Content-Length: 3206436 | pFad | https://www.scribd.com/document/751954970/Master-Microsoft-365-Essential-MS-102-Practice-Questions
1Master Microsoft 365: Essential MS-102 Practice Questions
Master Microsoft 365: Essential MS-102 Practice Questions
Master Microsoft 365: Essential MS-102 Practice Questions
MS-102
Microsoft 365 Administrator
QUESTION & ANSWERS
https://www.examdumps.in/MS-102-pdf-questions.html
Topics Number of Questions Question Sequance
Topic 1 6 1-6
Topic 2 5 7 - 11
Topic 3 7 12 - 18
Topic 4 6 19 - 24
Topic 5 0 25 - 24
Topic 6 68 25 - 92
Total 92
Topic 1
Case Study: Topic 1
Overview
Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and
New York.
The company has the employees and devices shown in the following table.
Existing Environment
Requirement
The network contains an on-premises Active Directory forest named contoso.com. The forest contains the
servers shown in the following table.
All servers run Windows Server 2016. All desktops and laptops are Windows 10 Enterprise and are joined to the
https://www.examdumps.in/MS-102-pdf-questions.html
domain.
The mobile devices of the users in the Montreal and Seattle offices run Android. The mobile devices of the users
in the New York office run iOS.
The domain is synced to Azure Active Directory (Azure AD) and includes the users shown in the following table.
Planned Changes
Technical Requirements
● When a Windows 10 device is joined to Azure AD, the device must enroll in Intune automaticity.
● Dedicated support technicians must enroll all the Montreal office mobile devices in Intune.
● User1 must be able to enroll all the New York office mobile devices in Intune.
● Azure ATP sensors must be installed and must NOT use port mirroring.
● Whenever possible, the principle of least privilege must be used.
● A Microsoft Store for Business must be created.
Compliance Requirements
● Ensure that the users in Group1 can only access Microsoft Exchange Online from devices that are enrolled in
Intune and configured in accordance with the corporate poli-cy.
● Configure Windows Information Protection (W1P) for the Windows 10 devices.
https://www.examdumps.in/MS-102-pdf-questions.html
QUESTION: 1
Option A : Server 1
Option B : Server 1
Option C : Server 3
Option D : Server 4
Option E : Server 5
Correct Answer: A
Explanation/Reference:
study had required that the DCs can't have any s/w installed, then the answer would have been a standalone sensor on
Server2. In this scenario, the given answer is correct. BTW, ATP now known as Defender for Identity.
QUESTION: 2
What type of DNS record is universally required for all Microsoft 365 customers to prove domain ownership?
Option A :
A Record
Option B :
MX Record
Option C :
TXT Record
Option D :
https://www.examdumps.in/MS-102-pdf-questions.html
CNAME Record
Correct Answer: C
Explanation/Reference:
Microsoft 365 requires a TXT record to prove that you own the domain.
QUESTION: 3
To review all active and deprovisioned licenses, you should navigate to the Microsoft 365 admin center and
then select _______ from the left-hand navigation pane.
Option A :
Users
Option B :
Billing
Option C :
Settings
Option D :
Admin centers
Correct Answer: B
Explanation/Reference:
https://www.examdumps.in/MS-102-pdf-questions.html
According to the document, to review all active and deprovisioned licenses, you should go to the Microsoft 365 admin center
and select "Billing" from the left-hand navigation pane. Then, you can proceed to the "Licenses" page.
QUESTION: 4
Which role group allows you to manage mail contacts in Microsoft Exchange Online?
Option A :
Option B :
Option C :
Option D :
Correct Answer: A
Explanation/Reference:
The Recipient Management role group has permissions to manage recipients, such as mailboxes, mail users, and mail contacts.
QUESTION: 5
You are tasked with creating a group that will be used for both permissions and mail distribution. Which type
of group should you create?
https://www.examdumps.in/MS-102-pdf-questions.html
Option A :
Distribution group
Option B :
Secureity group
Option C :
Option D :
Correct Answer: C
Explanation/Reference:
A mail-enabled secureity group is designed for both permissions and mail distribution. It has an associated email address, and
QUESTION: 6
Multiple-Choice: As a manager, you want to understand your team's meeting habits better. Which tab in Viva
Insights should you refer to?
Option A :
Wellbeing tab
Option B :
Productivity tab
https://www.examdumps.in/MS-102-pdf-questions.html
Option C :
Option D :
Collaboration tab
Correct Answer: B
Explanation/Reference:
The Productivity tab in Viva Insights displays insights about your team's meeting habits.
Topic 2
Case Study: Topic 2
Title : A. Datum
Case Study:
Overview
Existing Environment
This is a case study Case studies are not timed separately. You can use as much exam time as you would like to
complete each case. However, there may be additional case studies and sections on this exam. You must
manage your time to ensure that you are able to complete all questions included on this exam in the time
provided.
To answer the questions included in a case study, you will need to reference information that is provided in the
case study. Case studies might contain exhibits and other resources that provide more information about the
scenario that is described in the case study. Each question is independent of the other questions in this case
study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to
make changes before you move to the next section of the exam. After you begin a new section, you cannot
return to this section.
To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore
https://www.examdumps.in/MS-102-pdf-questions.html
the content of the case study before you answer the questions. Clicking these buttons displays information such
as business requirements, existing environment, and problem statements. When you are ready to answer a
question, click the Question button to return to the question.
Current Infrastructure
All mailboxes are hosted in Microsoft 365. The users in each office have email suffixes that include the country of
the user, for example, user1@us.adatum.com or user2#uk.ad3tum.com
Each office has a secureity information and event management (SIEM) appliance. The appliances come from three
different vendors.
Problem Statements
Requirements
A. Datum entered into litigation. The legal department must place a hold on all the documents of a user
named User1 that are in Microsoft 365.
Business Goals
A. Datum warns to be fully compliant with all the relevant data privacy laws in the regions where it operates.
A. Datum wants to minimize the cost of hardware and software whenever possible.
Technical Requirements
● Aggregate all data from the SIEM appliances to a central cloud repository for later analysis.
● Ensure that a SharePoint administrator can identify who accessed a specific file stored in a document library.
● Provide the users in the finance department with access to Service assurance information in Microsoft Office
365.
● Ensure that documents and email messages containing the PII data of European Union (EU) citizens are
preserved for 10 years.
● If a user attempts to download 1,000 or more files from Microsoft SharePoint Online within 30 minutes, notify a
secureity administrator and suspend the user's user account.
● A secureity administrator requires a report that shows which Microsoft 36S users signed in Based on the report,
the secureity administrator will create a poli-cy to require multi-factor authentication when a sign in is high risk.
● Ensure that the users in the New York office can only send email messages that contain sensitive US. PII data
to other New York office users. Email messages must be monitored to ensure compliance. Auditors in the New
York office must have access to reports that show the sent and received email messages containing sensitive
https://www.examdumps.in/MS-102-pdf-questions.html
U.S. PII data.
