MS 500 PDF
MS 500 PDF
Number: 000-000
Passing Score: 800
Time Limit: 120 min
File Version: 1.0
MS-500
TestGuide4U (ExamGuidesForIT)
Check Out Our Site at:
www.e-junkie.com\TestGuide4u
More Exams Can be Purchased through Credit Cards or Paypal Online Directly.
Download link will be sent to your email immediately after the purchase.
Exam A
QUESTION 1
Testlet 1
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there
may be additional case studies and sections on this exam.
You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain
exhibits and other resources that provide more information
about the scenario that is described in the case study. Each question is independent of the other questions in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the
next section of the exam. After you begin a new section, you
cannot return to this section.
Overview
Fabrikam, Inc. is manufacturing company that sells products through partner retail stores. Fabrikam has 5,000 employees located in offices throughout
Europe.
Existing Environment
Network Infrastructure
The network contains an Active Directory forest named fabrikam.com. Fabrikam has a hybrid Microsoft Azure Active Directory (Azure AD) environment.
The company maintains some on-premises servers for specific applications, but most end-user applications are provided by a Microsoft 365 E5
subscription.
Problem Statements
Fabrikam identifies the following issues:
Since last Friday, the IT team has been receiving automated email messages that contain "Unhealthy Identity Synchronization Notification" in the
subject line.
Several users recently opened email attachments that contained malware. The process to remove the malware was time consuming.
Requirements
Planned Changes
Fabrikam plans to implement the following changes:
Fabrikam plans to provide partners with access to some of the data stored in Microsoft 365
Application Administration
Fabrikam identifies the following application requirements for managing workload applications:
User administrators will use the Azure Active Directory admin center
Two new administrators named Admin1 and Admin2 will be responsible for managing Microsoft Exchange Online only
Security Requirements
Fabrikam identifies the following security requirements:
Access to the Azure Active Directory admin center by the user administrators must be reviewed every seven days. If an administrator fails to respond to
an access request within three days, access must be
removed
Users who manage Microsoft 365 workloads must only be allowed to perform administrative tasks for up to three hours at a time. Global administrators
must be exempt from this requirement
Users must be prevented from inviting external users to view company data. Only global administrators and a user named User1 must be able to send
invitations
Azure Advanced Threat Protection (ATP) must capture security group modifications for sensitive groups, such as Domain Admins in Active Directory
Workload administrators must use multi-factor authentication (MFA) when signing in from an anonymous or an unfamiliar location
The location of the user administrators must be audited when the administrators authenticate to Azure AD
Email messages that include attachments containing malware must be delivered without the attachment
An administrator configures Azure AD Privileged Identity Management as shown in the following exhibit.
What should you do to meet the security requirements?
Answer: D
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 2
You need to recommend a solution for the user administrators that meets the security requirements for auditing.
Which blade should you recommend using from the Azure Active Directory admin center?
A. Sign-ins
B. Azure AD Identity Protection
C. Authentication methods
D. Access review
Answer: A
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-sign-ins
QUESTION 3
HOTSPOT
You plan to configure an access review to meet the security requirements for the workload administrators. You create an access review policy and
specify the scope and a group.
Which other settings should you configure? To answer, select the appropriate options in the answer area.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 4
You need to recommend a solution to protect the sign-ins of Admin1 and Admin2.
Answer: C
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-user-risk-policy
QUESTION 5
You need to resolve the issue that targets the automated email messages to the IT team.
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/enterprise/fix-problems-with-directory-synchronization
QUESTION 6
Testlet 2
Overview
Litware, Inc. is a financial company that has 1,000 users in its main office in Chicago and 100 users in a branch office in San Francisco.
Existing Environment
Internal Network Infrastructure
The network contains a single domain forest. The forest functional level is Windows Server 2016.
The network has the IP address range shown in the following table.
Windows 10 Enterprise
The internal network contains the systems shown in the following table.
Litware uses a third-party email system.
Cloud Infrastructure
Litware recently purchased Microsoft 365 subscription licenses for all users.
Microsoft Azure Active Directory (Azure AD) Connect is installed and uses the default authentication settings. User accounts are not yet synced to
Azure AD.
You have the Microsoft 365 users and groups shown in the following table.
