Ms 101
Ms 101
ms-101.vce
MS-101
MS-101
Version 14.0
Score: 800/1000
Version:
Time Limit: 120 Minutes
1
Licensed to PEAKUP TECHNOLOGY [email protected]
Implement modern device services
(56 questions)
Question 1
You have a hybrid Azure Active Directory (Azure AD) tenant and a Microsoft Endpoint Configuration
Manager deployment.
You need to identify which devices support co-management without requiring the installation of
additional software.
Device1 only
Device2 only
Device3 only
Device2 and Device3 only
Device1, Device2, and Device3
Your network contains an on-premises Active Directory domain. The domain contains 2,000
computers that run Windows 8.1 and have applications installed as shown in the following table.
You need to ensure that App1 and App2 have an UpgradeDecision status of Ready to upgrade.
Solution: You set the importance status of App2 to Low install count.
Yes
No
Explanation:
Explanation:
If an app is installed on less than 2% of the targeted devices, it's marked Low install count. Two
percent is the default value. You can adjust the threshold in the readiness settings from 0% to 10%.
Desktop Analytics automatically marks these apps as Ready to upgrade.
Reference:
https://docs.microsoft.com/en-us/configmgr/desktop-analytics/about-deployment-plans
You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users
shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Solution:
Explanation:
Reference:
https://docs.microsoft.com/en-us/mem/intune/enrollment/windows-enroll
Your network contains an Active Directory domain named contoso.com that is synced to Microsoft
Azure Active Directory (Azure AD).
You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current
Branch).
You add a new device named Device1 to the domain. You install the Configuration Manager client on
Device1.
You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration
Manager.
Solution: You create a device configuration profile from the Device Management admin center.
Yes
No
Your network contains an on-premises Active Directory domain. The domain contains 2,000
computers that run Windows 8.1 and have applications installed as shown in the following table.
You need to ensure that App1 and App2 have an UpgradeDecision status of Ready to upgrade.
Yes
No
Explanation:
Explanation:
Business Critical will prevent the app having a status of Ready to upgrade.
References:
https://docs.microsoft.com/en-us/windows/deployment/upgrade/upgrade-readiness-identify-apps
Your network contains an on-premises Active Directory domain. The domain contains domain
controllers that run Windows Server 2019. The functional level of the forest and the domain is
Windows Server 2012 R2.
The domain contains 100 computers that run Windows 10 and a member server named Server1 that
runs Windows Server 2012 R2.
You plan to use Server1 to manage the domain and to configure Windows 10 Group Policy settings.
You need to configure the Windows Update for Business Group Policy settings on Server1.
Yes
No
Question 7
You have Windows 10 Pro devices that are joined to an Active Directory domain.
You plan to create a Microsoft 365 tenant and to upgrade the devices to Windows 10 Enterprise.
What are two prerequisites of the deployment? Each correct answer presents a complete solution.
Reference:
Question 8
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an on-premises Active Directory domain. The domain contains domain
controllers that run Windows Server 2019. The functional level of the forest and the domain is
Windows Server 2012 R2.
The domain contains 100 computers that run Windows 10 and a member server named Server1 that
runs Windows Server 2012 R2.
You plan to use Server1 to manage the domain and to configure Windows 10 Group Policy settings.
You need to configure the Windows Update for Business Group Policy settings on Server1.
Solution: You raise the forest functional level to Windows Server 2016. You copy the Group Policy
Administrative Templates from a Windows 10 computer to the Netlogon share on all the domain
controllers.
Yes
No
You need to reduce the likelihood that the sign-ins are identified as risky.
From the Security & Compliance admin center, create a classification label.
From the Security & Compliance admin center, add the users to the Security Readers
role group.
From the Azure Active Directory admin center, configure the trusted IPs for multi-
factor authentication.
From the Conditional access blade in the Azure Active Directory admin center, create
named locations.
Explanation:
References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition
References:
https://docs.microsoft.com/en-us/sccm/core/plan-design/choose-a-device-management-
solution#bkmk_intune
You have three devices enrolled in Microsoft Endpoint Manager as shown in the following table.
The device compliance policies in Endpoint Manager are configured as shown in the following table.
The device compliance policies have the assignments shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Solution:
Your network contains an Active Directory domain named contoso.com that uses Microsoft System
Center Configuration Manager (Current Branch).
You need to ensure that you can analyze the upgrade readiness of all the Windows 8.1 devices and
analyze the update compliance of all the Windows 10 devices.
What should you do? To answer, select the appropriate options in the answer area.
Solution:
Explanation:
References:
https://docs.microsoft.com/en-us/windows/deployment/upgrade/upgrade-readiness-get-started
https://docs.microsoft.com/en-us/windows/deployment/update/update-compliance-get-started
You need to provide a user with the ability to sign up for Microsoft Store for Business for
contoso.com. The solution must use the principle of least privilege.
References:
https://docs.microsoft.com/en-us/microsoft-store/roles-and-permissions-microsoft-store-for-
business
Question 14
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
When you try to enroll an iOS device in Intune, you get an error.
You need to ensure that you can enroll the iOS device in Intune.
Yes
No
The company plans to add a custom domain named fabrikam.com to the subscription, and then to
enable enrollment of devices to Endpoint Manager by using auto-discovery for fabrikam.com.
You need to add a DNS record to the fabrikam.com domain to enable device enrollment by using
auto-discovery.
Which record type should you use for the new record?
PTR
SRV
CNAME
TXT
Explanation:
Reference:
https://docs.microsoft.com/en-us/mem/intune/enrollment/windows-enroll#simplify-windows-
enrollment-without-azure-ad-premium
You have a Microsoft Azure Active Directory (Azure AD) tenant that includes the users shown in the
following table.
The device limit restrictions in Intune are configured as shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Solution:
Explanation:
Reference:
https://docs.microsoft.com/en-us/intune/device-enrollment-manager-enroll
16 Licensed to PEAKUP TECHNOLOGY
[email protected]
Question 17
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com that is synced to Microsoft
Azure Active Directory (Azure AD).
You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current
Branch).
You add a new device named Device1 to the domain. You install the Configuration Manager client on
Device1.
You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration
Manager.
Yes
No
Explanation:
References:
https://www.scconfigmgr.com/2017/11/30/how-to-setup-co-management-part-6/
You plan to delay the installation of new Windows builds so that the IT department can test
application compatibility.
You need to prevent Windows from being updated for the next 30 days.
Which two Group Policy settings should you configure? Each correct answer presents part of the
solution.
References:
https://insider.windows.com/en-us/for-business-organization-admin/
You have a Microsoft 365 subscription that contains the users shown in the following table.
You configure an Enrollment Status Page profile as shown in the following exhibit.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Explanation:
Reference:
https://docs.microsoft.com/en-us/mem/intune/enrollment/windows-enrollment-status
Your network contains an on-premises Active Directory domain. The domain contains domain
controllers that run Windows Server 2019. The functional level of the forest and the domain is
Windows Server 2012 R2.
The domain contains 100 computers that run Windows 10 and a member server named Server1 that
runs Windows Server 2012 R2.
You plan to use Server1 to manage the domain and to configure Windows 10 Group Policy settings.
You need to configure the Windows Update for Business Group Policy settings on Server1.
Solution: You copy the Group Policy Administrative Templates from a Windows 10 computer to
Server1.
Yes
No
You have a Microsoft 365 subscription that contains the users in the following table.
In Microsoft Endpoint Manager, you create two device type restrictions that have the settings shown
in the following table.
In Microsoft Endpoint Manager, you create three device limit restrictions that have the settings
shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Question 22
Your network contains an on-premises Active Directory domain that syncs to Azure Active Directory
(Azure AD).
The domain contains two servers named Server1 and Server2 that run Windows Server 2016. Server1
has the File Server Resource Manager role service installed.
You need to configure Server1 to use the Azure Rights Management (Azure RMS) connector.
Explanation:
If you want to use the server configuration tool for the RMS connector, to automate the
configuration of registry settings on your on-premises servers, download and run the
GenConnectorConfig.ps1 script.
References:
https://docs.microsoft.com/en-us/azure/information-protection/install-configure-rms-
connector#installing-the-rms-connector
Assignments:
- Users and groups: User1
- Cloud apps or actions: Office 365 Exchange Online
- Conditions: 0 conditions selected
Access controls:
- Grant: Grant access
- Session: 0 controls selected
Enable policy: On
Assignments:
- Users and groups: User1
- Cloud apps or actions: Office 365 Exchange Online
- Conditions: 0 conditions selected
Access controls:
- Grant: Block access
- Session: 0 controls selected
Enable policy: On
You need to ensure that User1 can access Microsoft Exchange Online only from devices that are
marked as compliant.
The network contains an Active Directory domain named contoso.com. The domain contains 500
client computers. Each office is configured as a separate subnet.
You must configure the computers to meet the following corporate requirements:
You need to recommend a solution to redeploy the computers. The solution must minimize the
deployment time.
a provisioning package
wipe and load refresh
Windows Autopilot
an in-place upgrade
Explanation:
Explanation:
By using a Provisioning, IT administrators can create a self-contained package that contains all of the
configuration, settings, and apps that need to be applied to a device.
Incorrect Answers:
C: With Windows Autopilot the user can set up pre-configure devices without the need consult their
IT administrator.
D: Use the In-Place Upgrade option when you want to keep all (or at least most) existing applications.
References:
https://docs.microsoft.com/en-us/windows/deployment/windows-10-deployment-scenarios
https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot
Your network contains an Active Directory domain named contoso.com. All client devices run
Windows 10 and are joined to the domain.
You update the Windows 10 devices by using Windows Update for Business.
