MS-101 26april2020

Download as pdf or txt
Download as pdf or txt
You are on page 1of 165

MS-101.examcollection.premium.exam.

180q

Number: MS-101
Passing Score: 800
Time Limit: 120 min
File Version: 9.0

MS-101

Microsoft 365 Mobility and Security

Version 9.0
Question Set 1

QUESTION 1
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You are deploying Microsoft Intune.

You successfully enroll Windows 10 devices in Intune.

When you try to enroll an iOS device in Intune, you get an error.

You need to ensure that you can enroll the iOS device in Intune.

Solution: You add your user account as a device enrollment manager.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 2
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You are deploying Microsoft Intune.

You successfully enroll Windows 10 devices in Intune.

When you try to enroll an iOS device in Intune, you get an error.

You need to ensure that you can enroll the iOS device in Intune.

Solution: You configure the Apple MDM Push certificate.

Does this meet the goal?

A. Yes
B. No

Correct Answer: A
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/intune/apple-mdm-push-certificate-get

QUESTION 3
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You are deploying Microsoft Intune.

You successfully enroll Windows 10 devices in Intune.

When you try to enroll an iOS device in Intune, you get an error.

You need to ensure that you can enroll the iOS device in Intune.

Solution: You create an Apple Configurator enrollment profile.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 4
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active
Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure pilot co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: You create a device configuration profile from the Device Management admin center.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 5
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active
Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure pilot co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: You add Device1 to an Active Directory group.

Does this meet the goal?

A. Yes
B. No

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://www.scconfigmgr.com/2017/11/30/how-to-setup-co-management-part-6/

QUESTION 6
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active
Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure pilot co-management.


You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: You unjoin Device1 from the Active Directory domain.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 7
HOTSPOT

Your network contains an Active Directory forest named contoso.com that is synced to Microsoft Azure Active
Directory (Azure AD).

You use Microsoft System Center Configuration Manager (Current Branch) for device management.

You have the Windows 10 devices shown in the following table.

You configure Configuration Manager co-management as follows:

Automatic enrollment in Intune: Pilot


Pilot collection: Collection2

You configure co-management workloads as shown in the following exhibit.


For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:
Section: [none]
Explanation

Explanation/Reference:

QUESTION 8
HOTSPOT

You have three devices enrolled in Microsoft Intune as shown in the following table.

The device compliance policies in Intune are configured as shown in the following table.

The device compliance policies have the assignments shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:

QUESTION 9
You have Windows 10 Pro devices that are joined to an Active Directory domain.

You plan to create a Microsoft 365 tenant and to upgrade the devices to Windows 10 Enterprise.

You are evaluating whether to deploy Windows Hello for Business for SSO to Microsoft 365 services.

What are two prerequisites of the deployment? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A. computers that have biometric hardware features


B. Microsoft Intune enrollment
C. Microsoft Azure Active Directory (Azure AD)
D. smartcards
E. TPM-enabled devices

Correct Answer: BC
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-
base

QUESTION 10
You have a Microsoft 365 tenant.

All users are assigned the Enterprise Mobility + Security license.

You need to ensure that when users join their device to Microsoft Azure Active Directory (Azure AD), the device
is enrolled in Microsoft Intune automatically.

What should you configure?


A. Enrollment restrictions from the Device Management admin center
B. device enrollment managers from the Device Management admin center
C. MAM User scope from the Azure Active Directory admin center
D. MDM User scope from the Azure Active Directory admin center

Correct Answer: D
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/intune/windows-enroll

QUESTION 11
HOTSPOT

You have several devices enrolled in Microsoft Intune.

You have a Microsoft Azure Active Directory (Azure AD) tenant that includes the users shown in the following
table.

The device type restrictions in Intune are configured as shown in the following table.

You add User3 as a device enrollment manager in Intune.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:

QUESTION 12
HOTSPOT

You create two device compliance policies for Android devices as shown in the following table.

You have the Android devices shown in the following table.

The users belong to the groups shown in the following table.

The users enroll their device in Microsoft Intune.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/intune-user-help/enroll-your-device-in-intune-android

QUESTION 13
HOTSPOT

Your network contains an Active Directory domain named contoso.com. All client devices run Windows 10 and
are joined to the domain.

You update the Windows 10 devices by using Windows Update for Business.

What is the maximum amount of time you can defer Windows 10 updates? To answer, select the appropriate
options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/deployment/update/waas-manage-updates-wufb

QUESTION 14
Your company uses Microsoft System Center Configuration Manager (Current Branch) and Microsoft Intune to
co-manage devices.

Which two actions can be performed only from Intune? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A. Deploy applications to Windows 10 devices.


B. Deploy VPN profiles to iOS devices.
C. Deploy VPN profiles to Windows 10 devices.
D. Publish applications to Android devices.

Correct Answer: BD
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/sccm/comanage/overview

https://docs.microsoft.com/en-us/sccm/mdm/deploy-use/create-vpn-profiles

QUESTION 15
HOTSPOT

Your network contains an Active Directory domain named contoso.com that uses Microsoft System Center
Configuration Manager (Current Branch).

You have Windows 10 and Windows 8.1 devices.


You need to ensure that you can analyze the upgrade readiness of all the Windows 8.1 devices and analyze the
update compliance of all the Windows 10 devices.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/deployment/upgrade/upgrade-readiness-get-started

https://docs.microsoft.com/en-us/windows/deployment/update/update-compliance-get-started

QUESTION 16
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com.

You have a Microsoft 365 subscription.

You need to ensure that administrators can manage the configuration settings for all the Windows 10 devices in
your organization.

What should you configure?

A. the Enrollment restrictions


B. the mobile device management (MDM) authority
C. the Exchange on-premises access settings
D. the Windows enrollment settings

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/intune/mdm-authority-set

QUESTION 17
You configure a conditional access policy. The locations settings are configured as shown in the Locations
exhibit. (Click the Locations tab.)

The users and groups settings are configured as shown in the Users and Groups exhibit. (Click Users and
Groups tab.)
Members of the Security reader group report that they cannot sign in to Microsoft Active Directory (Azure AD)
on their device while they are in the office.

You need to ensure that the members of the Security reader group can sign in in to Azure AD on their device
while they are in the office. The solution must use the principle of least privilege.

What should you do?

A. From the conditional access policy, configure the device state.


B. From the Azure Active Directory admin center, create a custom control.
C. From the Device Management admin center, create a device compliance policy.
D. From the Azure Active Directory admin center, create a named location.

Correct Answer: D
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition

QUESTION 18
You have computers that run Windows 10 Enterprise and are joined to the domain.

You plan to delay the installation of new Windows builds so that the IT department can test application
compatibility.

You need to prevent Windows from being updated for the next 30 days.

Which two Group Policy settings should you configure? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.


A. Select when Quality Updates are received
B. Select when Preview Builds and Feature Updates are received
C. Turn off auto-restart for updates during active hours
D. Manage preview builds
E. Automatic updates detection frequency

Correct Answer: BD
Section: [none]
Explanation

Explanation/Reference:
References:
https://insider.windows.com/en-us/for-business-organization-admin/

QUESTION 19
HOTSPOT

You have three devices enrolled in Microsoft Intune as shown in the following table.

The device compliance policies in Intune are configured as shown in the following table.

The device compliance policies have the assignments shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:

QUESTION 20
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.

You need to provide a user with the ability to sign up for Microsoft Store for Business for contoso.com. The
solution must use the principle of least privilege.

Which role should you assign to the user?

A. Cloud application administrator


B. Application administrator
C. Global administrator
D. Service administrator

Correct Answer: C
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/microsoft-store/roles-and-permissions-microsoft-store-for-business

QUESTION 21
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You are deploying Microsoft Intune.

You successfully enroll Windows 10 devices in Intune.


When you try to enroll an iOS device in Intune, you get an error.

You need to ensure that you can enroll the iOS device in Intune.

Solution: You create the Mobility (MDM and MAM) settings.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 22
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active
Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure pilot co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: You add Device1 to a Configuration Manager device collection.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 23
From the Microsoft Azure Active Directory (Azure AD) Identity Protection dashboard, you view the risk events
shown in the exhibit. (Click the Exhibit tab.)
You need to reduce the likelihood that the sign-ins are identified as risky.

What should you do?

A. From the Security & Compliance admin center, create a classification label.
B. From the Security & Compliance admin center, add the users to the Security Readers role group.
C. From the Azure Active Directory admin center, configure the trusted IPs for multi-factor authentication.
D. From the Conditional access blade in the Azure Active Directory admin center, create named locations.

Correct Answer: D
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition

QUESTION 24
Your company has a Microsoft 365 E5 subscription.

Users in the research department work with sensitive data.

You need to prevent the research department users from accessing potentially unsafe websites by using
hyperlinks embedded in email messages and documents. Users in other departments must not be restricted.

What should you do from the Security & Compliance admin center?

A. Create a data loss prevention (DLP) policy that has a Content is shared condition.
B. Modify the default safe links policy.
C. Create a data loss prevention (DLP) policy that has a Content contains condition.
D. Create a new safe links policy.

Correct Answer: D
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/set-up-atp-safe-links-policies#policies-that-
apply-to-specific-email-recipients

QUESTION 25
You have a Microsoft 365 tenant.

You have a line-of-business application named App1 that users access by using the My Apps portal.

After some recent security breaches, you implement a conditional access policy for App1 that uses Conditional
Access App Control.

You need to be alerted by email if impossible travel is detected for a user of App1. The solution must ensure
that alerts are generated for App1 only.

What should you do?

A. From Microsoft Cloud App Security, create a Cloud Discovery anomaly detection policy.
B. From Microsoft Cloud App Security, modify the impossible travel alert policy.
C. From Microsoft Cloud App Security, create an app discovery policy.
D. From the Azure Active Directory admin center, modify the conditional access policy.

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/cloud-app-security/cloud-discovery-anomaly-detection-policy

QUESTION 26
A user receives the following message when attempting to sign in to https://myapps.microsoft.com:

“Your sign-in was blocked. We’ve detected something unusual about this sign-in. For example, you might be
signing in from a new location, device, or app. Before you can continue, we need to verify your identity. Please
contact your admin.”

Which configuration prevents the users from signing in?


A. Microsoft Azure Active Directory (Azure AD) Identity Protection policies
B. Microsoft Azure Active Directory (Azure AD) conditional access policies
C. Security & Compliance supervision policies
D. Security & Compliance data loss prevention (DLP) policies

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview

QUESTION 27
HOTSPOT

You have the Microsoft Azure Active Directory (Azure AD) users shown in the following table.

Your company uses Microsoft Intune.

Several devices are enrolled in Intune as shown in the following table.

The device compliance policies in Intune are configured as shown in the following table.

You create a conditional access policy that has the following settings:

The Assignments settings are configured as follows:


1. Users and groups: Group1
2. Cloud apps: Microsoft Office 365 Exchange Online
3. Conditions: Include All device state, exclude Device marked as compliant
Access controls is set to Block access.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:

QUESTION 28
HOTSPOT

You have several devices enrolled in Microsoft Intune.

You have a Microsoft Azure Active Directory (Azure AD) tenant that includes the users shown in the following
table.

The device limit restrictions in Intune are configured as shown in the following table.

You add User3 as a device enrollment manager in Intune.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/intune/device-enrollment-manager-enroll

QUESTION 29
HOTSPOT

Your company has a Microsoft 365 tenant.

