Microsoft MS-102 Exam Practice Questions (P. 2)
- Full Access (389 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
You have a Microsoft 365 subscription.
You have an Azure AD tenant that contains the users shown in the following table.

You configure Tenant properties as shown in the following exhibit.

Which users will be contacted by Microsoft if the tenant experiences a data breach?
You have an Azure AD tenant that contains the users shown in the following table.

You configure Tenant properties as shown in the following exhibit.

Which users will be contacted by Microsoft if the tenant experiences a data breach?
- AUser1 only
- BUser2 onlyMost Voted
- CUser3 only
- DUser1 and User2 only
- EUser2 and User3 only
Correct Answer:
B
B
send
light_mode
delete
Question #12
Your network contains an Active Directory forest named contoso.local.
You purchase a Microsoft 365 subscription.
You plan to move to Microsoft 365 and to implement a hybrid deployment solution for the next 12 months.
You need to prepare for the planned move to Microsoft 365.
What is the best action to perform before you implement directory synchronization? More than one answer choice may achieve the goal. Select the BEST answer.
You purchase a Microsoft 365 subscription.
You plan to move to Microsoft 365 and to implement a hybrid deployment solution for the next 12 months.
You need to prepare for the planned move to Microsoft 365.
What is the best action to perform before you implement directory synchronization? More than one answer choice may achieve the goal. Select the BEST answer.
- APurchase a third-party X.509 certificate.
- BCreate an external forest trust.
- CRename the Active Directory forest.
- DPurchase a custom domain name.Most Voted
Correct Answer:
D
D

Purchasing a custom domain name is essential before implementing directory synchronization in a Microsoft 365 hybrid deployment scenario. This step ensures that your on-premises Active Directory domain aligns seamlessly with your cloud domain. This alignment is crucial for unified identity management, facilitates user authentication, and supports smooth email functionality across both environments. Ensure the domain used is universally reachable and not just limited to a local scope like ".local", which is unsuitable for internet-facing services.
send
light_mode
delete
Question #13
You have a Microsoft 365 subscription.
You configure a new Azure AD enterprise application named App1. App1 requires that a user be assigned the Reports Reader role.
Which type of group should you use to assign the Reports Reader role and to access App1?
You configure a new Azure AD enterprise application named App1. App1 requires that a user be assigned the Reports Reader role.
Which type of group should you use to assign the Reports Reader role and to access App1?
- Aa Microsoft 365 group that has assigned membership
- Ba Microsoft 365 group that has dynamic user membership
- Ca security group that has assigned membershipMost Voted
- Da security group that has dynamic user membership
Correct Answer:
C
C

When setting up applications and roles in Azure AD like you are with App1 and the Reports Reader role, it's essential to pick the right group. With Azure AD, roles cannot be assigned through dynamic groups, whether they're security groups or Microsoft 365 groups. Always use a non-dynamic (or assigned) group when you need specific role assignments to be stable and controlled directly without an automatic update based on user attributes. Hence, a security group with assigned membership is the way to go for this purpose. Although a non-dynamic Microsoft 365 group could theoretically handle roles if it's security-enabled, in this scenario, a security group is clearer and typically preferred.
send
light_mode
delete
Question #14
You have a new Microsoft 365 E5 tenant.
You need to enable an alert policy that will be triggered when an elevation of Microsoft Exchange Online administrative privileges is detected.
What should you do first?
You need to enable an alert policy that will be triggered when an elevation of Microsoft Exchange Online administrative privileges is detected.
What should you do first?
- AEnable auditing.Most Voted
- BEnable Microsoft 365 usage analytics.
- CCreate an Insider risk management policy.
- DCreate a communication compliance policy.
Correct Answer:
A
A

Alright, let's break it down. To enable an alert policy for detecting an elevation in Exchange Online admin privileges, kicking off with enabling auditing is key. Auditing logs such activities, helping in setting up alerts based on these specific events. Even if auditing might be enabled by default in some setups, it’s essential to verify its activation to ensure these alert policies function correctly. Plus, none of the other choices directly support the setup of alert policies for this specific administrative activity. So, yeah, enabling auditing comes first, hands down.
send
light_mode
delete
Question #15
Your network contains an on-premises Active Directory domain named contoso.com. The domain contains 1,000 Windows 10 devices.
You perform a proof of concept (PoC) deployment of Microsoft Defender for Endpoint for 10 test devices. During the onboarding process, you configure Microsoft Defender for Endpoint-related data to be stored in the United States.
You plan to onboard all the devices to Microsoft Defender for Endpoint.
You need to store the Microsoft Defender for Endpoint data in Europe.
What should you do first?
You perform a proof of concept (PoC) deployment of Microsoft Defender for Endpoint for 10 test devices. During the onboarding process, you configure Microsoft Defender for Endpoint-related data to be stored in the United States.
You plan to onboard all the devices to Microsoft Defender for Endpoint.
You need to store the Microsoft Defender for Endpoint data in Europe.
What should you do first?
- ADelete the workspace.
- BCreate a workspace.
- COnboard a new device.
- DOffboard the test devices.Most Voted
Correct Answer:
B
B

