ExamGecko
Home Home / Microsoft / MS-102

Microsoft MS-102 Practice Test - Questions Answers, Page 46

Question list
Search
Search

List of questions

Search

Related questions











HOTSPOT

You have a Microsoft 365 subscription.

You integrate Microsoft Defender for Cloud Apps with Microsoft Defender for Endpoint.

You need to create a policy to block users from accessing discovered apps that have a risk score of 4 or lower.

Which two settings should you configure? To answer, select the appropriate settings in the answer area.

NOTE: Each correct selection is worth one point.


Question 451
Correct answer: Question 451

You have a Microsoft J65 E5 subscription.

You integrate Microsoft Defender for Endpoint with Microsoft Intune.

You need to ensure that devices automatically onboard to Defender for Endpoint when they are enrolled in Intune.

Solution: You enable co-management.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: A

You have a Microsoft J65 E5 subscription.

You integrate Microsoft Defender for Endpoint with Microsoft Intune.

You need to ensure that devices automatically onboard to Defender for Endpoint when they are enrolled in Intune.

Solution: You configure a device configuration profile.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Your network contains an on-premises Active Directory domain named contoso.com. The domain contains the users shown in the following table.

The domain syncs to a Microsoft Entra tenant named contoso.com as shown in the exhibit. (Click the Exhibit tab.)

User2 fails to authenticate to the Microsoft Entra tenant when signing in as [email protected]

You need to ensure that User2 can access the resources in Microsoft Entra ID.

Solution: From the Microsoft Entra admin center, you add <abrlkam.com as a custom domain You insttud User2 to sign in as [email protected]

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: A

You have a Microsoft 365 E5 subscription.

You create the users shown in the following table.

You plan to use Microsoft Entra ID Protection.

Which users will be added automatically to the Users at risk detected alerts list?

A.

Admin1 only

A.

Admin1 only

Answers
B.

Admin2 only

B.

Admin2 only

Answers
C.

Admin1 and Admin2 only

C.

Admin1 and Admin2 only

Answers
D.

Admin1 and Admin3 only

D.

Admin1 and Admin3 only

Answers
E.

Admin1, Admin2, and Admin3

E.

Admin1, Admin2, and Admin3

Answers
Suggested answer: D

Your on-premises network contains an Active Directory domain.

You have a Microsoft 365 subscription.

You need to sync the domain with the subscription. The solution must meet the following requirements:

* On-premises Active Directory password complexity policies must be enforced.

* Users must be able to use Microsoft Entra Self-Service Password Reset (SSPR).

What should you use?

A.

Microsoft Entra ID Protection

A.

Microsoft Entra ID Protection

Answers
B.

Microsoft Entra Seamless Single Sign-On (Microsoft Entra Seamless SSO)

B.

Microsoft Entra Seamless Single Sign-On (Microsoft Entra Seamless SSO)

Answers
C.

pass-through authentication

C.

pass-through authentication

Answers
D.

password hash synchronization

D.

password hash synchronization

Answers
Suggested answer: C

Your company has three main offices and one branch office. The branch office is used for research.

The company plans to implement a Microsoft 365 tenant and to deploy multi-factor authentication.

You need to recommend a Microsoft 365 solution to ensure that multi-factor authentication is enforced only for users in the branch office.

What should you include in the recommendation?

A.

Microsoft Entra conditional access

A.

Microsoft Entra conditional access

Answers
B.

a Microsoft Intune device compliance policy

B.

a Microsoft Intune device compliance policy

Answers
C.

a Microsoft Intune device configuration profile

C.

a Microsoft Intune device configuration profile

Answers
D.

Microsoft Entra password protection

D.

Microsoft Entra password protection

Answers
Suggested answer: A

Youi network contains an Active Directory domain.

You have a Microsoft Entra tenant that has Security defaults disabled.

Microsoft Entra Connect Sync is configured for directory synchronization. Password hash synchronization and pass-through authentication are disabled.

You need to enable Microsoft Entra ID Protection to detect leaked credentials.

What should you do first?

A.

From Microsoft Entra Connect, enable password hash synchronization.

A.

From Microsoft Entra Connect, enable password hash synchronization.

Answers
B.

From the Microsoft Entra admin center, enable Security defaults.

B.

From the Microsoft Entra admin center, enable Security defaults.

Answers
C.

From Microsoft Entra Connect, enable pass-through authentication.

C.

From Microsoft Entra Connect, enable pass-through authentication.

Answers
D.

From the Microsoft Entra admin center, configure verifiable credentials.

D.

From the Microsoft Entra admin center, configure verifiable credentials.

Answers
Suggested answer: A

You have a Microsoft 365 E5 subscription.

You plan to create an anti-malware policy named Policy1.

You need to ensure that Policy1 can detect malicious email messages that were already delivered to a user's mailbox.

What should you do in the Microsoft Defender portal?

A.

Enable zero-hour auto purge (ZAP).

A.

Enable zero-hour auto purge (ZAP).

Answers
B.

Modify the common attachments filter.

B.

Modify the common attachments filter.

Answers
C.

Configure a quarantine policy.

C.

Configure a quarantine policy.

Answers
D.

Enable enhanced filtering.

D.

Enable enhanced filtering.

Answers
Suggested answer: A

You have a Microsoft 365 E5 subscription that contains devices onboarded to Microsoft Defender for Endpoint. You integrate Microsoft Defender for Cloud Apps with Defender for Endpoint. You need identify which cloud apps and services were used most during the last 30 days What should you do?

A.

Generate a Cloud Discovery snapshot report.

A.

Generate a Cloud Discovery snapshot report.

Answers
B.

Generate a monthly security summary report

B.

Generate a monthly security summary report

Answers
C.

Create a threat analytics alert notification.

C.

Create a threat analytics alert notification.

Answers
D.

Generate a Cloud Discovery executive report

D.

Generate a Cloud Discovery executive report

Answers
Suggested answer: B
Total 467 questions
Go to page: of 47