What is the maximum amount of time you can defer Windows 10 updates? To answer, select the
appropriate options in the answer area.
Solution:
Explanation:
References:
https://docs.microsoft.com/en-us/windows/deployment/update/waas-manage-updates-wufb
Microsoft Store for Business has the following Shopping behavior settings:
You need to identify which users can add apps to the Microsoft Store for Business private store.
Question 27
A user receives the following message when attempting to sign in to https://myapps.microsoft.com:
“Your sign-in was blocked. We’ve detected something unusual about this sign-in. For example, you
might be signing in from a new location, device, or app. Before you can continue, we need to verify
your identity. Please contact your admin.”
References:
Question 28
HOTSPOT
You have the Microsoft Azure Active Directory (Azure AD) users shown in the following table.
The device compliance policies in Intune are configured as shown in the following table.
You create a conditional access policy that has the following settings:
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Question 29
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com that is synced to Microsoft
Azure Active Directory (Azure AD).
You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current
Branch).
You add a new device named Device1 to the domain. You install the Configuration Manager client on
Device1.
You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration
Manager.
Solution: Define a Configuration Manager device collection as the pilot collection. Add Device1 to the
collection.
Yes
No
You have a line-of-business application named App1 that users access by using the My Apps portal.
After some recent security breaches, you implement a conditional access policy for App1 that uses
Conditional Access App Control.
You need to be alerted by email if impossible travel is detected for a user of App1. The solution must
ensure that alerts are generated for App1 only.
From Microsoft Cloud App Security, create a Cloud Discovery anomaly detection
policy.
From Microsoft Cloud App Security, modify the impossible travel alert policy.
From Microsoft Cloud App Security, create an app discovery policy.
From the Azure Active Directory admin center, modify the conditional access policy.
Explanation:
References:
https://docs.microsoft.com/en-us/cloud-app-security/cloud-discovery-anomaly-detection-policy
Question 31
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
When you try to enroll an iOS device in Intune, you get an error.
You need to ensure that you can enroll the iOS device in Intune.
Yes
No
Explanation:
https://docs.microsoft.com/en-us/intune/apple-mdm-push-certificate-get
Question 32
HOTSPOT
You have three devices enrolled in Microsoft Intune as shown in the following table.
The device compliance policies in Intune are configured as shown in the following table.
The device compliance policies have the assignments shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Solution:
Your network contains an Active Directory forest named contoso.com that is synced to Microsoft
Azure Active Directory (Azure AD).
Question 34
Your company has a Microsoft 365 E5 subscription.
You need to prevent the research department users from accessing potentially unsafe websites by
using hyperlinks embedded in email messages and documents. Users in other departments must not
be restricted.
What should you do from the Security & Compliance admin center?
Create a data loss prevention (DLP) policy that has a Content is shared condition.
Modify the default safe links policy.
Create a data loss prevention (DLP) policy that has a Content contains condition.
Create a new safe links policy.
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/set-up-atp-safe-links-
policies#policies-that-apply-to-specific-email-recipients
When you try to enroll an iOS device in Intune, you get an error.
You need to ensure that you can enroll the iOS device in Intune.
Yes
No
You have three devices enrolled in Microsoft Endpoint Manager as shown in the following table.
The device compliance policies in Endpoint Manager are configured as shown in the following table.
The device compliance policies have the assignments shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Solution:
You need to ensure that administrators can manage the configuration settings for all the Windows 10
devices in your organization.
References:
https://docs.microsoft.com/en-us/intune/mdm-authority-set
Question 38
HOTSPOT
You have an Azure subscription and an on-premises Active Directory domain. The domain contains
50 computers that run Windows 10.
You need to centrally monitor System log events from the computers.
What should you do? To answer, select the appropriate options in the answer area.
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/azure-monitor/learn/quick-collect-windows-computer
Question 39
Your network contains an Active Directory domain named contoso.com. The domain contains 100
Windows 8.1 devices.
You plan to deploy a custom Windows 10 Enterprise image to the Windows 8.1 devices.
a provisioning package
an in-place upgrade
wipe and load refresh
Windows Autopilot
Explanation:
References:
https://docs.microsoft.com/en-us/microsoft-365/enterprise/windows10-infrastructure
You plan to allow users from the engineering department to enroll their mobile device in mobile
device management (MDM).
The device type restrictions are configured as shown in the following table.
The device limit restrictions are configured as shown in the following table.
What is the effective configuration for the members of the Engineering group? To answer, select the
appropriate options in the answer area.
Question 41
Your company has a Microsoft 365 E3 subscription.
All devices run Windows 10 Pro and are joined to Microsoft Azure Active Directory (Azure AD).
You need to change the edition of Windows 10 to Enterprise the next time users sign in to their
computer. The solution must minimize downtime for the users.
Windows Autopilot
Windows Update
Subscription Activation
an in-place upgrade
Explanation:
References:
https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot
Your network contains an on-premises Active Directory domain. The domain contains 2,000
computers that run Windows 8.1 and have applications installed as shown in the following table.
You need to ensure that App1 and App2 have an UpgradeDecision status of Ready to upgrade.
Yes
No
Explanation:
Explanation:
App1 has a “low install count” (2% or less) so will be Ready to upgrade. We just need to change the
setting for App2.
References:
https://docs.microsoft.com/en-us/windows/deployment/upgrade/upgrade-readiness-identify-apps
You have 100 computers that run Windows 8.1 and are enrolled in Upgrade Readiness.
From Upgrade Readiness, you view the applications shown in the following table.
You enroll a computer named Computer3 in Upgrade Readiness. Computer3 has the following
configurations:
8 GB of memory
64-bit architecture
An application named App3 installed
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
You create two device compliance policies for Android devices as shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Explanation:
References:
https://docs.microsoft.com/en-us/intune-user-help/enroll-your-device-in-intune-android
Question 45
You have a Microsoft 365 tenant.
You need to ensure that when users join their device to Microsoft Azure Active Directory (Azure AD),
the device is enrolled in Microsoft Intune automatically.
References:
https://docs.microsoft.com/en-us/intune/windows-enroll
Your network contains an Active Directory domain named contoso.com that is synced to Microsoft
Azure Active Directory (Azure AD).
You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current
Branch).
You add a new device named Device1 to the domain. You install the Configuration Manager client on
Device1.
You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration
Manager.
Yes
No
The users and groups settings are configured as shown in the Users and Groups exhibit. (Click Users
and Groups tab.)
Members of the Security reader group report that they cannot sign in to Microsoft Active Directory
(Azure AD) on their device while they are in the office.
You need to ensure that the members of the Security reader group can sign in in to Azure AD on their
device while they are in the office. The solution must use the principle of least privilege.
References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition
Question 48
Your company has a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com and a
Microsoft 365 subscription.
The company recently hired four new users who have the devices shown in the following table.
You configure the Microsoft 365 subscription to ensure that the new devices enroll in Microsoft
Intune automatically.
Which users have a device that can enroll in Microsoft Intune automatically?
Your network contains an Active Directory domain named contoso.com that is synced to Microsoft
Azure Active Directory (Azure AD).
You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current
Branch).
You add a new device named Device1 to the domain. You install the Configuration Manager client on
Device1.
You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration
Manager.
Yes
No
Question 50
Your company has a Microsoft 365 subscription. The subscription contains 500 devices that run
Windows 10 and 100 devices that run iOS.
You need to create Microsoft Intune device configuration profiles to meet the following
requirements:
What is the minimum number of device configuration profiles that you should create?
4
2
1
You need to ensure that users can enroll devices in Microsoft Endpoint Manager without manually
entering the address of Microsoft Endpoint Manager.
Which two DNS records should you create? Each correct answer presents part of the solution.
Reference:
https://docs.microsoft.com/en-us/mem/intune/enrollment/windows-enroll#simplify-windows-
enrollment-without-azure-ad-premium
You have a Microsoft Azure Active Directory (Azure AD) tenant that includes the users shown in the
following table.
The device type restrictions in Endpoint Manager are configured as shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Solution:
When you try to enroll an iOS device in Intune, you get an error.
You need to ensure that you can enroll the iOS device in Intune.
Yes
No
Question 54
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an on-premises Active Directory domain. The domain contains 2,000
computers that run Windows 8.1 and have applications installed as shown in the following table.
You need to ensure that App1 and App2 have an UpgradeDecision status of Ready to upgrade.
Yes
No
Explanation:
52 Licensed to PEAKUP TECHNOLOGY
[email protected]
Explanation:
App1 has a “low install count” (2% or less) so will be Ready to upgrade. We need to change the
setting for App2.
References:
https://docs.microsoft.com/en-us/windows/deployment/upgrade/upgrade-readiness-identify-apps
Question 55
Your company uses Microsoft Endpoint Configuration Manager and Microsoft Endpoint Manager to
co-manage devices.
Which two actions can be performed only from Endpoint Manager? Each correct answer presents a
complete solution.
References:
https://docs.microsoft.com/en-us/sccm/comanage/overview
https://docs.microsoft.com/en-us/sccm/mdm/deploy-use/create-vpn-profiles
When you try to enroll an iOS device in Intune, you get an error.
You need to ensure that you can enroll the iOS device in Intune.
Yes
No
Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in
Seattle and New York.
The company has the employees and devices shown in the following table.
Existing Environment
The network contains an on-premises Active Directory forest named contoso.com. The forest
contains the servers shown in the following table.
All servers run Windows Server 2016. All desktops and laptops run Windows 10 Enterprise and are
joined to the domain.
The mobile devices of the users in the Montreal and Seattle offices run Android. The mobile devices
of the users in the New York office run iOS.
The domain is synced to Azure Active Directory (Azure AD) and includes the users shown in the
following table.
Requirements
Planned Changes
When a Windows 10 device is joined to Azure AD, the device must enroll in Intune automatically.
Dedicated support technicians must enroll all the Montreal office mobile devices in Intune.
User1 must be able to enroll all the New York office mobile devices in Intune.
Azure ATP sensors must be installed and must NOT use port mirroring.
Whenever possible, the principle of least privilege must be used.
A Microsoft Store for Business must be created.
Compliance Requirements
Ensure that the users in Group1 can only access Microsoft Exchange Online from devices that are
enrolled in Intune and configured in accordance with the corporate policy.
Configure Windows Information Protection (WIP) for the Windows 10 devices.
Question 57
HOTSPOT
As of March, how long will the computers in each office remain supported by Microsoft? To answer,
select the appropriate options in the answer area.
References:
https://www.windowscentral.com/whats-difference-between-quality-updates-and-feature-updates-
windows-10
Question 58
You need to ensure that User1 can enroll the devices to meet the technical requirements.
From the Azure Active Directory admin center, assign User1 the Cloud device
administrator role.
From the Azure Active Directory admin center, configure the Maximum number of
devices per user setting.
From the Endpoint Management admin center, add User1 as a device enrollment
manager.
From the Endpoint Management admin center, configure the Enrollment restrictions.
Explanation:
References:
https://docs.microsoft.com/en-us/sccm/mdm/deploy-use/enroll-devices-with-device-enrollment-
manager
You need to meet the technical requirements and planned changes for Intune.
What should you do? To answer, select the appropriate options is the answer area.
Solution:
Explanation:
Reference:
https://docs.microsoft.com/en-us/intune/windows-enroll
You need to configure a conditional access policy to meet the compliance requirements.
Which two additional settings should you configure in Policy1? To answer, select the appropriate
settings in the answer area.
Explanation:
References:
https://docs.microsoft.com/en-us/intune/create-conditional-access-intune
Question 61
You need to ensure that the support technicians can meet the technical requirement for the
Montreal office mobile devices.
1
4
7
31
Explanation:
References:
https://docs.microsoft.com/en-us/sccm/mdm/deploy-use/enroll-devices-with-device-enrollment-
manager
You need to meet the Intune requirements for the Windows 10 devices.
What should you do? To answer, select the appropriate options in the answer area.
Solution:
Explanation:
References:
https://docs.microsoft.com/en-us/intune/windows-enroll
User2
User3
User4
User5
Explanation:
References:
https://docs.microsoft.com/en-us/microsoft-store/roles-and-permissions-microsoft-store-for-
business
ADatum Corporation is an international financial services company that has 5,000 employees.
ADatum has six offices: a main office in New York and five branch offices in Germany, the United
Kingdom, France, Spain, and Italy.
All the offices are connected to each other by using a WAN link. Each office connects directly to the
Internet.
Existing Environment
Current Infrastructure
All mailboxes are hosted in Microsoft 365. The users in each office have email suffixes that include
the country of the user, for example, [email protected] or [email protected].
Each office has a security information and event management (SIEM) appliance. The appliance comes
from three different vendors.
Problem Statements
ADatum entered into litigation. The legal department must place a hold on all the documents of a
user named User1 that are in Microsoft 365.
Requirements
Business Goals
ADatum wants to be fully compliant with all the relevant data privacy laws in the regions where is
operates.
ADatum wants to minimize the cost of hardware and software whenever possible.
Technical Requirements
Question 64
You need to recommend a solution for the security administrator. The solution must meet the
technical requirements.
References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/untrusted-networks
Question 65
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are
connected to your on-premises network.
Solution: From the Device Management admin center, you create a trusted location and a
compliance policy
Yes
No
Explanation:
Explanation:
Conditional Access in SharePoint Online can be configured to use an IP Address white list to allow
access.
References:
https://techcommunity.microsoft.com/t5/Microsoft-SharePoint-Blog/Conditional-Access-in-
SharePoint-Online-and-OneDrive-for/ba-p/46678
You need to ensure that Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)
considers the digitally signed applications safe and never analyzes them.
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-
atp/manage-indicators
Question 67
Your network contains an on-premises Active Directory domain named contoso.com. The domain
contains 1,000 Windows 10 devices.
You perform a proof of concept (PoC) deployment of Microsoft Defender Advanced Threat
Protection (ATP) for 10 test devices. During the onboarding process, you configure Microsoft
Defender ATP-related data to be stored in the United States.
Create a workspace.
Onboard a new device.
Delete the workspace.
Offboard the test devices.
You have a Microsoft Azure Activity Directory (Azure AD) tenant contains the users shown in the
following table.
Your company uses Microsoft Defender Advanced Threat Protection (ATP). Microsoft Defender ATP
contains the roles shown in the following table.
Microsoft Defender ATP contains the device groups shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Question 69
HOTSPOT
You need to minimize the likelihood that users will be affected by the following threats:
Which policies should you create in the Security & Compliance admin center? To answer, select the
appropriate options in the answer area.
Explanation:
Explanation:
ATP Safe Attachments provides zero-day protection to safeguard your messaging system, by checking
email attachments for malicious content. It routes all messages and attachments that do not have a
virus/malware signature to a special environment, and then uses machine learning and analysis
techniques to detect malicious intent. If no suspicious activity is found, the message is forwarded to
the mailbox.
ATP anti-phishing protection detects attempts to impersonate your users and custom domains. It
applies machine learning models and advanced impersonation-detection algorithms to avert phishing
attacks.
ATP Safe Links provides time-of-click verification of URLs, for example, in emails messages and Office
files. Protection is ongoing and applies across your messaging and Office environment. Links are
scanned for each click: safe links remain accessible and malicious links are dynamically blocked.
References:
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/office-365-
atp#configure-atp-policies
You have an Azure Active Directory (Azure AD) tenant that contains a user named User1.
You need to ensure that User1 is assigned the required role to create file policies and manage alerts
in the Cloud App Security admin center.
Solution: From the Security & Compliance admin center, you assign the Security Administrator role to
User1.
Yes
No
Explanation:
References:
https://docs.microsoft.com/en-us/cloud-app-security/manage-admins
Your company uses Microsoft Defender Advanced Threat Protection (ATP). Microsoft Defender ATP
includes the machine groups shown in the following table.
You onboard a computer named computer1 to Microsoft Defender ATP as shown in the following
exhibit.
Use the drop-down menus to select the answer choice that completes each statement.
You have an Azure Active Directory (Azure AD) tenant that contains a user named User1.
You need to ensure that User1 is assigned the required role to create file policies and manage alerts
in the Cloud App Security admin center.
Solution: From the Azure Active Directory admin center, you assign the Compliance administrator
role to User1.
Yes
No
Explanation:
References:
https://docs.microsoft.com/en-us/cloud-app-security/manage-admins
You need to onboard the devices to Microsoft Defender Advanced Threat Protection (ATP). The
solution must avoid installing software on the devices whenever possible.
Which onboarding method should you use for each operating system? To answer, drag the
appropriate methods to the correct operating systems. Each method may be used once, more than
once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Solution:
Explanation:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-
atp/onboard-downlevel-windows-defender-advanced-threat-protection
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-
atp/configure-server-endpoints-windows-defender-advanced-threat-protection
Question 74
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant that contains a user named User1.
You need to ensure that User1 is assigned the required role to create file policies and manage alerts
in the Cloud App Security admin center.
Solution: From the Cloud App Security admin center, you assign the App/instance admin role for all
Microsoft Online Services to User1.
Yes
No
Explanation:
Explanation:
App/instance admin: Has full or read-only permissions to all of the data in Microsoft Cloud App
Security that deals exclusively with the specific app or instance of an app selected.
Reference:
https://docs.microsoft.com/en-us/cloud-app-security/manage-admins
You have a Microsoft Azure Activity Directory (Azure AD) tenant contains the users shown in the
following table.
Your company uses Microsoft Defender Advanced Threat Protection (ATP). Microsoft Defender ATP
contains the roles shown in the following table.
Microsoft Defender ATP contains the device groups shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Explanation:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/user-
roles-windows-defender-advanced-threat-protection
Question 76
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are
connected to your on-premises network.
Solution: From the Device Management admin center, you create a device configuration profile.
Yes
No
You need to be notified if users receive email containing a file that has a virus.
Explanation:
You can create alert policies to track malware activity and data loss incidents. We've also included
several default alert policies that help you monitor activities such as assigning admin privileges in
Exchange Online, malware attacks, phishing campaigns, and unusual levels of file deletions and
external sharing.
The Email messages containing malware removed after delivery default alert generates an alert
when any messages containing malware are delivered to mailboxes in your organization.
Incorrect answers:
A: A spam filter policy includes selecting the action to take on messages that are identified as spam.
Spam filter policy settings are applied to inbound messages.
B: A data governance event commences when an administrator creates it, following which
background processes look for content relating to the event and take the retention action defined in
the label. The retention action can be to keep or remove items, or to mark them for manual
disposition.
D: You can inspect email attachments in your Exchange Online organization by setting up mail flow
rules. Exchange Online offers mail flow rules that provide the ability to examine email attachments as
a part of your messaging security and compliance needs. However, mail flow rules are not used to
detect malware in emails.
Reference:
You plan to publish App1 by using a conditional access policy named Policy1.
You need to ensure that you can control access to App1 by using a Microsoft Cloud App Security
session policy.
Which two settings should you modify in Policy1? To answer, select the appropriate settings in the
answer area.