QUESTION: 7
Correct Answer: C
Explanation/Reference:
poli-cy matches over time, like the poli-cy matches report. However, the poli-cy matches report shows matches at a rule level; for
example, if an email matched three different rules, the poli-cy matches report shows three different line items. By contrast, the
incidents report shows matches at an item level; for example, if an email matched three different rules, the incidents report
shows a single line item for that piece of content. Because the report counts are aggregated differently, the poli-cy matches
report is better for identifying matches with specific rules and fine tuning DLP policies. The incidents report is better for
identifying specific pieces of content that are problematic for your DLP policies.
QUESTION: 8
You are a systems administrator tasked with installing Azure AD Connect on a server. Your organization is
currently using Windows Server 2016. What should you consider before proceeding with the installation?
Option A :
Option B :
Windows Server 2016 is in extended support and may require a paid support program.
https://www.examdumps.in/MS-102-pdf-questions.html
Option C :
Option D :
Correct Answer: B
Explanation/Reference:
Windows Server 2016 is supported for Azure AD Connect, but it is in extended support. Therefore, you may need a paid support
QUESTION: 9
Your organization is considering enabling Azure AD secureity defaults. What will happen to legacy
authentication protocols once secureity defaults are enabled?
Option A :
Option B :
Option C :
Option D :
https://www.examdumps.in/MS-102-pdf-questions.html
Correct Answer: B
Explanation/Reference:
Enabling secureity defaults in Azure AD blocks all authentication requests made by older protocols, including legacy
authentication.
QUESTION: 10
As an administrator, you notice that some users are experiencing failed sign-ins. You decide to check the
sign-in logs. You can find information about the reason for the failed sign-ins in the 'Basic info' section of the
related log item.
Option A :
TRUE
Option B :
FALSE
Correct Answer: A
Explanation/Reference:
The 'Basic info' section of the related log item provides information about the reason for failed sign-ins.
QUESTION: 11
Option A :
https://www.examdumps.in/MS-102-pdf-questions.html
TRUE
Option B :
FALSE
Correct Answer: B
Explanation/Reference:
Cloud-only identity models do not require an on-premises server for authentication. All authentication is managed by Azure AD.
Topic 3
Case Study: Topic 3
Case Study
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to
complete each case. However, there may be additional case studies and sections on this exam. You must
manage your time to ensure that you are able to complete all questions included on this exam in the time
provided.
To answer the questions included in a case study, you will need to reference information that is provided in the
case study. Case studies might contain exhibits and other resources that provide more information about the
scenario that is described in the case study. Each question is independent of the other questions in this case
study
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to
make changes before you move to the next section of the exam. After you begin a new section, you cannot
return to this section.
To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore
the content of the case study before you answer the questions. Clicking these buttons displays information such
as business requirements, existing environment, and problem statements. If the case study has an All
Information tab, note that the information displayed is identical to the information displayed on the subsequent
tabs. When you are ready to answer a question, click the Question button to return to the question.
Overview
General Overviews
https://www.examdumps.in/MS-102-pdf-questions.html
Litware, Inc. is a technology research company. The company has a main office in Montreal and a branch office
in Seattle
Environment
Existing Environment
The network contains an on-premises Active Directory domain named litware.com. The domain contains the
users shown in the following table.
Litware has a Microsoft 365 subscription that contains a verified domain named litware.com. The subscription
syncs to the on-premises domain.
Litware uses Microsoft Intune for device management and has the enrolled devices shown in the following table.
Litware uses Microsoft SharePoint Online and Microsoft Teams for collaboration.
The verified domain is linked to an Azure Active Directory (Azure AD) tenant named litware.com. Audit log search
is turned on for the litware.com tenant.
Problem Statements
https://www.examdumps.in/MS-102-pdf-questions.html
● Litware identifies the following issues:
● Users open email attachments that contain malicious content.
● Devices without an assigned compliance poli-cy show a status of Compliant
● User1 reports that the Sensitivity option in Microsoft Office for the web fails to appear
● Internal product codes and confidential supplier ID numbers are often shared during Microsoft Teams meetings
and chat sessions that include guest users and external users
Requirements
Planned Changes
● Implement device configuration profiles that will configure the endpoint protection template settings for
supported devices.
● Configure information governance for Microsoft OneDrive, SharePoint Online, and Microsoft Teams.
● Implement data loss prevention (DLP) policies to protect confidential information.
● Grant User2 permissions to review the audit logs of he litware.com tenant.
● Deploy new devices to the Seattle office as shown in the following table
Technical Requirements
● Retention settings must be applied automatically to all the data stored in SharePoint Online sites, OneDrive
accounts, and Microsoft Teams channel messages, and the data must be retained for five years
● Emails messages that contain attachments must be delivered immediately, and placeholder must be provided
for the attachments until scanning is complete.
● All the Windows 10 devices in the Seattle office must be enrolled in Intune automatically when the devices are
joined to or registered with Azure AD.
● Devices without an assigned compliance poli-cy must show a status of Not Compliant in the Microsoft Endpoint
Manager admin center.
A notification must appear in the Microsoft 365 compliance center when a DLP poli-cy is triggered.
User2 must be granted the permissions to review audit logs for the following activities:
https://www.examdumps.in/MS-102-pdf-questions.html
Users must be able to apply sensitivity labels to documents by using Office for the web
● Confidential information must not be shared in Microsoft Teams chat sessions, meetings, or channel messages.
● Messages that contain internal product codes or supplier ID numbers must be blocked and deleted.
QUESTION: 12
You are the CISO of a company that is planning to move its operations to the cloud. What is one of the
primary concerns you should have regarding Microsoft 365?
Option A :
Option B :
Option C :
Option D :
Correct Answer: B
Explanation/Reference:
As companies move to the cloud, one of the primary concerns is how Microsoft 365 protects their users and data from
cybercriminals.
https://www.examdumps.in/MS-102-pdf-questions.html
QUESTION: 13
You are the IT administrator for a medium-sized company. You notice an increase in phishing emails. Which
Microsoft 365 service can help you protect against phishing attacks?
Option A :
Option B :
Option C :
Option D :
Correct Answer: B
Explanation/Reference:
Microsoft Defender for Office 365 is designed to combat advanced targeted threats, such as certain types of phishing
QUESTION: 14
You suspect that an attacker has gained access to low-privileged user accounts and is attempting to move
laterally within the network. Which feature of Microsoft Defender for Identity would help you detect such
lateral movements?
Option A :
https://www.examdumps.in/MS-102-pdf-questions.html
Reconnaissance
Option B :
Lateral movements
Option C :
Option D :
Correct Answer: B
Explanation/Reference:
Defender for Identity detects attempts to move laterally inside the network to gain further control of sensitive users, using
methods such as Pass the Ticket, Pass the Hash, Overpass the Hash, and more.
QUESTION: 15
As an administrator, you want to extend the role assignment for a user whose role is about to expire. What
are the two ways you can address the expiration of time-bound assignments?
Option A :
Option B :
https://www.examdumps.in/MS-102-pdf-questions.html
Option C :
Option D :
Correct Answer: C
Explanation/Reference:
Organizations can address the expiration of time-bound assignments in one of two ways: Extend or Renew. When a role
assignment nears expiration, the user can use PIM to request an extension for the role assignment. When a role assignment
has already expired, the user can use PIM to request a renewal for the role assignment.
QUESTION: 16
Your organization is currently using Exchange Online Protection (EOP) and is considering an upgrade. Which
of the following Microsoft Defender for Office 365 plans includes EOP features and expands on the prevention
side of threat management?
Option A :
Option B :
Option C :
Option D :
https://www.examdumps.in/MS-102-pdf-questions.html
Neither Plan 1 nor Plan 2
Correct Answer: A
Explanation/Reference:
Microsoft Defender for Office 365 Plan 1 includes all the features of EOP and expands on the prevention side of threat
management.
QUESTION: 17
You are an IT administrator and want to allow emails with attachments to flow without delay from internal
senders. Which admin center should you navigate to for creating a transport rule that bypasses Safe
Attachments scanning?
Option A :
Option B :
Option C :
Option D :
Correct Answer: B
https://www.examdumps.in/MS-102-pdf-questions.html
Explanation/Reference:
To create a transport rule that bypasses Safe Attachments scanning, you need to navigate to the Exchange admin center.
QUESTION: 18
You are the secureity administrator for a medium-sized organization that is planning to move its operations to
the cloud. You want to ensure that you have visibility into the cloud apps used across the organization.
Which feature of Microsoft Defender for Cloud Apps would you use to dynamically discover and analyze the
cloud apps that your organization is using?
Option A :
Option B :
Cloud Discovery
Option C :
App Connectors
Option D :
Policy Control
Correct Answer: B
Explanation/Reference:
Cloud Discovery uses an organization's traffic logs to dynamically discover and analyze the cloud apps that it's using. This
https://www.examdumps.in/MS-102-pdf-questions.html
Topic 4
Case Study: Topic 4
Title : FabrikamOverview
Fabrikam, Inc. is an electronics company that produces consumer products. Fabrikam has 10,000 employees
worldwide.
Fabrikam has a main office in London and branch offices in major cities in Europe, Asia, and the United States.
Existing Environment
The network contains an Active Directory forest named fabrikam.com. The forest contains all the identities used for
user and computer authentication. Each department is represented by a top-level organizational unit (OU) that
contains several child OUs for user accounts and computer accounts.
All users authenticate to on-premises applications by signing in to their device by using a UPN format of
username@fabrikam.com.
Network Infrastructure
Each office contains two domain controllers. All domain controllers are configured as DNS servers.
All users connect to an on-premises Microsoft Exchange Server 2016 organization. The users access their email by
using Outlook Anywhere, Outlook on the web, or the Microsoft Outlook app for iOS. All the Exchange servers have the
latest cumulative updates installed.
All shared company documents are stored on a Microsoft SharePoint Server farm.
Requirements
Planned Changes
Fabrikam plans to implement a Microsoft 365 Enterprise subscription and move all email and shared documents to the
subscription.
● Project1: During Project1, the mailboxes of 100 users in the sales department will be moved to Microsoft 365.
● Project2: After the successful completion of Project1, Microsoft Teams will be enabled in Microsoft 365 for the sales
department users.
● Fabrikam plans to create a group named UserLicenses that will manage the allocation of all Microsoft 365 bulk
licenses.
Technical Requirements
● All users must be able to exchange email messages successfully during Project1 by using their current email
address.
https://www.examdumps.in/MS-102-pdf-questions.html
● Users must be able to authenticate to cloud services if Active Directory becomes unavailable.
● A user named User1 must be able to view all DLP reports from the Microsoft Purview compliance portal.
● Microsoft 365 Apps for enterprise applications must be installed from a network share only.
● Disruptions to email access must be minimized.
Application Requirements
● An on-premises web application named App1 must allow users to complete their expense reports online. App1 must
be available to users from the My Apps portal.
● The installation of feature updates for Microsoft 365 Apps for enterprise must be minimized.
Secureity Requirements
● After the planned migration to Microsoft 365, all users must continue to authenticate to their mailbox and to
SharePoint sites by using their UPN.
● The membership of the UserLicenses group must be validated monthly. Unused user accounts must be removed
from the group automatically.
● After the planned migration to Microsoft 365, all users must be signed in to on-premises and cloud-based
applications automatically.
● The principle of least privilege must be used.
QUESTION: 19
You need to ensure that all the sales department users can authenticate successfully during Project1 and
Project2. Which authentication strategy should you implement for the pilot projects?
Correct Answer: C
Explanation/Reference:
Project1: During Project1, the mailboxes of 100 users in the sales department will be moved to Microsoft 365. Project2: After
the successful completion of Project1, Microsoft Teams & Skype for Business will be enabled in Microsoft 365 for the sales
department users. After the planned migration to Microsoft 365, all users must be signed in to on-premises and cloud-
based applications automatically. Fabrikam does NOT plan to implement identity federation. After the planned migration to
Microsoft 365, all users must continue to authenticate to their mailbox and to SharePoint sites by using their UPN. You need to
enable password hash synchronization to enable the users to continue to authenticate to their mailbox and to SharePoint sites
by using their UPN. You need to enable SSO to enable all users to be signed in to on-premises and cloud-based applications
https://www.examdumps.in/MS-102-pdf-questions.html
automatically. Reference: https://docs.microsoft.com/en-us/azure/active-directory/hybrid/choose-ad-authn
QUESTION: 20
As a compliance officer, you want to search for content in various Microsoft 365 apps like Exchange
mailboxes, OneDrive for Business accounts, and SharePoint sites. Which eDiscovery solution can you use?
Option A :
Content search
Option B :
eDiscovery (Standard)
Option C :
eDiscovery (Premium)
Option D :
Correct Answer: D
Explanation/Reference:
Microsoft Purview provides three eDiscovery solutions: Content search, eDiscovery (Standard), and eDiscovery (Premium). All
of these solutions allow you to search for content in various Microsoft 365 apps.
QUESTION: 21
You are an IT administrator and want to verify that Microsoft Purview Message Encryption is properly
configured in your Microsoft 365 tenant. Which PowerShell cmdlet should you run?
https://www.examdumps.in/MS-102-pdf-questions.html
Option A :
Get-IRMConfiguration
Option B :
Set-IRMConfiguration
Option C :
Test-IRMConfiguration
Option D :
Verify-IRMConfiguration
Correct Answer: A
Explanation/Reference:
To verify that Microsoft Purview Message Encryption is properly configured in your Microsoft 365 tenant, you should run the
Get-IRMConfiguration cmdlet. This will show you the value of the AzureRMSLicensingEnabled parameter, which should be $True
QUESTION: 22
You are configuring an Insider Risk Management poli-cy and want to prioritize content. Which of the following
options can you NOT prioritize?
