The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
The actual exam questions based on the excellent "Examtopics" website: https://www. Examtopics. Com/exams/microsoft/ms-101/view/1/
Questions and Answers
1.
Of which groups are Computer1 and Computer2 members? To answer, select the appropriate options in the answer area.
2.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
You have a Microsoft 365 subscription. You discover that some external users accessed content on a Microsoft SharePoint site. You modify the SharePoint sharing policy to prevent sharing outside your organization. You need to be notified if the SharePoint sharing policy is modified in the future.
Solution: From the SharePoint admin center, you modify the sharing settings. Does this meet the goal?
A.
Yes
B.
No
Correct Answer
B. No
Explanation This should be covered with an alert policy from the security & compliance center https://docs.microsoft.com/en-us/microsoft-365/compliance/alert-policies?view=o365-worldwide
Rate this question:
3.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
You have a Microsoft 365 subscription.
You discover that some external users accessed content on a Microsoft SharePoint site. You modify the SharePoint sharing policy to prevent sharing outside your organization. You need to be notified if the SharePoint sharing policy is modified in the future.
Solution: From the Security & Compliance admin center, you create a threat management policy. Does this meet the goal?
A.
Yes
B.
No
Correct Answer
B. No
Explanation This should be covered with an alert policy.
Rate this question:
4.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
You have a Microsoft 365 subscription. You discover that some external users accessed content on a Microsoft SharePoint site. You modify the SharePoint sharing policy to prevent sharing outside your organization. You need to be notified if the SharePoint sharing policy is modified in the future.
Solution: From the SharePoint site, you create an alert. Does this meet the goal?
A.
Yes
B.
No
Correct Answer
B. No
Explanation This should be covered with an alert policy
Rate this question:
5.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
You are deploying Microsoft Intune. You successfully enroll Windows 10 devices in Intune.
When you try to enroll an iOS device in Intune, you get an error. You need to ensure that you can enroll the iOS device in Intune.
Solution: You add your user account as a device enrollment manager. Does this meet the goal?
A.
Yes
B.
No
Correct Answer
B. No
Explanation You need the Apple MDM push certificate.
Rate this question:
6.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
You are deploying Microsoft Intune. You successfully enroll Windows 10 devices in Intune.
When you try to enroll an iOS device in Intune, you get an error. You need to ensure that you can enroll the iOS device in Intune.
Solution: You configure the Apple MDM Push certificate. Does this meet the goal?
A.
Yes
B.
No
Correct Answer
A. Yes
Explanation You need the Apple MDM push certificate.
Rate this question:
7.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
You are deploying Microsoft Intune. You successfully enroll Windows 10 devices in Intune.
When you try to enroll an iOS device in Intune, you get an error. You need to ensure that you can enroll the iOS device in Intune.
Solution: You create an Apple Configurator enrollment profile. Does this meet the goal?
A.
Yes
B.
No
Correct Answer
B. No
Explanation You need the Apple MDM push certificate.
Rate this question:
8.
Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD). You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch). You configure pilot co-management.
You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1. You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.
Solution: You create a device configuration profile from the Intune admin center. Does this meet the goal?
A.
Yes
B.
No
Correct Answer
B. No
Explanation The correct answer should be that the new device needs to be added into a pilot collection in configuration manager, since the question clearly states that this scenario is a pilot co-management scenario. Reference: https://docs.microsoft.com/en-us/configmgr/comanage/tutorial-co-manage-clients
Specifically, please have a look at the section called "enable co-management in configuration manager" in the article above.
Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD). You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch). You configure pilot co-management.
You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1. You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.
Solution: You unjoin Device1 from the Active Directory domain.. Does this meet the goal?
A.
Yes
B.
No
Correct Answer
B. No
Explanation The correct answer should be that the new device needs to be added into a pilot collection in configuration manager, since the question clearly states that this scenario is a pilot co-management scenario. Reference: https://docs.microsoft.com/en-us/configmgr/comanage/tutorial-co-manage-clients
Specifically, please have a look at the section called "enable co-management in configuration manager" in the article above.
Reference: https://docs.microsoft.com/en-us/configmgr/comanage/how-to-enable
Â
Rate this question:
10.
Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD). You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch). You configure pilot co-management.
You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1. You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.
Solution: You add Device1 to an Active Directory group. Does this meet the goal?
A.
Yes
B.
No
Correct Answer
B. No
Explanation The correct answer should be that the new device needs to be added into a pilot collection in configuration manager rather than an AD Security group, since the question clearly states that this scenario is a pilot co-management scenario. Reference: https://docs.microsoft.com/en-us/configmgr/comanage/tutorial-co-manage-clients
Specifically, please have a look at the section called "enable co-management in configuration manager" in the article above.
Reference: https://docs.microsoft.com/en-us/configmgr/comanage/how-to-enable
Â
Rate this question:
11.
You have three devices enrolled in Microsoft Intune as shown in the following table.
The device compliance policies in Intune are configured as shown in the following table.
The device compliance policies have the assignments shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
A.
Policy 1 applies to Device 3.
B.
Policy 2 applies to Device 2
C.
Policy 2 doesn't apply to Device 2.
D.
Policy 1 applies to Device 1
Correct Answer
A. Policy 1 applies to Device 3.
Explanation Policy 2 also doesn't apply to Device 2 because that device is in Group 3, which is excluded from the policy. Exclusion takes precedence over inclusion in the following same group type scenarios:
Including user groups and excluding user groups Including device groups and excluding device group https://docs.microsoft.com/en-us/intune/configuration/device-profile-assign
Rate this question:
12.
You have Windows 10 Pro devices that are joined to an Active Directory domain.You plan to create a Microsoft 365 tenant and to upgrade the devices to Windows 10 Enterprise. You are evaluating whether to deploy Windows Hello for Business for SSO to Microsoft 365 services.
What are two prerequisites of the deployment?
Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A.
A: Computers that have biometric hardware features
B.
B. Microsoft Intune enrollment
C.
C. Microsoft Azure Active Directory (Azure AD)
D.
D. Smartcards
E.
E. TPM-enabled device
Correct Answer(s)
B. B. Microsoft Intune enrollment C. C. Microsoft Azure Active Directory (Azure AD)
You have a Microsoft 365 tenant. All users are assigned the Enterprise Mobility + Security license.
You need to ensure that when users join their device to Microsoft Azure Active Directory (Azure AD), the device is enrolled in Microsoft Intune automatically.
What should you configure?
A.
A. Enrollment restrictions from the Intune admin center
B.
B. Device enrollment managers from the Intune admin center
C.
C. MAM User scope from the Azure Active Directory admin center
D.
D. MDM User scope from the Azure Active Directory admin center
Correct Answer
D. D. MDM User scope from the Azure Active Directory admin center
Your network contains an Active Directory domain named contoso.com. All client devices run Windows 10 and are joined to the domain. You update the Windows 10 devices by using Windows Update for Business.
What is the maximum amount of time you can defer Windows 10 updates? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
A.
Quality Updates: 14 days
B.
Quality Updates: 30 days
C.
Quality Updates: 60 days
D.
Quality Updates: 120 days
E.
Feature Updates: 60 days
F.
Feature Updates: 180 days
G.
Feature Updates: 365 days
H.
Feature Updates: 540 days
Correct Answer(s)
B. Quality Updates: 30 days G. Feature Updates: 365 days
Your company uses Microsoft System Center Configuration Manager (Current Branch) and Microsoft Intune to co-manage devices.
Which two actions can be performed only from Intune? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A.
A. Deploy applications to Windows 10 devices.
B.
B. Deploy VPN profiles to iOS devices.
C.
C. Deploy VPN profiles to Windows 10 devices.
D.