Planned Changes
Litware plans to implement the following changes:
Security Requirements
Litware identities the following security requirements:
Create a group named Group2 that will include all the Azure AD user accounts. Group2 will be used to provide limited access to Windows Analytics
Create a group named Group3 that will be used to apply Azure Information Protection policies to pilot users. Group3 must only contain user accounts
Use Azure Advanced Threat Protection (ATP) to detect any security threats that target the forest
Prevent users locked out of Active Directory from signing in to Azure AD and Active Directory
Implement a permanent eligible assignment of the Compliance administrator role for User1
Prevent access to Azure resources for the guest user accounts by default
Pilot users must use MFA unless they are signing in from the internal network of the Chicago office. MFA must NOT be used on the Chicago office
internal network.
If an authentication attempt is suspicious, MFA must be used, regardless of the user location
General Requirements
Litware wants to minimize the deployment of additional servers and services in the Active Directory forest.
Answer: CE
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 7
A. 131.107.83.0/28
B. 192.168.16.0/20
C. 172.16.0.0/24
D. 192.168.0.0/20
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 8
HOTSPOT
How should you configure Group3? To answer, select the appropriate options in the answer area.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 9
HOTSPOT
How should you configure Azure AD Connect? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 10
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there
may be additional case studies and sections on this exam.
You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain
exhibits and other resources that provide more information
about the scenario that is described in the case study. Each question is independent of the other questions in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the
next section of the exam. After you begin a new section, you
cannot return to this section.
Overview
Contoso, Ltd. is a consulting company that has a main office in Montreal and three branch offices in Seattle, and New York.
Contoso has IT, human resources (HR), legal, marketing, and finance departments. Contoso uses Microsoft 365.
Existing Environment
Infrastructure
The network contains an Active Directory domain named contoso.com that is synced to a Microsoft Azure Active Directory (Azure AD) tenant.
Password writeback is enabled.
The domain contains servers that run Windows Server 2016. The domain contains laptops and desktop computers that run Windows 10 Enterprise.
Each office connects to the Internet by using a NAT device. The offices have the IP addresses shown in the following table.
From the Multi-Factor Authentication page, an address space of 198.35.3.0/24 is defined in the trusted IPs list.
Azure Multi-Factor Authentication (MFA) is enabled for the users in the finance department.
The devices enrolled in Intune are configured as shown in the following table.
The device compliance policies in Intune are configured as shown in the following table.
The device compliance policies have the assignments shown in the following table.
The Mark devices with no compliance policy assigned as setting is set to Compliant.
Requirements
Technical Requirements
Ensure that User9 can enable and configure Azure AD Privileged Identity Management
HOTSPOT
Which users are members of ADGroup1 and ADGroup2? To answer, select the appropriate options in the answer area.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/groups-dynamic-membership#supported-values
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/groups-dynamic-membership#supported-values
QUESTION 11
HOTSPOT
You are evaluating which finance department users will be prompted for Azure MFA credentials.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 12
Answer: C
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 13
You need to meet the technical requirements for User9. What should you do?
A. Assign the Privileged administrator role to User9 and configure a mobile phone number for User9
B. Assign the Compliance administrator role to User9 and configure a mobile phone number for User9
C. Assign the Security administrator role to User9
D. Assign the Global administrator role to User9
Answer: D
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 14
A. Global administrator
B. User administrator
C. Privileged role administrator
D. Security administrator
Answer: C
Explanation/Reference:
Explanation
Explanation/Reference:
Question Set 4
QUESTION 15
Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet
the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 E5 subscription that is associated to a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You use Active Directory Federation Services (AD FS) to federate on-premises Active Directory and the tenant. Azure AD Connect has the following
settings:
Solution: You modify the Azure AD app and attribute filtering settings.
A. Yes
B. No
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 16
Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet
the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 E5 subscription that is associated to a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You use Active Directory Federation Services (AD FS) to federate on-premises Active Directory and the tenant. Azure AD Connect has the following
settings:
You need to ensure that you can use leaked credentials detection in Azure AD Identity Protection.
A. Yes
B. No
Answer: A
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/security/azure-ad-secure-steps
QUESTION 17
Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet
the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 E5 subscription that is associated to a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You use Active Directory Federation Services (AD FS) to federate on-premises Active Directory and the tenant. Azure AD Connect has the following
settings:
You need to ensure that you can use leaked credentials detection in Azure AD Identity Protection.
A. Yes
B. No
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 18
HOTSPOT
You have a Microsoft 365 subscription that uses a default domain name of contoso.com.
The multi-factor authentication (MFA) service settings are configured as shown in the exhibit. (Click the Exhibit tab.)
In contoso.com, you create the users shown in the following table.
What is the effect of the configuration? To answer, select the appropriate options in the answer area.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-userstates
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-userstates
QUESTION 19
HOTSPOT
You configure Microsoft Azure Active Directory (Azure AD) Connect as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-device-writeback
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-device-writeback
QUESTION 20
You have a hybrid Microsoft 365 environment. All computers run Windows 10 and are managed by using Microsoft Intune.
You need to create a Microsoft Azure Active Directory (Azure AD) conditional access policy that will allow only Windows 10 computers marked as
compliant to establish a VPN connection to the on-premises
network.
A. From the Azure Active Directory admin center, create a new certificate
B. Enable Application Proxy in Azure AD
C. From Active Directory Administrative Center, create a Dynamic Access Control policy
D. From the Azure Active Directory admin center, configure authentication methods
Answer: A
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/windows-server/remote/remote-access/vpn/ad-ca-vpn-connectivity-windows10
QUESTION 21
From the Microsoft 365 admin center, you create a new user.
Explanation/Reference:
QUESTION 22
You need to ensure that all users who are assigned the Exchange administrator role have multi-factor authentication (MFA) enabled by default.
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 23
The company does not permit users to enroll personal devices in mobile device management (MDM).
You need to ensure that the sales department users can use the Microsoft Power BI app from iOS devices to access the Power BI data in your tenant.
The users must be prevented from backing up the app's data to iCloud.
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 24
HOTSPOT
Users and device objects are added and removed daily. Users in the sales department frequently change their device.
Explanation
Explanation/Reference:
References:
https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/active-directory/users-groups-roles/groups-dynamic-membership.md
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/active-directory/users-groups-roles/groups-dynamic-membership.md
QUESTION 25
You need to enforce Microsoft Azure Multi-Factor Authentication (MFA) by using conditional access for all users who are NOT physically present in the
office.
Answer: C
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition
QUESTION 26
HOTSPOT
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table.
You create and enforce an Azure AD Identity Protection user risk policy that has the following settings:
You need to identify how the policy affects User1 and User2.
What occurs when User1 and User2 sign in from an unfamiliar location? To answer, select the appropriate options in the answer area.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 27
HOTSPOT
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table.
You create and enforce an Azure AD Identity Protection sign-in risk policy that has the following settings:
You need to identify how the policy affects User1 and User2.
What occurs when each user signs in from an anonymous IP address? To answer, select the appropriate options in the answer area.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 28
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some questions sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You install and run Azure AD Connect on a server named Server1 that runs Windows Server.
A. Yes
B. No
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://support.pingidentity.com/s/article/PingOne-How-to-troubleshoot-an-AD-Connect-Instance
QUESTION 29
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some questions sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You install and run Azure AD Connect on a server named Server1 that runs Windows Server.
A. Yes
B. No
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://support.pingidentity.com/s/article/PingOne-How-to-troubleshoot-an-AD-Connect-Instance
QUESTION 30
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some questions sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You install and run Azure AD Connect on a server named Server1 that runs Windows Server.
You need to view Azure AD Connect events.
A. Yes
B. No
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://support.pingidentity.com/s/article/PingOne-How-to-troubleshoot-an-AD-Connect-Instance
QUESTION 31
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some questions sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You install and run Azure AD Connect on a server named Server1 that runs Windows Server.
A. Yes
B. No
Answer: A
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://support.pingidentity.com/s/article/PingOne-How-to-troubleshoot-an-AD-Connect-Instance
QUESTION 32
Some users are required to use an authenticator app to access Microsoft SharePoint Online.
You need to view which users have used an authenticator app to access SharePoint Online. The solution must minimize costs.
What should you do?
A. From the Enterprise applications blade of the Azure Active Directory admin center, view the audit logs
B. From Azure Log Analytics, query the logs
C. From the Azure Active Directory admin center, view the audit logs
D. From the Enterprise applications blade of the Azure Active Directory admin center, view the sign-ins
Answer: D
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 33
HOTSPOT
You have a Microsoft 365 subscription that contains the users shown in the following table.
You implement Azure Active Directory (Azure AD) Privileged Identity Management (PIM).
From PIM, you review the Application Administrator role and discover the users shown in the following table.
The Application Administrator role is configured to use the following settings in PIM:
Notifications: Disable
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 34
Overview
Fabrikam, Inc. is manufacturing company that sells products through partner retail stores. Fabrikam has 5,000 employees located in offices throughout
Europe.
Existing Environment
Network Infrastructure
The network contains an Active Directory forest named fabrikam.com. Fabrikam has a hybrid Microsoft Azure Active Directory (Azure AD) environment.
The company maintains some on-premises servers for specific applications, but most end-user applications are provided by a Microsoft 365 E5
subscription.
Problem Statements
Fabrikam identifies the following issues:
Since last Friday, the IT team has been receiving automated email messages that contain "Unhealthy Identity Synchronization Notification" in the
subject line.
Several users recently opened email attachments that contained malware. The process to remove the malware was time consuming.
Requirements
Planned Changes
Fabrikam plans to implement the following changes:
Fabrikam plans to provide partners with access to some of the data stored in Microsoft 365
Application Administration
Fabrikam identifies the following application requirements for managing workload applications:
User administrators will work from different countries
User administrators will use the Azure Active Directory admin center
Two new administrators named Admin1 and Admin2 will be responsible for managing Microsoft Exchange Online only
Security Requirements
Fabrikam identifies the following security requirements:
Access to the Azure Active Directory admin center by the user administrators must be reviewed every seven days. If an administrator fails to respond to
an access request within three days, access must be
removed
Users who manage Microsoft 365 workloads must only be allowed to perform administrative tasks for up to three hours at a time. Global administrators
must be exempt from this requirement
Users must be prevented from inviting external users to view company data. Only global administrators and a user named User1 must be able to send
invitations
Azure Advanced Threat Protection (ATP) must capture security group modifications for sensitive groups, such as Domain Admins in Active Directory
Workload administrators must use multi-factor authentication (MFA) when signing in from an anonymous or an unfamiliar location
The location of the user administrators must be audited when the administrators authenticate to Azure AD
Email messages that include attachments containing malware must be delivered without the attachment
The principle of least privilege must be used whenever possible
HOTSPOT
You need to recommend an email malware solution that meets the security requirements.
What should you include in the recommendation? To answer, select the appropriate options in the answer area.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 35
HOTSPOT
You add a member to the Domain Admins group. You view the timeline in Azure ATP and discover that information regarding the membership change
is missing.
You need to meet the security requirements for Azure ATP reporting.
What should you configure? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-advanced-audit-policy
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-advanced-audit-policy
QUESTION 36
Overview
Litware, Inc. is a financial company that has 1,000 users in its main office in Chicago and 100 users in a branch office in San Francisco.
Existing Environment
The network has the IP address range shown in the following table.
Windows 10 Enterprise
Cloud Infrastructure
Litware recently purchased Microsoft 365 subscription licenses for all users.
Microsoft Azure Active Directory (Azure AD) Connect is installed and uses the default authentication settings. User accounts are not yet synced to
Azure AD.
You have the Microsoft 365 users and groups shown in the following table.
Planned Changes
Litware plans to implement the following changes:
Security Requirements
Litware identities the following security requirements:
Create a group named Group2 that will include all the Azure AD user accounts. Group2 will be used to provide limited access to Windows Analytics
Create a group named Group3 that will be used to apply Azure Information Protection policies to pilot users. Group3 must only contain user accounts
Use Azure Advanced Threat Protection (ATP) to detect any security threats that target the forest
Prevent users locked out of Active Directory from signing in to Azure AD and Active Directory
Implement a permanent eligible assignment of the Compliance administrator role for User1
Prevent access to Azure resources for the guest user accounts by default
Pilot users must use MFA unless they are signing in from the internal network of the Chicago office. MFA must NOT be used on the Chicago office
internal network.
