Exam4Training

Microsoft MS-101 Microsoft 365 Mobility and Security Online Training

Question #1

Topic 1, Contoso, Ltd

Overview

Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.

The company has the employees and devices shown in the following table.

Contoso recently purchased a Microsoft 365 E5 subscription.

Existing Environment

The network contains an on-premises Active Directory forest named contoso.com.

The forest contains the servers shown in the following table.

All servers run Windows Server 2016. All desktops and laptops run Windows 10 Enterprise and are joined to the domain.

The mobile devices of the users in the Montreal and Seattle offices run Android. The mobile devices of the users in the New York office run iOS.

The domain is synced to Azure Active Directory (Azure AD) and includes the users shown in the following table.

The domain also includes a group named Group1.

Requirements

Planned Changes

Contoso plans to implement the following changes:

• Implement Microsoft 365.

• Manage devices by using Microsoft Intune.

• Implement Azure Advanced Threat Protection (ATP).

• Every September, apply the latest feature updates to all Windows computers. Every March, apply the latest feature updates to the computers in the New York office only.

Technical Requirements

Contoso identifies the following technical requirements:

• When a Windows 10 device is joined to Azure AD, the device must enroll in Intune automaticaiy.

• Dedicated support technicians must enroll all the Montreal office mobile devices in Intune.

• User1 must be able to enroll all the New York office mobile devices in Intune.

• Azure ATP sensors must be installed and must NOT use port mirroring.

• Whenever possible, the principle of least privilege must be used.

• A Microsoft Store for Business must be created.

Compliance Requirements

Contoso identifies the following compliance requirements:

• Ensure that the users in Group1 can only access Microsoft Exchange Online from devices that are enrolled in Intune and configured in accordance with the corporate policy.

• Configure Windows Information Protection (W1P) for the Windows 10 devices.

HOTSPOT

You need to meet the Intune requirements for the Windows 10 devices.

What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

References: https://docs.microsoft.com/en-us/intune/windows-enroll


Question #2

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure a pilot for co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: Define a Configuration Manager device collection as the pilot collection. Add Device1 to the collection.

Does this meet the goal?

  • A . Yes
  • B . NO

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Device1 has the Configuration Manager client installed so you can manage Device1 by using Configuration Manager. To manage Device1 by using Microsoft Intune, the device has to be enrolled in Microsoft Intune. In the Co-management Pilot configuration, you configure a Configuration Manager Device Collection that determines which devices are auto-enrolled in Microsoft Intune. You need to add Device1 to the Device Collection so that it auto-enrols in Microsoft Intune. You will then be able to manage Device1 using Microsoft Intune.

Reference: https://docs.microsoft.com/en-us/configmgr/comanage/how-to-enable

Question #3

You need to ensure that User1 can enroll the devices to meet the technical requirements.

What should you do?

  • A . From the Azure Active Directory admin center, assign User1 the Cloud device administrator rote.
  • B . From the Azure Active Directory admin center, configure the Maximum number of devices per user setting.
  • C . From the Intune admin center, add User1 as a device enrollment manager.
  • D . From the Intune admin center, configure the Enrollment restrictions.

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

References: https://docs.microsoft.com/en-us/sccm/mdm/deploy-use/enroll-devices-with-device-enrollment-manager

Question #4

On which server should you install the Azure ATP sensor?

  • A . Server 1
  • B . Server 2
  • C . Server 3
  • D . Server 4
  • E . Server 5

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

References: https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-capacity-planning

However, if the case study had required that the DCs can’t have any s/w installed, then the answer would have been a standalone sensor on Server2. In this scenario, the given answer is correct. BTW, ATP now known as Defender for Identity.

Question #5

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure a pilot for co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: You create a device configuration profile from the Device Management admin center.

Does this meet the goal?

  • A . Yes
  • B . No

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

It looks like the given answer is correct. There is an on-premises Active Directory synced to Azure Active Directory (Azure AD) So the co-management path1 – Auto-enroll existing clients 1. Hybrid Azure AD 2. Client agent setting for hybrid Azure AD-join 3. Configure auto-enrollment of devices to Intune 4. Enable co-management in Configuration Manager https://docs.microsoft.com/en-us/mem/configmgr/comanage/tutorial-co-manage-client

Question #6

You need to ensure that the support technicians can meet the technical requirement for the Montreal office mobile devices.

What is the minimum of dedicated support technicians required?

  • A . 1
  • B . 4
  • C . 7
  • D . 31

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

References: https://docs.microsoft.com/en-us/sccm/mdm/deploy-use/enroll-devices-with-device-enrollment-manager

Question #7

HOTSPOT

As of March, how long will the computers in each office remain supported by Microsoft? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

https://support.microsoft.com/en-gb/help/13853/windows-lifecycle-fact-sheet March Feature

Updates: Serviced for 18 months from release date September Feature Updates: Serviced for 30 months from release date

References: https://www.windowscentral.com/whats-difference-between-quality-updates-and-feature-updates-windows-10


Question #8

You need to meet the compliance requirements for the Windows 10 devices.

What should you create from the Intune admin center?

  • A . a device compliance policy
  • B . a device configuration profile
  • C . an application policy
  • D . an app configuration policy

Reveal Solution Hide Solution

Correct Answer: D
Question #9

You need to create the Microsoft Store for Business.

Which user can create the store?

  • A . User2
  • B . User3
  • C . User4
  • D . User5

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

References: https://docs.microsoft.com/en-us/microsoft-store/roles-and-permissions-microsoft-store-for-business

Question #10

HOTSPOT

You need to configure a conditional access policy to meet the compliance requirements.

You add Exchange Online as a cloud app.

Which two additional settings should you configure in Policy1? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

References: https://docs.microsoft.com/en-us/intune/create-conditional-access-intune


Question #11

HOTSPOT

You need to meet the technical requirements and planned changes for Intune.

What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:


Question #12

On which server should you use the Defender for identity sensor?