Explanation:
References:
https://docs.microsoft.com/en-us/cloud-app-security/proxy-deployment-aad
You have an Azure Active Directory (Azure AD) tenant that contains a user named User1.
You need to ensure that User1 is assigned the required role to create file policies and manage alerts
in the Cloud App Security admin center.
Solution: From the Azure Active Directory admin center, you assign the Security administrator role to
User1.
Yes
No
Explanation:
References:
https://docs.microsoft.com/en-us/cloud-app-security/manage-admins
Question 80
You have a Microsoft 365 subscription.
In the mailbox of a user named User1, you need to preserve a copy of all the email messages that
contain the word ProjectX.
From the Security & Compliance admin center, create a label and a label policy.
From the Exchange admin center, create a mail flow rule.
From the Security & Compliance admin center, start a message trace.
From Exchange admin center, start a mail flow message trace.
Explanation:
References:
https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-classification
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/investigate-an-activity-in-office-
365-cas
When users attempt to access the portal of a partner company, they receive the message shown in
the following exhibit.
Custom detections
Advanced hunting
Alert notifications
Indicators
Alert suppression
Explanation:
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-
atp/manage-indicators
You need to create a deployment plan for Microsoft Azure Advanced Threat Protection (ATP).
Which four actions should you perform in sequence? To answer, move the appropriate actions from
the list of actions to the answer area and arrange them in the correct order.
Explanation:
References:
https://blog.ahasayen.com/azure-advanced-threat-protection-deployment/
Question 84
Your company has 5,000 Windows 10 devices. All the devices are protected by using Microsoft
Defender Advanced Threat Protection (ATP).
You need to create a filtered view that displays which Microsoft Defender ATP alert events have a
high severity and occurred during the last seven days.
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-
atp/automated-investigations-windows-defender-advanced-threat-protection
Question 85
You have a Microsoft 365 subscription.
From the subscription, you perform an audit log search, and you download all the results.
You plan to review the audit log data by using Microsoft Excel.
You need to ensure that each audited property appears in a separate Excel column.
Explanation:
After you search the Office 365 audit log and download the search results to a CSV file, the file
contains a column named AuditData, which contains additional information about each event. The
data in this column is formatted as a JSON object, which contains multiple properties that are
configured as property:value pairs separated by commas. You can use the JSON transform feature in
the Power Query Editor in Excel to split each property in the JSON object in the AuditData column
into multiple columns so that each property has its own column. This lets you sort and filter on one
or more of these properties
References:
https://docs.microsoft.com/en-us/microsoft-365/compliance/export-view-audit-log-records
You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are
connected to your on-premises network.
Solution: From the Azure Active Directory admin center, you create a trusted location and a
conditional access policy.
Yes
No
Explanation:
Explanation:
Conditional Access in SharePoint Online can be configured to use an IP Address white list to allow
access.
References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition
https://techcommunity.microsoft.com/t5/Microsoft-SharePoint-Blog/Conditional-Access-in-
SharePoint-Online-and-OneDrive-for/ba-p/46678
You need to ensure that an alert is generated only when malware is detected in more than five
documents stored in SharePoint Online during a period of 10 minutes.
Question 88
You implement Microsoft Azure Advanced Threat Protection (Azure ATP).
You have an Azure ATP sensor configured as shown in the following exhibit.
How long after the Azure ATP cloud service is updated will the sensor update?
72 hours
12 hours
48 hours
7 days
24 hours
Explanation:
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-whats-new
You have several hundred computers that run the 64-bit version of Windows 10 Enterprise and have
the following configurations:
You need to ensure that you can turn on Windows Defender Application Guard on the computers.
Explanation:
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-
application-guard/reqs-wd-app-guard
Question 90
Your company uses Microsoft Azure Advanced Threat Protection (ATP) and Microsoft Defender ATP.
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/integrate-wd-atp
Question 91
Your network contains an on-premises Active Directory domain.
Your company has a security policy that prevents additional software from being installed on domain
controllers.
You need to monitor a domain controller by using Microsoft Azure Advanced Threat Protection
(ATP).
What should you do? More than one answer choice may achieve the goal. Select the BEST answer.
Reference:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/install-atp-step5
Question 92
You have a Microsoft 365 subscription that uses Microsoft Defender Advanced Threat Protection
(Microsoft Defender ATP).
All the devices in your organization are onboarded to Microsoft Defender ATP.
You need to ensure that an alert is generated if malicious activity was detected on a device during
the last 24 hours.
Reference:
Question 93
HOTSPOT
Which two options should you configure in the Security & Compliance admin center? To answer,
select the appropriate options in the answer area.
Solution:
You need to ensure that user access to Dropbox Business is authenticated by using a Microsoft 365
identity. The documents must be protected if the data is downloaded to a device that is not trusted.
From the Device Management admin center, configure conditional access settings.
From the Azure Active Directory admin center, configure the device settings.
From the Azure Active Directory admin center, configure application proxy settings.
From the Device Management admin center, configure device enrollment settings.
Explanation:
Explanation:
Azure Active Directory's Application Proxy provides secure remote access to on-premises web
applications. After a single sign-on to Azure AD, users can access both cloud and on-premises
applications through an external URL or an internal application portal.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/application-proxy
Use the drop-down menus to select the answer choice that completes each statement based on the
information presented in the graphic.
Explanation:
Explanation:
Question 96
You have a Microsoft 365 E5 subscription.
You need to be notified if users receive email containing a file that has a virus.
From the Exchange admin center, create an in-place eDiscovery & hold.
From the Exchange admin center, create a spam filter policy.
From the Exchange admin center, create an anti-malware policy.
From the Exchange admin center, create a mail flow rule.
Explanation:
https://docs.microsoft.com/en-us/office365/servicedescriptions/exchange-online-service-
description/anti-spam-and-anti-malware-protection
Question 97
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You discover that some external users accessed content on a Microsoft SharePoint site. You modify
the SharePoint sharing policy to prevent sharing outside your organization.
You need to be notified if the SharePoint sharing policy is modified in the future.
Solution: From the SharePoint admin center, you modify the sharing settings.
Yes
No
From the Microsoft Azure Active Directory (Azure AD) Identity Protection dashboard, you view the
risk events shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the
information presented in the graphic.
Solution:
References:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-getstarted
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-sign-in-risk-
policy
https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/quickstart-configure-
named-locations
Question 99
You have a Microsoft 365 subscription.
In the mailbox of a user named User1, you need to preserve a copy of all the email messages that
contain the word ProjectX.
Explanation:
Where to protect the content: locations such as Exchange Online, SharePoint Online, and OneDrive
for Business sites, as well as Microsoft Teams chat and channel messages.
When and how to protect the content by enforcing rules comprised of:
Conditions the content must match before the rule is enforced. For example, a rule might be
configured to look only for content containing Social Security numbers that's been shared with
people outside your organization.
Actions that you want the rule to take automatically when content matching the conditions is found.
For example, a rule might be configured to block access to a document and send both the user and
compliance officer an email notification.
References:
https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-policies
From Microsoft Defender ATP, you turn on the Allow or block file advanced feature.
a suppression rule
an indicator
a device configuration profile
Explanation:
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-
atp/respond-file-alerts#allow-or-block-file
Question 101
You have a Microsoft 365 subscription.
From Cloud Discovery in Microsoft Cloud App Security, you view the Discovered apps page and
discover that many applications have a low score because they are missing information about
domain registration and consumer popularity.
You need to prevent the missing information from affecting the App1 score.
Organization details
Default behavior
Score metrics
App tags
Explanation:
References:
https://docs.microsoft.com/en-us/cloud-app-security/discovered-app-queries
You plan to implement Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP).
You verify that role-based access control (RBAC) is turned on in Microsoft Defender ATP.
You need to identify which user can view security incidents from the Microsoft Defender Security
Center.
User1
User2
User3
User4
Question 103
You have a Microsoft 365 subscription.
You need to be notified if users receive email containing a file that has a virus.
From the Exchange admin center, create an in-place eDiscovery & hold.
From the Security & Compliance admin center, create a data governance event.
From the Exchange admin center, create an anti-malware policy.
From the Exchange admin center, create a mail flow rule.
Explanation:
Reference:
https://docs.microsoft.com/en-us/office365/servicedescriptions/exchange-online-service-
description/anti-spam-and-anti-malware-protection
You need to log any changes to the mailbox folder permissions of User1.
Which command should you run? To answer, select the appropriate options in the answer area.
Solution:
Explanation:
Explanation:
To enable auditing for a single mailbox (in this example, belonging to Holly Sharp), use this
PowerShell command: Set-Mailbox username -AuditEnabled $true
References:
https://support.microsoft.com/en-us/help/4026501/office-auditing-in-office-365-for-admins
https://docs.microsoft.com/en-us/powershell/module/exchange/mailboxes/set-
mailbox?view=exchange-ps
You have the Microsoft Azure Advanced Threat Protection (ATP) workspace shown in the Workspace
exhibit. (Click the Workspace tab.)
The sensors settings for the workspace are configured as shown in the Sensors exhibit. (Click the
Sensors tab.)
Which three actions should you perform in sequence? To answer, move the appropriate actions from
the list of actions to the answer area and arrange them in the correct order.
Solution:
You need to enable Microsoft Defender Credential Guard on all the computers.
From the Security & Compliance admin center, configure the DKIM signatures for the
domain.
From a domain controller, create a Group Policy object (GPO) that enables the
Restrict delegation of credentials to remote servers setting.
From the Security & Compliance admin center, create a device security policy.
From a domain controller, create a Group Policy object (GPO) that enabled the Turn
On Virtualization Based Security setting.
