Summer Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 28522818

Home > Microsoft > Microsoft 365 Certified: Enterprise Administrator Expert > MS-102

MS-102 Microsoft 365 Administrator Exam Question and Answers

Question # 4

You need to configure the information governance settings to meet the technical requirements.

Which type of policy should you configure, and how many policies should you configure? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 5

You need to configure Office on the web to meet the technical requirements.

What should you do?

A.

Assign the Global reader role to User1.

B.

Enable sensitivity labels for Office files in SharePoint Online and OneDrive.

C.

Configure an auto-labeling policy to apply the sensitivity labels.

D.

Assign the Office apps admin role to User1.

Full Access
Question # 6

You need to recommend a solution for the security administrator. The solution must meet the technical requirements.

What should you include in the recommendation?

A.

Microsoft Azure Active Directory (Azure AD) Privileged Identity Management

B.

Microsoft Azure Active Directory (Azure AD) Identity Protection

C.

Microsoft Azure Active Directory (Azure AD) conditional access policies

D.

Microsoft Azure Active Directory (Azure AD) authentication methods

Full Access
Question # 7

You have a Microsoft 365 E5 subscription.

Users access Microsoft 365 from both their laptop and a corporate Virtual Desktop Infrastructure (VDI) solution.

From Azure AD Identity Protection, you enable a sign-in risk policy.

Users report that when they use the VDI solution, they are regularly blocked when they attempt to access Microsoft 365.

What should you configure?

A.

the Tenant restrictions settings in Azure AD

B.

a trusted location

C.

a Conditional Access policy exclusion

D.

the Microsoft 365 network connectivity settings

Full Access
Question # 8

You need to ensure that User2 can review the audit logs. The solutions must meet the technical requirements.

To which role group should you add User2, and what should you use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 9

You create the planned DLP policies.

You need to configure notifications to meet the technical requirements.

What should you do?

A.

From the Microsoft 365 security center, configure an alert policy.

B.

From the Microsoft Endpoint Manager admin center, configure a custom notification.

C.

From the Microsoft 365 admin center, configure a Briefing email.

D.

From the Microsoft 365 compliance center, configure the Endpoint DLP settings.

Full Access
Question # 10

You need to create the DLP policy to meet the technical requirements.

What should you configure first?

A.

sensitive info types

B.

the Insider risk management settings

C.

the event types

D.

the sensitivity labels

Full Access
Question # 11

You plan to implement the endpoint protection device configuration profiles to support the planned changes.

You need to identify which devices will be supported, and how many profiles you should implement.

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 12

You need to configure automatic enrollment in Intune. The solution must meet the technical requirements.

What should you configure, and to which group should you assign the configurations? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 13

You have a Microsoft 365 E5 subscription.

You create a Conditional Access policy named Policy1 and assign Policy1 to all users.

You need to configure Policy1 to enforce multi factor authentication (MFA) if the user risk level is high.

Which two settings should you configure in Policy1? To answer, select the appropriate settings in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 14

: 227

You have a Microsoft 365 F5 subscription.

You plan to deploy 100 new Windows 10 devices.

You need to order the appropriate version of Windows 10 for the new devices. The version must

Meet the following requirements.

Be serviced for a minimum of 24 moths.

Support Microsoft Application Virtualization (App-V)

Which version should you identify?

A.

Window 10 Pro, version 1909

B.

Window 10 Pro, version 2004

C.

Window 10 Pro, version 1909

D.

Window 10 Enterprise, version 2004

Full Access
Question # 15

You need to configure the compliance settings to meet the technical requirements.

What should you do in the Microsoft Endpoint Manager admin center?

A.

From Compliance policies, modify the Notifications settings.

B.

From Locations, create a new location for noncompliant devices.

C.

From Retire Noncompliant Devices, select Clear All Devices Retire State.

D.

Modify the Compliance policy settings.

Full Access
Question # 16

HOTSPOT

You have an Azure AD tenant that contains the administrative units shown in the following table.

You have the following users:

    A user named User1 that is assigned the Password Administrator for AU1 and AU2.

    A user named User2 that is assigned the User Administrator for AU1.

    A user named User3 that is assigned the User Administrator for the tenant.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 17

HOTSPOT

You have a Microsoft 365 subscription.

You deploy the anti-phishing policy shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

Full Access
Question # 18

You have a Microsoft Azure Active Directory (Azure AD) tenant named Contoso.com.

You create a Microsoft Defender for identity instance Contoso.

The tenant contains the users shown in the following table.

You need to modify the configuration of the Defender for identify sensors.

Solutions: You instruct User3 to modify the Defender for identity sensor configuration.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 19

You work at a company named Contoso, Ltd.

Contoso has a Microsoft 365 subscription that is configured to use the DNS domains shown in the following table.

Contoso purchases a company named Fabrikam, Inc.

Contoso plans to add the following domains to the Microsoft 365 subscription:

• fabrikam.com

• east.fabrikam.com

• west.contoso.com

You need to ensure that the devices in the new domains can register by using Autodiscover.

How many domains should you verify, and what is the minimum number of enterprise registration DNS records you should add? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 20

You have a Microsoft 365 E5 subscription.

You configure a new alert policy as shown in the following exhibit.

You need to identify the following:

    How many days it will take to establish a baseline for unusual activity.

    Whether alerts will be triggered during the establishment of the baseline.

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 21

You have a Microsoft 365 E5 tenant.

You have a sensitivity label configured as shown in the Sensitivity label exhibit. (Click the Sensitivity label tab.)

You have an auto-labeling policy as shown in the Auto-labeling policy exhibit. (Click the Auto-labeling policy tab.)

A user sends an email that contains the components shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 22

Your network contains three Active Directory forests. There are forests trust relationships between the forests.

You create an Azure AD tenant.

You plan to sync the on-premises Active Directory to Azure AD.

You need to recommend a synchronization solution. The solution must ensure that the synchronization can complete successfully and as quickly as possible if a single server fails.

What should you include in the recommendation?

A.

one Azure AD Connect sync server and one Azure AD Connect sync server in staging mode

B.

three Azure AD Connect sync servers and one Azure AD Connect sync server in staging mode

C.

six Azure AD Connect sync servers and three Azure AD Connect sync servers in staging mode

D.

three Azure AD Connect sync servers and three Azure AD Connect sync servers in staging mode

Full Access
Question # 23

Your company has multiple offices.

You have a Microsoft 365 E5 tenant that uses Microsoft Intune for device management. Each office has a local administrator.

You need to ensure that the local administrators can manage only the devices in their respective office.

What should you use?

A.

scope tags

B.

configuration profiles

C.

device categories

D.

conditional access policies

Full Access
Question # 24

You have a Microsoft 365 E5 tenant that connects to Microsoft Defender for Endpoint.

You have devices enrolled in Microsoft Intune as shown in the following table.

You plan to use risk levels in Microsoft Defender for Endpoint to identify whether a device is compliant. Noncompliant devices must be blocked from accessing corporate resources.

You need to identify which devices can be onboarded to Microsoft Defender for Endpoint, and which Endpoint security policies must be configured.

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 25

You have a Microsoft 365 E5 tenant.

You plan to create a custom Compliance Manager assessment template based on the ISO 27001:2013 template.

You need to export the existing template.

Which file format should you use for the exported template?

A.

CSV

B.

XLSX

C.

JSON

D.

XML

Full Access
Question # 26

You have a Microsoft 365 subscription.

You need to identify all users that have an Enterprise Mobility + Security plan, and then provide a list of the users in the CSV format.

Which settings should you use in the Microsoft 365 admin center, and which option should you select? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 27

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a computer that runs Windows 10.

You need to verify which version of Windows 10 is installed.

Solution: From the Settings app, you select Update & Security to view the update history.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 28

You have a Microsoft 365 E5 subscription that contains the groups shown in the following table.

You plan to publish a sensitivity label named Label1.

To which groups can you publish Label1?

A.

Group1 only

B.

Group1 and Group2 only

C.

Group1 and Group4 only

D.

Group1, Group2, and Group3 only

E.

Group1 Group2, Group3, and Group4

Full Access
Question # 29

Your company has a Microsoft 365 E5 subscription.

Users in the research department work with sensitive data.

You need to prevent the research department users from accessing potentially unsafe websites by using hyperlinks embedded in email messages and documents. Users in other departments must not be restricted.

What should you do?

A.

Create a data loss prevention (DLP) policy that has a Content is shared condition.

B.

Modify the safe links policy Global settings.

C.

Create a data loss prevention (DLP) policy that has a Content contains condition.

D.

Create a new safe links policy.

Full Access
Question # 30

You have several devices enrolled in Microsoft Endpoint Manager.

You have a Microsoft Azure Active Directory (Azure AD) tenant that includes the users shown in the following table.

The device type restrictions in Endpoint Manager are configured as shown in the following table.

Full Access
Question # 31

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.

You need to create a policy that will generate an email alert when a banned app is detected requesting permission to access user information or data in the subscription.

What should you configure? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 32

You need to configure Azure AD Connect to support the planned changes for the Montreal Users and Seattle Users OUs.

What should you do?

A.

From the Microsoft Azure AD Connect wizard, select Customize synchronization options.

B.

From PowerShell, run the Add-ADSyncConnectorAttnbuteinclusion cmdlet.

C.

From PowerShell, run the start-ADSyncSyncCycle cmdlet.

D.

From the Microsoft Azure AD Connect wizard, select Manage federation.

Full Access
Question # 33

You need to ensure that Admin4 can use SSPR.

Which tool should you use. and which action should you perform? To answer, select the appropriate options m the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 34

You need to configure the Office 365 service status notifications and limit access to the service and feature updates. The solution must meet the technical requirements.

What should you configure in the Microsoft 365 admin center? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 35

Your company has a Microsoft Entra tenant named contoso.com and a Microsoft 365 subscription. All users use Windows 10 devices to access Microsoft 365 apps. All the devices are in a workgroup.

You plan to implement passwordless sign-in to contoso.com.

You need to recommend changes to the infrastructure for the planned implementation. What should you include in the recommendation?

A.

Deploy the Microsoft Entra Connect provisioning agent.

B.

Join all the devices to contoso.com.

C.

Deploy Microsoft Entra Application Proxy.

D.

Deploy the Microsoft Authenticate app.

Full Access
Question # 36

You need to ensure that the Microsoft 365 incidents and advisories are reviewed monthly.

Which users can review the incidents and advisories, and which blade should the users use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 37

You are evaluating the use of multi-factor authentication (MFA).

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 38

You need to configure just in time access to meet the technical requirements.

What should you use?

A.

entitlement management

B.

Azure AD Privileged Identity Management (PIM)

C.

access reviews

D.

Azure AD Identity Protection

Full Access
Question # 39

As of March, how long will the computers in each office remain supported by Microsoft? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 40

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure a pilot for co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: You create a device configuration profile from the Device Management admin center.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 41

You need to meet the Intune requirements for the Windows 10 devices.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 42

You need to configure a conditional access policy to meet the compliance requirements.

You add Exchange Online as a cloud app.

Which two additional settings should you configure in Policy1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 43

On which server should you use the Defender for identity sensor?

A.

Server1

B.

Server2

C.

Server3

D.

Server4

E.

Servers5

Full Access
Question # 44

You need to meet the compliance requirements for the Windows 10 devices.

What should you create from the Intune admin center?

A.

a device compliance policy

B.

a device configuration profile

C.

an application policy

D.

an app configuration policy

Full Access
Question # 45

On which server should you install the Azure ATP sensor?

A.

Server 1

B.

Server 2

C.

Server 3

D.

Server 4

E.

Server 5

Full Access
Question # 46

ON NO: 2

You need to ensure that the support technicians can meet the technical requirement for the Montreal office mobile devices.

What is the minimum of dedicated support technicians required?

A.

1

B.

4

C.

7

D.

31

Full Access
Question # 47

Which role should you assign to User1?

Available Choices (select all choices that are correct)

A.

Hygiene Management

B.

Security Reader

C.

Security Administrator

D.

Records Management

Full Access
Question # 48

You need to create the Microsoft Store for Business. Which user can create the store?

A.

User2

B.

User3

C.

User4

D.

User5

Full Access
Question # 49

You need to ensure that User1 can enroll the devices to meet the technical requirements. What should you do?

A.

From the Azure Active Directory admin center, assign User1 the Cloud device administrator rote.

B.

From the Azure Active Directory admin center, configure the Maximum number of devices per user setting.

C.

From the Intune admin center, add User1 as a device enrollment manager.

D.

From the Intune admin center, configure the Enrollment restrictions.

Full Access
Question # 50

You need to meet the technical requirements and planned changes for Intune.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 51

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure a pilot for co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: Define a Configuration Manager device collection as the pilot collection. Add Device1 to the collection.

Does this meet the goal?

A.

Yes

B.

NO

Full Access
Question # 52

You need to ensure that all the sales department users can authenticate successfully during Project1 and Project2.

Which authentication strategy should you implement for the pilot projects?

A.

pass-through authentication

B.

pass-through authentication and seamless SSO

C.

password hash synchronization and seamless SSO

D.

password hash synchronization

Full Access
Question # 53

HOTSPOT

You create the Microsoft 365 tenant.

You implement Azure AD Connect as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

Full Access
Question # 54

You are evaluating the required processes for Project1.

You need to recommend which DNS record must be created while adding a domain name for the project.

Which DNS record should you recommend?

A.

host (A)

B.

host information

C.

text (TXT)

D.

alias (CNAME)

Full Access
Question # 55

Which report should the New York office auditors view?

A.

DLP policy matches

B.

DLP false positives and overrides

C.

DLP incidents

D.

Top Senders and Recipients

Full Access
Question # 56

You need to protect the U.S. PII data to meet the technical requirements.

What should you create?

A.

a data loss prevention (DLP) policy that contains a domain exception

B.

a Security & Compliance retention policy that detects content containing sensitive data

C.

a Security & Compliance alert policy that contains an activity

D.

a data loss prevention (DLP) policy that contains a user override

Full Access
Question # 57

You need to meet the technical requirement for the EU PII data.

What should you create?

A.

a retention policy from the Security & Compliance admin center.

B.

a retention policy from the Exchange admin center

C.

a data loss prevention (DLP) policy from the Exchange admin center

D.

a data loss prevention (DLP) policy from the Security & Compliance admin center

Full Access
Question # 58

ION NO: 63 HOTSPOT

You need to meet the technical requirement for the SharePoint administrator. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Full Access
Question # 59

You need to meet the technical requirement for log analysis.

What is the minimum number of data sources and log collectors you should create from Microsoft Cloud App Security? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 60

You need to meet the technical requirement for large-volume document retrieval. What should you create?

A.

a data loss prevention (DLP) policy from the Security & Compliance admin center

B.

an alert policy from the Security & Compliance admin center

C.

a file policy from Microsoft Cloud App Security

D.

an activity policy from Microsoft Cloud App Security

Full Access
Question # 61

You need to meet the requirement for the legal department.

Which three actions should you perform in sequence from the Security & Compliance admin center? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Full Access