image


MS-101 Dumps

MS-101 Braindumps MS-101 Real Questions MS-101 Practice Test

MS-101 Actual Questions


Microsoft


MS-101


Microsoft 365 Mobility and Security


https://killexams.com/pass4sure/exam-detail/MS-101


Question: 654


Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals- Some question sets might have more than one correct solution, while others might not have a correct solution.


After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You are deploying Microsoft Intune. You successfully enroll Windows 10 devices in Intune. When you try to enroll an iOS device in Intune, you get an error. You need to ensure that you can enroll the iOS device in Intuen. Solution: You configure the Apple MDM Push certificate.


Does this meet the goal?

  1. Yes

  2. No


Answer: B


Question: 655


A user receives the following message when attempting to sign in to https://myapps.microsoft.com:


"Your sign-in was blocked. We’ve detected something unusual about this sign-in. For example, you might be signing in from a new location device, or app. Before you can continue, we need to verity your identity. Please contact your admin.”


Which configuration prevents the users from signing in?

  1. Microsoft Azure Active Directory (Azure AD) Identity Protection policies

  2. Microsoft Azure Active Directory (Azure AD) conditional access policies

  3. Security & Compliance supervision policies

  4. Security & Compliance data loss prevention (DIP) policies

Answer: A


Question: 656


Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals- Some question sets might have more than one correct solution, while others might not have a correct solution.


After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.


You have a Microsoft 365 subscription.


You discover that some external users accessed content on a Microsoft SharePoint site. You modify the SharePoint sharing policy to prevent sharing outside your organization.


You need to be notified if the SharePoint sharing policy is modified in the future.

Solution: From the Security & Compliance admin center, you create a threat management policy. Does this meet the goal?

  1. Yes

  2. No


Answer: A


Question: 657


Topic 1, Mis Questions


Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals- Some question sets might have more than one correct solution, while others might not have a correct solution.


After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You are deploying Microsoft Intune. You successfully enroll Windows 10 devices in Intune. When you try to enroll an iOS device in Intune, you get an error. You need to ensure that you can enroll the iOS device in Intuen. Solution: You configure the Mobility (MDM and MAM) settings.


Does this meet the goal?

  1. Yes

  2. No


Answer: B


Question: 658


Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals- Some question sets might have more than one correct solution, while others might not have a correct solution.


After you answer a question in this section, you will NOT be able to return to it. As a result, these


questions will not appear in the review screen. Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).

You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch). You configure pilot co-management You add a new device named Device 1 to the domain. You install the

Configuration Manager client on Device1.


You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager. Solution: You add Device1 to a Configuration Manager device collection.


Does this meet the goal?

  1. Yes

  2. No


Answer: B Question: 659 HOTSPOT

You have a Microsoft Azure Active Directory (Azure AD) tenant that contains the users shown in the following table.


image


Your company uses Windows Defender Advanced Threat Protection (ATP). Windows Defender ATP contains the rotes shown, in the following table.


Windows Defender ATP contains the device groups shown in the following table.


image


For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.


Answer:


Question: 660


DRAG DROP


You create a Microsoft 36S subscription.


You need to create a deployment plan for Microsoft Azure Advanced Threat Protection (ATP).


Which five actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.


Answer:


Question: 661


Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals- Some question sets might have more than one correct solution, while others might not have a correct solution.


After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.


You have a Microsoft 365 subscription. You discover that some external users accessed content on a Microsoft SharePoint site. You modify the SharePoint shoring policy to prevent sharing outside your organization.


You need to be notified if the SharePoint sharing policy is modified m the future. Solution: From the SharePoint admin center, you modify the sharing settings.


Does this meet the goal?

  1. Yes

  2. No


Answer: B


Question: 662


Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals- Some question sets might have more than one correct solution, while others might not have a correct solution.


After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not

appear in the review screen.


You have a Microsoft 365 subscription.


You discover that some external users accessed content on a Microsoft SharePoint site. You modify the SharePoint shoring policy to prevent sharing outside your organization.


You need to be notified if the SharePoint sharing policy is modified m the future. Solution: From the SharePoint site, you create an alert.