If an authentication attempt is suspicious, MFA must be used, regardless of the user location
Any disruption of legitimate authentication attempts must be minimized
General Requirements
Litware wants to minimize the deployment of additional servers and services in the Active Directory forest.
DRAG DROP
You need to configure threat detection for Active Directory. The solution must meet the security requirements.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange
them in the correct order.
Explanation
Explanation/Reference:
Answer:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
Answer:
QUESTION 37
You need to implement Windows Defender ATP to meet the security requirements. What should you do?
A. Configure port mirroring
B. Create the ForceDefenderPassiveMode registry setting
C. Download and install the Microsoft Monitoring Agent
D. Run WindowsDefenderATPOnboardingScript.cmd
Answer: C
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 38
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there
may be additional case studies and sections on this exam.
You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain
exhibits and other resources that provide more information
about the scenario that is described in the case study. Each question is independent of the other questions in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the
next section of the exam. After you begin a new section, you
cannot return to this section.
Overview
Contoso, Ltd. is a consulting company that has a main office in Montreal and three branch offices in Seattle, and New York.
Existing Environment
Infrastructure
The network contains an Active Directory domain named contoso.com that is synced to a Microsoft Azure Active Directory (Azure AD) tenant.
Password writeback is enabled.
The domain contains servers that run Windows Server 2016. The domain contains laptops and desktop computers that run Windows 10 Enterprise.
Each office connects to the Internet by using a NAT device. The offices have the IP addresses shown in the following table.
Azure Multi-Factor Authentication (MFA) is enabled for the users in the finance department.
The devices enrolled in Intune are configured as shown in the following table.
The device compliance policies in Intune are configured as shown in the following table.
The device compliance policies have the assignments shown in the following table.
The Mark devices with no compliance policy assigned as setting is set to Compliant.
Requirements
Technical Requirements
Ensure that User9 can enable and configure Azure AD Privileged Identity Management
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Answer:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
Answer:
QUESTION 39
HOTSPOT
Which policies apply to which devices? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Question Set 4
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
Question Set 4
QUESTION 40
You configure several Advanced Threat Protection (ATP) policies in a Microsoft 365 subscription.
You need to allow a user named User1 to view ATP reports in the Threat management dashboard.
Which role provides User1 with the required role permissions?
A. Security reader
B. Message center reader
C. Compliance administrator
D. Information Protection administrator
E. Service administrator
F. Exchange administrator
Answer: A
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/view-reports-for-atp#what-permissions-are-needed-to-view-the-atp-reports
QUESTION 41
You use Windows Defender Advanced Threat Protection (Windows Defender ATP). You plan to use Microsoft Office 365 Attack simulator.
Answer: A
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/attack-simulator
QUESTION 42
You have a Microsoft 365 E5 subscription and a hybrid Microsoft Exchange Server organization.
Each member of a group named Executive has an on-premises mailbox. Only the Executive group members have multi-factor authentication (MFA)
enabled. Each member of a group named Research has a
mailbox in Exchange Online.
You need to use Microsoft Office 365 Attack simulator to model a spear-phishing attack that targets the Research group members.
The email addresses that you intend to spoof belong to the Executive group members.
A. From the Azure ATP admin center, configure the primary workspace settings
B. From the Microsoft Azure portal, configure the user risk policy settings in Azure AD Identity Protection
C. Enable MFA for the Research group members
D. Migrate the Executive group members to Exchange Online
Answer: C
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/attack-simulator
QUESTION 43
You implement Advanced Threat Protection (ATP) safe attachments policies for all users.
User reports that email messages containing attachments take longer than expected to be received.
You need to reduce the amount of time it takes to receive email messages that contain attachments. The solution must ensure that all attachments are
scanned for malware. Attachments that have malware must
be blocked.
Answer: D
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/dynamic-delivery-and-previewing
QUESTION 44
HOTSPOT
Your network contains an Active Directory domain named contoso.com. The domain contains a VPN server named VPN1 that runs Windows Server
2016 and has the Remote Access server role installed.
You install an Azure ATP standalone sensor on a server named Server1 that runs Windows Server 2016.
What should you do? To answer, select the appropriate options in the answer area.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/install-atp-step6-vpn
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/install-atp-step6-vpn
QUESTION 45
HOTSPOT
You have a Microsoft 365 subscription that uses a default domain name of contoso.com.