  • A . Server1
  • B . Server2
  • C . Server3
  • D . Server4
  • E . Servers5

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

However, if the case study had required that the DCs can’t have any s/w installed, then the answer would have been a standalone sensor on Server2. In this scenario, the given answer is correct. BTW, ATP now known as Defender for Identity.

Question #12

On which server should you use the Defender for identity sensor?

  • A . Server1
  • B . Server2
  • C . Server3
  • D . Server4
  • E . Servers5

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

However, if the case study had required that the DCs can’t have any s/w installed, then the answer would have been a standalone sensor on Server2. In this scenario, the given answer is correct. BTW, ATP now known as Defender for Identity.

Question #14

You need to meet the technical requirement for large-volume document retrieval.

What should you create?

  • A . a data loss prevention (DLP) policy from the Security & Compliance admin center
  • B . an alert policy from the Security & Compliance admin center
  • C . a file policy from Microsoft Cloud App Security
  • D . an activity policy from Microsoft Cloud App Security

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

References: https://docs.microsoft.com/en-us/office365/securitycompliance/activity-policies-and-alerts

Question #15

You need to meet the technical requirement for the EU PII data.

What should you create?

  • A . a retention policy from the Security & Compliance admin center.
  • B . a retention policy from the Exchange admin center
  • C . a data loss prevention (DLP) policy from the Exchange admin center
  • D . a data loss prevention (DLP) policy from the Security & Compliance admin center

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

References: https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies

EU PII wants both documents and email message to be preserved so S&C Admin Center for Retention. If this was for Email only, this probably could have been done in EAC.

Question #16

HOTSPOT

You need to meet the technical requirement for the SharePoint administrator.

What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

References: https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-compliance#step-3-filter-the-search-results


Question #17

Which report should the New York office auditors view?

  • A . DLP policy matches
  • B . DLP false positives and overrides
  • C . DLP incidents
  • D . Top Senders and Recipients

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

References: https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-

policies

This report also shows policy matches over time, like the policy matches report. However, the policy matches report shows matches at a rule level; for example, if an email matched three different rules, the policy matches report shows three different line items. By contrast, the incidents report shows matches at an item level; for example, if an email matched three different rules, the incidents report shows a single line item for that piece of content. Because the report counts are aggregated differently, the policy matches report is better for identifying matches with specific rules and fine tuning DLP policies. The incidents report is better for identifying specific pieces of content that are problematic for your DLP policies.

Question #18

You need to protect the U.S. PII data to meet the technical requirements.

What should you create?

  • A . a data loss prevention (DLP) policy that contains a domain exception
  • B . a Security & Compliance retention policy that detects content containing sensitive data
  • C . a Security & Compliance alert policy that contains an activity
  • D . a data loss prevention (DLP) policy that contains a user override

Reveal Solution Hide Solution

Correct Answer: A
Question #19

HOTSPOT

You need to meet the technical requirement for log analysis.

What is the minimum number of data sources and log collectors you should create from Microsoft Cloud App Security? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

References: https://docs.microsoft.com/en-us/cloud-app-security/discovery-docker


Question #20

DRAG DROP

You need to meet the requirement for the legal department.

Which three actions should you perform in sequence from the Security & Compliance admin center? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

References: https://www.sherweb.com/blog/ediscovery-office-365/


Question #21

Topic 3, Litware Inc.

Case Study

This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.

To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study.

At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section.

To start the case study

To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. If the case study has an All Information tab, note that the information displayed is identical to the information displayed on the subsequent tabs. When you are ready to answer a question, click the Question button to return to the question.

Overview

General Overviews

Litware, Inc. is a technology research company. The company has a main office in Montreal and a branch office in Seattle.

Environment

Existing Environment

The network contains an on-premises Active Directory domain named litware.com.

The domain contains the users shown in the following table.

Microsoft Cloud Environment

Litware has a Microsoft 365 subscription that contains a verified domain named litware.com. The subscription syncs to the on-premises domain.

Litware uses Microsoft Intune for device management and has the enrolled devices shown in the following table.

Litware.com contains the security groups shown in the following table.

Litware uses Microsoft SharePoint Online and Microsoft Teams for collaboration.

The verified domain is linked to an Azure Active Directory (Azure AD) tenant named litware.com. Audit log search is turned on for the litware.com tenant.

Problem Statements

Litware identifies the following issues:

✑ Users open email attachments that contain malicious content.

✑ Devices without an assigned compliance policy show a status of Compliant.

✑ User1 reports that the Sensitivity option in Microsoft Office for the web fails to appear.

✑ Internal product codes and confidential supplier ID numbers are often shared during Microsoft Teams meetings and chat sessions that include guest users and external users.

Requirements

Planned Changes

Litware plans to implement the following changes:

✑ Implement device configuration profiles that will configure the endpoint protection template settings for supported devices.

✑ Configure information governance for Microsoft OneDrive, SharePoint Online, and Microsoft Teams.

✑ Implement data loss prevention (DLP) policies to protect confidential information.

✑ Grant User2 permissions to review the audit logs of he litware.com tenant.

✑ Deploy new devices to the Seattle office as shown in the following table.

✑ Implement a notification system for when DLP policies are triggered.

✑ Configure a Safe Attachments policy for the litware.com tenant.

Technical Requirements

Litware identifies the following technical requirements:

✑ Retention settings must be applied automatically to all the data stored in SharePoint Online sites, OneDrive accounts, and Microsoft Teams channel messages, and the data must be retained for five years.

✑ Emails messages that contain attachments must be delivered immediately, and placeholder must be provided for the attachments until scanning is complete.

✑ All the Windows 10 devices in the Seattle office must be enrolled in Intune automatically when the devices are joined to or registered with Azure AD.

✑ Devices without an assigned compliance policy must show a status of Not Compliant in the Microsoft Endpoint Manager admin center.

A notification must appear in the Microsoft 365 compliance center when a DLP policy is triggered.

