You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+13-21Lines changed: 13 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -166,10 +166,10 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
166
166
| 113 | [You can use the insider risk management solution to detect phishing scams.](#you-can-use-the-insider-risk-management-solution-to-detect-phishing-scams)
167
167
| 114 | [To which type of resource can Azure Bastion provide secure access?](#to-which-type-of-resource-can-azure-bastion-provide-secure-access)
168
168
| 115 | [Conditional access policies always enforce the use of multi-factor authentication (MFA).](#conditional-access-policies-always-enforce-the-use-of-multi-factor-authentication-mfa)
169
-
| 116 | [Conditional access policies only affect users who have Azure Active Directory (Azure AD)- joined devices.](#conditional-access-policies-only-affect-users-who-have-azure-active-directory-azure-ad--joined-devices)
169
+
| 116 | [What can you protect by using the information protection solution in the Microsoft 365 compliance center?](#what-can-you-protect-by-using-the-information-protection-solution-in-the-microsoft-365-compliance-center)
170
170
| 117 | [Microsoft Sentinel [...] use Azure Logic Apps to automate and orchestrate responses to alerts.](#microsoft-sentinel--use-azure-logic-apps-to-automate-and-orchestrate-responses-to-alerts)
171
171
| 118 | [What are three uses of Microsoft Cloud App Security?](#what-are-three-uses-of-microsoft-cloud-app-security)
172
-
| 119 | [Azure Active Directory (Azure AD) is deployed to an on- premises environment.](#azure-active-directory-azure-ad-is-deployed-to-an-on--premises-environment)
172
+
| 119 | [Azure Active Directory (Azure AD) is deployed to an on premises environment.](#azure-active-directory-azure-ad-is-deployed-to-an-on-premises-environment)
173
173
| 120 | [Azure Active Directory (Azure AD) is provided as part of a Microsoft 365 subscription.](#azure-active-directory-azure-ad-is-provided-as-part-of-a-microsoft-365-subscription)
174
174
| 121 | [Azure Active Directory (Azure AD) is an identity and access management service.](#azure-active-directory-azure-ad-is-an-identity-and-access-management-service)
175
175
| 122 | [Which service should you use to view your Azure secure score?](#which-service-should-you-use-to-view-your-azure-secure-score)
@@ -262,7 +262,6 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
262
262
| 209 | [You can use Advanced Auditin Microsoft 365 to view the contents of an email message.](#you-can-use-advanced-auditin-microsoft-365-to-view-the-contents-of-an-email-message)
263
263
| 210 | [You can use Advanced Auditin Microsoft 365 to view when a user sees the search bar in Outlook on the web to search for message in a mailbox.](#you-can-use-advanced-auditin-microsoft-365-to-view-when-a-user-sees-the-search-bar-in-outlook-on-the-web-to-search-for-message-in-a-mailbox)
264
264
| 211 | [What can you specify in Microsoft 365 sensitivity labels?](#what-can-you-specify-in-microsoft-365-sensitivity-labels)
265
-
| 212 | [What can you protect by using the information protection solution in the Microsoft 365 compliance center?](#what-can-you-protect-by-using-the-information-protection-solution-in-the-microsoft-365-compliance-center)
266
265
267
266
### Conditional access policies always enforce the user of multi-factor authentication (MFA).
268
267
@@ -1157,10 +1156,12 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
1157
1156
1158
1157
**[⬆ Back to Top](#table-of-contents)**
1159
1158
1160
-
### Conditional access policies only affect users who have Azure Active Directory (Azure AD)- joined devices.
1159
+
### What can you protect by using the information protection solution in the Microsoft 365 compliance center?
1161
1160
1162
-
-[ ] Yes.
1163
-
-[x] No.
1161
+
-[ ] Computers from zero-day exploits.
1162
+
-[ ] Users from phishing attempts.
1163
+
-[ ] Files from malware and viruses.
1164
+
-[x] Sensitive data from being exposed to unauthorized users.
1164
1165
1165
1166
**[⬆ Back to Top](#table-of-contents)**
1166
1167
@@ -1175,15 +1176,15 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
1175
1176
1176
1177
### What are three uses of Microsoft Cloud App Security?
1177
1178
1178
-
-[x] Discover and control the use of shadow IT
1179
-
-[ ] Provide secure connections to Azure virtual machines
1180
-
-[x] Protect sensitive information hosted anywhere in the cloud
1181
-
-[ ] Provide pass-through authentication to on-premises applications
1182
-
-[x] Prevent data leaks to noncompliant apps and limit access to regulated data
1179
+
-[x] Discover and control the use of shadow IT.
1180
+
-[ ] Provide secure connections to Azure virtual machines.
1181
+
-[x] Protect sensitive information hosted anywhere in the cloud.
1182
+
-[ ] Provide pass-through authentication to on-premises applications.
1183
+
-[x] Prevent data leaks to noncompliant apps and limit access to regulated data.
1183
1184
1184
1185
**[⬆ Back to Top](#table-of-contents)**
1185
1186
1186
-
### Azure Active Directory (Azure AD) is deployed to an on- premises environment.
1187
+
### Azure Active Directory (Azure AD) is deployed to an on premises environment.
1187
1188
1188
1189
-[ ] Yes.
1189
1190
-[x] No.
@@ -1940,12 +1941,3 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
1940
1941
-[ ] Where to store files.
1941
1942
1942
1943
**[⬆ Back to Top](#table-of-contents)**
1943
-
1944
-
### What can you protect by using the information protection solution in the Microsoft 365 compliance center?
1945
-
1946
-
-[ ] Computers from zero-day exploits.
1947
-
-[ ] Users from phishing attempts.
1948
-
-[ ] Files from malware and viruses.
1949
-
-[x] Sensitive data from being exposed to unauthorized users.
0 commit comments