Microsoft Azure Active Directory (Azure AD) contains the users shown in the following table.
Microsoft Intune has two devices enrolled as shown in the following table:
Both devices have three apps named App1, App2, and App3 installed.
You create an app protection policy named ProtectionPolicy1 that has the following settings:
You apply ProtectionPolicy1 to Group1 and Group3. You exclude Group2 from ProtectionPolicy1.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
A. Answer:
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 46
You have a Microsoft 365 tenant.
You need to ensure that the computers connect to Windows Defender ATP.
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/intune/advanced-threat-protection
QUESTION 47
HOTSPOT
Your company has a Microsoft 365 subscription that contains the users shown in the following table.
The company implements Windows Defender Advanced Threat Protection (Windows Defender ATP). Windows Defender ATP includes the roles shown
in the following table:
Windows Defender ATP contains the machine groups shown in the following table:
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 48
You enable the delayed deployment of updates for an Azure ATP sensor named Sensor1.
How long after the Azure ATP cloud service is updated will Sensor1 be updated?
A. 7 days
B. 24 hours
C. 1 hour
D. 48 hours
E. 12 hours
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
Explanation:
Note: The delay period was 24 hours. In ATP release 2.62, the 24 hour delay period has been increased to 72 hours.
QUESTION 49
DRAG DROP
You have a Microsoft 365 subscription. All users use Microsoft Exchange Online.
Microsoft 365 is configured to use the default policy settings without any custom rules.
Where are suspicious email messages placed by default? To answer, drag the appropriate location to the correct message types. Each location may
be used once, more than once, or not at all. You may need to
drag the split bar between panes or scroll to view content.
Select and Place:
A. Answer:
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 50
You need to configure the retention duration for the attachments in quarantine.
Which type of threat management policy should you create from the Security&Compliance admin center?
A. ATP anti-phishing
B. DKIM
C. Anti-spam
D. Anti-malware
Answer: D
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 51
You plan to protect the computers by using Windows Defender Advanced Threat Protection (Windows Defender ATP). Twenty of the computers belong
to company executives.
You need to recommend a remediation solution that meets the following requirements:
Windows Defender ATP administrators must manually approve all remediation for the executives
What should you recommend doing from Windows Defender Security Center?
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/machine-groups-windows-defender-advanced-threat-
protection
QUESTION 52
You use Windows Defender Advanced Threat Protection (Windows Defender ATP).
You need to integrate Microsoft Office 365 Threat Intelligence and Windows Defender ATP.
Where should you configure the integration?
A. From the Microsoft 365 admin center, select Settings, and then select Services & add-ins.
B. From the Security & Compliance admin center, select Threat management, and then select Explorer.
C. From the Microsoft 365 admin center, select Reports, and then select Security & Compliance.
D. From the Security & Compliance admin center, select Threat management and then select Threat tracker.
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/integrate-office-365-ti-with-wdatp
QUESTION 53
Your network contains an on-premises Active Directory domain. The domain contains servers that run Windows Server and have advanced auditing
enabled.
The security logs of the servers are collected by using a third-party SIEM solution.
You purchase a Microsoft 365 subscription and plan to deploy Azure Advanced Threat Protection (ATP) by using standalone sensors.
You need to ensure that you can detect when sensitive groups are modified and when malicious services are created.
Answer: C
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/install-atp-step5
QUESTION 54
You have a Microsoft 365 subscription that uses a default domain name of fabrikam.com.
A. fabrikam.phishing.fabrikam.com
B. malware.fabrikam.com
C. fabrikam.contoso.com
D. www.malware.fabrikam.com
Answer: D
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/set-up-a-custom-blocked-urls-list-wtih-atp
QUESTION 55
HOTSPOT
You have a Microsoft 365 subscription that uses a default name of litwareinc.com.
You configure the Sharing settings in Microsoft OneDrive as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/onedrive/manage-sharing
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/onedrive/manage-sharing
QUESTION 56
Your network contains an on-premises Active Directory domain. The domain contains servers that run Windows Server and have advanced auditing
enabled.
The security logs of the servers are collected by using a third-party SIEM solution.