User2 must be granted the permissions to review audit logs for the following activities:

– Admin activities in Microsoft Exchange Online

– Admin activities in SharePoint Online

– Admin activities in Azure AD

Users must be able to apply sensitivity labels to documents by using Office for the web.

Windows Autopilot must be used for device provisioning, whenever possible.

A DLP policy must be created to meet the following requirements:

– Confidential information must not be shared in Microsoft Teams chat sessions, meetings, or channel messages.

– Messages that contain internal product codes or supplier ID numbers must be blocked and deleted.

The principle of least privilege must be used.

HOTSPOT

You need to ensure that User2 can review the audit logs. The solutions must meet the technical requirements.

To which role group should you add User2, and what should you use? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

Graphical user interface, text

Description automatically generated


Question #22

You need to create the DLP policy to meet the technical requirements.

What should you configure first?

  • A . sensitive info types
  • B . the Insider risk management settings
  • C . the event types
  • D . the sensitivity labels

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/create-test-tune-dlp-policy?view=o365-worldwide

Question #23

HOTSPOT

You need to configure automatic enrollment in Intune. The solution must meet the technical requirements.

What should you configure, and to which group should you assign the configurations? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

Text

Description automatically generated with medium confidence


Question #24

HOTSPOT

You plan to implement the endpoint protection device configuration profiles to support the planned changes.

You need to identify which devices will be supported, and how many profiles you should implement.

What should you identify? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

Table

Description automatically generated


Question #25

You need to create the Safe Attachments policy to meet the technical requirements.

Which option should you select?

  • A . Replace
  • B . Enable redirect
  • C . Block
  • D . Dynamic Delivery

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-365/security/office-365-security/safe-attachments.md

Question #26

You need to configure the compliance settings to meet the technical requirements.

What should you do in the Microsoft Endpoint Manager admin center?

  • A . From Compliance policies, modify the Notifications settings.
  • B . From Locations, create a new location for noncompliant devices.
  • C . From Retire Noncompliant Devices, select Clear All Devices Retire State.
  • D . Modify the Compliance policy settings.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://docs.microsoft.com/en-us/mem/intune/protect/device-compliance-get-started

Question #27

You need to configure Office on the web to meet the technical requirements.

What should you do?

  • A . Assign the Global reader role to User1.
  • B . Enable sensitivity labels for Office files in SharePoint Online and OneDrive.
  • C . Configure an auto-labeling policy to apply the sensitivity labels.
  • D . Assign the Office apps admin role to User1.

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels-sharepoint-onedrive-files?view=o365-worldwide

Question #28

You create the planned DLP policies.

You need to configure notifications to meet the technical requirements.

What should you do?

  • A . From the Microsoft 365 security center, configure an alert policy.
  • B . From the Microsoft Endpoint Manager admin center, configure a custom notification.
  • C . From the Microsoft 365 admin center, configure a Briefing email.
  • D . From the Microsoft 365 compliance center, configure the Endpoint DLP settings.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-configure-view-alerts-policies?view=o365-worldwide

Question #29

Topic 4, Misc. Questions

HOTSPOT

You have a new Microsoft 365 subscription.

A user named User1 has a mailbox in Microsoft Exchange Online.

You need to log any changes to the mailbox folder permissions of User1.

Which command should you run? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

To enable auditing for a single mailbox (in this example, belonging to Holly Sharp), use this PowerShell command: Set-Mailbox username -AuditEnabled $true

References:

https://support.microsoft.com/en-us/help/4026501/office-auditing-in-office-365-for-admins

https://docs.microsoft.com/en-us/powershell/module/exchange/mailboxes/set-mailbox?view=exchange-ps


Question #30

HOTSPOT

You have three devices enrolled in Microsoft Intune as shown in the following table.

The device compliance policies in Intune are configured as shown in the following table.

The device compliance policies have the assignments shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:


Question #31

You have a Microsoft Azure Active Directory (Azure AD) tenant named Contoso.com.

You create a Microsoft Defender for identity instance Contoso.

The tenant contains the users shown in the following table.

You need to modify the configuration of the Defender for identify sensors.

Solutions: You instruct User3 to modify the Defender for identity sensor configuration.

Does this meet the goal?

  • A . Yes
  • B . No

Reveal Solution Hide Solution

Correct Answer: A
Question #32

You have a Microsoft 365 subscription

All users are assigned a Microsoft 365 E3 License.

You enable auditing for your organization.

What is the maximum amount of time data will be retained in the Microsoft 365 audit log?

  • A . 2 years
  • B . 1 year
  • C . 30 days
  • D . 90 days

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

References: https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-compliance

Question #33

You have a Microsoft 365 E5 tenant that contains the devices shown in the following table.

You plan to review device startup performance issues by using Endpoint analytics.

Which devices can you monitor by using Endpoint analytics?

  • A . Device1 only
  • B . Device1 and Device2 only
  • C . Device1, Device2, and Device3 only
  • D . Device1, Device2, and Device4 only
  • E . Device1, Device2, Device3, and Device4

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://docs.microsoft.com/en-us/mem/analytics/overview

Question #34

HOTSPOT

You have an Azure subscription and an on-premises Active Directory domain. The domain contains 50

computers that run Windows 10.

You need to centrally monitor System log events from the computers.

What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:


Question #35

HOTSPOT

The SP800 assessment has the improvement actions shown in the following table.

Reveal Solution Hide Solution

Correct Answer:


Question #36

HOTSPOT

You have a Microsoft 365 E5 tenant that contains the users shown in the following table.

You purchase the devices shown in the following table.

In Microsoft Endpoint Manager, you create an enrollment status page profile that has the following settings:

✑ Show app and profile configuration progress: Yes

✑ Allow users to collect logs about installation errors: Yes

✑ Only show page to devices provisioned by out-of-box experience (OOBE): No

✑ Assignments: Group2

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

Graphical user interface, text, application, email

Description automatically generated


Question #37

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are deploying Microsoft Intune.

You successfully enroll Windows 10 devices in Intune.

When you try to enroll an iOS device in Intune, you get an error.

You need to ensure that you can enroll the iOS device in Intune.

Solution: You create the Mobility (MDM and MAM) settings.

Does this meet the goal?

  • A . Yes
  • B . No

Reveal Solution Hide Solution

Correct Answer: B
Question #38

You purchase a new computer that has Windows 10, version 2004 preinstalled.

You need to ensure that the computer is up-to-date. The solution must minimize the number of updates installed.

What should you do on the computer?

  • A . Install all the feature updates released since version 2004 and all the quality updates released since version 2004 only.
  • B . install the West feature update and the latest quality update only.
  • C . install all the feature updates released since version 2004 and the latest quality update only.
  • D . install the latest feature update and all the quality updates released since version 2004.

Reveal Solution Hide Solution

Correct Answer: B
Question #39

You have a Microsoft 365 E5 subscription that uses an Azure Active Directory (Azure AD) tenant named contoso.com.

You need to ensure that users can enroll devices in Microsoft Endpoint Manager without manually entering the address of Microsoft Endpoint Manager.

Which two DNS records should you create? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

  • A . a CNAME record for AutoDiscover.contoso.com
  • B . a CNAME record for EnterpriseEnrollment.contoso.com
  • C . a TXT record for EnterpriseRegistration.contoso.com
  • D . an SRV record for _SIP._TLS.contoso.com
  • E . an SRV record for _SIPfederationTLS.contoso.com
  • F . a CNAME record for EnterpriseRegistration.contoso.com
  • G . a TXT record for EnterpriseEnrollment.contoso.com

Reveal Solution Hide Solution

Correct Answer: B,F
Question #40

You have a Microsoft 365 E5 subscription.

You run an eDiscovery search that returns the following Azure Rights Management (Azure RMS) C encrypted content:

✑ Microsoft Exchange emails

✑ Microsoft OneDrive documents

✑ Microsoft SharePoint documents

Which content can be decrypted when you export the eDiscovery search results?

  • A . Exchange emails only
  • B . SharePoint documents, OneDrive documents, and Exchange emails
  • C . OneDrive documents only
  • D . SharePoint documents and OneDrive documents only
  • E . SharePoint documents only

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/export-search-results?view=o365-worldwide

Question #41

Your company uses on-premises Windows Server File Classification Infrastructure (FCI).

Some documents on the on-premises file servers are classified as Confidential.

You migrate the files from the on-premises file servers to Microsoft SharePoint Online.

You need to ensure that you can implement data loss prevention (DLP) policies for the uploaded file based on the Confidential classification.

What should you do first?

  • A . From the SharePoint admin center, configure hybrid search.
  • B . From the SharePoint admin center, create a managed property.
  • C . From the Security & Compliance Center PowerShell, run the New-DataClassification cmdlet.
  • D . From the Security & Compliance Center PowerShell, run the New-DlpComplianceRule cmdlet.

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

References: https://docs.microsoft.com/en-us/microsoft-365/compliance/protect-documents-that-have-fci-or-other-properties#before-you-create-the-dlp-policy

Question #42

HOTSPOT

You configure a data loss prevention (DLP) policy named DLP1 as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

Using a retention label in a policy is only supported for items in SharePoint Online and OneDrive for Business.


Question #43

HOTSPOT

You have a Microsoft 365 E5 subscription that contains two users named Admin1 and Admin2.

All users are assigned a Microsoft 365 Enterprise E5 license and auditing is turned on.

You create the audit retention policy shown in the exhibit. (Click the Exhibit tab.)

After Policy1 is created, the following actions are performed:

✑ Admin1 creates a user named User1.

✑ Admin2 creates a user named User2.

How long will the audit events for the creation of User1 and User2 be retained? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:


Question #44

HOTSPOT

You plan to allow users from the engineering department to enroll their mobile device in mobile device management (MDM).

The device type restrictions are configured as shown in the following table.

The device limit restrictions are configured as shown in the following table.

What is the effective configuration for the members of the Engineering group? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:


Question #45

You have a Microsoft 365 tenant.

Company policy requires that all Windows 10 devices meet the following minimum requirements:

✑ Require complex passwords.

✑ Require the encryption of data storage devices.

✑ Have Microsoft Defender Antivirus real-time protection enabled.

You need to prevent devices that do not meet the requirements from accessing resources in the tenant.

Which two components should you create? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

  • A . a configuration policy
  • B . a compliance policy
  • C . a security baseline profile
  • D . a conditional access policy
  • E . a configuration profile

Reveal Solution Hide Solution

Correct Answer: B,D
B,D

Explanation:

Reference: https://docs.microsoft.com/en-us/mem/intune/protect/device-compliance-get-started

Question #46

You have a Microsoft 365 tenant that contains 1,000 Windows 10 devices. The devices are enrolled in Microsoft Intune.

Company policy requires that the devices have the following configurations:

✑ Require complex passwords.

✑ Require the encryption of removable data storage devices.

✑ Have Microsoft Defender Antivirus real-time protection enabled.

You need to configure the devices to meet the requirements.

What should you use?

  • A . an app configuration policy
  • B . a compliance policy
    C a security baseline profile
    D a conditional access policy

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://docs.microsoft.com/en-us/mem/intune/protect/device-compliance-get-started

Question #47

HOTSPOT

You have three devices enrolled in Microsoft Intune as shown in the following table.

The device compliance policies in Intune are configured as shown in the following table.

The device compliance policies have the assignments shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:


Question #48

You configure a conditional access policy.

The locations settings are configured as shown in the Locations exhibit. (Click the Locations tab.)

The users and groups settings are configured as shown in the Users and Groups exhibit. (Click Users and Groups tab.)

Members of the Security reader group report that they cannot sign in to Microsoft Active Directory (Azure AD) on their device while they are in the office.

You need to ensure that the members of the Security reader group can sign in in to Azure AD on their device while they are in the office. The solution must use the principle of least privilege.

What should you do?

  • A . From the conditional access policy, configure the device state.
  • B . From the Azure Active Directory admin center, create a custom control.
  • C . From the Intune admin center, create a device compliance policy.
  • D . From the Azure Active Directory admin center, create a named location.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

References: https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition

Question #49

HOTSPOT

You have a Microsoft Azure Activity Directory (Azure AD) tenant contains the users shown in the following table.

Group3 is a member of Group1.

Your company uses Windows Defender Advanced Threat Protection (ATP).

Windows Defender ATP contains the roles shown in the following table.

Windows Defender ATP contains the device groups shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:


Question #50

HOTSPOT

You have a Microsoft 365 E5 subscription that contains the devices shown in the following table.

All the devices are onboarded To Microsoft Defender for Endpoint

You plan to use Microsoft Defender Vulnerability Management to meet the following requirements:

• Detect operating system vulnerabilities.

Reveal Solution Hide Solution

Correct Answer:


Question #51

HOTSPOT

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

In Microsoft Endpoint Manager, you have the Policies for Office apps settings shown in the following table.

The policies use the settings shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

Graphical user interface, text, application

Description automatically generated


Question #52

HOTSPOT

You have a Microsoft 365 subscription.

You are configuring permissions for Security & Compliance.

You need to ensure that the users can perform the tasks shown in the following table.

The solution must use the principle of least privilege.

To which role should you assign each user? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

References: https://docs.microsoft.com/en-us/office365/securitycompliance/permissions-in-the-security-and-compliance-center#mapping-of-role-groups-to-assigned-roles


Question #53

DRAG DROP

Your network contains an on-premises Active Directory domain that syncs to Azure Active Directory (Azure AD).

The domain contains the servers shown in the following table.

You use Azure Information Protection.

You need to ensure that you can apply Azure Information Protection labels to the file stores on Server1.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Reveal Solution Hide Solution

Correct Answer:


Question #54

You have a Microsoft 365 F5 subscription.

You plan to deploy 100 new Windows 10 devices.

You need to order the appropriate version of Windows 10 for the new devices. The version must

Meet the following requirements.

Be serviced for a minimum of 24 moths.

Support Microsoft Application Virtualization (App-V)

Which version should you identify?

  • A . Window 10 Pro, version 1909
  • B . Window 10 Pro, version 2004
  • C . Window 10 Pro, version 1909
  • D . Window 10 Enterprise, version 2004

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference:

https://docs.microsoft.com/en-us/windows/release-health/release-information

https://docs.microsoft.com/en-us/windows/application-management/app-v/appv-supported-configurations

Question #55

You have a Microsoft 365 subscription.

From the Security & Compliance admin center, you create a content search of a mailbox.

You need to view the content of the mail messages found by the search as quickly as possible.

What should you select from the Content search settings?

  • A . Export report
  • B . Export results
  • C . Re-run
  • D . View results

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

There is no ‘View Results” option. You can preview results but that will only show up to 100 emails. To guarantee you’re getting all results, you’ll need to export them to a PST file.

References: https://docs.microsoft.com/en-us/microsoft-365/compliance/limits-for-content-search

Question #56

HOTSPOT

You have a Microsoft 365 subscription that contains all the user data.

You plan to create the retention policy shown in the Locations exhibit. (Click the Locations tab.)

You configure the Advanced retention settings as shown in the Retention exhibit. (Click the Retention tab.)

The locations specified in the policy include the groups shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

No, Yes, No

References: https://community.spiceworks.com/topic/2150016-can-you-apply-a-retention-policy-to-users-within-a-group-on-o365

Distribution lists and mail-enabled security groups will be expanded so the policy will apply to all the mailboxes in the group. Only the mailboxes that are currently members of these groups will be covered by the policy. Mailboxes added to these groups later won’t be covered, but ones that are removed later will still be covered.


Question #57

You have a Microsoft 365 E5 tenant.

You plan to deploy 1.000 new iOS devices to users. The devices will be shipped directly from the supplier to the users.

You need to recommend a Microsoft Intune enrollment option that meets the following requirements:

• Minimizes user interaction

• Minimizes administrative effort

• Automatically installs corporate apps

What should you recommend?

  • A . Automated Device Enrollment (ADE)
  • B . bring your own device (BYOD) user and device enrollment
  • C . Apple Configurator enrollment

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://docs.microsoft.com/en-us/mem/intune/enrollment/ios-enroll

Question #58

You have a Microsoft 365 E5 tenant that contains four devices enrolled in Microsoft Intune as shown in the following table.

You plan to deploy Microsoft 365 Apps for enterprise by using Microsoft Endpoint Manager.

To which devices can you deploy Microsoft 365 Apps for enterprise?

  • A . Device1 only
  • B . Device1 and Device3 only
  • C . Device2 and Device4 only
  • D . Device1, Device2. and Device3 only
  • E . Device1, Device2, Device3, and Device4

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://docs.microsoft.com/en-us/mem/intune/apps/apps-add

Question #59

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals- Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are deploying Microsoft Intune.

You successfully enroll Windows 10 devices in Intune.

When you try to enroll an iOS device in Intune, you get an error.

You need to ensure that you can enroll the iOS device in Intuen.

Solution: You create an Apple Configurator enrollment profile.

Does this meet the goal?

  • A . Yes
  • B . No

Reveal Solution Hide Solution

Correct Answer: B
Question #60

You have a Microsoft 365 E5 tenant.

Users store data in the following locations:

✑ Microsoft Teams

✑ Microsoft OneDrive

✑ Microsoft Exchange Online

✑ Microsoft SharePoint Online

You need to retain Microsoft 365 data for two years.

What is the minimum number of retention policies that you should create?

  • A . 1
  • B . 2
  • C . 3
  • D . 4

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/create-retention-policies?view=o365-worldwide

Question #61

HOTSPOT

You have a Microsoft 365 E5 subscription that uses Microsoft Intune.

You have devices enrolled in Intune as shown in the following table.

You create the device configuration profiles shown in the following table.

Which profiles will be applied to each device? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

Graphical user interface, text, application, table

Description automatically generated


Question #62

You have a Microsoft 365 subscription.

From the Security & Compliance admin center, you create a content search of all the mailboxes that contain the word Project X.

You need to export the results of the content search.

What do you need to download the report?

  • A . a certification authority (CA) certificate
  • B . an export key
  • C . a password
  • D . a user certificate

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

References: https://docs.microsoft.com/en-us/office365/securitycompliance/export-search-results

Question #63

In Microsoft 365, you configure a data loss prevention (DLP) policy named Policy1. Policy1 detects the sharing of United States (US) bank account numbers in email messages and attachments.

Policy1 is configured as shown in the exhibit. (Click the Exhibit tab.)

You need to ensure that internal users can email documents that contain US bank account numbers to external users who have an email suffix of contoso.com.

What should you configure?

  • A . an action
  • B . a group
  • C . an exception
  • D . a condition

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Editing Policy settings > +New Rule > Exceptions We won’t apply this rule to content that matches any of these exceptions. > +Add an exception > [Dropdownbox] Except if the recipient domain is. —————————– Except if recipient domain is Detects when content is sent in an email message to the recipient domains you specify.

Question #64

You have a Microsoft 365 E5 subscription that has Microsoft Defender for Endpoint integrated with Microsoft Endpoint Manager.

Devices are onboarded by using Microsoft Defender for Endpoint.

You plan to block devices based on the results of the machine risk score calculated by Microsoft Defender for Endpoint.

What should you create first?

  • A . a device configuration policy
  • B . a device compliance policy
  • C . a conditional access policy
  • D . an endpoint detection and response policy

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://docs.microsoft.com/en-us/mem/intune/protect/advanced-threat-protection-configure

Question #65

You have Windows 10 devices that are managed by using Microsoft Endpoint Manager.

You need to configure the security settings in Microsoft Edge.

What should you create in Microsoft Endpoint Manager?

  • A . an app configuration policy
  • B . an app
  • C . a device configuration profile
  • D . a device compliance policy

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://docs.microsoft.com/en-us/deployedge/configure-edge-with-intune

Question #66

HOTSPOT

You have a Microsoft 365 tenant that contains devices enrolled in Microsoft Intune.

The devices are configured as shown in the following table.

You plan to perform the following device management tasks in Microsoft Endpoint Manager:

✑ Deploy a VPN connection by using a VPN device configuration profile.

✑ Configure security settings by using an Endpoint Protection device configuration profile.

You support the management tasks.

What should you identify? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

Graphical user interface, application

Description automatically generated


Question #67

You have a Microsoft 36S subscription.

Your company purchases a new financial application named App1.

From Cloud Discovery in Microsoft Cloud App Security, you view the Discovered apps page and discover that many applications have a low score because they are missing information about domain registration and consumer popularity.

You need to prevent the missing information from affecting the App1 score.

What should you configure from the Cloud Discover settings?

  • A . Organization details
  • B . Default behavior
  • C . Score metrics
  • D . App tags

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

https://docs.microsoft.com/en-us/cloud-app-security/discovered-app-queries

Question #68

You have a Microsoft 365 E5 tenant.

You plan to deploy a monitoring solution that meets the following requirements:

✑ Captures Microsoft Teams channel messages that contain threatening or violent language.

✑ Alerts a reviewer when a threatening or violent message is identified.

What should you include in the solution?

  • A . Data Subject Requests (DSRs)
  • B . Insider risk management policies
  • C . Communication compliance policies
  • D . Audit log retention policies

Reveal Solution Hide Solution

Correct Answer: C
Question #69

HOTSPOT

You have a Microsoft 365 E5 tenant.

You have a sensitivity label configured as shown in the Sensitivity label exhibit. (Click the Sensitivity label tab.)

You have an auto-labeling policy as shown in the Auto-labeling policy exhibit. (Click the Auto-labeling policy tab.)

A user sends an email that contains the components shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

Graphical user interface, text, application

Description automatically generated


Question #70

HOTSPOT

You have 2,500 Windows 10 devices and a Microsoft 365 E5 tenant that contains two users named User1 and User2. The devices are not enrollment in Microsoft Intune.

In Microsoft Endpoint Manager, the Device limit restrictions are configured as shown in the following exhibit.

In Azure Active Directory (Azure AD), the Device settings are configured as shown in the following exhibit.

From Microsoft Endpoint Manager, you add User2 as a device enrollment manager (DEM).

For each of the following statement, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:


Question #71

HOTSPOT

Your company has a Microsoft 365 subscription that uses an Azure Directory (Azure AD0 tenant named Contoso.com.

The tenant contains the users shown in the following table.

You create a relation label named Label1 that has the following configurations:

Retains content for five years.

Automatically deletes all content that is older than five years.

You turn on Auto labeling for Label1 b using a policy named Policy1.

Policy1 has the following configurations:

• Retains content for five years

• Automatically deletes all content that is older than five years

You turn on Auto labeling for Label 1 by using a policy named Policy1.

Policy has the following configurations:

• Applies to content that contains the word Merger

• Specifies the OneDrive accounts and SharePoint sites locations

You run the following command

Set RetentionConpliancePolicy Policy1 RestrictiveRelention $true Force

For each of the following statements select Yes if the statement is true Otherwise, select No NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:


Question #72

Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named contoso.com. The tenant contains computers that run Windows 10 Enterprise and are managed by using Microsoft Intune.

The computers are configured as shown in the following table.

You plan to implement Windows Defender Application Guard for contoso.com.

You need to identify on which two Windows 10 computers Windows Defender Application Guard can be installed.

Which two computers should you identify? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

  • A . Computer1
  • B . Computer3
  • C . Computer2
  • D . Computer4

Reveal Solution Hide Solution

Correct Answer: B,C
B,C

Explanation:

Reference: https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard

Question #73

HOTSPOT

You have a Microsoft 365 subscription that contains three groups named

All users, Sales team, and Office users, and two users shown in the following table.

