Microsoft MS-100 Exam Practice Questions (P. 3)
- Full Access (437 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
Your company's Microsoft Azure Active Directory (Azure AD) tenant includes four users. Two of the users are configured with the Global administrator, Password administrator roles respectively. A third user has both the Security administrator and the Guest inviter roles configured. The fourth user has no roles configured.
Which of the following is the user that has the necessary permissions to alter the password protection policy? (Choose all that apply.)
Which of the following is the user that has the necessary permissions to alter the password protection policy? (Choose all that apply.)
- AThe user with the Global administrator role.
- BThe user with the Password administrator role.
- CThe user with the Security administrator and Guest inviter roles.Most Voted
- DThe user with no roles.
Correct Answer:
A
A
send
light_mode
delete
Question #22
Your company's Microsoft Azure Active Directory (Azure AD) tenant includes four users. Two of the users are configured with the Global administrator, Password administrator roles respectively. A third user has both the Security administrator and the Guest inviter roles configured. The fourth user has no roles configured.
Which of the following is the user that has the necessary permissions to create guest users? (Choose all that apply.)
Which of the following is the user that has the necessary permissions to create guest users? (Choose all that apply.)
- AThe user with the Global administrator role.Most Voted
- BThe user with the Password administrator role.
- CThe user with the Security administrator and Guest inviter roles.Most Voted
- DThe user with no roles.
Correct Answer:
AC
AC
send
light_mode
delete
Question #23
You have been tasked with enable Microsoft Azure Information Protection for your company's Microsoft 365 subscription.
You are informed that only the members of a group, named Group1, are able to protect content. To achieve your goal, you plan to run a PowerShell cmdlet.
Which of the following is the cmdlet you should run?
You are informed that only the members of a group, named Group1, are able to protect content. To achieve your goal, you plan to run a PowerShell cmdlet.
Which of the following is the cmdlet you should run?
- AThe Add-AadrmRoleBaseAdministrator cmdlet.
- BThe Set-AadrmDoNotTrackUserGroup cmdlet.
- CThe Clear-AadrmSuperUserGroup cmdlet.
- DThe Set-AadrmOnboardingControlPolicy cmdlet.
Correct Answer:
D
If you don't want all users to be able to protect documents and emails immediately by using Azure Rights Management, you can configure user onboarding controls by using the Set-AadrmOnboardingControlPolicy
References:
https://docs.microsoft.com/en-us/azure/information-protection/activate-service
D
If you don't want all users to be able to protect documents and emails immediately by using Azure Rights Management, you can configure user onboarding controls by using the Set-AadrmOnboardingControlPolicy
References:
https://docs.microsoft.com/en-us/azure/information-protection/activate-service
send
light_mode
delete
Question #24
Your company has acquired Microsoft 365 for their Active Directory domain, which includes five domain controllers.
Prior to implementing a number of Microsoft 365 services, you are tasked with making use of an authentication solution that allows users to access Microsoft 365 by using their on-premises credentials. The solution should also only make use of the current server infrastructure. Furthermore, must allow for all user passwords to only be stored on-premises, and be highly available.
Solution: You configure the use of password hash synchronization only.
Does the solution meet the goal?
Prior to implementing a number of Microsoft 365 services, you are tasked with making use of an authentication solution that allows users to access Microsoft 365 by using their on-premises credentials. The solution should also only make use of the current server infrastructure. Furthermore, must allow for all user passwords to only be stored on-premises, and be highly available.
Solution: You configure the use of password hash synchronization only.
Does the solution meet the goal?
send
light_mode
delete
Question #25
Your company has acquired Microsoft 365 for their Active Directory domain, which includes five domain controllers.
Prior to implementing a number of Microsoft 365 services, you are tasked with making use of an authentication solution that allows users to access Microsoft 365 by using their on-premises credentials. The solution should also only make use of the current server infrastructure. Furthermore, must allow for all user passwords to only be stored on-premises, and be highly available.
Solution: You configure the use of pass-through authentication only.
Does the solution meet the goal?
Prior to implementing a number of Microsoft 365 services, you are tasked with making use of an authentication solution that allows users to access Microsoft 365 by using their on-premises credentials. The solution should also only make use of the current server infrastructure. Furthermore, must allow for all user passwords to only be stored on-premises, and be highly available.
Solution: You configure the use of pass-through authentication only.
Does the solution meet the goal?
send
light_mode
delete
Question #26
Your company has acquired Microsoft 365 for their Active Directory domain, which includes five domain controllers.
Prior to implementing a number of Microsoft 365 services, you are tasked with making use of an authentication solution that allows users to access Microsoft 365 by using their on-premises credentials. The solution should also only make use of the current server infrastructure. Furthermore, must allow for all user passwords to only be stored on-premises, and be highly available.
Solution: You configure the use of pass-through authentication and seamless SSO.
Does the solution meet the goal?
Prior to implementing a number of Microsoft 365 services, you are tasked with making use of an authentication solution that allows users to access Microsoft 365 by using their on-premises credentials. The solution should also only make use of the current server infrastructure. Furthermore, must allow for all user passwords to only be stored on-premises, and be highly available.
Solution: You configure the use of pass-through authentication and seamless SSO.
Does the solution meet the goal?
send
light_mode
delete
Question #27
Your company has a Microsoft Azure Active Directory (Azure AD) tenant with multi-factor authentication enabled.
You have also configured the Allow users to submit fraud alerts, and the Block user when fraud is reported settings to ON.
A tenant user has submitted a fraud alert for his account.
Which of the following is the length of time that the user's account will automatically be blocked for?
You have also configured the Allow users to submit fraud alerts, and the Block user when fraud is reported settings to ON.
A tenant user has submitted a fraud alert for his account.
Which of the following is the length of time that the user's account will automatically be blocked for?
- A24 hours
- B90 daysMost Voted
- C1 month
- D1 week
Correct Answer:
B
References:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings#fraud-alert
B
References:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings#fraud-alert
send
light_mode
delete
Question #28
Your company has a Microsoft Azure Active Directory (Azure AD) tenant with multi-factor authentication enabled.
You have also configured the Allow users to submit fraud alerts, and the Block user when fraud is reported settings to ON.
A tenant user has submitted a fraud alert for his account. After receiving an alert call, the user needs to enter a special code followed by #.
Which of the following is default special code?
You have also configured the Allow users to submit fraud alerts, and the Block user when fraud is reported settings to ON.
A tenant user has submitted a fraud alert for his account. After receiving an alert call, the user needs to enter a special code followed by #.
Which of the following is default special code?
- A0Most Voted
- B9
- C0000
- D1234
Correct Answer:
A
References:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings#fraud-alert
A
References:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings#fraud-alert
send
light_mode
delete
Question #29
Your company has a Microsoft Office 365 subscription with a number of Microsoft SharePoint Online sites.
Currently, users are able to invite external users to access files on the SharePoint sites. You are tasked with making sure that users are only able to authenticated guest users to the SharePoint sites.
Which of the following actions should you take?
Currently, users are able to invite external users to access files on the SharePoint sites. You are tasked with making sure that users are only able to authenticated guest users to the SharePoint sites.
Which of the following actions should you take?
- AYou should create a threat management policy via the Security & Compliance admin center.
- BYou should run the Set-SPOSite cmdlet.
- CYou should run the Add-SPOUser cmdlet.
- DYou should modify the sharing settings via the SharePoint admin center.Most Voted
Correct Answer:
D
D
send
light_mode
delete
Question #30
Your company has a Microsoft 365 subscription.
You have been tasked with configuring external collaboration settings for your company's Microsoft Azure Active Directory (Azure AD) tenant.
You want to make sure that authorized users are able to create guest users in the tenant.
Which of the following actions should you take?
Which setting should you modify?
You have been tasked with configuring external collaboration settings for your company's Microsoft Azure Active Directory (Azure AD) tenant.
You want to make sure that authorized users are able to create guest users in the tenant.
Which of the following actions should you take?
Which setting should you modify?
- AYou should make sure that the Guests can invite setting is set to NO.
- BYou should make sure that the Guest users permissions are limited setting is set to Yes.
- CYou should make sure that the Members can invite setting is set to NO.
- DYou should make sure that the Admins and users in the guest inviter role can invite setting is set to Yes.Most Voted
Correct Answer:
D
References:
https://docs.microsoft.com/en-us/azure/active-directory/b2b/delegate-invitations https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/users-default-permissions
D
References:
https://docs.microsoft.com/en-us/azure/active-directory/b2b/delegate-invitations https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/users-default-permissions
send
light_mode
delete
All Pages