An organization has deployed Microsoft 365 applications to all employees. Who
becomes responsible for the security of the personal data relating to these employees?
A. The organization.
B. Microsoft, the SaaS provider.
C. There's shared responsibility between an organization and Microsoft. - ANSWER The
Organization
Which of the following measures might an organization implement as part of the defense
in-depth security methodology?
A. Locating all its servers in a single physical location.
B. Multi-factor authentication for all users.
C. Ensuring there's no segmentation of your corporate network. - ANSWER Multi-factor
Authentication for all users
The human resources organization want to ensure that stored employee data is
encrypted. What security mechanism would they utilize?
A. Encryption in transit.
B. Digital signing.
C. Encryption at rest. - ANSWER Encryption at rest
Which of the following is the best method of keeping up to date with Microsoft
compliance documentation available through the Service Trust Portal?
A. Save the documents to your My Library.
B. Print out each of the documents so that you have it for easy reference.
C. Download each document. - ANSWER Save the documents to your My Library.
, As a compliance administrator, which of the following links would be most useful in
obtaining information about regional regulatory details?
A. Microsoft Privacy Principles.
B. Service Trust Portal.
C. Microsoft Compliance Manager. - ANSWER Service Trust Portal.
What type of security threat is a phishing scam?
A. An ethical threat
B. A physical threat
C. An identity threat. ANSWER Identity threat.
What is a benefit for single sign-on?
A. There is one central identity provider that can be used.
B. User signs on once and access multiple applications or resources.
C. Passwords are always expired after 72 days. ANSWER The user signs on once and
can then access many applications or resources.
Which of the following relationships in identity federation can federated services access
resources?
A. Claim relationship
B. Shared access relationship
C. Trust relationship - ANSWER Trust relationship
Authentication is best described as what?
A. The process of verifying that a user or device is who they claim to be.
B. This is the process of profiling user behavior.
C. That allows federated services. - ANSWER The process of verifying that a user or
device is who they claim to be.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Chrisyuis. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.49. You're not tied to anything after your purchase.