In Microsoft Endpoint Manager, you have the Policies for Office apps settings shown in the following exhibit.

The policies use the settings shown in the following table.

What is the default share folder location for User1 and the default Office theme for User2? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

Table

Description automatically generated


Question #74

Your company has a Microsoft 365 subscription.

You need to identify which users performed the following privileged administration tasks:

• Deleted a folder from the second-stage Recycle Bin of Microsoft SharePoint

• Opened a mailbox of which the user was not the owner

• Reset a user password

What should you use?

  • A . Microsoft Azure Active Directory (Azure AD) audit logs
  • B . Security & Compliance content search
  • C . Microsoft Azure Active Directory (Azure AD) sign-ins
  • D . Security & Compliance audit log search

Reveal Solution Hide Solution

Correct Answer: D
Question #75

HOTSPOT

Your company uses Windows Defender Advanced Threat Protection (ATP).

Windows Defender ATP contains the device groups shown in the following table.

You onboard computers to Windows Defender ATP as shown in the following table.

Of which groups are Computer1 and Computer2 members? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:


Question #76

You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.

You need to provide a user with the ability to sign up for Microsoft Store for Business for contoso.com. The solution must use the principle of least privilege.

Which role should you assign to the user?

  • A . Cloud application administrator
  • B . Application administrator
  • C . Global administrator
  • D . Service administrator

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

References: https://docs.microsoft.com/en-us/microsoft-store/roles-and-permissions-microsoft-store-for-business

Question #77

You have a Microsoft 365 subscription that contains the alerts shown in the following table.

Which properties of the alerts can you modify?

  • A . Status only
  • B . Status and Comment only
  • C . Status and Severity only
  • D . Status, Severity, and Comment only
  • E . Status, Severity, Comment and Category

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/update-alert?view=o365-worldwide#limitations

Question #78

You have a Microsoft Azure Active Directory (Azure AD) tenant named Contoso.com.

You create a Microsoft Defender for identity instance Contoso.

The tenant contains the users shown in the following table.

You need to modify the configuration of the Defender for identify sensors.

Solutions: You instruct User1 to modify the Defender for identity sensor configuration.

Does this meet the goal?

  • A . Yes
  • B . No

Reveal Solution Hide Solution

Correct Answer: A
Question #79

HOTSPOT

You have several devices enrolled in Microsoft Endpoint Manager.

You have a Microsoft Azure Active Directory (Azure AD) tenant that includes the users shown in the following table.

The device type restrictions in Endpoint Manager are configured as shown in the following table.

Reveal Solution Hide Solution

Correct Answer:


Question #80

You have a Microsoft 365 E5 tenant.

You need to evaluate compliance with European Union privacy regulations for customer data.

What should you do in the Microsoft 365 compliance center?

  • A . Create a Data Subject Request (DSR)
  • B . Create a data loss prevention (DLP) policy for General Data Protection Regulation (GDPR) data
  • C . Create an assessment based on the EU GDPR assessment template
  • D . Create an assessment based on the Data Protection Baseline assessment template

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://docs.microsoft.com/en-us/compliance/regulatory/gdpr-action-plan

Question #81

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are connected to your on-premises network.

Solution: From the Endpoint Management admin center, you create a device configuration profile.

Does this meet the goal?

  • A . Yes
  • B . No

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

You need to create a trusted location and a conditional access policy.

Question #82

You have a Microsoft 365 subscription.

Some users have iPads that are managed by your company.

You plan to prevent the ipad users from copying corporate data in Microsoft Word and pasting the data into other applications.

What should you create?

  • A . an app configuration policy
  • B . a compliance policy
  • C . a Conditional MOMS policy
  • D . an app protection policy

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

References: https://docs.microsoft.com/en-us/intune/app-protection-policy

Question #83

You have a Microsoft 365 subscription that contains an Azure Active Directory (Azure AD) tenant named contoso.com.

The tenant contains the users shown in the following table.

You create and assign a data loss prevention (DLP) policy named Policy1. Policy1 is configured to prevent documents that contain Personally Identifiable Information (PII) from being emailed to users outside your organization.

To which users can User1 send documents that contain PII?

  • A . User2 only
  • B . User2 and User3 only
  • C . User2, User3, and User4 only
  • D . User2, User3, User4, and User5

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Guest accounts are considered “outside your organization”. Users who have non-guest accounts in a host organization’s Active Directory or Azure Active Directory tenant are considered as people inside the organization.

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-policies?view=o365-worldwide

Question #84

You have a Microsoft 365 E5 subscription.

You create an account tor a new security administrator named SecAdmin1.

You need to ensure that SecAdmin1 can manage Microsoft Defender for Office 365 settings and policies for Microsoft Teams, SharePoint and OneDrive.

Solution: From the Azure Active Directory admin center, you assign SecAdmin1 the Teams Administrator role.

Does this meet the goal?

  • A . Yes
  • B . no

Reveal Solution Hide Solution

Correct Answer: B
Question #85

HOTSPOT

You have a Microsoft 365 E5 subscription that includes the following active eDiscovery case:

✑ Name: Case1

✑ Included content: Group1, User1, Site1

✑ Hold location: Exchange mailboxes, SharePoint sites, Exchange public folders

The investigation for Case1 completes, and you close the case.

What occurs after you close Case1? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:

Explanation:

Graphical user interface, text, application

Description automatically generated


Question #86

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.

You create an Azure Advanced Threat Protection (ATP) workspace named Workspace1.

The tenant contains the users shown in the following table.

You need to modify the configuration of the Azure ATP sensors.

Solution: You instruct User4 to modify the Azure ATP sensor configuration.

Does this meet the goal?

  • A . Yes
  • B . No

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Only Azure ATP administrators can modify the sensors.

Any global administrator or security administrator on the tenant’s Azure Active Directory is automatically an Azure ATP administrator.