Does this meet the goal?

  1. Yes

  2. No


Answer: B


Question: 663


Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals- Some question sets might have more than one correct solution, while others might not have a correct solution.


After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).


You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch). You configure pilot co-management You add a new device named Device 1 to the domain. You install the Configuration Manager client on Device1.


You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager. Solution: You unjoin Device1 from the Active Directory domain.


Does this meet the goal?

  1. Yes

  2. No


Answer: A


Question: 664


You implement Microsoft Azure Advanced Threat Protection (Azure ATP). You have an Azure ATP sensor configured as shown m the following exhibit.


How long after the Azure ATP cloud service is updated will the sensor update?

  1. 1 hour

  2. 12 hours

  3. 48 hours

  4. 7days

  5. 4 hours


Answer: A Question: 665 HOTSPOT

image

You have a Microsoft 365 subscription. You are configuring permissions for Security & Compliant. You need to ensure that the users can perform the tasks shown following table.


The solution must use the principle of least privilege.


To which role should you assign each user? To answer, select the .impropriate options in the answer area. NOTE: Each correct selection is worth one point


image

Answer:

image


Question: 666


You have a Microsoft 365 tenant


You have a line-of-business application named App1 that users access by using the My Apps portal. After some recent security breaches, you implement a conditional access policy for App1 that uses Conditional Access App Control,


You need to be alerted by email if impossible travel is detected for a user of Appl. The solution must ensure that alerts are generated for App1 only.


What should you do?

  1. From Microsoft Cloud App Security, create a Cloud Discovery anomaly detection policy.

  2. From Microsoft Cloud App Security, modify the impossible travel alert policy.

  3. From Microsoft Cloud App Security, create an app discovery policy.

  4. From the Azure Active Directory admin center, modify the conditional access policy.


Answer: C


Question: 667


You have a Microsoft 36S subscription. Your company purchases a new financial application named App1. From Cloud Discovery in Microsoft Cloud App Security, you view the Discovered apps page and discover that many applications have a low score because they are missing information about domain registration and consumer popularity. You need to prevent the missing information from affecting the score.


What should you configure from the Cloud Discover settings?

  1. Organization details

  2. Default behavior

  3. Score metrics

  4. App tags


Answer: D

Your company has a security policy that prevents additional software from txnrwj installed on domain controllers. You need to monitor a domain controller by using Microsoft Azure Advanced Threat Protection (ATP).

What should you do? More than one answer choice may achieve the goal. Select the BEST answer.

  1. Deploy an Azure ATP sensor, and then configure port mirroring.

  2. Deploy an Azure ATP sensor, and then configure detections.

  3. Deploy an Azure ATP standalone sensor, and then configure detections.

  4. Deploy an Azure ATP standalone sensor, and then configure port mirroring.


Answer: B


Question: 669


Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals- Some question sets might have more than one correct solution, while others might not have a correct solution.


After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You are deploying Microsoft Intune. You successfully enroll Windows 10 devices in Intune. When you try to enroll an iOS device in Intune, you get an error. You need to ensure that you can enroll the iOS device in Intuen. Solution: You create an Apple Configurator enrollment profile.


Does this meet the goal?

  1. Yes

  2. No


Answer: A


Question: 670


Your company has a Microsoft 365 E5 subscription. Users in the research department work with sensitive data. You need to prevent the research department users from accessing potentially unsafe websites by

using hyperlinks embedded in email messages and documents. Users in other departments must not be restricted. What should you do from the Security & Compliance admin center?

  1. Create a data toss prevention (DLP) policy that has a Content is shared condition.

  2. Modify the default safe links policy.

  3. Create a data loss prevention (DLP) policy that has a Content contains condition.

  4. Create a new safe links policy.


Answer: A

You have a Microsoft 365 subscription.


You need to implement Windows Defender Advanced Threat Protection (ATP) for all the supported devices enrolled in mobile device management (MDM).


What should you include in the device configuration profile? To answer, select- appropriate options in the answer area.


image


Answer:

image


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG