Book Image

Microsoft 365 Certified Fundamentals MS-900 Exam Guide - Second Edition

By : Aaron Guilmette, Yura Lee, Marcos Zanre
4 (1)
Book Image

Microsoft 365 Certified Fundamentals MS-900 Exam Guide - Second Edition

4 (1)
By: Aaron Guilmette, Yura Lee, Marcos Zanre

Overview of this book

Microsoft 365 Certified Fundamentals certification demonstrates your foundational knowledge of adopting cloud services, specifically the software as a service (SaaS) model. Exam MS-900 tests your understanding of Microsoft 365 services, components, their implementation, security, licensing, and general cloud concepts. This updated second edition covers all the recent and important changes in the examination in detail to help you achieve certification. You’ll begin by exploring key topics such as Microsoft security and compliance policies, pricing and support, and cloud concepts. The book helps you to understand these concepts with the help of real-world scenarios, learning about platform services such as Microsoft Windows, SharePoint, Microsoft 365 apps, Teams, and Exchange. The content has been updated to include Microsoft Forms, Power Platform, Microsoft 365 Security Center, Windows Virtual Desktop, and Insider Risk Management. Each chapter contains a section that will test your knowledge of the core concepts covered. Finally, you’ll take a practice exam with extra questions to help prepare you for the actual test. By the end of this MS-900 book, you’ll be well-equipped to confidently pass the MS-900 certification exam with the help of the updated exam pattern.
Table of Contents (25 chapters)
1
Section 1:Understanding Cloud Concepts
4
Section 2:Microsoft 365 Core Services and Concepts
11
Section 3:Understanding Security, Compliance, Privacy, and Trust in Microsoft 365
15
Chapter 12: Exploring the Service Trust Portal, Compliance Manager, and the Microsoft 365 Security Center
16
Section 4:Understanding Microsoft 365 Pricing and Support
21
Section 5:Practice Exams
22
Chapter 17: Mock Exam

Understanding enterprise mobility and device and application management

Smartphones are essentially pocket-sized portable personal computers. Workers use their phones to check their emails, join meetings, make calls, view and share documents, and more. More than ever, workers need flexible work hours and the ability to work remotely. Workers in the field can have more flexible and powerful options at their disposal.

Organizations need to find a way to balance performing such activities and enabling productivity without increasing risks such as accidental data leakage. Additionally, work responsibilities might require users to be able to access their work data or applications from a remote location using potentially insecure or non-managed devices. Administrators need to manage the assets of the organization and allow collaboration and productivity in the most secure way possible.

For some, the immediate response to some of these scenarios might be to block users from accessing...