Explanation:
Reference:
https://docs.microsoft.com/en-us/windows/security/identity-protection/credential-
guard/credential-guard-manage
Question 107
You have a Microsoft 365 subscription.
You need to be notified if users receive email containing a file that has a virus.
From the Exchange admin center, create an in-place eDiscovery & hold.
From the Security & Compliance admin center, create a safe attachments policy.
From the Security & Compliance admin center, create a data loss prevention (DLP)
policy.
From the Security & Compliance admin center, create an alert policy.
Explanation:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/alert-policies
Your company uses Microsoft Defender Advanced Threat Protection (ATP). Microsoft Defender ATP
contains the device groups shown in the following table.
You onboard computers to Microsoft Defender ATP as shown in the following table.
Of which groups are Computer1 and Computer2 members? To answer, select the appropriate
options in the answer area.
Question 109
Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD)
tenant named contoso.com. The tenant contains computers that run Windows 10 Enterprise and are
managed by using Microsoft Intune. The computers are configured as shown in the following table.
You need to identify on which two Windows 10 computers Windows Defender Application Guard can
be installed.
Which two computers should you identify? Each correct answer presents part of the solution.
Computer1
Computer3
Computer2
Computer4
Explanation:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-
application-guard/reqs-wd-app-guard
Question 110
HOTSPOT
You have a Microsoft 365 subscription. All client devices are managed by Microsoft Endpoint
Manager.
You need to implement Microsoft Defender Advanced Threat Protection (ATP) for all the supported
devices enrolled in mobile device management (MDM).
What should you include in the device configuration profile? To answer, select the appropriate
options in the answer area.
Solution:
108 Licensed to PEAKUP TECHNOLOGY
[email protected]
Explanation:
Reference:
https://docs.microsoft.com/en-us/intune/advanced-threat-protection
Question 111
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You discover that some external users accessed content on a Microsoft SharePoint site. You modify
the SharePoint sharing policy to prevent sharing outside your organization.
You need to be notified if the SharePoint sharing policy is modified in the future.
Solution: From the Security & Compliance admin center, you create a threat management policy.
Yes
No
You have a Microsoft 365 E5 subscription linked to an Azure Active Directory (Azure AD) tenant. The
tenant contains a group named Group1 and the users shown in the following table:
The tenant has a conditional access policy that has the following configurations:
Name: Policy1
Assignments:
- Users and groups: Group1
- Cloud aps or actions: All cloud apps
Access controls:
Grant, require multi-factor authentication
Enable policy: Report-only
For each of the following settings select Yes, if the statement is true. Otherwise, select No.
Solution:
Explanation:
Report-only mode is a new Conditional Access policy state that allows administrators to evaluate the
impact of Conditional Access policies before enabling them in their environment. With the release of
report-only mode:
During sign-in, policies in report-only mode are evaluated but not enforced.
Results are logged in the Conditional Access and Report-only tabs of the Sign-in log details.
Customers with an Azure Monitor subscription can monitor the impact of their Conditional Access
policies using the Conditional Access insights workbook.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-
access-report-only
Question 113
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are
connected to your on-premises network.
Solution: From the Microsoft 365 admin center, you configure the Organization profile settings.
Yes
No
Explanation:
Explanation:
Conditional Access in SharePoint Online can be configured to use an IP Address white list to allow
access.
References:
111 Licensed to PEAKUP TECHNOLOGY
[email protected]
https://techcommunity.microsoft.com/t5/Microsoft-SharePoint-Blog/Conditional-Access-in-
SharePoint-Online-and-OneDrive-for/ba-p/46678A
Question 114
HOTSPOT
You plan to integrate Cloud App Security and security information and event management (SIEM).
You need to deploy a SIEM agent on a server that runs Windows Server 2016.
What should you do? To answer, select the appropriate settings in the answer area.
Solution:
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/integrate-your-siem-server-with-
office-365-cas
You discover that some external users accessed content on a Microsoft SharePoint site. You modify
the SharePoint sharing policy to prevent sharing outside your organization.
You need to be notified if the SharePoint sharing policy is modified in the future.
Yes
No
Question 116
Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD)
tenant named contoso.com.
You plan to use an application named App1 that creates reports of Azure AD Identity Protection
usage.
You need to ensure that App1 can read the risk event information of contoso.com.
Reference:
https://docs.microsoft.com/en-us/graph/api/resources/identityprotection-root?view=graph-rest-
beta
The organization needs to sign up for Microsoft Store for Business. The solution must use the
principle of least privilege.
Global administrator
Cloud application administrator
Application administrator
Service administrator
Explanation:
References:
https://docs.microsoft.com/en-us/microsoft-store/sign-up-microsoft-store-for-business
Your company uses Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP).
The devices onboarded to Microsoft Defender ATP are shown in the following table.
The alerts visible in the Microsoft Defender ATP alerts queue are shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Explanation:
Explanation:
A suppression rule will not affect alerts that are already in the alerts queue. Only new alerts will be
suppressed.
You use Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP).
You have the Microsoft Defender ATP machine groups shown in the following table.
You plan to onboard computers to Microsoft Defender ATP as shown in the following table.
To which machine group will each computer be added? To answer, select the appropriate options in
the answer are.
You create a Microsoft Cloud App Security policy named Risk1 based on the Logon from a risky IP
address template as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the
information presented in the graphic.
Solution:
The company purchases a cloud app named App1 that supports Microsoft Cloud App Security
monitoring.
You need to ensure that you can monitor App1 from Cloud App Security.
From the Azure Active Directory admin center, create a conditional access policy.
From the Azure Active Directory admin center, create an app registration.
From the Endpoint Management admin center, create an app protection policy.
From the Endpoint Management admin center, create an app configuration policy.
Question 122
HOTSPOT
You have a Microsoft 365 subscription that links to an Azure Active Directory (Azure AD) tenant
named contoso.onmicrosoft.com.
You need to place the contents of User1’s OneDrive account on an eDiscovery hold.
Which URL should you use for the eDiscovery hold? To answer, select the appropriate options in the
answer area.
Explanation:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/create-ediscovery-holds
Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in
Seattle and New York.
The company has the employees and devices shown in the following table.
Existing Environment
The network contains an on-premises Active Directory forest named contoso.com. The forest
contains the servers shown in the following table.
All servers run Windows Server 2016. All desktops and laptops run Windows 10 Enterprise and are
joined to the domain.
The mobile devices of the users in the Montreal and Seattle offices run Android. The mobile devices
of the users in the New York office run iOS.
The domain is synced to Azure Active Directory (Azure AD) and includes the users shown in the
following table.
Requirements
Planned Changes
When a Windows 10 device is joined to Azure AD, the device must enroll in Intune automatically.
Dedicated support technicians must enroll all the Montreal office mobile devices in Intune.
User1 must be able to enroll all the New York office mobile devices in Intune.
Azure ATP sensors must be installed and must NOT use port mirroring.
Whenever possible, the principle of least privilege must be used.
A Microsoft Store for Business must be created.
Compliance Requirements
Ensure that the users in Group1 can only access Microsoft Exchange Online from devices that are
enrolled in Intune and configured in accordance with the corporate policy.
Configure Windows Information Protection (WIP) for the Windows 10 devices.
Question 123
On which server should you install the Azure ATP sensor?
Server1
Server2
Server3
Server4
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-capacity-planning
ADatum Corporation is an international financial services company that has 5,000 employees.
ADatum has six offices: a main office in New York and five branch offices in Germany, the United
Kingdom, France, Spain, and Italy.
All the offices are connected to each other by using a WAN link. Each office connects directly to the
Internet.
Existing Environment
Current Infrastructure
All mailboxes are hosted in Microsoft 365. The users in each office have email suffixes that include
the country of the user, for example, [email protected] or [email protected].
Each office has a security information and event management (SIEM) appliance. The appliance comes
from three different vendors.
Problem Statements
ADatum entered into litigation. The legal department must place a hold on all the documents of a
user named User1 that are in Microsoft 365.
Requirements
Business Goals
ADatum wants to be fully compliant with all the relevant data privacy laws in the regions where is
operates.
ADatum wants to minimize the cost of hardware and software whenever possible.
Technical Requirements
Question 124
You need to meet the technical requirement for large-volume document retrieval.
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/activity-policies-and-alerts
Question 125
You have a Microsoft 365 subscription that uses a default domain named contoso.com.
From the Security & Compliance admin center, you add User1 to the eDiscovery Manager role group.
From the Security & Compliance admin center, User1 creates a case named Case1.
You need to ensure that User1 can add User2 as a case member. The solution must use the principle
of least privilege.
eDiscovery Manager
eDiscovery Administrator
Security Administrator
Explanation:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/add-or-remove-members-from-a-case-
in-advanced-ediscovery?view=o365-worldwide
You have a Microsoft 365 E5 subscription that contains two users named Admin1 and Admin2.
All users are assigned a Microsoft 365 Enterprise E5 license and auditing is turned on.
You create the audit retention policy shown in the exhibit. (Click the Exhibit tab.)
How long will the audit events for the creation of User1 and User2 be retained? To answer, select the
appropriate options in the answer area.
Explanation:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/audit-log-retention-
policies?view=o365-worldwide
Question 127
You have a Microsoft 365 subscription.
You need to view the IP address from which a user synced a Microsoft SharePoint Online library.
From the SharePoint Online admin center, view the usage reports.
From the Security & Compliance admin center, perform an audit log search.
From the Microsoft 365 admin center, view the usage reports.
From the Microsoft 365 admin center, view the properties of the user’s user account.
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-
and-compliance
132 Licensed to PEAKUP TECHNOLOGY
[email protected]
Question 128
You need to notify the manager of the human resources department when a user in the department
shares a file or folder from the department’s Microsoft SharePoint Online site.
