Microsoft MS-102 Exam Practice Questions (P. 3)
- Full Access (389 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Endpoint.
When users attempt to access the portal of a partner company, they receive the message shown in the following exhibit.

You need to enable user access to the partner company's portal.
Which Microsoft Defender for Endpoint setting should you modify?
When users attempt to access the portal of a partner company, they receive the message shown in the following exhibit.

You need to enable user access to the partner company's portal.
Which Microsoft Defender for Endpoint setting should you modify?
- AAlert notifications
- BAlert suppression
- CCustom detections
- DAdvanced hunting
- EIndicatorsMost Voted
Correct Answer:
E
E
send
light_mode
delete
Question #22
HOTSPOT -
You have a Microsoft 365 E3 subscription.
You plan to launch Attack simulation training for all users.
Which social engineering technique and training experience will be available? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You have a Microsoft 365 E3 subscription.
You plan to launch Attack simulation training for all users.
Which social engineering technique and training experience will be available? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

send
light_mode
delete
Question #23
You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365.
You need to ensure that users are prevented from opening or downloading malicious files from Microsoft Teams, OneDrive, or SharePoint Online.
What should you do?
You need to ensure that users are prevented from opening or downloading malicious files from Microsoft Teams, OneDrive, or SharePoint Online.
What should you do?
- ACreate a new Anti-malware policy.
- BConfigure the Safe Links global settings.
- CCreate a new Anti-phishing policy.
- DConfigure the Safe Attachments global settings.Most Voted
Correct Answer:
D
D

To secure your Microsoft 365 environment against malicious files in Microsoft Teams, SharePoint, and OneDrive, setting up Safe Attachments in the Microsoft Defender portal is essential. This feature actively scans and handles potentially malicious files across these platforms. By configuring Safe Attachments, any file identified as dangerous is blocked, preventing users from opening or downloading it, effectively safeguarding your organization’s digital workspace from security threats.
send
light_mode
delete
Question #24
HOTSPOT -
Your company uses Microsoft Defender for Endpoint. Microsoft Defender for Endpoint includes the device groups shown in the following table.

You onboard a computer named computer1 to Microsoft Defender for Endpoint as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement.
NOTE: Each correct selection is worth one point.
Your company uses Microsoft Defender for Endpoint. Microsoft Defender for Endpoint includes the device groups shown in the following table.

You onboard a computer named computer1 to Microsoft Defender for Endpoint as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement.
NOTE: Each correct selection is worth one point.

send
light_mode
delete
Question #25
HOTSPOT -
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Office 365.
The subscription has the default inbound anti-spam policy and a custom Safe Attachments policy.
You need to identify the following information:
The number of email messages quarantined by zero-hour auto purge (ZAP)
The number of times users clicked a malicious link in an email message
Which Email & collaboration report should you use? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Office 365.
The subscription has the default inbound anti-spam policy and a custom Safe Attachments policy.
You need to identify the following information:
The number of email messages quarantined by zero-hour auto purge (ZAP)
The number of times users clicked a malicious link in an email message
Which Email & collaboration report should you use? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

send
light_mode
delete
Question #26
You have a Microsoft 365 tenant.
You plan to manage incidents in the tenant by using the Microsoft 365 Defender.
Which Microsoft service source will appear on the Incidents page of the Microsoft 365 Defender portal?
You plan to manage incidents in the tenant by using the Microsoft 365 Defender.
Which Microsoft service source will appear on the Incidents page of the Microsoft 365 Defender portal?
- AMicrosoft Sentinel
- BMicrosoft Defender for Cloud
- CAzure Arc
- DMicrosoft Defender for IdentityMost Voted
Correct Answer:
D
D

