Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

MS-102 Exam Dumps - Microsoft 365 Administrator

Question # 4

You need to configure the information governance settings to meet the technical requirements.

Which type of policy should you configure, and how many policies should you configure? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 5

You need to ensure that User2 can review the audit logs. The solutions must meet the technical requirements.

To which role group should you add User2, and what should you use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 6

You plan to implement the endpoint protection device configuration profiles to support the planned changes.

You need to identify which devices will be supported, and how many profiles you should implement.

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 7

You need to create the DLP policy to meet the technical requirements.

What should you configure first?

A.

sensitive info types

B.

the Insider risk management settings

C.

the event types

D.

the sensitivity labels

Full Access
Question # 8

You need to configure Office on the web to meet the technical requirements.

What should you do?

A.

Assign the Global reader role to User1.

B.

Enable sensitivity labels for Office files in SharePoint Online and OneDrive.

C.

Configure an auto-labeling policy to apply the sensitivity labels.

D.

Assign the Office apps admin role to User1.

Full Access
Question # 9

You have a Microsoft 365 tenant.

You plan to manage incidents in the tenant by using the Microsoft 365 security center.

Which Microsoft service source will appear on the Incidents page of the Microsoft 365 security center?

A.

Microsoft Defender for CloudUse the

B.

Microsoft Purview

C.

Azure Arc

D.

Microsoft Defender for Identity

Full Access
Question # 10

You need to configure automatic enrollment in Intune. The solution must meet the technical requirements.

What should you configure, and to which group should you assign the configurations? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 11

HOTSPOT

You have a new Microsoft 365 E5 tenant.

Enable Security defaults is set to Yes.

A user signs in to the tenant for the first time.

Which multi-factor authentication (MFA) method can the user use, and how many days does the user have to register for MFA? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 12

You have a Microsoft 365 E5 tenant that contains two users named User1 and User2 and the groups shown in the following table.

You have a Microsoft Intune enrollment policy that has the following settings:

  • MDM user scope: Some
  • uk.co.certification.simulator.questionpool.PList@1abf3e60
  • MAM user scope: Some
  • uk.co.certification.simulator.questionpool.PList@19b7acb0

You purchase the devices shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 13

You have a Microsoft 365 E5 subscription.

Conditional Access is configured to block high-risk sign-ins for all users.

All users are in France and are registered for multi-factor authentication (MFA).

Users in the media department will travel to various countries during the next month.

You need to ensure that if the media department users are blocked from signing in while traveling, the users can remediate the issue without administrator intervention.

What should you configure?

A.

an exclusion group

B.

the MFA registration policy

C.

named locations

D.

self-service password reset (SSPR)

Full Access
Question # 14

You use Microsoft Defender for Endpoint.

You have the Microsoft Defender for Endpoint device groups shown in the following table

You plan to onboard computers to Microsoft Defender for Endpoint as shown in the following table.

Full Access
Question # 15

HOTSPOT

You have an Azure AD tenant named contoso.com that contains the users shown in the following table.

Multi-factor authentication (MFA) is configured to use 131.107.5.0/24 as trusted IPs.

The tenant contains the named locations shown in the following table.

You create a conditional access policy that has the following configurations:

  • Users or workload identities assignments: All users
  • Cloud apps or actions assignment: App1
  • Conditions: Include all trusted locations
  • Grant access: Require multi-factor authentication

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 16

HOTSPOT

You have a Microsoft 365 E5 subscription.

You need to implement identity protection. The solution must meet the following requirements:

  • Identify when a user's credentials are compromised and shared on the dark web.
  • Provide users that have compromised credentials with the ability to self-remediate.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 17

You have a Microsoft 365 E5 tenant that contains 100 Windows 10 devices.

You plan to attack surface reduction (ASR) rules for the Windows 10 devices.

You configure the ASR rules in audit mode and collect audit data in a Log Analytics workspace.

You need to find the ASR rules that match the activities on the devices.

How should you complete the Kusto query? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 18

You have a Microsoft 365 ES subscription.

From the Microsoft 365 Defender portal, you review your company's Microsoft Secure Score.