D. Publish applications to Android devices.
Correct Answer(s)
B. B. Deploy VPN profiles to iOS devices. D. D. Publish applications to Android devices.
Your network contains an Active Directory domain named contoso.com that uses Microsoft System Center Configuration Manager (Current Branch). You have Windows 10 and Windows 8.1 devices.
You need to ensure that you can analyze the upgrade readiness of all the Windows 8.1 devices and analyze the update compliance of all the Windows 10 devices.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
A.
Create a Microsoft Azure Log Analytics workspace
B.
Configure all the devices to have a commercial ID
Correct Answer(s)
A. Create a Microsoft Azure Log Analytics workspace B. Configure all the devices to have a commercial ID
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com. You have a Microsoft 365 subscription. You need to ensure that users can manage the configuration settings for all the Windows 10 devices in your organization.
What should you configure?
A.
A. the Enrollment restrictions
B.
B. the mobile device management (MDM) authority
C.
C. the Exchange on-premises access settings
D.
D. the Windows enrollment settings
Correct Answer
B. B. the mobile device management (MDM) authority
Explanation To ensure that users can manage the configuration settings for all the Windows 10 devices in the organization, you need to configure the mobile device management (MDM) authority. This allows users to manage and control the settings of their Windows 10 devices through the MDM solution. By setting the MDM authority to the Microsoft 365 subscription, users will have the necessary permissions and access to manage the configuration settings for all the Windows 10 devices in the organization.
Rate this question:
18.
You configure a conditional access policy. The locations settings are configured as shown in the Locations exhibit. (Click the Locations tab.)
The users and groups settings are configured as shown in the Users and Groups exhibit. (Click Users and Groups tab.)
Members of the Security reader group report that they cannot sign in to Microsoft Active Directory (Azure AD) on their device while they are in the office.
You need to ensure that the members of the Security reader group can sign in in to Azure AD on their device while they are in the office. The solution must use the principle of least privilege.
What should you do?
A.
A. From the conditional access policy, configure the device state.
B.
B. From the Azure Active Directory admin center, create a custom control.
C.
C. From the Intune admin center, create a device compliance policy.
D.
D. From the Azure Active Directory admin center, create a named location.
Correct Answer
D. D. From the Azure Active Directory admin center, create a named location.
You have computers that run Windows 10 Enterprise and are joined to the domain.You plan to delay the installation of new Windows builds so that the IT department can test application compatibility.
You need to prevent Windows from being updated for the next 30 days.
Which two Group Policy settings should you configure? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A.
A. Select when Quality Updates are received
B.
B. Select when Preview Builds and Feature Updates are received
C.
C. Turn off auto-restart for updates during active hours
D.
D. Manage preview builds
E.
E. Automatic updates detection frequency
Correct Answer(s)
B. B. Select when Preview Builds and Feature Updates are received D. D. Manage preview builds
Explanation New build (new feature) come in as a new Preview Build and/or Feature updates. Quality updates are not introducing "new" Windows features but improving existing features (bug fixes / security patches).
You have three devices enrolled in Microsoft Intune as shown in the following table.
The device compliance policies in Intune are configured as shown in the following table.
The device compliance policies have the assignments shown in the following table.
For each of the following statements, check the box if the statement is true. Otherwise, leave deselected.
NOTE: Each correct selection is worth one point.
A.
Device1 is marked as noncompliant after 10 days
B.
Device2 is marked as noncompliant after 10 days
C.
Device3 is marked as noncompliant after 10 days
Correct Answer(s)
A. Device1 is marked as noncompliant after 10 days B. Device2 is marked as noncompliant after 10 days
Explanation Device1 is marked as noncompliant after 10 Days: Yes, because Device 1 is member of group 1 and 2, only group 2 is assigned to a policy (policy 2), policy 2 requires Bitlocker, device does not have it so the device will be marked as non compliant after 10 days.
Device2 is marked as noncompliant after 10 Days: Yes, because Device 2 is member of group 2 and 3, only policy 2 requires Bitlocker, therefore Device is marked as non compliant after 10 days.
Device3 is marked as noncompliant after 10 Days: No, because Device 3 is only a member of group 3, group 3 is assigned to Policy 3, policy 3 does not require Bitlocker, so the device will not be marked as non compliant at all, also if it was required it will be after 15 days, not 10 days.
Rate this question:
21.
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com. You need to provide a user with the ability to sign up for Microsoft Store for Business for contoso.com. The solution must use the principle of least privilege.
Which role should you assign to the user?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are deploying Microsoft Intune. You successfully enroll Windows 10 devices in Intune. When you try to enroll an iOS device in Intune, you get an error. You need to ensure that you can enroll the iOS device in Intune.
Solution: You create the Mobility (MDM and MAM) settings.
Does this meet the goal?
A.
Yes
B.
No
Correct Answer
B. No
Explanation You require an Apple MDM push certificate setup
https://www.inthecloud247.com/how-to-start-with-ios-user-enrollment-using-microsoft-intune/
Rate this question:
23.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD). You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch). You configure pilot co-management.
You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.
You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.
Solution: You add Device1 to a Configuration Manager device collection. Does this meet the goal?
A.
Yes
B.
No
Correct Answer
B. No
Explanation To Pilot Co-Management, you must provide a Pilot Device Collection, so if this connection was clearly named in the question it would have been yes.Â
Rate this question:
24.
From the Microsoft Azure Active Directory (Azure AD) Identity Protection dashboard, you view the risk events shown in the exhibit. (Click the Exhibit tab.)
You need to reduce the likelihood that the sign-ins are identified at risky.
What should you do?
A.
A. From the Security & Compliance admin center, create a classification label.
B.
B. From the Security & Compliance admin center, add the users to the Security Readers role group.
C.
C. From the Azure Active Directory admin center, configure the trusted IPs for multi-factor authentication.
D.
D. From the Conditional access blade in the Azure Active Directory admin center, create named locations.
Correct Answer
D. D. From the Conditional access blade in the Azure Active Directory admin center, create named locations.
Your company has a Microsoft 365 E5 subscription. Users in the research department work with sensitive data.
You need to prevent the research department users from accessing potentially unsafe websites by using hyperlinks embedded in email messages and documents. Users in other departments must not be restricted.
What should you do from the Security & Compliance admin center?
A.
A. Create a data loss prevention (DLP) policy that has a Content is shared condition.
B.
B. Modify the default safe links policy.
C.
C. Create a data loss prevention (DLP) policy that has a Content contains condition.
D.
D. Create a new safe links policy.
Correct Answer
D. D. Create a new safe links policy.
You have a Microsoft 365 tenant. You have a line-of-business application named App1 that users access by using the My Apps portal. After some recent security breaches, you implement a conditional access policy for App1 that uses Conditional Access App Control.
You need to be alerted by email if impossible travel is detected for a user of App1. The solution must ensure that alerts are generated for App1 only. What should you do?
A.
A. From Microsoft Cloud App Security, create a Cloud Discovery anomaly detection policy.
B.
B. From Microsoft Cloud App Security, modify the impossible travel alert policy.
C.
C. From Microsoft Cloud App Security, create an app discovery policy.
D.
D. From the Azure Active Directory admin center, modify the conditional access policy.
Correct Answer
A. A. From Microsoft Cloud App Security, create a Cloud Discovery anomaly detection policy.
A user receives the following message when attempting to sign in to https://myapps.microsoft.com: "Your sign-in was blocked. We've detected something unusual about this sign-in. For example, you might be signing in from a new location, device, or app. Before you can continue, we need to verify your identity. Please contact your admin."
Which configuration prevents the users from signing in?
A.
A. Microsoft Azure Active Directory (Azure AD) Identity Protection policies
B.
B. Microsoft Azure Active Directory (Azure AD) conditional access policies
C.
C. Security & Compliance supervision policies
D.
D. Security & Compliance data loss prevention (DLP) policies
Correct Answer
B. B. Microsoft Azure Active Directory (Azure AD) conditional access policies
You have the Microsoft Azure Active Directory (Azure AD) users shown in the following table.
Your company uses Microsoft Intune. Several devices are enrolled in Intune as shown in the following table.
The device compliance policies in Intune are configured as shown in the following table.
You create a conditional access policy that has the following settings:
✑ The Assignments settings are configured as follows:
1. Users and groups: Group1
2. Cloud apps: Microsoft Office 365 Exchange Online
3. Conditions: Include All device state, exclude Device marked as compliant
✑ Access controls is set to Block access.
For each of the following statements, select if the statement is true. Otherwise leave deselected.
NOTE: Each correct selection is worth one point.
A.
User1 can access Microsoft Exchange Online from Device1
B.
User1 can access Microsoft Exchange Online from Device2
C.
User2 can access Microsoft Exchange Online from Device2.
Correct Answer(s)
A. User1 can access Microsoft Exchange Online from Device1 C. User2 can access Microsoft Exchange Online from Device2.
Explanation User2 is not targeted by conditional access policy.
User1 can access Microsoft Exchange Online from Device1. Yes
User1 can access Microsoft Exchange Online from Device2. No
User2 can access Microsoft Exchange Online from Device2. Yes
Rate this question:
29.
You have several devices enrolled in Microsoft Intune. You have a Microsoft Azure Active Directory (Azure AD) tenant that includes the users shown in the following table.
The device limit restrictions in Intune are configured as shown in the following table.
You add User3 as a device enrollment manager in Intune.
For each of the following statements, select the statement if it's true. Otherwise, leave it deselected.
NOTE: Each correct selection is worth one point.
A.
User1 can enroll a maximum of 10 devices in Intune
B.
User2 can enroll a maximum of 10 devices in Intune
C.
User3 can enroll an unlimited number of devices in Intune
Correct Answer
A. User1 can enroll a maximum of 10 devices in Intune
Explanation User1 can enroll a maximum of 10 devices in Intune - No (User1 is in Group A : Policy1, can enroll 15 devices) User2 can enroll a maximum of 10 devices in Intune - Yes (User2 is in Group B: Policy2, can enroll 10 devices) User3 can enroll an unlimited number of devices in Intune - No (Device Enrolment Managers can enroll 1000 devices)
https://docs.microsoft.com/en-us/sccm/mdm/deploy-use/enroll-devices-with-device-enrollment-manager
https://docs.microsoft.com/en-us/intune/enrollment/device-enrollment-manager-enroll
Rate this question:
30.
You plan to allow users from the engineering department to enroll their mobile device in mobile device management (MDM). The device type restrictions are configured as shown in the following table.
The device limit restrictions are configured as shown in the following table.
What is the effective configuration for the members of the Engineering group? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
A.
Allowed platform:
Android only
B.
Device Limit
5
C.
IOS only
D.
10
E.
All platforms
F.
15
Correct Answer(s)
A. Allowed platform:
Android only F. 15
Your network contains an Active Directory domain named contoso.com. The domain contains 100 Windows 8.1 devices. You plan to deploy a custom Windows 10 Enterprise image to the Windows 8.1 devices. You need to recommend a Windows 10 deployment method.
What should you recommend?
A.
A. A provisioning package
B.
B. An in-place upgrade
C.
C. A Wipe and load refresh
D.
D. Windows Autopilot
Correct Answer
C. C. A Wipe and load refresh
Explanation The question specifies a custom image. In place upgrade cannot do custom images. Also, for provisioning packages Win 10 is a prerequisite. Hence, that cannot be the correct answer.
Rate this question:
32.
You use Microsoft System Center Configuration Manager (Current Branch) to manage devices.
Your company uses the following types of devices:
✑ Windows 10
✑ Windows 8.1
✑ Android
✑ iOS
Which devices can be managed by using co-management?
You have three devices enrolled in Microsoft Intune as shown in the following table.
The device compliance policies in Intune are configured as shown in the following table.
The device compliance policies have the assignments shown in the following table.
For each of the following statements, select the statement if it is true. Otherwise don't select.
NOTE: Each correct selection is worth one point.
A.
Device 1 is compliant
B.
Device 2 is compliant
C.
Device 3 is compliant
Correct Answer(s)
A. Device 1 is compliant B. Device 2 is compliant C. Device 3 is compliant
Explanation Based on the information provided in the tables, all three devices have a "Compliant" status in the device compliance policies. Therefore, the statement "Device 1 is compliant, Device 2 is compliant, Device 3 is compliant" is true.
Rate this question:
34.
Your company has a Microsoft 365 E3 subscription. All devices run Windows 10 Pro and are joined to Microsoft Azure Active Directory (Azure AD). You need to change the edition of Windows 10 to Enterprise the next time users sign in to their computer. The solution must minimize downtime for the users.
What should you use?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD). You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).
You configure pilot co-management.You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1. You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.
Solution: Define a Configuration Manager device collection as the pilot collection. Add Device1 to the collection.
Does this meet the goal?
A.
Yes
B.
No
Correct Answer
B. No
Explanation Pilot - Only the Configuration Manager clients that are members of the Intune Auto Enrollment collection are automatically enrolled to Intune.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are deploying Microsoft Intune. You successfully enroll Windows 10 devices in Intune. When you try to enroll an iOS device in Intune, you get an error. You need to ensure that you can enroll the iOS device in Intune.
Solution: You configure the Mobility (MDM and MAM) settings. Does this meet the goal?
A.
Yes
B.
No
Correct Answer
B. No
Explanation Configuring the Mobility (MDM and MAM) settings alone will not resolve the issue of enrolling an iOS device in Intune. The error could be due to various reasons such as incorrect configuration, incompatible device, or network connectivity issues. Therefore, the given solution does not meet the goal of enrolling the iOS device in Intune.
Rate this question:
37.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 subscription. You discover that some external users accessed content on a Microsoft SharePoint site. You modify the SharePoint sharing policy to prevent sharing outside your organization. You need to be notified if the SharePoint sharing policy is modified in the future.
Solution: From the Security & Compliance admin center, you create a threat management policy.
Does this meet the goal?
A.
Yes
B.
No
Correct Answer
B. No
Explanation From the Security & Compliance admin center, Alerts, you create a new alert policy. https://docs.microsoft.com/en-us/microsoft-365/compliance/alert-policies
Rate this question:
38.
Your company has 5,000 Windows 10 devices. All the devices are protected by using Windows Defender Advanced Threat Protection (ATP). You need to view which Windows Defender ATP alert events have a high severity and occurred during the last seven days.
What should you use in Windows Defender ATP?
Your company uses Windows Defender Advanced Threat Protection (ATP). Windows Defender ATP includes the machine groups shown in the following table.
You onboard a computer named computer1 to Windows Defender ATP as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
A.
A. Computer1 will be a member of Group3 only. If you add the tag demo to Computer1, the computer will be a member of Group1 only.
B.
B. Computer1 will be a member of Group4 only. If you add the tag demo to Computer1, the computer will be a member of Group1 only.
C.
C. Computer1 will be a member of Group3 and Group4 only. If you add the tag demo to Computer1, the computer will be a member of Group1 and Group2 only.
D.
D. Computer1 will be a member of Group3 and Group4 only. If you add the tag demo to Computer1, the computer will be a member of Group1, Group2, Group3, and Group4.
E.
E. Computer1 will be a member of Ungrouped machines. If you add the tag demo to Computer1, the computer will be a member of Group1, Group2, Group3, and Group4.
F.
F. Computer1 will be a member of Ungrouped machines. If you add the tag demo to Computer1, the computer will be a member of Ungrouped machines.
Correct Answer
A. A. Computer1 will be a member of Group3 only. If you add the tag demo to Computer1, the computer will be a member of Group1 only.
You have the Microsoft Azure Advanced Threat Protection (ATP) workspace shown in the Workspace exhibit. (Click the Workspace tab.)
The sensors settings for the workspace are configured as shown in the Sensors exhibit. (Click the Sensors tab.)
You need to ensure that Azure ATP stores data in Asia.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
A.
1. Delete the workspace
B.
2. Create a new workspace
C.
3. Regenerate the acces keys
Correct Answer(s)
A. 1. Delete the workspace B. 2. Create a new workspace C. 3. Regenerate the acces keys
Explanation Your instance is created automatically in the data center that is geographically closest to your Azure Active Directory (Azure AD). Once created, Azure ATP instances aren't movable.
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/install-atp-step1
Rate this question:
41.
Your company has five security information and event management (SIEM) appliances. The traffic logs from each appliance are saved to a file share named Logs. You need to analyze the traffic logs.
What should you do from Microsoft Cloud App Security?
A.
A. Click Investigate, and then click Activity log.
B.
B. Click Control, and then click Policies. Create a file policy.
C.
C. Click Discover, and then click Create snapshot report.
D.
D. Click Investigate, and then click Files.
Correct Answer
C. C. Click Discover, and then click Create snapshot report.
Your network contains an on-premises Active Directory domain named contoso.com. The domain contains 1,000 Windows 10 devices. You perform a proof of concept (PoC) deployment of Windows Defender Advanced Threat Protection (ATP) for 10 test devices. During the onboarding process, you configure Windows Defender ATP-related data to be stored in the United States. You plan to onboard all the devices to Windows Defender ATP. You need to store the Windows Defender ATP data in Europe.
What should you first?
A.
A. Create a workspace.
B.
B. Onboard a new device.
C.
C. Delete the workspace.
D.
D. Offboard the test devices.
Correct Answer
D. D. Offboard the test devices.
43.
You have a Microsoft 365 subscription. You need to be notified if users receive email containing a file that has a virus.
What should you do?
A.
A. From the Exchange admin center, create an in-place eDiscovery & hold.
B.
B. From the Security & Compliance admin center, create a data governance event.
C.
C. From the Exchange admin center, create an anti-malware policy.
D.
D. From the Security & Compliance admin center, create a safe attachments policy.
E.
E. From the Security & Compliance admin center, create a data loss prevention (DLP) policy.
F.
F. From the Exchange admin center, create a mail flow rule.
Correct Answer
C. C. From the Exchange admin center, create an anti-malware policy.
You have a Microsoft Azure Activity Directory (Azure AD) tenant contains the users shown in the following table.
Group3 is a member of Group1. Your company uses Windows Defender Advanced Threat Protection (ATP). Windows Defender ATP contains the roles shown in the following table.
Windows Defender ATP contains the device groups shown in the following table.
For each of the following statements, select the statement if it is true. Otherwise, don't select.
NOTE: Each correct selection is worth one point.
A.
User1 can view Device1 in Windows Defender Security Center.
B.
User2 can sign in to Windows Defender Security Center.
C.
User3 can view Device1 in Windows Defender Security Center.
Correct Answer(s)
A. User1 can view Device1 in Windows Defender Security Center. B. User2 can sign in to Windows Defender Security Center. C. User3 can view Device1 in Windows Defender Security Center.
Your company uses Microsoft Cloud App Security. You plan to integrate Cloud App Security and security information and event management (SIEM).You need to deploy a SIEM agent on a server that runs Windows Server 2016.
What should you do? To answer, select the appropriate settings in the answer area.
NOTE: Each correct selection is worth one point.
A.
First action to perform (select 1 out of 4) " Install Java8 "
B.
