ExamGecko
Home Home / Microsoft / MS-102

Microsoft MS-102 Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











You have a Microsoft 365 E5 subscription that has Microsoft Defender for Endpoint integrated with Microsoft Endpoint Manager.

Devices are onboarded by using Microsoft Defender for Endpoint.

You plan to block devices based on the results of the machine risk score calculated by Microsoft Defender for Endpoint.

What should you create first?

A.

a device configuration policy

A.

a device configuration policy

Answers
B.

a device compliance policy

B.

a device compliance policy

Answers
C.

a conditional access policy

C.

a conditional access policy

Answers
D.

an endpoint detection and response policy

D.

an endpoint detection and response policy

Answers
Suggested answer: B

Explanation:

https://docs.microsoft.com/en-us/mem/intune/protect/advanced-threat-protection-configure

HOTSPOT

You have a Microsoft 365 subscription that contains three groups named All users, Sales team, and Office users, and two users shown in the following table.

In Microsoft Endpoint Manager, you have the Policies for Office apps settings shown in the following exhibit.

The policies use the settings shown in the following table.

What is the default share folder location for User1 and the default Office theme for User2? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 132
Correct answer: Question 132

Explanation:

https://docs.microsoft.com/en-us/deployoffice/overview-office-cloud-policy-service

You have a Microsoft 365 tenant that contains a Windows 10 device. The device is onboarded to Microsoft Defender for Endpoint.

From Microsoft Defender Security Center, you perform a security investigation.

You need to run a PowerShell script on the device to collect forensic information.

Which action should you select on the device page?

A.

Initiate Live Response Session

A.

Initiate Live Response Session

Answers
B.

Initiate Automated Investigation

B.

Initiate Automated Investigation

Answers
C.

Collect investigation package

C.

Collect investigation package

Answers
D.

Go hunt

D.

Go hunt

Answers
Suggested answer: A

Explanation:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/live-response?view=o365-worldwide

You have a Microsoft 365 E5 subscription.

You plan to implement Microsoft 365 compliance policies to meet the following requirements:

Identify documents that are stored in Microsoft Teams and SharePoint Online that contain Personally Identifiable Information (PII).

Report on shared documents that contain PII.

What should you create?

A.

an alert policy

A.

an alert policy

Answers
B.

a data loss prevention (DLP) policy

B.

a data loss prevention (DLP) policy

Answers
C.

a retention policy

C.

a retention policy

Answers
D.

a Microsoft Cloud App Security policy

D.

a Microsoft Cloud App Security policy

Answers
Suggested answer: B

Explanation:

https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide

HOTSPOT

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

In Microsoft Endpoint Manager, you have the Policies for Office apps settings shown in the following table.

The policies use the settings shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Question 135
Correct answer: Question 135

Explanation:

https://docs.microsoft.com/en-us/deployoffice/overview-office-cloud-policy-service

You have a Microsoft 365 tenant.

You plan to enable BitLocker Disk Encryption (BitLocker) automatically for all Windows 10 devices that enroll in Microsoft Intune.

What should you use?

A.

an attack surface reduction (ASR) policy

A.

an attack surface reduction (ASR) policy

Answers
B.

an app configuration policy

B.

an app configuration policy

Answers
C.

a device compliance policy

C.

a device compliance policy

Answers
D.

a device configuration profile

D.

a device configuration profile

Answers
Suggested answer: D

Explanation:

https://docs.microsoft.com/en-us/mem/intune/protect/encrypt-devices

You have a Microsoft 365 tenant that contains 500 Windows 10 devices and a Microsoft Endpoint Manager device compliance policy.

You need to ensure that only devices marked as compliant can access Microsoft Office 365 apps.

Which policy type should you configure?

A.

conditional access

A.

conditional access

Answers
B.

account protection

B.

account protection

Answers
C.

attack surface reduction (ASR)

C.

attack surface reduction (ASR)

Answers
D.

Endpoint detection and response

D.

Endpoint detection and response

Answers
Suggested answer: A

Explanation:

https://docs.microsoft.com/en-us/mem/intune/protect/device-compliance-get-started

You have a Microsoft 365 tenant that contains a Windows 10 device named Device1 and the Microsoft Endpoint Manager policies shown in the following table.

The policies are assigned to Device1.

Which policy settings will be applied to Device1?

A.

only the settings of Policy1

A.

only the settings of Policy1

Answers
B.

only the settings of Policy2

B.

only the settings of Policy2

Answers
C.

only the settings of Policy3

C.

only the settings of Policy3

Answers
D.

no settings

D.

no settings

Answers
Suggested answer: D

HOTSPOT

You have a Microsoft 365 E5 tenant that contains 100 Windows 10 devices.

You plan to attack surface reduction (ASR) rules for the Windows 10 devices.

You configure the ASR rules in audit mode and collect audit data in a Log Analytics workspace.

You need to find the ASR rules that match the activities on the devices.

How should you complete the Kusto query? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 139
Correct answer: Question 139

Explanation:

https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/demystifying-attack-surface-reduction-rules-part-3/ba-p/1360968

HOTSPOT

You have a Microsoft 365 E5 tenant that connects to Microsoft Defender for Endpoint.

You have devices enrolled in Microsoft Intune as shown in the following table.

You plan to use risk levels in Microsoft Defender for Endpoint to identify whether a device is compliant. Noncompliant devices must be blocked from accessing corporate resources.

You need to identify which devices can be onboarded to Microsoft Defender for Endpoint, and which Endpoint security policies must be configured.

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 140
Correct answer: Question 140

Explanation:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/configure-machines-onboarding?view=o365-worldwide

Total 467 questions
Go to page: of 47