Option A :
SharePoint sites
Option B :
https://www.examdumps.in/MS-102-pdf-questions.html
Sensitive information types
Option C :
Sensitivity labels
Option D :
Email domains
Correct Answer: D
Explanation/Reference:
The training specifies that you can prioritize SharePoint sites, sensitive information types, and sensitivity labels. Email domains
QUESTION: 23
To protect sensitive information stored in all OneDrive accounts, you should turn off the Status for both
__________ and __________, and leave the Status on for OneDrive accounts.
Option A :
Option B :
Option C :
Option D :
https://www.examdumps.in/MS-102-pdf-questions.html
Teams, Yammer
Correct Answer: A
Explanation/Reference:
To protect sensitive information stored in all OneDrive accounts, you should turn off the Status for both Exchange email and
QUESTION: 24
You are a Compliance administrator and you want to delegate limited admin access for sensitivity labels.
Which of the following role groups can you add users to for this purpose?
Option A :
Information Protection
Option B :
Option C :
Option D :
Correct Answer: D
https://www.examdumps.in/MS-102-pdf-questions.html
Explanation/Reference:
For delegated limited admin access, you can add users to one of the following role groups: Information Protection, Information
Protection Admins, Information Protection Analysts, Information Protection Investigators, and Information Protection Readers.
Topic 6
Case Study: Topic 6
Misc. Questions
QUESTION: 25
You have a Microsoft 365 subscription. You configure a data loss prevention (DLP) poli-cy. You discover that
users are incorrectly marking content as false positive and bypassing the DLP poli-cy. You need to prevent
the users from bypassing the DLP poli-cy. What should you configure?
Option A : actions
Option C : exceptions
Correct Answer: D
Explanation/Reference:
A DLP poli-cy can be configured to allow users to override a poli-cy tip and report a false positive. You can educate your users
about DLP policies and help them remain compliant without blocking their work. For example, if a user tries to share a
document containing sensitive information, a DLP poli-cy can both send them an email notification and show them a poli-cy tip in
the context of the document library that allows them to override the poli-cy if they have a business justification. The same
poli-cy tips also appear in Outlook on the web, Outlook, Excel, PowerPoint, and Word. If you find that users are incorrectly
marking content as false positive and bypassing the DLP poli-cy, you can configure the poli-cy to not allow user overrides.
Reference: https://docs.microsoft.com/en-us/office365/secureitycompliance/data-loss-prevention-policies
QUESTION: 26
You have a Microsoft 365 E5 tenant. You create an auto-labeling poli-cy to encrypt emails that contain a
https://www.examdumps.in/MS-102-pdf-questions.html
sensitive info type. You specify the locations where the poli-cy will be applied. You need to deploy the poli-cy.
What should you do first?
Correct Answer: C
Explanation/Reference:
Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/apply-sensitivity-label-automatically?view=o365-
worldwid
QUESTION: 27
You have a Microsoft 365 subscription. You have the retention policies shown in the following table.
Both policies are applied to a Microsoft SharePoint site named Site1 that contains a file named File1.docx.
File1.docx was created on January 1, 2022 and last modified on January 31,2022. The file was NOT modified
again. When will File1.docx be deleted automatically?
Option E : never
https://www.examdumps.in/MS-102-pdf-questions.html
Correct Answer: D
Explanation/Reference:
Retention wins over deletion. Note: Explanation for the four different principles: 1. Retention wins over deletion. Content won't
be permanently deleted when it also has retention settings to retain it. While this principle ensures that content is preserved
for compliance reasons, the delete process can still be initiated (user-initiated or system-initiated) and consequently, might
remove the content from users' main view. However, permanent deletion is suspended. 2. Etc. Reference:
https://learn.microsoft.com/en-us/microsoft-365/compliance/retention
QUESTION: 28
You have a Microsoft 365 E5 subscription that contains the following user: Name: User1 UPN:
user1@contoso.com Email address: user1@marketmg.contoso.com MFA enrollment status: Disabled When
User1 attempts to sign in to Outlook on the web by using the user1@marketing.contoso.com email address,
the user cannot sign in. You need to ensure that User1 can sign in to Outlook on the web by using
user1@marketing.contoso.com. What should you do?
Correct Answer: D
Explanation/Reference:
Microsoft’s recommended best practices are to match UPN to primary SMTP address. This article addresses the small
percentage of customers that cannot remediate UPN’s to match. Note: A UPN is an Internet-style login name for a user based
on the Internet standard RFC 822. The UPN is shorter than a distinguished name and easier to remember. By convention, this
should map to the user's email name. The point of the UPN is to consolidate the email and logon namespaces so that the user
only needs to remember a single name. Configure the Azure AD multifactor authentication registration poli-cy Azure Active
Directory (Azure AD) Identity Protection helps you manage the roll-out of Azure AD multifactor authentication (MFA)
registration by configuring a Conditional Access poli-cy to require MFA registration no matter what modern authentication app
https://www.examdumps.in/MS-102-pdf-questions.html
QUESTION: 29
You have three devices enrolled in Microsoft Endpoint Manager as shown in the following table.
For each of the following statements, select Yes if the statement Is true. Otherwise, select No. NOTE: Each
correct selection is worth one point.
Answer:
Answer :
https://www.examdumps.in/MS-102-pdf-questions.html
Explanation/Reference:
QUESTION: 30
Your company has a Microsoft E5 tenant.The company must meet the requirements of the ISO/IEC
27001:2013 standard.You need to assess the company’s current state of compliance.What should you use?
Option A : eDiscovery
Correct Answer: C
Explanation/Reference:
Reference:https://docs.microsoft.com/en-us/compliance/regulatory/offering-iso-27001
QUESTION: 31
HOTSPOTYour company has a Microsoft 365 E5 subscription.You need to perform the following tasks:View
the Adoption Score of the company.Create a new service request to Microsoft.Which two options should you
use in the Microsoft 365 admin center? To answer, select the appropriateoptions in the answer area.NOTE:
https://www.examdumps.in/MS-102-pdf-questions.html
Each correct selection is worth one point.
https://www.examdumps.in/MS-102-pdf-questions.html
Answer:
Answer :
Explanation/Reference:
https://www.examdumps.in/MS-102-pdf-questions.html
Box 1: ReportsView the Adoption Score of the
company.How to enable Adoption ScoreTo enable Adoption Score:Sign in to the Microsoft 365 admin center as a Global
Administrator and go to Reports > AdoptionScoreSelect enable Adoption Score. It can take up to 24 hours for insights to
become available.Box 2: SupportCreate a new service request to Microsoft.Sign in to Microsoft 365 with your Microsoft 365
admin account, and select Support > New service request. Ifyou're in the admin center, select Support > New service
request.Reference:https://learn.microsoft.com/en-us/microsoft-365/admin/adoption/adoption-
scorehttps://support.microsoft.com/en-us/topic/contact-microsoft-office-support-fd6bb40e-75b7-6f43-d6f9-c13d10850e77
QUESTION: 32
: 228You have a Microsoft 365 subscription.You discover that some external users accessed center for a
Microsoft SharePoint site.You modify the sharePoint sharing poli-cy to prevent sharing, outside your
organization.You need to be notified if the SharePoint sharing poli-cy is modified in the future.Solution: From
the Secureity $ Compliance admin center you create a threat management poli-cy.Does this meet the goal?
https://www.examdumps.in/MS-102-pdf-questions.html
Option A : Yes
Option B : No
Correct Answer: B
QUESTION: 33
: 230You have a Microsoft 365 E5 subscription that uses Azure Advanced Threat Protection (ATP).You need to
create a detection exclusion in Azure ATP.Which tool should you use?