Definitely, when deciding which service source will show up on the Incidents page of the Microsoft 365 Defender portal, it's crucial to understand how Microsoft’s various security services interact. Microsoft Defender for Identity specializes in detecting identity-based threats across on-premises and cloud environments and channels these alerts directly into Microsoft 365 Defender. This integration allows for a cohesive understanding and management of security threats, making it the correct choice for visibility on the M365 Defender's Incidents page. This is a central aspect for administrators aiming to safeguard identity resources in their environments.
send
light_mode
delete
Question #27
Your network contains an on-premises Active Directory domain named contoso.local. The domain contains five domain controllers.
Your company purchases Microsoft 365 and creates an Azure AD tenant named contoso.onmicrosoft.com.
You plan to install Azure AD Connect on a member server and implement pass-through authentication.
You need to prepare the environment for the planned implementation of pass-through authentication.
Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Your company purchases Microsoft 365 and creates an Azure AD tenant named contoso.onmicrosoft.com.
You plan to install Azure AD Connect on a member server and implement pass-through authentication.
You need to prepare the environment for the planned implementation of pass-through authentication.
Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
- AFrom a domain controller, install an Authentication Agent.
- BFrom the Microsoft Entra admin center, configure an authentication method.
- CFrom Active Directory Domains and Trusts, add a UPN suffix.Most Voted
- DModify the email address attribute for each user account.
- EFrom the Microsoft Entra admin center, add a custom domain name.Most Voted
- FModify the User logon name for each user account.Most Voted
Correct Answer:
ABE
ABE

When setting up pass-through authentication with Azure AD Connect, one of the initial necessary steps is to configure the authentication environment properly. Essential actions include installing an Authentication Agent on a domain controller, which is crucial for facilitating direct authentication requests between on-premises environments and Azure AD. Additionally, configuring an authentication method in the Microsoft Entra admin center is vital to define how authentication requests are handled. Lastly, adding a custom domain name in the Microsoft Entra admin center aligns the Azure AD tenant with the organizational domain, ensuring a smoother integration and user experience. These steps are instrumental in preparing the environment for pass-through authentication effectively.
send
light_mode
delete
Question #28
HOTSPOT -
You have a new Microsoft 365 E5 tenant.
Enable Security defaults is set to Yes.
A user signs in to the tenant for the first time.
Which multi-factor authentication (MFA) method can the user use, and how many days does the user have to register for MFA? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You have a new Microsoft 365 E5 tenant.
Enable Security defaults is set to Yes.
A user signs in to the tenant for the first time.
Which multi-factor authentication (MFA) method can the user use, and how many days does the user have to register for MFA? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

send
light_mode
delete
Question #29
Your network contains an on-premises Active Directory domain named contoso.com. The domain contains the objects shown in the following table.

You configure Azure AD Connect to sync contoso.com to Azure AD.
Which objects will sync to Azure AD?

You configure Azure AD Connect to sync contoso.com to Azure AD.
Which objects will sync to Azure AD?
- AGroup1 only
- BUser1 and User2 only
- CGroup1 and User1 only
- DGroup1, User1, and User2Most Voted
Correct Answer:
D
D
send
light_mode
delete
Question #30
You have a Microsoft 365 E5 subscription.
You need to create Conditional Access policies to meet the following requirements:
All users must use multi-factor authentication (MFA) when they sign in from outside the corporate network.
Users must only be able to sign in from outside the corporate network if the sign-in originates from a compliant device.
All users must be blocked from signing in from outside the United States and Canada.
Only users in the R&D department must be blocked from signing in from both Android and iOS devices.
Only users in the finance department must be able to sign in to an Azure AD enterprise application named App1. All other users must be blocked from signing in to App1.
What is the minimum number of Conditional Access policies you should create?
You need to create Conditional Access policies to meet the following requirements:
All users must use multi-factor authentication (MFA) when they sign in from outside the corporate network.
Users must only be able to sign in from outside the corporate network if the sign-in originates from a compliant device.
All users must be blocked from signing in from outside the United States and Canada.
Only users in the R&D department must be blocked from signing in from both Android and iOS devices.
Only users in the finance department must be able to sign in to an Azure AD enterprise application named App1. All other users must be blocked from signing in to App1.
What is the minimum number of Conditional Access policies you should create?
- A3
- B4Most Voted
- C5
- D6
- E7
- F8
Correct Answer:
B
B

Creating four Conditional Access policies can proficiently manage various user access requirements in Microsoft 365. For optimal configuration:
1) Implement a policy targeting all users for mandatory multi-factor authentication and compliance from non-corporate networks.
2) Establish a policy restricting user access from locations other than the US and Canada.
3) Deploy a policy to block R&D department users from signing in on Android and iOS devices.
4) Set a policy that restricts access to the Azure AD application App1 for all except finance department users. This structured approach efficiently meets your Microsoft 365 security needs with minimal policy creation.
send
light_mode
delete
All Pages