Easter Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Microsoft > Microsoft 365 Certified: Enterprise Administrator Expert > MS-102

MS-102 Microsoft 365 Administrator Exam Question and Answers

Question # 4

You are evaluating the required processes for Project1.

You need to recommend which DNS record must be created while adding a domain name for the project.

Which DNS record should you recommend?

A.

host (A)

B.

host information

C.

text (TXT)

D.

alias (CNAME)

Full Access
Question # 5

You need to configure a conditional access policy to meet the compliance requirements.

You add Exchange Online as a cloud app.

Which two additional settings should you configure in Policy1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 6

You create the planned DLP policies.

You need to configure notifications to meet the technical requirements.

What should you do?

A.

From the Microsoft 365 security center, configure an alert policy.

B.

From the Microsoft Endpoint Manager admin center, configure a custom notification.

C.

From the Microsoft 365 admin center, configure a Briefing email.

D.

From the Microsoft 365 compliance center, configure the Endpoint DLP settings.

Full Access
Question # 7

You need to ensure that all the sales department users can authenticate successfully during Project1 and Project2.

Which authentication strategy should you implement for the pilot projects?

A.

pass-through authentication

B.

pass-through authentication and seamless SSO

C.

password hash synchronization and seamless SSO

D.

password hash synchronization

Full Access
Question # 8

You need to configure the compliance settings to meet the technical requirements.

What should you do in the Microsoft Endpoint Manager admin center?

A.

From Compliance policies, modify the Notifications settings.

B.

From Locations, create a new location for noncompliant devices.

C.

From Retire Noncompliant Devices, select Clear All Devices Retire State.

D.

Modify the Compliance policy settings.

Full Access
Question # 9

You need to configure Office on the web to meet the technical requirements.

What should you do?

A.

Assign the Global reader role to User1.

B.

Enable sensitivity labels for Office files in SharePoint Online and OneDrive.

C.

Configure an auto-labeling policy to apply the sensitivity labels.

D.

Assign the Office apps admin role to User1.

Full Access
Question # 10

You need to create the Safe Attachments policy to meet the technical requirements.

Which option should you select?

A.

Replace

B.

Enable redirect

C.

Block

D.

Dynamic Delivery

Full Access
Question # 11

You need to ensure that the Microsoft 365 incidents and advisories are reviewed monthly.

Which users can review the incidents and advisories, and which blade should the users use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 12

You need to configure Azure AD Connect to support the planned changes for the Montreal Users and Seattle Users OUs.

What should you do?

A.

From the Microsoft Azure AD Connect wizard, select Customize synchronization options.

B.

From PowerShell, run the Add-ADSyncConnectorAttnbuteinclusion cmdlet.

C.

From PowerShell, run the start-ADSyncSyncCycle cmdlet.

D.

From the Microsoft Azure AD Connect wizard, select Manage federation.

Full Access
Question # 13

You need to meet the compliance requirements for the Windows 10 devices.

What should you create from the Intune admin center?

A.

a device compliance policy

B.

a device configuration profile

C.

an application policy

D.

an app configuration policy

Full Access
Question # 14

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure a pilot for co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: Define a Configuration Manager device collection as the pilot collection. Add Device1 to the collection.

Does this meet the goal?

A.

Yes

B.

NO

Full Access
Question # 15

You need to ensure that User2 can review the audit logs. The solutions must meet the technical requirements.

To which role group should you add User2, and what should you use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 16

HOTSPOT

You create the Microsoft 365 tenant.

You implement Azure AD Connect as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

Full Access
Question # 17

Which role should you assign to User1?

Available Choices (select all choices that are correct)

A.

Hygiene Management

B.

Security Reader

C.

Security Administrator

D.

Records Management

Full Access
Question # 18

On which server should you install the Azure ATP sensor?

A.

Server 1

B.

Server 2

C.

Server 3

D.

Server 4

E.

Server 5

Full Access
Question # 19

On which server should you use the Defender for identity sensor?

A.

Server1

B.

Server2

C.

Server3

D.

Server4

E.

Servers5

Full Access
Question # 20

You have a Microsoft 365 E5 tenant.

You plan to deploy a monitoring solution that meets the following requirements:

    Captures Microsoft Teams channel messages that contain threatening or violent language.

    Alerts a reviewer when a threatening or violent message is identified.

What should you include in the solution?

A.

Data Subject Requests (DSRs)

B.