You plan to allow users from the engineering department to enroll their mobile device in mobile device
management (MDM).

The device type restrictions are configured as shown in the following table.

The device limit restrictions are configured as shown in the following table.

What is the effective configuration for the members of the Engineering group? To answer, select the
appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:

QUESTION 30
Your network contains an Active Directory domain named contoso.com. The domain contains 100 Windows 8.1
devices.

You plan to deploy a custom Windows 10 Enterprise image to the Windows 8.1 devices.

You need to recommend a Windows 10 deployment method.

What should you recommend?

A. a provisioning package
B. an in-place upgrade
C. wipe and load refresh
D. Windows Autopilot

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/microsoft-365/enterprise/windows10-infrastructure

QUESTION 31
You use Microsoft System Center Configuration Manager (Current Branch) to manage devices.

Your company uses the following types of devices:


Windows 10
Windows 8.1
Android
iOS

Which devices can be managed by using co-management?

A. Windows 10 and Windows 8.1 only


B. Windows 10, Android, and iOS only
C. Windows 10 only
D. Windows 10, Windows 8.1, Android, and iOS

Correct Answer: D
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/sccm/core/plan-design/choose-a-device-management-solution#bkmk_intune

QUESTION 32
HOTSPOT

You have three devices enrolled in Microsoft Intune as shown in the following table.
The device compliance policies in Intune are configured as shown in the following table.

The device compliance policies have the assignments shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:

QUESTION 33
Your company has a Microsoft 365 E3 subscription.

All devices run Windows 10 Pro and are joined to Microsoft Azure Active Directory (Azure AD).

You need to change the edition of Windows 10 to Enterprise the next time users sign in to their computer. The
solution must minimize downtime for the users.

What should you use?

A. Windows Autopilot
B. Windows Update
C. Subscription Activation
D. an in-place upgrade

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot

QUESTION 34
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active
Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure pilot co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: Define a Configuration Manager device collection as the pilot collection. Add Device1 to the collection.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 35
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You are deploying Microsoft Intune.

You successfully enroll Windows 10 devices in Intune.

When you try to enroll an iOS device in Intune, you get an error.

You need to ensure that you can enroll the iOS device in Intune.

Solution: You configure the Mobility (MDM and MAM) settings.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 36
Your company has 10 offices.

The network contains an Active Directory domain named contoso.com. The domain contains 500 client
computers. Each office is configured as a separate subnet.

You discover that one of the offices has the following:

Computers that have several preinstalled applications


Computers that use nonstandard computer names
Computers that have Windows 10 preinstalled
Computers that are in a workgroup

You must configure the computers to meet the following corporate requirements:

All the computers must be joined to the domain.


All the computers must have computer names that use a prefix of CONTOSO.
All the computers must only have approved corporate applications installed.

You need to recommend a solution to redeploy the computers. The solution must minimize the deployment
time.

What should you recommend?

A. a provisioning package
B. wipe and load refresh
C. Windows Autopilot
D. an in-place upgrade

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
Explanation:
By using a Provisioning, IT administrators can create a self-contained package that contains all of the
configuration, settings, and apps that need to be applied to a device.

Incorrect Answers:
C: With Windows Autopilot the user can set up pre-configure devices without the need consult their IT
administrator.
D: Use the In-Place Upgrade option when you want to keep all (or at least most) existing applications.

References:
https://docs.microsoft.com/en-us/windows/deployment/windows-10-deployment-scenarios

https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-autopilot

QUESTION 37
Your company has a Microsoft 365 subscription. The subscription contains 500 devices that run Windows 10
and 100 devices that run iOS.

You need to create Microsoft Intune device configuration profiles to meet the following requirements:

Configure Wi-Fi connectivity to a secured network named ContosoNet.


Require passwords of at least six characters to lock the devices.

What is the minimum number of device configuration profiles that you should create?

A. 4
B. 2
C. 1

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 38
Your company has a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com and a Microsoft
365 subscription.

The company recently hired four new users who have the devices shown in the following table.

You configure the Microsoft 365 subscription to ensure that the new devices enroll in Microsoft Intune
automatically.

Which users have a device that can enroll in Microsoft Intune automatically?

A. User1, User2, User3, and User4


B. User2 only
C. User1 and User2 only
D. User1, User2, and User3 only

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 39
Your company has a Microsoft 365 subscription that contains the domains shown in the following table.

The company plans to add a custom domain named fabrikam.com to the subscription and then to enable
enrollment of devices to Intune by using auto-discovery for fabrikam.com.

You need to add a DNS record to the fabrikam.com zone.

Which record type should you use for the new record?

A. PTR
B. SRV
C. CNAME
D. TXT

Correct Answer: D
Section: [none]
Explanation

Explanation/Reference:

QUESTION 40
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

Your network contains an on-premises Active Directory domain. The domain contains 2,000 computers that run
Windows 8.1 and have applications installed as shown in the following table.

You enroll all the computers in Upgrade Readiness.


You need to ensure that App1 and App2 have an UpgradeDecision status of Ready to upgrade.

Solution: You set the ReadyForWindows status of App2 to Highly adopted.

Does this meet the goal?

A. Yes
B. No

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
Explanation:
App1 has a “low install count” (2% or less) so will be Ready to upgrade. We just need to change the setting for
App2.

References:
https://docs.microsoft.com/en-us/windows/deployment/upgrade/upgrade-readiness-identify-apps

QUESTION 41
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

Your network contains an on-premises Active Directory domain. The domain contains 2,000 computers that run
Windows 8.1 and have applications installed as shown in the following table.

You enroll all the computers in Upgrade Readiness.

You need to ensure that App1 and App2 have an UpgradeDecision status of Ready to upgrade.

Solution: You set the Importance status of App1 to Business critical.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
Explanation:
Business Critical will prevent the app having a status of Ready to upgrade.
References:
https://docs.microsoft.com/en-us/windows/deployment/upgrade/upgrade-readiness-identify-apps

QUESTION 42
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

Your network contains an on-premises Active Directory domain. The domain contains 2,000 computers that run
Windows 8.1 and have applications installed as shown in the following table.

You enroll all the computers in Upgrade Readiness.

You need to ensure that App1 and App2 have an UpgradeDecision status of Ready to upgrade.

Solution: You set the ReadyForWindows status of App1 to Highly adopted.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
Explanation:
App1 has a “low install count” (2% or less) so will be Ready to upgrade. We need to change the setting for
App2.

References:
https://docs.microsoft.com/en-us/windows/deployment/upgrade/upgrade-readiness-identify-apps

QUESTION 43
HOTSPOT

You have 100 computers that run Windows 8.1 and are enrolled in Upgrade Readiness.

Two of the computers are configured as shown in the following table.


From Upgrade Readiness, you view the applications shown in the following table.

You enroll a computer named Computer3 in Upgrade Readiness. Computer3 has the following configurations:

8 GB of memory
64-bit architecture
An application named App3 installed

App3 is installed on Computer3 only.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
QUESTION 44
Your network contains an on-premises Active Directory domain that syncs to Azure Active Directory (Azure
AD).

The domain contains two servers named Server1 and Server2 that run Windows Server 2016. Server1 has the
File Server Resource Manager role service installed.

You need to configure Server1 to use the Azure Rights Management (Azure RMS) connector.

You install the Microsoft Management connector on Server1.

What should you do next on Server1?

A. Run the GenConnectorConfig.ps1 script.


B. Configure the URL of the AIPMigrated group.
C. Enable BitLocker Drive Encryption (BitLocker).
D. Install a certification authority (CA).

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
Explanation:
If you want to use the server configuration tool for the RMS connector, to automate the configuration of registry
settings on your on-premises servers, download and run the GenConnectorConfig.ps1 script.

References:
https://docs.microsoft.com/en-us/azure/information-protection/install-configure-rms-connector#installing-the-
rms-connector

QUESTION 45
Your company has a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.

You sign up for Microsoft Store for Business.

The tenant contains the users shown in the following table.

Microsoft Store for Business has the following Shopping behavior settings:

Make everyone a Basic Purchaser is set to Off.


Allow app requests is set to On.

You need to identify which users can add apps to the Microsoft Store for Business private store.

Which users should you identify?


A. User1 and User2 only
B. User3 only
C. User1 only
D. User3 and User4 only

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:

QUESTION 46
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

Your network contains an on-premises Active Directory domain. The domain contains 2,000 computers that run
Windows 8.1 and have applications installed as shown in the following table.

You enroll all the computers in Upgrade Readiness.

You need to ensure that App1 and App2 have an UpgradeDecision status of Ready to upgrade.

Solution: You set the importance status of App2 to Low install count.

Does this meet the goal?

A. Yes
B. No

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
Explanation:
If an app is installed on less than 2% of the targeted devices, it's marked Low install count. Two percent is the
default value. You can adjust the threshold in the readiness settings from 0% to 10%. Desktop Analytics
automatically marks these apps as Ready to upgrade.

Reference:
https://docs.microsoft.com/en-us/configmgr/desktop-analytics/about-deployment-plans
Testlet 2

Case Study

Overview

Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and
New York.

The company has the employees and devices shown in the following table.

Contoso recently purchased a Microsoft 365 E5 subscription.

Existing Environment

The network contains an on-premises Active Directory forest named contoso.com. The forest contains the
servers shown in the following table.

All servers run Windows Server 2016. All desktops and laptops run Windows 10 Enterprise and are joined to
the domain.

The mobile devices of the users in the Montreal and Seattle offices run Android. The mobile devices of the
users in the New York office run iOS.

The domain is synced to Azure Active Directory (Azure AD) and includes the users shown in the following table.
The domain also includes a group named Group1.

Requirements

Planned Changes

Contoso plans to implement the following changes:

Implement Microsoft 365.


Manage devices by using Microsoft Intune.
Implement Azure Advanced Threat Protection (ATP).
Every September, apply the latest feature updates to all Windows computers. Every March, apply the latest
feature updates to the computers in the New York office only.

Technical Requirements

Contoso identifies the following technical requirements:

When a Windows 10 device is joined to Azure AD, the device must enroll in Intune automatically.
Dedicated support technicians must enroll all the Montreal office mobile devices in Intune.
User1 must be able to enroll all the New York office mobile devices in Intune.
Azure ATP sensors must be installed and must NOT use port mirroring.
Whenever possible, the principle of least privilege must be used.
A Microsoft Store for Business must be created.

Compliance Requirements

Contoso identifies the following compliance requirements:

Ensure that the users in Group1 can only access Microsoft Exchange Online from devices that are enrolled
in Intune and configured in accordance with the corporate policy.
Configure Windows Information Protection (WIP) for the Windows 10 devices.

QUESTION 1
You need to ensure that the support technicians can meet the technical requirement for the Montreal office
mobile devices.

What is the minimum of dedicated support technicians required?

A. 1
B. 4
C. 7
D. 31

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/sccm/mdm/deploy-use/enroll-devices-with-device-enrollment-manager

QUESTION 2
You need to create the Microsoft Store for Business.
Which user can create the store?

A. User2
B. User3
C. User4
D. User5

Correct Answer: C
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/microsoft-store/roles-and-permissions-microsoft-store-for-business

QUESTION 3
HOTSPOT

You need to meet the Intune requirements for the Windows 10 devices.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/intune/windows-enroll

QUESTION 4
HOTSPOT

You need to configure a conditional access policy to meet the compliance requirements.

You add Exchange Online as a cloud app.

