Spring Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

MS-102 Sample Questions Answers

Questions 4

You have a Microsoft 365 tenant that is signed up for Microsoft Store for Business and contains the users shown in the following table.

All users have Windows 10 Enterprise devices.

The Products & services settings in Microsoft Store for Business are shown in the following exhibit.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 5

You need to ensure that the support technicians can meet the technical requirement for the Montreal office mobile devices.

What is the minimum of dedicated support technicians required?

Options:

A.

1

B.

4

C.

7

D.

31

Buy Now
Questions 6

You need to create the Microsoft Store for Business. Which user can create the store?

Options:

A.

User2

B.

User3

C.

User4

D.

User5

Buy Now
Questions 7

You need to meet the compliance requirements for the Windows 10 devices.

What should you create from the Intune admin center?

Options:

A.

a device compliance policy

B.

a device configuration profile

C.

an application policy

D.

an app configuration policy

Buy Now
Questions 8

On which server should you install the Azure ATP sensor?

Options:

A.

Server 1

B.

Server 2

C.

Server 3

D.

Server 4

E.

Server 5

Buy Now
Questions 9

You need to ensure that User1 can enroll the devices to meet the technical requirements. What should you do?

Options:

A.

From the Azure Active Directory admin center, assign User1 the Cloud device administrator rote.

B.

From the Azure Active Directory admin center, configure the Maximum number of devices per user setting.

C.

From the Intune admin center, add User1 as a device enrollment manager.

D.

From the Intune admin center, configure the Enrollment restrictions.

Buy Now
Questions 10

You need to configure a conditional access policy to meet the compliance requirements.

You add Exchange Online as a cloud app.

Which two additional settings should you configure in Policy1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 11

You need to meet the Intune requirements for the Windows 10 devices.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 12

You create the planned DLP policies.

You need to configure notifications to meet the technical requirements.

What should you do?

Options:

A.

From the Microsoft 365 security center, configure an alert policy.

B.

From the Microsoft Endpoint Manager admin center, configure a custom notification.

C.

From the Microsoft 365 admin center, configure a Briefing email.

D.

From the Microsoft 365 compliance center, configure the Endpoint DLP settings.

Buy Now
Questions 13

You need to configure the information governance settings to meet the technical requirements.

Which type of policy should you configure, and how many policies should you configure? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 14

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure a pilot for co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: Define a Configuration Manager device collection as the pilot collection. Add Device1 to the collection.

Does this meet the goal?

Options:

A.

Yes

B.

NO

Buy Now
Questions 15

As of March, how long will the computers in each office remain supported by Microsoft? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 16

You need to ensure that User2 can review the audit logs. The solutions must meet the technical requirements.

To which role group should you add User2, and what should you use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 17

You need to create the DLP policy to meet the technical requirements.

What should you configure first?

Options:

A.

sensitive info types

B.

the Insider risk management settings

C.

the event types

D.

the sensitivity labels

Buy Now
Questions 18

Which report should the New York office auditors view?

Options:

A.

DLP policy matches

B.

DLP false positives and overrides

C.

DLP incidents

D.

Top Senders and Recipients

Buy Now
Questions 19

You need to configure automatic enrollment in Intune. The solution must meet the technical requirements.

What should you configure, and to which group should you assign the configurations? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 20

You need to meet the technical requirement for large-volume document retrieval. What should you create?

Options:

A.

a data loss prevention (DLP) policy from the Security & Compliance admin center

B.

an alert policy from the Security & Compliance admin center

C.

a file policy from Microsoft Cloud App Security

D.

an activity policy from Microsoft Cloud App Security

Buy Now
Questions 21

You need to meet the requirement for the legal department.

Which three actions should you perform in sequence from the Security & Compliance admin center? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Options:

Buy Now
Questions 22

You need to meet the technical requirement for the EU PII data.

What should you create?

Options:

A.

a retention policy from the Security & Compliance admin center.

B.

a retention policy from the Exchange admin center

C.

a data loss prevention (DLP) policy from the Exchange admin center

D.

a data loss prevention (DLP) policy from the Security & Compliance admin center

Buy Now
Questions 23

You have a Microsoft 365 E5 subscription that contains a SharePoint site named Site1. Site1 contains the files shown in the following table.

You have the users shown in the following table.

You create a data loss prevention (DLP) policy with an advanced DLP rule and apply the policy to Site1. The DLP rule is configured as shown in the following exhibit.

For each of the following statements, select Yes if the statement is true Otherwise, select No

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 24

You need to create the Safe Attachments policy to meet the technical requirements.

Which option should you select?

Options:

A.

Replace

B.

Enable redirect

C.

Block

D.

Dynamic Delivery

Buy Now
Questions 25

You have a Microsoft 365 subscription that uses Microsoft Defender XDR

From Automatic remediation in the Microsoft Defender portal, you set Automation level to Semi - require approval for non-temp folders for the endpoints.

You need to identify the impact of the Automation level setting on the endpoints.

Which two actions will occur based on the remediation settings? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Devices will be remediated automatically if a threat is detected in the \windows\ folder.

B.

Devices will be remediated automatically if a threat is detected in the \program files (X86) \ " folder.

C.

Devices will be remediated automatically if a threat is detected in the \users\ " \downloads\ " folder.

D.

Devices will be remediated only after end-user approval.

Buy Now
Questions 26

You have a Microsoft 365 E5 subscription that has auditing turned on. The subscription contains the users shown in the following table.

You plan to create a new user named User1.

How long will the user creation audit event be available if Admin1 or Admin2 creates User1? To answer, select the appropriate options in the answer area.

Each correct selection is worth one point.

Options:

Buy Now
Questions 27

You need to configure the compliance settings to meet the technical requirements.

What should you do in the Microsoft Endpoint Manager admin center?

Options:

A.

From Compliance policies, modify the Notifications settings.

B.

From Locations, create a new location for noncompliant devices.

C.

From Retire Noncompliant Devices, select Clear All Devices Retire State.

D.

Modify the Compliance policy settings.

Buy Now
Questions 28

You need to meet the technical requirement for the SharePoint administrator. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 29

You need to ensure that Admin4 can use SSPR.

Which tool should you use. and which action should you perform? To answer, select the appropriate options m the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 30

You need to configure Office on the web to meet the technical requirements.

What should you do?

Options:

A.

Assign the Global reader role to User1.

B.

Enable sensitivity labels for Office files in SharePoint Online and OneDrive.

C.

Configure an auto-labeling policy to apply the sensitivity labels.

D.

Assign the Office apps admin role to User1.

Buy Now
Questions 31

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).

You configure a pilot for co-management.

You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.

Solution: You create a device configuration profile from the Device Management admin center.

Does this meet the goal?

Options:

A.

Yes

B.

No

Buy Now
Questions 32

: 251 HOTSPOT

You have a Microsoft 365 E5 tenant that contains the users shown in the following table.

You provision the private store in Microsoft Store for Business.

You assign Microsoft Store for Business roles to the users as shown in the following table.

You need to identify which users can add apps to the private store, and which users can assign apps from Microsoft Store for Business.

Which users should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 33

You plan to implement the endpoint protection device configuration profiles to support the planned changes.

You need to identify which devices will be supported, and how many profiles you should implement.

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 34

You need to recommend a solution for the security administrator. The solution must meet the technical requirements.

What should you include in the recommendation?

Options:

A.

Microsoft Azure Active Directory (Azure AD) Privileged Identity Management

B.

Microsoft Azure Active Directory (Azure AD) Identity Protection

C.

Microsoft Azure Active Directory (Azure AD) conditional access policies

D.

