Microsoft 365 Administrator (beta) v1.0 (MS-102)

Page:    1 / 19   
Total 274 questions

HOTSPOT -
You have a Microsoft 365 E5 subscription.
From Azure AD Privileged Identity Management (PIM), you configure Role settings for the Global Administrator role as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.



Answer :

HOTSPOT -
You have a Microsoft 365 subscription.
A user named [email protected] was recently provisioned.
You need to use PowerShell to assign a Microsoft Office 365 E3 license to User1. Microsoft Bookings must NOT be enabled.
How should you complete the command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.



Answer :

You have a Microsoft E5 subscription.
You need to ensure that administrators who need to manage Microsoft Exchange Online are assigned the Exchange Administrator role for five hours at a time.
What should you implement?

  • A. Azure AD Privileged Identity Management (PIM)
  • B. a conditional access policy
  • C. a communication compliance policy
  • D. Azure AD Identity Protection
  • E. groups that have dynamic membership


Answer : A

You have a Microsoft 365 subscription.
You suspect that several Microsoft Office 365 applications or services were recently updated.
You need to identify which applications or services were recently updated.
What are two possible ways to achieve the goal? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

  • A. From the Microsoft 365 admin center, review the Service health blade.
  • B. From the Microsoft 365 admin center, review the Message center blade.
  • C. From the Microsoft 365 admin center, review the Products blade.
  • D. From the Microsoft 365 Admin mobile app, review the messages.


Answer : BD

You have a Microsoft 365 subscription that contains the domains shown in the following exhibit.

Which domain name suffixes can you use when you create users?

  • A. only Sub1.contoso221018.onmicrosoft.com
  • B. onlycontoso221018.onmicrosoft.com and Sub2.contoso221018.onmicrosoft.com
  • C. only contoso221018.onmicrosoft.com, Sub.contoso221018.onmicrosoft.com, and Sub2.contoso221018.onmicrosoft.com
  • D. all the domains in the subscription


Answer : B

You have a Microsoft 365 subscription.
You plan to implement Microsoft Purview Privileged Access Management.
Which Microsoft Office 365 workloads support privileged access?

  • A. Microsoft Exchange Online only
  • B. Microsoft Teams only
  • C. Microsoft Exchange Online and SharePoint Online only
  • D. Microsoft Teams and SharePoint Online only
  • E. Microsoft Teams, Exchange Online, and SharePoint Online


Answer : A

HOTSPOT -
You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

You plan to provide User4 with early access to Microsoft 365 feature and service updates.
You need to identify which Microsoft 365 setting must be configured, and which user can modify the setting. The solution must use the principle of least privilege.
What should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.



Answer :

HOTSPOT -
You have a Microsoft 365 subscription.
You are planning a threat management solution for your organization.
You need to minimize the likelihood that users will be affected by the following threats:
Opening files in Microsoft SharePoint that contain malicious content
Impersonation and spoofing attacks in email messages
Which policies should you create in Microsoft 365 Defender? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.



Answer :

HOTSPOT -
You have a Microsoft 365 E5 tenant.
You have the alerts shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.



Answer :

You have a Microsoft 365 E3 subscription that uses Microsoft Defender for Endpoint Plan 1.
Which two Defender for Endpoint features are available to the subscription? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

  • A. advanced hunting
  • B. security reports
  • C. digital certificate assessment
  • D. device discovery
  • E. attack surface reduction (ASR)


Answer : BE

You are reviewing alerts in the Microsoft 365 Defender portal.
How long are the alerts retained in the portal?

  • A. 30 days
  • B. 60 days
  • C. 3 months
  • D. 6 months
  • E. 12 months


Answer : C

You have a Microsoft 365 E5 subscription.
From the Microsoft 365 Defender portal, you plan to export a detailed report of compromised users.
What is the longest time range that can be included in the report?

  • A. 1 day
  • B. 7 days
  • C. 30 days
  • D. 90 days


Answer : C

HOTSPOT -
You have a Microsoft 365 subscription.
You deploy the anti-phishing policy shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.



Answer :

HOTSPOT -
You use Microsoft Defender for Endpoint.
You have the Microsoft Defender for Endpoint device groups shown in the following table.

You plan to onboard computers to Microsoft Defender for Endpoint as shown in the following table.

To which device group will each computer be added? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.



Answer :

DRAG DROP -
You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365.
You need to configure policies to meet the following requirements:
Customize the common attachments filter.
Enable impersonation protection for sender domains.
Which type of policy should you configure for each requirement? To answer, drag the appropriate policy types to the correct requirements. Each policy type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.



Answer :

Page:    1 / 19   
Total 274 questions