Question #200
DRAG DROP –
A company has Microsoft 365 and uses Microsoft Endpoint Manager.
You need to identify the endpoint management tool associated with each action.
Which tool should you identify for each action? To answer, drag the appropriate tools to the correct actions. Each tool may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
Correct Answer:
Question #201
A company is planning to use Microsoft 365 Defender.
The company needs to protect Windows 10 client computers from malicious viruses. The company also needs to identify unauthorized cloud apps that are used by end users.
You need to identify the Microsoft 365 Defender solutions that meet the requirements.
Which two solutions should you choose? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
- A. Microsoft Defender for Identity
- B. Microsoft Defender for Endpoint
- C. Microsoft Defender for Office 365
- D. Microsoft Cloud App Security
Correct Answer: BD
Community vote distribution
BD (100%)
Question #202
A company has Microsoft 365.
The company needs to secure their environment. They start by identifying the highest risks to security according to Microsoft.
You need to identify the security changes that are recommended by Microsoft 365.
Which tool should you choose?
- A. Microsoft Intune
- B. Microsoft Secure Score
- C. Azure Information Protection scanner
- D. Advanced Threat Analytics
- E. Microsoft 365 compliance center
Correct Answer: B
Question #203
DRAG DROP –
A company plans to deploy a compliance solution in Microsoft 365.
Match each compliance solution to its description. To answer, drag the appropriate compliance solution from the column on the left to its description on the right.
Each compliance solution may be used once, more than once, or not at all.
NOTE: Each correct match is worth one point.
Select and Place:
Correct Answer:
Question #204
DRAG DROP –
A company deploys Microsoft 365.
You need to identify the appropriate cloud service for each requirement.
Which cloud service should you choose for each requirement? To answer, drag the appropriate cloud services to the correct requirements. Each cloud service may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/protect-enterprise-data-using-wip
Question #205
A company uses Microsoft 365.
The company wants users to be prompted for additional verification when they access a federated third-party application. However, users must not be prompted for additional verification when they access Microsoft Outlook.
You need to identify a solution that meets the requirements.
Which solution should you choose?
- A. Conditional Access
- B. Multi-factor authentication (MFA)
- C. Active Directory Federation Services (AD FS)
- D. Self-service password reset (SSPR)
Correct Answer: A
Question #206
A company plans to migrate to Microsoft 365.
You need to advise the company about how Microsoft provides protection in a multitenancy environment.
What are three ways that Microsoft provides protection? Each correct answer presents part of the solution. (Choose three.)
NOTE: Each correct selection is worth one point.
- A. Customer content at rest is encrypted on the server by using BitLocker.
- B. Microsoft Azure AD provides authorization and role-based access control at the tenant layer.
- C. Customer content at rest is encrypted on the server by using transport-layer security (TLS).
- D. Microsoft Azure AD provides authorization and role-based access control at the transport layer.
- E. Mailbox databases in Microsoft Exchange Online contain only mailboxes from a single tenant.
- F. Mailbox databases in Microsoft Exchange Online contain mailboxes from multiple tenants.
Correct Answer: ABF
Reference:
https://docs.microsoft.com/en-us/office365/enterprise/office-365-isolation-in-office-365
Community vote distribution
ABF (100%)
Question #207
You are the Microsoft 365 administrator for a company.
Your company plans to open a new office in the United Kingdom.
You need to provide penetration test and security assessment reports for the new office.
Where can you locate the required reports?
- A. Data Governance page of the Security and Compliance portal
- B. Compliance Manager page of the Services Trust portal
- C. Data Loss Prevention page of the Security and Compliance portal
- D. Regional Compliance page of the Services Trust portal
Correct Answer: D
Question #208
HOTSPOT –
An organization plans to deploy Microsoft Intune.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Question #209
You are the Microsoft Office 365 administrator for a company.
You need to perform security and compliance reviews before new updates are distributed to the entire company.
What should you implement?
- A. standard releases
- B. Microsoft 365 Enterprise Test Lab
- C. targeted releases
- D. FastTrack
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/office365/admin/manage/release-options-in-office-365?view=o365-worldwide
Question #210
DRAG DROP –
A company purchases Microsoft 365 E5.
You need to determine which security features you should implement.
Which features should you implement? To answer, drag the appropriate features to the correct scenarios. Each feature may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
Correct Answer:
Question #211
A company has a Microsoft 365 subscription that includes Office apps.
A user has identified a new issue while working with an app. When the user attempts to create a support request, the following message displays:
You need to determine the cause of the error message.
What is the cause?
- A. The user account is disabled.
- B. The user does not have a license assigned for the app.
- C. The user account is not a member of the global admin role.
- D. The company does not have Premier support.
Correct Answer: C
Question #212
Your company purchases Microsoft 365 E3 and Azure AD P2 licenses.
You need to provide identity protection against login attempts by unauthorized users.
What should you implement?