You discover a large number of recommended actions.

You need to ensure that the actions can be filtered based on specific department names.

What should you create first?

A.

a dynamic security group

B.

a tag

C.

an administrative unit

D.

a custom detection rule

Full Access
Question # 19

You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1.

You need to automatically label the documents on Site1 that contain credit card numbers.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Full Access
Question # 20

You have a Microsoft 365 subscription that contains a user named User1.

You need to ensure that User1 can search the Microsoft 365 audit logs from the Security & Compliance admin

center.

Which role should you assign to User1?

A.

View-Only Audit Logs in the Security & Compliance admin center

B.

View-Only Audit Logs in the Exchange admin center

C.

Security reader in the Azure Active Directory admin center

D.

Security Reader in the Security & Compliance admin center

Full Access
Question # 21

You have a Microsoft 365 E5 tenant that connects to Microsoft Defender for Endpoint.

You have devices enrolled in Microsoft Intune as shown in the following table.

You plan to use risk levels in Microsoft Defender for Endpoint to identify whether a device is compliant. Noncompliant devices must be blocked from accessing corporate resources.

You need to identify which devices can be onboarded to Microsoft Defender for Endpoint, and which Endpoint security policies must be configured.

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 22

You have a Microsoft 365 E5 subscription that contains the following user:

  • Name: User1
  • UPN: user1@contoso.com
  • Email address: user1@marketmg.contoso.com
  • MFA enrollment status: Disabled

When User1 attempts to sign in to Outlook on the web by using the user1@marketing.contoso.com email address, the user cannot sign in.

You need to ensure that User1 can sign in to Outlook on the web by using user1@marketing.contoso.com.

What should you do?

A.

Assign an MFA registration policy to User1.

B.

Reset the password of User1.

C.

Add an alternate email address for User1.

D.

Modify the UPN of User1.

Full Access
Question # 23

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an on-premises Active Directory domain. The domain contains domain controllers that run Windows Server 2019. The functional level of the forest and the domain is Windows Server 2012 R2.

The domain contains 100 computers that run Windows 10 and a member server named Server1 that runs Windows Server 2012 R2.

You plan to use Server1 to manage the domain and to configure Windows 10 Group Policy settings.

You install the Group Policy Management Console (GPMC) on Server1.

You need to configure the Windows Update for Business Group Policy settings on Server1.

Solution: You copy the Group Policy Administrative Templates from a Windows 10 computer to Server1.

Does this meet the goal?

A.

yes

B.

No

Full Access
Question # 24

You need to configure Azure AD Connect to support the planned changes for the Montreal Users and Seattle Users OUs.

What should you do?

A.

From the Microsoft Azure AD Connect wizard, select Customize synchronization options.

B.

From PowerShell, run the Add-ADSyncConnectorAttnbuteinclusion cmdlet.

C.

From PowerShell, run the start-ADSyncSyncCycle cmdlet.

D.

From the Microsoft Azure AD Connect wizard, select Manage federation.

Full Access
Question # 25

You need to configure the Office 365 service status notifications and limit access to the service and feature updates. The solution must meet the technical requirements.

What should you configure in the Microsoft 365 admin center? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 26

You need to configure just in time access to meet the technical requirements.

What should you use?

A.

entitlement management

B.

Azure AD Privileged Identity Management (PIM)

C.

access reviews

D.

Azure AD Identity Protection

Full Access
Question # 27

You are evaluating the use of multi-factor authentication (MFA).

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 28

You have a new Microsoft 365 E5 tenant.

You need to enable an alert policy that will be triggered when an elevation of Microsoft Exchange Online administrative privileges is detected.

What should you do first?

A.

Enable auditing.

B.

Enable Microsoft 365 usage analytics.

C.

Create an Insider risk management policy.

D.

Create a communication compliance policy.

Full Access
Question # 29

You need to ensure that the Microsoft 365 incidents and advisories are reviewed monthly.

Which users can review the incidents and advisories, and which blade should the users use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 30

You need to ensure that Admin4 can use SSPR.