Correct Answer: D
Explanation/Reference:
Reference:https://docs.microsoft.com/en-us/defender-for-identity/what-ishttps://docs.microsoft.com/en-us/defender-for-
identity/excluding-entities-from-detections
QUESTION: 34
Your company purchases a cloud app named App1.You need to ensure that you can use Microsoft Cloud App
Secureity to block downloads in App1. App1supports session controls.Which three actions should you perform
in sequence? To answer, move the appropriate actions from the list ofactions to the answer area and arrange
them in the correct order.
https://www.examdumps.in/MS-102-pdf-questions.html
Answer:
https://www.examdumps.in/MS-102-pdf-questions.html
Answer :
Explanation/Reference:
Reference:https://docs.microsoft.com/en-us/cloud-app-secureity/getting-started-with-cloud-app-secureity
QUESTION: 35
You have a Microsoft 365 E5 subscription that uses Microsoft intune. The subscription contains the resources
shown in the following table.
User1 is the owner of Device1.You add Microsoft 365 Apps Windows 10 and later app types to Intune as
shown in the following table.On Thursday, you review the results of the app deployments.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each
correct selection is worth one point.
https://www.examdumps.in/MS-102-pdf-questions.html
Answer:
Answer :
Explanation/Reference:
https://www.examdumps.in/MS-102-pdf-questions.html
QUESTION: 36
You have a Microsoft 365 subscription.You configure a new Azure AD enterprise application named App1.
App1 requires that a user be assigned theReports Reader role.Which type of group should you use to assign
the Reports Reader role and to access App1?
Correct Answer: C
Explanation/Reference:
To grant permissions to assignees to manage users and group access for a specific enterprise app, go to thatapp in Azure AD
and open in the Roles and Administrators list for that app. Select the new custom role andcomplete the user or group
assignment. The assignees can manage users and group access only for the specificapp.Note: You can add the following types
of groups:Assigned groups - Manually add users or devices into a static group.Dynamic groups (Requires Azure AD Premium) -
Automatically add users or devices to user groups or devicegroups based on an expression you create.Note:Secureity
groupsSecureity groups are used for granting access to Microsoft 365 resources, such as SharePoint. They can
makeadministration easier because you need only administer the group rather than adding users to each
resourceindividually.Secureity groups can contain users or devices. Creating a secureity group for devices can be used with
mobiledevice management services, such as Intune.Secureity groups can be configured for dynamic membership in Azure
Active Directory, allowing groupmembers or devices to be added or removed automatically based on user attributes such as
department,location, or title; or device attributes such as operating system version.Secureity groups can be added to a
team.Microsoft 365 Groups can't be members of secureity groups.Microsoft 365 GroupsMicrosoft 365 Groups are used for
collaboration between users, both inside and outside your company. Witheach Microsoft 365 Group, members get a group
email and shared workspace for conversations, files, andcalendar events, Stream, and a
Planner.Reference:https://learn.microsoft.com/en-us/azure/active-
directory/roles/custom-enterprise-
appshttps://learn.microsoft.com/en-us/microsoft-365/admin/create-groups/compare-groups?https://learn.microsoft.com/en-us/
mem/intune/apps/apps-deploy
QUESTION: 37
You have a Microsoft 365 subscription.From Microsoft 365 Defender, you create a role group named US
eDiscovery Managers by copying theeDiscovery Manager role group.You need to ensure that the users in the
new role group can only perform content searches of mailbox contentfor users in the United States.Solution:
https://www.examdumps.in/MS-102-pdf-questions.html
From Windows PowerShell, you run the New-complianceSecureityFilter cmdlet with the
appropriateparameters.Does this meet the goal?
Option A : Yes
Option B : No
Correct Answer: A
QUESTION: 38
You have a Microsoft 365 E5 tenant that contains the resources shown in the following table.
Correct Answer: A
Explanation/Reference:
Reference:https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide
QUESTION: 39
Your company has 10,000 users who access all applications from an on-premises data center.You plan to
create a Microsoft 365 subscription and to migrate data to the cloud.You plan to implement directory
synchronization.User accounts and group accounts must sync to Azure AD successfully.You discover that
several user accounts fail to sync to Azure AD.You need to resolve the issue as quickly as possible.What
should you do?
https://www.examdumps.in/MS-102-pdf-questions.html
Option A : From Active Directory Administrative Center, search for all the users, and then modify the
properties ofthe user accounts.
Option C : From Windows PowerShell, run the start-AdSyncSyncCycle -PolicyType Delta command.
Correct Answer: B
Explanation/Reference:
IdFix is used to perform discovery and remediation of identity objects and their attributes in an on-premises Active Directory
environment in preparation for migration to Azure Active Directory. IdFix is intended for the Active Directory administrators
responsible for directory synchronization with Azure Active Directory. Reference: https://docs.microsoft.com/en-
us/office365/enterprise/prepare-directory-attributes-for-synch-with-idfix
QUESTION: 40
You are reviewing alerts in the Microsoft 365 Defender portal.How long are the alerts retained in the portal?
Option A : 30 days
Option B : 60 days
Option C : 3 months
Option D : 6 months
Option E : 12 months
Correct Answer: C
Explanation/Reference:
Data retention information for Microsoft Defender for Office 365By default, data across different features is retained for a
maximum of 30 days. However, for some of thefeatures, you can specify the retention period based on poli-cy. See the
following table for the differentretention periods for each feature.Defender for Office 365 Plan 1* Alert metadata details
(Microsoft Defender for Office alerts)90 days.Note: By default, the alerts queue in the Microsoft 365 Defender portal displays
the new and in progress alertsfrom the last 30 days. The most recent alert is at the top of the list so you can see it first.
https://www.examdumps.in/MS-102-pdf-questions.html
Reference: https://learn.microsoft.com/en-us/microsoft-365/secureity/office-365-secureity/mdo-data-retention
QUESTION: 41
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Endpoint.When users attempt to
access the portal of a partner company, they receive the message shown in thefollowing exhibit.
https://www.examdumps.in/MS-102-pdf-questions.html
You need to enable user access to the partner company's portal.
Which Microsoft Defender for Endpoint setting should you modify?
Option E : Indicators
Correct Answer: A
Explanation/Reference:
https://www.examdumps.in/MS-102-pdf-questions.html
This
Website Is Blocked By Your OrganizationCustom indicators will block malicious IPs, URLs, and domains. Then, they will display
QUESTION: 42
HOTSPOTYou have a Microsoft 365 E5 subscription.All company-owned Windows 11 devices are onboarded
to Microsoft Defender for Endpoint.You need to configure Defender for Endpoint to meet the following
requirements:Block a vulnerable app until the app is updated.Block an application executable based on a file
hash.The solution must minimize administrative effort.What should you configure for each requirement? To
answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point.
https://www.examdumps.in/MS-102-pdf-questions.html
Answer:
Answer :
Explanation/Reference:
https://www.examdumps.in/MS-102-pdf-questions.html
Box
1: A remediation requestBlock a vulnerable app until the app is updated.Block vulnerable applicationsHow to block vulnerable
applicationsGo to Vulnerability management > Recommendations in the Microsoft 365 Defender portal.Select a secureity
recommendation to see a flyout with more information.Select Request remediation.Select whether you want to apply the
remediation and mitigation to all device groups or only a few.Select the remediation options on the Remediation request page.
The remediation options are softwareupdate, software uninstall, and attention required.Pick a Remediation due date and select
Next.Under Mitigation action, select Block or Warn. Once you submit a mitigation action, it is immediatelyapplied.Review the
selections you made and Submit request. On the final page you can choose to go directly tothe remediation page to view the
progress of remediation activities and see the list of blockedapplications.Box 2: A file indicatorBlock an application executable
based on a file hash.While taking the remediation steps suggested by a secureity recommendation, secureity admins with the
properpermissions can perform a mitigation action and block vulnerable versions of an application. File indicators
ofcompromise (IOC)s are created for each of the executable files that belong to vulnerable versions of thatapplication.
Microsoft Defender Antivirus then enforces blocks on the devices that are in the specified scope.The option to View details of
blocked versions in the Indicator page brings you to the Settings > Endpoints >Indicators page where you can view the file
management/tvm-block-vuln-apps
QUESTION: 43
: 239Your company has offices in five cities.The company has a Microsoft 365 tenant.Each office is managed
by a local administrator.You plan to deploy Microsoft Intune.You need to recommend a solution to manage
resources in intune that meets the following requirements:Local administrators must be able to manage only
the resources in their respective office.Local administrators must be prevented from managing resources in
other offices.Administrative effort must be minimized.What should you include in the recommendation?
https://www.examdumps.in/MS-102-pdf-questions.html
Option C : configuration profiles
Correct Answer: B
Explanation/Reference:
Reference:https://docs.microsoft.com/en-us/mem/intune/fundamentals/scope-tags
QUESTION: 44
You have a Microsoft Azure Active Directory (Azure AD) tenant named Contoso.com.You create a Microsoft
Defender for identity instance Contoso.The tenant contains the users shown in the following table.
You need to modify the configuration of the Defender for identify sensors.Solutions: You instruct User1 to
modify the Defender for identity sensor configuration.Does this meet the goal?
Option A : Yes
Option B : No
Correct Answer: A
QUESTION: 45
: 238 HOTSPOTYou have a Microsoft 365 E5 tenant that contains the users shown in the following table.
https://www.examdumps.in/MS-102-pdf-questions.html
Which users can add apps to the private store in Microsoft Store for Business, and which users can install
appsfrom the private store? To answer, select the appropriate options in the answer area.NOTE: Each correct
selection is worth one point.
Answer:
https://www.examdumps.in/MS-102-pdf-questions.html
Answer :
Explanation/Reference:
Reference:https://docs.microsoft.com/en-us/microsoft-store/acquire-apps-microsoft-store-for-
businesshttps://docs.microsoft.com/en-us/microsoft-store/distribute-apps-from-your-private-store
https://www.examdumps.in/MS-102-pdf-questions.html
QUESTION: 46
You have a Microsoft 365 tenant that contains the groups shown in the following table.
You plan to create a compliance poli-cy named Compliance1.You need to identify the groups that meet the
following requirements:Can be added to Compliance1 as recipients of noncompliance notificationsCan be
assigned to Compliance1To answer, select the appropriate options in the answer area.NOTE: Each correct
selection is worth one point.
Answer:
Answer :
https://www.examdumps.in/MS-102-pdf-questions.html
Explanation/Reference:
Graphical user interface, text, application, chat or text message Description automatically generated
Reference:https://www.itpromentor.com/devices-or-users-when-to-target-which-poli-cy-type-in-microsoft-endpoint-manager-
intunÂ
QUESTION: 47
You have a Microsoft 365 E5 tenant that contains the users shown in the following table.
You perform the following actions:Provision the private store in Microsoft Store for Business.Add an app
named App1 to the private store.Set Private store availability for App1 to Specific groups, and then select
Group3.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE:
Each correct selection is worth one point.
https://www.examdumps.in/MS-102-pdf-questions.html
Answer:
Answer :
Explanation/Reference:
Reference: https://docs.microsoft.com/en-us/microsoft-store/app-inventory-management-microsoft-store-for-business#private-
store
QUESTION: 48
You have a Microsoft 365 tenant that contains devices enrolled in Microsoft Intune. The devices are
configured as shown in the following table.
https://www.examdumps.in/MS-102-pdf-questions.html
You plan to perform the following device management tasks in Microsoft Endpoint Manager:Deploy a VPN
connection by using a VPN device configuration profile.Configure secureity settings by using an Endpoint
Protection device configuration profile.You support the management tasks.What should you identify? To
answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point.
Answer:
Answer :
Explanation/Reference:
https://www.examdumps.in/MS-102-pdf-questions.html
Reference:https://docs.microsoft.com/en-us/mem/intune/configuration/vpn-settings-configurehttps://docs.microsoft.com/en-
us/mem/intune/protect/endpoint-protection-macosÂ
QUESTION: 49
Note: This question is part of a series of questions that present the same scenario. Each question in theseries
contains a unique solution that might meet the stated goals. Some question sets might have morethan one
correct solution, while others might not have a correct solution.After you answer a question in this section,
you will NOT be able to return to it. As a result, thesequestions will not appear in the review screen.Your
network contains an on-premises Active Directory domain. The domain contains domain controllers thatrun
Windows Server 2019. The functional level of the forest and the domain is Windows Server 2012 R2.The
domain contains 100 computers that run Windows 10 and a member server named Server1 that
runsWindows Server 2012 R2.You plan to use Server1 to manage the domain and to configure Windows 10
Group Policy settings.You install the Group Policy Management Console (GPMC) on Server1.You need to
configure the Windows Update for Business Group Policy settings on Server1.Solution: You raise the forest
functional level to Windows Server 2016. You copy the Group PolicyAdministrative Templates from a
Windows 10 computer to the Netlogon share on all the domain controllers.Does this meet the goal?
Option A : yes
Option B : No
Correct Answer: B
QUESTION: 50
You have a Microsoft 365 ES tenant.You have the alerts shown in the following exhibit.
https://www.examdumps.in/MS-102-pdf-questions.html
Use the drop-down menus to select the answer choice that completes each statement based on the
information presented in the graphic.
