View Mode
Q: 11
An HR operations team wants an AI assistant that can watch a “New Hire” mailbox, look up candidates in the HR system, generate personalized onboarding plans, create tasks for IT and facilities, and post updates into a Teams channel. They need this experience to follow a consistent, governed workflow and to keep using the same configuration over time instead of relying on one-o[ prompts. To meet this requirement, they should build a ______ in Copilot Studio that encapsulates the workflow and connects to their HR and collaboration tools.
Options
Q: 12
Fabrikam’s IP protection team notices an increase in risky activity after Copilot rollout: users exporting files with AI-generated summaries to personal cloud storage and copying design documents shortly before resigning. They want a solution that can correlate multiple user signals over time (downloads, copies, unusual browsing, resignation indicators) and raise cases to a dedicated team, with built-in privacy controls such as pseudonymization. Complete the architect’s recommendation: “To proactively detect potential IP theft around our Copilot-related file activity and user behavior, we should configure an ______ that uses built-in machine learning templates to correlate risky signals into manageable cases.”
Options
Q: 13
A manager tells the compliance team that once they enable Microsoft Purview retention policies, they no longer need backup or recovery strategies, because retention “is our backup” and can always restore any deleted item from any point in time. Microsoft Purview retention is a full replacement for backup and recovery solutions; if retention policies are configured, the organization no longer needs separate backup strategies.
Options
Q: 14
A records manager explains that Microsoft Purview Data Lifecycle Management lets the organization keep only what it needs and delete content that is no longer required. They use retention labels and policies to manage records, prove compliance, and ensure that Teams messages, SharePoint files, and emails follow defined retention schedules. Microsoft Purview Data Lifecycle Management provides tools to retain content that must be kept, delete content that should no longer be kept, and manage records and proof of compliance across Microsoft 365.
Options
Q: 15
Your organization has built several custom agents in Copilot Studio and now wants to roll them out to di[erent business units. The admin wants to avoid editing each agent every time someone joins or leaves a team and instead prefers to control access with Microsoft Entra groups and standard role assignments. A colleague says: “That’s not possible; the only way to control who can use an agent is to add or remove each user individually inside the agent configuration. Groups and roles can’t be used to grant or deny access.” Is this statement true or false?
Options
Q: 16
A security engineer explains Identity Secure Score to management as follows: “Some improvement actions give partial credit if you roll them out to only part of the organisation. For example, enabling MFA for all admins but not all users can still give you some points, even though the action isn’t fully completed for the whole tenant.” Is this statement True or False?
Options
Q: 17
On an existing Departments SharePoint site, all teams share a single Documents library. HR wants a location where only HR sta[ can see documents, but they don’t want a new site or a new library. An admin creates a folder named HR-Private inside the existing Documents library, leaves the default inherited permissions in place, and instructs HR to store confidential files there, assuming the folder name alone will keep non-HR users out. Proposed solution: Use the HR-Private folder with inherited permissions unchanged and rely on the folder name to ensure only HR users can access those documents. Does this solution meet the goal?
Options
Q: 18
“The Researcher agent is mainly intended for simple, one-step edits like rephrasing a sentence, and it does not draw on multiple sources or produce structured reports.”
Options
Q: 19
Tailwind Traders is redesigning its security architecture. A network engineer proposes that once a user connects from a managed device on the corporate LAN or VPN, their tra[ic should bypass conditional access checks and device compliance validation to “reduce friction,” because the internal network is considered trusted. The security architect argues this approach conflicts with the organization’s Zero Trust strategy. In a Zero Trust model, it is acceptable to fully trust any user and device solely because they are connected from an internal corporate network segment, and to skip further verification for resource access.
Options
Q: 20
You need to prevent external senders from emailing an existing internal announcement list [email protected] while keeping internal use unchanged. A colleague suggests: “In Exchange Online, you should edit the distribution group object in the Exchange admin center and configure its delivery management and address list options there, instead of touching each member’s mailbox.” Is this guidance correct?
Options
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE