ExamGecko
Home Home / Microsoft / MS-102

Microsoft MS-102 Practice Test - Questions Answers, Page 37

Question list
Search
Search

List of questions

Search

Related questions











DRAG DROP

You have a Microsoft 365 subscription.

You need to meet the following requirements:

* Report a Microsoft 365 service issue.

* Request help on how to add a new user to an Azure AD tenant.

What should you use in the Microsoft 365 admin center? To answer, drag the appropriate features to the correct requirements. Each feature may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.


Question 361
Correct answer: Question 361

You have a Microsoft 365 subscription.

You plan to use Adoption Score and need to ensure that it can obtain device and software metrics.

What should you do?

A.

Enable Endpoint analytics.

A.

Enable Endpoint analytics.

Answers
B.

Run the Microsoft 365 network connectivity test on each device.

B.

Run the Microsoft 365 network connectivity test on each device.

Answers
C.

Enable privileged access.

C.

Enable privileged access.

Answers
D.

Configure Support integration.

D.

Configure Support integration.

Answers
Suggested answer: A

HOTSPOT

You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint site named Sitel. You need to perform the following tasks:

* Create a sensitive info type named SIT1 based on a regular expression.

* Add a watermark to all new documents that are matched by SIT1.

Which two settings should you use in the Microsoft Purview compliance portal? To answer, select the appropriate settings in the answer area.

NOTE: Each correct selection is worth one point.


Question 363
Correct answer: Question 363

HOTSPOT

Your company uses Microsoft Defender for Endpoint.

The devices onboarded to Microsoft Defender for Endpoint are shown in the following table.

The alerts visible in the Microsoft Defender for Endpoint alerts queue are shown in the following table.

You create a suppression rule that has the following settings:

* Triggering IOC: Any IOC

* Action: Hide alert

* Suppression scope: Alerts on ATP1 device group

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point


Question 364
Correct answer: Question 364

You have a Microsoft 365 E5 subscription.

You need to be alerted when Microsoft 365 Defender detects high-severity incidents.

What should you use?

A.

a custom detection rule

A.

a custom detection rule

Answers
B.

a threat policy

B.

a threat policy

Answers
C.

an alert policy

C.

an alert policy

Answers
D.

a notification rule

D.

a notification rule

Answers
Suggested answer: C

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Office 365 and contains a user named User1.

User1 emails a product catalog in the PDF format to 300 vendors. Only 200 vendors receive the email message, and User1 is blocked from sending email until the next day.

You need to prevent this issue from reoccurring.

What should you configure?

A.

anti-spam policies

A.

anti-spam policies

Answers
B.

Safe Attachments policies

B.

Safe Attachments policies

Answers
C.

anti-phishing policies

C.

anti-phishing policies

Answers
D.

anti-malware policies

D.

anti-malware policies

Answers
Suggested answer: A

HOTSPOT

You have a Microsoft 365 E5 subscription.

All corporate Windows 11 devices are managed by using Microsoft Intune and onboarded to Microsoft Defender for Endpoint.

You need to meet the following requirements:

* View an assessment of the device configurations against the Center for Internet Security (CIS) vl.0.0 benchmark.

* Protect a folder named C:\Folder1 from being accessed by untrusted applications on the devices.

What should you do? To answer, select the appropriate options in the answer area.


Question 367
Correct answer: Question 367

HOTSPOT

You have a Microsoft 365 E5 subscription.

You need to configure Microsoft Defender for Office 365 to meet the following requirements:

* A user's email sending patterns must be used to minimize false positives for spoof protection.

* Documents uploaded to Microsoft Teams, SharePoint Online, and OneDrive must be protected by using Defender for Office 365.

What should you configure for each requirement? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.


Question 368
Correct answer: Question 368

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Endpoint.

You plan to perform device discovery and authenticated scans of network devices.

You install and register the network scanner on a device named Device1.

What should you do next?

A.

Connect Defender for Endpoint to Microsoft Intune.

A.

Connect Defender for Endpoint to Microsoft Intune.

Answers
B.

Apply for Microsoft Threat Experts - Targeted Attack Notifications.

B.

Apply for Microsoft Threat Experts - Targeted Attack Notifications.

Answers
C.

Create an assessment job.

C.

Create an assessment job.

Answers
D.

Download and run an onboarding package.

D.

Download and run an onboarding package.

Answers
Suggested answer: C

You have a Microsoft 365 subscription.

You need to receive a notification each time a user in the service desk department grants Full Access permissions for a user mailbox.

What should you configure?

A.

a data loss prevention (DLP) policy

A.

a data loss prevention (DLP) policy

Answers
B.

an alert policy

B.

an alert policy

Answers
C.

an audit search

C.

an audit search

Answers
D.

an insider risk management policy

D.

an insider risk management policy

Answers
Suggested answer: B
Total 467 questions
Go to page: of 47