Skip to content

Commit 1925dc4

Browse files
Improve: minor findings
1 parent 21850e4 commit 1925dc4

File tree

1 file changed

+13
-21
lines changed

1 file changed

+13
-21
lines changed

README.md

Lines changed: 13 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -166,10 +166,10 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
166166
| 113 | [You can use the insider risk management solution to detect phishing scams.](#you-can-use-the-insider-risk-management-solution-to-detect-phishing-scams)
167167
| 114 | [To which type of resource can Azure Bastion provide secure access?](#to-which-type-of-resource-can-azure-bastion-provide-secure-access)
168168
| 115 | [Conditional access policies always enforce the use of multi-factor authentication (MFA).](#conditional-access-policies-always-enforce-the-use-of-multi-factor-authentication-mfa)
169-
| 116 | [Conditional access policies only affect users who have Azure Active Directory (Azure AD)- joined devices.](#conditional-access-policies-only-affect-users-who-have-azure-active-directory-azure-ad--joined-devices)
169+
| 116 | [What can you protect by using the information protection solution in the Microsoft 365 compliance center?](#what-can-you-protect-by-using-the-information-protection-solution-in-the-microsoft-365-compliance-center)
170170
| 117 | [Microsoft Sentinel [...] use Azure Logic Apps to automate and orchestrate responses to alerts.](#microsoft-sentinel--use-azure-logic-apps-to-automate-and-orchestrate-responses-to-alerts)
171171
| 118 | [What are three uses of Microsoft Cloud App Security?](#what-are-three-uses-of-microsoft-cloud-app-security)
172-
| 119 | [Azure Active Directory (Azure AD) is deployed to an on- premises environment.](#azure-active-directory-azure-ad-is-deployed-to-an-on--premises-environment)
172+
| 119 | [Azure Active Directory (Azure AD) is deployed to an on premises environment.](#azure-active-directory-azure-ad-is-deployed-to-an-on-premises-environment)
173173
| 120 | [Azure Active Directory (Azure AD) is provided as part of a Microsoft 365 subscription.](#azure-active-directory-azure-ad-is-provided-as-part-of-a-microsoft-365-subscription)
174174
| 121 | [Azure Active Directory (Azure AD) is an identity and access management service.](#azure-active-directory-azure-ad-is-an-identity-and-access-management-service)
175175
| 122 | [Which service should you use to view your Azure secure score?](#which-service-should-you-use-to-view-your-azure-secure-score)
@@ -262,7 +262,6 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
262262
| 209 | [You can use Advanced Auditin Microsoft 365 to view the contents of an email message.](#you-can-use-advanced-auditin-microsoft-365-to-view-the-contents-of-an-email-message)
263263
| 210 | [You can use Advanced Auditin Microsoft 365 to view when a user sees the search bar in Outlook on the web to search for message in a mailbox.](#you-can-use-advanced-auditin-microsoft-365-to-view-when-a-user-sees-the-search-bar-in-outlook-on-the-web-to-search-for-message-in-a-mailbox)
264264
| 211 | [What can you specify in Microsoft 365 sensitivity labels?](#what-can-you-specify-in-microsoft-365-sensitivity-labels)
265-
| 212 | [What can you protect by using the information protection solution in the Microsoft 365 compliance center?](#what-can-you-protect-by-using-the-information-protection-solution-in-the-microsoft-365-compliance-center)
266265

267266
### Conditional access policies always enforce the user of multi-factor authentication (MFA).
268267

@@ -1157,10 +1156,12 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
11571156

11581157
**[⬆ Back to Top](#table-of-contents)**
11591158

1160-
### Conditional access policies only affect users who have Azure Active Directory (Azure AD)- joined devices.
1159+
### What can you protect by using the information protection solution in the Microsoft 365 compliance center?
11611160

1162-
- [ ] Yes.
1163-
- [x] No.
1161+
- [ ] Computers from zero-day exploits.
1162+
- [ ] Users from phishing attempts.
1163+
- [ ] Files from malware and viruses.
1164+
- [x] Sensitive data from being exposed to unauthorized users.
11641165

11651166
**[⬆ Back to Top](#table-of-contents)**
11661167

@@ -1175,15 +1176,15 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
11751176

11761177
### What are three uses of Microsoft Cloud App Security?
11771178

1178-
- [x] Discover and control the use of shadow IT
1179-
- [ ] Provide secure connections to Azure virtual machines
1180-
- [x] Protect sensitive information hosted anywhere in the cloud
1181-
- [ ] Provide pass-through authentication to on-premises applications
1182-
- [x] Prevent data leaks to noncompliant apps and limit access to regulated data
1179+
- [x] Discover and control the use of shadow IT.
1180+
- [ ] Provide secure connections to Azure virtual machines.
1181+
- [x] Protect sensitive information hosted anywhere in the cloud.
1182+
- [ ] Provide pass-through authentication to on-premises applications.
1183+
- [x] Prevent data leaks to noncompliant apps and limit access to regulated data.
11831184

11841185
**[⬆ Back to Top](#table-of-contents)**
11851186

1186-
### Azure Active Directory (Azure AD) is deployed to an on- premises environment.
1187+
### Azure Active Directory (Azure AD) is deployed to an on premises environment.
11871188

11881189
- [ ] Yes.
11891190
- [x] No.
@@ -1940,12 +1941,3 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
19401941
- [ ] Where to store files.
19411942

19421943
**[⬆ Back to Top](#table-of-contents)**
1943-
1944-
### What can you protect by using the information protection solution in the Microsoft 365 compliance center?
1945-
1946-
- [ ] Computers from zero-day exploits.
1947-
- [ ] Users from phishing attempts.
1948-
- [ ] Files from malware and viruses.
1949-
- [x] Sensitive data from being exposed to unauthorized users.
1950-
1951-
**[⬆ Back to Top](#table-of-contents)**

0 commit comments

Comments
 (0)