ExamGecko
Home Home / Microsoft / MS-102

Microsoft MS-102 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











On which server should you use the Defender for identity sensor?

A.

Server1

A.

Server1

Answers
B.

Server2

B.

Server2

Answers
C.

Server3

C.

Server3

Answers
D.

Server4

D.

Server4

Answers
E.

Servers5

E.

Servers5

Answers
Suggested answer: A

Explanation:

However, if the case study had required that the DCs can't have any s/w installed, then the answer would have been a standalone sensor on Server2. In this scenario, the given answer is correct. BTW, ATP now known as Defender for Identity.

You need to meet the technical requirement for the EU PII data.

What should you create?

A.

a retention policy from the Security & Compliance admin center.

A.

a retention policy from the Security & Compliance admin center.

Answers
B.

a retention policy from the Exchange admin center

B.

a retention policy from the Exchange admin center

Answers
C.

a data loss prevention (DLP) policy from the Exchange admin center

C.

a data loss prevention (DLP) policy from the Exchange admin center

Answers
D.

a data loss prevention (DLP) policy from the Security & Compliance admin center

D.

a data loss prevention (DLP) policy from the Security & Compliance admin center

Answers
Suggested answer: A

Explanation:

https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies

EU PII wants both documents and email message to be preserved so S&C Admin Center for Retention. If this was for Email only, this probably could have been done in EAC.

You need to meet the technical requirement for large-volume document retrieval. What should you create?

A.

a data loss prevention (DLP) policy from the Security & Compliance admin center

A.

a data loss prevention (DLP) policy from the Security & Compliance admin center

Answers
B.

an alert policy from the Security & Compliance admin center

B.

an alert policy from the Security & Compliance admin center

Answers
C.

a file policy from Microsoft Cloud App Security

C.

a file policy from Microsoft Cloud App Security

Answers
D.

an activity policy from Microsoft Cloud App Security

D.

an activity policy from Microsoft Cloud App Security

Answers
Suggested answer: D

Explanation:

https://docs.microsoft.com/en-us/office365/securitycompliance/activity-policies-and-alerts

DRAG DROP

You need to meet the requirement for the legal department.

Which three actions should you perform in sequence from the Security & Compliance admin center? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Question 34
Correct answer: Question 34

Explanation:

https://www.sherweb.com/blog/ediscovery-office-365/

HOTSPOT

You need to meet the technical requirement for log analysis.

What is the minimum number of data sources and log collectors you should create from Microsoft Cloud App Security? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 35
Correct answer: Question 35

Explanation:

https://docs.microsoft.com/en-us/cloud-app-security/discovery-docker

Which report should the New York office auditors view?

A.

DLP policy matches

A.

DLP policy matches

Answers
B.

DLP false positives and overrides

B.

DLP false positives and overrides

Answers
C.

DLP incidents

C.

DLP incidents

Answers
D.

Top Senders and Recipients

D.

Top Senders and Recipients

Answers
Suggested answer: C

Explanation:

https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies

This report also shows policy matches over time, like the policy matches report. However, the policy matches report shows matches at a rule level; for example, if an email matched three different rules, the policy matches report shows three different line items. By contrast, the incidents report shows matches at an item level; for example, if an email matched three different rules, the incidents report shows a single line item for that piece of content. Because the report counts are aggregated differently, the policy matches report is better for identifying matches with specific rules and fine tuning DLP policies. The incidents report is better for identifying specific pieces of content that are problematic for your DLP policies.

HOTSPOT

You need to meet the technical requirement for the SharePoint administrator. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.


Question 37
Correct answer: Question 37

Explanation:

https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-compliance#step-3-filter-the-search-results

You need to recommend a solution for the security administrator. The solution must meet the technical requirements.

What should you include in the recommendation?

A.

Microsoft Azure Active Directory (Azure AD) Privileged Identity Management

A.

Microsoft Azure Active Directory (Azure AD) Privileged Identity Management

Answers
B.

Microsoft Azure Active Directory (Azure AD) Identity Protection

B.

Microsoft Azure Active Directory (Azure AD) Identity Protection

Answers
C.

Microsoft Azure Active Directory (Azure AD) conditional access policies

C.

Microsoft Azure Active Directory (Azure AD) conditional access policies

Answers
D.

Microsoft Azure Active Directory (Azure AD) authentication methods

D.

Microsoft Azure Active Directory (Azure AD) authentication methods

Answers
Suggested answer: B

Explanation:

https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-access-conditions#sign-in-risk states clearly that Sign-in risk

You need to protect the U.S. PII data to meet the technical requirements.

What should you create?

A.

a data loss prevention (DLP) policy that contains a domain exception

A.

a data loss prevention (DLP) policy that contains a domain exception

Answers
B.

a Security & Compliance retention policy that detects content containing sensitive data

B.

a Security & Compliance retention policy that detects content containing sensitive data

Answers
C.

a Security & Compliance alert policy that contains an activity

C.

a Security & Compliance alert policy that contains an activity

Answers
D.

a data loss prevention (DLP) policy that contains a user override

D.

a data loss prevention (DLP) policy that contains a user override

Answers
Suggested answer: A

Explanation:

This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.

To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study.

At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section.

HOTSPOT

You have a Microsoft 365 subscription.

Your network uses an IP address space of 51.40.15.0/24.

An Exchange Online administrator recently created a role named Role1 from a computer on the network.

You need to identify the name of the administrator by using an audit log search.

For which activities should you search and by which field should you filter in the audit log search? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 40
Correct answer: Question 40
Total 467 questions
Go to page: of 47