- A. Azure AD Identity Protection
- B. Azure AD Privileged Identity Management
- C. Azure Information Protection
- D. Azure Identity and Access Management
Correct Answer: A
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview
Community vote distribution
A (100%)
Question #213
HOTSPOT –
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/sensitivity-labels
Question #214
You are a Microsoft 365 administrator for a company. Employees use Microsoft Office 365 ProPlus to create documents.
You need to implement document classification and protection by using Microsoft Azure Information Protection.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
- A. Add an Azure subscription to your Microsoft 365 tenant
- B. Install the Azure Information Protection client
- C. Create a custom Azure Information Protection policy with the Confidential label
- D. Enable the default Azure Information Protection policy
- E. Install the Rights Management Service client
Correct Answer: AD
Reference:
https://docs.microsoft.com/en-us/azure/information-protection/requirements https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-default
Question #215
DRAG DROP –
Your company has a Microsoft 365 subscription.
You need to implement security policies to ensure that sensitive data is protected.
Which tools should you use? To answer, drag the appropriate tools to the correct scenarios. Each tool may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
Correct Answer:
Question #216
HOTSPOT –
You are planning a Microsoft Azure AD solution for a company.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Question #217
HOTSPOT –
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Question #218
HOTSPOT –
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide
Question #219
A company uses Microsoft 365.
The company needs to label emails and documents that contain confidential text.
You need to identify a feature that meets this requirement.
Which feature should you choose?
- A. Customer Key
- B. Sensitivity label
- C. Microsoft Outlook rule
- D. Retention label
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide
Question #220
HOTSPOT –
Instructions: For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Reference:
https://www.microsoft.com/en-ww/security/business/graph-security-api https://docs.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls https://docs.microsoft.com/en-us/power-bi/admin/service-security-using-defender-for-cloud-apps-controls
Question #221
DRAG DROP –
A company uses Microsoft 365.
You need to identify the appropriate report for each definition.
Which report should you choose for each definition? To answer, drag the appropriate reports to the correct definitions. Each report may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/cloud-app-security/tutorial-shadow-it
Question #222
A company deploys Microsoft Azure AD. You run the Identity Secure Score report. The report displays five security items.
Which three security items on the report have the most impact on the score? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
- A. Enable policy to block legacy authentication.
- B. Enable user risk policy.
- C. Require multi-factor authentication for all users.
- D. Delete/block accounts not used in last 30 days.
- E. Do not expire passwords.
Correct Answer: ABC
Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/defender/microsoft-secure-score?view=o365-worldwide
Community vote distribution
ABC (55%)
ACE (45%)
Question #223
A company deploys Microsoft Azure AD. You enable multi-factor authentication.
You need to inform users about the multi-factor authentication methods that they can use.
Which of the following methods is NOT a valid multi-factor authentication method in Microsoft 365?
- A. Receive an automated call on the desk phone that includes a verification code.
- B. Use the Microsoft Authenticator mobile application to receive a notification and authenticate.
- C. Receive a call on a phone.
- D. Enter a Windows 10 PIN code when prompted.
Correct Answer: D
Question #224
You deploy Enterprise Mobility + Security E5 and assign Microsoft 365 licenses to all employees.
Employees must not be able to share documents or forward emails that contain sensitive information outside the company.
You need to enforce the file sharing restrictions.
What should you do?
- A. Use Microsoft Azure Information Protection to define a label. Associate the label with an Azure Rights Management template that prevents the sharing of files or emails that are marked with the label.
- B. Create a Microsoft SharePoint Online content type named Sensitivity. Apply the content type to other content types in Microsoft 365. Create a Microsoft Azure Rights Management template that prevents the sharing of any content where the Sensitivity column value is set to Sensitive.
- C. Use Microsoft Azure Information Rights Protection to define a label. Associate the label with an Active Directory Rights Management template that prevents the sharing of files or emails that are marked with the label.
- D. Create a label named Sensitive. Apply a Data Layer Protection policy that notifies users when their document contains personally identifiable information (PII).
Correct Answer: A
Community vote distribution
A (75%)
D (25%)
Question #225
HOTSPOT –
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth pone point.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/compliance-manager-overview#controls https://docs.microsoft.com/en-us/office365/securitycompliance/meet-data-protection-and-regulatory-reqs-using-microsoft-cloud https://docs.microsoft.com/en-us/office365/securitycompliance/get-started-with-service-trust-portal
Question #226
HOTSPOT –
You are a Microsoft 365 administrator for a company. The company implements federated authentication.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/azure/security/fundamentals/choose-ad-authn
Question #227
DRAG DROP –
A company plans to migrate to a hybrid cloud infrastructure.
You need to determine where to manage the environment after the migration is complete.
Match each item to the location where it will be managed. To answer, drag the appropriate item from the column on the left to its location on the right. Each item may be used once, more than once, or not at all.
NOTE: Each correct selection is worth one point.
