer that correctly completes the sentence. (Ex...
Question 20: For each of the following statements, select Yes if the stat...
Question 21: Select the answer that correctly completes the sentence. (Ex...
2 commentQuestion 22: Which compliance feature should you use to identify document...
Question 23: Which three authentication methods does Windows Hello for Bu...
Question 24: Select the answer that correctly completes the sentence. (Ex...
Question 25: Which Microsoft portal provides information about how Micros...
3 commentQuestion 26: Which two Azure resources can a network security group (NSG)...
Question 27: For each of the following statements, select Yes if the stat...
Question 28: Select the answer that correctly completes the sentence. (Ex...
Question 29: In a Core eDiscovery workflow, what should you do before you...
Question 30: Which two cards are available in the Microsoft 365 Defender ...
Question 31: For each of the following statements, select Yes if the stat...
Question 32: For each of the following statements, select Yes if the stat...
Question 33: Which three statements accurately describe the guiding princ...
Question 34: What is a use case for implementing information barrier poli...
1 commentQuestion 35: Microsoft 365 Endpoint data loss prevention (Endpoint DLP) c...
Question 36: What can you use to view the Microsoft Secure Score for Devi...
Question 37: In the shared responsibility model for an Azure deployment, ...
Question 38: What should you use in the Microsoft 365 security center to ...
Question 39: Select the answer that correctly completes the sentence. (Ex...
Question 40: When security defaults are enabled for an Azure Active Direc...
Question 41: Which Microsoft 365 feature can you use to restrict users fr...
Question 42: For each of the following statements, select Yes if the stat...