已不再支援此瀏覽器。
請升級至 Microsoft Edge,以利用最新功能、安全性更新和技術支援。
Choose the best response for each of the questions below.
A Conditional Access policy is made up of if-then statements consisting of access controls and what other object?
Early-bound enforcement.
Late-bound enforcement.
Assignments.
As the Teams administrator for Northwind Traders, Allan DeYoung is interested in a report that provides the count of email messages with malicious content, such as files or website addresses (URLs) that were blocked by the anti-malware engine, zero-hour auto purge (ZAP), and Defender for Office 365 features like Safe Links, Safe Attachments. Which report provides this information?
Threat Protection status report.
Threat Explorer report.
Defender for Office 365 Message Disposition report.
When Safe Attachments identifies a file as malicious, Microsoft Defender for Office 365 locks the file. The blocked file is still listed in the document library. However, people are limited to what they can do with it. Which of the following actions can be applied to a file that's been blocked by Safe Attachments?
Open.
Delete.
Share.
Which stage of the Microsoft Defender for Cloud Apps framework assesses whether cloud apps meet relevant requirements, including regulatory compliance and industry standards?
Assess.
Discover.
Detect.
Which feature of the Microsoft Defender for Cloud Apps architecture analyzes your traffic logs against the Microsoft Defender for Cloud Apps catalog of more than 16,000 cloud apps and provides risk assessment reports?
Conditional Access App Control.
App connectors.
Cloud Discovery.
You must answer all questions before checking your work.
此頁面對您有幫助嗎?