Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Microsoft > Microsoft 365 Certified: Enterprise Administrator Expert > MS-102

MS-102 Microsoft 365 Administrator Exam Question and Answers

Question # 4

You need to meet the requirement for the legal department.

Which three actions should you perform in sequence from the Security & Compliance admin center? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Full Access
Question # 5

You need to ensure that the support technicians can meet the technical requirement for the Montreal office mobile devices.

What is the minimum of dedicated support technicians required?

A.

1

B.

4

C.

7

D.

31

Full Access
Question # 6

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure a pilot for co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: Define a Configuration Manager device collection as the pilot collection. Add Device1 to the collection.

Does this meet the goal?

A.

Yes

B.

NO

Full Access
Question # 7

You need to create the Microsoft Store for Business. Which user can create the store?

A.

User2

B.

User3

C.

User4

D.

User5

Full Access
Question # 8

You need to meet the Intune requirements for the Windows 10 devices.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 9

You need to meet the technical requirement for the SharePoint administrator. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Full Access
Question # 10

You need to protect the U.S. PII data to meet the technical requirements.

What should you create?

A.

a data loss prevention (DLP) policy that contains a domain exception

B.

a Security & Compliance retention policy that detects content containing sensitive data

C.

a Security & Compliance alert policy that contains an activity

D.

a data loss prevention (DLP) policy that contains a user override

Full Access
Question # 11

You need to meet the technical requirement for the EU PII data.

What should you create?

A.

a retention policy from the Security & Compliance admin center.

B.

a retention policy from the Exchange admin center

C.

a data loss prevention (DLP) policy from the Exchange admin center

D.

a data loss prevention (DLP) policy from the Security & Compliance admin center

Full Access
Question # 12

You need to meet the technical requirement for log analysis.

What is the minimum number of data sources and log collectors you should create from Microsoft Cloud App Security? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 13

Which report should the New York office auditors view?

A.

DLP policy matches

B.

DLP false positives and overrides

C.

DLP incidents

D.

Top Senders and Recipients

Full Access
Question # 14

You need to create the Safe Attachments policy to meet the technical requirements.

Which option should you select?

A.

Replace

B.

Enable redirect

C.

Block

D.

Dynamic Delivery

Full Access
Question # 15

You need to ensure that the Microsoft 365 incidents and advisories are reviewed monthly.

Which users can review the incidents and advisories, and which blade should the users use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 16

You need to ensure that User2 can review the audit logs. The solutions must meet the technical requirements.

To which role group should you add User2, and what should you use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 17

You need to create the DLP policy to meet the technical requirements.

What should you configure first?

A.

sensitive info types

B.

the Insider risk management settings

C.

the event types

D.

the sensitivity labels

Full Access
Question # 18

You need to configure the information governance settings to meet the technical requirements.

Which type of policy should you configure, and how many policies should you configure? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 19

You need to configure a conditional access policy to meet the compliance requirements.

You add Exchange Online as a cloud app.

Which two additional settings should you configure in Policy1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 20

As of March, how long will the computers in each office remain supported by Microsoft? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 21

You need to meet the technical requirement for large-volume document retrieval. What should you create?

A.

a data loss prevention (DLP) policy from the Security & Compliance admin center

B.

an alert policy from the Security & Compliance admin center

C.

a file policy from Microsoft Cloud App Security

D.

an activity policy from Microsoft Cloud App Security

Full Access
Question # 22

You need to configure the compliance settings to meet the technical requirements.

What should you do in the Microsoft Endpoint Manager admin center?

A.

From Compliance policies, modify the Notifications settings.

B.

From Locations, create a new location for noncompliant devices.

C.

From Retire Noncompliant Devices, select Clear All Devices Retire State.

D.

Modify the Compliance policy settings.

Full Access
Question # 23

You are evaluating the use of multi-factor authentication (MFA).

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 24

You need to meet the technical requirements and planned changes for Intune.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 25

You need to ensure that User1 can enroll the devices to meet the technical requirements. What should you do?

A.

From the Azure Active Directory admin center, assign User1 the Cloud device administrator rote.

B.

From the Azure Active Directory admin center, configure the Maximum number of devices per user setting.

C.

From the Intune admin center, add User1 as a device enrollment manager.

