MS 100 (no BS)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

From the Conditional access blade in the Azure Active Directory admin center, create named locations.

You need to reduce the likelihood that known good international sign-ins are identified as risky. What should you do?

An Azure AD Connect server.

Your company has a Microsoft 365 subscription. After implementing Active Directory Federation Services (AD FS), you are instructed to configure AD FS user authentication auditing. You are preparing to run the Register-AzureADConnectHealthSyncAgent cmdlet. Which of the following is the server that the cmdlet should be run from?

No

Your company has configured all user email to be stored in Microsoft Exchange Online. You have been tasked with keeping a duplicate of all the email messages from a specified user that includes a specific word. Solution: You start by creating a label and label policy via the Security & Compliance admin center. Does the solution meet the goal?

The MAM user scope

You have a Microsoft Azure Active Directory (Azure AD) tenant.Your company implements Windows Information Protection (WIP).You need modify which users are affected by WIP. What do you configure to accomplish this goal?

User sign-ins

You have recently configured a conditional access policy to force mobile device users to use multi-factor authentication when accessing Microsoft SharePoint. To check who used multi-factor authentication to authenticate, you view the Usage reports from Azure Active Directory admin center. Where can this be checked?

A supervisor policy

Your company has a Microsoft 365 subscription.You have previously created a group that includes users who send email messages to external users on a regular basis. The group's manager would like to group wants to examine messages that include attachments at random.You are required to make sure that the manager can achieve his goal, but only make ten out of a hundred messages accessible to him.You need to provide the manager with the ability to review messages that contain attachments sent from the Support group users to external users. The manager must have access to only 10 percent of the messages.Which of the following should you create?

No

Your company has configured all user email to be stored in Microsoft Exchange Online.You have been tasked with keeping a duplicate of all the email messages from a specified user that includes a specific word.Solution: You start by initiating a message trace via the Security & Compliance admin center.Does the solution meet the goal?

Get-MsolUser

After acquiring a Microsoft 365 subscription, you configure the use of Microsoft Azure Multi-Factor Authentication (MFA) for all users in the Azure Active Directory(Azure AD) tenant. You want to produce a report that includes all the users who finished the Azure MFA registration process. You want to make use of an Azure Cloud Shell cmdlet. Which of the following is the cmdlet you should use?

Only email data will be migrated.

After your company acquires a Microsoft 365 subscription, they instruct you to move all email data from their corporate Gmail to Microsoft Exchange Online.The migration will be done via the Exchange admin center.Which of the following is TRUE with regards to the data included in the migration?

An XML download file

You have recently created a Microsoft 365 Enterprise subscription and assigned all users licenses for all products.You want to configure all Microsoft Office 365 ProPlus installations to be done via a network share. You also want to make sure that users are prevented from using the Internet to install Office 365 ProPlus.Which of the following is the type of file that you should create?NOTE: Each correct selection is worth one point.

The user with the Global administrator role. The user with the Security administrator and Guest inviter roles.

Your company's Microsoft Azure Active Directory (Azure AD) tenant includes four users. Two of the users are configured with the Global administrator, Password administrator roles respectively. A third user has both the Security administrator and the Guest inviter roles configured. The fourth user has no roles configured. Which of the following is the user that has the necessary permissions to create guest users?

IMAP migration

After your company acquires a Microsoft 365 subscription, they instruct you to move all email data from their corporate Gmail to Microsoft Exchange Online.The migration will be done via the Exchange admin center.Which of the following is the migration method you should use?

You need to add an exception

In Microsoft 365, you configure a data loss prevention (DLP) policy named Policy1. Policy1 detects the sharing of United States (US) bank account numbers in email messages and attachments. You need to ensure that internal users can email documents that contain US bank account numbers to external users who have an email suffix of contoso.com.What should you configure?

Disabling of user overrides.

You have a Microsoft 365 subscription.You configure a data loss prevention (DLP) policy.You discover that users are incorrectly marking content as false positive and bypassing the DLP policy.You need to prevent the users from bypassing the DLP policy.What should you configure?

From the Security & Compliance admin center, create a new threat management policy.

You have a Microsoft 365 subscription.You need to prevent phishing email messages from being delivered to your organization.What should you do?