Microsoft Azure Active Directory (Azure AD) authentication methods

Buy Now
Questions 35

You have a Microsoft 365 E5 subscription that uses Microsoft Intune.

You have devices enrolled in Intune as shown in the following table.

You create the device configuration profiles shown in the following table.

Which profiles will be applied to each device? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 36

You have a Microsoft 365 E5 tenant that contains 100 Windows 10 devices.

You plan to deploy a Windows 10 Security Baseline profile that will protect secrets stored in memory.

What should you configure in the profile?

Options:

A.

Microsoft Defender Credential Guard

B.

BitLocker Drive Encryption (BitLocker)

C.

Microsoft Defender

D.

Microsoft Defender Exploit Guard

Buy Now
Questions 37

You have a Microsoft 365 subscription.

You configure a new Azure AD enterprise application named App1. App1 requires that a user be assigned the Reports Reader role.

Which type of group should you use to assign the Reports Reader role and to access App1?

Options:

A.

a Microsoft 365 group that has assigned membership

B.

a Microsoft 365 group that has dynamic user membership

C.

a security group that has assigned membership

D.

a security group that has dynamic user membership

Buy Now
Questions 38

You work at a company named Contoso, Ltd.

Contoso has a Microsoft 365 subscription that is configured to use the DNS domains shown in the following table.

Contoso purchases a company named Fabrikam, Inc.

Contoso plans to add the following domains to the Microsoft 365 subscription:

• fabrikam.com

• east.fabrikam.com

• west.contoso.com

You need to ensure that the devices in the new domains can register by using Autodiscover.

How many domains should you verify, and what is the minimum number of enterprise registration DNS records you should add? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 39

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

You plan to create a Conditional Access policy that will use GPS-based named locations.

Which users can the policy protect?

Options:

A.

User2 and User4 only

B.

User1 and User3 only

C.

Userl1 only

D.

User1, User2, User3, and User4

Buy Now
Questions 40

From the Microsoft 365 compliance center, you configure a data loss prevention (DLP) policy for a Microsoft SharePoint Online site named Site1. Site1 contains the roles shown in the following table.

Prvi creates the files shown in the exhibit. (Click the Exhibit tab.)

Which files can User1 and User2 open? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 41

: 225

You implement Microsoft Azure Advanced Threat Protection (Azure ATP).

You have an Azure ATP sensor configured as shown in the following exhibit.

How long after the Azure ATP cloud service is updated will the sensor update?

Options:

A.

20 hours

B.

12 hours

C.

7 hours

D.

48 hours

Buy Now
Questions 42

You have a Microsoft 365 E5 subscription. You are implementing Microsoft Defender for Cloud Apps. You need to ensure that you can create OAuth app policies.

Solution: You add an API token to Defender for Cloud Apps.

Does this meet the goal?

Options:

A.

Yes

B.

No

Buy Now
Questions 43

Your network contains an Active Directory Domain Services (AD DS) domain. The domain contains a server named Server1 that runs Windows Server. The domain contains the users shown in the following table.

You have a Microsoft 365 subscription that contains the following user accounts:

Options:

Buy Now
Questions 44

You have a Microsoft 365 E5 tenant.

You plan to deploy a monitoring solution that meets the following requirements:

Captures Microsoft Teams channel messages that contain threatening or violent language.

Alerts a reviewer when a threatening or violent message is identified.

What should you include in the solution?

Options:

A.

Data Subject Requests (DSRs)

B.

Insider risk management policies

C.

Communication compliance policies

D.

Audit log retention policies

Buy Now
Questions 45

You are reviewing alerts in the Microsoft 365 Defender portal.

How long are the alerts retained in the portal?

Options:

A.

30 days

B.

60 days

C.

3 months

D.

6 months

E.

12 months

Buy Now
Questions 46

You have a Microsoft E5 subscription.

You need to ensure that administrators who need to manage Microsoft Exchange Online are assigned the Exchange Administrator role for five hours at a time.