From the Security & Compliance admin center, create an alert policy.
From the SharePoint Online site, create an alert.
From the SharePoint Online admin center, modify the sharing settings.
From the Security & Compliance admin center, create a data loss prevention (DLP)
policy.
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/create-activity-alerts
You have a Microsoft 365 subscription that contains all the user data.
You plan to create the retention policy shown in the Locations exhibit. (Click the Locations tab.)
You configure the Advanced retention settings as shown in the Retention exhibit. (Click the Retention
tab.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies
Explanation:
By default, all Global Admins receive the email. Any newly created Global Admins, Security Readers
or Security Administrators will automatically be added to the recipients list.
You have an Azure Active Directory (Azure AD) tenant that contains two users named User1 and
User2.
On September 5, 2019, you create and enforce a terms of use (ToU) in the tenant. The ToU has the
following settings:
Name: Terms1
Display name: Terms1 name
Require users to expand the terms of use: Off
Require users to consent on every device: Off
Expire consents: On
Expire starting on: October 10, 2019
Frequency: Monthly
User1 accepts Terms1 on September 5, 2019. User2 accepts Terms1 on October 5, 2019.
When will Terms1 expire for the first time for each user? To answer, select the appropriate options in
the answer area.
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/terms-of-use
You have a group named Support. Users in the Support group frequently send email messages to
external users.
The manager of the Support group wants to randomly review messages that contain attachments.
You need to provide the manager with the ability to review messages that contain attachments sent
from the Support group users to external users. The manager must have access to only 10 percent of
the messages.
What should you do? To answer, select the appropriate options in the answer area.
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/supervision-policies
Question 133
You deploy Microsoft Azure Information Protection.
You need to ensure that a security administrator named SecAdmin1 can always read and inspect data
protected by Azure Rights Management (Azure RMS).
From the Security & Compliance admin center, add SecAdmin1 to the eDiscovery
Manager role group.
From the Azure Active Directory admin center, add SecAdmin1 to the Security Reader
role group.
From the Security & Compliance admin center, add SecAdmin1 to the Compliance
Administrator role group.
From Windows PowerShell, enable the super user feature and assign the role to
SecAdmin1.
Explanation:
Explanation:
The super user feature of the Azure Rights Management service from Azure Information Protection
ensures that authorized people and services can always read and inspect the data that Azure Rights
Management protects for your organization. However, the super user feature is not enabled by
References:
https://docs.microsoft.com/en-us/azure/information-protection/configure-super-users
Question 134
DRAG DROP
In the Exchange admin center, you have a data loss prevention (DLP) policy named Policy1 that has
the following configurations:
From the Security & Compliance admin center, you create a DLP policy named Policy2 that has the
following configurations:
What is the result of the DLP policies when the user sends an email? To answer, drag the appropriate
results to the correct scenarios. Each result may be used once, more than once, or not at all. You may
need to drag the split bar between panes or scroll to view content.
Explanation:
Explanation:
Box 1: The email will be blocked, and the user will receive the policy tip: Message blocked.
If you've created DLP policies in the Exchange admin center, those policies will continue to work side
by side with any policies for email that you create in the Security & Compliance Center. But note that
rules created in the Exchange admin center take precedence. All Exchange mail flow rules are
processed first, and then the DLP rules from the Security & Compliance Center are processed.
Box 2: The email will be allowed, and the user will receive the policy tip: Message contains sensitive
data.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/how-dlp-works-between-admin-
centers
You plan to prevent the iPad users from copying corporate data in Microsoft Word and pasting the
data into other applications.
References:
https://docs.microsoft.com/en-us/intune/app-protection-policy
Question 136
HOTSPOT
Your company’s privacy policy states that user activities must NOT be audited.
How should you complete the command? To answer, select the appropriate options in the answer
area.
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/turn-audit-log-search-on-or-off
Question 137
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to prevent users from sending email messages that contain Personally Identifiable
Information (PII).
Solution: From the Security & Compliance admin center, you create a data loss prevention (DLP)
policy.
Yes
No
You configure a data loss prevention (DLP) policy named DLP1 as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the
information presented in the graphic.
Explanation:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-
policies?view=o365-worldwide
Question 139
You have a Microsoft 365 E5 subscription.
On which devices can you manage apps by using app configuration policies in Microsoft Endpoint
Manager?
Explanation:
Reference:
https://docs.microsoft.com/en-us/mem/intune/apps/app-configuration-policies-overview
You have a Microsoft 365 subscription that uses a default domain named contoso.com. The domain
contains the users shown in the following table.
The domain contains conditional access policies that control access to a cloud app named App1. The
policies are configured as shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Explanation:
Explanation:
References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/plan-conditional-access
You have a Microsoft 365 tenant named contoso.com. The tenant contains the users shown in the
following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Explanation:
References:
https://docs.microsoft.com/en-us/microsoft-365/compliance/assign-ediscovery-permissions
From the Security & Compliance admin center, you create a role group named US eDiscovery
Managers by copying the eDiscovery Manager role group.
You need to ensure that the users in the new role group can only perform content searches of
mailbox content for users in the United States.
Solution: From Windows PowerShell, you run the New-ComplianceSecurityFilter cmdlet with the
appropriate parameters.
Yes
No
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/permissions-filtering-for-content-
search
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-content-
search/new-compliancesecurityfilter?view=exchange-ps
You need to prevent users from sending email messages that contain Personally Identifiable
Information (PII).
Solution: From the Exchange admin center, you create a data loss prevention (DLP) policy.
Yes
No
Question 144
Your company uses on-premises Windows Server File Classification Infrastructure (FCI). Some
documents on the on-premises file servers are classified as Confidential.
You migrate the files from the on-premises file servers to Microsoft SharePoint Online.
You need to ensure that you can implement data loss prevention (DLP) policies for the uploaded files
based on the Confidential classification.
Reference:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-dlp/new-
dataclassification?view=exchange-ps
From the Security & Compliance admin center, you create a content search of a mailbox.
You need to view the content of the mail messages found by the search as quickly as possible.
Export report
Export results
Re-run
View results
Explanation:
Explanation:
There is no ‘View Results” option. You can preview results but that will only show up to 100 emails.
To guarantee you’re getting all results, you’ll need to export them to a PST file.
References:
https://docs.microsoft.com/en-us/microsoft-365/compliance/limits-for-content-search
Question 146
HOTSPOT
From the Security & Compliance admin center, you create a retention policy named Policy1.
You need to prevent all users from disabling the policy or reducing the retention period.
Which command should you run? To answer, select the appropriate options in the answer area.
Explanation:
References:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-
retention/set-retentioncompliancepolicy?view=exchange-ps
Question 147
You have a Microsoft 365 subscription.
You need to ensure that User1 can place a litigation hold on all mailbox content.
References:
https://docs.microsoft.com/en-us/Exchange/permissions/feature-permissions/policy-and-
compliance-permissions?view=exchserver-2019
You discover that administrative tasks are unavailable in the Microsoft Office 365 audit logs of the
tenant.
You run the Get-AdminAuditLogConfig cmdlet and receive the following output:
You need to ensure that administrative tasks are logged in the Office 365 audit logs.
TestCmdletLoggingEnabled
UnifiedAuditLogIngestionEnabled
AdminAuditLogEnabled
Explanation:
References:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-audit/set-
adminauditlogconfig?view=exchange-ps
You configure a data loss prevention (DLP) policy named DLP1 as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the
information presented in the graphic.
Solution:
Explanation:
Using a retention label in a policy�is only supported for items in SharePoint Online and OneDrive for
Business.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-
policies?view=o365-worldwide#using-a-retention-label-as-a-condition-in-a-dlp-policy
You have a Microsoft 365 subscription that uses a default domain named contoso.com.
Three files were created on February 1, 2019, as shown in the following table.
On March 1, 2019, you create two retention labels named Label1 and Label2.
The settings for Lable1 are configured as shown in the Label1 exhibit. (Click the Label1 tab.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Explanation:
Explanation:
Box 1: No
Box 2: No
Content in a document library will be moved to the first-stage Recycle Bin within 7 days of
disposition, and then permanently deleted another 93 days after that. Thus 100 days in total.
Box 3: No
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/labels
https://docs.microsoft.com/en-us/office365/securitycompliance/disposition-reviews
You have a document in Microsoft OneDrive that is encrypted by using Microsoft Azure Information
Protection as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the
information presented in the graphic.
Explanation:
References:
https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-protection
From the Security & Compliance admin center, you create a role group named US eDiscovery
Managers by copying the eDiscovery Manager role group.
You need to ensure that the users in the new role group can only perform content searches of
mailbox content for users in the United States.
Solution: From the Security & Compliance admin center, you modify the roles of the US eDiscovery
Managers role group.
Yes
No
You need to ensure that the users can perform the tasks shown in the following table.
To which role should you assign each user? To answer, select the appropriate options in the answer
area.
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/permissions-in-the-security-and-
compliance-center#mapping-of-role-groups-to-assigned-roles
Your network contains an Active Directory domain named contoso.com. The domain contains the file
servers shown in the following table.
A file named File1.abc is stored on Server1. A file named File2.abc is stored on Server2. Three apps
named App1, App2, and App3 all open files that have the .abc file extension.
You implement Windows Information Protection (WIP) by using the following configurations:
You need to identify the apps from which you can open File1.abc.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Solution:
Explanation:
References:
Question 155
You have a Microsoft 365 subscription that contains a Microsoft Azure Active Directory (Azure AD)
tenant named contoso.com.
You need to ensure that User1 can publish retention labels from the Security & Compliance admin
center. The solution must use the principle of least privilege.