From the Security & Compliance admin center, create a new threat management policy. Anti-phishing protection is part of Office 365 Advanced Threat Protection (ATP). To prevent phishing email messages from being delivered to your organization, you need to configure a threat management policy.ATP anti-phishing is only available in Advanced Threat Protection (ATP). ATP is included in subscriptions, such as Microsoft 365 Enterprise, Microsoft 365Business, Office 365 Enterprise E5, Office 365 Education A5, etc.

You have a Microsoft 365 subscription.You need to prevent phishing email messages from being delivered to your organization.What should you do?

From the Exchange admin center, create a new organization relationship.

You have a Microsoft 365 tenant that contains Microsoft Exchange Online.You plan to enable calendar sharing with a partner organization named adatum.com. The partner organization also has a Microsoft 365 tenant.You need to ensure that the calendar of every user is available to the users in adatum.com immediately.What should you do?

The App protection policies

You have a Microsoft Azure Active Directory (Azure AD) tenant.Your company implements Windows Information Protection (WIP). To modify which applications are affected by WIP, what do you need to configure?

The "Set-AadrmOnboardingControlPolicy" cmdlet

You have been tasked with enabling Microsoft Azure Information Protection for your company's Microsoft 365 subscription. You are informed that only the members of a group, named Group1, are able to protect content. To achieve your goal, you plan to run a PowerShell cmdlet. What is the cmdlet you should run?

From the Exchange admin center, select mail flow, and then configure the email address policies. AND/OR: Run the Set-EmailAddressPolicy Windows PowerShell command.

Your company has a Microsoft 365 subscription. All identities are managed in the cloud.The company purchases a new domain name.You need to ensure that all new mailboxes use the new domain as their primary email address.What are two possible ways to achieve the goal? Each correct answer presents a complete solution.NOTE: Each correct selection is worth one point.

No

Your company has a Microsoft Office 365 tenant.You suspect that several Office 365 features were recently updated.You need to view a list of the features that were recently updated in the tenant.Solution: You use Dashboard in Security & Compliance.Does this meet the goal?

No

Your company has acquired Microsoft 365 for their Active Directory domain, which includes five domain controllers. Prior to implementing a number of Microsoft 365 services, you are tasked with making use of an authentication solution that allows users to access Microsoft 365 by using their on-premises credentials. The solution should also only make use of the current server infrastructure. Furthermore, must allow for all user passwords to only be stored on-premises, and be highly available. Solution: You configure the use of pass-through authentication only. Does the solution meet the goal?

No

Your company has acquired Microsoft 365 for their Active Directory domain, which includes five domain controllers. Prior to implementing a number of Microsoft 365 services, you are tasked with making use of an authentication solution that allows users to access Microsoft 365 by using their on-premises credentials. The solution should also only make use of the current server infrastructure. Furthermore, must allow for all user passwords to only be stored on-premises, and be highly available. Solution: You configure the use of password hash synchronization only. Does the solution meet the goal?

Yes

Your company has configured all user email to be stored in Microsoft Exchange Online. You have been tasked with keeping a duplicate of all the email messages from a specified user that includes a specific word. Solution: You start by creating a label and label policy via the Security & Compliance admin center. Does the solution meet the goal?

A new service connection point (SCP).

Your company's network contains two Active Directory forests, with two domains configured per forest. All workstations are domain-joined and have Windows 10 installed.You have created a Microsoft Azure Active Directory (Azure AD) tenant in preparation for configuring Hybrid Azure AD join for the workstations.You want to make sure that the tenant can be discovered by the workstations.Which of the following should you create in each forest?

Weekly.

You have a Microsoft 365 subscription.A new corporate security policy states that you must automatically send DLP incident reports to the users in the legal department.You need to schedule the email delivery of the reports. The solution must ensure that the reports are sent as frequently as possible.How frequently can you schedule the delivery of the reports?

150 Mailboxes

You have been tasked with migrating your company's on-premises Microsoft Exchange Server 2013 organization to Microsoft 365. You plan to make use of the cutover migration method. Which of the following is the maximum recommended number of mailboxes that you should migrate?

150

You have been tasked with migrating your company's on-premises Microsoft Exchange Server 2013 organization to Microsoft 365.You plan to make use of the cutover migration method.Which of the following is the maximum recommended number of mailboxes that you should migrate?

A supervisor policy.

You have previously created a group that includes users who send email messages to external users on a regular basis. The group's managers would like to group wants to examine messages that include attachments at random. You need to provide the manager with the ability to review messages that contain attachments sent from the Support group users to external users. The manager must have access to only 10 percent of the messages. Which of the following should you create?

An XML download file

You have recently created a Microsoft 365 Enterprise subscription and assigned all users licenses for all products. You want to configure all Microsoft Office 365 ProPlus installations to be done via a network share. You also want to make sure that users are prevented from using the Internet to install Office 365 ProPlus. Which of the following is the type of file that you should create?

March and September

You have recently created a Microsoft 365 subscription. You have prepared an XML file for the upcoming Microsoft Office 365 ProPlus deployment. The Channel attribute for the OfficeClientEdition attribute is set to Broad, while the Channel attribute for the Updates element is set to Targeted. Which of the following the following are the months of the year that security updates will be installed?

Bi-annually / Every six months

You have recently created a Microsoft 365 subscription. You have prepared an XML file for the upcoming Microsoft Office 365 ProPlus deployment. The Channel attribute for the OfficeClientEdition attribute is set to Broad, while the Channel attribute for the Updates element is set to Targeted. Which of the following the following is the frequency with which the installation of Office 365 ProPlus feature updates will occur?

March and September

You have recently created a Microsoft 365 subscription.You have prepared an XML file for the upcoming Microsoft Office 365 ProPlus deployment.The Channel attribute for the OfficeClientEdition attribute is set to Broad, while the Channel attribute for the Updates element is set to Targeted.Which of the following the following are the months of the year that security updates will be installed?

six-monthly

You have recently created a Microsoft 365 subscription.You have prepared an XML file for the upcoming Microsoft Office 365 ProPlus deployment.The Channel attribute for the OfficeClientEdition attribute is set to Broad, while the Channel attribute for the Updates element is set to Targeted.Which of the following the following is the frequency with which the installation of Office 365 ProPlus feature updates will occur?

yes

Your company currently has an on-premises Active Directory forest. You have been tasked with assessing the application of Microsoft 365 and the utilization of an authentication strategy. You have been informed that the authentication strategy should permit sign in via smart card-based certificates, and also permitting the use of SSO to connect to on-premises and Microsoft 365 services. Solution: You recommend the use of federation with Active Directory Federation Services (AD FS) as the authentication strategy. Does the solution meet the goal?

no

Your company currently has an on-premises Active Directory forest. You have been tasked with assessing the application of Microsoft 365 and the utilization of an authentication strategy. You have been informed that the authentication strategy should permit sign in via smart card-based certificates, and also permitting the use of SSO to connect to on-premises and Microsoft 365 services. Solution: You recommend the use of pass-through authentication and seamless SSO with password hash synchronization as the authentication strategy.

no

Your company currently has an on-premises Active Directory forest. You have been tasked with assessing the application of Microsoft 365 and the utilization of an authentication strategy. You have been informed that the authentication strategy should permit sign in via smart card-based certificates, and also permitting the use of SSO to connect to on-premises and Microsoft 365 services. Solution: You recommend the use of password hash synchronization and seamless SSO as the authentication strategy. Does the solution meet the goal?

From the Exchange admin center, select mail flow, and then configure the email address policies. AND Run the Set-EmailAddressPolicy Windows PowerShell command.

Your company has a Microsoft 365 subscription. All identities are managed in the cloud.The company purchases a new domain name.You need to ensure that all new mailboxes use the new domain as their primary email address.What are two possible ways to achieve the goal? Each correct answer presents a complete solution.

You should make sure that the Admins and users in the guest inviter role can invite setting is set to Yes.

Your company has a Microsoft 365 subscription. You have been tasked with configuring external collaboration settings for your company's Microsoft Azure Active Directory (Azure AD) tenant. You want to make sure that authorized users are able to create guest users in the tenant. Which of the following actions should you take? Which setting should you modify?

An Azure AD Connect server.