What should you implement?

Options:

A.

Azure AD Privileged Identity Management (PIM)

B.

a conditional access policy

C.

a communication compliance policy)

D.

Azure AD Identity Protection

E.

groups that have dynamic membership

Buy Now
Questions 47

You have a Microsoft 365 subscription. You have a user named User1.

You need to ensure that Used can place a hold on all mailbox content.

What permission should you assign to User1?

Options:

A.

the Information Protection administrator ide from the Azure Active Directory admin center.

B.

the eDiscovery Manager tote from the Microsoft 365 compliance center.

C.

the Compliance Management role from the Exchange admin center.

D.

the User management administrator role from the Microsoft 365 admin center.

Buy Now
Questions 48

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

You configure a Multifactor authentication registration policy that has the following settings:

• Assignments:

* Include: Group1

* Exclude: Group2

• Controls: Requite Microsoft Entra ID multifactor authentication registration

• Policy enforcement: Enabled

You create a conditional access policy that has the following settings:

• Name: Policy1

• Assignments:

* Include: Group1

* Exclude; Group1

• Grant: Require multifactor authentication

• Enable policy. On

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each coned selection is one point.

Options:

Buy Now
Questions 49

You need to configure Azure AD Connect to support the planned changes for the Montreal Users and Seattle Users OUs.

What should you do?

Options:

A.

From the Microsoft Azure AD Connect wizard, select Customize synchronization options.

B.

From PowerShell, run the Add-ADSyncConnectorAttnbuteinclusion cmdlet.

C.

From PowerShell, run the start-ADSyncSyncCycle cmdlet.

D.

From the Microsoft Azure AD Connect wizard, select Manage federation.

Buy Now
Questions 50

You need to configure just in time access to meet the technical requirements.

What should you use?

Options:

A.

entitlement management

B.

Azure AD Privileged Identity Management (PIM)

C.

access reviews

D.

Azure AD Identity Protection

Buy Now
Questions 51

HOTSPOT

Your network contains an Active Directory domain named fabrikam.com. The domain contains the objects shown in the following table.

The groups have the members shown in the following table.

You are configuring synchronization between fabrikam.com and an Azure AD tenant.

You configure the Domain/OU Filtering settings in Azure AD Connect as shown in the Domain/OU Filtering exhibit (Click the Domain/OU Filtering tab.)

You configure the Filtering settings in Azure AD Connect as shown in the Filtering exhibit. (Click the Filtering tab.)

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 52

You are evaluating the use of multi-factor authentication (MFA).

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 53

Your on-premises network contains an Active Directory domain.

You have a Microsoft 365 subscription.

You need to sync the domain with the subscription. The solution must meet the following requirements:

• On-premises Active Directory password complexity policies must be enforced.

• Users must be able to use Microsoft Entra Self-Service Password Reset (SSPR).

What should you use?

Options:

A.

Microsoft Entra ID Protection

B.

Microsoft Entra Seamless Single Sign-On (Microsoft Entra Seamless SSO)

C.

pass-through authentication

D.

password hash synchronization

Buy Now
Questions 54

You have a Microsoft 365 ES subscription that contains a domain named contoso.com

You deploy a new Microsoft Defender (or Office 365 anti-phishing policy named Policy1 that has user impersonation protection enabled for a user named user1@contoso.com.

You discover that Policy1 blocks email messages from a regular contact named usei1@fabnkam.com.

You need to ensure that the messages are delivered successfully

What should you do for Policy1?

Options:

A.

Select Enable mailbox intelligence

B.

Select Enable domains to protect.

C.

Configure the Phishing email threshold setting.

D.

Configure which users to protect.

Buy Now
Questions 55

HOTSPOT

Your network contains an on-premises Active Directory forest named contoso.com. The forest contains the following domains:

Contoso.com

East.contoso.com

The forest contains the users shown in the following table.

The forest syncs to an Azure AD tenant named contoso.com as shown in the exhibit. (Click the Exhibit tab.)

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 56

You have a Microsoft 365 E5 subscription.

Al users have Mac computers. ATI the computers are enrolled in Microsoft Endpoint Manager and onboarded to Microsoft Defender for Endpoint.

You need to configure Microsoft Defender for Endpoint on the computers.

What should you create from the Endpoint Management admin center?

Options:

A.

a Microsoft Defender for Endpoint baseline profile

B.

an update policy for iOS

C.

a device configuration profile

D.

a mobile device management (MDM) security baseline profile

Buy Now
Questions 57

Your network contains an Active Directory forest named Contoso. Local.

You have a Microsoft 365 subscription.

You plan to implement a directory synchronization solution that will use password hash synchronization.

From the Microsoft 365 admin center, you successfully verify the contoso.com domain name.

You need to prepare the environment for the planned directory synchronization solution.

What should you do first?

Options:

A.

From Active Directory Domains and Trusts, add contoso.com as a UPN suffix.

B.

From the Microsoft 365 admin center verify the Contoso. Local domain name.

C.

From the public DNS zone of contoso.com, add a new mail exchanger (MX) record.

D.

From Active Directory Users and Computers, modify the UPN suffix for all users.

Buy Now
Questions 58

You need to ensure that the Microsoft 365 incidents and advisories are reviewed monthly.

Which users can review the incidents and advisories, and which blade should the users use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 59

You have a Microsoft 365 E5 subscription that contains the resources shown in the following table.

You create a sensitivity label named Label1.

To which resource can you apply Label1?

Options:

A.

Group1 only

B.

Group2 only

C.

Sitel only

D.

Groupl and Group2 only

E.

Group1, Group2, and Sitel

Buy Now
Questions 60

Your company has a Microsoft 365 E5 subscription.

Users in the research department work with sensitive data.

You need to prevent the research department users from accessing potentially unsafe websites by using hyperlinks embedded in email messages and documents. Users in other departments must not be restricted.

What should you do?

Options:

A.

Create a data loss prevention (DLP) policy that has a Content is shared condition.

B.

Modify the safe links policy Global settings.

C.

Create a data loss prevention (DLP) policy that has a Content contains condition.

D.

Create a new safe links policy.

Buy Now
Questions 61

You need to configure the Office 365 service status notifications and limit access to the service and feature updates. The solution must meet the technical requirements.

What should you configure in the Microsoft 365 admin center? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 62

You have a Microsoft 365 subscription.

You have the devices shown in the following table.

You plan to join the devices to Azure Active Directory (Azure AD)

What should you do on each device to support Azure AU join? To answer, drag the appropriate actions to the collect devices, Each action may be used once, more than once, of not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 63

HOTSPOT

You create the Microsoft 365 tenant.

You implement Azure AD Connect as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 64

Which role should you assign to User1?

Available Choices (select all choices that are correct)

Options:

A.

Hygiene Management

B.

Security Reader

C.

Security Administrator

D.

Records Management

Buy Now
Questions 65

You need to ensure that all the sales department users can authenticate successfully during Project1 and Project2.

Which authentication strategy should you implement for the pilot projects?

Options:

A.

pass-through authentication

B.

pass-through authentication and seamless SSO

C.

password hash synchronization and seamless SSO

D.

password hash synchronization

Buy Now
Questions 66

You are evaluating the required processes for Project1.

You need to recommend which DNS record must be created while adding a domain name for the project.

Which DNS record should you recommend?

Options:

A.

host (A)

B.

host information

C.

text (TXT)

D.

alias (CNAME)

Buy Now
Exam Code: MS-102
Exam Name: Microsoft 365 Administrator Exam
Last Update: Mar 21, 2026
Questions: 546
$61.25  $174.99
$47.25  $134.99
$40.25  $114.99
buy now MS-102