Pre-Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

AB-900 Questions and Answers

Question # 6

Select the answer that correctly completes the sentence.

Full Access
Question # 7

You need to ensure that users can use an external system as a knowledge source for custom Microsoft 365 Copilot agents. What should you configure in the Microsoft 365 admin center? To answer, select the appropriate settings in the answer area.

Full Access
Question # 8

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE Each correct selection is worth one point

Full Access
Question # 9

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point

Full Access
Question # 10

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 11

What can you use to block a user account automatically when a risky sign-in is detected?

A.

Microsoft Entra ID Protection

B.

Microsoft Defender for Office 365

C.

Microsoft Entra Privileged Identity Management (PIM)

D.

Microsoft Defender for Identity

Full Access
Question # 12

Your organization has a Microsoft 365 subscription.

You need to review the impact of a recent phishing incident that targeted email users.

What should you use?

A.

the Microsoft Defender portal

B.

the Microsoft 365 admin center

C.

the Microsoft Entra admin center

D.

the Microsoft Exchange admin center

Full Access
Question # 13

Your organization has a Microsoft 365 subscription.

All users are assigned a Microsoft 365 Copilot license.

You need to prevent the users from generating images by using Copilot.

What should you use?

A.

the Microsoft Defender portal

B.

the Microsoft Purview portal

C.

the Microsoft 365 admin center

D.

the Microsoft Entra admin center

Full Access
Question # 14

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 15

Select the answer that correctly completes the sentence.

Full Access
Question # 16

Which statement accurately describes authorization in Microsoft 365?

A.

a process to validate an identity from an external system

B.

a process to verify whether an identity is who or what they claim to be

C.

a process to verify whether an identity is allowed to access a resource

D.

a process to require additional authentication methods before an identity can access resources

Full Access
Question # 17

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Full Access
Question # 18

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 19

Select the answer that correctly completes the sentence.

Full Access
Question # 20

Your company has a written compliance policy that requires all emails be retained for seven years, and then permanently deleted. Which Microsoft Purview solution should you use?

A.

Information Protection

B.

Insider Risk Management

C.

Data Loss Prevention

D.

Data Lifecycle Management

Full Access
Question # 21

Select the answer that correctly completes the sentence.

Full Access