Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
MS-100
Free trial
Verified
Question 26
You need to consider the underlined segment to establish whether it is accurate.
You have recently configured a conditional access policy to force mobile device users to use multi-factor authentication when accessing Microsoft SharePoint.
To check who used multi-factor authentication to authenticate, you view the Usage reports from Azure Active Directory admin center.
Select No adjustment required if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option.
- A: No adjustment required
- B: user sign-ins
- C: event logs
- D: audit logs
Question 27
Your company has an Enterprise E5 subscription of Microsoft 365.
You have been tasked with making sure that sales department users are compelled to make use of multi-factor authentication for all cloud-based applications.
Which of the following actions should you take?
- A: You should create an DLP.
- B: You should create a new app registration.
- C: You should create a session policy.
- D: You should create a sign-in risk policy.
Question 28
Your company has a Microsoft 365 subscription.
After implementing Active Directory Federation Services (AD FS), you are instructed to configure AD FS user authentication auditing.
You are preparing to run the Register-AzureADConnectHealthSyncAgent cmdlet.
Which of the following is the server that the cmdlet should be run from?
NOTE: Each correct selection is worth one point.
- A: A member server.
- B: A domain controller.
- C: An Azure AD Connect server.
- D: An AD FS server.
Question 29
You need to consider the underlined segment to establish whether it is accurate.
Your company has deployed a Microsoft 365 tenant and to implemented multi-factor authentication.
They have four offices, of which one houses the R&D department. You have been asked to make sure that multi-factor authentication is compulsory only for users in the office houses the R&D department.
You create a conditional access policy.
Select No adjustment required if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option.
- A: No adjustment required
- B: password protection
- C: DLP
- D: label
Question 30
Your company has configured all user email to be stored in Microsoft Exchange Online.
You have been tasked with keeping a duplicate of all the email messages from a specified user that includes a specific word.
Solution: You start by creating a spam filter policy via the Security & Compliance admin center.
Does the solution meet the goal?
- A: Yes
- B: No
Question 31
Your company has configured all user email to be stored in Microsoft Exchange Online.
You have been tasked with keeping a duplicate of all the email messages from a specified user that includes a specific word.
Solution: You start by initiating a message trace via the Security & Compliance admin center.
Does the solution meet the goal?
- A: Yes
- B: No
Question 32
Your company has configured all user email to be stored in Microsoft Exchange Online.
You have been tasked with keeping a duplicate of all the email messages from a specified user that includes a specific word.
Solution: You start by creating a label and label policy via the Security & Compliance admin center.
Does the solution meet the goal?
- A: Yes
- B: No
Question 33
Your company has a Microsoft 365 subscription.
You have previously created a group that includes users who send email messages to external users on a regular basis. The group's manager would like to group wants to examine messages that include attachments at random.
You are required to make sure that the manager can achieve his goal, but only make ten out of a hundred messages accessible to him.
You need to provide the manager with the ability to review messages that contain attachments sent from the Support group users to external users. The manager must have access to only 10 percent of the messages.
Which of the following should you create?
- A: A label policy.
- B: A conditional access policy.
- C: A DLP policy.
- D: A supervisor policy.
Question 34
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
After acquiring a Microsoft 365 Enterprise subscription, you are tasked with migrating your company's Microsoft Exchange Server 2016 mailboxes and groups to
Exchange Online.
You have started a new migration batch. You, subsequently, receive complaints from on-premises Exchange Server users about slow performance.
Your analysis shows that the issue has resulted from the migration. You want to make sure that the effect the mailbox migration has on users is decreased.
Solution: You create a mail flow rule.
Does the solution meet the goal?
- A: Yes
- B: No
Question 35
You need to consider the underlined segment to establish whether it is accurate.
Your company has recently acquired a new sales application.
You navigate to the Discovered apps page in Cloud Discovery via Microsoft Cloud App Security to check the application's score. You then notice that a number of the applications have a low score as a result of omitted domain registration and consumer popularity data.
You want to make sure that the score is not affected by the omitted data.
You have to configure app tags via the Cloud Discover settings
Select No adjustment required if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option.
What should you configure from the?
- A: No adjustment required
- B: a label
- C: App Connector flow
- D: a custom key
Question 36
You have been tasked with migrating your company's on-premises Microsoft Exchange Server 2013 organization to Microsoft 365.
You plan to make use of the cutover migration method.
Which of the following is the maximum recommended number of mailboxes that you should migrate?
- A: 2000
- B: 1000
- C: 150
- D: 75
Question 37
You have recently created a Microsoft 365 Enterprise subscription and assigned all users licenses for all products.
You want to configure all Microsoft Office 365 ProPlus installations to be done via a network share. You also want to make sure that users are prevented from using the Internet to install Office 365 ProPlus.
Which of the following is the type of file that you should create?
NOTE: Each correct selection is worth one point.
- A: An HTML download file.
- B: An XML download file.
- C: An HTTP download file.
- D: An EXE download file.
