ExamGecko
Home Home / Microsoft / MS-102

Microsoft MS-102 Practice Test - Questions Answers, Page 38

Question list
Search
Search

List of questions

Search

Related questions











You have a Microsoft 365 subscription that uses Microsoft Defender for Endpoint.

All the devices in your organization are onboarded to Microsoft Defender for Endpoint.

You need to ensure that an alert is generated if malicious activity was detected on a device during the last 24 hours.

What should you do?

A.

From the Microsoft Purview compliance portal, create a data loss prevention (DLP) policy.

A.

From the Microsoft Purview compliance portal, create a data loss prevention (DLP) policy.

Answers
B.

From Alerts queue, create a suppression rule and assign an alert.

B.

From Alerts queue, create a suppression rule and assign an alert.

Answers
C.

From Advanced hunting, create a query and a detection rule.

C.

From Advanced hunting, create a query and a detection rule.

Answers
D.

From the Microsoft Purview compliance portal, create an audit log search.

D.

From the Microsoft Purview compliance portal, create an audit log search.

Answers
Suggested answer: C

HOTSPOT

You have a Microsoft 365 E5 subscription.

You plan to use a mailbox named Mailbox1 to analyze malicious email messages.

You need to configure Microsoft Defender for Office 365 to meet the following requirements:

* Ensure that incoming email is NOT filtered for Mailbox1.

* Detect impersonation and spoofing attacks on all other mailboxes in the subscription.

Which two settings should you configure? To answer, select the appropriate settings in the answer area.


Question 372
Correct answer: Question 372

You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365 and contains a mailbox named Mailbox1.

You plan to use Mailbox1 to collect and analyze unfiltered email messages.

You need to ensure that Defender for Office 365 takes no action on any inbound emails delivered to Mailbox1.

What should you do?

A.

Configure a retention policy for Mailbox1.

A.

Configure a retention policy for Mailbox1.

Answers
B.

Create a mail flow rule.

B.

Create a mail flow rule.

Answers
C.

Configure Mailbox! as a SecOps mailbox.

C.

Configure Mailbox! as a SecOps mailbox.

Answers
D.

Place a litigation hold on Mailbox1.

D.

Place a litigation hold on Mailbox1.

Answers
Suggested answer: D

HOTSPOT

You have a hybrid deployment of Azure AD that contains the users shown in the following table.

You need to identify which users can perform the following tasks:

* View sync errors in Azure AD Connect Health.

* Configure Azure AD Connect Health settings.

Which user should you identify for each task? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 374
Correct answer: Question 374

HOTSPOT

Your network contains an Active Directory domain and an Azure AD tenant.

You implement directory synchronization for all 10.000 users in the organization.

You automate the creation of 100 new user accounts.

You need to ensure that the new user accounts synchronize to Azure AD as quickly as possible.

Which command should you run? To answer, select the appropriate options in the answer area.


Question 375
Correct answer: Question 375

HOTSPOT

You have a Microsoft 365 Enterprise E5 subscription.

You add a cloud-based app named App1 to the Azure AD enterprise applications list.

You need to ensure that two-step verification is enforced for all user accounts the next time they connect to App1.

Which three settings should you configure from the policy? To answer, select the appropriate settings in the answer area.

NOTE: Each correct selection is worth one point.


Question 376
Correct answer: Question 376

HOTSPOT

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

Each user has a device with the Microsoft Authenticator app installed.

From Microsoft Authenticator settings for the subscription, the Enable and Target settings are configured as shown in the exhibit. (Click the Exhibit tab.)

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Question 377
Correct answer: Question 377

Your on-premises network contains an Active Directory domain.

You have a Microsoft 365 E5 subscription.

You plan to implement a hybrid configuration that has the following requirements:

* Minimizes the number of times users are prompted for credentials when they access Microsoft 365 resources

* Supports the use of Azure AD Identity Protection

You need to configure Azure AD Connect to support the planned implementation. Which two options should you select? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

Password Hash Synchronization

A.

Password Hash Synchronization

Answers
B.

Password writeback

B.

Password writeback

Answers
C.

Directory extension attribute sync

C.

Directory extension attribute sync

Answers
D.

Enable single sign-on

D.

Enable single sign-on

Answers
E.

Pass-through authentication

E.

Pass-through authentication

Answers
Suggested answer: A, B

Your company has three main offices and one branch office. The branch office is used for research.

The company plans to implement a Microsoft 365 tenant and to deploy multi-factor authentication.

You need to recommend a Microsoft 365 solution to ensure that multi-factor authentication is enforced only for users in the branch office.

What should you include in the recommendation?

A.

Azure AD password protection

A.

Azure AD password protection

Answers
B.

a Microsoft Intune device configuration profile

B.

a Microsoft Intune device configuration profile

Answers
C.

a Microsoft Intune device compliance policy

C.

a Microsoft Intune device compliance policy

Answers
D.

Azure AD conditional access

D.

Azure AD conditional access

Answers
Suggested answer: D

HOTSPOT

You have a Microsoft 365 E5 subscription.

You plan to implement identity protection by configuring a sign-in risk policy and a user risk policy. Which type of risk is detected by each policy? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 380
Correct answer: Question 380
Total 467 questions
Go to page: of 47