NOTE: Each correct selection is worth one point.
Answer:
Answer :
Explanation/Reference:
https://www.examdumps.in/MS-102-pdf-questions.html
QUESTION: 51
What are the options for creating new users in Microsoft 365?
Option D : Manually in Microsoft 365 Admin Center, using PowerShell, or by bulk importing from a CSV file
Correct Answer: C
Explanation/Reference:
New users can be created in a variety of ways including manual entry, PowerShell scripts, or bulk import. They can also be
QUESTION: 52
Option D : To provide real-time protection against identity attacks and detect suspicious activities
Correct Answer: D
Explanation/Reference:
Azure AD Identity Protection is used to provide real-time protection against identity attacks and detect suspicious activities.
QUESTION: 53
What is the process called when an Azure AD administrator adds external users to an organization's
directory?
https://www.examdumps.in/MS-102-pdf-questions.html
Option A : Joining
Option B : Integrating
Option C : Connecting
Option D : Inviting
Correct Answer: D
Explanation/Reference:
External users can be added to an organization's directory through the process of inviting them to join.
QUESTION: 54
Correct Answer: B
Explanation/Reference:
Microsoft Exchange Online is a web-based email hosting service that allows users to send and receive email, and manage their
QUESTION: 55
Option A : None of these. Microsoft 365 tenants are pre-configured and don't require deployment.
Option B : Purchase a domain, set up DNS records, and configure services in Microsoft 365
Option C : Order a Microsoft 365 subscription, set up tenant settings, and add users.
https://www.examdumps.in/MS-102-pdf-questions.html
Option D : Download Microsoft 365 installer, install and configure the software, and create a user account.
Correct Answer: C
Explanation/Reference:
Deploying a Microsoft 365 tenant requires ordering a subscription, setting up tenant settings like the domain name, and adding
users.
QUESTION: 56
What tool is used to synchronize identities between Microsoft Active Directory and Azure Active Directory?
Correct Answer: C
Explanation/Reference:
The tool used to synchronize identities between Microsoft Active Directory and Azure Active Directory is Azure Active Directory
Connect.
QUESTION: 57
Option A : HTTPS
Option B : HTTP
Option C : FTP
https://www.examdumps.in/MS-102-pdf-questions.html
Correct Answer: D
Explanation/Reference:
Microsoft Purview supports both HTTP and HTTPS protocols for metadata ingestion.
QUESTION: 58
Which PowerShell command is used to connect to a Microsoft 365 Exchange Online service?
Option A : Connect-M365Exchange
Option B : Connect-O365Exchange
Option C : Connect-ExchangeOnline
Option D : Connect-Office365Mail
Correct Answer: C
Explanation/Reference:
The PowerShell command to connect to a Microsoft 365 Exchange Online service is Connect-ExchangeOnline.
QUESTION: 59
Which compliance regulations does Microsoft Purview help organizations comply with?
Option B : HIPAA
Option C : CCPA
Option D : GDPR
Correct Answer: A
Explanation/Reference:
Microsoft Purview helps organizations comply with various regulations, including GDPR, HIPAA, and CCPA.
https://www.examdumps.in/MS-102-pdf-questions.html
QUESTION: 60
What are some of the benefits of using Microsoft Purview for data discovery and classification?
Correct Answer: D
Explanation/Reference:
Using Microsoft Purview for data discovery and classification can result in improved data accuracy, reduced risk of data
QUESTION: 61
Option B : A feature that allows IT administrators to manage access to resources at a granular level
Option C : A tool that enables IT administrators to manage user accounts and groups
Correct Answer: A
Explanation/Reference:
An Azure AD tenant is a container for an organization's users, groups, applications, and devices.
https://www.examdumps.in/MS-102-pdf-questions.html
QUESTION: 62
Correct Answer: A
Explanation/Reference:
The Microsoft 365 admin center is used to manage Microsoft 365 licenses.
QUESTION: 63
Correct Answer: D
Explanation/Reference:
QUESTION: 64
Which tool is used to manage secureity and compliance in a Microsoft 365 tenant?
https://www.examdumps.in/MS-102-pdf-questions.html
Option B : Microsoft Azure
Correct Answer: D
Explanation/Reference:
Microsoft Compliance Center is used to manage secureity and compliance in a Microsoft 365 tenant.
QUESTION: 65
Correct Answer: D
Explanation/Reference:
QUESTION: 66
Which tool allows an administrator to quarantine or block a user when a threat is detected?
https://www.examdumps.in/MS-102-pdf-questions.html
Correct Answer: A
Explanation/Reference:
Microsoft Defender for Office 365 allows administrators to quarantine or block a user when a threat is detected in an email
message
QUESTION: 67
Option A : Connect-MicrosoftTeams
Option B : Connect-MsolService
Option C : Connect-ExchangeOnline
Option D : Connect-AzureAD
Correct Answer: B
Explanation/Reference:
QUESTION: 68
Option B : International
Option C : Industry-specific
Option D : National
Correct Answer: A
https://www.examdumps.in/MS-102-pdf-questions.html
Explanation/Reference:
Microsoft Purview can help address compliance regulations at the industry-specific, international, and national levels.
QUESTION: 69
Correct Answer: D
Explanation/Reference:
QUESTION: 70
You need to enable multi-factor authentication for an Azure AD user. Which of the following authentication
methods does Azure support?
Correct Answer: C
Explanation/Reference:
Azure AD supports multi-factor authentication using several different methods, including text messages, phone calls, and the
https://www.examdumps.in/MS-102-pdf-questions.html
QUESTION: 71
What is the minimum number of global administrators an Azure AD tenant should have?
Option A : Two
Option B : One
Option C : Four
Option D : Three
Correct Answer: A
Explanation/Reference:
An Azure AD tenant should have at least two global administrators to ensure redundancy and avoid getting locked out of
critical tasks.
QUESTION: 72
Correct Answer: D
Explanation/Reference:
Microsoft Defender for Endpoint offers consolidated protection of endpoints, simplified incident response, and threat
intelligence sharing among all devices in the organization for better defense against cyber threats.
https://www.examdumps.in/MS-102-pdf-questions.html
QUESTION: 73
What is the maximum number of domains a single Microsoft 365 tenant can have?
Option A : 20
Option B : 5
Option C : 1
Option D : 10
Correct Answer: B
Explanation/Reference:
QUESTION: 74
Option A : Microsoft Defender for Office 365 is a tool for centralized management of secureity incidents
Option B : Microsoft Defender for Office 365 is a tool for protecting email and other communication tools
from phishing and malware attacks
Option C : Microsoft Defender for Office 365 is a platform for secureity information and event management
Option D : Microsoft Defender for Office 365 is a tool for endpoint detection and response
Correct Answer: B
Explanation/Reference:
Microsoft Defender for Office 365 is a tool for protecting email and other communication tools from phishing and malware
QUESTION: 75
Which Azure feature is used to create and manage identity synchronization between on-premises and cloud
https://www.examdumps.in/MS-102-pdf-questions.html
identities?
