|
| 1 | +### YamlMime:ModuleUnit |
| 2 | +uid: learn.dpu.security-management-education.knowledge-check |
| 3 | +title: Knowledge check |
| 4 | +metadata: |
| 5 | + title: Knowledge Check |
| 6 | + description: This content is part of the "Microsoft security and management solutions in education" module. |
| 7 | + ms.date: 03/25/2026 |
| 8 | + author: Stephanie-Rosenzweig |
| 9 | + ms.author: v-stephanier |
| 10 | + ms.topic: unit |
| 11 | +durationInMinutes: 4 |
| 12 | +quiz: |
| 13 | + title: Check your knowledge |
| 14 | + questions: |
| 15 | + - content: "What is the core principle of the Zero Trust security model?" |
| 16 | + choices: |
| 17 | + - content: "All users inside the network perimeter are trusted by default" |
| 18 | + isCorrect: false |
| 19 | + explanation: "Incorrect. The module explains that Zero Trust assumes no implicit trust, even within the network perimeter." |
| 20 | + - content: "No user or device is implicitly trusted without verification" |
| 21 | + isCorrect: true |
| 22 | + explanation: "Correct. Zero Trust requires explicit verification of every access request based on multiple signals." |
| 23 | + - content: "Security controls are only applied to external users" |
| 24 | + isCorrect: false |
| 25 | + explanation: "Incorrect. Zero Trust applies to all users and devices, regardless of location." |
| 26 | + - content: "Access decisions are based solely on network location" |
| 27 | + isCorrect: false |
| 28 | + explanation: "Incorrect. The model evaluates identity, device health, behavior, location, and risk signals—not just location." |
| 29 | + - content: "Which Microsoft solution is described as a cloud-native SIEM that collects and correlates signals across an educational institution?" |
| 30 | + choices: |
| 31 | + - content: "Microsoft Defender for Endpoint" |
| 32 | + isCorrect: false |
| 33 | + explanation: "Incorrect. Defender for Endpoint focuses on endpoint protection and detection, not SIEM capabilities." |
| 34 | + - content: "Microsoft Sentinel" |
| 35 | + isCorrect: true |
| 36 | + explanation: "Correct. The module identifies Sentinel as a cloud-native SIEM that correlates logs and signals to detect threats." |
| 37 | + - content: "Microsoft Intune for Education" |
| 38 | + isCorrect: false |
| 39 | + explanation: "Incorrect. Intune for Education is used for device management and policy enforcement." |
| 40 | + - content: "Microsoft Purview" |
| 41 | + isCorrect: false |
| 42 | + explanation: "Incorrect. Purview focuses on data governance, classification, and compliance." |
| 43 | + - content: "What primary benefit do Microsoft Intune for Education and Windows Autopilot provide when used together?" |
| 44 | + choices: |
| 45 | + - content: "Manual imaging and on-site device configuration" |
| 46 | + isCorrect: false |
| 47 | + explanation: "Incorrect. The module explains that Autopilot eliminates the need for manual imaging." |
| 48 | + - content: "Centralized identity authentication across networks" |
| 49 | + isCorrect: false |
| 50 | + explanation: "Incorrect. Identity authentication is primarily handled by Microsoft Entra ID." |
| 51 | + - content: "Zero-touch device deployment and ongoing compliance" |
| 52 | + isCorrect: true |
| 53 | + explanation: "Correct. Together, Intune for Education and Autopilot enable automated deployment, configuration, and lifecycle compliance." |
| 54 | + - content: "Advanced threat hunting across cloud applications" |
| 55 | + isCorrect: false |
| 56 | + explanation: "Incorrect. Threat hunting is addressed by solutions like Microsoft Sentinel and Defender." |
| 57 | + - content: "How did Oregon State University benefit after implementing Microsoft Sentinel and related security solutions?" |
| 58 | + choices: |
| 59 | + - content: "Reduced device deployment time by eliminating custom images" |
| 60 | + isCorrect: false |
| 61 | + explanation: "Incorrect. This benefit is associated with Windows Autopilot and device provisioning scenarios." |
| 62 | + - content: "Improved student internet access through LTE-enabled devices" |
| 63 | + isCorrect: false |
| 64 | + explanation: "Incorrect. LTE-enabled access was highlighted in the NYC Public Schools K–12 scenario." |
| 65 | + - content: "Reduced incident detection time from weeks to minutes" |
| 66 | + isCorrect: true |
| 67 | + explanation: "Correct. The module states this was a key outcome of OSU’s security modernization." |
| 68 | + - content: "Shifted all security responsibilities to third-party vendors" |
| 69 | + isCorrect: false |
| 70 | + explanation: "Incorrect. OSU strengthened internal security operations using Microsoft’s integrated tools." |
| 71 | + |
0 commit comments