D.

From the Intune admin center, configure the Enrollment restrictions.

Full Access
Question # 26

On which server should you use the Defender for identity sensor?

A.

Server1

B.

Server2

C.

Server3

D.

Server4

E.

Servers5

Full Access
Question # 27

You need to configure Azure AD Connect to support the planned changes for the Montreal Users and Seattle Users OUs.

What should you do?

A.

From the Microsoft Azure AD Connect wizard, select Customize synchronization options.

B.

From PowerShell, run the Add-ADSyncConnectorAttnbuteinclusion cmdlet.

C.

From PowerShell, run the start-ADSyncSyncCycle cmdlet.

D.

From the Microsoft Azure AD Connect wizard, select Manage federation.

Full Access
Question # 28

You need to meet the compliance requirements for the Windows 10 devices.

What should you create from the Intune admin center?

A.

a device compliance policy

B.

a device configuration profile

C.

an application policy

D.

an app configuration policy

Full Access
Question # 29

You need to configure just in time access to meet the technical requirements.

What should you use?

A.

entitlement management

B.

Azure AD Privileged Identity Management (PIM)

C.

access reviews

D.

Azure AD Identity Protection

Full Access
Question # 30

You need to ensure that Admin4 can use SSPR.

Which tool should you use. and which action should you perform? To answer, select the appropriate options m the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 31

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure a pilot for co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: You create a device configuration profile from the Device Management admin center.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 32

On which server should you install the Azure ATP sensor?

A.

Server 1

B.

Server 2

C.

Server 3

D.

Server 4

E.

Server 5

Full Access
Question # 33

You need to configure the Office 365 service status notifications and limit access to the service and feature updates. The solution must meet the technical requirements.

What should you configure in the Microsoft 365 admin center? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 34

You need to configure Office on the web to meet the technical requirements.

What should you do?

A.

Assign the Global reader role to User1.

B.

Enable sensitivity labels for Office files in SharePoint Online and OneDrive.

C.

Configure an auto-labeling policy to apply the sensitivity labels.

D.

Assign the Office apps admin role to User1.

Full Access
Question # 35

You need to configure automatic enrollment in Intune. The solution must meet the technical requirements.

What should you configure, and to which group should you assign the configurations? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 36

You plan to implement the endpoint protection device configuration profiles to support the planned changes.

You need to identify which devices will be supported, and how many profiles you should implement.

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 37

You create the planned DLP policies.

You need to configure notifications to meet the technical requirements.

What should you do?

A.

From the Microsoft 365 security center, configure an alert policy.

B.

From the Microsoft Endpoint Manager admin center, configure a custom notification.

C.

From the Microsoft 365 admin center, configure a Briefing email.

D.

From the Microsoft 365 compliance center, configure the Endpoint DLP settings.

Full Access
Question # 38

You have a Microsoft 365 E5 subscription that contains Windows 11 devices. All the devices are onboarded to Microsoft Defender for Endpoint.

You need to compare the configuration of the devices against industry standard benchmarks. What should you use?

A.

Events

B.

Initiatives

C.

Attack surface map

D.

Security baselines assessment

Full Access
Question # 39

HOTSPOT

Your network contains an on-premises Active Directory forest named contoso.com. The forest contains the following domains:

Contoso.com

East.contoso.com

The forest contains the users shown in the following table.

The forest syncs to an Azure AD tenant named contoso.com as shown in the exhibit. (Click the Exhibit tab.)

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 40

You have an Azure Active Directory (Azure AD) tenant that contains a user named User1.

Your company purchases a Microsoft 365 subscription.

You need to ensure that User1 is assigned the required role to create file policies and manage alerts in the Cloud App Security admin center.

Solution: From the Azure Active Directory admin center, you assign the Compliance administrator role to User1.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 41

Your network contains an Active Directory forest.

You deploy Microsoft 365.

You plan to implement directory synchronization.

You need to recommend a security solution for the synchronized identities. The solution must meet the following requirements:

• Users must be able to authenticate successfully to Microsoft 365 services if Active Directory becomes unavailable.

• User passwords must be 10 characters or more.

Solution: Implement pass-through authentication and configure Microsoft Entra Password protection. Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 42

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goats. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 E5 subscription.

