New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft MS-900 Exam - Topic 5 Question 16 Discussion

Actual exam question for Microsoft's MS-900 exam
Question #: 16
Topic #: 5
[All MS-900 Questions]

You are the network administrator of a company.

The Microsoft 365 tenant contains sensitive information. Employees must verify their identities when they sign into Microsoft 365 by providing information in addition to their Azure AD password.

You need to select the tools that employees can use to verify their identities.

Which two tools should you select? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Show Suggested Answer Hide Answer

Contribute your Thoughts:

0/2000 characters
Twanna
4 months ago
I thought Microsoft Security Center was for threat management, not identity verification.
upvoted 0 times
...
Tegan
4 months ago
Wait, can we really trust these tools for sensitive info?
upvoted 0 times
...
Mitsue
5 months ago
Agreed, Authenticator is a must-have for security!
upvoted 0 times
...
Alayna
5 months ago
I think Customer Lockbox is more about data access, not identity verification.
upvoted 0 times
...
Chauncey
5 months ago
Definitely Windows Hello for Business and Microsoft Authenticator!
upvoted 0 times
...
Fidelia
5 months ago
Microsoft Authenticator seems like a solid option too. I practiced a question about MFA, and it was one of the tools mentioned.
upvoted 0 times
...
Sue
5 months ago
I'm not entirely sure about Customer Lockbox. I remember it being more about data access rather than identity verification.
upvoted 0 times
...
Paris
5 months ago
I think Windows Hello for Business is definitely one of the tools we should choose. It aligns with multi-factor authentication, right?
upvoted 0 times
...
Shawna
5 months ago
I feel like Microsoft Security Center might not be the right choice here. It’s more about security management than identity verification, isn’t it?
upvoted 0 times
...
Kanisha
5 months ago
Okay, I think I know the answer here. The key is that we need to use separate user data folders for the Main and PiP sessions, so I'm pretty sure the correct setting is option A, BrowserUserDataFolderMode.CustomFolder.
upvoted 0 times
...
Lauran
5 months ago
I'm pretty sure the DROP statement flags the variables to be dropped at output, so I'll go with option A.
upvoted 0 times
...
Tiara
5 months ago
Ugh, I'm a little confused by this question. The exhibit doesn't give a ton of detail, so I'm not sure exactly what I'm looking for. I'll just try to eliminate the answer choices that don't seem to fit and go from there.
upvoted 0 times
...
Shaunna
5 months ago
I feel pretty confident about this one. Based on my understanding of the different roles, the information system security officer would be the individual who is responsible for incorporating risk assessment into the training programs for the organization's personnel. That seems like the most logical answer.
upvoted 0 times
...

Save Cancel