Microsoft 365 Mobility And Security (beta) MS-101 Courses

Your success in Microsoft MS-101 is our sole target and we develop all our MS-101 braindumps in a way that facilitates the attainment of this target. Not only is our MS-101 study material the best you can find, it is also the most detailed and the most updated. MS-101 Practice Exams for Microsoft {category} MS-101 are written to the highest standards of technical accuracy.

Page: 1 / 12
Total 146 questions Full Exam Access
Question 1
You have a Microsoft 365 subscription.
All users have their email stored in Microsoft Exchange Online.
In the mailbox of a user named User 1. You need to preserve a copy of all the email messages that contain the word Project X.
WDM should you do?
My answer: -
Reference answer: A
Reference analysis:

References:
https://docs.microsoft.com/en-us/office365/securitycompliance/ediscovery-cases#step-2-create-a-new-case

Question 2
HOTSPOT
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You have three applications named App1, App2, and App3 that have the same file format.
Your company uses Windows Information Protection (WIP). WIP has the following configurations: Windows Information Protection mode: Silent
Protected apps: App1 Exempt apps: App2
From App1, you create a file named File1.
What is the effect of the configurations? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
MS-101 dumps exhibit
Solution:
MS-101 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 3
You have a Microsoft 365 subscription. You have a user named User1. You need to ensure that User1 can place a hold on all mailbox content. Which rote should you assign to User1?
My answer: -
Reference answer: A
Reference analysis:

References:
https://docs.microsoft.com/en-us/Exchange/permissiHYPERLINK "https://docs.microsoft.com/en-us/Exchange/permissions/feature-permissions/policy-and-compliance-
permissions?view=exchserver-2019"ons/feature-permissions/policy-and-compliance-permissions?view=exchserver-2019

Question 4
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals- Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 subscription.
You discover that some external users accessed content on a Microsoft SharePoint site. You modify the SharePoint shoring policy to prevent sharing outside your organization.
You need to be notified if the SharePoint sharing policy is modified m the future. Solution: From the SharePoint admin center, you modify the sharing settings. Does this meet the goal?
My answer: -
Reference answer: B
Reference analysis:

None

Question 5
Your network contains an on premises Active Directory domain.
Your company has a security policy that prevents additional software from txnrwj installed on domain controllers.
You need to monitor a domain controller by using Microsoft Azure Advanced Threat Protection (ATP). What should you do? More than one answer choice may achieve the goal. Select the BEST answer.
My answer: -
Reference answer: D
Reference analysis:

References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/instHYPERLINK "https://docs.microsoft.com/en-us/azure-advanced-threat-protection/install-atp-step5"all-atp-step5

Question 6
DRAG DROP
You have the Microsoft Azure Advanced Threat Protection (ATP) workspace shown in the Workspace exhibit. (Click the Workspace tab.)
MS-101 dumps exhibit
The sensors settings for the workspace are configured as shown in the Sensors exhibit. (Click the Sensors tab.)
MS-101 dumps exhibit
You need to ensure that Azure ATP stores data in Asia.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
MS-101 dumps exhibit
Solution:
MS-101 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 7
HOTSPOT
You have three devices enrolled in Microsoft Intune as shown in the following table.
MS-101 dumps exhibit
The device compliance policies in Intune are configured as shown in the following table.
MS-101 dumps exhibit
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
MS-101 dumps exhibit
Solution:
MS-101 dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 8
DRAG DROP
You have a Microsoft 365 subscription.
You have the devices shown in the following table.
MS-101 dumps exhibit
You need to onboard the devices to Windows Defender Advanced Threat Protection (ATP). The solution must avoid installing software on the devices whenever possible.
Which onboarding method should you use for each operating system? To answer, drag the appropriate methods to the correct operating systems. Each method may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
MS-101 dumps exhibit
Solution:
References:
hHYPERLINK "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection"ttps://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-HYPERLINK "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection"windows-defender-advanced-threat-protection

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 9
You need to meet the technical requirement for the EU PII data. What should you create?
My answer: -
Reference answer: A
Reference analysis:

References:
https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies

Question 10
The users at your company use Dropbox to store documents. The users access Dropbox by using the MyApps portal.
You need to ensure that user access to Dropbox is authenticated by using a Microsoft 365 identify. The documents must be protected if the data is downloaded to an untrusted device.
What should you do?
My answer: -
Reference answer: B
Reference analysis:

None

Question 11
You have computers that run Windows 10 Enterprise and are joined to the domain.
You plan to delay the installation of new Windows builds so that the IT department can test application
compatibility.
You need to prevent Windows from being updated for the next 30 days.
Which two Group Policy settings should you configure? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
My answer: -
Reference answer: BD
Reference analysis:

None

Question 12
Your company has 5,000 Windows 10 devices. All the devices are protected by using Windows Defender
Advanced Threat Protection (ATP).
You need to view which Windows Defender ATP alert events have a high severity and occurred during the last seven days.
What should you use in Windows Defender ATP?
My answer: -
Reference answer: B
Reference analysis:

References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/investigate-alertswindows-defender-advanced-threat-protection
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/automatedinvestigations-windows-defender-advanced-threat-protection

Question 13
Your company has five security information and event management (SIEM) appliances. The traffic logs from each appliance are saved to a file share named Logs.
You need to analyze the traffic logs.
What should you do from Microsoft Cloud App Security?
My answer: -
Reference answer: A
Reference analysis:

References:
https://docs.microsoft.com/en-us/office365/securitycompliance/investigate-an-activity-in-office- 365-cas

Question 14
HOTSPOT
From the Security & Compliance admin center, you create a retention policy named Policy1. You need to prevent all users from disabling the policy or reducing the retention period.
Which command should you run? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
MS-101 dumps exhibit
Solution:
References:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-retention/set-retentioncompliancepolicy?view=exchange-pHYPERLINK "https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-retention/set-retentioncompliancepolicy?view=exchange-ps"s

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 15
Your company has a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com. You sign for Microsoft Store for Business.
The tenant contains the users shown in the following table.
MS-101 dumps exhibit
Microsoft Store for Business has the following Shopping behavior settings: Allow users to shop is set to On
Make everyone a Basic Purchaser is set to Off
You need to identify which users can install apps from the Microsoft for Business private store.
Which users should you identify?
My answer: -
Reference answer: C
Reference analysis:

References:
https://docs.microsoft.com/en-us/microsoft-store/acquire-apps-microsoft-store-for-business

Question 16
You need to ensure that the support technicians can meet the technical requirement for the Montreal office mobile devices.
What is the minimum of dedicated support technicians required?
My answer: -
Reference answer: B
Reference analysis:

References:
https://docs.microsoft.com/en-us/sccm/mdm/deploy-use/enroll-devices-with-device-enrollment- manager

Question 17
You need to create the Microsoft Store for Business. Which user can create the store?
My answer: -
Reference answer: C
Reference analysis:

References:
https://docs.microsoft.com/en-us/microsoft-store/roles-and-permissions-microsoft-store-for- business
Case Study: 2
A. Datum Case Study: Overview
Existing Environment
This is a case study Case studies are not timed separately. You can use as much exam time as you
would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is
provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section.
To start the case study
To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question. Current Infrastructure
A. Datum recently purchased a Microsoft 365 subscription. All user files are migrated to Microsoft 365.
All mailboxes are hosted in Microsoft 365. The users in each office have email suffixes that include the country of the user, for example, user1@us.adatum.com or user2#uk.ad3tum.com.
Each office has a security information and event management (SIEM) appliance. The appliances come from three different vendors.
A. Datum uses and processes Personally Identifiable Information (PII).
Problem Statements Requirements
A. Datum entered into litigation. The legal department must place a hold on all the documents of a
user named User1 that are in Microsoft 365. Business Goals
A. Datum warns to be fully compliant with all the relevant data privacy laws in the regions where it operates.
A. Datum wants to minimize the cost of hardware and software whenever possible.
Technical Requirements
A. Datum identifies the following technical requirements:
• Centrally perform log analysis for all offices.
•Aggregate all data from the SIEM appliances to a central cloud repository for later analysis.
•Ensure that a SharePoint administrator can identify who accessed a specific file stored in a document library.
•Provide the users in the finance department with access to Service assurance information in Microsoft Office 365.
•Ensure that documents and email messages containing the PII data of European Union (EU) citizens are preserved for 10 years.
•If a user attempts to download 1,000 or more files from Microsoft SharePoint Online within 30 minutes, notify a security administrator and suspend the user\'s user account.
•A security administrator requires a report that shows which Microsoft 36S users signed in Based on the report, the security administrator will create a policy to require multi-factor authentication when a sign in is high risk.
•Ensure that the users in the New York office can only send email messages that contain sensitive US. PII data to other New York office users. Email messages must be monitored to ensure compliance. Auditors in the New York office must have access to reports that show the sent and received email messages containing sensitive U.S. PII data.

Question 18
You configure a conditional access policy. The locations settings are configured as shown in the Locations exhibit. (Click the Locations tab.)
MS-101 dumps exhibit
The users and groups settings are configured as shown in the Users and Groups exhibit. (Click Users and Groups tab.)
MS-101 dumps exhibit
Members of the Security reader group report that they cannot sign in to Microsoft Active Directory (Azure AD) on their device while they are in the office.
You need to ensure that the members of the Security reader group can sign in in to Azure AD on their device while they are in the office. The solution must use the principle of least privilege.
What should you do?
My answer: -
Reference answer: D
Reference analysis:

References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition

Question 19
You have a Microsoft 365 subscription
All users are assigned a Microsoft 365 E3 License. You enable auditing for your organization.
What is the maximum amount of time data will be retained in the Microsoft 365 audit log?
My answer: -
Reference answer: D
Reference analysis:

References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-compliance

Question 20
HOTSPOT
You have a document in Microsoft OneDrive that is encrypted by using Microsoft Azure Information Protection as shown in the following exhibit.
MS-101 dumps exhibit
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
MS-101 dumps exhibit
Solution:
References:
https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-protection

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 21
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 subscription.
You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are connected to your on-premises network.
Solution: From the Azure Active Directory admin center, you create a trusted location and a conditional access policy.
Does this meet the goal?
My answer: -
Reference answer: B
Reference analysis:

References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition https://techcommunity.microsoft.com/t5/Microsoft-SharePoint-Blog/Conditional-Access-in-SharePoint-Onlineand-OneDrive-for/ba-p/46678

Page: 1 / 12
Total 146 questions Full Exam Access