Insider risk management policies

C.

Communication compliance policies

D.

Audit log retention policies

Full Access
Question # 21

You need to configure just in time access to meet the technical requirements.

What should you use?

A.

entitlement management

B.

Azure AD Privileged Identity Management (PIM)

C.

access reviews

D.

Azure AD Identity Protection

Full Access
Question # 22

You need to ensure that Admin4 can use SSPR.

Which tool should you use. and which action should you perform? To answer, select the appropriate options m the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 23

You need to meet the Intune requirements for the Windows 10 devices.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 24

Which report should the New York office auditors view?

A.

DLP policy matches

B.

DLP false positives and overrides

C.

DLP incidents

D.

Top Senders and Recipients

Full Access
Question # 25

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure a pilot for co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: You create a device configuration profile from the Device Management admin center.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 26

You need to recommend a solution for the security administrator. The solution must meet the technical requirements.

What should you include in the recommendation?

A.

Microsoft Azure Active Directory (Azure AD) Privileged Identity Management

B.

Microsoft Azure Active Directory (Azure AD) Identity Protection

C.

Microsoft Azure Active Directory (Azure AD) conditional access policies

D.

Microsoft Azure Active Directory (Azure AD) authentication methods

Full Access
Question # 27

You need to ensure that the support technicians can meet the technical requirement for the Montreal office mobile devices.

What is the minimum of dedicated support technicians required?

A.

1

B.

4

C.

7

D.

31

Full Access
Question # 28

You need to meet the technical requirement for the EU PII data.

What should you create?

A.

a retention policy from the Security & Compliance admin center.

B.

a retention policy from the Exchange admin center

C.

a data loss prevention (DLP) policy from the Exchange admin center

D.

a data loss prevention (DLP) policy from the Security & Compliance admin center

Full Access
Question # 29

You need to meet the technical requirement for the SharePoint administrator. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Full Access
Question # 30

You need to create the Microsoft Store for Business. Which user can create the store?

A.

User2

B.

User3

C.

User4

D.

User5

Full Access
Question # 31

You need to meet the technical requirements and planned changes for Intune.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 32

You need to ensure that User1 can enroll the devices to meet the technical requirements. What should you do?

A.

From the Azure Active Directory admin center, assign User1 the Cloud device administrator rote.

B.

From the Azure Active Directory admin center, configure the Maximum number of devices per user setting.

C.

From the Intune admin center, add User1 as a device enrollment manager.

D.

From the Intune admin center, configure the Enrollment restrictions.

Full Access
Question # 33

You need to meet the technical requirement for large-volume document retrieval. What should you create?

A.

a data loss prevention (DLP) policy from the Security & Compliance admin center

B.

an alert policy from the Security & Compliance admin center

C.

a file policy from Microsoft Cloud App Security

D.

an activity policy from Microsoft Cloud App Security

Full Access
Question # 34

You need to protect the U.S. PII data to meet the technical requirements.

What should you create?

A.

a data loss prevention (DLP) policy that contains a domain exception

B.

a Security & Compliance retention policy that detects content containing sensitive data

C.

a Security & Compliance alert policy that contains an activity

D.

a data loss prevention (DLP) policy that contains a user override

Full Access
Question # 35

As of March, how long will the computers in each office remain supported by Microsoft? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 36

You need to meet the requirement for the legal department.

Which three actions should you perform in sequence from the Security & Compliance admin center? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Full Access
Question # 37

You have a Microsoft 365 E5 tenant.

The Microsoft Secure Score for the tenant is shown in the following exhibit.

You plan to enable Security defaults for Azure Active Directory (Azure AD).

Which three improvement actions will this affect?

A.

Require MFA for administrative roles.

B.

Ensure all users can complete multi-factor authentication for secure access

C.

Enable policy to block legacy authentication

D.

Enable self-service password reset

E.

Use limited administrative roles

Full Access
Question # 38

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer that runs Windows 10.

You need to verify which version of Windows 10 is installed.

Solution: From Device Manager, you view the computer properties.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 39

You use Microsoft Defender for Endpoint.

You have the Microsoft Defender for Endpoint device groups shown in the following table

You plan to onboard computers to Microsoft Defender for Endpoint as shown in the following table.

Full Access
Question # 40

You have a Microsoft 365 E5 tenant that contains four devices enrolled in Microsoft Intune as shown in the following table.

