Visit here for our full Microsoft MS-900 exam dumps and practice test questions.
Question 41:
What is the purpose of Microsoft 365 usage analytics?
A) Monitoring employee personal activities
B) Understanding how users adopt and use Microsoft 365 services
C) Blocking access to specific websites
D) Managing physical office space
Answer: B
Explanation:
Organizations investing in Microsoft 365 need visibility into how effectively employees adopt and utilize the platform to maximize return on investment and identify areas needing support or training.
Option A is incorrect and represents a misuse of analytics. Microsoft 365 usage analytics is designed for understanding service adoption and usage patterns at an organizational level, not for monitoring individual employee activities invasively. Analytics respect privacy by aggregating data and focusing on service usage rather than personal activities. Monitoring personal activities would violate privacy principles and trust.
Option B is correct as Microsoft 365 usage analytics provides insights into how users adopt and use Microsoft 365 services across the organization. The analytics dashboard shows metrics like active users, service adoption rates, content activity, communication patterns, and collaboration trends across applications like Teams, SharePoint, Exchange, and OneDrive. These insights help administrators and business leaders understand which services deliver value, identify underutilized features, justify investments, and target training efforts. Analytics can reveal patterns like teams heavily using email but not adopting Teams, or organizations with low OneDrive adoption indicating potential for improvement. The data supports decision-making about change management, training priorities, and optimization opportunities. Microsoft provides Power BI templates for advanced analytics and custom reporting based on usage data.
Option C is incorrect because blocking access to specific websites is handled through web filtering and security tools, not usage analytics. Analytics provides reporting and insights rather than access control functionality. Web filtering would be configured through network security tools, proxy servers, or browser management policies.
Option D is incorrect as managing physical office space requires facilities management systems, space planning tools, or workplace management platforms. While Microsoft offers workplace analytics that might inform space decisions, Microsoft 365 usage analytics specifically focuses on digital service adoption rather than physical space management.
Question 42:
Which Microsoft 365 plan is designed specifically for educational institutions?
A) Microsoft 365 Business Premium
B) Microsoft 365 Enterprise E3
C) Microsoft 365 Education A3
D) Microsoft 365 Government G3
Answer: C
Explanation:
Microsoft offers specialized plans tailored to specific sectors including education, recognizing that schools and universities have unique needs, budgets, and requirements different from commercial businesses or government organizations.
Option A represents a business plan designed for small and medium-sized commercial organizations. Microsoft 365 Business Premium provides business-focused features and lacks education-specific tools like assignment management, class notebooks, and learning management integration. While schools could technically use business plans, they would miss education-tailored features and pricing.
Option B represents an enterprise-level commercial plan for large organizations. Microsoft 365 Enterprise E3 provides comprehensive business capabilities but is not designed specifically for educational institutions and does not include education-specific features or the favorable pricing available to qualifying educational organizations.
Option C is correct as Microsoft 365 Education A3 is specifically designed for educational institutions including schools, colleges, and universities. Education plans include all standard Microsoft 365 capabilities plus education-specific features like Microsoft Teams for Education with assignments and class notebooks, School Data Sync for roster management, advanced security tailored for education environments, and compliance features addressing student data privacy regulations like FERPA. Education plans are priced favorably for qualifying institutions and include features supporting both faculty and students. The A3 plan provides comprehensive capabilities including desktop Office applications, while the free A1 plan offers web-based applications for eligible institutions.
Option D represents a government-specific plan designed for government agencies and organizations. Microsoft 365 Government G3 addresses government compliance requirements and operates in special government cloud environments but is not designed for educational institutions.
Question 43:
What is the primary purpose of Microsoft Defender for Office 365?
A) Creating documents
B) Protecting against email threats like phishing and malware
C) Managing calendars
D) Storing files
Answer: B
Explanation:
Email remains a primary attack vector for cybercriminals, requiring specialized protection beyond basic spam filtering to detect and prevent sophisticated threats targeting organizations through email.
Option A is incorrect as creating documents is accomplished through Office applications like Word, Excel, and PowerPoint. Microsoft Defender for Office 365 is a security service rather than a productivity application and has no document creation capabilities. Document creation and threat protection serve entirely different purposes within Microsoft 365.
Option B is correct as Microsoft Defender for Office 365 provides advanced protection against sophisticated email threats including phishing, malware, ransomware, and business email compromise. The service includes Safe Attachments which detonates email attachments in a virtual environment before delivery to detect malicious behavior, Safe Links which checks URLs at click-time to protect against malicious websites, anti-phishing policies using machine learning to detect impersonation and spoofing attempts, and real-time reporting showing threats detected and blocked. Defender for Office 365 also provides automated investigation and response capabilities to remediate threats across mailboxes and attack simulation training to help users recognize threats. This comprehensive protection layer extends beyond basic Exchange Online Protection.
Option C is incorrect because managing calendars is handled by Outlook and Exchange Online calendar features. While Defender for Office 365 can scan calendar invitations for malicious content, calendar management is not its primary purpose. The service focuses on threat protection rather than productivity features.
Option D is incorrect as storing files is provided by OneDrive for Business and SharePoint Online. Defender for Office 365 can scan attachments and links pointing to stored files but does not provide storage capabilities itself. Storage and threat protection are separate but complementary services.
Question 44:
Which feature allows Microsoft 365 users to access applications and files from any device?
A) Device-specific licensing
B) Cross-platform compatibility
C) Single-device installation
D) Local-only access
Answer: B
Explanation:
Modern work environments require flexibility for users to work from various devices and locations, making cross-platform support essential for productivity platforms like Microsoft 365.
Option A suggesting device-specific licensing is incorrect and represents a limitation rather than a benefit. Microsoft 365 licensing allows users to install and access applications across multiple devices rather than restricting usage to specific devices. Device-specific licensing would hinder the mobility and flexibility that Microsoft 365 provides.
Option B is correct as cross-platform compatibility allows Microsoft 365 users to access applications and files from any device regardless of operating system. Microsoft 365 supports Windows, macOS, iOS, Android, and web browsers, enabling users to install Office applications on computers, tablets, and smartphones. Cloud storage through OneDrive ensures files are accessible from any device with synchronization maintaining current versions everywhere. Web-based versions of Office applications work in browsers when desktop applications aren’t available. This cross-platform support enables flexible work arrangements where users can start work on one device and continue on another seamlessly.
Option C suggesting single-device installation is incorrect and represents a restriction rather than a feature enabling multi-device access. Microsoft 365 subscriptions typically allow installation on multiple devices per user, with specific limits depending on the plan. Single-device restriction would contradict the goal of device flexibility.
Option D indicating local-only access is incorrect as Microsoft 365 is fundamentally cloud-based, enabling access from anywhere with internet connectivity. Local-only access would eliminate the primary advantages of cloud services including mobility, remote access, and device flexibility that define modern Microsoft 365 capabilities.
Question 45:
What is Microsoft Lists primarily used for?
A) Video conferencing
B) Tracking information and organizing work
C) Email encryption
D) Network monitoring
Answer: B
Explanation:
Microsoft 365 includes various specialized applications designed for specific organizational needs, and understanding each application’s purpose helps users select appropriate tools for different tasks.
Option A is incorrect as video conferencing is provided by Microsoft Teams. Lists does not offer any communication or conferencing capabilities. The applications serve entirely different purposes within the Microsoft 365 ecosystem, with Teams focusing on real-time communication and Lists focusing on structured information tracking.
Option B is correct as Microsoft Lists is designed for tracking information and organizing work through customizable lists. Lists provides a flexible platform for creating structured data collections with custom columns, views, and rules. Users can create lists for tracking issues, managing assets, organizing events, maintaining inventories, or any scenario requiring structured information management. Lists supports various column types including text, numbers, dates, choices, and people, along with conditional formatting for visual indicators, rules for automation, and integration with Power Automate for workflows. Lists can be shared with teams, embedded in SharePoint pages, and accessed through web browsers or mobile apps. The application serves as a lightweight database and project tracking tool accessible to business users without technical expertise.
Option C is incorrect because email encryption is handled by Exchange Online and Azure Information Protection features. Lists does not provide encryption capabilities and operates in the information management domain rather than security. While lists can contain sensitive information protected by permissions, Lists itself is not an encryption tool.
Option D is incorrect as network monitoring requires specialized network management tools and infrastructure monitoring platforms. Lists does not provide any network monitoring capabilities. IT teams would use dedicated monitoring tools rather than information tracking applications like Lists.