Second action to perform (select 1 out of 4 ) " Run the java command and specify the – jar parameter "
Correct Answer(s)
A. First action to perform (select 1 out of 4) " Install Java8 " B. Second action to perform (select 1 out of 4 ) " Run the java command and specify the – jar parameter "
From the Microsoft Azure Active Directory (Azure AD) Identity Protection dashboard, you view the risk events shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
A.
1.To require multi-factor authentication when signing into an unfamiliar location, you must create a (sign-in risky policy)
B.
2.To avoid generating alerts when signing in to the Montreal location, create (a named location in Azure AD)
Correct Answer(s)
A. 1.To require multi-factor authentication when signing into an unfamiliar location, you must create a (sign-in risky policy) B. 2.To avoid generating alerts when signing in to the Montreal location, create (a named location in Azure AD)
Explanation To require multi-factor authentication when signing into an unfamiliar location, you must create a sign-in risky policy. This policy would identify and flag sign-in attempts from unfamiliar locations as risky, triggering the requirement for multi-factor authentication to provide an additional layer of security.
To avoid generating alerts when signing in to the Montreal location, you would create a named location in Azure AD. By defining Montreal as a named location, sign-ins from this location would be recognized as legitimate and not trigger any alerts or risk events.
Rate this question:
47.
Your company uses Microsoft Azure Advanced Threat Protection (ATP) and Windows Defender ATP.
You need to integrate Windows Defender ATP and Azure ATP.
What should you do?
A.
A. From Azure ATP, configure the notifications and reports.
B.
B. From Azure ATP, configure the data sources.
C.
C. From Windows Defender Security Center, configure the Machine management settings.
D.
D. From Windows Defender Security Center, configure the General settings.
Correct Answer
B. B. From Azure ATP, configure the data sources.
You have a Microsoft Azure Activity Directory (Azure AD) tenant contains the users shown in the following table.
Group3 is a member of Group1.
Your company uses Windows Defender Advanced Threat Protection (ATP). Windows Defender ATP contains the roles shown in the following table.
Windows Defender ATP contains the device groups shown in the following table.
For each of the following statements, select the statement if it is true.
NOTE: Each correct selection is worth one point.
A.
User1 can view Device1 in Windows Defender Security Center
B.
User2 can sign in to Windows Defender Security Center
C.
User3 can view Device1 in WIndows Defender Center
D.
User1 can run an antivirus scan on Device2
E.
User2 can collect an investigation package from Device2
F.
User3 can isolate Device1
Correct Answer(s)
A. User1 can view Device1 in Windows Defender Security Center B. User2 can sign in to Windows Defender Security Center C. User3 can view Device1 in WIndows Defender Center
Explanation User1 can view Device1 in Windows Defender Security Center because User1 is a member of Group1, which has access to view Device1 in Windows Defender ATP. User2 can sign in to Windows Defender Security Center because User2 is a member of Group2, which has the necessary role to sign in to Windows Defender ATP. User3 can view Device1 in Windows Defender Security Center because User3 is a member of Group3, which is a member of Group1 and therefore has access to view Device1.
Rate this question:
49.
You have a Microsoft 365 subscription. You need to implement Windows Defender Advanced Threat Protection (ATP) for all the supported devices enrolled in mobile device management (MDM). What should you include in the device configuration profile? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
A.
Create a new profile with type: "Microsoft Defender ATP (Windows 10 Desktop)"
B.
Onboard devices to configure them to communicate with Microsoft Defender ATP
Correct Answer
A. Create a new profile with type: "Microsoft Defender ATP (Windows 10 Desktop)"
You have a Microsoft 365 subscription. Your company purchases a new financial application named App1.
From Cloud Discovery in Microsoft Cloud App Security, you view the Discovered apps page and discover that many applications have a low score because they are missing information about domain registration and consumer popularity. You need to prevent the missing information from affecting the score.
What should you configure from the Cloud Discover settings?