Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Microsoft MS-102 Dumps

Page: 1 / 55
Total 546 questions

Microsoft 365 Administrator Exam Questions and Answers

Question 1

You need to configure the Office 365 service status notifications and limit access to the service and feature updates. The solution must meet the technical requirements.

What should you configure in the Microsoft 365 admin center? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 2

You need to ensure that the Microsoft 365 incidents and advisories are reviewed monthly.

Which users can review the incidents and advisories, and which blade should the users use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 3

You are evaluating the use of multi-factor authentication (MFA).

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

as

Options:

Question 4

You need to ensure that Admin4 can use SSPR.

Which tool should you use. and which action should you perform? To answer, select the appropriate options m the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 5

You need to configure Azure AD Connect to support the planned changes for the Montreal Users and Seattle Users OUs.

What should you do?

Options:

A.

From the Microsoft Azure AD Connect wizard, select Customize synchronization options.

B.

From PowerShell, run the Add-ADSyncConnectorAttnbuteinclusion cmdlet.

C.

From PowerShell, run the start-ADSyncSyncCycle cmdlet.

D.

From the Microsoft Azure AD Connect wizard, select Manage federation.

Question 6

You need to configure just in time access to meet the technical requirements.

What should you use?

Options:

A.

entitlement management

B.

Azure AD Privileged Identity Management (PIM)

C.

access reviews

D.

Azure AD Identity Protection

Question 7

You need to create the DLP policy to meet the technical requirements.

What should you configure first?

Options:

A.

sensitive info types

B.

the Insider risk management settings

C.

the event types

D.

the sensitivity labels

Question 8

You plan to implement the endpoint protection device configuration profiles to support the planned changes.

You need to identify which devices will be supported, and how many profiles you should implement.

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 9

You need to ensure that User2 can review the audit logs. The solutions must meet the technical requirements.

To which role group should you add User2, and what should you use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 10

You need to configure the compliance settings to meet the technical requirements.

What should you do in the Microsoft Endpoint Manager admin center?

Options:

A.

From Compliance policies, modify the Notifications settings.

B.

From Locations, create a new location for noncompliant devices.

C.

From Retire Noncompliant Devices, select Clear All Devices Retire State.

D.

Modify the Compliance policy settings.

Question 11

You need to create the Safe Attachments policy to meet the technical requirements.

Which option should you select?

Options:

A.

Replace

B.

Enable redirect

C.

Block

D.

Dynamic Delivery

Question 12

You need to configure automatic enrollment in Intune. The solution must meet the technical requirements.

What should you configure, and to which group should you assign the configurations? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 13

You create the planned DLP policies.

You need to configure notifications to meet the technical requirements.

What should you do?

Options:

A.

From the Microsoft 365 security center, configure an alert policy.

B.

From the Microsoft Endpoint Manager admin center, configure a custom notification.

C.

From the Microsoft 365 admin center, configure a Briefing email.

D.

From the Microsoft 365 compliance center, configure the Endpoint DLP settings.

Question 14

You need to configure the information governance settings to meet the technical requirements.

Which type of policy should you configure, and how many policies should you configure? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 15

You need to configure Office on the web to meet the technical requirements.

What should you do?

Options:

A.

Assign the Global reader role to User1.

B.

Enable sensitivity labels for Office files in SharePoint Online and OneDrive.

C.

Configure an auto-labeling policy to apply the sensitivity labels.

D.

Assign the Office apps admin role to User1.

Question 16

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure a pilot for co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: You create a device configuration profile from the Device Management admin center.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 17

You need to configure a conditional access policy to meet the compliance requirements.

You add Exchange Online as a cloud app.

Which two additional settings should you configure in Policy1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 18

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure a pilot for co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: Define a Configuration Manager device collection as the pilot collection. Add Device1 to the collection.

Does this meet the goal?

Options:

A.

Yes

B.

NO

Question 19

As of March, how long will the computers in each office remain supported by Microsoft? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 20

You need to meet the technical requirements and planned changes for Intune.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 21

You need to ensure that User1 can enroll the devices to meet the technical requirements. What should you do?

Options:

A.

From the Azure Active Directory admin center, assign User1 the Cloud device administrator rote.

B.

From the Azure Active Directory admin center, configure the Maximum number of devices per user setting.

C.

From the Intune admin center, add User1 as a device enrollment manager.

