MS-101 26april2020
MS-101 26april2020
MS-101 26april2020
180q
Number: MS-101
Passing Score: 800
Time Limit: 120 min
File Version: 9.0
MS-101
Version 9.0
Question Set 1
QUESTION 1
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
When you try to enroll an iOS device in Intune, you get an error.
You need to ensure that you can enroll the iOS device in Intune.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 2
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
When you try to enroll an iOS device in Intune, you get an error.
You need to ensure that you can enroll the iOS device in Intune.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/intune/apple-mdm-push-certificate-get
QUESTION 3
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
When you try to enroll an iOS device in Intune, you get an error.
You need to ensure that you can enroll the iOS device in Intune.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 4
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active
Directory (Azure AD).
You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).
You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.
You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.
Solution: You create a device configuration profile from the Device Management admin center.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 5
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active
Directory (Azure AD).
You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).
You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.
You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.scconfigmgr.com/2017/11/30/how-to-setup-co-management-part-6/
QUESTION 6
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active
Directory (Azure AD).
You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).
You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 7
HOTSPOT
Your network contains an Active Directory forest named contoso.com that is synced to Microsoft Azure Active
Directory (Azure AD).
You use Microsoft System Center Configuration Manager (Current Branch) for device management.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 8
HOTSPOT
You have three devices enrolled in Microsoft Intune as shown in the following table.
The device compliance policies in Intune are configured as shown in the following table.
The device compliance policies have the assignments shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 9
You have Windows 10 Pro devices that are joined to an Active Directory domain.
You plan to create a Microsoft 365 tenant and to upgrade the devices to Windows 10 Enterprise.
You are evaluating whether to deploy Windows Hello for Business for SSO to Microsoft 365 services.
What are two prerequisites of the deployment? Each correct answer presents a complete solution.
Correct Answer: BC
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-
base
QUESTION 10
You have a Microsoft 365 tenant.
You need to ensure that when users join their device to Microsoft Azure Active Directory (Azure AD), the device
is enrolled in Microsoft Intune automatically.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/intune/windows-enroll
QUESTION 11
HOTSPOT
You have a Microsoft Azure Active Directory (Azure AD) tenant that includes the users shown in the following
table.
The device type restrictions in Intune are configured as shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 12
HOTSPOT
You create two device compliance policies for Android devices as shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/intune-user-help/enroll-your-device-in-intune-android
QUESTION 13
HOTSPOT
Your network contains an Active Directory domain named contoso.com. All client devices run Windows 10 and
are joined to the domain.
You update the Windows 10 devices by using Windows Update for Business.
What is the maximum amount of time you can defer Windows 10 updates? To answer, select the appropriate
options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/deployment/update/waas-manage-updates-wufb
QUESTION 14
Your company uses Microsoft System Center Configuration Manager (Current Branch) and Microsoft Intune to
co-manage devices.
Which two actions can be performed only from Intune? Each correct answer presents a complete solution.
Correct Answer: BD
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/sccm/comanage/overview
https://docs.microsoft.com/en-us/sccm/mdm/deploy-use/create-vpn-profiles
QUESTION 15
HOTSPOT
Your network contains an Active Directory domain named contoso.com that uses Microsoft System Center
Configuration Manager (Current Branch).
What should you do? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/deployment/upgrade/upgrade-readiness-get-started
https://docs.microsoft.com/en-us/windows/deployment/update/update-compliance-get-started
QUESTION 16
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com.
You need to ensure that administrators can manage the configuration settings for all the Windows 10 devices in
your organization.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/intune/mdm-authority-set
QUESTION 17
You configure a conditional access policy. The locations settings are configured as shown in the Locations
exhibit. (Click the Locations tab.)
The users and groups settings are configured as shown in the Users and Groups exhibit. (Click Users and
Groups tab.)
Members of the Security reader group report that they cannot sign in to Microsoft Active Directory (Azure AD)
on their device while they are in the office.
You need to ensure that the members of the Security reader group can sign in in to Azure AD on their device
while they are in the office. The solution must use the principle of least privilege.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition
QUESTION 18
You have computers that run Windows 10 Enterprise and are joined to the domain.
You plan to delay the installation of new Windows builds so that the IT department can test application
compatibility.
You need to prevent Windows from being updated for the next 30 days.
Which two Group Policy settings should you configure? Each correct answer presents part of the solution.
Correct Answer: BD
Section: [none]
Explanation
Explanation/Reference:
References:
https://insider.windows.com/en-us/for-business-organization-admin/
QUESTION 19
HOTSPOT
You have three devices enrolled in Microsoft Intune as shown in the following table.
The device compliance policies in Intune are configured as shown in the following table.
The device compliance policies have the assignments shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 20
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You need to provide a user with the ability to sign up for Microsoft Store for Business for contoso.com. The
solution must use the principle of least privilege.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/microsoft-store/roles-and-permissions-microsoft-store-for-business
QUESTION 21
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to ensure that you can enroll the iOS device in Intune.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 22
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active
Directory (Azure AD).
You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).
You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.
You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 23
From the Microsoft Azure Active Directory (Azure AD) Identity Protection dashboard, you view the risk events
shown in the exhibit. (Click the Exhibit tab.)
You need to reduce the likelihood that the sign-ins are identified as risky.
A. From the Security & Compliance admin center, create a classification label.
B. From the Security & Compliance admin center, add the users to the Security Readers role group.
C. From the Azure Active Directory admin center, configure the trusted IPs for multi-factor authentication.
D. From the Conditional access blade in the Azure Active Directory admin center, create named locations.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition
QUESTION 24
Your company has a Microsoft 365 E5 subscription.
You need to prevent the research department users from accessing potentially unsafe websites by using
hyperlinks embedded in email messages and documents. Users in other departments must not be restricted.
What should you do from the Security & Compliance admin center?
A. Create a data loss prevention (DLP) policy that has a Content is shared condition.
B. Modify the default safe links policy.
C. Create a data loss prevention (DLP) policy that has a Content contains condition.
D. Create a new safe links policy.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/set-up-atp-safe-links-policies#policies-that-
apply-to-specific-email-recipients
QUESTION 25
You have a Microsoft 365 tenant.
You have a line-of-business application named App1 that users access by using the My Apps portal.
After some recent security breaches, you implement a conditional access policy for App1 that uses Conditional
Access App Control.
You need to be alerted by email if impossible travel is detected for a user of App1. The solution must ensure
that alerts are generated for App1 only.
A. From Microsoft Cloud App Security, create a Cloud Discovery anomaly detection policy.
B. From Microsoft Cloud App Security, modify the impossible travel alert policy.
C. From Microsoft Cloud App Security, create an app discovery policy.
D. From the Azure Active Directory admin center, modify the conditional access policy.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/cloud-app-security/cloud-discovery-anomaly-detection-policy
QUESTION 26
A user receives the following message when attempting to sign in to https://myapps.microsoft.com:
“Your sign-in was blocked. We’ve detected something unusual about this sign-in. For example, you might be
signing in from a new location, device, or app. Before you can continue, we need to verify your identity. Please
contact your admin.”
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview
QUESTION 27
HOTSPOT
You have the Microsoft Azure Active Directory (Azure AD) users shown in the following table.
The device compliance policies in Intune are configured as shown in the following table.
You create a conditional access policy that has the following settings:
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 28
HOTSPOT
You have a Microsoft Azure Active Directory (Azure AD) tenant that includes the users shown in the following
table.
The device limit restrictions in Intune are configured as shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/intune/device-enrollment-manager-enroll
QUESTION 29
HOTSPOT
You plan to allow users from the engineering department to enroll their mobile device in mobile device
management (MDM).
The device type restrictions are configured as shown in the following table.
The device limit restrictions are configured as shown in the following table.
What is the effective configuration for the members of the Engineering group? To answer, select the
appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 30
Your network contains an Active Directory domain named contoso.com. The domain contains 100 Windows 8.1
devices.
You plan to deploy a custom Windows 10 Enterprise image to the Windows 8.1 devices.