You create an account for a new security administrator named SecAdmin1.

You need to ensure that SecAdmin1 can manage Microsoft Defender for Office 365 settings and policies for Microsoft Teams, SharePoint. and OneDrive.

Solution: From the Microsoft 365 admin center, you assign SecAdmin1 the SharePoint Administrator role.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 43

: 226 HOTSPOT

You have a Microsoft 365 subscription that contains a Microsoft SharePoint Online site named Site1. Site1 has he files in the following table.

The Site1 users are assigned the roles shown in the following table.

You create a data less prevention (DLP) policy names Policy1 as shown in the following exhibit.

How many files will be visible to user1 and User2 after Policy' is applied to answer, selected select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 44

You have three devices enrolled in Microsoft Endpoint Manager as shown in the following table.

The device compliance policies in Endpoint Manager are configured as shown in the following table.

The device compliance policies have the assignments shown in the following table.

For each of the following statements, select Yes if the statement Is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 45

You have a Microsoft 365 E5 subscription that contains two Microsoft SharePoint Online sites named Site1 and Site2.

You have the documents shown in the following table.

You DLP1 that has the advanced DLP rule as shown in the exhibit. (Click the Exhibit tab.)

You apply DLP1 to Site1.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 46

You have a Microsoft 365 E5 subscription that contains two security groups named Group1 and Group2. You need to recommend an authentication solution that meets the following requirements:

• Members of Group1 must be able to authenticate by using a hardware token.

• Members of Group2 must be able to authenticate by using a public key infrastructure (PKI).

Which authentication method should you recommend for each group? To answer, drag the appropriate methods to the correct groups. Each method may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Full Access
Question # 47

You have a Microsoft 365 E5 tenant that contains the devices shown in the following table.

You plan to review device startup performance issues by using Endpoint analytics.

Which devices can you monitor by using Endpoint analytics?

A.

Device1 only

B.

Device1 and Device2 only

C.

Device1, Device2, and Device3 only

D.

Device1, Device2, and Device4 only

E.

Device1, Device2, Device3, and Device4

Full Access
Question # 48

: 219 DRAG DROP

You have a Microsoft 365 subscription.

In the Exchange admin center, you have a data loss prevention (DLP) policy named Policy1 that has the following configurations:

Block emails that contain financial data.

Display the following policy tip text: Message blocked.

From the Security & Compliance admin center, you create a DLP policy named Policy2 that has the following configurations:

Use the following location: Exchange email.

Display the following policy tip text: Message contains sensitive data.

When a user sends an email, notify the user if the email contains health records.

What is the result of the DLP policies when the user sends an email? To answer, drag the appropriate results to the correct scenarios. Each result may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Full Access
Question # 49

: 232

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 E5 subscription.

You create an account for a new security administrator named SecAdmin1.

You need to ensure that SecAdmin1 can manage Office 365 Advanced Threat Protection (ATP) settings and policies for Microsoft Teams, SharePoint, and OneDrive.

Solution: From the Azure Active Directory admin center, you assign SecAdmin1 the Security administrator role.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 50

Your company has a Microsoft 365 subscription.

You need to identify all the users in the subscription who are licensed for Office 365 through a group membership. The solution must include the name of the group used to assign the license.

What should you use?

A.

Active users in the Microsoft 365 admin center

B.

Reports in Microsoft Purview compliance portal

C.

the Licenses blade in the Microsoft Entra admin center

D.

Reports in the Microsoft 365 admin center

Full Access
Question # 51

You have a Microsoft 365 E5 subscription.

Users access Microsoft 365 from both their laptop and a corporate Virtual Desktop Infrastructure (VDI) solution.

From Azure AD Identity Protection, you enable a sign-in risk policy.

Users report that when they use the VDI solution, they are regularly blocked when they attempt to access Microsoft 365.

What should you configure?

A.

the Tenant restrictions settings in Azure AD

B.

a trusted location

C.

a Conditional Access policy exclusion

D.

the Microsoft 365 network connectivity settings

Full Access
Question # 52

You are evaluating the required processes for Project1.

You need to recommend which DNS record must be created while adding a domain name for the project.

Which DNS record should you recommend?

A.

host (A)

B.

host information

C.

text (TXT)

D.

alias (CNAME)

Full Access
Question # 53

HOTSPOT

You create the Microsoft 365 tenant.

You implement Azure AD Connect as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

Full Access
Question # 54

Which role should you assign to User1?

Available Choices (select all choices that are correct)

A.

Hygiene Management

B.

Security Reader

C.

Security Administrator

D.

Records Management

Full Access
Question # 55

You have a Microsoft 365 E5 tenant.

The Microsoft Secure Score for the tenant is shown in the following exhibit.

You plan to enable Security defaults for Azure Active Directory (Azure AD).

Which three improvement actions will this affect?

A.

Require MFA for administrative roles.

B.

Ensure all users can complete multi-factor authentication for secure access

C.

Enable policy to block legacy authentication

D.

Enable self-service password reset

E.

Use limited administrative roles

Full Access
Question # 56

You have a Microsoft 365 E5 subscription.

You create a Conditional Access policy that blocks access to an app named App1 when users trigger a high-risk sign-in event.

You need to reduce false positives for impossible travel when the users sign in from the corporate network.

What should you configure?

A.

exclusion groups

B.

multi-factor authentication (MFA)

C.

named locations

D.

user risk policies

Full Access
Question # 57

You have a Microsoft 365 E5 subscription. You are implementing Microsoft Defender for Cloud Apps. You need to ensure that you can create OAuth app policies.

Solution: You add an API token to Defender for Cloud Apps.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 58

You plan to use Azure Sentinel and Microsoft Cloud App Security. You need to connect Cloud App Security to Azure Sentinel.

What should you do in the Cloud App Security admin center?

A.

From Automatic log upload, add a log collector.

B.

From Automatic log upload, add a data source.

C.

From Connected apps, add an app connector.

D.

From Security extension, add a SIEM agent.

Full Access
Question # 59

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

You configure a Multifactor authentication registration policy that has the following settings:

• Assignments:

* Include: Group1

* Exclude: Group2

• Controls: Requite Microsoft Entra ID multifactor authentication registration

• Policy enforcement: Enabled

You create a conditional access policy that has the following settings:

• Name: Policy1

• Assignments:

* Include: Group1

* Exclude; Group1

• Grant: Require multifactor authentication

• Enable policy. On

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each coned selection is one point.

Full Access
Question # 60

You have a Microsoft 365 E5 subscription.

You need to be alerted when Microsoft 365 Defender detects high-severity incidents.

What should you use?

A.

a custom detection rule

B.

a threat policy

C.

an alert policy

D.

a notification rule

Full Access
Question # 61

HOTSPOT

You have a Microsoft 365 E5 subscription.

You need to implement identity protection. The solution must meet the following requirements:

Identify when a user's credentials are compromised and shared on the dark web.

Provide users that have compromised credentials with the ability to self-remediate.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 62

You purchase a new computer that has Windows 10, version 2004 preinstalled.

You need to ensure that the computer is up-to-date. The solution must minimize the number of updates installed.

What should you do on the computer?

A.

Install all the feature updates released since version 2004 and all the quality updates released since version 2004 only.

B.

install the West feature update and the latest quality update only.

C.

install all the feature updates released since version 2004 and the latest quality update only.

D.

install the latest feature update and all the quality updates released since version 2004.

Full Access
Question # 63

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.

You need to be notified when a single user downloads more than 50 files during any 60-second period.

What should you configure?

A.

a session policy

B.

a file policy

C.

an activity policy

D.

an anomaly detection policy

Full Access
Question # 64

You have a Microsoft 365 E5 subscription that contains the groups shown in the following table.

Which groups can be members of Group1 and Group4? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 65

You have a Microsoft 365 E5 subscription.

You are creating a data loss prevention (DLP) policy applied to the locations as shown in the following exhibit.

Which condition can you use in the DIP rules of the policy?

A.

sensitive info types

B.

sensitivity labels

C.

content search queries

D.

keywords

Full Access
Question # 66

You have a hybrid deployment of Microsoft Entra that contains the users shown in the following table.

You need to identify which users can perform the following tasks:

• View sync errors in Microsoft Entra Connect Health.

• Configure Microsoft Entra Connect Health settings.

Which user should you identify for each task? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Full Access