D.

From the Intune admin center, configure the Enrollment restrictions.

Question 22

You need to create the Microsoft Store for Business. Which user can create the store?

Options:

A.

User2

B.

User3

C.

User4

D.

User5

Question 23

You need to meet the Intune requirements for the Windows 10 devices.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 24

You need to ensure that the support technicians can meet the technical requirement for the Montreal office mobile devices.

What is the minimum of dedicated support technicians required?

Options:

A.

1

B.

4

C.

7

D.

31

Question 25

On which server should you use the Defender for identity sensor?

Options:

A.

Server1

B.

Server2

C.

Server3

D.

Server4

E.

Servers5

Question 26

On which server should you install the Azure ATP sensor?

Options:

A.

Server 1

B.

Server 2

C.

Server 3

D.

Server 4

E.

Server 5

Question 27

You need to meet the compliance requirements for the Windows 10 devices.

What should you create from the Intune admin center?

Options:

A.

a device compliance policy

B.

a device configuration profile

C.

an application policy

D.

an app configuration policy

Question 28

Which report should the New York office auditors view?

Options:

A.

DLP policy matches

B.

DLP false positives and overrides

C.

DLP incidents

D.

Top Senders and Recipients

Question 29

You have a Microsoft 365 subscription.

From Microsoft 365 Defender, you create a role group named US eDiscovery Managers by copying the eDiscovery Manager role group.

You need to ensure that the users in the new role group can only perform content searches of mailbox content for users in the United States.

Solution: From Windows PowerShell, you run the New-complianceSecurityFilter cmdlet with the appropriate parameters.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 30

You have a Microsoft 365 E5 subscription that contains the identities shown in the following table:

as

You create a shared mailbox named Shared1.

Which identities can you add to Shared1 as a member?

Options:

A.

User1 only

B.

User1 and Group1 only

C.

User1 and Group2 only

D.

User1 and Group3 only

E.

User1, Group2, and Group3 only

Question 31

You have a Microsoft 365 subscription.

You plan to implement Microsoft Purview Privileged Access Management.

Which Microsoft Office 365 workloads support privileged access?

Options:

A.

Microsoft Exchange Online only

B.

Microsoft Teams only

C.

Microsoft Exchanqe Online and SharePoint Online only

D.

Microsoft Teams and SharePoint Online only

E.

Microsoft Teams, Exchanqe Online, and SharePoint Online

Question 32

You have a Microsoft 365 subscription.

You need to be notified to your personal email address when a Microsoft Exchange Online service issue occurs. What should you do?

Options:

A.

From the Microsoft 365 admin center, customize the Service health settings.

B.

From the Microsoft Outlook client configure an Inbox rule.

C.

From the Microsoft 365 admin center, update the technical contact details.

D.

From the Exchange admin center, create a contact.

Question 33

Your company has a Microsoft 365 E5 tenant that contains a user named User1.

You review the company’s compliance score.

You need to assign the following improvement action to User1:Enable self-service password reset.

What should you do first?

Options:

A.

From Compliance Manager, turn off automated testing.

B.

From the Azure Active Directory admin center, enable self-service password reset (SSPR).

C.

From the Microsoft 365 admin center, modify the self-service password reset (SSPR) settings.

D.

From the Azure Active Directory admin center, add User1 to the Compliance administrator role.

Question 34

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer that runs Windows 10.

You need to verify which version of Windows 10 is installed.

Solution: At a command prompt, you run the winver.exe command.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 35

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 E5 subscription.

You create an account for a new security administrator named SecAdmin1.

You need to ensure that SecAdmin1 can manage Microsoft Defender for Office 365 settings and policies for Microsoft Teams, SharePoint, and OneDrive.

Solution: From the Microsoft Entra admin center, you assign SecAdmin1 the Security Administrator role.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 36

(You have a Microsoft 365 E5 subscription.

You are implementing Microsoft Defender for Cloud Apps.

You need to ensure that you can create OAuth app policies .

Solution: You configure Conditional Access app control .

Does this meet the goal?)

Options:

A.

Yes

B.

No

Question 37

You have a Microsoft 365 subscription that contains the users shown in the following table.

as

The Global Administrator role has the Privileged Identity Management < PIM) settings shown in the following table.

as

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE Each correct selection is worth one point.

as

Options:

Question 38

: 251 HOTSPOT

You have a Microsoft 365 E5 tenant that contains the users shown in the following table.

as

You provision the private store in Microsoft Store for Business.

You assign Microsoft Store for Business roles to the users as shown in the following table.

as

You need to identify which users can add apps to the private store, and which users can assign apps from Microsoft Store for Business.

Which users should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 39

You have an Azure AD tenant.

You have 1,000 computers that run Windows 10 Pro and are joined to Azure AD.

You purchase a Microsoft 365 E3 subscription.

You need to deploy Windows 10 Enterprise to the computers. The solution must minimize administrative effort.

What should you do?

Options:

A.

From the Microsoft Endpoinf Manager admin center, create a Windows Autopilot deployment profile. Assign the profile to all the computers. Instruct users to restart their computer and perform a network restart.

B.

Enroll the computers in Microsoft Intune. Create a configuration profile by using the Edition upgrade and mode switch template. From the Microsoft Endpoint Manager admin center, assign the profile to all the computers and instruct users to restart their computer.

C.

From Windows Configuration Designer, create a provisioning package that has an EditionUpgrade configuration and upload the package to a Microsoft SharePoint Online site. Instruct users to run the provisioning package from SharePoint Online.

D.

From the Azure Active Directory admin center, create a security group that has dynamic device membership. Assign licenses to the group and instruct users to sign in to their computer.

Question 40

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

as

You enable self-service password reset (SSPR) for Group1. You configure security questions as the only authentication method for SSPR.

Which users can use SSPR, and which users must answer security questions to reset their password? To answer, select the appropriate options in the answer area.

NOTE; Each correct selection is worth one point.

as

Options:

Question 41

You have a Microsoft 365 E5 tenant.

You configure sensitivity labels.

Users report that the Sensitivity button is unavailability in Microsoft Word for the web. The sensitivity button is available in Word for Microsoft 365.

You need to ensure that the users can apply the sensitivity labels when they use Word for the web.

What should you do?

Options:

A.

Copy policies from Azure information Protection to the Microsoft 365 Compliance center

B.

Publish the sensitivity labels.

C.

Create an auto-labeling policy

D.

Enable sensitivity labels for files in Microsoft SharePoint Online and OneDrive.

Question 42

You have a Microsoft 365 subscription that uses Microsoft Defender for Endpoint.

All the devices in your organization are onboarded to Microsoft Defender for Endpoint.

You need to ensure that an alert is generated if malicious activity was detected on a device during the last 24 hours.

What should you do?

Options:

A.

From the Microsoft Purview compliance portal, create a data loss prevention (DLP) policy.

B.

From Alerts queue, create a suppression rule and assign an alert.

C.

From Advanced hunting, create a query and a detection rule.

D.

From the Microsoft Purview compliance portal, create an audit log search.

Question 43

You have a Microsoft 365 E5 subscription.

You plan to use a mailbox named Mailbox1 to analyze malicious email messages.

You need to configure Microsoft Defender for Office 365 to meet the following requirements:

• Ensure that incoming email is NOT filtered for Mailbox1.

• Detect impersonation and spoofing attacks on all other mailboxes in the subscription.

Which two settings should you configure? To answer, select the appropriate settings in the answer area.

as

Options:

Question 44

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Endpoint.

When users attempt to access the portal of a partner company, they receive the message shown in the following exhibit.

as

You need to enable user access to the partner company ' s portal.

Which Microsoft Defender for Endpoint setting should you modify?

Options:

A.

Alert notifications

B.

Alert suppression

C.

Custom detections

D.

Advanced hunting

E.

Indicators

Question 45

You have a Microsoft 365 E5 tenant.

You configure a device compliance policy as shown in the following exhibit.

as

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

as

Options:

Question 46

Your network contains an on-premises Active Directory domain named contoso.com. The domain contains the objects shown in the following table.

as

You configure Azure AD Connect to sync contoso.com to Azure AD.

Which objects will sync to Azure AD?

Options:

A.

Group1 only

B.

User1 and User2 only

C.

Group1 and User1 only

D.

Group1, User1, and User2

Question 47

You have a Microsoft 365 subscription that includes Microsoft Defender XDR.

From the Microsoft Defender portal, you review the Microsoft Secure Score improvement actions shown in the following table.

as

You plan to update the status of the improvement actions as shown in the following table.

as

How many points will the Secure Score increase after the update?