A. a provisioning package
B. an in-place upgrade
C. wipe and load refresh
D. Windows Autopilot
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/microsoft-365/enterprise/windows10-infrastructure
QUESTION 31
You use Microsoft System Center Configuration Manager (Current Branch) to manage devices.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/sccm/core/plan-design/choose-a-device-management-solution#bkmk_intune
QUESTION 32
HOTSPOT
You have three devices enrolled in Microsoft Intune as shown in the following table.
The device compliance policies in Intune are configured as shown in the following table.
The device compliance policies have the assignments shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 33
Your company has a Microsoft 365 E3 subscription.
All devices run Windows 10 Pro and are joined to Microsoft Azure Active Directory (Azure AD).
You need to change the edition of Windows 10 to Enterprise the next time users sign in to their computer. The
solution must minimize downtime for the users.
A. Windows Autopilot
B. Windows Update
C. Subscription Activation
D. an in-place upgrade
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot
QUESTION 34
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active
Directory (Azure AD).
You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).
You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.
You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.
Solution: Define a Configuration Manager device collection as the pilot collection. Add Device1 to the collection.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 35
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You are deploying Microsoft Intune.
When you try to enroll an iOS device in Intune, you get an error.
You need to ensure that you can enroll the iOS device in Intune.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 36
Your company has 10 offices.
The network contains an Active Directory domain named contoso.com. The domain contains 500 client
computers. Each office is configured as a separate subnet.
You must configure the computers to meet the following corporate requirements:
You need to recommend a solution to redeploy the computers. The solution must minimize the deployment
time.
A. a provisioning package
B. wipe and load refresh
C. Windows Autopilot
D. an in-place upgrade
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
Explanation:
By using a Provisioning, IT administrators can create a self-contained package that contains all of the
configuration, settings, and apps that need to be applied to a device.
Incorrect Answers:
C: With Windows Autopilot the user can set up pre-configure devices without the need consult their IT
administrator.
D: Use the In-Place Upgrade option when you want to keep all (or at least most) existing applications.
References:
https://docs.microsoft.com/en-us/windows/deployment/windows-10-deployment-scenarios
https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot
QUESTION 37
Your company has a Microsoft 365 subscription. The subscription contains 500 devices that run Windows 10
and 100 devices that run iOS.
You need to create Microsoft Intune device configuration profiles to meet the following requirements:
What is the minimum number of device configuration profiles that you should create?
A. 4
B. 2
C. 1
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 38
Your company has a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com and a Microsoft
365 subscription.
The company recently hired four new users who have the devices shown in the following table.
You configure the Microsoft 365 subscription to ensure that the new devices enroll in Microsoft Intune
automatically.
Which users have a device that can enroll in Microsoft Intune automatically?
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 39
Your company has a Microsoft 365 subscription that contains the domains shown in the following table.
The company plans to add a custom domain named fabrikam.com to the subscription and then to enable
enrollment of devices to Intune by using auto-discovery for fabrikam.com.
Which record type should you use for the new record?
A. PTR
B. SRV
C. CNAME
D. TXT
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
QUESTION 40
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an on-premises Active Directory domain. The domain contains 2,000 computers that run
Windows 8.1 and have applications installed as shown in the following table.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
Explanation:
App1 has a “low install count” (2% or less) so will be Ready to upgrade. We just need to change the setting for
App2.
References:
https://docs.microsoft.com/en-us/windows/deployment/upgrade/upgrade-readiness-identify-apps
QUESTION 41
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an on-premises Active Directory domain. The domain contains 2,000 computers that run
Windows 8.1 and have applications installed as shown in the following table.
You need to ensure that App1 and App2 have an UpgradeDecision status of Ready to upgrade.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
Explanation:
Business Critical will prevent the app having a status of Ready to upgrade.
References:
https://docs.microsoft.com/en-us/windows/deployment/upgrade/upgrade-readiness-identify-apps
QUESTION 42
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an on-premises Active Directory domain. The domain contains 2,000 computers that run
Windows 8.1 and have applications installed as shown in the following table.
You need to ensure that App1 and App2 have an UpgradeDecision status of Ready to upgrade.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
Explanation:
App1 has a “low install count” (2% or less) so will be Ready to upgrade. We need to change the setting for
App2.
References:
https://docs.microsoft.com/en-us/windows/deployment/upgrade/upgrade-readiness-identify-apps
QUESTION 43
HOTSPOT
You have 100 computers that run Windows 8.1 and are enrolled in Upgrade Readiness.
You enroll a computer named Computer3 in Upgrade Readiness. Computer3 has the following configurations:
8 GB of memory
64-bit architecture
An application named App3 installed
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 44
Your network contains an on-premises Active Directory domain that syncs to Azure Active Directory (Azure
AD).
The domain contains two servers named Server1 and Server2 that run Windows Server 2016. Server1 has the
File Server Resource Manager role service installed.
You need to configure Server1 to use the Azure Rights Management (Azure RMS) connector.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
Explanation:
If you want to use the server configuration tool for the RMS connector, to automate the configuration of registry
settings on your on-premises servers, download and run the GenConnectorConfig.ps1 script.
References:
https://docs.microsoft.com/en-us/azure/information-protection/install-configure-rms-connector#installing-the-
rms-connector
QUESTION 45
Your company has a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
Microsoft Store for Business has the following Shopping behavior settings:
You need to identify which users can add apps to the Microsoft Store for Business private store.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 46
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
Your network contains an on-premises Active Directory domain. The domain contains 2,000 computers that run
Windows 8.1 and have applications installed as shown in the following table.
You need to ensure that App1 and App2 have an UpgradeDecision status of Ready to upgrade.
Solution: You set the importance status of App2 to Low install count.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
Explanation:
If an app is installed on less than 2% of the targeted devices, it's marked Low install count. Two percent is the
default value. You can adjust the threshold in the readiness settings from 0% to 10%. Desktop Analytics
automatically marks these apps as Ready to upgrade.
Reference:
https://docs.microsoft.com/en-us/configmgr/desktop-analytics/about-deployment-plans
Testlet 2
Case Study
Overview
Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and
New York.
The company has the employees and devices shown in the following table.
Existing Environment
The network contains an on-premises Active Directory forest named contoso.com. The forest contains the
servers shown in the following table.
All servers run Windows Server 2016. All desktops and laptops run Windows 10 Enterprise and are joined to
the domain.
The mobile devices of the users in the Montreal and Seattle offices run Android. The mobile devices of the
users in the New York office run iOS.
The domain is synced to Azure Active Directory (Azure AD) and includes the users shown in the following table.
The domain also includes a group named Group1.
Requirements
Planned Changes
Technical Requirements
When a Windows 10 device is joined to Azure AD, the device must enroll in Intune automatically.
Dedicated support technicians must enroll all the Montreal office mobile devices in Intune.
User1 must be able to enroll all the New York office mobile devices in Intune.
Azure ATP sensors must be installed and must NOT use port mirroring.
Whenever possible, the principle of least privilege must be used.
A Microsoft Store for Business must be created.
Compliance Requirements
Ensure that the users in Group1 can only access Microsoft Exchange Online from devices that are enrolled
in Intune and configured in accordance with the corporate policy.
Configure Windows Information Protection (WIP) for the Windows 10 devices.
QUESTION 1
You need to ensure that the support technicians can meet the technical requirement for the Montreal office
mobile devices.
A. 1
B. 4
C. 7
D. 31
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/sccm/mdm/deploy-use/enroll-devices-with-device-enrollment-manager
QUESTION 2
You need to create the Microsoft Store for Business.
Which user can create the store?
A. User2
B. User3
C. User4
D. User5
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/microsoft-store/roles-and-permissions-microsoft-store-for-business
QUESTION 3
HOTSPOT
You need to meet the Intune requirements for the Windows 10 devices.
What should you do? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/intune/windows-enroll
QUESTION 4
HOTSPOT
You need to configure a conditional access policy to meet the compliance requirements.
Which two additional settings should you configure in Policy1? To answer, select the appropriate options in the
answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/intune/create-conditional-access-intune
QUESTION 5
HOTSPOT
As of March, how long will the computers in each office remain supported by Microsoft? To answer, select the
appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.windowscentral.com/whats-difference-between-quality-updates-and-feature-updates-windows-10
QUESTION 6
You need to ensure that User1 can enroll the devices to meet the technical requirements.
A. From the Azure Active Directory admin center, assign User1 the Cloud device administrator role.
B. From the Azure Active Directory admin center, configure the Maximum number of devices per user setting.
C. From the Intune admin center, add User1 as a device enrollment manager.
D. From the Intune admin center, configure the Enrollment restrictions.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/sccm/mdm/deploy-use/enroll-devices-with-device-enrollment-manager
QUESTION 7
HOTSPOT
You need to meet the technical requirements and planned changes for Intune.
What should you do? To answer, select the appropriate options is the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/intune/windows-enroll
Testlet 3
Case Study
Overview
ADatum Corporation is an international financial services company that has 5,000 employees.
ADatum has six offices: a main office in New York and five branch offices in Germany, the United Kingdom,
France, Spain, and Italy.
All the offices are connected to each other by using a WAN link. Each office connects directly to the Internet.
Existing Environment
Current Infrastructure
All mailboxes are hosted in Microsoft 365. The users in each office have email suffixes that include the country
of the user, for example, [email protected] or [email protected].
Each office has a security information and event management (SIEM) appliance. The appliance comes from
three different vendors.
Problem Statements
ADatum entered into litigation. The legal department must place a hold on all the documents of a user named
User1 that are in Microsoft 365.
Requirements
Business Goals
ADatum wants to be fully compliant with all the relevant data privacy laws in the regions where is operates.
ADatum wants to minimize the cost of hardware and software whenever possible.
Technical Requirements
QUESTION 1
You need to recommend a solution for the security administrator. The solution must meet the technical
requirements.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/untrusted-networks
Question Set 1
QUESTION 1
Your network contains an on-premises Active Directory domain named contoso.com. The domain contains
1,000 Windows 10 devices.
You perform a proof of concept (PoC) deployment of Microsoft Defender Advanced Threat Protection (ATP) for
10 test devices. During the onboarding process, you configure Microsoft Defender ATP-related data to be
stored in the United States.
A. Create a workspace.
B. Onboard a new device.
C. Delete the workspace.
D. Offboard the test devices.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
QUESTION 2
You have a Microsoft 365 subscription.
You need to be notified if users receive email containing a file that has a virus.
A. From the Exchange admin center, create an in-place eDiscovery & hold.
B. From the Security & Compliance admin center, create a data governance event.
C. From the Exchange admin center, create an anti-malware policy.
D. From the Exchange admin center, create a mail-flow rule.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/office365/servicedescriptions/exchange-online-service-description/anti-spam-
and-anti-malware-protection
QUESTION 3
HOTSPOT
You have a Microsoft Azure Activity Directory (Azure AD) tenant contains the users shown in the following table.
Group3 is a member of Group1.
Your company uses Microsoft Defender Advanced Threat Protection (ATP). Microsoft Defender ATP contains
the roles shown in the following table.
Microsoft Defender ATP contains the device groups shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 4
HOTSPOT
You plan to integrate Cloud App Security and security information and event management (SIEM).
You need to deploy a SIEM agent on a server that runs Windows Server 2016.
What should you do? To answer, select the appropriate settings in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/integrate-your-siem-server-with-office-365-cas
QUESTION 5
HOTSPOT
From the Microsoft Azure Active Directory (Azure AD) Identity Protection dashboard, you view the risk events
shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information
presented in the graphic.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-getstarted
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-sign-in-risk-policy
https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/quickstart-configure-named-
locations
QUESTION 6
Your company uses Microsoft Azure Advanced Threat Protection (ATP) and Microsoft Defender ATP.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/integrate-wd-atp
QUESTION 7
HOTSPOT
You have a Microsoft Azure Activity Directory (Azure AD) tenant contains the users shown in the following table.
Group3 is a member of Group1.
Your company uses Microsoft Defender Advanced Threat Protection (ATP). Microsoft Defender ATP contains
the roles shown in the following table.
Microsoft Defender ATP contains the device groups shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/user-roles-windows-
defender-advanced-threat-protection
QUESTION 8
HOTSPOT
You need to implement Microsoft Defender Advanced Threat Protection (ATP) for all the supported devices
enrolled in mobile device management (MDM).
What should you include in the device configuration profile? To answer, select the appropriate options in the
answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/intune/advanced-threat-protection
QUESTION 9
You have a Microsoft 365 subscription.
From Cloud Discovery in Microsoft Cloud App Security, you view the Discovered apps page and discover that
many applications have a low score because they are missing information about domain registration and
consumer popularity.
You need to prevent the missing information from affecting the score.
A. Organization details
B. Default behavior
C. Score metrics
D. App tags
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/cloud-app-security/discovered-app-queries
QUESTION 10
Your network contains an on-premises Active Directory domain.
Your company has a security policy that prevents additional software from being installed on domain
controllers.
You need to monitor a domain controller by using Microsoft Azure Advanced Threat Protection (ATP).
What should you do? More than one answer choice may achieve the goal. Select the BEST answer.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/install-atp-step5
QUESTION 11
DRAG DROP
You need to create a deployment plan for Microsoft Azure Advanced Threat Protection (ATP).
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of
actions to the answer area and arrange them in the correct order.
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://blog.ahasayen.com/azure-advanced-threat-protection-deployment/
QUESTION 12
You implement Microsoft Azure Advanced Threat Protection (Azure ATP).
You have an Azure ATP sensor configured as shown in the following exhibit.
How long after the Azure ATP cloud service is updated will the sensor update?
A. 72 hours
B. 12 hours
C. 48 hours
D. 7 days
E. 24 hours
Correct Answer: E
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-whats-new
QUESTION 13
HOTSPOT
Your company uses Microsoft Defender Advanced Threat Protection (ATP). Microsoft Defender ATP contains
the device groups shown in the following table.
You onboard computers to Microsoft Defender ATP as shown in the following table.
Of which groups are Computer1 and Computer2 members? To answer, select the appropriate options in the
answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 14
DRAG DROP
You need to onboard the devices to Microsoft Defender Advanced Threat Protection (ATP). The solution must
avoid installing software on the devices whenever possible.
Which onboarding method should you use for each operating system? To answer, drag the appropriate
methods to the correct operating systems. Each method may be used once, more than once, or not at all. You
may need to drag the split bar between panes or scroll to view content.
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-
windows-defender-advanced-threat-protection
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/configure-endpoints-
windows-defender-advanced-threat-protection
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/configure-server-
endpoints-windows-defender-advanced-threat-protection
QUESTION 15
The users at your company use Dropbox Business to store documents. The users access Dropbox Business by
using the MyApps portal.
You need to ensure that user access to Dropbox Business is authenticated by using a Microsoft 365 identity.
The documents must be protected if the data is downloaded to a device that is not trusted.
A. From the Device Management admin center, configure conditional access settings.
B. From the Azure Active Directory admin center, configure the device settings.
C. From the Azure Active Directory admin center, configure application proxy settings.
D. From the Device Management admin center, configure device enrollment settings.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
Explanation:
Azure Active Directory's Application Proxy provides secure remote access to on-premises web applications.
After a single sign-on to Azure AD, users can access both cloud and on-premises applications through an
external URL or an internal application portal.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/application-proxy
QUESTION 16
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You discover that some external users accessed content on a Microsoft SharePoint site. You modify the
SharePoint sharing policy to prevent sharing outside your organization.
You need to be notified if the SharePoint sharing policy is modified in the future.
Solution: From the SharePoint admin center, you modify the sharing settings.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 17
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are
connected to your on-premises network.
Solution: From the Device Management admin center, you create a trusted location and a compliance policy
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
Explanation:
Conditional Access in SharePoint Online can be configured to use an IP Address white list to allow access.