Which two additional settings should you configure in Policy1? To answer, select the appropriate options in the
answer area.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/intune/create-conditional-access-intune

QUESTION 5
HOTSPOT

As of March, how long will the computers in each office remain supported by Microsoft? To answer, select the
appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:
Section: [none]
Explanation

Explanation/Reference:
References:
https://www.windowscentral.com/whats-difference-between-quality-updates-and-feature-updates-windows-10

QUESTION 6
You need to ensure that User1 can enroll the devices to meet the technical requirements.

What should you do?

A. From the Azure Active Directory admin center, assign User1 the Cloud device administrator role.
B. From the Azure Active Directory admin center, configure the Maximum number of devices per user setting.
C. From the Intune admin center, add User1 as a device enrollment manager.
D. From the Intune admin center, configure the Enrollment restrictions.

Correct Answer: C
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/sccm/mdm/deploy-use/enroll-devices-with-device-enrollment-manager

QUESTION 7
HOTSPOT
You need to meet the technical requirements and planned changes for Intune.

What should you do? To answer, select the appropriate options is the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/intune/windows-enroll
Testlet 3

Case Study

Overview

ADatum Corporation is an international financial services company that has 5,000 employees.

ADatum has six offices: a main office in New York and five branch offices in Germany, the United Kingdom,
France, Spain, and Italy.

All the offices are connected to each other by using a WAN link. Each office connects directly to the Internet.

Existing Environment

Current Infrastructure

ADatum recently purchased a Microsoft 365 subscription.

All user files are migrated to Microsoft 365.

All mailboxes are hosted in Microsoft 365. The users in each office have email suffixes that include the country
of the user, for example, [email protected] or [email protected].

Each office has a security information and event management (SIEM) appliance. The appliance comes from
three different vendors.

ADatum uses and processes Personally Identifiable Information (PII).

Problem Statements

ADatum entered into litigation. The legal department must place a hold on all the documents of a user named
User1 that are in Microsoft 365.

Requirements

Business Goals

ADatum wants to be fully compliant with all the relevant data privacy laws in the regions where is operates.

ADatum wants to minimize the cost of hardware and software whenever possible.

Technical Requirements

ADatum identifies the following technical requirements:

Centrally perform log analysis for all offices.


Aggregate all data from the SIEM appliances to a central cloud repository for later analysis.
Ensure that a SharePoint administrator can identify who accessed a specific file stored in a document
library.
Provide the users in the finance department with access to Service assurance information in Microsoft
Office 365.
Ensure that documents and email messages containing the PII data of European Union (EU) citizens are
preserved for 10 years.
If a user attempts to download 1,000 or more files from Microsoft SharePoint Online within 30 minutes,
notify a security administrator and suspend the user’s user account.
A security administrator requires a report that shown which Microsoft 365 users signed in. Based on the
report, the security administrator will create a policy to require multi-factor authentication when a sign-in is
high risk.
Ensure that the users in the New York office can only send email messages that contain sensitive U.S. PII
data to other New York office uses. Email messages must be monitored to ensure compliance. Auditors in
the New York office must have access to reports that show the sent and received email messages
containing sensitive U.S. PII data.

QUESTION 1
You need to recommend a solution for the security administrator. The solution must meet the technical
requirements.

What should you include in the recommendation?

A. Microsoft Azure Active Directory (Azure AD) Privileged Identity Management


B. Microsoft Azure Active Directory (Azure AD) Identity Protection
C. Microsoft Azure Active Directory (Azure AD) conditional access policies
D. Microsoft Azure Active Directory (Azure AD) authentication methods

Correct Answer: C
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/untrusted-networks
Question Set 1

QUESTION 1
Your network contains an on-premises Active Directory domain named contoso.com. The domain contains
1,000 Windows 10 devices.

You perform a proof of concept (PoC) deployment of Microsoft Defender Advanced Threat Protection (ATP) for
10 test devices. During the onboarding process, you configure Microsoft Defender ATP-related data to be
stored in the United States.

You plan to onboard all the devices to Microsoft Defender ATP.

You need to store the Microsoft Defender ATP data in Europe.

What should you first?

A. Create a workspace.
B. Onboard a new device.
C. Delete the workspace.
D. Offboard the test devices.

Correct Answer: D
Section: [none]
Explanation

Explanation/Reference:

QUESTION 2
You have a Microsoft 365 subscription.

You need to be notified if users receive email containing a file that has a virus.

What should you do?

A. From the Exchange admin center, create an in-place eDiscovery & hold.
B. From the Security & Compliance admin center, create a data governance event.
C. From the Exchange admin center, create an anti-malware policy.
D. From the Exchange admin center, create a mail-flow rule.

Correct Answer: C
Section: [none]
Explanation

Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/office365/servicedescriptions/exchange-online-service-description/anti-spam-
and-anti-malware-protection

QUESTION 3
HOTSPOT

You have a Microsoft Azure Activity Directory (Azure AD) tenant contains the users shown in the following table.
Group3 is a member of Group1.

Your company uses Microsoft Defender Advanced Threat Protection (ATP). Microsoft Defender ATP contains
the roles shown in the following table.

Microsoft Defender ATP contains the device groups shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:

QUESTION 4
HOTSPOT

Your company uses Microsoft Cloud App Security.

You plan to integrate Cloud App Security and security information and event management (SIEM).

You need to deploy a SIEM agent on a server that runs Windows Server 2016.

What should you do? To answer, select the appropriate settings in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/integrate-your-siem-server-with-office-365-cas

QUESTION 5
HOTSPOT
From the Microsoft Azure Active Directory (Azure AD) Identity Protection dashboard, you view the risk events
shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information
presented in the graphic.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-getstarted

https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-sign-in-risk-policy

https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/quickstart-configure-named-
locations

QUESTION 6
Your company uses Microsoft Azure Advanced Threat Protection (ATP) and Microsoft Defender ATP.

You need to integrate Microsoft Defender ATP and Azure ATP.

What should you do?

A. From Azure ATP, configure the notifications and reports.


B. From Azure ATP, configure the data sources.
C. From Microsoft Defender Security Center, configure the Machine management settings.
D. From Microsoft Defender Security Center, configure the General settings.

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/integrate-wd-atp

QUESTION 7
HOTSPOT

You have a Microsoft Azure Activity Directory (Azure AD) tenant contains the users shown in the following table.
Group3 is a member of Group1.

Your company uses Microsoft Defender Advanced Threat Protection (ATP). Microsoft Defender ATP contains
the roles shown in the following table.

Microsoft Defender ATP contains the device groups shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/user-roles-windows-
defender-advanced-threat-protection
QUESTION 8
HOTSPOT

You have a Microsoft 365 subscription.

You need to implement Microsoft Defender Advanced Threat Protection (ATP) for all the supported devices
enrolled in mobile device management (MDM).

What should you include in the device configuration profile? To answer, select the appropriate options in the
answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/intune/advanced-threat-protection
QUESTION 9
You have a Microsoft 365 subscription.

Your company purchases a new financial application named App1.

From Cloud Discovery in Microsoft Cloud App Security, you view the Discovered apps page and discover that
many applications have a low score because they are missing information about domain registration and
consumer popularity.

You need to prevent the missing information from affecting the score.

What should you configure from the Cloud Discover settings?

A. Organization details
B. Default behavior
C. Score metrics
D. App tags

Correct Answer: D
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/cloud-app-security/discovered-app-queries

QUESTION 10
Your network contains an on-premises Active Directory domain.

Your company has a security policy that prevents additional software from being installed on domain
controllers.

You need to monitor a domain controller by using Microsoft Azure Advanced Threat Protection (ATP).

What should you do? More than one answer choice may achieve the goal. Select the BEST answer.

A. Deploy an Azure ATP sensor, and then configure port mirroring.


B. Deploy an Azure ATP sensor, and then configure detections.
C. Deploy an Azure ATP standalone sensor, and then configure detections.
D. Deploy an Azure ATP standalone sensor, and then configure port mirroring.

Correct Answer: D
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/install-atp-step5

QUESTION 11
DRAG DROP

You create a Microsoft 365 subscription.

You need to create a deployment plan for Microsoft Azure Advanced Threat Protection (ATP).

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of
actions to the answer area and arrange them in the correct order.

Select and Place:

Correct Answer:
Section: [none]
Explanation

Explanation/Reference:
References:
https://blog.ahasayen.com/azure-advanced-threat-protection-deployment/

QUESTION 12
You implement Microsoft Azure Advanced Threat Protection (Azure ATP).

You have an Azure ATP sensor configured as shown in the following exhibit.
How long after the Azure ATP cloud service is updated will the sensor update?

A. 72 hours
B. 12 hours
C. 48 hours
D. 7 days
E. 24 hours

Correct Answer: E
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-whats-new

QUESTION 13
HOTSPOT

Your company uses Microsoft Defender Advanced Threat Protection (ATP). Microsoft Defender ATP contains
the device groups shown in the following table.

You onboard computers to Microsoft Defender ATP as shown in the following table.
Of which groups are Computer1 and Computer2 members? To answer, select the appropriate options in the
answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:
Section: [none]
Explanation

Explanation/Reference:

QUESTION 14
DRAG DROP

You have a Microsoft 365 subscription.

You have the devices shown in the following table.

You need to onboard the devices to Microsoft Defender Advanced Threat Protection (ATP). The solution must
avoid installing software on the devices whenever possible.

Which onboarding method should you use for each operating system? To answer, drag the appropriate
methods to the correct operating systems. Each method may be used once, more than once, or not at all. You
may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Select and Place:


Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-
windows-defender-advanced-threat-protection

https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/configure-endpoints-
windows-defender-advanced-threat-protection

https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/configure-server-
endpoints-windows-defender-advanced-threat-protection

QUESTION 15
The users at your company use Dropbox Business to store documents. The users access Dropbox Business by
using the MyApps portal.

You need to ensure that user access to Dropbox Business is authenticated by using a Microsoft 365 identity.
The documents must be protected if the data is downloaded to a device that is not trusted.

What should you do?

A. From the Device Management admin center, configure conditional access settings.
B. From the Azure Active Directory admin center, configure the device settings.
C. From the Azure Active Directory admin center, configure application proxy settings.
D. From the Device Management admin center, configure device enrollment settings.

Correct Answer: C
Section: [none]
Explanation
Explanation/Reference:
Explanation:
Azure Active Directory's Application Proxy provides secure remote access to on-premises web applications.
After a single sign-on to Azure AD, users can access both cloud and on-premises applications through an
external URL or an internal application portal.

Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/application-proxy

QUESTION 16
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You discover that some external users accessed content on a Microsoft SharePoint site. You modify the
SharePoint sharing policy to prevent sharing outside your organization.

You need to be notified if the SharePoint sharing policy is modified in the future.

Solution: From the SharePoint admin center, you modify the sharing settings.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 17
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are
connected to your on-premises network.

Solution: From the Device Management admin center, you create a trusted location and a compliance policy

Does this meet the goal?

A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
Explanation:
Conditional Access in SharePoint Online can be configured to use an IP Address white list to allow access.

References:
https://techcommunity.microsoft.com/t5/Microsoft-SharePoint-Blog/Conditional-Access-in-SharePoint-Online-
and-OneDrive-for/ba-p/46678

QUESTION 18
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are
connected to your on-premises network.

Solution: From the Microsoft 365 admin center, you configure the Organization profile settings.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
Explanation:
Conditional Access in SharePoint Online can be configured to use an IP Address white list to allow access.

References:
https://techcommunity.microsoft.com/t5/Microsoft-SharePoint-Blog/Conditional-Access-in-SharePoint-Online-
and-OneDrive-for/ba-p/46678A

QUESTION 19
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are
connected to your on-premises network.

Solution: From the Azure Active Directory admin center, you create a trusted location and a conditional access
policy.
Does this meet the goal?

A. Yes
B. No

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
Explanation:
Conditional Access in SharePoint Online can be configured to use an IP Address white list to allow access.

References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition

https://techcommunity.microsoft.com/t5/Microsoft-SharePoint-Blog/Conditional-Access-in-SharePoint-Online-
and-OneDrive-for/ba-p/46678

QUESTION 20
HOTSPOT

You have Microsoft 365 subscription.

You create an alert policy as shown in the following exhibit.


Use the drop-down menus to select the answer choice that completes each statement based on the information
presented in the graphic.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
Explanation:
Note: The Aggregation settings has a 120 minute window

QUESTION 21
You have a Microsoft 365 subscription.

All users have their email stored in Microsoft Exchange Online.

In the mailbox of a user named User1, you need to preserve a copy of all the email messages that contain the
word ProjectX.

What should you do?

A. From the Security & Compliance admin center, create a label and a label policy.
B. From the Exchange admin center, create a mail flow rule.
C. From the Security & Compliance admin center, start a message trace.
D. From Exchange admin center, start a mail flow message trace.
Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-classification

QUESTION 22
HOTSPOT

You have a new Microsoft 365 subscription.

A user named User1 has a mailbox in Microsoft Exchange Online.

You need to log any changes to the mailbox folder permissions of User1.

Which command should you run? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
Explanation:

To enable auditing for a single mailbox (in this example, belonging to Holly Sharp), use this PowerShell
command: Set-Mailbox username -AuditEnabled $true

References:
https://support.microsoft.com/en-us/help/4026501/office-auditing-in-office-365-for-admins

https://docs.microsoft.com/en-us/powershell/module/exchange/mailboxes/set-mailbox?view=exchange-ps
QUESTION 23
You have a Microsoft 365 subscription.

You recently configured a Microsoft SharePoint Online tenant in the subscription.

You plan to create an alert policy.

You need to ensure that an alert is generated only when malware is detected in more than five documents
stored in SharePoint Online during a period of 10 minutes.

What should you do first?

A. Enable Microsoft Office 365 Cloud App Security.


B. Deploy Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)
C. Enable Microsoft Office 365 Analytics.

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 24
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You discover that some external users accessed content on a Microsoft SharePoint site. You modify the
SharePoint sharing policy to prevent sharing outside your organization.

You need to be notified if the SharePoint sharing policy is modified in the future.

Solution: From the Security & Compliance admin center, you create a threat management policy.

Does this meet the goal?

A. Yes
B. No

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:

QUESTION 25
You have a Microsoft 365 subscription.

You need to be notified if users receive email containing a file that has a virus.
What should you do?

A. From the Exchange admin center, create an in-place eDiscovery & hold.
B. From the Security & Compliance admin center, create a safe attachments policy.
C. From the Security & Compliance admin center, create a data loss prevention (DLP) policy.
D. From the Security & Compliance admin center, create an alert policy.

Correct Answer: D
Section: [none]
Explanation

Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/alert-policies

QUESTION 26
You have a Microsoft Azure Active Directory (Azure AD) tenant.

The organization needs to sign up for Microsoft Store for Business. The solution must use the principle of least
privilege.

Which role should you assign to the user?

A. Global administrator
B. Cloud application administrator
C. Application administrator
D. Service administrator

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/microsoft-store/sign-up-microsoft-store-for-business

QUESTION 27
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You discover that some external users accessed content on a Microsoft SharePoint site. You modify the
SharePoint sharing policy to prevent sharing outside your organization.

You need to be notified if the SharePoint sharing policy is modified in the future.

Solution: From the SharePoint site, you create an alert.

Does this meet the goal?

A. Yes
B. No
Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 28
You have a Microsoft 365 subscription and an on-premises Active Directory domain named contoso.com. All
client computers run Windows 10 Enterprise and are joined to the domain.

You need to enable Microsoft Defender Credential Guard on all the computers.

What should you do?

A. From the Security & Compliance admin center, configure the DKIM signatures for the domain.
B. From a domain controller, create a Group Policy object (GPO) that enables the Restrict delegation of
credentials to remote servers setting.
C. From the Security & Compliance admin center, create a device security policy.
D. From a domain controller, create a Group Policy object (GPO) that enabled the Turn On Virtualization
Based Security setting.

Correct Answer: D
Section: [none]
Explanation

Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/windows/security/identity-protection/credential-guard/credential-guard-manage

QUESTION 29
Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named
contoso.com.

The company purchases a cloud app named App1 that supports Microsoft Cloud App Security monitoring.

You configure App1 to be available from the My Apps portal.

You need to ensure that you can monitor App1 from Cloud App Security.

What should you do?

A. From the Azure Active Directory admin center, create a conditional access policy.
B. From the Azure Active Directory admin center, create an app registration.
C. From the Device Management admin center, create an app protection policy.
D. From the Device Management admin center, create an app configuration policy.

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:

QUESTION 30
HOTSPOT
You use Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP).

You have the Microsoft Defender ATP machine groups shown in the following table.

You plan to onboard computers to Microsoft Defender ATP as shown in the following table.

To which machine group will each computer be added? To answer, select the appropriate options in the answer
are.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:

QUESTION 31
Your company has 5,000 Windows 10 devices. All the devices are protected by using Microsoft Defender
Advanced Threat Protection (ATP).

You need to create a filtered view that displays which Microsoft Defender ATP alert events have a high severity
and occurred during the last seven days.

What should you use in Microsoft Defender ATP?

A. the threat intelligence API


B. Automated investigations
C. Threat analytics
D. Advanced hunting

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/investigate-alerts-
windows-defender-advanced-threat-protection

https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automated-
investigations-windows-defender-advanced-threat-protection

QUESTION 32
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are
connected to your on-premises network.

Solution: From the Device Management admin center, you create a device configuration profile.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 33
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have an Azure Active Directory (Azure AD) tenant that contains a user named User1.

Your company purchases a Microsoft 365 subscription.

You need to ensure that User1 is assigned the required role to create file policies and manage alerts in the
Cloud App Security admin center.

Solution: From the Security & Compliance admin center, you assign the Security Administrator role to User1.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/cloud-app-security/manage-admins

QUESTION 34
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have an Azure Active Directory (Azure AD) tenant that contains a user named User1.

Your company purchases a Microsoft 365 subscription.

You need to ensure that User1 is assigned the required role to create file policies and manage alerts in the
Cloud App Security admin center.

Solution: From the Azure Active Directory admin center, you assign the Security administrator role to User1.

Does this meet the goal?

A. Yes
B. No

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/cloud-app-security/manage-admins

QUESTION 35
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have an Azure Active Directory (Azure AD) tenant that contains a user named User1.

Your company purchases a Microsoft 365 subscription.

You need to ensure that User1 is assigned the required role to create file policies and manage alerts in the
Cloud App Security admin center.

Solution: From the Azure Active Directory admin center, you assign the Compliance administrator role to User1.

Does this meet the goal?

A. Yes
B. No

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/cloud-app-security/manage-admins

QUESTION 36
HOTSPOT

Your company purchases a cloud app named App1.

You plan to publish App1 by using a conditional access policy named Policy1.

You need to ensure that you can control access to App1 by using a Microsoft Cloud App Security session
policy.

Which two settings should you modify in Policy1? To answer, select the appropriate settings in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/cloud-app-security/proxy-deployment-aad

QUESTION 37
HOTSPOT

Your company uses Microsoft Defender Advanced Threat Protection (ATP). Microsoft Defender ATP includes
the machine groups shown in the following table.

You onboard a computer named computer1 to Microsoft Defender ATP as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
QUESTION 38
HOTSPOT

You have a Microsoft 365 subscription.

You are planning a threat management solution for your organization.

You need to minimize the likelihood that users will be affected by the following threats:

Opening files in Microsoft SharePoint that contain malicious content


Impersonation and spoofing attacks in email messages

Which policies should you create in the Security & Compliance admin center? To answer, select the
appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:
Section: [none]
Explanation

Explanation/Reference:
Explanation:

Box 1: ATP Safe Attachments


ATP Safe Attachments provides zero-day protection to safeguard your messaging system, by checking email
attachments for malicious content. It routes all messages and attachments that do not have a virus/malware
signature to a special environment, and then uses machine learning and analysis techniques to detect
malicious intent. If no suspicious activity is found, the message is forwarded to the mailbox.

Box 2: ATP anti-phishing


ATP anti-phishing protection detects attempts to impersonate your users and custom domains. It applies
machine learning models and advanced impersonation-detection algorithms to avert phishing attacks.

ATP Safe Links provides time-of-click verification of URLs, for example, in emails messages and Office files.
Protection is ongoing and applies across your messaging and Office environment. Links are scanned for each
click: safe links remain accessible and malicious links are dynamically blocked.

References:
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/office-365-atp#configure-atp-
policies

QUESTION 39
You have a Microsoft 365 subscription.

All users have their email stored in Microsoft Exchange Online.

In the mailbox of a user named User1, you need to preserve a copy of all the email messages that contain the
word ProjectX.

What should you do first?

A. From Microsoft Cloud App Security, create an access policy.


B. From the Security & Compliance admin center, create an eDiscovery case.
C. From Microsoft Cloud App Security, create an activity policy.
D. From the Security & Compliance admin center, create a data loss prevention (DLP) policy.
Correct Answer: D
Section: [none]
Explanation

Explanation/Reference:
Explanation:
A DLP policy contains a few basic things:
Where to protect the content: locations such as Exchange Online, SharePoint Online, and OneDrive for
Business sites, as well as Microsoft Teams chat and channel messages.
When and how to protect the content by enforcing rules comprised of:
Conditions the content must match before the rule is enforced. For example, a rule might be configured to look
only for content containing Social Security numbers that's been shared with people outside your organization.
Actions that you want the rule to take automatically when content matching the conditions is found. For
example, a rule might be configured to block access to a document and send both the user and compliance
officer an email notification.

References:
https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-policies

QUESTION 40
You have a Microsoft 365 subscription.

From the subscription, you perform an audit log search, and you download all the results.

You plan to review the audit log data by using Microsoft Excel.

You need to ensure that each audited property appears in a separate Excel column.

What should you do first?

A. From Power Query Editor, transform the JSON data.


B. Format the Operations column by using conditional formatting.
C. Format the AuditData column by using conditional formatting.
D. From Power Query Editor, transform the XML data.

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
Explanation:
After you search the Office 365 audit log and download the search results to a CSV file, the file contains a
column named AuditData, which contains additional information about each event. The data in this column is
formatted as a JSON object, which contains multiple properties that are configured as property:value pairs
separated by commas. You can use the JSON transform feature in the Power Query Editor in Excel to split
each property in the JSON object in the AuditData column into multiple columns so that each property has its
own column. This lets you sort and filter on one or more of these properties

References:
https://docs.microsoft.com/en-us/microsoft-365/compliance/export-view-audit-log-records

QUESTION 41
You have a Microsoft 365 subscription.

You need to be notified if users receive email containing a file that has a virus.

What should you do?


A. From the Exchange admin center, create a spam filter policy.
B. From the Security & Compliance admin center, create a data governance event.
C. From the Security & Compliance admin center, create an alert policy.
D. From the Exchange admin center, create a mail-flow rule.

Correct Answer: D
Section: [none]
Explanation

Explanation/Reference:
Explanation:
You can inspect email attachments in your Exchange Online organization by setting up mail flow rules.
Exchange Online offers mail flow rules that provide the ability to examine email attachments as a part of your
messaging security and compliance needs. When you inspect attachments, you can then take action on the
messages that were inspected based on the content or characteristics of those attachments.

Incorrect answers:
A: A spam filter policy includes selecting the action to take on messages that are identified as spam. Spam filter
policy settings are applied to inbound messages.

B: A data governance event commences when an administrator creates it, following which background
processes look for content relating to the event and take the retention action defined in the label. The retention
action can be to keep or remove items, or to mark them for manual disposition.

References:
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/configure-anti-malware-policies

https://www.petri.com/office-365-event-based-retention

QUESTION 42
DRAG DROP

You have the Microsoft Azure Advanced Threat Protection (ATP) workspace shown in the Workspace exhibit.
(Click the Workspace tab.)

The sensors settings for the workspace are configured as shown in the Sensors exhibit. (Click the Sensors
tab.)
You need to ensure that Azure ATP stores data in Asia.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of
actions to the answer area and arrange them in the correct order.

Select and Place:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:

QUESTION 43
Your company has five security information and event management (SIEM) appliances. The traffic logs from
each appliance are saved to a file share named Logs.

You need to analyze the traffic logs.

What should you do from Microsoft Cloud App Security?

A. Click Investigate, and then click Activity log.


B. Click Control, and then click Policies. Create a file policy.
C. Click Discover, and then click Create snapshot report.
D. Click Investigate, and then click Files.
Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/investigate-an-activity-in-office-365-cas

QUESTION 44
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have an Azure Active Directory (Azure AD) tenant that contains a user named User1.

Your company purchases a Microsoft 365 subscription.

You need to ensure that User1 is assigned the required role to create file policies and manage alerts in the
Cloud App Security admin center.

Solution: From the Cloud App Security admin center, you assign the App/instance admin role for all Microsoft
Online Services to User1.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
Explanation:
App/instance admin: Has full or read-only permissions to all of the data in Microsoft Cloud App Security that
deals exclusively with the specific app or instance of an app selected.

Reference:
https://docs.microsoft.com/en-us/cloud-app-security/manage-admins

QUESTION 45
Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named
contoso.com.

The tenant is configured to use Azure AD Identity Protection.

You plan to use an application named App1 that creates reports of Azure AD Identity Protection usage.

You register App1 in the tenant.

You need to ensure that App1 can read the risk event information of contoso.com.

To which API should you delegate permissions?

A. Windows Azure Service Management API


B. Windows Azure Active Directory
C. Microsoft Graph
D. Office 365 Management

Correct Answer: C
Section: [none]
Explanation

Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/graph/api/resources/identityprotection-root?view=graph-rest-beta

QUESTION 46
Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named
contoso.com. The tenant contains computers that run Windows 10 Enterprise and are managed by using
Microsoft Intune. The computers are configured as shown in the following table.

You plan to implement Windows Defender Application Guard for contoso.com.

You need to identify on which two Windows 10 computers Windows Defender Application Guard can be
installed.

Which two computers should you identify? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A. Computer1
B. Computer3
C. Computer2
D. Computer4

Correct Answer: BC
Section: [none]
Explanation

Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-guard/reqs-
wd-app-guard

QUESTION 47
HOTSPOT

Your company uses Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP).

The devices onboarded to Microsoft Defender ATP are shown in the following table.
The alerts visible in the Microsoft Defender ATP alerts queue are shown in the following table.

You create a suppression rule that has the following settings:

Triggering IOC: Any IOC


Action: Hide alert
Suppression scope: Alerts on ATP1 machine group

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:
Section: [none]
Explanation

Explanation/Reference:
Explanation:

A suppression rule will not affect alerts that are already in the alerts queue. Only new alerts will be suppressed.

QUESTION 48
HOTSPOT

Your company has a Microsoft 365 subscription.

You need to configure Microsoft 365 to meet the following requirements:

Malware found in email attachments must be quarantined for 20 days.


The email address of senders to your company must be verified.

Which two options should you configure in the Security & Compliance admin center? To answer, select the
appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:
Section: [none]
Explanation

Explanation/Reference:

QUESTION 49
You have a Microsoft 365 subscription that uses Microsoft Defender Advanced Threat Protection (Microsoft
Defender ATP).

All the devices in your organization are onboarded to Microsoft Defender ATP.

You need to ensure that an alert is generated if malicious activity was detected on a device during the last 24
hours.

What should you do?

A. From Alerts queue, create a suppression rule and assign an alert


B. From the Security & Compliance admin center, create an audit log search
C. From Advanced hunting, create a query and a detection rule
D. From the Security & Compliance admin center, create a data loss prevention (DLP) policy

Correct Answer: C
Section: [none]
Explanation

Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/custom-detection-
rules

QUESTION 50
You have an Azure Active Directory (Azure AD) tenant and a Microsoft 365 E5 subscription. The tenant
contains the users shown in the following table.
You plan to implement Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP).

You verify that role-based access control (RBAC) is turned on in Microsoft Defender ATP.

You need to identify which user can view security incidents from the Microsoft Defender Security Center.

Which user should you identify?

A. User1
B. User2
C. User3
D. User4

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
Testlet 2

Case Study

Overview

Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and
New York.

The company has the employees and devices shown in the following table.

Contoso recently purchased a Microsoft 365 E5 subscription.

Existing Environment

The network contains an on-premises Active Directory forest named contoso.com. The forest contains the
servers shown in the following table.

All servers run Windows Server 2016. All desktops and laptops run Windows 10 Enterprise and are joined to
the domain.

The mobile devices of the users in the Montreal and Seattle offices run Android. The mobile devices of the
users in the New York office run iOS.

The domain is synced to Azure Active Directory (Azure AD) and includes the users shown in the following table.
The domain also includes a group named Group1.

Requirements

Planned Changes

Contoso plans to implement the following changes:

Implement Microsoft 365.


Manage devices by using Microsoft Intune.
Implement Azure Advanced Threat Protection (ATP).
Every September, apply the latest feature updates to all Windows computers. Every March, apply the latest
feature updates to the computers in the New York office only.

Technical Requirements

Contoso identifies the following technical requirements:

When a Windows 10 device is joined to Azure AD, the device must enroll in Intune automatically.
Dedicated support technicians must enroll all the Montreal office mobile devices in Intune.
User1 must be able to enroll all the New York office mobile devices in Intune.
Azure ATP sensors must be installed and must NOT use port mirroring.
Whenever possible, the principle of least privilege must be used.
A Microsoft Store for Business must be created.

Compliance Requirements

Contoso identifies the following compliance requirements:

Ensure that the users in Group1 can only access Microsoft Exchange Online from devices that are enrolled
in Intune and configured in accordance with the corporate policy.
Configure Windows Information Protection (WIP) for the Windows 10 devices.

QUESTION 1
On which server should you install the Azure ATP sensor?

A. Server1
B. Server2
C. Server3
D. Server4
E. Server5

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-capacity-planning
Testlet 3

Case Study

Overview

ADatum Corporation is an international financial services company that has 5,000 employees.

ADatum has six offices: a main office in New York and five branch offices in Germany, the United Kingdom,
France, Spain, and Italy.

All the offices are connected to each other by using a WAN link. Each office connects directly to the Internet.

Existing Environment

Current Infrastructure

ADatum recently purchased a Microsoft 365 subscription.

All user files are migrated to Microsoft 365.

All mailboxes are hosted in Microsoft 365. The users in each office have email suffixes that include the country
of the user, for example, [email protected] or [email protected].

Each office has a security information and event management (SIEM) appliance. The appliance comes from
three different vendors.

ADatum uses and processes Personally Identifiable Information (PII).

Problem Statements

ADatum entered into litigation. The legal department must place a hold on all the documents of a user named
User1 that are in Microsoft 365.

Requirements

Business Goals

ADatum wants to be fully compliant with all the relevant data privacy laws in the regions where is operates.

ADatum wants to minimize the cost of hardware and software whenever possible.

Technical Requirements

ADatum identifies the following technical requirements:

Centrally perform log analysis for all offices.


Aggregate all data from the SIEM appliances to a central cloud repository for later analysis.
Ensure that a SharePoint administrator can identify who accessed a specific file stored in a document
library.
Provide the users in the finance department with access to Service assurance information in Microsoft
Office 365.
Ensure that documents and email messages containing the PII data of European Union (EU) citizens are
preserved for 10 years.
If a user attempts to download 1,000 or more files from Microsoft SharePoint Online within 30 minutes,
notify a security administrator and suspend the user’s user account.
A security administrator requires a report that shown which Microsoft 365 users signed in. Based on the
report, the security administrator will create a policy to require multi-factor authentication when a sign-in is
high risk.
Ensure that the users in the New York office can only send email messages that contain sensitive U.S. PII
data to other New York office uses. Email messages must be monitored to ensure compliance. Auditors in
the New York office must have access to reports that show the sent and received email messages
containing sensitive U.S. PII data.

QUESTION 1
You need to meet the technical requirement for large-volume document retrieval.

What should you create?

A. an activity policy from Microsoft Cloud App Security


B. a data loss prevention (DLP) policy from the Security & Compliance admin center
C. a file policy from Microsoft Cloud App Security
D. an alert policy from the Security & Compliance admin center

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/activity-policies-and-alerts
Question Set 1

QUESTION 1
Your company uses on-premises Windows Server File Classification Infrastructure (FCI). Some documents on
the on-premises file servers are classified as Confidential.

You migrate the files from the on-premises file servers to Microsoft SharePoint Online.

You need to ensure that you can implement data loss prevention (DLP) policies for the uploaded file based on
the Confidential classification.

What should you do first?

A. From the SharePoint admin center, configure hybrid search.


B. From the SharePoint admin center, create a managed property.
C. From the Security & Compliance Center PowerShell, run the New-DataClassification cmdlet.
D. From the Security & Compliance Center PowerShell, run the New-DlpComplianceRule cmdlet.

Correct Answer: D
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-dlp/new-
dataclassification?view=exchange-ps

QUESTION 2
You have a Microsoft 365 subscription.

From the Security & Compliance admin center, you create a content search of all the mailboxes that contain the
work ProjectX.

You need to export the results of the content search.

What do you need to download the report?

A. a certification authority (CA) certificate


B. an export key
C. a password
D. a user certificate

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/export-search-results

QUESTION 3
HOTSPOT

You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.

You have three applications named App1, App2, and App3 that have the same file extensions.
Your company uses Windows Information Protection (WIP). WIP has the following configurations:

Windows Information Protection mode: Silent


Protected apps: App1
Exempt apps: App2

From App1, you create a file named File1.

What is the effect of the configurations? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/
create-wip-policy-using-intune-azure

QUESTION 4
HOTSPOT

You have a Microsoft 365 subscription.

You have a group named Support. Users in the Support group frequently send email messages to external
users.

The manager of the Support group wants to randomly review messages that contain attachments.

You need to provide the manager with the ability to review messages that contain attachments sent from the
Support group users to external users. The manager must have access to only 10 percent of the messages.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/supervision-policies

QUESTION 5
Your company has a Microsoft 365 subscription.

You implement Microsoft Azure Information Protection.

You need to automatically protect email messages that contain the word Confidential in the subject line.
What should you create?

A. a mail flow rule from the Exchange admin center


B. a message trace from the Security & Compliance admin center
C. a supervision policy from the Security & Compliance admin center
D. a sharing policy from the Exchange admin center

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/information-protection/configure-exo-rules

QUESTION 6
You have a Microsoft 365 subscription.

You need to investigate user activity in Microsoft 365, including from where users signed in, which applications
were used, and increases in activity during the past month. The solution must minimize administrative effort.

Which admin center should you use?

A. Azure ATP
B. Security & Compliance
C. Cloud App Security
D. Flow

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-compliance

QUESTION 7
You are testing a data loss prevention (DLP) policy to protect the sharing of credit card information with external
users.

During testing, you discover that a user can share credit card information with external users by using email.
However, the user is prevented from sharing files that contain credit card information by using Microsoft
SharePoint Online.

You need to prevent the user from sharing the credit card information by using email and SharePoint.

What should you configure?

A. the locations of the DLP policy


B. the user overrides of the DLP policy rule
C. the status of the DLP policy
D. the conditions of the DLP policy rule

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies

QUESTION 8
You have a Microsoft 365 subscription.

You need to view the IP address from which a user synced a Microsoft SharePoint Online library.

What should you do?

A. From the SharePoint Online admin center, view the usage reports.
B. From the Security & Compliance admin center, perform an audit log search.
C. From the Microsoft 365 admin center, view the usage reports.
D. From the Microsoft 365 admin center, view the properties of the user’s user account.

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-compliance

QUESTION 9
HOTSPOT

Your network contains an Active Directory domain named contoso.com. The domain contains the file servers
shown in the following table.

A file named File1.abc is stored on Server1. A file named File2.abc is stored on Server2. Three apps named
App1, App2, and App3 all open files that have the .abc file extension.

You implement Windows Information Protection (WIP) by using the following configurations:

Exempt apps: App2


Protected apps: App1
Windows Information Protection mode: Block
Network boundary: IPv4 range of: 192.168.1.1-192.168.1.255

You need to identify the apps from which you can open File1.abc.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/
create-wip-policy-using-intune-azure

QUESTION 10
In Microsoft 365, you configure a data loss prevention (DLP) policy named Policy1. Policy1 detects the sharing
of United States (US) bank account numbers in email messages and attachments.

Policy1 is configured as shown in the exhibit. (Click the Exhibit tab.)


You need to ensure that internal users can email documents that contain US bank account numbers to external
users who have an email suffix of contoso.com.

What should you configure?

A. an exception
B. an action
C. a condition
D. a group

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies#how-dlp-policies-
work

QUESTION 11
HOTSPOT

You have a document in Microsoft OneDrive that is encrypted by using Microsoft Azure Information Protection
as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information
presented in the graphic.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-protection

QUESTION 12
HOTSPOT

You have a Microsoft Office 365 subscription.

You need to delegate eDiscovery tasks as shown in the following table.

The solution must follow the principle of the least privilege.

To which role group should you assign each user? To answer, select the appropriate options in the answer
area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/assign-ediscovery-permissions

QUESTION 13
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You have a Microsoft 365 subscription.

From the Security & Compliance admin center, you create a role group named US eDiscovery Managers by
copying the eDiscovery Manager role group.

You need to ensure that the users in the new role group can only perform content searches of mailbox content
for users in the United States.

Solution: From Windows PowerShell, you run the New-ComplianceSecurityFilter cmdlet with the
appropriate parameters.

Does this meet the goal?

A. Yes
B. No

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/permissions-filtering-for-content-search

https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-content-search/new-
compliancesecurityfilter?view=exchange-ps

QUESTION 14
HOTSPOT

You have a Microsoft 365 subscription that uses a default domain named contoso.com. The domain contains
the users shown in the following table.

The domain contains the devices shown in the following table.

The domain contains conditional access policies that control access to a cloud app named App1. The policies
are configured as shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
Explanation:
Note: Block access overrides Grant access

References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/plan-conditional-access

QUESTION 15
HOTSPOT

You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.

A user named User1 has files on a Windows 10 device as shown in the following table.

In Azure Information Protection, you create a label named Label1 that is configured to apply automatically.
Label1 is configured as shown in the following exhibit.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
Explanation:

The phrase to match is "im" and it is case sensitive. The phrase must also appear at least twice.

Box 1: No
File1.docx contain the word "import" once only

Box 2: Yes
File2.docx contains two occurrences of the word "import" as well as the word "imported"

Box 3: No
File3.docx contains "IM" but his is not the correct letter case.

References:
https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-classification

QUESTION 16
HOTSPOT

You have a Microsoft 365 subscription that uses a default domain named contoso.com.

Three files were created on February 1, 2019, as shown in the following table.

On March 1, 2019, you create two retention labels named Label1 and Label2.
The settings for Lable1 are configured as shown in the Label1 exhibit. (Click the Label1 tab.)

The settings for Lable2 are configured as shown in the Label2 exhibit. (Click the Label2 tab.)
You apply the retention labels to Exchange email, SharePoint sites, and OneDrive accounts.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:
Section: [none]
Explanation

Explanation/Reference:
Explanation:

Box 1: No
Retention overrides deletion.

Box 2: No
Content in a document library will be moved to the first-stage Recycle Bin within 7 days of disposition, and then
permanently deleted another 93 days after that. Thus 100 days in total.

Box 3: No
Items in an Exchange mailbox will be permanently deleted within 14 days of disposition.

References:
https://docs.microsoft.com/en-us/office365/securitycompliance/labels

https://docs.microsoft.com/en-us/office365/securitycompliance/disposition-reviews

QUESTION 17
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have a Microsoft 365 subscription.

From the Security & Compliance admin center, you create a role group named US eDiscovery Managers by
copying the eDiscovery Manager role group.

You need to ensure that the users in the new role group can only perform content searches of mailbox content
for users in the United States.

Solution: From Windows PowerShell, you run the New-AzureRmRoleAssignment cmdlet with the appropriate
parameters.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/azurerm.resources/new-azurermroleassignment?
view=azurermps-6.13.0

QUESTION 18
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have a Microsoft 365 subscription.

From the Security & Compliance admin center, you create a role group named US eDiscovery Managers by
copying the eDiscovery Manager role group.

You need to ensure that the users in the new role group can only perform content searches of mailbox content
for users in the United States.

Solution: From the Security & Compliance admin center, you modify the roles of the US eDiscovery Managers
role group.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 19
Your company has a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.

You sign for Microsoft Store for Business.

The tenant contains the users shown in the following table.

Microsoft Store for Business has the following Shopping behavior settings:
Allow users to shop is set to On
Make everyone a Basic Purchaser is set to Off

You need to identify which users can install apps from the Microsoft for Business private store.

Which users should you identify?

A. User3 only
B. User1 only
C. User1 and User2 only
D. User3 and User4 only

Correct Answer: C
Section: [none]
Explanation

Explanation/Reference:
Explanation:
Allow users to shop controls the shopping experience in Microsoft Store for Education. When this setting is on,
Purchasers and Basic Purchasers can purchase products and services from Microsoft Store for Education.

References:
https://docs.microsoft.com/en-us/microsoft-store/acquire-apps-microsoft-store-for-business

QUESTION 20
You have a Microsoft 365 subscription that contains a Microsoft Azure Active Directory (Azure AD) tenant
named contoso.com.

In the tenant, you create a user named User1.

You need to ensure that User1 can publish retention labels from the Security & Compliance admin center. The
solution must use the principle of least privilege.

To which role group should you add User1?

A. Security Administrator
B. Records Management
C. Compliance Administrator
D. eDiscovery Manager

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/file-plan-manager

QUESTION 21
You plan to use the Security & Compliance admin center to import several PST files into Microsoft 365
mailboxes.

Which three actions should you perform before you import the data? Each correct answer presents part of the
solution.

NOTE: Each correct selection is worth one point.


A. From the Exchange admin center, create a public folder.
B. Copy the PST files by using AzCopy.
C. From the Exchange admin center, assign admin roles.
D. From the Microsoft Azure portal, create a storage account that has a blob container.
E. From the Microsoft 365 admin center, deploy an add-in.
F. Create a mapping file that uses the CSV file format.

Correct Answer: BCF


Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/use-network-upload-to-import-pst-files

QUESTION 22
HOTSPOT

You have a Microsoft 365 tenant.

You plan to create a retention policy as shown in the following exhibit.


Use the drop-down menus to select the answer choice that completes each statement based on the information
presented in the graphic.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:

QUESTION 23
You deploy Microsoft Azure Information Protection.

You need to ensure that a security administrator named SecAdmin1 can always read and inspect data
protected by Azure Rights Management (Azure RMS).

What should you do?

A. From the Security & Compliance admin center, add SecAdmin1 to the eDiscovery Manager role group.
B. From the Azure Active Directory admin center, add SecAdmin1 to the Security Reader role group.
C. From the Security & Compliance admin center, add SecAdmin1 to the Compliance Administrator role group.
D. From Windows PowerShell, enable the super user feature and assign the role to SecAdmin1.

Correct Answer: D
Section: [none]
Explanation

Explanation/Reference:
Explanation:
The super user feature of the Azure Rights Management service from Azure Information Protection ensures
that authorized people and services can always read and inspect the data that Azure Rights Management
protects for your organization. However, the super user feature is not enabled by default. The PowerShell
cmdlet Enable-AadrmSuperUserFeature is used to manually enable the super user feature.

References:
https://docs.microsoft.com/en-us/azure/information-protection/configure-super-users

QUESTION 24
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have a new Microsoft 365 subscription.

You need to prevent users from sending email messages that contain Personally Identifiable Information (PII).

Solution: From the Cloud App Security admin center, you create an access policy.
Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 25
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.

You create an Azure Advanced Threat Protection (ATP) workspace named Workspace1.

The tenant contains the users shown in the following table.

You need to modify the configuration of the Azure ATP sensors.

Solution: You instruct User4 to modify the Azure ATP sensor configuration.

Does this meet the goal?

A. Yes
B. No

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
Explanation:
Only Azure ATP administrators can modify the sensors.
Any global administrator or security administrator on the tenant's Azure Active Directory is automatically an
Azure ATP administrator.

References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-role-groups

QUESTION 26
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.

You create an Azure Advanced Threat Protection (ATP) workspace named Workspace1.

The tenant contains the users shown in the following table.

You need to modify the configuration of the Azure ATP sensors.

Solution: You instruct User3 to modify the Azure ATP sensor configuration.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
Explanation:
Only Azure ATP administrators can modify the sensors.

Any global administrator or security administrator on the tenant's Azure Active Directory is automatically an
Azure ATP administrator.

Reference:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-role-groups

QUESTION 27
HOTSPOT
You have a Microsoft Azure Active Directory (Azure AD) tenant named sk180818.onmicrosoft.com. The tenant
contains the users shown in the following table.

In Azure Information Protection, you create a label named Label1 as shown in the following exhibit.

Label1 is applied to a file named File1.

You send File1 as an email attachment to User1, User2, User3, and User4.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/azure/information-protection/configure-usage-rights#rights-included-in-
permissions-levels

QUESTION 28
HOTSPOT

Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named
contoso.com.

The company stores 2 TB of data in SharePoint Online document libraries.

The tenant has the labels shown in the following table.

From the Azure portal, you activate unified labeling.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:
Section: [none]
Explanation

Explanation/Reference:

QUESTION 29
HOTSPOT

You create a Microsoft 365 subscription.

Your company’s privacy policy states that user activities must NOT be audited.

You need to disable audit logging in Microsoft 365.

How should you complete the command? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/turn-audit-log-search-on-or-off

QUESTION 30
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have a new Microsoft 365 subscription.

You need to prevent users from sending email messages that contain Personally Identifiable Information (PII).

Solution: From the Exchange admin center, you create a data loss prevention (DLP) policy.

Does this meet the goal?

A. Yes
B. No

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:

QUESTION 31
You have a Microsoft 365 subscription.

Some users have iPads that are managed by your company.

You plan to prevent the iPad users from copying corporate data in Microsoft Word and pasting the data into
other applications.

What should you create?


A. A conditional access policy.
B. A compliance policy.
C. An app protection policy.
D. An app configuration policy.

Correct Answer: C
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/intune/app-protection-policy

QUESTION 32
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have a new Microsoft 365 subscription.

You need to prevent users from sending email messages that contain Personally Identifiable Information (PII).

Solution: From the Azure portal, you create a Microsoft Azure Information Protection label and an Azure
Information Protection policy.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 33
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.

You create an Azure Advanced Threat Protection (ATP) workspace named Workspace1.

The tenant contains the users shown in the following table.


You need to modify the configuration of the Azure ATP sensors.

Solution: You instruct User1 to modify the Azure ATP sensor configuration.

Does this meet the goal?

A. Yes
B. No

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
Explanation:
Only Azure ATP administrators can modify the sensors.

References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-role-groups

QUESTION 34
HOTSPOT

You have a data loss prevention (DLP) policy.

You need to increase the likelihood that the DLP policy will apply to data that contains medical terms from the
International Classification of Diseases (ICD-9-CM). The solution must minimize the number of false positives.

Which two settings should you modify? To answer, select the appropriate settings in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies

https://docs.microsoft.com/en-us/office365/securitycompliance/what-the-sensitive-information-types-look-
for#international-classification-of-diseases-icd-9-cm

QUESTION 35
HOTSPOT

From the Security & Compliance admin center, you create a retention policy named Policy1.

You need to prevent all users from disabling the policy or reducing the retention period.

Which command should you run? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-retention/set-
retentioncompliancepolicy?view=exchange-ps

QUESTION 36
You create a new Microsoft 365 subscription and assign Microsoft 365 E3 licenses to 100 users.

From the Security & Compliance admin center, you enable auditing.

You are planning the auditing strategy.

Which three activities will be audited by default? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A. An administrator creates a new Microsoft SharePoint site collection.


B. An administrator creates a new mail flow rule.
C. A user shares a Microsoft SharePoint folder with an external user.
D. A user delegates permissions to their mailbox.
E. A user purges messages from their mailbox.

Correct Answer: ABC


Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-
compliance?redirectSourcePath=%252farticle%252f0d4d0f35-390b-4518-800e-0c7ec95e946c

QUESTION 37
HOTSPOT

You have a Microsoft 365 tenant.


You create a retention label as shown in the Retention Label exhibit. (Click the Retention Label tab.)

You create a label policy as shown in the Label Policy Exhibit. (Click the Label Policy tab.)
The label policy is configured as shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies

QUESTION 38
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.

You create an Azure Advanced Threat Protection (ATP) workspace named Workspace1.

The tenant contains the users shown in the following table.


You need to modify the configuration of the Azure ATP sensors.

Solution: You instruct User2 to modify the Azure ATP sensor configuration.

Does this meet the goal?

A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 39
HOTSPOT

You purchase a new Microsoft 365 subscription.

You create 100 users who are assigned Microsoft 365 E3 licenses.

From the Security & Compliance admin center, you enable auditing.

Six months later, a manager sends you an email message asking the following questions:

Question1: Who created a team named Team1 14 days ago?


Question2: Who signed in to the mailbox of User1 30 days ago?
Question3: Who changed the site collection administrators of a site 60 days ago?

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-
compliance?redirectSourcePath=%252farticle%252f0d4d0f35-390b-4518-800e-0c7ec95e946c

https://docs.microsoft.com/en-us/office365/securitycompliance/enable-mailbox-auditing

QUESTION 40
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have a Microsoft 365 subscription.

From the Security & Compliance admin center, you create a role group named US eDiscovery Managers by
copying the eDiscovery Manager role group.

You need to ensure that the users in the new role group can only perform content searches of mailbox content
for users in the United States.

Solution: From the Azure Active Directory admin center, you create a conditional access policy.

Does this meet the goal?


A. Yes
B. No

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 41
From the Security & Compliance admin center, you create a content export as shown in the exhibit. (Click the
Exhibit tab.)
What will be excluded from the export?

A. a 60-MB DOCX file


B. a 12-MB BMP file
C. a 5-KB RTF file
D. an 80-MB PPTX file

Correct Answer: B
Section: [none]
Explanation
Explanation/Reference:
Explanation:
Unrecognized file formats are excluded from the search.

Incorrect Answers:
A: DOCX is a supported Microsoft PowerPoint file format.
C: RTF is a supported Rich Text File format.
D: VSDX is a supported Microsoft Visio file format.

Answer: B

References:
https://docs.microsoft.com/en-us/office365/securitycompliance/export-a-content-search-report

QUESTION 42
You have a Microsoft 365 subscription.

From the Security & Compliance admin center, you create a content search of a mailbox.

You need to view the content of the mail messages found by the search as quickly as possible.

What should you select from the Content search settings?

A. Export report
B. Export results
C. Re-run
D. View results

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
Explanation:
There is no ‘View Results” option. You can preview results but that will only show up to 100 emails. To
guarantee you’re getting all results, you’ll need to export them to a PST file.

References:
https://docs.microsoft.com/en-us/microsoft-365/compliance/limits-for-content-search

QUESTION 43
HOTSPOT

From the Security & Compliance admin center, you create a retention policy named Policy1.

You need to prevent all users from disabling the policy or reducing the retention period.

How should you configure the Azure PowerShell command? To answer, select the appropriate options in the
answer area.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-retention/set-
retentioncompliancepolicy?view=exchange-ps

QUESTION 44
Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named
contoso.com.

A user named User1 is a member of a dynamic group named Group1.

User1 reports that he cannot access documents shared to Group1.

You discover that User1 is no longer a member of Group1.

You suspect that an administrator made a change that caused User1 to be removed from Group1.

You need to identify which administrator made the change.

Which audit log activity should you search in the Security & Compliance admin center?

A. Azure AD group administration activities – Removed member from group


B. User administration activities – Updated user
C. Azure AD group administration activities – Updated group

Correct Answer: C
Section: [none]
Explanation

Explanation/Reference:
QUESTION 45
HOTSPOT

You have a Microsoft 365 tenant named contoso.com. The tenant contains the users shown in the following
table.

You have the eDiscovery cases shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/microsoft-365/compliance/assign-ediscovery-permissions

QUESTION 46
You have a Microsoft 365 subscription.

All users have their email stored in Microsoft Exchange Online.

In the mailbox of a user named User1, you need to preserve a copy of all the email messages that contain the
word ProjectX.

What should you do?

A. From the Security & Compliance admin center, create a data loss prevention (DLP) policy.
B. From the Security & Compliance admin center, create a label and a label policy.
C. From the Security & Compliance admin center, start a message trace.
D. From Microsoft Cloud App Security, create an activity policy.

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:

QUESTION 47
You have a Microsoft 365 tenant.

You discover that administrative tasks are unavailable in the Microsoft Office 365 audit logs of the tenant.
You run the Get-AdminAuditLogConfig cmdlet and receive the following output:

You need to ensure that administrative tasks are logged in the Office 365 audit logs.

Which attribute should you modify?

A. TestCmdletLoggingEnabled
B. UnifiedAuditLogIngestionEnabled
C. AdminAuditLogEnabled

Correct Answer: B
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-audit/set-
adminauditlogconfig?view=exchange-ps

QUESTION 48
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.

You have a new Microsoft 365 subscription.

You need to prevent users from sending email messages that contain Personally Identifiable Information (PII).

Solution: From the Security & Compliance admin center, you create a data loss prevention (DLP) policy.

Does this meet the goal?

A. Yes
B. No

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:

QUESTION 49
Your company has a Microsoft 365 tenant.

The company sells products online and processes credit card information.

You need to be notified if a file stored in Microsoft SharePoint Online contains credit card information. The file
must be removed automatically from its current location until an administrator can review its contents.

What should you use?

A. a Security & Compliance data loss prevention (DLP) policy


B. a Microsoft Cloud App Security access policy
C. a Security & Compliance retention policy
D. a Microsoft Cloud App Security file policy

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies

QUESTION 50
HOTSPOT

You configure an anti-phishing policy as shown in the following exhibit.


Use the drop-down menus to select the answer choice that completes each statement based on the information
presented in the graphic.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/set-up-anti-phishing-policies#learn-about-atp-
anti-phishing-policy-options

QUESTION 51
You need to notify the manager of the human resources department when a user in the department shares a
file or folder from the department’s Microsoft SharePoint Online site.

What should you do?

A. From the Security & Compliance admin center, create an alert policy.
B. From the SharePoint Online site, create an alert.
C. From the SharePoint Online admin center, modify the sharing settings.
D. From the Security & Compliance admin center, create a data loss prevention (DLP) policy.

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/create-activity-alerts

QUESTION 52
HOTSPOT

You have a Microsoft 365 subscription.

You are configuring permissions for Security & Compliance.

You need to ensure that the users can perform the tasks shown in the following table.

The solution must use the principle of least privilege.


To which role should you assign each user? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/permissions-in-the-security-and-compliance-
center#mapping-of-role-groups-to-assigned-roles

QUESTION 53
HOTSPOT

You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com.

Your company implements Windows Information Protection (WIP).


You need to modify which users and applications are affected by WIP.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/
create-wip-policy-using-intune-azure

QUESTION 54
HOTSPOT

You have a Microsoft 365 subscription.

All users are assigned Microsoft Azure Active Directory Premium licenses.

From the Device Management admin center, you set Microsoft Intune as the MDM authority.

You need to ensure that when the members of a group named Marketing join a device to Azure Active Directory
(Azure AD), the device is enrolled automatically in Intune. The Marketing group members must be limited to five
devices enrolled in Intune.
Which two options should you use to perform the configurations? To answer, select the appropriate blades in
the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:
Section: [none]
Explanation

Explanation/Reference:
Explanation:

Device enrollment manager (DEM) is an Intune permission that can be applied to an Azure AD user account
and lets the user enroll up to 1,000 devices

You can create and manage enrollment restrictions that define what devices can enroll into management with
Intune, including the:
Number of devices.
Operating systems and versions.

The Marketing group members must be limited to five devices enrolled in Intune

References:
https://docs.microsoft.com/en-us/intune/enrollment/device-enrollment-manager-enroll

https://docs.microsoft.com/en-us/intune/enrollment/enrollment-restrictions-set

QUESTION 55
You have a Microsoft 365 subscription.

You plan to enable Microsoft Azure Information Protection.

You need to ensure that only the members of a group named PilotUsers can protect content.

What should you do?

A. Run the Set-AadrmOnboardingControlPolicy cmdlet.


B. Run the Add-AadrmRoleBasedAdministrator cmdlet.
C. Create an Azure Information Protection policy.
D. Configure the protection activation status for Azure Information Protection.

Correct Answer: C
Section: [none]
Explanation

Explanation/Reference:
Reference:
https://blogs.technet.microsoft.com/kemckinn/2018/05/17/creating-labels-for-azure-information-protection/

QUESTION 56
Your company has a Microsoft 365 subscription.

You need to identify which users performed the following privileged administration tasks:

Deleted a folder from the second-stage Recycle Bin of Microsoft SharePoint


Opened a mailbox of which the user was not the owner
Reset a user password

What should you use?

A. Microsoft Azure Activity Directory (Azure AD) audit logs


B. Security & Compliance content search
C. Microsoft Azure Activity Directory (Azure AD) sign-ins
D. Security & Compliance audit log search

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/azure-monitor/platform/activity-logs-overview
QUESTION 57
You have a Microsoft 365 subscription.

You have a user named User1.

You need to ensure that User1 can place a hold on all mailbox content.

Which role should you assign to User1?

A. eDiscovery Manager from the Security & Compliance admin center


B. Compliance Management from the Exchange admin center
C. User management administrator from the Microsoft 365 admin center
D. Information Protection administrator from the Azure Active Directory admin center

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/Exchange/permissions/feature-permissions/policy-and-compliance-
permissions?view=exchserver-2019

QUESTION 58
You have a Microsoft 365 subscription.

All users are assigned a Microsoft 365 E3 license.

You enable auditing for your organization.

What is the maximum amount of time data will be retained in the Microsoft 365 audit log?

A. 2 years
B. 1 year
C. 30 days
D. 90 days

Correct Answer: D
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-compliance

QUESTION 59
HOTSPOT

Your company is based in the United Kingdom (UK).

Users frequently handle data that contains Personally Identifiable Information (PII).

You create a data loss prevention (DLP) policy that applies to users inside and outside the company. The policy
is configured as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information
presented in the graphic.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies

QUESTION 60
HOTSPOT

You have a Microsoft 365 subscription that contains all the user data.

You plan to create the retention policy shown in the Locations exhibit. (Click the Locations tab.)
You configure the Advanced retention settings as shown in the Retention exhibit. (Click the Retention tab.)
The locations specified in the policy include the groups shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies

QUESTION 61
HOTSPOT

You have retention policies in Microsoft 365 as shown in the following table.

Policy1 is configured as shown in the Policy1 exhibit. (Click the Policy1 tab.)
Policy2 is configured as shown in the Policy2 exhibit. (Click the Policy2 tab.)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies#the-principles-of-retention-or-
what-takes-precedence

QUESTION 62
You have a Microsoft 365 subscription.

You configure a data loss prevention (DLP) policy.

You discover that users are incorrectly marking content as false positive and bypassing the DLP policy.

You need to prevent the users from bypassing the DLP policy.

What should you configure?

A. incident reports
B. actions
C. exceptions
D. user overrides

Correct Answer: D
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies

QUESTION 63
You have a Microsoft 365 subscription.

All users have their email stored in Microsoft Exchange Online.

In the mailbox of a user named User1, you need to preserve a copy of all the email messages that contain the
word ProjectX.

What should you do?


A. From the Security & Compliance admin center, create an eDiscovery case.
B. From the Exchange admin center, create a mail flow rule.
C. From the Security & Compliance admin center, start a message trace.
D. From Microsoft Cloud App Security, create an access policy.

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/ediscovery-cases#step-2-create-a-new-case

QUESTION 64
You have a Microsoft 365 E5 subscription.

You run an eDiscovery search that returns the following Azure Rights Management (Azure RMS) – encrypted
content:

Microsoft Exchange emails


Microsoft OneDrive documents
Microsoft SharePoint documents

Which content can be decrypted when you export the eDiscovery search results?

A. Exchange emails only


B. SharePoint documents, OneDrive documents, and Exchange emails
C. OneDrive documents only
D. SharePoint documents and OneDrive documents only
E. SharePoint documents only

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/export-search-results?view=o365-worldwide

QUESTION 65
You have a Microsoft 365 subscription.

You plan to connect to Microsoft Exchange Online PowerShell and run the following cmdlets:

Search-MailboxAuditLog
Test-ClientAccessRule
Set-GroupMailbox
Get-Mailbox

Which cmdlet will generate an entry in the Microsoft Office 365 audit log?

A. Search-MailboxAuditLog
B. Test-ClientAccessRule
C. Set-GroupMailbox
D. Get-Mailbox
Correct Answer: C
Section: [none]
Explanation

Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance?
view=o365-worldwide#exchange-admin-audit-log

QUESTION 66
HOTSPOT

Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named
contoso.com. The tenant contains the users shown in the following table.

You create a retention label named Label1 that has the following configurations:

Retains content for five years


Automatically deletes all content that is older than five years

You turn on Auto labeling for Label1 by using a policy named Policy1. Policy1 has the following configurations:

Applies to content that contains the word Merger


Specifies the OneDrive accounts and SharePoint sites locations

You run the following command.

Set-RetentionCompliancePolicy Policy1 –RestrictiveRetention $true


-Force

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:
Section: [none]
Explanation

Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-retention/set-
retentioncompliancepolicy?view=exchange-ps

QUESTION 67
HOTSPOT

You have an Azure Active Directory (Azure AD) tenant that contains two users named User1 and User2.

On September 5, 2019, you create and enforce a terms of use (ToU) in the tenant. The ToU has the following
settings:

Name: Terms1
Display name: Terms1 name
Require users to expand the terms of use: Off
Require users to consent on every device: Off
Expire consents: On
Expire starting on: October 10, 2019
Frequency: Monthly

User1 accepts Terms1 on September 5, 2019. User2 accepts Terms1 on October 5, 2019.

When will Terms1 expire for the first time for each user? To answer, select the appropriate options in the
answer area.

NOTE: Each correct selection is worth one point.

Hot Area:
Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/terms-of-use
Testlet 2

Case Study

Overview

Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and
New York.

The company has the employees and devices shown in the following table.

Contoso recently purchased a Microsoft 365 E5 subscription.

Existing Environment

The network contains an on-premises Active Directory forest named contoso.com. The forest contains the
servers shown in the following table.

All servers run Windows Server 2016. All desktops and laptops run Windows 10 Enterprise and are joined to
the domain.

The mobile devices of the users in the Montreal and Seattle offices run Android. The mobile devices of the
users in the New York office run iOS.

The domain is synced to Azure Active Directory (Azure AD) and includes the users shown in the following table.
The domain also includes a group named Group1.

Requirements

Planned Changes

Contoso plans to implement the following changes:

Implement Microsoft 365.


Manage devices by using Microsoft Intune.
Implement Azure Advanced Threat Protection (ATP).
Every September, apply the latest feature updates to all Windows computers. Every March, apply the latest
feature updates to the computers in the New York office only.

Technical Requirements

Contoso identifies the following technical requirements:

When a Windows 10 device is joined to Azure AD, the device must enroll in Intune automatically.
Dedicated support technicians must enroll all the Montreal office mobile devices in Intune.
User1 must be able to enroll all the New York office mobile devices in Intune.
Azure ATP sensors must be installed and must NOT use port mirroring.
Whenever possible, the principle of least privilege must be used.
A Microsoft Store for Business must be created.

Compliance Requirements

Contoso identifies the following compliance requirements:

Ensure that the users in Group1 can only access Microsoft Exchange Online from devices that are enrolled
in Intune and configured in accordance with the corporate policy.
Configure Windows Information Protection (WIP) for the Windows 10 devices.

QUESTION 1
You need to meet the compliance requirements for the Windows 10 devices.

What should you create from the Device Management admin center?

A. a device compliance policy


B. a device configuration profile
C. an app protection policy
D. an app configuration policy

Correct Answer: C
Section: [none]
Explanation

Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/
create-wip-policy-using-intune-azure
Testlet 3

Case Study

Overview

ADatum Corporation is an international financial services company that has 5,000 employees.

ADatum has six offices: a main office in New York and five branch offices in Germany, the United Kingdom,
France, Spain, and Italy.

All the offices are connected to each other by using a WAN link. Each office connects directly to the Internet.

Existing Environment

Current Infrastructure

ADatum recently purchased a Microsoft 365 subscription.

All user files are migrated to Microsoft 365.

All mailboxes are hosted in Microsoft 365. The users in each office have email suffixes that include the country
of the user, for example, [email protected] or [email protected].

Each office has a security information and event management (SIEM) appliance. The appliance comes from
three different vendors.

ADatum uses and processes Personally Identifiable Information (PII).

Problem Statements

ADatum entered into litigation. The legal department must place a hold on all the documents of a user named
User1 that are in Microsoft 365.

Requirements

Business Goals

ADatum wants to be fully compliant with all the relevant data privacy laws in the regions where is operates.

ADatum wants to minimize the cost of hardware and software whenever possible.

Technical Requirements

ADatum identifies the following technical requirements:

Centrally perform log analysis for all offices.


Aggregate all data from the SIEM appliances to a central cloud repository for later analysis.
Ensure that a SharePoint administrator can identify who accessed a specific file stored in a document
library.
Provide the users in the finance department with access to Service assurance information in Microsoft
Office 365.
Ensure that documents and email messages containing the PII data of European Union (EU) citizens are
preserved for 10 years.
If a user attempts to download 1,000 or more files from Microsoft SharePoint Online within 30 minutes,
notify a security administrator and suspend the user’s user account.
A security administrator requires a report that shown which Microsoft 365 users signed in. Based on the
report, the security administrator will create a policy to require multi-factor authentication when a sign-in is
high risk.
Ensure that the users in the New York office can only send email messages that contain sensitive U.S. PII
data to other New York office uses. Email messages must be monitored to ensure compliance. Auditors in
the New York office must have access to reports that show the sent and received email messages
containing sensitive U.S. PII data.

QUESTION 1
Which report should the New York office auditors view?

A. DLP incidents
B. Top Senders and Recipients
C. DLP false positives and overrides
D. DLP policy matches

Correct Answer: A
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies

QUESTION 2
You need to meet the technical requirement for the EU PII data.

What should you create?

A. a data loss prevention (DLP) policy from the Security & Compliance admin center
B. a data loss prevention (DLP) policy from the Exchange admin center
C. a retention policy from the Exchange admin center
D. a retention policy from the Security & Compliance admin center

Correct Answer: D
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies

QUESTION 3
You need to protect the U.S. PII data to meet the technical requirements.

What should you create?

A. a data loss prevention (DLP) policy that contains a domain exception


B. a Security & Compliance retention policy that detects content containing sensitive data
C. a Security & Compliance alert policy that contains an activity
D. a data loss prevention (DLP) policy that contains a user override

Correct Answer: C
Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/create-activity-alerts

QUESTION 4
DRAG DROP

You need to meet the requirement for the legal department.

Which three actions should you perform in sequence from the Security & Compliance admin center? To
answer, move the appropriate actions from the list of actions to the answer area and arrange them in the
correct order.

Select and Place:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://www.sherweb.com/blog/ediscovery-office-365/

QUESTION 5
HOTSPOT

You need to meet the technical requirement for log analysis.


What is the minimum number of data sources and log collectors you should create from Microsoft Cloud App
Security? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/cloud-app-security/discovery-docker

QUESTION 6
HOTSPOT

You need to meet the technical requirement for the SharePoint administrator.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Hot Area:

Correct Answer:

Section: [none]
Explanation

Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-
compliance#step-3-filter-the-search-results

You might also like