Select and Place:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/go-to-the-securitycompliance-center https://docs.microsoft.com/en-us/exchange/security-and-compliance/mail-flow-rules/disclaimers-signatures-footers-or-headers https://www.itprotoday.com/email-and-calendaring/configure-email-disclaimer-exchange-server-2016 https://docs.microsoft.com/en-us/office365/troubleshoot/administration/switch-channel-for-office-365
Question #228
A company deploys Microsoft 365.
The company needs to deploy a solution that meets the following requirements:
✑ allows access to Microsoft 365 only from corporate networks
✑ allows access to Microsoft 365 only from corporate-owned devices
✑ requires additional verification during authentication
You need to identify a solution that meets the requirements.
What should you select?
- A. Multi-factor authentication
- B. Conditional Access
- C. Azure Active Directory hybrid identity
- D. Self-service password reset
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview
Question #229
DRAG DROP –
Match each authentication identity to its scenario. To answer, drag the appropriate authentication identity from the column on the left to its scenario on the right.
Each authentication identity may be used once, more than once, or not at all.
NOTE: Each correct match is worth one point.
Select and Place:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/enterprise/about-microsoft-365-identity https://mikeparker365.co.uk/2018/09/19/how-to-secure-exchange-2016-with-azure-ad-part-2-hybrid-modern-authentication/
Question #230
After experiencing security breaches with on-premises servers, a company is considering migrating to Microsoft 365 for their security solutions.
What are three security-related benefits of moving to Microsoft 365? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
- A. Microsoft employs a full-time team of penetration testers to identify vulnerabilities.
- B. Microsoft 365 prevents all attackers from gaining access to company data.
- C. Microsoft simplifies infrastructure management to help detect and respond to threats.
- D. Microsoft 365 monitors all customers for threats to prevent attacks.
- E. Microsoft 365 can troubleshoot security issues by accessing customer data without explicit permission from the customer.
Correct Answer: ACD
Question #231
A company uses Microsoft 365.
The company wants to improve their compliance score based on Microsoft recommendations.
You need to identify the task that has the largest impact to the compliance score.
Which task should you choose?
- A. Detective discretionary
- B. Preventative mandatory
- C. Corrective discretionary
- D. Corrective mandatory
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/meet-data-protection-and-regulatory-reqs-using-microsoft-cloud
Community vote distribution
B (100%)
Question #232
A company uses Microsoft 365.
The company needs to remotely encrypt devices.
You need to identify which solution meets the requirement.
Which solution should you choose?
- A. Microsoft Intune
- B. Retention labels
- C. Azure Information Protection scanner
- D. Sensitivity labels
Correct Answer: A
Use Intune to configure BitLocker Drive Encryption on devices that run Windows 10.
Reference:
https://docs.microsoft.com/en-us/mem/intune/protect/encrypt-devices
Community vote distribution
A (100%)
Question #233
HOTSPOT –
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Note:
The old (classic) version of Compliance was in the Service Trust portal and still is. The GA release version has moved to the Microsoft 365 Compliance Center.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager
Question #234
HOTSPOT –
Instructions: For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/office-365-atp
Question #235
DRAG DROP –
You are the Microsoft 365 administrator for a company.
You need to identify available cloud security features.
Match each feature to the correct description. To answer, drag the appropriate feature from the column on the left to its description on the right. Each feature may be used once, more than once, or not at all.
NOTE: Each correct selection is worth one point.
Select and Place:
Correct Answer:
Reference:
https://www.microsoft.com/en-us/itshowcase/using-azure-information-protection-to-classify-and-label-corporate-data https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview
Question #236
A company uses Microsoft 365.
The company must identify which cloud apps and services are used in the company.
You need to identify which service can be used to find this information.
Which service should you use?
- A. Microsoft Defender for Office 365
- B. Microsoft Cloud App Security
- C. Azure Security Center
- D. Azure Active Directory
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/cloud-app-security/what-is-cloud-app-security
Question #237
HOTSPOT –
You are a Microsoft 365 administrator.
You need to implement the appropriate features for each scenario.
What should you implement? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/exchange/clients-and-mobile-in-exchange-online/outlook-for-ios-and-android/secure-outlook-for-ios-and-android https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure
Question #238
You manage a local Active Directory Domain Services environment. Your company purchases an Enterprise E1 license for all users.
You need to implement self-service password reset. You want to achieve this goal while minimizing costs.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
- A. Upgrade your subscription to Azure AD Premium P2.
- B. Deploy Azure AD Connect.
- C. Deploy Azure Information Protection.
- D. Upgrade your subscription to Azure AD Premium P1.
Correct Answer: BD
Community vote distribution
B (50%)
BD (40%)
10%
Question #239
You are a Microsoft 365 administrator for a company.
What are two ways that you can ensure data security? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
- A. service-level encryption using customer-provided key
- B. tenant-dedicated Microsoft Azure AD encryption using customer-provided key
- C. single-tenant infrastructure partitions for sensitive data
- D. data transfer using transport-layer security (TLS)
Correct Answer: AD