References:
https://techcommunity.microsoft.com/t5/Microsoft-SharePoint-Blog/Conditional-Access-in-SharePoint-Online-
and-OneDrive-for/ba-p/46678
QUESTION 18
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are
connected to your on-premises network.
Solution: From the Microsoft 365 admin center, you configure the Organization profile settings.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
Explanation:
Conditional Access in SharePoint Online can be configured to use an IP Address white list to allow access.
References:
https://techcommunity.microsoft.com/t5/Microsoft-SharePoint-Blog/Conditional-Access-in-SharePoint-Online-
and-OneDrive-for/ba-p/46678A
QUESTION 19
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are
connected to your on-premises network.
Solution: From the Azure Active Directory admin center, you create a trusted location and a conditional access
policy.
Does this meet the goal?
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
Explanation:
Conditional Access in SharePoint Online can be configured to use an IP Address white list to allow access.
References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition
https://techcommunity.microsoft.com/t5/Microsoft-SharePoint-Blog/Conditional-Access-in-SharePoint-Online-
and-OneDrive-for/ba-p/46678
QUESTION 20
HOTSPOT
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
Explanation:
Note: The Aggregation settings has a 120 minute window
QUESTION 21
You have a Microsoft 365 subscription.
In the mailbox of a user named User1, you need to preserve a copy of all the email messages that contain the
word ProjectX.
A. From the Security & Compliance admin center, create a label and a label policy.
B. From the Exchange admin center, create a mail flow rule.
C. From the Security & Compliance admin center, start a message trace.
D. From Exchange admin center, start a mail flow message trace.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-classification
QUESTION 22
HOTSPOT
You need to log any changes to the mailbox folder permissions of User1.
Which command should you run? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
Explanation:
To enable auditing for a single mailbox (in this example, belonging to Holly Sharp), use this PowerShell
command: Set-Mailbox username -AuditEnabled $true
References:
https://support.microsoft.com/en-us/help/4026501/office-auditing-in-office-365-for-admins
https://docs.microsoft.com/en-us/powershell/module/exchange/mailboxes/set-mailbox?view=exchange-ps
QUESTION 23
You have a Microsoft 365 subscription.
You need to ensure that an alert is generated only when malware is detected in more than five documents
stored in SharePoint Online during a period of 10 minutes.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 24
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You discover that some external users accessed content on a Microsoft SharePoint site. You modify the
SharePoint sharing policy to prevent sharing outside your organization.
You need to be notified if the SharePoint sharing policy is modified in the future.
Solution: From the Security & Compliance admin center, you create a threat management policy.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 25
You have a Microsoft 365 subscription.
You need to be notified if users receive email containing a file that has a virus.
What should you do?
A. From the Exchange admin center, create an in-place eDiscovery & hold.
B. From the Security & Compliance admin center, create a safe attachments policy.
C. From the Security & Compliance admin center, create a data loss prevention (DLP) policy.
D. From the Security & Compliance admin center, create an alert policy.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/alert-policies
QUESTION 26
You have a Microsoft Azure Active Directory (Azure AD) tenant.
The organization needs to sign up for Microsoft Store for Business. The solution must use the principle of least
privilege.
A. Global administrator
B. Cloud application administrator
C. Application administrator
D. Service administrator
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/microsoft-store/sign-up-microsoft-store-for-business
QUESTION 27
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You discover that some external users accessed content on a Microsoft SharePoint site. You modify the
SharePoint sharing policy to prevent sharing outside your organization.
You need to be notified if the SharePoint sharing policy is modified in the future.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 28
You have a Microsoft 365 subscription and an on-premises Active Directory domain named contoso.com. All
client computers run Windows 10 Enterprise and are joined to the domain.
You need to enable Microsoft Defender Credential Guard on all the computers.
A. From the Security & Compliance admin center, configure the DKIM signatures for the domain.
B. From a domain controller, create a Group Policy object (GPO) that enables the Restrict delegation of
credentials to remote servers setting.
C. From the Security & Compliance admin center, create a device security policy.
D. From a domain controller, create a Group Policy object (GPO) that enabled the Turn On Virtualization
Based Security setting.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/windows/security/identity-protection/credential-guard/credential-guard-manage
QUESTION 29
Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named
contoso.com.
The company purchases a cloud app named App1 that supports Microsoft Cloud App Security monitoring.
You need to ensure that you can monitor App1 from Cloud App Security.
A. From the Azure Active Directory admin center, create a conditional access policy.
B. From the Azure Active Directory admin center, create an app registration.
C. From the Device Management admin center, create an app protection policy.
D. From the Device Management admin center, create an app configuration policy.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 30
HOTSPOT
You use Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP).
You have the Microsoft Defender ATP machine groups shown in the following table.
You plan to onboard computers to Microsoft Defender ATP as shown in the following table.
To which machine group will each computer be added? To answer, select the appropriate options in the answer
are.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 31
Your company has 5,000 Windows 10 devices. All the devices are protected by using Microsoft Defender
Advanced Threat Protection (ATP).
You need to create a filtered view that displays which Microsoft Defender ATP alert events have a high severity
and occurred during the last seven days.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/investigate-alerts-
windows-defender-advanced-threat-protection
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automated-
investigations-windows-defender-advanced-threat-protection
QUESTION 32
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are
connected to your on-premises network.
Solution: From the Device Management admin center, you create a device configuration profile.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 33
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant that contains a user named User1.
You need to ensure that User1 is assigned the required role to create file policies and manage alerts in the
Cloud App Security admin center.
Solution: From the Security & Compliance admin center, you assign the Security Administrator role to User1.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/cloud-app-security/manage-admins
QUESTION 34
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant that contains a user named User1.
You need to ensure that User1 is assigned the required role to create file policies and manage alerts in the
Cloud App Security admin center.
Solution: From the Azure Active Directory admin center, you assign the Security administrator role to User1.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/cloud-app-security/manage-admins
QUESTION 35
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant that contains a user named User1.
You need to ensure that User1 is assigned the required role to create file policies and manage alerts in the
Cloud App Security admin center.
Solution: From the Azure Active Directory admin center, you assign the Compliance administrator role to User1.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/cloud-app-security/manage-admins
QUESTION 36
HOTSPOT
You plan to publish App1 by using a conditional access policy named Policy1.
You need to ensure that you can control access to App1 by using a Microsoft Cloud App Security session
policy.
Which two settings should you modify in Policy1? To answer, select the appropriate settings in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/cloud-app-security/proxy-deployment-aad
QUESTION 37
HOTSPOT
Your company uses Microsoft Defender Advanced Threat Protection (ATP). Microsoft Defender ATP includes
the machine groups shown in the following table.
You onboard a computer named computer1 to Microsoft Defender ATP as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 38
HOTSPOT
You need to minimize the likelihood that users will be affected by the following threats:
Which policies should you create in the Security & Compliance admin center? To answer, select the
appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
Explanation:
ATP Safe Links provides time-of-click verification of URLs, for example, in emails messages and Office files.
Protection is ongoing and applies across your messaging and Office environment. Links are scanned for each
click: safe links remain accessible and malicious links are dynamically blocked.
References:
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/office-365-atp#configure-atp-
policies
QUESTION 39
You have a Microsoft 365 subscription.
In the mailbox of a user named User1, you need to preserve a copy of all the email messages that contain the
word ProjectX.
Explanation/Reference:
Explanation:
A DLP policy contains a few basic things:
Where to protect the content: locations such as Exchange Online, SharePoint Online, and OneDrive for
Business sites, as well as Microsoft Teams chat and channel messages.
When and how to protect the content by enforcing rules comprised of:
Conditions the content must match before the rule is enforced. For example, a rule might be configured to look
only for content containing Social Security numbers that's been shared with people outside your organization.
Actions that you want the rule to take automatically when content matching the conditions is found. For
example, a rule might be configured to block access to a document and send both the user and compliance
officer an email notification.
References:
https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-policies
QUESTION 40
You have a Microsoft 365 subscription.
From the subscription, you perform an audit log search, and you download all the results.
You plan to review the audit log data by using Microsoft Excel.
You need to ensure that each audited property appears in a separate Excel column.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
Explanation:
After you search the Office 365 audit log and download the search results to a CSV file, the file contains a
column named AuditData, which contains additional information about each event. The data in this column is
formatted as a JSON object, which contains multiple properties that are configured as property:value pairs
separated by commas. You can use the JSON transform feature in the Power Query Editor in Excel to split
each property in the JSON object in the AuditData column into multiple columns so that each property has its
own column. This lets you sort and filter on one or more of these properties
References:
https://docs.microsoft.com/en-us/microsoft-365/compliance/export-view-audit-log-records
QUESTION 41
You have a Microsoft 365 subscription.
You need to be notified if users receive email containing a file that has a virus.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
Explanation:
You can inspect email attachments in your Exchange Online organization by setting up mail flow rules.
Exchange Online offers mail flow rules that provide the ability to examine email attachments as a part of your
messaging security and compliance needs. When you inspect attachments, you can then take action on the
messages that were inspected based on the content or characteristics of those attachments.
Incorrect answers:
A: A spam filter policy includes selecting the action to take on messages that are identified as spam. Spam filter
policy settings are applied to inbound messages.
B: A data governance event commences when an administrator creates it, following which background
processes look for content relating to the event and take the retention action defined in the label. The retention
action can be to keep or remove items, or to mark them for manual disposition.
References:
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/configure-anti-malware-policies
https://www.petri.com/office-365-event-based-retention
QUESTION 42
DRAG DROP
You have the Microsoft Azure Advanced Threat Protection (ATP) workspace shown in the Workspace exhibit.
(Click the Workspace tab.)
The sensors settings for the workspace are configured as shown in the Sensors exhibit. (Click the Sensors
tab.)
You need to ensure that Azure ATP stores data in Asia.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of
actions to the answer area and arrange them in the correct order.
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 43
Your company has five security information and event management (SIEM) appliances. The traffic logs from
each appliance are saved to a file share named Logs.
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/investigate-an-activity-in-office-365-cas
QUESTION 44
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant that contains a user named User1.
You need to ensure that User1 is assigned the required role to create file policies and manage alerts in the
Cloud App Security admin center.
Solution: From the Cloud App Security admin center, you assign the App/instance admin role for all Microsoft
Online Services to User1.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
Explanation:
App/instance admin: Has full or read-only permissions to all of the data in Microsoft Cloud App Security that
deals exclusively with the specific app or instance of an app selected.
Reference:
https://docs.microsoft.com/en-us/cloud-app-security/manage-admins
QUESTION 45
Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named
contoso.com.
You plan to use an application named App1 that creates reports of Azure AD Identity Protection usage.
You need to ensure that App1 can read the risk event information of contoso.com.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/graph/api/resources/identityprotection-root?view=graph-rest-beta
QUESTION 46
Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named
contoso.com. The tenant contains computers that run Windows 10 Enterprise and are managed by using
Microsoft Intune. The computers are configured as shown in the following table.
You need to identify on which two Windows 10 computers Windows Defender Application Guard can be
installed.
Which two computers should you identify? Each correct answer presents part of the solution.
A. Computer1
B. Computer3
C. Computer2
D. Computer4
Correct Answer: BC
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-guard/reqs-
wd-app-guard
QUESTION 47
HOTSPOT
Your company uses Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP).
The devices onboarded to Microsoft Defender ATP are shown in the following table.
The alerts visible in the Microsoft Defender ATP alerts queue are shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
Explanation:
A suppression rule will not affect alerts that are already in the alerts queue. Only new alerts will be suppressed.
QUESTION 48
HOTSPOT
Which two options should you configure in the Security & Compliance admin center? To answer, select the
appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 49
You have a Microsoft 365 subscription that uses Microsoft Defender Advanced Threat Protection (Microsoft
Defender ATP).
All the devices in your organization are onboarded to Microsoft Defender ATP.
You need to ensure that an alert is generated if malicious activity was detected on a device during the last 24
hours.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/custom-detection-
rules
QUESTION 50
You have an Azure Active Directory (Azure AD) tenant and a Microsoft 365 E5 subscription. The tenant
contains the users shown in the following table.
You plan to implement Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP).
You verify that role-based access control (RBAC) is turned on in Microsoft Defender ATP.
You need to identify which user can view security incidents from the Microsoft Defender Security Center.
A. User1
B. User2
C. User3
D. User4
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
Testlet 2
Case Study
Overview
Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and
New York.
The company has the employees and devices shown in the following table.
Existing Environment
The network contains an on-premises Active Directory forest named contoso.com. The forest contains the
servers shown in the following table.
All servers run Windows Server 2016. All desktops and laptops run Windows 10 Enterprise and are joined to
the domain.
The mobile devices of the users in the Montreal and Seattle offices run Android. The mobile devices of the
users in the New York office run iOS.
The domain is synced to Azure Active Directory (Azure AD) and includes the users shown in the following table.
The domain also includes a group named Group1.
Requirements
Planned Changes
Technical Requirements
When a Windows 10 device is joined to Azure AD, the device must enroll in Intune automatically.
Dedicated support technicians must enroll all the Montreal office mobile devices in Intune.
User1 must be able to enroll all the New York office mobile devices in Intune.
Azure ATP sensors must be installed and must NOT use port mirroring.
Whenever possible, the principle of least privilege must be used.
A Microsoft Store for Business must be created.
Compliance Requirements
Ensure that the users in Group1 can only access Microsoft Exchange Online from devices that are enrolled
in Intune and configured in accordance with the corporate policy.
Configure Windows Information Protection (WIP) for the Windows 10 devices.
QUESTION 1
On which server should you install the Azure ATP sensor?
A. Server1
B. Server2
C. Server3
D. Server4
E. Server5
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-capacity-planning
Testlet 3
Case Study
Overview
ADatum Corporation is an international financial services company that has 5,000 employees.
ADatum has six offices: a main office in New York and five branch offices in Germany, the United Kingdom,
France, Spain, and Italy.
All the offices are connected to each other by using a WAN link. Each office connects directly to the Internet.
Existing Environment
Current Infrastructure
All mailboxes are hosted in Microsoft 365. The users in each office have email suffixes that include the country
of the user, for example, [email protected] or [email protected].
Each office has a security information and event management (SIEM) appliance. The appliance comes from
three different vendors.
Problem Statements
ADatum entered into litigation. The legal department must place a hold on all the documents of a user named
User1 that are in Microsoft 365.
Requirements
Business Goals
ADatum wants to be fully compliant with all the relevant data privacy laws in the regions where is operates.
ADatum wants to minimize the cost of hardware and software whenever possible.
Technical Requirements
QUESTION 1
You need to meet the technical requirement for large-volume document retrieval.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/activity-policies-and-alerts
Question Set 1
QUESTION 1
Your company uses on-premises Windows Server File Classification Infrastructure (FCI). Some documents on
the on-premises file servers are classified as Confidential.
You migrate the files from the on-premises file servers to Microsoft SharePoint Online.
You need to ensure that you can implement data loss prevention (DLP) policies for the uploaded file based on
the Confidential classification.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-dlp/new-
dataclassification?view=exchange-ps
QUESTION 2
You have a Microsoft 365 subscription.
From the Security & Compliance admin center, you create a content search of all the mailboxes that contain the
work ProjectX.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/export-search-results
QUESTION 3
HOTSPOT
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You have three applications named App1, App2, and App3 that have the same file extensions.
Your company uses Windows Information Protection (WIP). WIP has the following configurations:
What is the effect of the configurations? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/
create-wip-policy-using-intune-azure
QUESTION 4
HOTSPOT
You have a group named Support. Users in the Support group frequently send email messages to external
users.
The manager of the Support group wants to randomly review messages that contain attachments.
You need to provide the manager with the ability to review messages that contain attachments sent from the
Support group users to external users. The manager must have access to only 10 percent of the messages.
What should you do? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/supervision-policies
QUESTION 5
Your company has a Microsoft 365 subscription.
You need to automatically protect email messages that contain the word Confidential in the subject line.
What should you create?