References: https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-role-groups

Question #87

You have a Microsoft 365 E5 tenant that contains the devices shown in the following table.

You plan to implement attack surface reduction (ASR) rules.

Which devices will support the ASR rules?

  • A . Device 1, Device2, and Device3 only
  • B . Device3 only
  • C . Device2 and Device3 only
  • D . Device1, Device2, Devices and Device4

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/enable-attack-surface-reduction?view=o365-worldwide#requirements

Question #88

You have a Microsoft 365 tenant that contains two groups named Group1 and Group2.

You need to prevent the members or Group1 from communicating with the members of Group2 by using Microsoft Teams. The solution must comply with regulatory requirements and must not affect other user in the tenant.

What should you use?

  • A . information barriers
  • B . communication compliance policies
  • C . moderated distribution groups
  • D . administrator units in Azure Active Directory (Azure AD)

Reveal Solution Hide Solution

Correct Answer: A
Question #89

HOTSPOT

You have 100 computers that run Windows 8.1 and are enrolled in Upgrade Readiness.

Two of the computers are configured as shown in the following table.

From Upgrade Readiness, you view the applications shown in the following table.

You enroll a computer named Computer3 in Upgrade Readiness.

Computer3 has the following configurations:

✑ 8 GB of memory

✑ 64-bit architecture

✑ An application named App3 installed

App3 is installed on Computer3 only.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:


Question #90

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are deploying Microsoft Intune.

You successfully enroll Windows 10 devices in Intune.

When you try to enroll an iOS device in Intune, you get an error.

You need to ensure that you can enroll the iOS device in Intune.

Solution: You add your user account as a device enrollment manager.

Does this meet the goal?

  • A . Yes
  • B . No

Reveal Solution Hide Solution

Correct Answer: B

Question #91

HOTSPOT

You have an Azure Active Directory (Azure AD) tenant that contains two users named User1 and User2.

On September 5, 2019, you create and enforce a terms of use (ToU) in the tenant.

The ToU has the following settings:

✑ Name: Terms1

✑ Display name: Terms1 name

✑ Require users to expand the terms of use: Off

✑ Require users to consent on every device: Off

✑ Expire consents: On

✑ Expire starting on: October 10, 2019

✑ Frequency: Monthly

User1 accepts Terms1 on September 5, 2019. User2 accepts Terms1 on October 5, 2019.

When will Terms1 expire for the first time for each user? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:


Question #92

You have a Microsoft 365 E5 subscription.

You need to identify which users accessed Microsoft Office 365 from anonymous IP addresses during the last seven days.

What should you do?

  • A . From the Cloud App Security admin center, select Users and accounts.
  • B . From the Microsoft 365 security center, view the Threat tracker.
  • C . From the Microsoft 365 admin center, view the Security & compliance report.
  • D . From the Azure Active Directory admin center, view the Risky sign-ins report.

Reveal Solution Hide Solution

Correct Answer: A
Question #93

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure pilot co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: You add Device1 to an Active Directory group.

Does this meet the goal?

  • A . Yes
  • B . No

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

References: https://www.scconfigmgr.com/2017/11/30/how-to-setup-co-management-part-6/

Question #94

You have a Microsoft 365 subscription.

You need to be notified if users receive email containing a file that has a virus.

What should you do?

  • A . From the Exchange admin center, create an in-place eDiscovery & hold.
  • B . From the Security & Compliance admin center, create a data governance event.
  • C . From the Exchange admin center, create an anti-malware policy.
  • D . From the Security & Compliance admin center, create a safe attachments policy.

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-atp-safe-attachments-policies

Question #95

You enable the Azure AD Identity Protection weekly digest email.

You create the users shown in the following table.

Which users will receive the weekly digest email automatically?

  • A . Admin2, Admin3, and Admin4 only
  • B . Admin1, Admin2, Admin3, and Admin4
  • C . Admin2 and Admin3 only
  • D . Admin3 only
  • E . Admin1 and Admin3 only

Reveal Solution Hide Solution

Correct Answer: E
E

Explanation:

By default, all Global Admins receive the email. Any newly created Global Admins, Security Readers or Security Administrators will automatically be added to the recipients list.

Question #96

You have a Microsoft 365 tenant.

You discover that administrative tasks are unavailable in the Microsoft Office 365 audit logs of the tenant.

You run the Get-AdminAuditLog Config cmdlet and receive the following output:

You need to ensure that administrative tasks are logged in the Office 365 audit logs.

Which attribute should you modify?

  • A . TestCmdletLoggingEnabled
  • B . UnifiedAuditLogIngestionEnabled
  • C . AdminAuditLogEnabled

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

References: https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-audit/set-adminauditlogconfig?view=exchange-ps

Question #97

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals- Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You discover that some external users accessed content on a Microsoft SharePoint site.

You modify the SharePoint sharing policy to prevent sharing outside your organization.

You need to be notified if the SharePoint sharing policy is modified in the future.

Solution: From the Security & Compliance admin center, you create a threat management policy.

Does this meet the goal?

  • A . Yes
  • B . No

Reveal Solution Hide Solution

Correct Answer: B
Question #98

HOTSPOT

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.

You need to create a policy that will generate an email alert when a banned app is detected requesting permission to access user information or data in the subscription.

What should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:


Question #99

HOTSPOT

You have several devices enrolled in Microsoft Intune.

You have a Microsoft Azure Active Directory (Azure AD) tenant that includes the users shown in the following table.

The device type restrictions in Intune are configured as shown in the following table.

You add User3 as a device enrollment manager in Intune.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution

Correct Answer:


Question #100

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 subscription.

From the Security & Compliance admin center, you create a role group named US eDiscovery Managers by copying the eDiscovery Manager role group.

You need to ensure that the users in the new role group can only perform content searches of mailbox content for users in the United States.

Solution: From the Security & Compliance admin center, you modify the roles of the US eDiscovery Managers role group.

Does this meet the goal?

  • A . Yes
  • B . No

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version