Security Administrator
Records Management
Compliance Administrator
eDiscovery Manager
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/file-plan-manager
Question 156
You have a Microsoft 365 subscription that uses Security & Compliance retention policies.
You implement a preservation lock on a retention policy that is assigned to all executive users.
Which two actions can you perform on the retention policy? Each correct answer presents a
complete solution.
To which role group should you assign each user? To answer, select the appropriate options in the
answer area.
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/assign-ediscovery-permissions
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You create an Azure Advanced Threat Protection (ATP) workspace named Workspace1.
Solution: You instruct User2 to modify the Azure ATP sensor configuration.
Yes
No
Your network contains an on-premises Active Directory domain that syncs to Azure Active Directory
(Azure AD). The domain contains the servers shown in the following table.
You need to ensure that you can apply Azure Information Protection labels to the file stores on
Server1.
Which three actions should you perform in sequence? To answer, move the appropriate actions from
the list of actions to the answer area and arrange them in the correct order.
Solution:
Explanation:
174 Licensed to PEAKUP TECHNOLOGY
[email protected]
Reference:
https://docs.microsoft.com/en-us/azure/information-protection/install-configure-rms-connector
https://docs.microsoft.com/en-us/azure/information-protection/configure-servers-rms-connector
Question 160
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You create an Azure Advanced Threat Protection (ATP) workspace named Workspace1.
Solution: You instruct User3 to modify the Azure ATP sensor configuration.
Yes
No
Explanation:
Explanation:
Any global administrator or security administrator on the tenant's Azure Active Directory is
automatically an Azure ATP administrator.
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-role-groups
Question 161
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to prevent users from sending email messages that contain Personally Identifiable
Information (PII).
Solution: From the Cloud App Security admin center, you create an access policy.
Yes
No
Question 162
You are testing a data loss prevention (DLP) policy to protect the sharing of credit card information
with external users.
During testing, you discover that a user can share credit card information with external users by
using email. However, the user is prevented from sharing files that contain credit card information by
using Microsoft SharePoint Online.
You need to prevent the user from sharing the credit card information by using email and SharePoint.
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies
You discover that users are incorrectly marking content as false positive and bypassing the DLP
policy.
You need to prevent the users from bypassing the DLP policy.
incident reports
actions
exceptions
user overrides
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies
Question 164
You have a Microsoft 365 subscription.
From the Security & Compliance admin center, you create a content search of all the mailboxes that
contain the work ProjectX.
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/export-search-results
You need to investigate user activity in Microsoft 365, including from where users signed in, which
applications were used, and increases in activity during the past month. The solution must minimize
administrative effort.
Azure ATP
Security & Compliance
Cloud App Security
Flow
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-
and-compliance
Microsoft Store for Business has the following Shopping behavior settings:
You need to identify which users can install apps from the Microsoft for Business private store.
User3 only
User1 only
User1 and User2 only
User3 and User4 only
Explanation:
Explanation:
Allow users to shop controls the shopping experience in Microsoft Store for Education. When this
setting is on, Purchasers and Basic Purchasers can purchase products and services from Microsoft
Store for Education.
References:
https://docs.microsoft.com/en-us/microsoft-store/acquire-apps-microsoft-store-for-business
You create 100 users who are assigned Microsoft 365 E3 licenses.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Solution:
Explanation:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-
and-compliance?redirectSourcePath=%252farticle%252f0d4d0f35-390b-4518-800e-0c7ec95e946c
https://docs.microsoft.com/en-us/office365/securitycompliance/enable-mailbox-auditing
You suspect that an administrator made a change that caused User1 to be removed from Group1.
Which audit log activity should you search in the Security & Compliance admin center?
Question 169
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
From the Security & Compliance admin center, you create a role group named US eDiscovery
Managers by copying the eDiscovery Manager role group.
You need to ensure that the users in the new role group can only perform content searches of
mailbox content for users in the United States.
Solution: From Windows PowerShell, you run the New-AzureRmRoleAssignment cmdlet with the
appropriate parameters.
Yes
No
Explanation:
References:
181 Licensed to PEAKUP TECHNOLOGY
[email protected]
https://docs.microsoft.com/en-us/powershell/module/azurerm.resources/new-
azurermroleassignment?view=azurermps-6.13.0
Question 170
HOTSPOT
Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD)
tenant named contoso.com.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Explanation:
Incorrect Answers:
References:
https://docs.microsoft.com/en-us/microsoft-365/compliance/partially-indexed-items-in-content-
search?view=o365-worldwide
https://docs.microsoft.com/en-us/office365/securitycompliance/export-a-content-search-report
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
A user named User1 has files on a Windows 10 device as shown in the following table.
In Azure Information Protection, you create a label named Label1 that is configured to apply
automatically. Label1 is configured as shown in the following exhibit.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Explanation:
Explanation:
The phrase to match is "im" and it is case sensitive. The phrase must also appear at least twice.
Box 1: No
Box 2: Yes
File2.docx contains two occurrences of the word "import" as well as the word "imported"
File3.docx contains "IM" but his is not the correct letter case.
References:
https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-classification
Question 173
You plan to use the Security & Compliance admin center to import several PST files into Microsoft
365 mailboxes.
Which three actions should you perform before you import the data? Each correct answer presents
part of the solution.
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/use-network-upload-to-import-pst-
files
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You create an Azure Advanced Threat Protection (ATP) workspace named Workspace1.
Solution: You instruct User4 to modify the Azure ATP sensor configuration.
Yes
No
Explanation:
Explanation:
Any global administrator or security administrator on the tenant's Azure Active Directory is
automatically an Azure ATP administrator.
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-role-groups
You need to ensure that only the members of a group named PilotUsers can protect content.
Reference:
https://blogs.technet.microsoft.com/kemckinn/2018/05/17/creating-labels-for-azure-information-
protection/
Question 176
Your company has a Microsoft 365 tenant.
The company sells products online and processes credit card information.
You need to be notified if a file stored in Microsoft SharePoint Online contains credit card
information. The file must be removed automatically from its current location until an administrator
can review its contents.
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies
You create and assign a data loss prevention (DLP) policy named Policy1. Policy1 is configured to
prevent documents that contain Personally Identifiable Information (PII) from being emailed to users
outside your organization.
User2 only
User2 and User3 only
User2, User3, and User4 only
User2, User3, User4, and User5
Explanation:
Explanation:
Guest accounts are considered “outside your organization”. Users who have non-guest accounts in a
host organization's Active Directory or Azure Active Directory tenant are considered as people inside
the organization.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-
policies?view=o365-worldwide
An Exchange Online administrator recently created a role named Role1 from a computer on the
network.
You need to identify the name of the administrator by using an audit log search.
For which activities should you search and by which field should you filter in the audit log search? To
answer, select the appropriate options in the answer area.
Solution:
In the mailbox of a user named User1, you need to preserve a copy of all the email messages that
contain the word ProjectX.
From the Security & Compliance admin center, create a data loss prevention (DLP)
policy.
From the Security & Compliance admin center, create a label and a label policy.
From the Security & Compliance admin center, start a message trace.
From Microsoft Cloud App Security, create an activity policy.
You need to increase the likelihood that the DLP policy will apply to data that contains medical terms
from the International Classification of Diseases (ICD-9-CM). The solution must minimize the number
of false positives.
Which two settings should you modify? To answer, select the appropriate settings in the answer
area.
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies
https://docs.microsoft.com/en-us/office365/securitycompliance/what-the-sensitive-information-
types-look-for#international-classification-of-diseases-icd-9-cm
Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD)
tenant named contoso.com. The tenant contains the users shown in the following table.
You create a retention label named Label1 that has the following configurations:
You turn on Auto labeling for Label1 by using a policy named Policy1. Policy1 has the following
configurations:
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Explanation:
Reference:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-
retention/set-retentioncompliancepolicy?view=exchange-ps
Use the drop-down menus to select the answer choice that completes each statement based on the
information presented in the graphic.
Explanation:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/set-up-anti-phishing-policies#learn-
about-atp-anti-phishing-policy-options
Question 183
You have a Microsoft 365 subscription.
You need to create a data loss prevention (DLP) policy that is configured to use the Set headers
action.
OneDrive accounts
Exchange email
Teams chat and channel messages
SharePoint sites
Your company has a customer ID associated to each customer. The customer IDs contain 10 numbers
followed by 10 characters. The following is a sample customer ID: 12-456-7890-abc-de-fghij.
You plan to create a data loss prevention (DLP) policy that will detect messages containing customer
IDs.
What should you create to ensure that the DLP policy can detect the customer IDs?
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/custom-sensitive-info-
types?view=o365-worldwide
Question 185
HOTSPOT
From the Security & Compliance admin center, you create a retention policy named Policy1.
You need to prevent all users from disabling the policy or reducing the retention period.
How should you configure the Azure PowerShell command? To answer, select the appropriate
options in the answer area.
Explanation:
References:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-
retention/set-retentioncompliancepolicy?view=exchange-ps
Explanation:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/partially-indexed-items-in-content-
search?view=o365-worldwide
https://docs.microsoft.com/en-us/office365/securitycompliance/export-a-content-search-report
Users frequently handle data that contains Personally Identifiable Information (PII).
You create a data loss prevention (DLP) policy that applies to users inside and outside the company.
The policy is configured as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the
information presented in the graphic.
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies
You have a Microsoft Azure Active Directory (Azure AD) tenant named sk180818.onmicrosoft.com.
The tenant contains the users shown in the following table.
In Azure Information Protection, you create a label named Label1 as shown in the following exhibit.