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/information-protection/configure-exo-rules
QUESTION 6
You have a Microsoft 365 subscription.
You need to investigate user activity in Microsoft 365, including from where users signed in, which applications
were used, and increases in activity during the past month. The solution must minimize administrative effort.
A. Azure ATP
B. Security & Compliance
C. Cloud App Security
D. Flow
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-compliance
QUESTION 7
You are testing a data loss prevention (DLP) policy to protect the sharing of credit card information with external
users.
During testing, you discover that a user can share credit card information with external users by using email.
However, the user is prevented from sharing files that contain credit card information by using Microsoft
SharePoint Online.
You need to prevent the user from sharing the credit card information by using email and SharePoint.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies
QUESTION 8
You have a Microsoft 365 subscription.
You need to view the IP address from which a user synced a Microsoft SharePoint Online library.
A. From the SharePoint Online admin center, view the usage reports.
B. From the Security & Compliance admin center, perform an audit log search.
C. From the Microsoft 365 admin center, view the usage reports.
D. From the Microsoft 365 admin center, view the properties of the user’s user account.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-compliance
QUESTION 9
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains the file servers
shown in the following table.
A file named File1.abc is stored on Server1. A file named File2.abc is stored on Server2. Three apps named
App1, App2, and App3 all open files that have the .abc file extension.
You implement Windows Information Protection (WIP) by using the following configurations:
You need to identify the apps from which you can open File1.abc.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/
create-wip-policy-using-intune-azure
QUESTION 10
In Microsoft 365, you configure a data loss prevention (DLP) policy named Policy1. Policy1 detects the sharing
of United States (US) bank account numbers in email messages and attachments.
A. an exception
B. an action
C. a condition
D. a group
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies#how-dlp-policies-
work
QUESTION 11
HOTSPOT
You have a document in Microsoft OneDrive that is encrypted by using Microsoft Azure Information Protection
as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information
presented in the graphic.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-protection
QUESTION 12
HOTSPOT
To which role group should you assign each user? To answer, select the appropriate options in the answer
area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/assign-ediscovery-permissions
QUESTION 13
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have a Microsoft 365 subscription.
From the Security & Compliance admin center, you create a role group named US eDiscovery Managers by
copying the eDiscovery Manager role group.
You need to ensure that the users in the new role group can only perform content searches of mailbox content
for users in the United States.
Solution: From Windows PowerShell, you run the New-ComplianceSecurityFilter cmdlet with the
appropriate parameters.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/permissions-filtering-for-content-search
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-content-search/new-
compliancesecurityfilter?view=exchange-ps
QUESTION 14
HOTSPOT
You have a Microsoft 365 subscription that uses a default domain named contoso.com. The domain contains
the users shown in the following table.
The domain contains conditional access policies that control access to a cloud app named App1. The policies
are configured as shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
Explanation:
Note: Block access overrides Grant access
References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/plan-conditional-access
QUESTION 15
HOTSPOT
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
A user named User1 has files on a Windows 10 device as shown in the following table.
In Azure Information Protection, you create a label named Label1 that is configured to apply automatically.
Label1 is configured as shown in the following exhibit.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
Explanation:
The phrase to match is "im" and it is case sensitive. The phrase must also appear at least twice.
Box 1: No
File1.docx contain the word "import" once only
Box 2: Yes
File2.docx contains two occurrences of the word "import" as well as the word "imported"
Box 3: No
File3.docx contains "IM" but his is not the correct letter case.
References:
https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-classification
QUESTION 16
HOTSPOT
You have a Microsoft 365 subscription that uses a default domain named contoso.com.
Three files were created on February 1, 2019, as shown in the following table.
On March 1, 2019, you create two retention labels named Label1 and Label2.
The settings for Lable1 are configured as shown in the Label1 exhibit. (Click the Label1 tab.)
The settings for Lable2 are configured as shown in the Label2 exhibit. (Click the Label2 tab.)
You apply the retention labels to Exchange email, SharePoint sites, and OneDrive accounts.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
Explanation:
Box 1: No
Retention overrides deletion.
Box 2: No
Content in a document library will be moved to the first-stage Recycle Bin within 7 days of disposition, and then
permanently deleted another 93 days after that. Thus 100 days in total.
Box 3: No
Items in an Exchange mailbox will be permanently deleted within 14 days of disposition.
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/labels
https://docs.microsoft.com/en-us/office365/securitycompliance/disposition-reviews
QUESTION 17
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
From the Security & Compliance admin center, you create a role group named US eDiscovery Managers by
copying the eDiscovery Manager role group.
You need to ensure that the users in the new role group can only perform content searches of mailbox content
for users in the United States.
Solution: From Windows PowerShell, you run the New-AzureRmRoleAssignment cmdlet with the appropriate
parameters.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/azurerm.resources/new-azurermroleassignment?
view=azurermps-6.13.0
QUESTION 18
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
From the Security & Compliance admin center, you create a role group named US eDiscovery Managers by
copying the eDiscovery Manager role group.
You need to ensure that the users in the new role group can only perform content searches of mailbox content
for users in the United States.
Solution: From the Security & Compliance admin center, you modify the roles of the US eDiscovery Managers
role group.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 19
Your company has a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
Microsoft Store for Business has the following Shopping behavior settings:
Allow users to shop is set to On
Make everyone a Basic Purchaser is set to Off
You need to identify which users can install apps from the Microsoft for Business private store.
A. User3 only
B. User1 only
C. User1 and User2 only
D. User3 and User4 only
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
Explanation:
Allow users to shop controls the shopping experience in Microsoft Store for Education. When this setting is on,
Purchasers and Basic Purchasers can purchase products and services from Microsoft Store for Education.
References:
https://docs.microsoft.com/en-us/microsoft-store/acquire-apps-microsoft-store-for-business
QUESTION 20
You have a Microsoft 365 subscription that contains a Microsoft Azure Active Directory (Azure AD) tenant
named contoso.com.
You need to ensure that User1 can publish retention labels from the Security & Compliance admin center. The
solution must use the principle of least privilege.
A. Security Administrator
B. Records Management
C. Compliance Administrator
D. eDiscovery Manager
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/file-plan-manager
QUESTION 21
You plan to use the Security & Compliance admin center to import several PST files into Microsoft 365
mailboxes.
Which three actions should you perform before you import the data? Each correct answer presents part of the
solution.
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/use-network-upload-to-import-pst-files
QUESTION 22
HOTSPOT
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 23
You deploy Microsoft Azure Information Protection.
You need to ensure that a security administrator named SecAdmin1 can always read and inspect data
protected by Azure Rights Management (Azure RMS).
A. From the Security & Compliance admin center, add SecAdmin1 to the eDiscovery Manager role group.
B. From the Azure Active Directory admin center, add SecAdmin1 to the Security Reader role group.
C. From the Security & Compliance admin center, add SecAdmin1 to the Compliance Administrator role group.
D. From Windows PowerShell, enable the super user feature and assign the role to SecAdmin1.
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
Explanation:
The super user feature of the Azure Rights Management service from Azure Information Protection ensures
that authorized people and services can always read and inspect the data that Azure Rights Management
protects for your organization. However, the super user feature is not enabled by default. The PowerShell
cmdlet Enable-AadrmSuperUserFeature is used to manually enable the super user feature.
References:
https://docs.microsoft.com/en-us/azure/information-protection/configure-super-users
QUESTION 24
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to prevent users from sending email messages that contain Personally Identifiable Information (PII).
Solution: From the Cloud App Security admin center, you create an access policy.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 25
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You create an Azure Advanced Threat Protection (ATP) workspace named Workspace1.
Solution: You instruct User4 to modify the Azure ATP sensor configuration.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
Explanation:
Only Azure ATP administrators can modify the sensors.
Any global administrator or security administrator on the tenant's Azure Active Directory is automatically an
Azure ATP administrator.
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-role-groups
QUESTION 26
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You create an Azure Advanced Threat Protection (ATP) workspace named Workspace1.
Solution: You instruct User3 to modify the Azure ATP sensor configuration.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
Explanation:
Only Azure ATP administrators can modify the sensors.