Which tool should you use. and which action should you perform? To answer, select the appropriate options m the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 31

Which report should the New York office auditors view?

A.

DLP policy matches

B.

DLP false positives and overrides

C.

DLP incidents

D.

Top Senders and Recipients

Full Access
Question # 32

You need to recommend a solution for the security administrator. The solution must meet the technical requirements.

What should you include in the recommendation?

A.

Microsoft Azure Active Directory (Azure AD) Privileged Identity Management

B.

Microsoft Azure Active Directory (Azure AD) Identity Protection

C.

Microsoft Azure Active Directory (Azure AD) conditional access policies

D.

Microsoft Azure Active Directory (Azure AD) authentication methods

Full Access
Question # 33

You need to meet the technical requirement for log analysis.

What is the minimum number of data sources and log collectors you should create from Microsoft Cloud App Security? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 34

You need to meet the technical requirement for the EU PII data.

What should you create?

A.

a retention policy from the Security & Compliance admin center.

B.

a retention policy from the Exchange admin center

C.

a data loss prevention (DLP) policy from the Exchange admin center

D.

a data loss prevention (DLP) policy from the Security & Compliance admin center

Full Access
Question # 35

You need to ensure that User1 can enroll the devices to meet the technical requirements. What should you do?

A.

From the Azure Active Directory admin center, assign User1 the Cloud device administrator rote.

B.

From the Azure Active Directory admin center, configure the Maximum number of devices per user setting.

C.

From the Intune admin center, add User1 as a device enrollment manager.

D.

From the Intune admin center, configure the Enrollment restrictions.

Full Access
Question # 36

You need to ensure that the support technicians can meet the technical requirement for the Montreal office mobile devices.

What is the minimum of dedicated support technicians required?

A.

1

B.

4

C.

7

D.

31

Full Access
Question # 37

You need to meet the technical requirement for the SharePoint administrator. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Full Access
Question # 38

You need to create the Microsoft Store for Business. Which user can create the store?

A.

User2

B.

User3

C.

User4

D.

User5

Full Access
Question # 39

On which server should you install the Azure ATP sensor?

A.

Server 1

B.

Server 2

C.

Server 3

D.

Server 4

E.

Server 5

Full Access
Question # 40

You need to meet the compliance requirements for the Windows 10 devices.

What should you create from the Intune admin center?

A.

a device compliance policy

B.

a device configuration profile

C.

an application policy

D.

an app configuration policy

Full Access
Question # 41

You need to meet the technical requirements and planned changes for Intune.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 42

You need to meet the Intune requirements for the Windows 10 devices.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 43

You need to configure a conditional access policy to meet the compliance requirements.

You add Exchange Online as a cloud app.

Which two additional settings should you configure in Policy1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 44

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure a pilot for co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: Define a Configuration Manager device collection as the pilot collection. Add Device1 to the collection.

Does this meet the goal?

A.

Yes

B.

NO

Full Access
Question # 45

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure a pilot for co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: You create a device configuration profile from the Device Management admin center.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 46

On which server should you use the Defender for identity sensor?

A.

Server1

B.

Server2

C.

Server3

D.

Server4

E.

Servers5

Full Access
Question # 47

As of March, how long will the computers in each office remain supported by Microsoft? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 48

You are evaluating the required processes for Project1.

You need to recommend which DNS record must be created while adding a domain name for the project.

Which DNS record should you recommend?

A.

host (A)

B.

host information

C.

text (TXT)

D.

alias (CNAME)

Full Access
Question # 49

Which role should you assign to User1?

Available Choices (select all choices that are correct)

A.

Hygiene Management

B.

Security Reader

C.

Security Administrator

D.

Records Management

Full Access
Question # 50

HOTSPOT

You create the Microsoft 365 tenant.

You implement Azure AD Connect as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

Full Access
Question # 51

You need to ensure that all the sales department users can authenticate successfully during Project1 and Project2.

Which authentication strategy should you implement for the pilot projects?

A.

pass-through authentication

B.

pass-through authentication and seamless SSO

C.

password hash synchronization and seamless SSO

D.

password hash synchronization

Full Access