Options:

A.

0

B.

4

C.

7

D.

13

E.

16

Question 48

You have a Microsoft 365 E5 subscription.

You onboard all devices to Microsoft Defender for Endpoint

You need to use Defender for Endpoint to block access to a malicious website at

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct answer is worth one point.

Options:

A.

Create a web content filtering policy.

B.

Configure an enforcement scope.

C.

Enable Custom network indicators.

D.

Create an indicator.

E.

Enable automated investigation.

Question 49

You have a Microsoft J65 E5 subscription.

You integrate Microsoft Defender for Endpoint with Microsoft Intune.

You need to ensure that devices automatically onboard to Defender for Endpoint when they are enrolled in Intune.

Solution: You configure a device configuration profile.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 50

You have a Microsoft 365 E5 subscription.

You plan to create the data loss prevention (DLP) policies shown in the following table.

as

You need to create DLP rules for each policy.

Which policies support the sender is condition and the file extension is condition? To answer select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 51

Your network contains an on-premises Active Directory domain that is synced to Azure AD as shown in the following exhibit.

as

An on-premises Active Directory user account named Allan You is synchronized to Azure AD. You view Allan ' s account from Microsoft 365 and notice that his username is set to Allan @ > ddatum.onmicrosoft.com.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE Each correct selection is worth one point.

as

Options:

Question 52

Your on-premises network contains an Active Directory domain.

You have a Microsoft 365 E5 subscription.

You plan to implement a hybrid configuration that has the following requirements:

• Minimizes the number of times users are prompted for credentials when they access Microsoft 365 resources

• Supports the use of Azure AD Identity Protection

You need to configure Azure AD Connect to support the planned implementation. Which two options should you select? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Password Hash Synchronization

B.

Password writeback

C.

Directory extension attribute sync

D.

Enable single sign-on

E.

Pass-through authentication

Question 53

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

as

In Microsoft Endpoint Manager, you have the Policies for Office apps settings shown in the following table.

as

The policies use the settings shown in the following table.

as

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

as

Options:

Question 54

: 224 HOTSPOT

You have a Microsoft 365 E5 subscription that contains two users named Admin1 and Admin2.

All users are assigned a Microsoft 365 Enterprise E5 license and auditing is turned on.

You create the audit retention policy shown in the exhibit. (Click the Exhibit tab.)

as

After Policy1 is created, the following actions are performed:

Admin1 creates a user named User1.

Admin2 creates a user named User2.

How long will the audit events for the creation of User1 and User2 be retained? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 55

You have a Microsoft 365 subscription.

Your company has a customer ID associated to each customer. The customer IDs contain 10 numbers

followed by 10 characters. The following is a sample customer ID: 12-456-7890-abc-de-fghij.

You plan to create a data loss prevention (DLP) policy that will detect messages containing customer IDs.

D18912E1457D5D1DDCBD40AB3BF70D5D

What should you create to ensure that the DLP policy can detect the customer IDs?

Options:

A.

a sensitive information type

B.

a sensitivity label

C.

a supervision policy

D.

a retention label

Question 56

You have a Microsoft 365 E5 subscription and use Microsoft Defender for Endpoint. The subscription contains the devices shown in

as

You need to create the Endpoint security policies shown in the following table.

as

To which device can you apply each policy? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

as

Options:

Question 57

Which role should you assign to User1?

Available Choices (select all choices that are correct)

Options:

A.

Hygiene Management

B.

Security Reader

C.

Security Administrator

D.

Records Management

Question 58

You are evaluating the required processes for Project1.

You need to recommend which DNS record must be created while adding a domain name for the project.

Which DNS record should you recommend?

Options:

A.

host (A)

B.

host information

C.

text (TXT)

D.

alias (CNAME)

Question 59

You need to ensure that all the sales department users can authenticate successfully during Project1 and Project2.

Which authentication strategy should you implement for the pilot projects?

Options:

A.

pass-through authentication

B.

pass-through authentication and seamless SSO

C.

password hash synchronization and seamless SSO

D.

password hash synchronization

Question 60

HOTSPOT

You create the Microsoft 365 tenant.

You implement Azure AD Connect as shown in the following exhibit.

as

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

as

Options:

Page: 1 / 55
Total 546 questions