Any global administrator or security administrator on the tenant's Azure Active Directory is automatically an
Azure ATP administrator.
Reference:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-role-groups
QUESTION 27
HOTSPOT
You have a Microsoft Azure Active Directory (Azure AD) tenant named sk180818.onmicrosoft.com. The tenant
contains the users shown in the following table.
In Azure Information Protection, you create a label named Label1 as shown in the following exhibit.
You send File1 as an email attachment to User1, User2, User3, and User4.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/azure/information-protection/configure-usage-rights#rights-included-in-
permissions-levels
QUESTION 28
HOTSPOT
Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named
contoso.com.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
QUESTION 29
HOTSPOT
Your company’s privacy policy states that user activities must NOT be audited.
How should you complete the command? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/turn-audit-log-search-on-or-off
QUESTION 30
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to prevent users from sending email messages that contain Personally Identifiable Information (PII).
Solution: From the Exchange admin center, you create a data loss prevention (DLP) policy.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 31
You have a Microsoft 365 subscription.
You plan to prevent the iPad users from copying corporate data in Microsoft Word and pasting the data into
other applications.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/intune/app-protection-policy
QUESTION 32
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to prevent users from sending email messages that contain Personally Identifiable Information (PII).
Solution: From the Azure portal, you create a Microsoft Azure Information Protection label and an Azure
Information Protection policy.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 33
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You create an Azure Advanced Threat Protection (ATP) workspace named Workspace1.
Solution: You instruct User1 to modify the Azure ATP sensor configuration.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
Explanation:
Only Azure ATP administrators can modify the sensors.
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-role-groups
QUESTION 34
HOTSPOT
You need to increase the likelihood that the DLP policy will apply to data that contains medical terms from the
International Classification of Diseases (ICD-9-CM). The solution must minimize the number of false positives.
Which two settings should you modify? To answer, select the appropriate settings in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies
https://docs.microsoft.com/en-us/office365/securitycompliance/what-the-sensitive-information-types-look-
for#international-classification-of-diseases-icd-9-cm
QUESTION 35
HOTSPOT
From the Security & Compliance admin center, you create a retention policy named Policy1.
You need to prevent all users from disabling the policy or reducing the retention period.
Which command should you run? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-retention/set-
retentioncompliancepolicy?view=exchange-ps
QUESTION 36
You create a new Microsoft 365 subscription and assign Microsoft 365 E3 licenses to 100 users.
From the Security & Compliance admin center, you enable auditing.
Which three activities will be audited by default? Each correct answer presents a complete solution.
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-
compliance?redirectSourcePath=%252farticle%252f0d4d0f35-390b-4518-800e-0c7ec95e946c
QUESTION 37
HOTSPOT
You create a label policy as shown in the Label Policy Exhibit. (Click the Label Policy tab.)
The label policy is configured as shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies
QUESTION 38
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You create an Azure Advanced Threat Protection (ATP) workspace named Workspace1.
Solution: You instruct User2 to modify the Azure ATP sensor configuration.
A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 39
HOTSPOT
You create 100 users who are assigned Microsoft 365 E3 licenses.
From the Security & Compliance admin center, you enable auditing.
Six months later, a manager sends you an email message asking the following questions:
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-
compliance?redirectSourcePath=%252farticle%252f0d4d0f35-390b-4518-800e-0c7ec95e946c
https://docs.microsoft.com/en-us/office365/securitycompliance/enable-mailbox-auditing
QUESTION 40
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
From the Security & Compliance admin center, you create a role group named US eDiscovery Managers by
copying the eDiscovery Manager role group.
You need to ensure that the users in the new role group can only perform content searches of mailbox content
for users in the United States.
Solution: From the Azure Active Directory admin center, you create a conditional access policy.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 41
From the Security & Compliance admin center, you create a content export as shown in the exhibit. (Click the
Exhibit tab.)
What will be excluded from the export?
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
Explanation:
Unrecognized file formats are excluded from the search.
Incorrect Answers:
A: DOCX is a supported Microsoft PowerPoint file format.
C: RTF is a supported Rich Text File format.
D: VSDX is a supported Microsoft Visio file format.
Answer: B
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/export-a-content-search-report
QUESTION 42
You have a Microsoft 365 subscription.
From the Security & Compliance admin center, you create a content search of a mailbox.
You need to view the content of the mail messages found by the search as quickly as possible.
A. Export report
B. Export results
C. Re-run
D. View results
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
Explanation:
There is no ‘View Results” option. You can preview results but that will only show up to 100 emails. To
guarantee you’re getting all results, you’ll need to export them to a PST file.
References:
https://docs.microsoft.com/en-us/microsoft-365/compliance/limits-for-content-search
QUESTION 43
HOTSPOT
From the Security & Compliance admin center, you create a retention policy named Policy1.
You need to prevent all users from disabling the policy or reducing the retention period.
How should you configure the Azure PowerShell command? To answer, select the appropriate options in the
answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-retention/set-
retentioncompliancepolicy?view=exchange-ps
QUESTION 44
Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named
contoso.com.
You suspect that an administrator made a change that caused User1 to be removed from Group1.
Which audit log activity should you search in the Security & Compliance admin center?
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
QUESTION 45
HOTSPOT
You have a Microsoft 365 tenant named contoso.com. The tenant contains the users shown in the following
table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/microsoft-365/compliance/assign-ediscovery-permissions
QUESTION 46
You have a Microsoft 365 subscription.
In the mailbox of a user named User1, you need to preserve a copy of all the email messages that contain the
word ProjectX.
A. From the Security & Compliance admin center, create a data loss prevention (DLP) policy.
B. From the Security & Compliance admin center, create a label and a label policy.
C. From the Security & Compliance admin center, start a message trace.
D. From Microsoft Cloud App Security, create an activity policy.
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
QUESTION 47
You have a Microsoft 365 tenant.
You discover that administrative tasks are unavailable in the Microsoft Office 365 audit logs of the tenant.
You run the Get-AdminAuditLogConfig cmdlet and receive the following output:
You need to ensure that administrative tasks are logged in the Office 365 audit logs.
A. TestCmdletLoggingEnabled
B. UnifiedAuditLogIngestionEnabled
C. AdminAuditLogEnabled
Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-audit/set-
adminauditlogconfig?view=exchange-ps
QUESTION 48
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to prevent users from sending email messages that contain Personally Identifiable Information (PII).
Solution: From the Security & Compliance admin center, you create a data loss prevention (DLP) policy.
A. Yes
B. No
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
QUESTION 49
Your company has a Microsoft 365 tenant.
The company sells products online and processes credit card information.
You need to be notified if a file stored in Microsoft SharePoint Online contains credit card information. The file
must be removed automatically from its current location until an administrator can review its contents.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies
QUESTION 50
HOTSPOT
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/set-up-anti-phishing-policies#learn-about-atp-
anti-phishing-policy-options
QUESTION 51
You need to notify the manager of the human resources department when a user in the department shares a
file or folder from the department’s Microsoft SharePoint Online site.
A. From the Security & Compliance admin center, create an alert policy.
B. From the SharePoint Online site, create an alert.
C. From the SharePoint Online admin center, modify the sharing settings.
D. From the Security & Compliance admin center, create a data loss prevention (DLP) policy.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/create-activity-alerts
QUESTION 52
HOTSPOT
You need to ensure that the users can perform the tasks shown in the following table.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/permissions-in-the-security-and-compliance-
center#mapping-of-role-groups-to-assigned-roles
QUESTION 53
HOTSPOT
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com.
What should you do? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/
create-wip-policy-using-intune-azure
QUESTION 54
HOTSPOT
All users are assigned Microsoft Azure Active Directory Premium licenses.
From the Device Management admin center, you set Microsoft Intune as the MDM authority.
You need to ensure that when the members of a group named Marketing join a device to Azure Active Directory
(Azure AD), the device is enrolled automatically in Intune. The Marketing group members must be limited to five
devices enrolled in Intune.