Question 38
You have recently created a Microsoft 365 subscription.
You have prepared an XML file for the upcoming Microsoft Office 365 ProPlus deployment.
The Channel attribute for the OfficeClientEdition attribute is set to Broad, while the Channel attribute for the Updates element is set to Targeted.
Which of the following the following is the frequency with which the installation of Office 365 ProPlus feature updates will occur?
- A: Weekly.
- B: Monthly
- C: Six monthly
- D: Annually
Question 39
You have recently created a Microsoft 365 subscription.
You have prepared an XML file for the upcoming Microsoft Office 365 ProPlus deployment.
The Channel attribute for the OfficeClientEdition attribute is set to Broad, while the Channel attribute for the Updates element is set to Targeted.
Which of the following the following are the months of the year that security updates will be installed?
- A: January and July.
- B: March and September
- C: June and December
- D: April and October
Question 40
Your company's network contains two Active Directory forests, with two domains configured per forest. All workstations are domain-joined and have Windows 10 installed.
You have created a Microsoft Azure Active Directory (Azure AD) tenant in preparation for configuring Hybrid Azure AD join for the workstations.
You want to make sure that the tenant can be discovered by the workstations.
Which of the following should you create in each forest?
- A: A migration endpoint.
- B: A new conditional access policy.
- C: A new trust relationship.
- D: A new service connection point (SCP).
Question 41
After your company acquires a Microsoft 365 subscription, they instruct you to move all email data from their corporate Gmail to Microsoft Exchange Online.
The migration will be done via the Exchange admin center.
Which of the following is the migration method you should use?
- A: Exchange Hybrid
- B: IMAP migration
- C: Cutover
- D: Express migration
Question 42
After your company acquires a Microsoft 365 subscription, they instruct you to move all email data from their corporate Gmail to Microsoft Exchange Online.
The migration will be done via the Exchange admin center.
Which of the following is TRUE with regards to the data included in the migration?
- A: All data will be migrated.
- B: Only email data will be migrated.
- C: Email and task data will be migrated.
- D: Email and contact data will be migrated.
Question 43
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
After acquiring a Microsoft 365 Enterprise subscription, you are tasked with migrating your company's Microsoft Exchange Server 2016 mailboxes and groups to
Exchange Online.
You have started a new migration batch. You, subsequently, receive complaints from on-premises Exchange Server users about slow performance.
Your analysis shows that the issue has resulted from the migration. You want to make sure that the effect the mailbox migration has on users is decreased.
Solution: You modify the migration endpoint settings.
Does the solution meet the goal?
- A: Yes
- B: No
Question 44
You need to consider the underlined segment to establish whether it is accurate.
You company has a Microsoft 365 subscription.
To prevent your company from receiving phishing email messages, create a new mail flow rule.
Select No adjustment required if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option.
- A: No adjustment required
- B: Label policy.
- C: Threat management policy.
- D: Spam filter policy.
Question 45
You work for a company manages all their identities in the cloud.
After acquiring a new domain name, you are tasked with making sure that the primary email address of all new mailboxes uses the new domain.
Which of the following is the Microsoft Exchange Online PowerShell cmdlet that you should run?
- A: Update-EmailAddressPolicy
- B: Update-OfflineAddressBook
- C: Set-AddressBookPolicy
- D: Set-EmailAddressPolicy
Question 46
You are responsible for your company's Microsoft 365 subscription.
The company introduces a security policy that requires DLP incident reports to be automatically sent to legal department users.
You are required to configure the reports to be delivered via email as often you can.
Which of the following is the option you should use?
- A: Annually
- B: Monthly
- C: Weekly
- D: Quarterly
Question 47
You have been tasked with detecting all users in your company's Microsoft 365 subscription who has a Microsoft Office 365 license as a result of belonging to a group.
You need to make sure that the group used to assign the license is included in your results.
Which of the following actions should you take?
- A: You should access the Azure portal, and navigate to the Licenses blade.
- B: You should access the Microsoft 365 admin center, and navigate to the Products blade.
- C: You should access the Azure portal, and navigate to the Monitor blade.
- D: You should access the Microsoft 365 admin center, and navigate to the Users blade.
Question 48
You need to ensure that Litware has the appropriate license to support the planned changes. The solution must minimize costs.
Which license type should you use?
- A: Microsoft 365 Enterprise E5
- B: Office 365 Enterprise F3
- C: Microsoft 365 Enterprise E3
- D: Office 365 Enterprise E5
Question 49
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You need to assign User2 the required roles to meet the security requirements.
Solution: From the Office 365 admin center, you assign User2 the Security Reader role. From the Exchange admin center, you assign User2 the Compliance
Management role.
Does this meet the goal?
- A: Yes
- B: No
Question 50
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You need to assign User2 the required roles to meet the security requirements.
Solution: From the Office 365 admin center, you assign User2 the Records Management role. From the Exchange admin center, you assign User2 the Help Desk role.
Does this meet the goal?
- A: Yes
- B: No
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!