To store Microsoft Defender for Endpoint data in a new region, it's essential first to create a new workspace configured for that region. After setting up the new workspace, you can either proceed with onboarding existing or new devices. This approach hinges on the principle that data storage settings are locked to the workspace where devices were first onboarded and can't be altered post-setup. Therefore, starting with a new workspace allows you to meet regional data handling requirements without adjusting or offboarding devices already under management in another workspace.
send
light_mode
delete
Question #16
You have a Microsoft 365 E5 subscription that contains a user named User1.
User1 exceeds the default daily limit of allowed email messages and is on the Restricted entities list.
You need to remove User1 from the Restricted entities list.
What should you use?
User1 exceeds the default daily limit of allowed email messages and is on the Restricted entities list.
You need to remove User1 from the Restricted entities list.
What should you use?
- Athe Exchange admin center
- Bthe Microsoft Purview compliance portal
- Cthe Microsoft 365 admin center
- Dthe Microsoft 365 Defender portalMost Voted
- Ethe Microsoft Entra admin center
Correct Answer:
D
D

To remove User1 from the Restricted entities list in your Microsoft 365 E5 setup, definitely use the Microsoft 365 Defender portal. Specifically, go to Email & Collaboration > Review > Restricted Entities. Here you can select User1 and choose to unblock them. Always ensure to verify that the account isn’t compromised before unblocking to maintain security integrity. This process is thoroughly mapped out at the Microsoft documentation online, ensuring you follow Microsoft's outlined best practices for managing restricted users.
send
light_mode
delete
Question #17
Your company has a Microsoft 365 E5 subscription.
Users in the research department work with sensitive data.
You need to prevent the research department users from accessing potentially unsafe websites by using hyperlinks embedded in email messages and documents. Users in other departments must not be restricted.
What should you do?
Users in the research department work with sensitive data.
You need to prevent the research department users from accessing potentially unsafe websites by using hyperlinks embedded in email messages and documents. Users in other departments must not be restricted.
What should you do?
- ACreate a data loss prevention (DLP) policy that has a Content is shared condition.
- BModify the safe links policy Global settings.
- CCreate a data loss prevention (DLP) policy that has a Content contains condition.
- DCreate a new safe links policy.Most Voted
Correct Answer:
D
D

Creating a new Safe Links policy is the right move here. You can tailor this policy specifically for the research department. This allows you to ensure the sensitive data they handle is additionally protected from the threat of unsafe hyperlinks, while not extending this particular restriction across other departments. This focused application helps maintain flexible yet secure data interaction for different segments of your organization.
send
light_mode
delete
Question #18
HOTSPOT -
You have an Azure AD tenant that contains the users shown in the following table.

Your company uses Microsoft Defender for Endpoint. Microsoft Defender for Endpoint contains the roles shown in the following table.

Microsoft Defender for Endpoint contains the device groups shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
You have an Azure AD tenant that contains the users shown in the following table.

Your company uses Microsoft Defender for Endpoint. Microsoft Defender for Endpoint contains the roles shown in the following table.

Microsoft Defender for Endpoint contains the device groups shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.

send
light_mode
delete
Question #19
HOTSPOT -
You have a Microsoft 365 E5 tenant.
You need to ensure that administrators are notified when a user receives an email message that contains malware. The solution must use the principle of least privilege.
Which type of policy should you create, and which Microsoft Purview solutions role is required to create the policy? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You have a Microsoft 365 E5 tenant.
You need to ensure that administrators are notified when a user receives an email message that contains malware. The solution must use the principle of least privilege.
Which type of policy should you create, and which Microsoft Purview solutions role is required to create the policy? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

send
light_mode
delete
Question #20
You have a Microsoft 365 E5 subscription.
You need to compare the current Safe Links configuration to the Microsoft recommended configurations.
What should you use?
You need to compare the current Safe Links configuration to the Microsoft recommended configurations.
What should you use?
- AMicrosoft Purview
- BAzure AD Identity Protection
- CMicrosoft Secure Score
- Dthe configuration analyzerMost Voted
Correct Answer:
C
C

To accurately compare the current Safe Links configuration with Microsoft's recommended configurations, you should indeed use the Configuration Analyzer. It provides a detailed comparison of your current Threat Protection settings against 'Standard' and 'Strict' recommendations directly from Microsoft. It's specifically designed to help optimize settings like Safe Links within the scope of Microsoft 365 E5 subscriptions. This tool directly aligns with ensuring that configurations are up to date and adhering to Microsoft’s recommended security practices.
send
light_mode
delete
All Pages