Microsoft MS-102 Practice Test - Questions Answers, Page 44
List of questions
Related questions
HOTSPOT
You have a Microsoft 365 E5 subscription that contains two users named [email protected] and [email protected] and a Microsoft SharePoint site named Site1.
You create a data loss prevention {DLP) policy named DLP1 that has the advanced DLP rules shown in the following table.
DLP1 is applied to Site1.
You have the files shown in the following table.
You copy the files to Site1.
low many notifications will each user receive? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You have a Microsoft 365 E5 subscription.
You are creating a data loss prevention (DLP) policy applied to the locations as shown in the following exhibit.
Which condition can you use in the DIP rules of the policy?
sensitive info types
sensitivity labels
content search queries
keywords
You have a Microsoft 365 tenant.
You plan to manage incidents in the tenant by using the Microsoft Defender XDR. Which Microsoft service source will appear on the Incidents page of the Microsoft Defender portal?
Microsoft Defender for Cloud Apps
Microsoft Defender for Cloud
Azure Arc
Azure Information Protection
Your network contains an Active Directory forest.
You deploy Microsoft 365.
You plan to implement directory synchronization.
You need to recommend a security solution for the synchronized identities. The solution must meet the following requirements:
* Users must be able to authenticate successfully to Microsoft 365 services if Active Directory becomes unavailable.
* User passwords must be 10 characters or more.
Solution: Implement pass-through authentication and configure Microsoft Entra Password protection. Does this meet the goal?
Yes
No
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Endpoint and Microsoft Intune.
All devices run Windows 11 and are Microsoft Entra joined.
You are alerted to a zero-day attack.
You need to identify which devices were affected by the attack and send a request to Intune administrators to update the affected devices.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
From Incidents & alerts, select the latest incident.
From Vulnerability management, open the security recommendation.
Select the affected devices and request remediation.
From Threat analytics, view the list of vulnerable devices.
Your company has a Microsoft Entra tenant named contoso.com and a Microsoft 365 subscription. All users use Windows 10 devices to access Microsoft 365 apps. All the devices are in a workgroup.
You plan to implement passwordless sign-in to contoso.com.
You need to recommend changes to the infrastructure for the planned implementation. What should you include in the recommendation?
Deploy the Microsoft Entra Connect provisioning agent.
Join all the devices to contoso.com.
Deploy Microsoft Entra Application Proxy.
Deploy the Microsoft Authenticate app.
You have a Microsoft 365 E5 subscription that contains a user named User1. You create an anti-phishing policy named Policy! that has the following settings:
* Include these users, groups and domains: User1
* Phishing email threshold: 3 - More Aggressive
User1 receives the email messages shown in the following table.
Which messages are phishing email?
Mail4 only
Mail3 and Mail4 only
Mail2, Mail3, and Mail4 only
Mail1, Mail2, Mail3, and Mail4
You have a Microsoft 365 E5 subscription. You create a data loss prevention (DLP) policy named DLP1.
You need to ensure that endpoint rule actions are available in the advanced DLP rules for DLP1. To which location should you apply DLP1?
Instances
Devices
OneDrive accounts
On-premises repositories
You have a Microsoft 365 E5 subscription and use Microsoft Defender for Endpoint Defender for Endpoint has tamper protection enabled.
You have a device named Device1 that is onboarded to Defender for Endpoint. You need to configure antivirus and real-time protection for Device1.
What should you do in the Microsoft Defender portal?
Enable troubleshooting mode.
Initiate a live response session.
Isolate Device1.
Create a device group.
You have a Microsoft 365 E5 subscription. Administrators are issued FID02 security keys.
You need to create a Conditional Access policy that will use a FID02 security key as an authentication method. Which Access controls option should you select for the policy?
Require token protection for sign-in sessions
Require approved client app
Require authentication strength
Require multifactor authentication
Question