Question 46:
What is the purpose of Microsoft 365 service health dashboard?
A) Monitoring employee health
B) Checking status and incidents for Microsoft 365 services
C) Managing medical records
D) Scheduling health appointments
Answer: B
Explanation:
Organizations depend on Microsoft 365 for critical business operations, making it essential to have visibility into service availability, performance, and any issues affecting productivity.
Option A is incorrect and represents a misunderstanding of the service health concept. The service health dashboard monitors the health of Microsoft 365 technical services, not employee health or wellbeing. Employee health tracking would involve human resources systems, wellness programs, or healthcare applications completely separate from IT service monitoring.
Option B is correct as the Microsoft 365 service health dashboard provides real-time information about the status and availability of Microsoft 365 services. Administrators can view current service status, active incidents affecting services, planned maintenance windows, and historical incident information. When service disruptions occur, the dashboard provides details about affected services, scope of impact, root cause when determined, and progress toward resolution. The dashboard covers all Microsoft 365 services including Exchange Online, SharePoint, Teams, and others. Organizations use this information to understand whether issues users experience are due to service problems or local issues, communicate status to stakeholders, and plan around maintenance windows. Microsoft also provides service health APIs for integrating status information into organizational monitoring dashboards.
Option C is incorrect as managing medical records requires specialized healthcare information systems complying with regulations like HIPAA. The service health dashboard has no relationship to healthcare or medical records. Medical record management involves completely different applications designed for healthcare providers.
Option D is incorrect because scheduling health appointments would involve healthcare appointment systems or Microsoft Bookings configured for medical practices. The service health dashboard monitors technical service status, not personal health appointments. The term “health” in service health refers to technical system status rather than personal health.
Question 47:
Which Microsoft 365 feature prevents sensitive information from being shared outside the organization?
A) Data Loss Prevention
B) Mail flow rules
C) Retention policies
D) Litigation hold
Answer: A
Explanation:
Organizations must prevent accidental or intentional disclosure of sensitive information to unauthorized parties, requiring automated systems that can detect and block inappropriate sharing attempts across various channels.
Option A is correct as Data Loss Prevention provides comprehensive protection against sensitive information being shared outside the organization inappropriately. DLP policies scan content in emails, documents, Teams messages, and other locations for sensitive information like credit card numbers, social security numbers, financial data, or custom-defined sensitive content. When DLP detects policy violations, it can block sharing, encrypt content, require business justification, notify users of policy violations, or alert administrators. DLP policies apply across Microsoft 365 services including Exchange, SharePoint, OneDrive, Teams, and Endpoint, providing consistent protection regardless of how users attempt to share information. Organizations can create policies matching regulatory requirements like GDPR, HIPAA, or PCI-DSS and customize policies for specific business needs.
Option B refers to mail flow rules in Exchange Online, which can modify or block emails based on conditions like sender, recipient, or content patterns. While mail flow rules can prevent some inappropriate sharing through email, they are limited to email and provide less sophisticated content inspection than DLP. Mail flow rules are one component that might support information protection but lack the comprehensive sensitive content detection and cross-service coverage of DLP.
Option C represents retention policies, which manage how long content is kept before deletion. While retention policies are important for compliance and data management, they do not prevent information from being shared externally. Retention focuses on lifecycle management rather than access control or information leakage prevention.
Option D refers to litigation hold, which preserves content for legal purposes by preventing deletion or modification. Litigation hold does not prevent sharing of information but rather ensures content cannot be destroyed. Its purpose is evidence preservation rather than preventing inappropriate disclosure.
Question 48:
What is the maximum number of people who can participate in a Microsoft Teams meeting?
A) 250
B) 1,000
C) 10,000
D) 20,000
Answer: C
Explanation:
Microsoft Teams supports meetings of various sizes from small team discussions to large organizational events, and understanding capacity limits helps organizations plan appropriate meeting strategies for different scenarios.
Option A suggesting 250 participants is too limited and represents outdated information or confusion with older limits. While 250 might have been an earlier Teams meeting capacity, Microsoft has significantly expanded meeting capacity to support larger organizational events and town halls.