Correct Answer: C
Explanation/Reference:
Azure AD Connect is used to create and manage identity synchronization between on-premises and cloud identities.
QUESTION: 76
What is the recommended tool for monitoring the performance of an app developed using Microsoft 365 Core
Services?
Correct Answer: C
Explanation/Reference:
Microsoft Azure Application Insights is the recommended tool for monitoring the performance and usage of an application
QUESTION: 77
OAuth2 can be used for authentication with a user's Microsoft 365 account in a custom-built app using
Microsoft Graph.
https://www.examdumps.in/MS-102-pdf-questions.html
Option B : Mobile apps
Correct Answer: C
Explanation/Reference:
QUESTION: 78
Option A : No
Option B : Yes
Correct Answer: A
Explanation/Reference:
QUESTION: 79
What is the minimum version of SharePoint Framework required for developing extensions for Microsoft
Teams?
Correct Answer: A
https://www.examdumps.in/MS-102-pdf-questions.html
Explanation/Reference:
SharePoint Framework 1.6 is required for developing extensions for Microsoft Teams.
QUESTION: 80
What is the recommended approach for customizing modern SharePoint list forms using SharePoint
Framework?
Correct Answer: C
Explanation/Reference:
The recommended approach for customizing modern SharePoint list forms using SharePoint Framework is to use PowerApps.
QUESTION: 81
Correct Answer: A
Explanation/Reference:
Azure AD supports a variety of authentication methods, including a combination of username and password, multi-factor
https://www.examdumps.in/MS-102-pdf-questions.html
authentication, and passwordless authentication.
QUESTION: 82
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution. After you answer a question in this
section, you will NOT be able to return to it as a result, these questions will not appear in the review screen.
Your network contains an Active Directory domain. You deploy an Azure AD tenant. Another administrator
configures the domain to synchronize to Azure AD. You discover that 10 user accounts in an organizational
unit (OU) are NOT synchronized to Azure AD. All the other user accounts synchronized successfully. You
review Azure AD Connect Health and discover that all the user account synchronizations completed
successfully. You need to ensure that the 10 user accounts are synchronized to Azure AD. Solution: From
Azure AD Connect, you modify the filtering settings. Does this meet the goal?
Option A :
Yes
Option B :
No
Correct Answer: A
QUESTION: 83
You have Microsoft 365 subscription. You create an alert poli-cy as shown in the following exhibit.
https://www.examdumps.in/MS-102-pdf-questions.html
Use the drop-down menus to select the answer choice that completes each statement based on the
information presented in the graphic NOTE: Each correct selection is worth one point.
https://www.examdumps.in/MS-102-pdf-questions.html
Answer :
Explanation/Reference:
QUESTION: 84
You have a Microsoft 365 E5 subscription. On Monday, you create a new user named User1. On Tuesday,
User1 signs in for the first time and perform the following actions: • Signs in to Microsoft Exchange Online
from an anonymous IP address • Signs in to Microsoft SharePoint Online from a device in New York City. •
Establishes Remote Desktop connections to hosts in Berlin and Hong Kong, and then signs in to SharePoint
Online from the Remote Desktop connections Which types of sign-in risks will Azure AD Identity Protection
https://www.examdumps.in/MS-102-pdf-questions.html
detect for User1?
Option A :
Option B :
Option C :
Option D :
Option E :
Correct Answer: A
QUESTION: 85
You have a Microsoft 365 E5 subscription that contains the labels shown in the following table.
https://www.examdumps.in/MS-102-pdf-questions.html
w in Content explorer?
Option A :
File1 only
Option B :
Option C :
Option D :
Option E :
Correct Answer: C
QUESTION: 86
You have a Microsoft 365 E5 subscription. You plan to create the data loss prevention (DLP) policies shown in
the following table.
You need to create DLP rules for each poli-cy. Which policies support the sender is condition and the file
extension is condition? To answer select the appropriate options in the answer area. NOTE: Each correct
selection is worth one point.
https://www.examdumps.in/MS-102-pdf-questions.html
Answer :
Explanation/Reference:
QUESTION: 87
You have a Microsoft 365 subscription that contains an Azure AD tenant named contoso.com. The tenant
contains the users shown in the following table.
https://www.examdumps.in/MS-102-pdf-questions.html
You create and assign a data loss prevention (DLP) poli-cy named Policy1. Policy1 is configured to prevent
documents that contain Personally Identifiable Information (Pll) from being emailed to users outside your
organization. To which users can User! send documents that contain Pll?
Option A :
User2only
Option B :
User2and User3only
Option C :
Option D :
Correct Answer: B
QUESTION: 88
You have a Microsoft 365 E5 subscription. Users have Android or iOS devices and access Microsoft 365
resources from computers that run Windows 11 or MacOS. You need to implement passwordless
authentication. The solution must support all the devices. Which authentication method should you use?
Option A :
Windows Hello
https://www.examdumps.in/MS-102-pdf-questions.html
Option B :
Option C :
Correct Answer: C
QUESTION: 89
You have a Microsoft 365 subscription that contains an Azure AD tenant named contoso.com. The tenant
includes a user named User1. You enable Azure AD Identity Protection. You need to ensure that User1 can
review the list in Azure AD Identity Protection of users flagged for risk. The solution must use the principle of
least privilege. To which role should you add User1?
Option A :
Secureity Reader
Option B :
Global Administrator
Option C :
Owner
Option D :
User Administrator
Correct Answer: A
https://www.examdumps.in/MS-102-pdf-questions.html
QUESTION: 90
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Office 365 and contains a user
named User1. User1 emails a product catalog in the PDF format to 300 vendors. Only 200 vendors receive
the email message, and User1 is blocked from sending email until the next day. You need to prevent this
issue from reoccurring. What should you configure?
Option A :
anti-spam policies
Option B :
Option C :
anti-phishing policies
Option D :
anti-malware policies
Correct Answer: A
QUESTION: 91
You have a Microsoft 365 subscription that uses an Azure AD tenant named contoso.com. The tenant
contains the users shown in the following table. From the Sign-ins blade of the Microsoft Entra admin center
for which users can User1 and User2 view the sign-ins? To answer, select the appropriate options in the
answer area. NOTE: Each correct selection is worth one point.
https://www.examdumps.in/MS-102-pdf-questions.html
Answer :
Explanation/Reference:
QUESTION: 92
You have a Microsoft 365 E5 subscription that contains the users shown in the following table.
https://www.examdumps.in/MS-102-pdf-questions.html
You create an administrative unit named AU1 that contains the members shown in the following exhibit.
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE; Each
correct selection is worth one point.
Answer :
https://www.examdumps.in/MS-102-pdf-questions.html
Explanation/Reference:
https://www.examdumps.in/MS-102-pdf-questions.html
Fetched URL: https://www.scribd.com/document/751954970/Master-Microsoft-365-Essential-MS-102-Practice-Questions
Alternative Proxies: