ExamGecko
Home Home / Microsoft / MS-102

Microsoft MS-102 Practice Test - Questions Answers, Page 44

Question list
Search
Search

List of questions

Search

Related questions











HOTSPOT

You have a Microsoft 365 E5 subscription that contains two users named [email protected] and [email protected] and a Microsoft SharePoint site named Site1.

You create a data loss prevention {DLP) policy named DLP1 that has the advanced DLP rules shown in the following table.

DLP1 is applied to Site1.

You have the files shown in the following table.

You copy the files to Site1.

low many notifications will each user receive? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 431
Correct answer: Question 431

You have a Microsoft 365 E5 subscription.

You are creating a data loss prevention (DLP) policy applied to the locations as shown in the following exhibit.

Which condition can you use in the DIP rules of the policy?

A.

sensitive info types

A.

sensitive info types

Answers
B.

sensitivity labels

B.

sensitivity labels

Answers
C.

content search queries

C.

content search queries

Answers
D.

keywords

D.

keywords

Answers
Suggested answer: A

You have a Microsoft 365 tenant.

You plan to manage incidents in the tenant by using the Microsoft Defender XDR. Which Microsoft service source will appear on the Incidents page of the Microsoft Defender portal?

A.

Microsoft Defender for Cloud Apps

A.

Microsoft Defender for Cloud Apps

Answers
B.

Microsoft Defender for Cloud

B.

Microsoft Defender for Cloud

Answers
C.

Azure Arc

C.

Azure Arc

Answers
D.

Azure Information Protection

D.

Azure Information Protection

Answers
Suggested answer: D

Your network contains an Active Directory forest.

You deploy Microsoft 365.

You plan to implement directory synchronization.

You need to recommend a security solution for the synchronized identities. The solution must meet the following requirements:

* Users must be able to authenticate successfully to Microsoft 365 services if Active Directory becomes unavailable.

* User passwords must be 10 characters or more.

Solution: Implement pass-through authentication and configure Microsoft Entra Password protection. Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Endpoint and Microsoft Intune.

All devices run Windows 11 and are Microsoft Entra joined.

You are alerted to a zero-day attack.

You need to identify which devices were affected by the attack and send a request to Intune administrators to update the affected devices.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

From Incidents & alerts, select the latest incident.

A.

From Incidents & alerts, select the latest incident.

Answers
B.

From Vulnerability management, open the security recommendation.

B.

From Vulnerability management, open the security recommendation.

Answers
C.

Select the affected devices and request remediation.

C.

Select the affected devices and request remediation.

Answers
D.

From Threat analytics, view the list of vulnerable devices.

D.

From Threat analytics, view the list of vulnerable devices.

Answers
Suggested answer: B, C

Your company has a Microsoft Entra tenant named contoso.com and a Microsoft 365 subscription. All users use Windows 10 devices to access Microsoft 365 apps. All the devices are in a workgroup.

You plan to implement passwordless sign-in to contoso.com.

You need to recommend changes to the infrastructure for the planned implementation. What should you include in the recommendation?

A.

Deploy the Microsoft Entra Connect provisioning agent.

A.

Deploy the Microsoft Entra Connect provisioning agent.

Answers
B.

Join all the devices to contoso.com.

B.

Join all the devices to contoso.com.

Answers
C.

Deploy Microsoft Entra Application Proxy.

C.

Deploy Microsoft Entra Application Proxy.

Answers
D.

Deploy the Microsoft Authenticate app.

D.

Deploy the Microsoft Authenticate app.

Answers
Suggested answer: D

You have a Microsoft 365 E5 subscription that contains a user named User1. You create an anti-phishing policy named Policy! that has the following settings:

* Include these users, groups and domains: User1

* Phishing email threshold: 3 - More Aggressive

User1 receives the email messages shown in the following table.

Which messages are phishing email?

A.

Mail4 only

A.

Mail4 only

Answers
B.

Mail3 and Mail4 only

B.

Mail3 and Mail4 only

Answers
C.

Mail2, Mail3, and Mail4 only

C.

Mail2, Mail3, and Mail4 only

Answers
D.

Mail1, Mail2, Mail3, and Mail4

D.

Mail1, Mail2, Mail3, and Mail4

Answers
Suggested answer: B

You have a Microsoft 365 E5 subscription. You create a data loss prevention (DLP) policy named DLP1.

You need to ensure that endpoint rule actions are available in the advanced DLP rules for DLP1. To which location should you apply DLP1?

A.

Instances

A.

Instances

Answers
B.

Devices

B.

Devices

Answers
C.

OneDrive accounts

C.

OneDrive accounts

Answers
D.

On-premises repositories

D.

On-premises repositories

Answers
Suggested answer: B

You have a Microsoft 365 E5 subscription and use Microsoft Defender for Endpoint Defender for Endpoint has tamper protection enabled.

You have a device named Device1 that is onboarded to Defender for Endpoint. You need to configure antivirus and real-time protection for Device1.

What should you do in the Microsoft Defender portal?

A.

Enable troubleshooting mode.

A.

Enable troubleshooting mode.

Answers
B.

Initiate a live response session.

B.

Initiate a live response session.

Answers
C.

Isolate Device1.

C.

Isolate Device1.

Answers
D.

Create a device group.

D.

Create a device group.

Answers
Suggested answer: A

You have a Microsoft 365 E5 subscription. Administrators are issued FID02 security keys.

You need to create a Conditional Access policy that will use a FID02 security key as an authentication method. Which Access controls option should you select for the policy?

A.

Require token protection for sign-in sessions

A.

Require token protection for sign-in sessions

Answers
B.

Require approved client app

B.

Require approved client app

Answers
C.

Require authentication strength

C.

Require authentication strength

Answers
D.

Require multifactor authentication

D.

Require multifactor authentication

Answers
Suggested answer: C
Total 467 questions
Go to page: of 47