ExamGecko
Home Home / Microsoft / MS-203

Microsoft MS-203 Practice Test - Questions Answers, Page 29

Question list
Search
Search

List of questions

Search

Related questions


SIMULATION Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time. When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design. Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task. Labs are not timed separately, and this exam may have more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided. Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab. Use the following login credentials as needed: To enter your username, place your cursor in the Sign in box and click on the username below. To enter your password, place your cursor in the Enter password box and click on the password below. Microsoft 365 Username: [email protected] Microsoft 365 Password: xxxxxx If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab. The following information is for technical support purposes only. Lab Instance: XXXXXX You need to ensure that a notification email is sent to [email protected] when a user marks an email message as Not Junk in Microsoft Outlook. To complete this task, sign in to the Microsoft 365 admin center.









You have two servers named EXCH1 and EXCH2 that run Windows Server 2012 R2 and have Microsoft Exchange 2016 installed. You purchase a Microsoft 365 subscription. You plan to configure a hybrid deployment between an Exchange Online tenant and the on-premises Exchange Server Organization.

You need to identify the prerequisites to installing the Microsoft Hybrid Agent on EXCH1 and EXCH2. Which two prerequisites should you identify? Each correct answer presents part of the solution.

A.

All outbound HTTPS connections to Microsoft Online Services

A.

All outbound HTTPS connections to Microsoft Online Services

Answers
B.

Enable Hybrid Modern Authentication (HMA).

B.

Enable Hybrid Modern Authentication (HMA).

Answers
C.

Upgrade the operating system of EXCH1 and EXCH2 to Windows Server 2019.

C.

Upgrade the operating system of EXCH1 and EXCH2 to Windows Server 2019.

Answers
D.

Enable TLS 1.2.

D.

Enable TLS 1.2.

Answers
Suggested answer: A, D

Explanation:

1. All outbound HTTPS connections

to Microsoft Online Services Reference:

https://docs.microsoft.com/en-us/exchange/hybrid-deployment/prepare-for-hybrid-deployment

Explanation: To perform a hybrid deployment between an Exchange Online tenant and an on premises

Exchange Server organization, you must ensure that all outbound HTTPS connections to

Microsoft Online Services are allowed. This is a prerequisite for installing the Microsoft Hybrid Agent.

2. Enable TLS 1.2.

Reference:

https://docs.microsoft.com/en-us/exchange/hybrid-deployment/prepare-for-hybrid-deployment Explanation: To perform a hybrid deployment between an Exchange Online tenant and an on-premises Exchange Server organization, you must ensure that Transport Layer Security (TLS)

1.2 is enabled on your on-premises Exchange servers. This is a prerequisite for installing the

Microsoft Hybrid Agent.

You have a hybrid deployment between a Microsoft Exchange Online tenant and an on-premises Exchange Server 2019 organization. The deployment contains an Exchange Server 2019 server named Server1. Server1 has a public certificate named Cert1 that is bound to the SMTP protocol. Cert1 will expire soon. you replace Cert1 with a new certificate named Cert2 from a different public certification authority (CA) After you replace the certificate, you discover that email delivery between Server1 and the Exchange Online tenant fails. You need to ensure that messages can be delivered successfully

What should you do on Server1?

A.

Return the Hybrid Configuration wizard

A.

Return the Hybrid Configuration wizard

Answers
B.

Restart the MSExchangeTransport service.

B.

Restart the MSExchangeTransport service.

Answers
C.

Recreate the certificate and include an exportable private key.

C.

Recreate the certificate and include an exportable private key.

Answers
D.

Bind a self-signed certificate to the SMTP protocol.

D.

Bind a self-signed certificate to the SMTP protocol.

Answers
Suggested answer: A

Explanation:

Reference:

https://docs.microsoft.com/en-us/exchange/hybrid-deployment/configure-hybrid-deployment-certificate

Explanation: When replacing a certificate used in a hybrid deployment, you should run the Hybrid

Configuration wizard again to update the certificate information in the hybrid configuration settings. This process updates the certificate used by the hybrid deployment and ensures that email delivery between the on-premises Exchange Server and the Exchange Online tenant is successful.

HOTSPOT

You have a Microsoft Exchange Online tenant.

Archive mailboxes are enabled for all users. You need to ensure that the default size of each user's archive mailbox increases automatically when the mailbox approaches the storage limit. The solution must apply automatically to all current and future mailboxes.

How should you complete the PowerShell command? To, answer select the appropriate options in the answer area.


Question 283
Correct answer: Question 283

Explanation:

Set-Mailbox -Identity * -ArchiveQuota "Unlimited"

To ensure that the default size of each user's archive mailbox increases automatically when the mailbox approaches the storage limit and to apply the solution automatically to all current and future mailboxes, you can use the Set-Mailbox cmdlet in PowerShell and specify the –ArchiveQuota parameter.

Here is an example of how you could complete the PowerShell command:

Copy code

Set-Mailbox -Identity * -ArchiveQuota "Unlimited"

This command will set the archive mailbox size to unlimited for all mailboxes in the tenant.

Please note that, when you set the archive mailbox size to unlimited, the user's mailbox will continue to grow until it reaches the available storage space in the tenant.

You could also set a specific size limit, for example:

Copy code

Set-Mailbox -Identity * -ArchiveQuota "50 GB"

This command will set the archive mailbox size to 50 GB for all mailboxes in the tenant.

You can then use the Get-Mailbox cmdlet to verify the new archive mailbox size for all mailboxes in the tenant:

Copy code

Get-Mailbox -Identity * | Select DisplayName, ArchiveQuota

This command will return the DisplayName and ArchiveQuota properties for all mailboxes in the

tenant.

You have Microsoft Exchange Online tenant that uses Microsoft Defender for Office 365.

You have the policies shown in the following table.

You need to track any modifications made to Policy1 by the identifying following:

- The name of the user that modified the policy

- The old and new values settings modified in Policy1

- How the modifications compare to the baseline settings of Standard Preset Security Policy

Whet should you use in the Microsoft 365 Defender portal?

A.

Audit

A.

Audit

Answers
B.

Configuration analyzer

B.

Configuration analyzer

Answers
C.

Threat tracker

C.

Threat tracker

Answers
D.

Threat analytics

D.

Threat analytics

Answers
Suggested answer: A

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/audit-logsearch

Explanation: The Audit feature in the Microsoft 365 Defender portal allows you to track any modifications made to the policies in your tenant, including the Anti-malware Policy1. You can use the Audit feature to view the name of the user that modified the policy, the old and new values settings modified in Policy1 and how the modifications compare to the baseline settings of Standard Preset Security Policy.

You have a Microsoft Exchange Online tenant.

You plan to place a hold on all email messages stored in the mailbox of a user named User1.

What should you create first?

A.

an eDiscovery case

A.

an eDiscovery case

Answers
B.

sensitive info type

B.

sensitive info type

Answers
C.

a data loss prevention (DLP) policy

C.

a data loss prevention (DLP) policy

Answers
D.

an information barrier segment

D.

an information barrier segment

Answers
Suggested answer: A

Explanation:

You can use an eDiscovery case to create and manage eDiscovery holds that can be applied to user mailboxes and other content locations in Microsoft Purview1. You can also use an eDiscovery case to search for and export content from mailboxes and other locations1.

An eDiscovery case is different from a Litigation Hold, which is a hold that is applied to user mailboxes in Exchange Online1. A Litigation Hold isn’t identified by a GUID1. A sensitive info type is a predefined or custom entity that can be used to identify and protect sensitive data in Microsoft Purview2. It is not related to placing a hold on email messages. A data loss prevention (DLP) policy is a policy that helps prevent the accidental or intentional sharing of sensitive information outside your organization2. It is not related to placing a hold on email messages. An information barrier segment is a group of users who are allowed or blocked from communicating with each other in Microsoft Teams or SharePoint Online2. It is not related to placing a hold on email messages.

You discover that Policy1 failed to apply to the Executives group.

You need to ensure that Policy1 is applied to all the members of the Executives group.

What should you do?

A.

Increase the priority of Policy1.

A.

Increase the priority of Policy1.

Answers
B.

Decrease the priority of Strict Preset Security Policy.

B.

Decrease the priority of Strict Preset Security Policy.

Answers
C.

Remove the Executives group from the Strict protection preset security policy.

C.

Remove the Executives group from the Strict protection preset security policy.

Answers
D.

Modify the Strict protection preset security policy to match Policy? and assign the Strict protection preset security policy to contoso.com.

D.

Modify the Strict protection preset security policy to match Policy? and assign the Strict protection preset security policy to contoso.com.

Answers
Suggested answer: C

Explanation:

Preset security policies are policies that provide a centralized location for applying all of the recommended spam, malware, and phishing policies to users at once1. The policy settings are not configurable and are set by Microsoft based on best practices1.

There are two types of preset security policies: Standard protection and Strict protection1. Standard protection is a baseline protection profile that’s suitable for most users1. Strict protection is a more aggressive protection profile for selected users who are high value targets or priority users1.

If you want to apply Policy1 to the Executives group, you need to remove them from the Strict protection preset security policy first. Otherwise, the preset security policy will take precedence over Policy1 and prevent it from being applied2. To remove the Executives group from the Strict protection preset security policy, you can follow these steps2:

Login to the Microsoft Security portal at https://security.microsoft.com.

On the left nav, under Email & collaboration, select Policies & rules.

Select Threat policies.

Select Preset Security Policies underneath the Templated policies heading

Select Manage underneath the Strict protection preset.

Select Specific recipients and remove the Executives group from the list of recipients.

Select Save.

DRAG DROP

Your company has three departments name Dept1, Dept2. and Dept3 and a Microsoft Exchange Online tenant. You need to increase security for the email messages sent from the departments. The solution must meet the following requirements:

« Users in Dept1 must be able to digitally sign and encrypt email messages as required.

+ Email messages sent from Dept2 to an external email domain must be encrypted automatically during transit only. « Email messages sent from Dept3 to an external email domain must be encrypted until the recipient opens the message. « Implementation costs must be minimized.

‘Which type of encryption should you use for each department? To answer, drag the appropriate encryption types to the correct departments. Each encryption type may be used

Question 287
Correct answer: Question 287

Explanation:

Users in Dept1 should use S/MIME encryption1. S/MIME is a standard for public key encryption and signing of email messages1. It allows users to digitally sign and encrypt email messages as required using certificates1. S/MIME provides end-to-end encryption and ensures message integrity and sender authentication1. Email messages sent from Dept2 to an external email domain should use TLS encryption1. TLS is a protocol that encrypts the connection or session between two servers1. It protects email messages during transit only and does not require any action from the sender or recipient1. TLS provides opportunistic encryption and ensures message confidentiality and server authentication1. Email messages sent from Dept3 to an external email domain should use Microsoft Purview Message Encryption2. Microsoft Purview Message Encryption is an online service that encrypts email messages and attachments using rights management policies2. It allows users to send encrypted email messages to anyone inside or outside the organization using various email services2. Microsoft Purview Message Encryption provides persistent encryption and ensures message confidentiality and authorization policies2.

You have a Microsoft Exchange Online tenant.

You plan to implement an on-premises alarm system that will send email alerts by using SMTP. The alarm system will NOT support TLS. You need to ensure that the alarm system can send the alerts to both internal and external recipients by using Exchange Online. ‘Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct answer is worth one point.

A.

Configure SMTP AUTH client submission.

A.

Configure SMTP AUTH client submission.

Answers
B.

Configure the alarm system settings to use a TXT record of the tenant.

B.

Configure the alarm system settings to use a TXT record of the tenant.

Answers
C.

Create a connector.

C.

Create a connector.

Answers
D.

Configure the alarm system settings to use an MX record of the tenant.

D.

Configure the alarm system settings to use an MX record of the tenant.

Answers
E.

Configure direct send.

E.

Configure direct send.

Answers
Suggested answer: C, E

Explanation:

1. Create a connector1. A connector is a configuration setting that controls how email messages are delivered to or received from your own email servers or a partner organization1. You need to create a connector to route mail between Exchange Online and your on-premises alarm system that uses SMTP1. You can specify the IP address of your alarm system as a trusted sender and configure the connector to use certificate-based authentication or IP address-based authentication1.

2. Configure direct send2. Direct send is an option that allows you to send mail directly from your printer or application to Microsoft 365 or Office 365 without using a local email server2. You need to configure direct send on your alarm system settings to use an MX record of the tenant as the SMTP server address2. For example, contoso-com.mail.protection.outlook.com2. Direct send does not require TLS encryption or SMTP authentication2.

HOTSPOT

You have a Microsoft 365 ES subscription that contains a Microsoft Exchange Online tenant.

You plan to use a mailbox named Mailbox1 to store user-reported malicious email messages.

You need to configure Microsoft Defender for Office 365 to meet the following requirements:

+ Configure Mailbox1 as a SecOps mailbox.

+ Create a policy that has zero-hour auto purge (ZAP) for infected email disabled for Mailbox1.

Which two settings should you configure? To answer, select the appropriate settings in the answer area.


Question 289
Correct answer: Question 289

HOTSPOT

You have a Microsoft 365 subscription that contains a user named User 1.

You need to ensure that User1 can perform the following actions:

« Search all mailboxes.

+ Purge email from all mailboxes.

The solution must use the principle of least privilege.

To which role group should you add User1, and which portal should you use? To answer, select the appropriate options in the answer area.

Question 290
Correct answer: Question 290

Explanation:

Box 1 = Compliance Administrator1 the role group that you should add User1 to is:

The Compliance Administrator role group grants permissions to manage compliance features in

Microsoft 365, such as content search, audit log search, eDiscovery cases, and data loss prevention policies1. Members of this role group can also search all mailboxes and purge email from all mailboxes using Security & Compliance PowerShell23. This role group uses the principle of least privilege by not granting permissions to manage other features or settings in Microsoft 3651.

Box 2 = Microsoft Purview compliance portal1. The Microsoft Purview compliance portal is a webbased portal that allows you to manage compliance features in Microsoft 365, such as content search, audit log search, eDiscovery cases, and data loss prevention policies1. You can use this portal to search all mailboxes and purge email from all mailboxes using Security & Compliance

PowerShell23. You need to have the appropriate permissions to perform these tasks2

Total 386 questions
Go to page: of 39