ExamGecko
Home Home / Microsoft / MS-102

Microsoft MS-102 Practice Test - Questions Answers, Page 40

Question list
Search
Search

List of questions

Search

Related questions











Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it as a result these questions will not appear in the review screen.

Your network contains an Active Directory forest.

You deploy Microsoft 365.

You plan to implement directory synchronization.

You need to recommend a security solution for the synchronized identities. The solution must meet the following requirements:

* Users must be able to authenticate successfully to Microsoft 365 services if Active Directory becomes unavailable.

* User passwords must be 10 characters or more.

Solution: implement password hash synchronization and modify the password settings from the Default Domain Policy in Active Directory.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: A

Your network contains an Active Directory forest named Contoso. Local.

You have a Microsoft 365 subscription.

You plan to implement a directory synchronization solution that will use password hash synchronization.

From the Microsoft 365 admin center, you successfully verify the contoso.com domain name.

You need to prepare the environment for the planned directory synchronization solution.

What should you do first?

A.

From Active Directory Domains and Trusts, add contoso.com as a UPN suffix.

A.

From Active Directory Domains and Trusts, add contoso.com as a UPN suffix.

Answers
B.

From the Microsoft 365 admin center verify the Contoso. Local domain name.

B.

From the Microsoft 365 admin center verify the Contoso. Local domain name.

Answers
C.

From the public DNS zone of contoso.com, add a new mail exchanger (MX) record.

C.

From the public DNS zone of contoso.com, add a new mail exchanger (MX) record.

Answers
D.

From Active Directory Users and Computers, modify the UPN suffix for all users.

D.

From Active Directory Users and Computers, modify the UPN suffix for all users.

Answers
Suggested answer: A

HOTSPOT

You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1 and the users shown in the following table.

The devices are configured as shown in the following table.

You have a Conditional Access policy named CAPolicy1 that has the following settings:

1. Assignments

Users or workload identities: Group1

Cloud apps or actions: Office 365 SharePoint Online

Conditions

- Filter for devices: Exclude filtered devices from the policy

- Rule syntax: device.displayName -startsWith 'Device'

2. Access controls

Grant

- Grant: Block access

Session: 0 controls selected

3. Enable policy: On

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Question 393
Correct answer: Question 393

Explanation:

https://learn.microsoft.com/en-us/azure/active-directory/devices/howto-hybrid-azure-ad-join

https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/howto-conditional-access-policy-compliant-device

You have a Microsoft 365 E5 subscription that uses Endpoint security.

You need to create a group and assign the Endpoint Security Manager role to the group.

Which type of group can you use?

A.

Microsoft 365 only

A.

Microsoft 365 only

Answers
B.

security only

B.

security only

Answers
C.

mail-enabled security and security only

C.

mail-enabled security and security only

Answers
D.

mail-enabled security, Microsoft 365, and security only

D.

mail-enabled security, Microsoft 365, and security only

Answers
E.

distribution, mail-enabled security, Microsoft 365, and security

E.

distribution, mail-enabled security, Microsoft 365, and security

Answers
Suggested answer: D

You have a Microsoft 365 E5 subscription.

You onboard all devices to Microsoft Defender for Endpoint

You need to use Defender for Endpoint to block access to a malicious website at www.contoso.com.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct answer is worth one point.

A.

Create a web content filtering policy.

A.

Create a web content filtering policy.

Answers
B.

Configure an enforcement scope.

B.

Configure an enforcement scope.

Answers
C.

Enable Custom network indicators.

C.

Enable Custom network indicators.

Answers
D.

Create an indicator.

D.

Create an indicator.

Answers
E.

Enable automated investigation.

E.

Enable automated investigation.

Answers
Suggested answer: A, C

HOTSPOT

You have a Microsoft 365 E5 subscription that contains a user named User1 and the administrators shown in the following table.

User1 reports that after sending 1,000 email messages in the morning, the user is blocked from sending additional emails. You need to identify the following:

* Which administrators can unblock User1

* What to configure to allow User1 to send at least 2,000 emails per day without being blocked

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 396
Correct answer: Question 396

HOTSPOT

Your company uses Microsoft Defender for Endpoint. Microsoft Defender for Endpoint contains the device groups shown in the following table.

You onboard computers to Microsoft Defender for Endpoint as shown in the following table.

Of which groups are Computer! and Computed members? To answer, select the appropriate options in The answer area.

NOTE: Each correct selection is worth one point.


Question 397
Correct answer: Question 397

HOTSPOT

You have a Microsoft 365 E5 subscription that contains the devices shown in the following table.

At 08:00. you create an incident notification rule that has the following configurations:

* Name: Notification!

* Notification settings

o Notify on alert seventy: Low

o Device group scope: All (3)

o Details: First notification per incident

* Recipients: [email protected], [email protected]

At 08:02. you create an incident notification rule that has the following configurations:

* Name: Notification

* Notification settings

o Notify on alert severity: Low. Medium

o Device group scope: DevtceGroup1, DeviceGroup2

* Recipients: [email protected]

in Microsoft 365 Defender, alerts are logged as shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No1.

NOTE: Each correct selection is worth one point.


Question 398
Correct answer: Question 398

HOTSPOT

You have Microsoft 365 subscription.

You create an alert policy as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic

NOTE: Each correct selection is worth one point.


Question 399
Correct answer: Question 399

HOTSPOT

You have a Microsoft 365 subscription that contains the administrative units shown in the following table.

The groups contain the members shown in the following table.

The users are assigned the roles shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE; Each correct selection is worth one point.


Question 400
Correct answer: Question 400
Total 467 questions
Go to page: of 47