ExamGecko
Home Home / Microsoft / MS-102

Microsoft MS-102 Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











HOTSPOT

You have a Microsoft 365 subscription that contains the users in the following table.

In Microsoft Endpoint Manager, you create two device type restrictions that have the settings shown in the following table.

In Microsoft Endpoint Manager, you create three device limit restrictions that have the settings shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Question 61
Correct answer: Question 61

Your company has digitally signed applications.

You need to ensure that Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) considers the digitally signed applications safe and never analyzes them.

What should you create in the Microsoft Defender Security Center?

A.

a custom detection rule

A.

a custom detection rule

Answers
B.

an allowed/blocked list rule

B.

an allowed/blocked list rule

Answers
C.

an alert suppression rule

C.

an alert suppression rule

Answers
D.

an indicator

D.

an indicator

Answers
Suggested answer: D

Explanation:

https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/manage-indicators

HOTSPOT

You have a Microsoft 365 E5 subscription that contains two users named Admin1 and Admin2.

All users are assigned a Microsoft 365 Enterprise E5 license and auditing is turned on.

You create the audit retention policy shown in the exhibit. (Click the Exhibit tab.)

After Policy1 is created, the following actions are performed:

Admin1 creates a user named User1.

Admin2 creates a user named User2.

How long will the audit events for the creation of User1 and User2 be retained? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 63
Correct answer: Question 63

Explanation:

https://docs.microsoft.com/en-us/microsoft-365/compliance/audit-log-retention-policies?view=o365-worldwide

You implement Microsoft Azure Advanced Threat Protection (Azure ATP).

You have an Azure ATP sensor configured as shown in the following exhibit.

How long after the Azure ATP cloud service is updated will the sensor update?

A.

20 hours

A.

20 hours

Answers
B.

12 hours

B.

12 hours

Answers
C.

7 hours

C.

7 hours

Answers
D.

48 hours

D.

48 hours

Answers
Suggested answer: B

HOTSPOT

You have a Microsoft 365 subscription that contains a Microsoft SharePoint Online site named Site1. Site1 has he files in the following table.

The Site1 users are assigned the roles shown in the following table.

You create a data less prevention (DLP) policy names Policy1 as shown in the following exhibit.

How many files will be visible to user1 and User2 after Policy' is applied to answer, selected select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 65
Correct answer: Question 65

You have a Microsoft 365 F5 subscription.

You plan to deploy 100 new Windows 10 devices.

You need to order the appropriate version of Windows 10 for the new devices. The version must

Meet the following requirements.

Be serviced for a minimum of 24 moths.

Support Microsoft Application Virtualization (App-V)

Which version should you identify?

A.

Window 10 Pro, version 1909

A.

Window 10 Pro, version 1909

Answers
B.

Window 10 Pro, version 2004

B.

Window 10 Pro, version 2004

Answers
C.

Window 10 Pro, version 1909

C.

Window 10 Pro, version 1909

Answers
D.

Window 10 Enterprise, version 2004

D.

Window 10 Enterprise, version 2004

Answers
Suggested answer: D

Explanation:

https://docs.microsoft.com/en-us/windows/release-health/release-information

https://docs.microsoft.com/en-us/windows/application-management/app-v/appv-supported-configurations

You have a Microsoft 365 subscription.

You discover that some external users accessed center for a Microsoft SharePoint site.

You modify the sharePoint sharing policy to prevent sharing, outside your organization.

You need to be notified if the SharePoint sharing policy is modified in the future.

Solution: From the Security $ Compliance admin center you create a threat management policy.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

DRAG DROP

You have a Microsoft 365 E5 subscription.

Several users have iOS devices.

You plan to enroll the iOS devices in Microsoft Endpoint Manager.

You need to ensure that you can create an iOS/iPadOS enrollment profile in Microsoft Endpoint Manager.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.


https://docs.microsoft.com/en-us/mem/intune/enrollment/apple-mdm-push-certificate-get

Question 68
Correct answer: Question 68

Explanation:

https://docs.microsoft.com/en-us/mem/intune/enrollment/apple-mdm-push-certificate-get

You have a Microsoft 365 E5 subscription that uses Azure Advanced Threat Protection (ATP).

You need to create a detection exclusion in Azure ATP.

Which tool should you use?

A.

the Security & Compliance admin center

A.

the Security & Compliance admin center

Answers
B.

Microsoft Defender Security Center

B.

Microsoft Defender Security Center

Answers
C.

the Microsoft 365 admin center

C.

the Microsoft 365 admin center

Answers
D.

the Azure Advanced Threat Protection portal

D.

the Azure Advanced Threat Protection portal

Answers
E.

the Cloud App Security portal

E.

the Cloud App Security portal

Answers
Suggested answer: D

Explanation:

https://docs.microsoft.com/en-us/defender-for-identity/what-is

https://docs.microsoft.com/en-us/defender-for-identity/excluding-entities-from-detections

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are connected to your on-premises network.

Solution: From the Endpoint Management admin center, you create a device configuration profile.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:

You need to create a trusted location and a conditional access policy.

Total 467 questions
Go to page: of 47