Q: 11
An HR operations team wants an AI assistant that can watch a “New Hire” mailbox, look up
candidates in the HR system, generate personalized onboarding plans, create tasks for IT
and facilities, and post updates into a Teams channel. They need this experience to follow a
consistent, governed workflow and to keep using the same configuration over time instead
of relying on one-o[ prompts.
To meet this requirement, they should build a ______ in Copilot Studio that encapsulates
the workflow and connects to their HR and collaboration tools.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
Fabrikam’s IP protection team notices an increase in risky activity after Copilot rollout:
users exporting files with AI-generated summaries to personal cloud storage and copying
design documents shortly before resigning. They want a solution that can correlate
multiple user signals over time (downloads, copies, unusual browsing, resignation
indicators) and raise cases to a dedicated team, with built-in privacy controls such as
pseudonymization.
Complete the architect’s recommendation:
“To proactively detect potential IP theft around our Copilot-related file activity and user
behavior, we should configure an ______ that uses built-in machine learning templates to
correlate risky signals into manageable cases.”
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
A manager tells the compliance team that once they enable Microsoft Purview retention
policies, they no longer need backup or recovery strategies, because retention “is our
backup” and can always restore any deleted item from any point in time.
Microsoft Purview retention is a full replacement for backup and recovery solutions; if
retention policies are configured, the organization no longer needs separate backup
strategies.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
A records manager explains that Microsoft Purview Data Lifecycle Management lets the
organization keep only what it needs and delete content that is no longer required. They use
retention labels and policies to manage records, prove compliance, and ensure that Teams
messages, SharePoint files, and emails follow defined retention schedules.
Microsoft Purview Data Lifecycle Management provides tools to retain content that must
be kept, delete content that should no longer be kept, and manage records and proof of
compliance across Microsoft 365.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
Your organization has built several custom agents in Copilot Studio and now wants to roll
them out to di[erent business units. The admin wants to avoid editing each agent every
time someone joins or leaves a team and instead prefers to control access with Microsoft
Entra groups and standard role assignments. A colleague says: “That’s not possible; the
only way to control who can use an agent is to add or remove each user individually inside
the agent configuration. Groups and roles can’t be used to grant or deny access.”
Is this statement true or false?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
A security engineer explains Identity Secure Score to management as follows:
“Some improvement actions give partial credit if you roll them out to only part of the
organisation. For example, enabling MFA for all admins but not all users can still give you
some points, even though the action isn’t fully completed for the whole tenant.”
Is this statement True or False?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
On an existing Departments SharePoint site, all teams share a single Documents library.
HR wants a location where only HR sta[ can see documents, but they don’t want a new site
or a new library. An admin creates a folder named HR-Private inside the existing
Documents library, leaves the default inherited permissions in place, and instructs HR to
store confidential files there, assuming the folder name alone will keep non-HR users out.
Proposed solution: Use the HR-Private folder with inherited permissions unchanged and
rely on the folder name to ensure only HR users can access those documents.
Does this solution meet the goal?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
“The Researcher agent is mainly intended for simple, one-step edits like rephrasing a
sentence, and it does not draw on multiple sources or produce structured reports.”
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
Tailwind Traders is redesigning its security architecture. A network engineer proposes that
once a user connects from a managed device on the corporate LAN or VPN, their tra[ic
should bypass conditional access checks and device compliance validation to “reduce
friction,” because the internal network is considered trusted. The security architect argues
this approach conflicts with the organization’s Zero Trust strategy.
In a Zero Trust model, it is acceptable to fully trust any user and device solely because they
are connected from an internal corporate network segment, and to skip further verification
for resource access.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 20
You need to prevent external senders from emailing an existing internal announcement list
[email protected] while keeping internal use unchanged. A colleague suggests:
“In Exchange Online, you should edit the distribution group object in the Exchange admin
center and configure its delivery management and address list options there, instead of
touching each member’s mailbox.”
Is this guidance correct?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2