Your company has a Microsoft 365 subscription.After implementing Active Directory Federation Services (AD FS), you are instructed to configure AD FS user authentication auditing.You are preparing to run the Register-AzureADConnectHealthSyncAgent cmdlet.Which of the following is the server that the cmdlet should be run from?NOTE: Each correct selection is worth one point.

the Licenses blade in the Azure portal

Your company has a Microsoft 365 subscription.You need to identify all the users in the subscription who are licensed for Microsoft Office 365 through a group membership. The solution must include the name of the group used to assign the license.What should you use?

PST files are deleted automatically from Microsoft 365 after 30 days

Your company has a Microsoft 365 subscription.You upload several archive PST files to Microsoft 365 by using the Microsoft 365 compliance center.A month later, you attempt to run an import job for the PST files.You discover that the PST files were deleted from Microsoft 365.What is the most likely cause of the files being deleted? More than one answer choice may achieve the goal. Select the BEST answer.

90 days (or until they're manually unblocked).

Your company has a Microsoft Azure Active Directory (Azure AD) tenant with multi-factor authentication enabled. You have also configured the Allow users to submit fraud alerts, and the Block user when fraud is reported settings to ON. A tenant user has submitted a fraud alert for his account. Which of the following is the length of time that the user's account will automatically be blocked for?

0

Your company has a Microsoft Azure Active Directory (Azure AD) tenant with multi-factor authentication enabled. You have also configured the Allow users to submit fraud alerts, and the Block user when fraud is reported settings to ON.A tenant user has submitted a fraud alert for his account. After receiving an alert call, the user needs to enter a special code followed by #. Which of the following is default special code?

You should modify the sharing settings via the SharePoint admin center.

Your company has a Microsoft Office 365 subscription with a number of Microsoft SharePoint Online sites. Currently, users are able to invite external users to access files on the SharePoint sites. You are tasked with making sure that users are only able to authenticated guest users to the SharePoint sites. Which of the following actions should you take?

No

Your company has a Microsoft Office 365 tenant.You suspect that several Office 365 features were recently updated.You need to view a list of the features that were recently updated in the tenant.Solution: You review the Security & Compliance report in the Microsoft 365 admin center.Does this meet the goal?

Yes. The Message center in the Microsoft 365 admin center is where you would go to view a list of the features that were recently updated in the tenant. This is whereMicrosoft posts official messages with information including new and changed features, planned maintenance, or other important announcements.

Your company has a Microsoft Office 365 tenant.You suspect that several Office 365 features were recently updated.You need to view a list of the features that were recently updated in the tenant.Solution: You use Message center in the Microsoft 365 admin center.Does this meet the goal?

No

Your company has a Microsoft Office 365 tenant.You suspect that several Office 365 features were recently updated.You need to view a list of the features that were recently updated in the tenant.Solution: You use the View service requests option in the Microsoft 365 admin center.Does this meet the goal?

In the branch offices, configure name resolution so that all queries for external host names are redirected to public DNS servers directly.

Your company has a main office and 20 branch offices in North America and Europe. Each branch connects to the main office by using a WAN link. All the offices connect to the Internet and resolve external host names by using the main office connections.You plan to deploy Microsoft 365 and to implement a direct Internet connection in each office.You need to recommend a change to the infrastructure to provide the quickest possible access to Microsoft 365 services.What is the best recommendation to achieve the goal?

Yes

Your company has acquired Microsoft 365 for their Active Directory domain, which includes five domain controllers. Prior to implementing a number of Microsoft 365 services, you are tasked with making use of an authentication solution that allows users to access Microsoft 365 by using their on-premises credentials. The solution should also only make use of the current server infrastructure. Furthermore, must allow for all user passwords to only be stored on-premises, and be highly available. Solution: You configure the use of pass-through authentication and seamless SSO. Does the solution meet the goal?

Start-ADSyncSyncCycle

Your company has an Active Directory domain as well as a Microsoft Azure Active Directory (Azure AD) tenant. After configuring directory synchronization for all users in the organization, you configure a number of new user accounts to be created automatically. You want to run a command to make sure that the new user accounts synchronize to Azure AD in the shortest time required. Which of the following is the command that you should use?

Create a sign-in risk policy.

