Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Microsoft MS-102 Microsoft 365 Administrator Exam Exam Practice Test

Demo: 52 questions
Total 483 questions

Microsoft 365 Administrator Exam Questions and Answers

Question 1

You have a Microsoft 365 E5 tenant.

You plan to deploy a monitoring solution that meets the following requirements:

    Captures Microsoft Teams channel messages that contain threatening or violent language.

    Alerts a reviewer when a threatening or violent message is identified.

What should you include in the solution?

Options:

A.

Data Subject Requests (DSRs)

B.

Insider risk management policies

C.

Communication compliance policies

D.

Audit log retention policies

Question 2

: 220 DRAG DROP

Your network contains an on-premises Active Directory domain that syncs to Azure Active Directory (Azure AD). The domain contains the servers shown in the following table.

You use Azure Information Protection.

You need to ensure that you can apply Azure Information Protection labels to the file stores on Server1.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Options:

Question 3

You have a Microsoft 365 tenant.

You plan to manage incidents in the tenant by using the Microsoft 365 security center.

Which Microsoft service source will appear on the Incidents page of the Microsoft 365 security center?

Options:

A.

Microsoft Cloud App Security

B.

Azure Sentinel

C.

Azure Web Application Firewall

D.

Azure Defender

Question 4

: 228

You have a Microsoft 365 subscription.

You discover that some external users accessed center for a Microsoft SharePoint site.

You modify the sharePoint sharing policy to prevent sharing, outside your organization.

You need to be notified if the SharePoint sharing policy is modified in the future.

Solution: From the Security $ Compliance admin center you create a threat management policy.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 5

You have a Microsoft 365 subscription.

You configure a new Azure AD enterprise application named App1. App1 requires that a user be assigned the Reports Reader role.

Which type of group should you use to assign the Reports Reader role and to access App1?

Options:

A.

a Microsoft 365 group that has assigned membership

B.

a Microsoft 365 group that has dynamic user membership

C.

a security group that has assigned membership

D.

a security group that has dynamic user membership

Question 6

You have a Microsoft 365 E5 subscription and use Microsoft Purview. The subscription contains the devices shown in the following table.

All the devices are onboarded to Microsoft Defender for Endpoint. You plan to deploy Endpoint data loss prevention (Endpoint DLP) policies. Which devices can be protected by using the DLP policies?

Options:

A.

Device1 only

B.

Device1 and Device2 only

C.

Device1, Device2, and Device 3 only

D.

Device1, Device3, and Device 4 only

E.

Device1, Device2, Device3, and Device4

Question 7

You have a Microsoft 365 tenant that contains a Windows 10 device named Device1 and the Microsoft Endpoint Manager policies shown in the following table.

The policies are assigned to Device1.

Which policy settings will be applied to Device1?

Options:

A.

only the settings of Policy1

B.

only the settings of Policy2

C.

only the settings of Policy3

D.

no settings

Question 8

Your company has a Microsoft 365 subscription that contains the users shown in the following table.

External collaboration settings have default configuration.

You need to identify which users can perform the following administrative tasks:

• Modify the password protection policy.

• Create guest user accounts.

Which users should you identify for each task? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 9

You have a Microsoft 365 E5 tenant that contains the devices shown in the following table.

You plan to review device startup performance issues by using Endpoint analytics.

Which devices can you monitor by using Endpoint analytics?

Options:

A.

Device1 only

B.

Device1 and Device2 only

C.

Device1, Device2, and Device3 only

D.

Device1, Device2, and Device4 only

E.

Device1, Device2, Device3, and Device4

Question 10

Your network contains an Active Directory forest.

You deploy Microsoft 365.

You plan to implement directory synchronization.

You need to recommend a security solution for the synchronized identities. The solution must meet the following requirements:

• Users must be able to authenticate successfully to Microsoft 365 services if Active Directory becomes unavailable.

• User passwords must be 10 characters or more.

Solution: Implement pass-through authentication and configure Microsoft Entra Password protection. Does this meet the goal?

Options:

A.

Yes

B.

No

Question 11

Youi network contains an Active Directory domain.

You have a Microsoft Entra tenant that has Security defaults disabled.

Microsoft Entra Connect Sync is configured for directory synchronization. Password hash synchronization and pass-through authentication are disabled.

You need to enable Microsoft Entra ID Protection to detect leaked credentials.

What should you do first?

Options:

A.

From Microsoft Entra Connect, enable password hash synchronization.

B.

From the Microsoft Entra admin center, enable Security defaults.

C.

From Microsoft Entra Connect, enable pass-through authentication.

D.

From the Microsoft Entra admin center, configure verifiable credentials.

Question 12

You have a Microsoft 365 subscription that contains the users shown in the following table.

You plan to use Exchange Online to manage email for a DNS domain.

An administrator adds the DNS domain to the subscription.

The DNS domain has a status of Incomplete setup.

You need to identify which user can complete the setup of the DNS domain. The solution must use the principle of least privilege.

Which user should you identify?

Options:

A.

User1

B.

User2

C.

User3

D.

User4

Question 13

Your company has a Microsoft Entra tenant that contains the users shown in the following table.

The tenant includes a security group named Admin1. Admin1 will be used to manage administrative accounts. External collaboration settings have default configuration.

You need to identify which users can perform the following administrative tasks:

Options:

Question 14

You have a Microsoft 365 E5 subscription.

You create a Conditional Access policy named Policy1 and assign Policy1 to all users.

You need to configure Policy1 to enforce multi factor authentication (MFA) if the user risk level is high.

Which two settings should you configure in Policy1? To answer, select the appropriate settings in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 15

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain.

You deploy an Azure AD tenant.

Another administrator configures the domain to synchronize to Azure AD.

You discover that 10 user accounts in an organizational unit (OU) are NOT synchronized to Azure AD. All the other user accounts synchronized successfully.

You review Azure AD Connect Health and discover that all the user account synchronizations completed successfully.

You need to ensure that the 10 user accounts are synchronized to Azure AD.

Solution: From Azure AD Connect, you modify the Azure AD credentials.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 16

You have a Microsoft 365 E5 subscription.

On Monday, you create a new user named User1.

On Tuesday, User1 signs in for the first time and perform the following actions:

• Signs in to Microsoft Exchange Online from an anonymous IP address

• Signs in to Microsoft SharePoint Online from a device in New York City.

• Establishes Remote Desktop connections to hosts in Berlin and Hong Kong, and then signs in to SharePoint Online from the Remote Desktop connections

Which types of sign-in risks will Azure AD Identity Protection detect for User1?

Options:

A.

anonymous IP address only

B.

anonymous IP address and atypical travel

C.

anonymous IP address, atypical travel, and unfamiliar sign-in properties

D.

unfamiliar sign-in properties and atypical travel only

E.

anonymous IP address and unfamiliar sign-in properties only

Question 17

You have a Microsoft 365 E5 tenant that contains four devices enrolled in Microsoft Intune as shown in the following table.

You plan to deploy Microsoft 365 Apps for enterprise by using Microsoft Endpoint Manager.

To which devices can you deploy Microsoft 365 Apps for enterprise?

Options:

A.

Device1 only

B.

Device1 and Device3 only

C.

Device2 and Device4 only

D.

Device1, Device2. and Device3 only

E.

Device1, Device2, Device3, and Device4

Question 18

You have a Microsoft 365 E5 tenant that contains two users named User1 and User2 and the groups shown in the following table.

You have a Microsoft Intune enrollment policy that has the following settings:

    MDM user scope: Some

      Groups: Group1

    MAM user scope: Some

      Groups: Group2

You purchase the devices shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 19

You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365.

You need to ensure that users are prevented from opening or downloading malicious files from Microsoft Teams, OneDrive, or SharePoint Online.

What should you do?

Options:

A.

Create a newAnti-malware policy

B.

Configure the Safe Links global settings.

C.

Create a new Anti-phishing policy

D.

Configure the Safe Attachments global settings.

Question 20

You have a Microsoft Azure Active Directory (Azure AD) tenant named Contoso.com.

You create a Microsoft Defender for identity instance Contoso.

The tenant contains the users shown in the following table.

You need to modify the configuration of the Defender for identify sensors.

Solutions: You instruct User1 to modify the Defender for identity sensor configuration.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 21

You have a Microsoft 365 subscription.

You need to add additional onmicrosoft.com domains to the subscription. The additional domains must be assignable as email addresses for users.

What is the maximum number of onmicrosoft.com domains the subscription can contain?

Options:

A.

1

B.

2

C.

5

D.

10

Question 22

You have a Microsoft 365 E5 subscription that contains the devices shown in the following table.

At 08:00. you create an incident notification rule that has the following configurations:

• Name: Notification!

• Notification settings

o Notify on alert seventy: Low

o Device group scope: All (3)

o Details: First notification per incident

• Recipients: Userl@contoso.com, User2@contoso.com

At 08:02. you create an incident notification rule that has the following configurations:

• Name: Notification

• Notification settings

o Notify on alert severity: Low. Medium

o Device group scope: DevtceGroup1, DeviceGroup2

• Recipients: Userl@contoso.com

in Microsoft 365 Defender, alerts are logged as shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No1.

NOTE: Each correct selection is worth one point.

Options:

Question 23

HOTSPOT

Your network contains an on-premises Active Directory domain and a Microsoft 365 subscription.

The domain contains the users shown in the following table.

The domain contains the groups shown in the following table.

You are deploying Azure AD Connect.

You configure Domain and OU filtering as shown in the following exhibit.

You configure Filter users and devices as shown in the following exhibit.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 24

You have a Microsoft 365 subscription that contains a user named User1.

You need to ensure that User1 can search the Microsoft 365 audit logs from the Security & Compliance admin

center.

Which role should you assign to User1?

Options:

A.

View-Only Audit Logs in the Security & Compliance admin center

B.

View-Only Audit Logs in the Exchange admin center

C.

Security reader in the Azure Active Directory admin center

D.

Security Reader in the Security & Compliance admin center

Question 25

You need to ensure that the Microsoft 365 incidents and advisories are reviewed monthly.

Which users can review the incidents and advisories, and which blade should the users use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 26

You need to configure Azure AD Connect to support the planned changes for the Montreal Users and Seattle Users OUs.

What should you do?

Options:

A.

From the Microsoft Azure AD Connect wizard, select Customize synchronization options.

B.

From PowerShell, run the Add-ADSyncConnectorAttnbuteinclusion cmdlet.

C.

From PowerShell, run the start-ADSyncSyncCycle cmdlet.

D.

From the Microsoft Azure AD Connect wizard, select Manage federation.

Question 27

You are evaluating the use of multi-factor authentication (MFA).

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 28

You need to configure just in time access to meet the technical requirements.

What should you use?

Options:

A.

entitlement management

B.

Azure AD Privileged Identity Management (PIM)

C.

access reviews

D.

Azure AD Identity Protection

Question 29

You need to ensure that Admin4 can use SSPR.

Which tool should you use. and which action should you perform? To answer, select the appropriate options m the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 30

You need to configure the Office 365 service status notifications and limit access to the service and feature updates. The solution must meet the technical requirements.

What should you configure in the Microsoft 365 admin center? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 31

You need to configure Office on the web to meet the technical requirements.

What should you do?

Options:

A.

Assign the Global reader role to User1.

B.

Enable sensitivity labels for Office files in SharePoint Online and OneDrive.

C.

Configure an auto-labeling policy to apply the sensitivity labels.

D.

Assign the Office apps admin role to User1.

Question 32

You need to configure the compliance settings to meet the technical requirements.

What should you do in the Microsoft Endpoint Manager admin center?

Options:

A.

From Compliance policies, modify the Notifications settings.

B.

From Locations, create a new location for noncompliant devices.

C.

From Retire Noncompliant Devices, select Clear All Devices Retire State.

D.

Modify the Compliance policy settings.

Question 33

You need to configure the information governance settings to meet the technical requirements.

Which type of policy should you configure, and how many policies should you configure? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 34

You need to configure automatic enrollment in Intune. The solution must meet the technical requirements.