Option B indicating 1,000 participants is closer but still below current maximum capacity. This might represent a tier of Teams functionality or an intermediate expansion phase. Microsoft has continued increasing Teams meeting capacity to accommodate large-scale organizational communications.
Option C is correct as Microsoft Teams currently supports up to 10,000 participants in a single meeting. This capacity supports large organizational events, town halls, webcasts, and major company announcements where broad attendance is desired. Meetings with thousands of participants typically operate differently than small meetings, with features like large gallery view disabled and most participants in view-only mode while presenters and panelists have full interaction capabilities. Organizations can use Teams Live Events or Teams webinars for structured large-audience presentations. The substantial capacity makes Teams suitable for replacing traditional auditorium-style company meetings with virtual alternatives.
Option D suggesting 20,000 participants exceeds the current standard Teams meeting limit. While Microsoft may continue expanding capacity over time, 20,000 currently exceeds the documented maximum. For even larger audiences, organizations might use Teams Live Events or integrate with broadcasting platforms.
Question 49:
Which tool in Microsoft 365 helps organizations manage and govern Microsoft 365 Groups?
A) Groups management policies
B) Azure AD access reviews
C) Exchange transport rules
D) SharePoint permissions
Answer: A
Explanation:
As organizations create numerous Microsoft 365 Groups for collaboration, managing their lifecycle, naming, and governance becomes important to prevent sprawl and maintain organizational standards.
Option A is correct as Groups management policies provide governance controls for Microsoft 365 Groups creation and management. Administrators can configure policies controlling who can create Groups, implement naming policies requiring specific prefixes or suffixes, block specific words in Group names, configure Group expiration policies to automatically delete inactive Groups, and set usage guidelines displayed when users create Groups. These policies help organizations maintain control over Group proliferation, enforce naming standards for consistency, automatically clean up unused Groups to reduce clutter and security risks, and guide users toward appropriate Group usage. Groups management policies apply across services using Groups including Teams, Planner, SharePoint, and Outlook, providing consistent governance.
Option B refers to Azure AD access reviews, which help organizations periodically review and certify access to resources including Group memberships. While access reviews support governance by ensuring appropriate Group membership, they do not provide the broader Group creation controls, naming policies, or expiration management that Groups management policies offer. Access reviews focus specifically on membership validation rather than comprehensive Group governance.
Option C represents Exchange transport rules for managing email flow. While transport rules might interact with Group mailboxes, they do not provide Group governance capabilities like creation policies or naming standards. Transport rules focus on email message handling rather than Group lifecycle management.
Option D refers to SharePoint permissions controlling access to SharePoint sites. While Groups created through Teams or other services provision SharePoint sites, SharePoint permissions do not govern Group creation policies or naming standards. SharePoint permissions control access after Groups exist rather than governing Group creation and management.
Question 50:
What is the purpose of Microsoft Workplace Analytics?
A) Repairing computer hardware
B) Providing insights into work patterns and collaboration
C) Managing building facilities
D) Tracking inventory
Answer: B
Explanation:
Understanding how employees work, collaborate, and spend time provides valuable insights for improving productivity, wellbeing, and organizational effectiveness, which specialized analytics platforms can reveal while respecting privacy.
Option A is incorrect as repairing computer hardware requires technical support services and hardware maintenance capabilities. Workplace Analytics is a software analytics platform that does not interact with or repair physical hardware. Hardware support involves entirely different IT services focused on physical device maintenance.
Option B is correct as Microsoft Workplace Analytics provides insights into work patterns and collaboration behaviors within organizations. The service analyzes metadata from emails, calendar events, Teams calls and chats, and other Microsoft 365 signals to reveal patterns like meeting culture, collaboration networks, time spent in meetings versus focus time, after-hours work, and manager one-on-one coaching time. Workplace Analytics protects individual privacy by aggregating data, de-identifying information, and providing insights at team or organizational levels rather than individual monitoring. Leaders use insights to identify burnout risks, improve meeting effectiveness, enhance manager effectiveness, and optimize organizational collaboration. The platform helps organizations understand whether practices support productivity and wellbeing or create unnecessary burdens.
Option C is incorrect because managing building facilities requires facilities management systems, space management platforms, and building operations tools. Workplace Analytics focuses on digital collaboration patterns rather than physical space management. While insights might inform space planning decisions, Workplace Analytics does not directly manage facilities.