You plan to deploy Microsoft 365 Apps for enterprise by using Microsoft Endpoint Manager.

To which devices can you deploy Microsoft 365 Apps for enterprise?

A.

Device1 only

B.

Device1 and Device3 only

C.

Device2 and Device4 only

D.

Device1, Device2. and Device3 only

E.

Device1, Device2, Device3, and Device4

Full Access
Question # 41

Your on-premises network contains an Active Directory domain.

You have a Microsoft 365 subscription.

You need to sync the domain with the subscription. The solution must meet the following requirements:

• On-premises Active Directory password complexity policies must be enforced.

• Users must be able to use Microsoft Entra Self-Service Password Reset (SSPR).

What should you use?

A.

Microsoft Entra ID Protection

B.

Microsoft Entra Seamless Single Sign-On (Microsoft Entra Seamless SSO)

C.

pass-through authentication

D.

password hash synchronization

Full Access
Question # 42

You have an Azure AD tenant that contains the users shown in the following table

You need to compare the permissions of each role. The solution must minimize administrative effort.

Which portal should you use?

A.

the Microsoft Purview compliance portal

B.

the Microsoft 365 admin center

C.

the Microsoft 365 Defender portt1

D.

the Microsoft Entra admin center

Full Access
Question # 43

You need to meet the technical requirement for log analysis.

What is the minimum number of data sources and log collectors you should create from Microsoft Cloud App Security? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 44

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an on-premises Active Directory domain named contoso.com. The domain contains the users shown in the following table.

The domain syncs to an Azure AD tenant named contoso.com as shown in the exhibit. (Click the Exhibit tab.)

User2 fails to authenticate to Azure AD when signing in as user2@fabrikam.com.

You need to ensure that User2 can access the resources in Azure AD.

Solution: From the Microsoft Entra admin center, you add fabrikam.com as a custom domain. You instruct User2 to sign in as user2@fabrikam.com.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 45

You have an Azure AD tenant and a Microsoft 365 E5 subscription. The tenant contains the users shown in the following table.

You plan to implement Microsoft Defender for Endpoint.

You verify that role-based access control (RBAC) is turned on in Microsoft Defender for Endpoint.

You need to identify which user can view security incidents from the Microsoft 365 Defender portal.

Which user should you identify?

A.

User1

B.

User2

C.

User3

D.

User4

Full Access
Question # 46

HOTSPOT

You have a Microsoft 365 E3 subscription.

You plan to launch Attack simulation training for all users.

Which social engineering technique and training experience will be available? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 47

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 E5 subscription.

You create an account for a new security administrator named SecAdmin1.

You need to ensure that SecAdmin1 can manage Microsoft Defender for Office 365 settings and policies for Microsoft Teams, SharePoint, and OneDrive.

Solution: From the Microsoft 365 admin center, you assign SecAdmin1 the Exchange Administrator role.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 48

You have a Microsoft 365 E5 subscription and use Microsoft Defender for Cloud Apps. You need to create a file policy named Policy1 that meets the following requirements:

• Inspects files in connected software as a service (SaaS) apps

* Inspects protected files

Which two settings should you configure? To answer, select the appropriate settings in the answer area. NOTE: Each correct selection is worth one point.

Full Access
Question # 49

Your network contains an on-premises Active Directory domain named contoso.com.

For all user accounts, the Logon Hours settings are configured to prevent sign-ins outside of business hours.

You plan to sync contoso.com to an Azure AD tenant.

You need to recommend a solution to ensure that the logon hour restrictions apply when synced users sign in to Azure AD.

What should you include in the recommendation?

A.

pass-through authentication

B.

conditional access policies

C.

password synchronization

D.

Azure AD Identity Protection policies

Full Access
Question # 50

You have a Microsoft 365 E5 tenant.

Users store data in the following locations:

    Microsoft Teams

    Microsoft OneDrive

    Microsoft Exchange Online

    Microsoft SharePoint Online

You need to retain Microsoft 365 data for two years.

What is the minimum number of retention policies that you should create?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 51

Note: This section contains one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem. You must determine whether the solution meets the stated goals. More than one solution in the set might solve the problem. It is also possible that none of the solutions in the set solve the problem.

After you answer a question in this section, you will NOT be able to return. As a result, these questions do not appear on the Review Screen.

You have a Microsoft 365 E5 subscription and use Microsoft Defender for Office 365.

You need to implement a threat policy that will apply a balanced baseline protection profile to protect against spam, phishing, and malware.

Solution: You create a Strict preset security policy.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 52

: 240

You have a Microsoft 365 E5 tenant that contains the devices shown in the following table.

You plan to implement attack surface reduction (ASR) rules. Which devices will support the ASR rules?

A.

Device 1, Device2, and Device3 only

B.

Device3 only

C.

Device2 and Device3 only

D.

Device1, Device2, Devices and Device4

Full Access
Question # 53

You have a Microsoft 365 E5 subscription.

You need to recommend a solution for monitoring and reporting application access. The solution must meet the following requirements:

• Support KQL for querying data.

• Retain report data for at least one year.

What should you include in the recommendation?

A.

a security report in Microsoft 365 Defender

B.

End point analytics

C.

Microsoft 365 usage analytics

D.

Azure Monitor workbooks

Full Access
Question # 54

HOTSPOT

Your network contains an on-premises Active Directory forest named contoso.com. The forest contains the following domains:

    Contoso.com

    East.contoso.com

The forest contains the users shown in the following table.

The forest syncs to an Azure AD tenant named contoso.com as shown in the exhibit. (Click the Exhibit tab.)

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 55

You plan to implement the endpoint protection device configuration profiles to support the planned changes.

You need to identify which devices will be supported, and how many profiles you should implement.

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 56

You have a Microsoft 365 E5 subscription that contains the following user:

    Name: User1

    UPN: user1@contoso.com

    Email address: user1@marketmg.contoso.com

    MFA enrollment status: Disabled

When User1 attempts to sign in to Outlook on the web by using the user1@marketing.contoso.com email address, the user cannot sign in.

You need to ensure that User1 can sign in to Outlook on the web by using user1@marketing.contoso.com.

What should you do?

A.

Assign an MFA registration policy to User1.

B.

Reset the password of User1.

C.

Add an alternate email address for User1.

D.

Modify the UPN of User1.

Full Access
Question # 57

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an on-premises Active Directory domain. The domain contains domain controllers that run Windows Server 2019. The functional level of the forest and the domain is Windows Server 2012 R2.

The domain contains 100 computers that run Windows 10 and a member server named Server1 that runs Windows Server 2012 R2.

You plan to use Server1 to manage the domain and to configure Windows 10 Group Policy settings.

You install the Group Policy Management Console (GPMC) on Server1.

You need to configure the Windows Update for Business Group Policy settings on Server1.

Solution: You upgrade Server1 to Windows Server 2019.

Does this meet the goal?

A.

yes

B.

No

Full Access
Question # 58

You have a Microsoft 365 E5 subscription that has Microsoft Defender for Endpoint integrated with Microsoft Endpoint Manager.

Devices are onboarded by using Microsoft Defender for Endpoint.

You plan to block devices based on the results of the machine risk score calculated by Microsoft Defender for Endpoint.

What should you create first?

A.

a device configuration policy

B.

a device compliance policy

C.

a conditional access policy

D.

an endpoint detection and response policy

Full Access
Question # 59

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goats. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain.

You deploy a Microsoft Entra tenant.

Another administrator configures the domain to synchronize to the Microsoft Entra tenant.

You discover that 10 user accounts in an organizational unit (OU) are NOT synchronized to the Microsoft Entra tenant. All the other user accounts synchronized successfully.

You review Microsoft Entra Connect Health and discover that all the user account synchronizations completed successfully.

You need to ensure that the 10 user accounts are synchronized to the Microsoft Entra tenant.

Solution: From Microsoft Entra Connect, you modify the filtering settings.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 60

You have a Microsoft 365 E5 subscription.

You need to configure Privileged Identity Management (PIM) for the User Administrator role in Microsoft Entra. Eligible users must meet the following requirements:

• Always be able to request the User Administrator role.

• Must provide a reason when requesting the User Administrator role

• Must require multi-factor authentication (MFA} when activating the User Administrator role

The solution must minimize administrative effort.

Full Access
Question # 61

Your company uses Microsoft Defender for Endpoint.

The devices onboarded to Microsoft Defender for Endpoint are shown in the following table.

The alerts visible in the Microsoft Defender for Endpoint alerts queue are shown in the following table.

You create a suppression rule that has the following settings:

• Triggering IOC: Any IOC

• Action: Hide alert

• Suppression scope: Alerts on ATP1 device group

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point

Full Access