What should you configure, and to which group should you assign the configurations? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 35

You need to create the DLP policy to meet the technical requirements.

What should you configure first?

Options:

A.

sensitive info types

B.

the Insider risk management settings

C.

the event types

D.

the sensitivity labels

Question 36

You need to ensure that User2 can review the audit logs. The solutions must meet the technical requirements.

To which role group should you add User2, and what should you use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 37

You need to create the Safe Attachments policy to meet the technical requirements.

Which option should you select?

Options:

A.

Replace

B.

Enable redirect

C.

Block

D.

Dynamic Delivery

Question 38

You create the planned DLP policies.

You need to configure notifications to meet the technical requirements.

What should you do?

Options:

A.

From the Microsoft 365 security center, configure an alert policy.

B.

From the Microsoft Endpoint Manager admin center, configure a custom notification.

C.

From the Microsoft 365 admin center, configure a Briefing email.

D.

From the Microsoft 365 compliance center, configure the Endpoint DLP settings.

Question 39

You plan to implement the endpoint protection device configuration profiles to support the planned changes.

You need to identify which devices will be supported, and how many profiles you should implement.

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 40

You need to meet the requirement for the legal department.

Which three actions should you perform in sequence from the Security & Compliance admin center? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Options:

Question 41

You need to recommend a solution for the security administrator. The solution must meet the technical requirements.

What should you include in the recommendation?

Options:

A.

Microsoft Azure Active Directory (Azure AD) Privileged Identity Management

B.

Microsoft Azure Active Directory (Azure AD) Identity Protection

C.

Microsoft Azure Active Directory (Azure AD) conditional access policies

D.

Microsoft Azure Active Directory (Azure AD) authentication methods

Question 42

You need to meet the technical requirement for log analysis.

What is the minimum number of data sources and log collectors you should create from Microsoft Cloud App Security? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 43

You need to meet the technical requirement for the SharePoint administrator. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Options:

Question 44

You need to meet the technical requirement for the EU PII data.

What should you create?

Options:

A.

a retention policy from the Security & Compliance admin center.

B.

a retention policy from the Exchange admin center

C.

a data loss prevention (DLP) policy from the Exchange admin center

D.

a data loss prevention (DLP) policy from the Security & Compliance admin center

Question 45

You need to meet the technical requirement for large-volume document retrieval. What should you create?

Options:

A.

a data loss prevention (DLP) policy from the Security & Compliance admin center

B.

an alert policy from the Security & Compliance admin center

C.

a file policy from Microsoft Cloud App Security

D.

an activity policy from Microsoft Cloud App Security

Question 46

Which report should the New York office auditors view?

Options:

A.

DLP policy matches

B.

DLP false positives and overrides

C.

DLP incidents

D.

Top Senders and Recipients

Question 47

You need to protect the U.S. PII data to meet the technical requirements.

What should you create?

Options:

A.

a data loss prevention (DLP) policy that contains a domain exception

B.

a Security & Compliance retention policy that detects content containing sensitive data

C.

a Security & Compliance alert policy that contains an activity

D.

a data loss prevention (DLP) policy that contains a user override

Question 48

You need to meet the technical requirements and planned changes for Intune.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 49

HOTSPOT

You create the Microsoft 365 tenant.

You implement Azure AD Connect as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

Options:

Question 50

You need to ensure that all the sales department users can authenticate successfully during Project1 and Project2.

Which authentication strategy should you implement for the pilot projects?

Options:

A.

pass-through authentication

B.

pass-through authentication and seamless SSO

C.

password hash synchronization and seamless SSO

D.

password hash synchronization

Question 51

You are evaluating the required processes for Project1.

You need to recommend which DNS record must be created while adding a domain name for the project.

Which DNS record should you recommend?

Options:

A.

host (A)

B.

host information

C.

text (TXT)

D.

alias (CNAME)

Question 52

Which role should you assign to User1?

Available Choices (select all choices that are correct)

Options:

A.

Hygiene Management

B.

Security Reader

C.

Security Administrator

D.

Records Management

Demo: 52 questions
Total 483 questions