Option D is incorrect as tracking inventory requires inventory management systems, asset tracking platforms, or enterprise resource planning software. Workplace Analytics analyzes work patterns and collaboration, not physical inventory or assets. These are separate business functions requiring different specialized systems.
Question 51:
What is the primary difference between Microsoft 365 Business and Enterprise plans?
A) Business plans are free while Enterprise plans are paid
B) Business plans have a 300-user limit while Enterprise plans are unlimited
C) Business plans include more features than Enterprise plans
D) Enterprise plans are only for government organizations
Answer: B
Explanation:
Microsoft structures its licensing into distinct tiers designed for different organizational sizes and complexity levels. Understanding the differences helps organizations select appropriate licensing as they grow and ensures they have access to required features.
Option A is incorrect as both Business and Enterprise plans are paid subscriptions. Microsoft does offer some free plans for education and limited trial versions, but standard Business and Enterprise plans require payment. The pricing differs between tiers based on features and capabilities, but neither category is free for commercial use.
Option B is correct as the primary distinction between Business and Enterprise plans is the user limit. Microsoft 365 Business plans support a maximum of 300 users per organization, making them suitable for small and medium-sized businesses. When organizations exceed 300 users, they must transition to Enterprise plans which support unlimited users and can scale to organizations with hundreds of thousands of employees. This user limit serves as the fundamental dividing line between the product categories. Enterprise plans also typically include additional advanced features for security, compliance, and analytics that larger organizations require, but the user limit is the primary differentiator.
Option C is incorrect as Enterprise plans generally include more advanced features than Business plans, not fewer. Enterprise plans provide capabilities like advanced analytics, sophisticated compliance tools, unlimited cloud storage options, and enterprise-grade security features that Business plans lack. While Business plans include comprehensive features for smaller organizations, Enterprise plans extend capabilities for complex large-organization requirements.
Option D is incorrect because Enterprise plans are designed for large commercial organizations of any type, not specifically government organizations. Microsoft offers separate Government plans specifically designed for government agencies with special compliance requirements and government cloud environments. Enterprise plans serve large corporations, universities, healthcare systems, and other sizable organizations across all sectors.
Question 52:
Which Microsoft 365 service provides protection against unsafe attachments by opening them in a virtual environment?
A) Safe Links
B) Safe Attachments
C) Anti-malware policies
D) Connection filtering
Answer: B
Explanation:
Email attachments remain a common method for delivering malware to organizations, requiring advanced protection mechanisms that go beyond traditional signature-based detection to identify sophisticated threats including zero-day attacks.
Option A refers to Safe Links, which protects against malicious URLs in emails and documents by checking links at click-time and blocking access to dangerous websites. While Safe Links is an important protection feature, it focuses on URL threats rather than attachment threats. Safe Links and Safe Attachments work together as complementary protection layers within Defender for Office 365.
Option B is correct as Safe Attachments protects against unsafe email attachments by opening them in a virtual sandboxed environment before delivering them to recipients. This dynamic analysis detonates attachments and observes their behavior to detect malicious actions like attempting to modify system files, establish network connections to command-and-control servers, or encrypt files for ransomware. If malicious behavior is detected, the attachment is blocked and administrators are alerted. If the attachment appears safe after analysis, it is delivered to the recipient. This approach catches sophisticated malware that evades signature-based detection and provides protection against zero-day threats.
Option C represents anti-malware policies which provide baseline malware protection using signature detection and heuristics. While anti-malware policies are important and included in Exchange Online Protection, they do not use the advanced sandboxing technique of opening attachments in virtual environments. Anti-malware provides one layer of protection, while Safe Attachments adds advanced behavioral analysis.
Option D refers to connection filtering which blocks email from IP addresses known to send spam or malware. Connection filtering operates at the network level before messages are accepted, while Safe Attachments analyzes attachments after messages are received. These serve different purposes in the defense-in-depth security strategy.
Question 53:
What is the purpose of Microsoft 365 Secure Score?
A) Measuring employee productivity
B) Assessing and improving security posture
C) Calculating storage usage
D) Tracking license compliance
Answer: B
Explanation:
Organizations need measurable ways to understand their security posture and prioritize improvements, particularly as security features become increasingly numerous and complex across cloud platforms.
Option A is incorrect as measuring employee productivity involves analytics tools like Workplace Analytics or usage reports. Secure Score focuses exclusively on security configuration and does not measure productivity metrics like active users, collaboration patterns, or application usage. Productivity and security represent different aspects of organizational management.
Option B is correct as Microsoft 365 Secure Score provides a numerical assessment of an organization’s security posture based on security configurations and features enabled across Microsoft 365 services. Secure Score analyzes the current security configuration, compares it against Microsoft best practices, and provides a score reflecting how well protected the organization is. The dashboard includes improvement actions explaining how to increase the score by implementing security features like multi-factor authentication, data loss prevention policies, or advanced threat protection. Each improvement action shows the potential score increase, implementation difficulty, and affected users. Organizations use Secure Score to prioritize security investments, track improvement over time, and compare their security posture against similar organizations. The tool makes security measurable and actionable.
Option C is incorrect because calculating storage usage is handled through storage reports in the Microsoft 365 admin center showing OneDrive, SharePoint, and mailbox storage consumption. Storage management is a capacity planning concern rather than a security assessment. Secure Score does not address storage or capacity issues.
Option D is incorrect as tracking license compliance involves license management and assignment reports showing which users have which licenses and identifying unlicensed users. License compliance is an administrative and financial concern rather than a security metric. Secure Score focuses on security configuration effectiveness.
Question 54:
Which Microsoft 365 feature allows users to restore deleted files within a specific timeframe?
A) Versioning
B) Recycle Bin
C) Backup and restore
D) Archive
Answer: B
Explanation:
Accidental file deletion is common, and users need mechanisms to recover deleted files without requiring IT intervention, making self-service recovery features essential for productivity and reducing support burden.
Option A refers to versioning, which maintains historical versions of files as they are modified, allowing users to restore previous versions or see who made changes. While versioning helps recover from unwanted modifications or corrupted files, it does not specifically address deleted files. Versioning tracks changes to existing files rather than recovering deleted files.
Option B is correct as the Recycle Bin provides temporary storage for deleted files, allowing users to restore them within a specific timeframe before permanent deletion. In SharePoint and OneDrive, deleted files move to the first-stage Recycle Bin where users can restore them for 93 days by default. If files are deleted from the first-stage Recycle Bin, they move to the second-stage Recycle Bin where site collection administrators can restore them. Exchange Online also provides a Deleted Items folder and Recoverable Items folder for restoring deleted emails. The Recycle Bin provides a safety net against accidental deletion, giving users time to realize mistakes and recover files before permanent loss.
Option C represents backup and restore processes which typically involve creating copies of data to external systems for disaster recovery. While organizations may implement third-party backup solutions for Microsoft 365, native Recycle Bin functionality provides the primary mechanism for recovering deleted files. Backup typically addresses catastrophic failures rather than routine accidental deletions.
Option D refers to archiving, which moves older content to separate storage for long-term retention, particularly for compliance purposes. Archiving in Exchange moves old emails to archive mailboxes, but this is different from recovering deleted files. Archive functionality preserves content long-term rather than providing short-term recovery from deletion.
Question 55:
What is the maximum number of channels that can be created in a Microsoft Teams team?
A) 100
B) 200
C) 500
D) 1,000
Answer: B
Explanation:
Microsoft Teams organizes conversations and content within teams using channels, and understanding channel limits helps organizations structure their teams effectively without hitting unexpected constraints.
Option A suggesting 100 channels is below the actual limit. While 100 channels might be sufficient for many teams, Microsoft provides higher limits to accommodate teams with complex organizational needs requiring extensive channel structures for different projects, topics, or departments.
Option B is correct as Microsoft Teams supports up to 200 channels per team, including both standard and private channels. This generous limit allows teams to organize conversations and content into logical categories while maintaining everything within a single team structure. Organizations can create channels for different projects, topics, locations, or functional areas. However, creating excessive channels can make navigation difficult, and Microsoft recommends focusing on the most important channels and considering whether separate teams might be more appropriate for major organizational divisions. The 200-channel limit applies to the total of standard, private, and shared channels combined.
