Book Image

Microsoft 365 Certified Fundamentals MS-900 Exam Guide - Second Edition

By : Aaron Guilmette, Yura Lee, Marcos Zanre
4 (1)
Book Image

Microsoft 365 Certified Fundamentals MS-900 Exam Guide - Second Edition

4 (1)
By: Aaron Guilmette, Yura Lee, Marcos Zanre

Overview of this book

Microsoft 365 Certified Fundamentals certification demonstrates your foundational knowledge of adopting cloud services, specifically the software as a service (SaaS) model. Exam MS-900 tests your understanding of Microsoft 365 services, components, their implementation, security, licensing, and general cloud concepts. This updated second edition covers all the recent and important changes in the examination in detail to help you achieve certification. You’ll begin by exploring key topics such as Microsoft security and compliance policies, pricing and support, and cloud concepts. The book helps you to understand these concepts with the help of real-world scenarios, learning about platform services such as Microsoft Windows, SharePoint, Microsoft 365 apps, Teams, and Exchange. The content has been updated to include Microsoft Forms, Power Platform, Microsoft 365 Security Center, Windows Virtual Desktop, and Insider Risk Management. Each chapter contains a section that will test your knowledge of the core concepts covered. Finally, you’ll take a practice exam with extra questions to help prepare you for the actual test. By the end of this MS-900 book, you’ll be well-equipped to confidently pass the MS-900 certification exam with the help of the updated exam pattern.
Table of Contents (25 chapters)
1
Section 1:Understanding Cloud Concepts
4
Section 2:Microsoft 365 Core Services and Concepts
11
Section 3:Understanding Security, Compliance, Privacy, and Trust in Microsoft 365
15
Chapter 12: Exploring the Service Trust Portal, Compliance Manager, and the Microsoft 365 Security Center
16
Section 4:Understanding Microsoft 365 Pricing and Support
21
Section 5:Practice Exams
22
Chapter 17: Mock Exam

Introduction to multi-factor authentication (MFA)

For most authentication or login attempts, users provide login credentials (usually a username and a password). The methods of authenticating a user's identity typically fall into one of the following three categories:

  • Something the user knows: A password is the most common example of this method.
  • Something the user has: This can be some kind of login device, such as a smart card or token, or it can be a text or phone call to a phone number previously registered with the system that the user is attempting to access.
  • Something the user is: With this method, the user must supply some sort of biometric input, such as a fingerprint, iris scan, or voice passcode.

There are a lot of scenarios, however, where a simple username and password may not be enough to secure valuable resources. In such cases, organizations may wish to further challenge a user during the login process to verify their identity. MFA provides...