Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the Microsoft 365 Certified: Enterprise Administrator Expert MS-102 Questions and answers with Dumpstech

Exam MS-102 Premium Access

View all detail and faqs for the MS-102 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions
Questions # 31:

You need to configure automatic enrollment in Intune. The solution must meet the technical requirements.

What should you configure, and to which group should you assign the configurations? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 31

Options:

Questions # 32:

You need to create the Safe Attachments policy to meet the technical requirements.

Which option should you select?

Options:

A.

Replace

B.

Enable redirect

C.

Block

D.

Dynamic Delivery

Questions # 33:

You need to create the DLP policy to meet the technical requirements.

What should you configure first?

Options:

A.

sensitive info types

B.

the Insider risk management settings

C.

the event types

D.

the sensitivity labels

Questions # 34:

You need to ensure that User2 can review the audit logs. The solutions must meet the technical requirements.

To which role group should you add User2, and what should you use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 34

Options:

Questions # 35:

You need to configure Office on the web to meet the technical requirements.

What should you do?

Options:

A.

Assign the Global reader role to User1.

B.

Enable sensitivity labels for Office files in SharePoint Online and OneDrive.

C.

Configure an auto-labeling policy to apply the sensitivity labels.

D.

Assign the Office apps admin role to User1.

Questions # 36:

You plan to implement the endpoint protection device configuration profiles to support the planned changes.

You need to identify which devices will be supported, and how many profiles you should implement.

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 36

Options:

Questions # 37:

You create the planned DLP policies.

You need to configure notifications to meet the technical requirements.

What should you do?

Options:

A.

From the Microsoft 365 security center, configure an alert policy.

B.

From the Microsoft Endpoint Manager admin center, configure a custom notification.

C.

From the Microsoft 365 admin center, configure a Briefing email.

D.

From the Microsoft 365 compliance center, configure the Endpoint DLP settings.

Questions # 38:

You have an Azure Active Directory (Azure AD) tenant that contains a user named User1.

Your company purchases a Microsoft 365 subscription.

You need to ensure that User1 is assigned the required role to create file policies and manage alerts in the Cloud App Security admin center.

Solution: From the Azure Active Directory admin center, you assign the Compliance administrator role to User1.

Does this meet the goal?

Options:

A.

Yes

B.

No

Questions # 39:

Your company uses Microsoft Defender for Endpoint.

The devices onboarded to Microsoft Defender for Endpoint are shown in the following table.

Question # 39

The alerts visible in the Microsoft Defender for Endpoint alerts queue are shown in the following table.

Question # 39

You create a suppression rule that has the following settings:

• Triggering IOC: Any IOC

• Action: Hide alert

• Suppression scope: Alerts on ATP1 device group

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point

Question # 39

Options:

Questions # 40:

You have a Microsoft 365 E5 subscription that contains a user named User1. You create an anti-phishing policy named Policy! that has the following settings:

• Include these users, groups and domains: User1

• Phishing email threshold: 3 - More Aggressive

User1 receives the email messages shown in the following table.

Question # 40

Which messages are phishing email?

Options:

A.

Mail4 only

B.

Mail3 and Mail4 only

C.

Mail2, Mail3, and Mail4 only

D.

Mail1, Mail2, Mail3, and Mail4

Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions