web analytics

You run the Set-AuditConfig -Workload Exchange command. Does that meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

You run the Set-Maibox -Identity “User1” -AuditEnabled $true command. Does that meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

You need to ensure that the labels will be available for manual assignment as soon as possible. What should you do?

You have a Microsoft 365 subscription. Yesterday, you created retention labels and published the labels to Microsoft Exchange Online mailboxes. You need to ensure that the labels will be available

You need to recommend a solution to ensure that you can review any email messages sent by User1 to the competitor, including sent items that were deleted. What should you include in the recommendation?

Your company has a Microsoft 365 subscription that includes a user named User1. You suspect that User1 sent email messages to a competitor detailing company secrets. You need to recommend

You have a server named Server1 that runs Windows Server 2016. Server1 hosts the telemetry database. You need to prevent private details in the telemetry data from being transmitted to Microsoft. What should you do?

You have a hybrid Microsoft 365 environment. All computers run Windows 10 Enterprise and have Microsoft Office 365 ProPlus installed. All the computers are joined to Active Directory. You have

The solution must use the principle of least privilege. What should you do?

You have a Microsoft 365 subscription that includes a user named Admin1. You need to ensure that Admin1 can preserve all the mailbox content of users, including their deleted items.

You need to ensure that the users can use the new label to protect their email. What should you do?

You create a label that encrypts email data. Users report that they cannot use the label in Outlook on the web to protect the email messages they send. You need

You need to ensure that only Windows security data is sent to Microsoft. What should you create from the Intune admin center?

You have a Microsoft 365 subscription. All computers run Windows 10 Enterprise and are managed by using Microsoft Intune. You plan to view only security-related Windows telemetry data. You need

You need to enable auditing for all Microsoft Exchange Online users. What should you do?

You have a Microsoft 365 subscription. You need to enable auditing for all Microsoft Exchange Online users. What should you do? A. From the Exchange admin center, create a journal

You need to ensure that Admin1 can view the results of Case1. What should you do first?

You have a Microsoft 365 subscription. The Global administrator role is assigned to your user account. You have a user named Admin1. You create an eDiscovery case named Case1. You

You need to view which labels were applied by users manually and which labels were applied automatically. What should you do from the Security & Compliance admin center?

You recently created and published several labels policies in a Microsoft 365 subscription. You need to view which labels were applied by users manually and which labels were applied automatically.

Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

You have a Microsoft 365 subscription. You need to ensure that users can apply retention labels to individual documents in their Microsoft SharePoint libraries. Which two actions should you perform?

You need to identify which files were modified by which users in the user’s OneDrive. What should you do?

You have a Microsoft 365 subscription. A user reports that changes were made to several files in Microsoft OneDrive. You need to identify which files were modified by which users

You need to create a Microsoft Cloud App Security policy that blocks User1 from printing from Exchange Online. Which type of Cloud App Security policy should you create?

You have a Microsoft 365 subscription that includes a user named User1. You have a conditional access policy that applies to Microsoft Exchange Online. The conditional access policy is configured

You need to create data loss prevention (DLP) queries in Microsoft SharePoint Online to find sensitive data stored in sites. Which type of site collection should you create first?

You have a Microsoft 365 subscription. You need to create data loss prevention (DLP) queries in Microsoft SharePoint Online to find sensitive data stored in sites. Which type of site

You need to prevent the users from downloading, printing, and synching files. What should you do?

You have a Microsoft 365 subscription. Some users access Microsoft SharePoint Online from unmanaged devices. You need to prevent the users from downloading, printing, and synching files. What should you

Solution: You modify the content expiration settings of the label. Does this meet the goal?

Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some

Solution: You modify the encryption settings of the label. Does this meet the goal?

Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some

Solution: You create a new label in the global policy and instruct the user to resend the email message. Does this meet the goal?

Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some

You need to ensure that you can detect when sensitive groups are modified and when malicious services are created. What should you do?

Your network contains an on-premises Active Directory domain. The domain contains servers that run Windows Server and have advanced auditing enabled. The security logs of the servers are collected by

You need to integrate Microsoft Office 365 Threat Intelligence and Windows Defender ATP. Where should you configure the integration?

You have a Microsoft 365 Enterprise E5 subscription. You use Windows Defender Advanced Threat Protection (Windows Defender ATP). You need to integrate Microsoft Office 365 Threat Intelligence and Windows Defender

What should you recommend doing from Windows Defender Security Center?

Your company has 500 computers. You plan to protect the computers by using Windows Defender Advanced Threat Protection (Windows Defender ATP). Twenty of the computers belong to company executives. You

You need to configure the retention duration for the attachments in quarantine. Which type of threat management policy should you create from the Security&Compliance admin center?

You have a Microsoft 365 subscription. You create an Advanced Threat Protection (ATP) safe attachments policy to quarantine malware. You need to configure the retention duration for the attachments in

You enable the delayed deployment of updates for an Azure ATP sensor named Sensor1. How long after the Azure ATP cloud service is updated will Sensor1 be updated?

Your company uses Microsoft Azure Advanced Threat Protection (ATP). You enable the delayed deployment of updates for an Azure ATP sensor named Sensor1. How long after the Azure ATP cloud

You plan to monitor the computers by using Windows Defender Advanced Threat Protection (Windows Defender ATP) after the computers are enrolled in Microsoft Intune. You need to ensure that the computers connect to Windows Defender ATP. How should you prepare Intune for Windows Defender ATP?

You have a Microsoft 365 tenant. You have 500 computers that run Windows 10. You plan to monitor the computers by using Windows Defender Advanced Threat Protection (Windows Defender ATP)

You need to reduce the amount of time it takes to receive email messages that contain attachments. The solution must ensure that all attachments are scanned for malware. Attachments that have malware must be blocked. What should you do from ATP?

You have a Microsoft 365 E5 subscription. You implement Advanced Threat Protection (ATP) safe attachments policies for all users. User reports that email messages containing attachments take longer than expected

The email address that you intend to spoof belongs to the Executive group members. What should you do first?

You have a Microsoft 365 E5 subscription and a hybrid Microsoft Exchange Server organization. Each member of a group named Executive has an on-premises mailbox. Only the Executive group members

You use Windows Defender Advanced Threat Protection (Windows Defender ATP). You plan to use Microsoft Office 365 Attack simulator. What is a prerequisite for running Attack simulator?

You have a Microsoft 365 Enterprise E5 subscription. You use Windows Defender Advanced Threat Protection (Windows Defender ATP). You plan to use Microsoft Office 365 Attack simulator. What is a

You need to allow a user named User1 to view ATP reports in the Threat management dashboard. Which role provides User1with the required role permissions?

You configure several Advanced Threat Protection (ATP) policies in a Microsoft 365 subscription. You need to allow a user named User1 to view ATP reports in the Threat management dashboard.

You need to implement Windows Defender ATP to meet the security requirements. What should you do?

You need to implement Windows Defender ATP to meet the security requirements. What should you do? A. Configure port mirroring B. Create the ForceDefenderPassiveMode registry setting C. Download and install

You need to enforce Microsoft Azure Multi-Factor Authentication (MFA) by using conditional access for all users who are NOT physically present in the office. What should you include in the configuration?

Your company has a main office and a Microsoft 365 subscription. You need to enforce Microsoft Azure Multi-Factor Authentication (MFA) by using conditional access for all users who are NOT

The users must be prevented from backing up the app’s data to iCloud. What should you create?

Your company has a Microsoft 365 subscription. The company forbids users to enroll personal devices in mobile device management (MDM). Users in the sales department have personal iOS devices. You

What should you use to achieve the goal?

You have a Microsoft 365 subscription. You need to ensure that all users who are assigned the Exchange administrator role have multi-factor authentication (MFA) enabled by default. What should you

You need to see the permissions of the Reports reader role. Which admin center should you use?

You have a Microsoft 365 subscription. From the Microsoft 365 admin center, you create a new user. You plan to assign the Reports reader role to the user. You need

You need to create a Microsoft Azure Active Directory (Azure AD) conditional access policy that will allow only Windows 10 computers marked as compliant to establish a VPN connection to the on-premises network. What should you do first?

You have a hybrid Microsoft 365 environment. All computers run Windows 10 and are managed by using Microsoft Intune. You need to create a Microsoft Azure Active Directory (Azure AD)

Solution: You modify the Source Anchor settings. Does that meet the goal?

Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some

You need to ensure that you can use leaked credentials detection in Azure AD Identity Protection. Solution: You modify the Password Hash Synchronization settings. Does that meet the goal?

Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some

Solution: You modify the Azure AD app and attribute filtering settings. Does that meet the goal?

Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some

Which role should you assign to User1?

Which role should you assign to User1? A. Global administrator B. User administrator C. Privileged role administrator D. Security administrator Answer: C

You need to meet the technical requirements for User9. What should you do?

You need to meet the technical requirements for User9. What should you do? A. Assign the Privileged administrator role to User9 and configure a mobile phone number for User9 B.

Which user passwords will User2 be prevented from resetting?

Which user passwords will User2 be prevented from resetting? A. User6 and User7 B. User4 and User6 C. User4 only D. User7 and User8 E. User8 only Answer: C

Which IP address space should you include in the MFA configuration?

Which IP address space should you include in the MFA configuration? A. 131.107.83.0/28 B. 192.168.16.0/20 C. 172.16.0.0/24 D. 192.168.0.0/20 Answer: B

You need to create Group2. What are two possible ways to create the group?

You need to create Group2. What are two possible ways to create the group? A. an Office 365 group in the Microsoft 365 admin center B. a mail-enabled security group

You need to recommend a solution to protect the sign-ins of Admin1 and Admin2. What should you include in the recommendation?

You need to recommend a solution to protect the sign-ins of Admin1 and Admin2. What should you include in the recommendation? A. a device compliance policy B. an access review

You need to recommend a solution for the user administrators that meets the security requirements for auditing. Which blade should you recommend using from the Azure Active Directory admin center?

You need to recommend a solution for the user administrators that meets the security requirements for auditing. Which blade should you recommend using from the Azure Active Directory admin center?