Option C suggesting 500 channels exceeds the actual documented limit. While Microsoft continually expands Teams capabilities, 500 channels per team would likely create usability challenges making it difficult for users to navigate and find relevant content. The current 200-channel limit balances flexibility with usability.
Option D indicating 1,000 channels is far above the actual limit and would create severe usability problems. Teams with hundreds of channels already challenge user navigation, and 1,000 channels would be impractical. Such scenarios suggest the need for multiple teams rather than excessive channels within one team.
Question 56:
Which Microsoft 365 service helps organizations create internal company portals and websites?
A) Microsoft Forms
B) Microsoft Sway
C) SharePoint Online
D) Microsoft Stream
Answer: C
Explanation:
Organizations need platforms for creating internal portals where employees can find company information, policies, news, and resources, requiring content management systems with appropriate features for enterprise intranet scenarios.
Option A refers to Microsoft Forms, which creates surveys, quizzes, and polls for gathering information. Forms is designed for data collection through questions rather than creating informational websites or portals. While Forms might be embedded in portals to collect feedback, it does not create portals themselves.
Option B represents Microsoft Sway, which creates interactive presentations, reports, and newsletters with automatic formatting and design. While Sway produces engaging content, it is designed for documents and presentations rather than full-featured company portals with navigation, multiple pages, and enterprise content management. Sway content might be shared via portals but does not create the portal infrastructure.
Option C is correct as SharePoint Online provides comprehensive capabilities for creating internal company portals, intranets, and departmental websites. SharePoint supports creating communication sites for broadcasting news and information, team sites for collaboration, and hub sites that connect related sites together. Organizations use SharePoint to build company intranets with navigation, search, news, document libraries, lists, and custom web parts displaying relevant information. SharePoint includes modern page experiences, mobile responsiveness, and integration with other Microsoft 365 services. The platform supports permission management, version control, workflows, and content governance making it suitable for enterprise-wide portal deployments.
Option D refers to Microsoft Stream, which is an enterprise video service for uploading and sharing videos. While videos might be embedded in company portals, Stream itself does not create portals or websites. Stream focuses on video content management rather than general website creation.
Question 57:
What is the purpose of Microsoft 365 mailbox auditing?
A) Increasing mailbox storage
B) Tracking mailbox access and actions performed
C) Blocking spam emails
D) Organizing email folders
Answer: B
Explanation:
Organizations need visibility into who accesses mailboxes and what actions they perform for security investigations, compliance requirements, and detecting unauthorized access or data theft.
Option A is incorrect as increasing mailbox storage involves adjusting storage quotas or purchasing additional storage capacity. Mailbox auditing does not affect storage capacity and operates independently of storage management. Auditing creates logs that consume some storage but does not increase mailbox storage available to users.
Option B is correct as Microsoft 365 mailbox auditing tracks and logs actions performed on mailboxes including who accessed a mailbox, what items were accessed, messages sent, deleted, modified, or moved, and when actions occurred. Auditing captures activities by mailbox owners, delegates with access permissions, and administrators. Organizations use audit logs to investigate security incidents, detect unauthorized access, meet compliance requirements for monitoring email access, and understand what happened during suspected data breaches. Administrators can search audit logs for specific users, actions, or timeframes to reconstruct events. Mailbox auditing is enabled by default in Microsoft 365 and logs are retained according to configured retention policies.
Option C is incorrect because blocking spam emails is handled by Exchange Online Protection and anti-spam policies. While audit logs might record spam-related actions like messages quarantined or deleted, auditing does not actively block spam. Spam filtering and audit logging serve different purposes within the email security and compliance framework.
Option D is incorrect as organizing email folders involves user actions in Outlook or administrator-configured folder policies. Mailbox auditing does not organize folders but rather logs when folders are created, modified, or deleted. The purpose is monitoring and compliance rather than organization or management.
Question 58:
Which Microsoft 365 plan includes phone system capabilities for making and receiving calls?
A) Microsoft 365 Business Basic
B) Microsoft 365 E5
C) Microsoft 365 F3
D) Office 365 E1
Answer: B
Explanation:
Microsoft Teams includes voice calling capabilities that can replace traditional phone systems, but phone system features are only included in specific higher-tier plans requiring organizations to understand licensing for voice deployments.
Option A is incorrect as Microsoft 365 Business Basic provides foundational cloud services including Teams for chat and meetings but does not include phone system capabilities for making or receiving external calls. Business Basic users can make calls within Teams to other Teams users but cannot use Teams as a replacement for traditional phone systems without additional licensing.
Option B is correct as Microsoft 365 E5 includes comprehensive phone system capabilities through Teams Phone. E5 subscribers can make and receive external phone calls, port existing phone numbers, assign new numbers, configure call routing, set up auto attendants and call queues, and access voicemail. E5 includes domestic calling plans in some regions, though international calling may require additional licensing. Teams Phone in E5 enables organizations to replace traditional PBX systems with cloud-based phone services integrated into Teams. Users can make calls from computers, desk phones, or mobile devices using their business phone numbers.
Option C represents Microsoft 365 F3, which is designed for frontline workers with limited features focused on mobile access. F3 does not include phone system capabilities and provides only basic Teams functionality. Frontline workers with F3 licenses cannot use Teams for external phone calls without additional licensing.
Option D refers to Office 365 E1, which provides cloud services but does not include phone system capabilities. E1 includes Teams for chat and meetings but not voice calling to external numbers. Organizations requiring phone system features must upgrade to E5 or purchase phone system add-ons separately.
Question 59:
What is the purpose of the Microsoft 365 Admin Center?
A) Creating Word documents
B) Centralized administration and management of Microsoft 365 services
C) Playing videos
D) Designing graphics
Answer: B
Explanation:
Administrators need centralized locations for managing users, licenses, settings, and services across Microsoft 365, and the admin center provides this essential management interface.
Option A is incorrect as creating Word documents is accomplished through Microsoft Word application. The admin center is designed for administrative tasks like user management, service configuration, and reporting rather than content creation. Administrators use entirely different tools for document creation versus tenant management.
Option B is correct as the Microsoft 365 Admin Center provides centralized administration and management for Microsoft 365 services. Administrators use the admin center to manage user accounts, assign licenses, configure security settings, manage domains, monitor service health, view usage reports, configure organization settings, and access specialized admin centers for Exchange, SharePoint, Teams, and other services. The admin center serves as the primary management interface where administrators perform daily tasks like adding new users, resetting passwords, managing groups, and troubleshooting issues. The dashboard provides overview information about the tenant including active users, service incidents, and important messages from Microsoft.
Option C is incorrect because playing videos involves video player applications or services like Stream. The admin center focuses on administrative tasks and does not provide video playback capabilities. While administrators might access documentation videos about managing Microsoft 365, video playback is not the admin center’s purpose.
Option D is incorrect as designing graphics requires graphics applications like Microsoft Designer or professional design tools. The admin center provides administrative interfaces rather than creative tools. Administrative work and graphic design represent entirely different skill sets and tool requirements.
Question 60:
Which Microsoft 365 feature allows automatic classification of documents based on content?
A) Manual labeling
B) Trainable classifiers
C) File extensions
D) Folder structures
Answer: B
Explanation:
Organizations with large volumes of documents need automated methods for classifying content to apply appropriate protection and retention policies consistently without requiring manual review of every document.
Option A refers to manual labeling where users apply sensitivity labels or classifications themselves. While manual labeling is important and gives users control over classification, it is the opposite of automatic classification. Manual processes are time-consuming, inconsistent, and miss documents that users forget to label.
Option B is correct as trainable classifiers use machine learning to automatically classify documents based on content analysis. Microsoft provides pre-trained classifiers for common content types like resumes, source code, harassment content, profanity, and threat content. Organizations can also train custom classifiers by providing examples of documents that should and should not match the classification. Once trained, classifiers automatically scan documents and apply classifications, which can trigger retention policies, sensitivity labels, or other actions. Trainable classifiers analyze document content, not just metadata, enabling sophisticated content-based classification. This automation ensures consistent classification across large document volumes without manual effort.
Option C refers to file extensions which indicate file types but do not classify content based on what documents contain. A file extension identifies whether a document is a PDF, Word file, or Excel spreadsheet but does not determine whether it contains sensitive information, financial data, or confidential content requiring classification.
Option D represents folder structures which organize files based on manual placement. While folders can indicate content types, they depend on users saving files in correct locations and do not analyze actual content. Folder-based classification is unreliable as users frequently save documents in inappropriate locations.