You send File1 as an email attachment to User1, User2, User3, and User4.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Explanation:
Reference:
https://docs.microsoft.com/en-us/azure/information-protection/configure-usage-rights#rights-
included-in-permissions-levels
From the Security & Compliance admin center, you enable auditing.
Which three activities will be audited by default? Each correct answer presents a complete solution.
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-
and-compliance?redirectSourcePath=%252farticle%252f0d4d0f35-390b-4518-800e-0c7ec95e946c
All users are assigned Microsoft Azure Active Directory Premium licenses.
From the Device Management admin center, you set Microsoft Intune as the MDM authority.
You need to ensure that when the members of a group named Marketing join a device to Azure
Active Directory (Azure AD), the device is enrolled automatically in Intune. The Marketing group
members must be limited to five devices enrolled in Intune.
Which two options should you use to perform the configurations? To answer, select the appropriate
blades in the answer area.
Explanation:
Explanation:
Device enrollment manager (DEM) is an Intune permission that can be applied to an Azure AD user
account and lets the user enroll up to 1,000 devices
Number of devices.
The Marketing group members must be limited to five devices enrolled in Intune
References:
https://docs.microsoft.com/en-us/intune/enrollment/device-enrollment-manager-enroll
https://docs.microsoft.com/en-us/intune/enrollment/enrollment-restrictions-set
Question 191
You have a Microsoft 365 subscription.
In the mailbox of a user named User1, you need to preserve a copy of all the email messages that
contain the word ProjectX.
From the Security & Compliance admin center, create an eDiscovery case.
From the Exchange admin center, create a mail flow rule.
From the Security & Compliance admin center, start a message trace.
From Microsoft Cloud App Security, create an access policy.
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/ediscovery-cases#step-2-create-a-
new-case
You create a retention label as shown in the Retention Label exhibit. (Click the RetentionLabel tab.)
You create a label policy as shown in the Label Policy Exhibit. (Click the Label Policy tab.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You have three applications named App1, App2, and App3. The apps use files that have the same file
extensions.
Your company uses Windows Information Protection (WIP). WIP has the following configurations:
What is the effect of the configurations? To answer, select the appropriate options in the answer
area.
Explanation:
References:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-
protection/create-wip-policy-using-intune-azure
You need to ensure that internal users can email documents that contain US bank account numbers
to external users who have an email suffix of contoso.com.
an exception
an action
a condition
a group
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies#how-
dlp-policies-work
You need to prevent users from sending email messages that contain Personally Identifiable
Information (PII).
Solution: From the Azure portal, you create a Microsoft Azure Information Protection label and an
Azure Information Protection policy.
Yes
No
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You create an Azure Advanced Threat Protection (ATP) workspace named Workspace1.
Solution: You instruct User1 to modify the Azure ATP sensor configuration.
Yes
No
Explanation:
Explanation:
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-role-groups
You need to ensure that User1 can search the Microsoft 365 audit logs from the Security &
Compliance admin center.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/search-the-audit-log-in-security-and-
compliance?view=o365-worldwide
Use the drop-down menus to select the answer choice that completes each statement based on the
information presented in the graphic.
Question 199
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
From the Security & Compliance admin center, you create a role group named US eDiscovery
Managers by copying the eDiscovery Manager role group.
You need to ensure that the users in the new role group can only perform content searches of
mailbox content for users in the United States.
Solution: From the Azure Active Directory admin center, you create a conditional access policy.
Yes
No
You need to identify which users performed the following privileged administration tasks:
References:
https://docs.microsoft.com/en-us/azure/azure-monitor/platform/activity-logs-overview
Question 201
Your company has a Microsoft 365 subscription.
You need to automatically protect email messages that contain the word Confidential in the subject
line.
References:
https://docs.microsoft.com/en-us/azure/information-protection/configure-exo-rules
A user named User1 has files in Microsoft OneDrive as shown in the following table.
On February 1, 2019, you apply a retention policy named Policy1 as shown in the following exhibit.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Question 203
You have a Microsoft 365 subscription.
You need to identify which administrative users performed eDiscovery searches during the past
week.
What should you do from the Security & Compliance admin center?
You run an eDiscovery search that returns the following Azure Rights Management (Azure RMS) –
encrypted content:
Which content can be decrypted when you export the eDiscovery search results?
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/export-search-results?view=o365-
worldwide
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com.
You need to modify which users and applications are affected by WIP.
What should you do? To answer, select the appropriate options in the answer area.
Solution:
Explanation:
References:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-
protection/create-wip-policy-using-intune-azure
You have a Microsoft 365 subscription that contains the users shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Explanation:
Reference:
https://docs.microsoft.com/en-us/powershell/module/exchange/set-
mailboxauditbypassassociation?view=exchange-ps
Question 207
You have a Microsoft 365 subscription.
You plan to connect to Microsoft Exchange Online PowerShell and run the following cmdlets:
Search-MailboxAuditLog
Test-ClientAccessRule
Set-GroupMailbox
Get-Mailbox
Which cmdlet will generate an entry in the Microsoft Office 365 audit log?
Search-MailboxAuditLog
Test-ClientAccessRule
Set-GroupMailbox
Get-Mailbox
Explanation:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/search-the-audit-log-in-security-and-
compliance?view=o365-worldwide#exchange-admin-audit-log
What is the maximum amount of time data will be retained in the Microsoft 365 audit log?
2 years
1 year
30 days
90 days
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-
and-compliance
Microsoft Store for Business has the following Shopping behavior settings:
Allow users to shop is set to On.
Make everyone a Basic Purchaser is set to Off.
You need to identify which users can install apps from the Microsoft for Business private store.
Explanation:
Allow users to shop controls the shopping experience in Microsoft Store for Education. When this
setting is on, Purchasers and Basic Purchasers can purchase products and services from Microsoft
Store for Education.
Reference:
https://docs.microsoft.com/en-us/microsoft-store/acquire-apps-microsoft-store-for-business
You have retention policies in Microsoft 365 as shown in the following table.
Policy1 is configured as shown in the Policy1 exhibit. (Click the Policy1 tab.)
Policy2 is configured as shown in the Policy2 exhibit. (Click the Policy2 tab.)
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies#the-principles-
of-retention-or-what-takes-precedence
Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in
Seattle and New York.
The company has the employees and devices shown in the following table.
Existing Environment
The network contains an on-premises Active Directory forest named contoso.com. The forest
contains the servers shown in the following table.
All servers run Windows Server 2016. All desktops and laptops run Windows 10 Enterprise and are
joined to the domain.
The mobile devices of the users in the Montreal and Seattle offices run Android. The mobile devices
of the users in the New York office run iOS.
The domain is synced to Azure Active Directory (Azure AD) and includes the users shown in the
following table.
Requirements
Planned Changes
When a Windows 10 device is joined to Azure AD, the device must enroll in Intune automatically.
Dedicated support technicians must enroll all the Montreal office mobile devices in Intune.
User1 must be able to enroll all the New York office mobile devices in Intune.
Azure ATP sensors must be installed and must NOT use port mirroring.
Whenever possible, the principle of least privilege must be used.
A Microsoft Store for Business must be created.
Compliance Requirements
Ensure that the users in Group1 can only access Microsoft Exchange Online from devices that are
enrolled in Intune and configured in accordance with the corporate policy.
Configure Windows Information Protection (WIP) for the Windows 10 devices.
Question 211
You need to meet the compliance requirements for the Windows 10 devices.
What should you create from the Endpoint Management admin center?
Reference:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-
protection/create-wip-policy-using-intune-azure
ADatum Corporation is an international financial services company that has 5,000 employees.
ADatum has six offices: a main office in New York and five branch offices in Germany, the United
Kingdom, France, Spain, and Italy.
All the offices are connected to each other by using a WAN link. Each office connects directly to the
Internet.
Existing Environment
Current Infrastructure
All mailboxes are hosted in Microsoft 365. The users in each office have email suffixes that include
the country of the user, for example, [email protected] or [email protected].
Each office has a security information and event management (SIEM) appliance. The appliance comes
from three different vendors.
Problem Statements
ADatum entered into litigation. The legal department must place a hold on all the documents of a
user named User1 that are in Microsoft 365.
Requirements
Business Goals
ADatum wants to be fully compliant with all the relevant data privacy laws in the regions where is
operates.
ADatum wants to minimize the cost of hardware and software whenever possible.
Technical Requirements
Question 212
HOTSPOT
What is the minimum number of data sources and log collectors you should create from Microsoft
Cloud App Security? To answer, select the appropriate options in the answer area.
Explanation:
References:
https://docs.microsoft.com/en-us/cloud-app-security/discovery-docker
Question 213
DRAG DROP
Which three actions should you perform in sequence from the Security & Compliance admin center?
To answer, move the appropriate actions from the list of actions to the answer area and arrange
them in the correct order.
Explanation:
References:
https://www.sherweb.com/blog/ediscovery-office-365/
Question 214
You need to protect the U.S. PII data to meet the technical requirements.
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/create-activity-alerts
Question 215
Which report should the New York office auditors view?
DLP incidents
Top Senders and Recipients
DLP false positives and overrides
DLP policy matches
Explanation:
References:
242 Licensed to PEAKUP TECHNOLOGY
[email protected]
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies
Question 216
You need to meet the technical requirement for the EU PII data.
a data loss prevention (DLP) policy from the Security & Compliance admin center
a data loss prevention (DLP) policy from the Exchange admin center
a retention policy from the Exchange admin center
a retention policy from the Security & Compliance admin center
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies
Question 217
HOTSPOT
You need to meet the technical requirement for the SharePoint administrator.
What should you do? To answer, select the appropriate options in the answer area.
Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-
and-compliance#step-3-filter-the-search-results