Your company has an Enterprise E5 subscription of Microsoft 365. You have been tasked with making sure that sales department users are compelled to make use of multi-factor authentication for all cloud-based applications. Which of the following actions should you take?

You should create a sign-in risk policy.

Your company has an Enterprise E5 subscription of Microsoft 365.You have been tasked with making sure that sales department users are compelled to make use of multi-factor authentication for all cloud-based applications. Which of the following actions should you take?

Modify the migration endpoint settings. The migration is causing the slow performance. This suggests that the on-premise Exchange server is struggling under the load of copying the mailboxes toExchange Online. You can reduce the load on the on-premise server by reducing the maximum number of concurrent mailbox migrations. Migrating just a few mailboxes at a time will have less of a performance impact than migrating many mailboxes concurrently.

Your company has an on-premises Microsoft Exchange Server 2016 organization and a Microsoft 365 Enterprise E5 subscription.You plan to migrate mailboxes and groups to Exchange Online.You start a new migration batch.Users report slow performance when they use the on-premises Exchange Server organization.You discover that the migration is causing the slow performance.You need to reduce the impact of the mailbox migration on the end-users.What should you do?

No

Your company has configured all user email to be stored in Microsoft Exchange Online. You have been tasked with keeping a duplicate of all the email messages from a specified user that includes a specific word. Solution: You start by initiating a message trace via the Security & Compliance admin center. Does the solution meet the goal?

Yes

Your company has configured all user email to be stored in Microsoft Exchange Online.You have been tasked with keeping a duplicate of all the email messages from a specified user that includes a specific word.Solution: You start by creating a label and label policy via the Security & Compliance admin center.Does the solution meet the goal?

No

Your company has configured all user email to be stored in Microsoft Exchange Online.You have been tasked with keeping a duplicate of all the email messages from a specified user that includes a specific word.Solution: You start by creating a spam filter policy via the Security & Compliance admin center.Does the solution meet the goal?

From the SharePoint admin center, create a managed property.

Your company uses on-premises Windows Server File Classification Infrastructure (FCI). Some documents on the on-premises file servers are classified as Confidential. You migrate the files from the on-premises file servers to Microsoft SharePoint Online. You need to ensure that you can implement data loss prevention (DLP) policies for the uploaded files based on the Confidential classification.What should you do first?

The User administrator role

Your company's Microsoft Azure Active Directory (Azure AD) tenant includes four users that are configured with the Privileged role administrator, the User administrator, the Security administrator, and the Billing administrator roles respectively .A security group has been included in the tenant for the purpose of managing administrative accounts. Which of the four roles can be used to add a user with the Security administrator role to the security group?

The User administrator role

Your company's Microsoft Azure Active Directory (Azure AD) tenant includes four users that are configured with the Privileged role administrator, the User administrator, the Security administrator, and the Billing administrator roles respectively. A security group has been included in the tenant for the purpose of managing administrative accounts. Which of the four roles can be used to create a guest user account?

The user with the Global administrator role.

Your company's Microsoft Azure Active Directory (Azure AD) tenant includes four users. Two of the users are configured with the Global administrator, Password administrator roles respectively. A third user has both the Security administrator and the Guest inviter roles configured. The fourth user has no roles configured. Which of the following is the user that has the necessary permissions to alter the password protection policy?

The users with the Password administrator and the User administrator roles.

Your companyג€™s Microsoft Azure Active Directory (Azure AD) tenant includes four users. Three of the users are each configured with the Password administrator ,Security administrator, and the User administrator roles respectively. The fourth user has no role configured. Which of the following are the users that are able to reset the password of the fourth user?

From Active Directory Users and Computers, modify the UPN suffix of the five user accounts.

Your network contains an Active Directory forest named adatum.local. The forest contains 500 users and uses adatum.com as a UPN suffix.You deploy a Microsoft 365 tenant.You implement directory synchronization and sync only 50 support users.You discover that five of the synchronized users have usernames that use a UPN suffix of onmicrosoft.com.You need to ensure that all synchronized identities retain the UPN set in their on-premises user account.What should you do?


Ensembles d'études connexes

Med Surg TEST 5 Practice Questions

View Set

AP Human Geography - Semester #1

View Set