Which two options should you use to perform the configurations? To answer, select the appropriate blades in
the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
Explanation:
Device enrollment manager (DEM) is an Intune permission that can be applied to an Azure AD user account
and lets the user enroll up to 1,000 devices
You can create and manage enrollment restrictions that define what devices can enroll into management with
Intune, including the:
Number of devices.
Operating systems and versions.
The Marketing group members must be limited to five devices enrolled in Intune
References:
https://docs.microsoft.com/en-us/intune/enrollment/device-enrollment-manager-enroll
https://docs.microsoft.com/en-us/intune/enrollment/enrollment-restrictions-set
QUESTION 55
You have a Microsoft 365 subscription.
You need to ensure that only the members of a group named PilotUsers can protect content.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://blogs.technet.microsoft.com/kemckinn/2018/05/17/creating-labels-for-azure-information-protection/
QUESTION 56
Your company has a Microsoft 365 subscription.
You need to identify which users performed the following privileged administration tasks:
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/azure-monitor/platform/activity-logs-overview
QUESTION 57
You have a Microsoft 365 subscription.
You need to ensure that User1 can place a hold on all mailbox content.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/Exchange/permissions/feature-permissions/policy-and-compliance-
permissions?view=exchserver-2019
QUESTION 58
You have a Microsoft 365 subscription.
What is the maximum amount of time data will be retained in the Microsoft 365 audit log?
A. 2 years
B. 1 year
C. 30 days
D. 90 days
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-compliance
QUESTION 59
HOTSPOT
Users frequently handle data that contains Personally Identifiable Information (PII).
You create a data loss prevention (DLP) policy that applies to users inside and outside the company. The policy
is configured as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information
presented in the graphic.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies
QUESTION 60
HOTSPOT
You have a Microsoft 365 subscription that contains all the user data.
You plan to create the retention policy shown in the Locations exhibit. (Click the Locations tab.)
You configure the Advanced retention settings as shown in the Retention exhibit. (Click the Retention tab.)
The locations specified in the policy include the groups shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies
QUESTION 61
HOTSPOT
You have retention policies in Microsoft 365 as shown in the following table.
Policy1 is configured as shown in the Policy1 exhibit. (Click the Policy1 tab.)
Policy2 is configured as shown in the Policy2 exhibit. (Click the Policy2 tab.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies#the-principles-of-retention-or-
what-takes-precedence
QUESTION 62
You have a Microsoft 365 subscription.
You discover that users are incorrectly marking content as false positive and bypassing the DLP policy.
You need to prevent the users from bypassing the DLP policy.
A. incident reports
B. actions
C. exceptions
D. user overrides
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies
QUESTION 63
You have a Microsoft 365 subscription.
In the mailbox of a user named User1, you need to preserve a copy of all the email messages that contain the
word ProjectX.
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/ediscovery-cases#step-2-create-a-new-case
QUESTION 64
You have a Microsoft 365 E5 subscription.
You run an eDiscovery search that returns the following Azure Rights Management (Azure RMS) – encrypted
content:
Which content can be decrypted when you export the eDiscovery search results?
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/export-search-results?view=o365-worldwide
QUESTION 65
You have a Microsoft 365 subscription.
You plan to connect to Microsoft Exchange Online PowerShell and run the following cmdlets:
Search-MailboxAuditLog
Test-ClientAccessRule
Set-GroupMailbox
Get-Mailbox
Which cmdlet will generate an entry in the Microsoft Office 365 audit log?
A. Search-MailboxAuditLog
B. Test-ClientAccessRule
C. Set-GroupMailbox
D. Get-Mailbox
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance?
view=o365-worldwide#exchange-admin-audit-log
QUESTION 66
HOTSPOT
Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named
contoso.com. The tenant contains the users shown in the following table.
You create a retention label named Label1 that has the following configurations:
You turn on Auto labeling for Label1 by using a policy named Policy1. Policy1 has the following configurations:
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-retention/set-
retentioncompliancepolicy?view=exchange-ps
QUESTION 67
HOTSPOT
You have an Azure Active Directory (Azure AD) tenant that contains two users named User1 and User2.
On September 5, 2019, you create and enforce a terms of use (ToU) in the tenant. The ToU has the following
settings:
Name: Terms1
Display name: Terms1 name
Require users to expand the terms of use: Off
Require users to consent on every device: Off
Expire consents: On
Expire starting on: October 10, 2019
Frequency: Monthly
User1 accepts Terms1 on September 5, 2019. User2 accepts Terms1 on October 5, 2019.
When will Terms1 expire for the first time for each user? To answer, select the appropriate options in the
answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/terms-of-use
Testlet 2
Case Study
Overview
Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and
New York.
The company has the employees and devices shown in the following table.
Existing Environment
The network contains an on-premises Active Directory forest named contoso.com. The forest contains the
servers shown in the following table.
All servers run Windows Server 2016. All desktops and laptops run Windows 10 Enterprise and are joined to
the domain.
The mobile devices of the users in the Montreal and Seattle offices run Android. The mobile devices of the
users in the New York office run iOS.
The domain is synced to Azure Active Directory (Azure AD) and includes the users shown in the following table.
The domain also includes a group named Group1.
Requirements
Planned Changes
Technical Requirements
When a Windows 10 device is joined to Azure AD, the device must enroll in Intune automatically.
Dedicated support technicians must enroll all the Montreal office mobile devices in Intune.
User1 must be able to enroll all the New York office mobile devices in Intune.
Azure ATP sensors must be installed and must NOT use port mirroring.
Whenever possible, the principle of least privilege must be used.
A Microsoft Store for Business must be created.
Compliance Requirements
Ensure that the users in Group1 can only access Microsoft Exchange Online from devices that are enrolled
in Intune and configured in accordance with the corporate policy.
Configure Windows Information Protection (WIP) for the Windows 10 devices.
QUESTION 1
You need to meet the compliance requirements for the Windows 10 devices.
What should you create from the Device Management admin center?
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/
create-wip-policy-using-intune-azure
Testlet 3
Case Study
Overview
ADatum Corporation is an international financial services company that has 5,000 employees.
ADatum has six offices: a main office in New York and five branch offices in Germany, the United Kingdom,
France, Spain, and Italy.
All the offices are connected to each other by using a WAN link. Each office connects directly to the Internet.
Existing Environment
Current Infrastructure
All mailboxes are hosted in Microsoft 365. The users in each office have email suffixes that include the country
of the user, for example, [email protected] or [email protected].
Each office has a security information and event management (SIEM) appliance. The appliance comes from
three different vendors.
Problem Statements
ADatum entered into litigation. The legal department must place a hold on all the documents of a user named
User1 that are in Microsoft 365.
Requirements
Business Goals
ADatum wants to be fully compliant with all the relevant data privacy laws in the regions where is operates.
ADatum wants to minimize the cost of hardware and software whenever possible.
Technical Requirements
QUESTION 1
Which report should the New York office auditors view?
A. DLP incidents
B. Top Senders and Recipients
C. DLP false positives and overrides
D. DLP policy matches
Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies
QUESTION 2
You need to meet the technical requirement for the EU PII data.
A. a data loss prevention (DLP) policy from the Security & Compliance admin center
B. a data loss prevention (DLP) policy from the Exchange admin center
C. a retention policy from the Exchange admin center
D. a retention policy from the Security & Compliance admin center
Correct Answer: D
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies
QUESTION 3
You need to protect the U.S. PII data to meet the technical requirements.
Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/create-activity-alerts
QUESTION 4
DRAG DROP
Which three actions should you perform in sequence from the Security & Compliance admin center? To
answer, move the appropriate actions from the list of actions to the answer area and arrange them in the
correct order.
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://www.sherweb.com/blog/ediscovery-office-365/
QUESTION 5
HOTSPOT
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/cloud-app-security/discovery-docker
QUESTION 6
HOTSPOT
You need to meet the technical requirement for the SharePoint administrator.
What should you do? To answer, select the appropriate options in the answer area.
Hot Area:
Correct Answer:
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-
compliance#step-3-filter-the-search-results