You purchase a Microsoft 365 subscription and plan to deploy Azure Advanced Threat Protection (ATP) by using standalone sensors.
You need to ensure that you can detect when sensitive groups are modified and when malicious services are created.
Answer: A
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/configure-event-forwarding
QUESTION 57
Several users in your Microsoft 365 subscription report that they received an email message without attachment.
You need to review the attachments that were removed from the messages.
Which two tools can you use? Each correct answer presents a complete solution.
Answer: AD
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/manage-quarantined-messages-and-files
QUESTION 58
You have a Microsoft 365 subscription that contains several Windows 10 devices. The devices are managed by using Microsoft Intune.
You need to enable Windows Defender Exploit Guard (Windows Defender EG) on the devices.
A. Endpoint protection
B. Device restrictions
C. Identity protection
D. Windows Defender ATP
Answer: A
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/intune/endpoint-protection-windows-10
QUESTION 59
DRAG DROP
All computers run Windows 10 and are onboarded to Windows Defender Advanced Threat Protection (Windows Defender ATP).
You need to enable delegation for the security settings of the computers in MachineGroup1.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange
them in the correct order.
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 60
You have a hybrid Microsoft Exchange Server organization. All users have Microsoft 365 E5 licenses.
A. Configure attribute filtering in Microsoft Azure Active Directory Connect (Azure AD Connect)
B. Purchase the ATP add-on
C. Select Directory extension attribute sync in Microsoft Azure Active Directory Connect (Azure AD Connect)
D. Migrate the on-premises mailboxes to Exchange Online
Answer: D
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/set-up-anti-phishing-policies
QUESTION 61
HOTSPOT
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
Four Windows 10 devices are joined to the tenant as shown in the following table.
On which devices can you use BitLocker To Go and on which devices can you turn on auto-unlock? To answer, select the appropriate options in the
answer area.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 62
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there
may be additional case studies and sections on this exam.
You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain
exhibits and other resources that provide more information
about the scenario that is described in the case study. Each question is independent of the other questions in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the
next section of the exam. After you begin a new section, you
cannot return to this section.
Overview
Fabrikam, Inc. is manufacturing company that sells products through partner retail stores. Fabrikam has 5,000 employees located in offices throughout
Europe.
Existing Environment
Network Infrastructure
The network contains an Active Directory forest named fabrikam.com. Fabrikam has a hybrid Microsoft Azure Active Directory (Azure AD) environment.
The company maintains some on-premises servers for specific applications, but most end-user applications are provided by a Microsoft 365 E5
subscription.
Problem Statements
Since last Friday, the IT team has been receiving automated email messages that contain "Unhealthy Identity Synchronization Notification" in the
subject line.
Several users recently opened email attachments that contained malware. The process to remove the malware was time consuming.
Requirements
Planned Changes
Fabrikam plans to provide partners with access to some of the data stored in Microsoft 365
Application Administration
Fabrikam identifies the following application requirements for managing workload applications:
User administrators will use the Azure Active Directory admin center
Two new administrators named Admin1 and Admin2 will be responsible for managing Microsoft Exchange Online only
Security Requirements
Access to the Azure Active Directory admin center by the user administrators must be reviewed every seven days. If an administrator fails to respond to
an access request within three days, access must be
removed
Users who manage Microsoft 365 workloads must only be allowed to perform administrative tasks for up to three hours at a time. Global administrators
must be exempt from this requirement
Users must be prevented from inviting external users to view company data. Only global administrators and a user named User1 must be able to send
invitations
Azure Advanced Threat Protection (ATP) must capture security group modifications for sensitive groups, such as Domain Admins in Active Directory
Workload administrators must use multi-factor authentication (MFA) when signing in from an anonymous or an unfamiliar location
The location of the user administrators must be audited when the administrators authenticate to Azure AD
Email messages that include attachments containing malware must be delivered without the attachment
You need to recommend a solution that meets the technical and security requirements for sharing data with the partners.
What should you include in the recommendation? (Choose two). Each correct answer presents part of the solution.
Answer: CD
Explanation/Reference:
Explanation
Explanation/Reference:
Question Set 2
QUESTION 63
HOTSPOT
You have the Microsoft Azure Information Protection conditions shown in the following table.
You have the Azure Information Protection labels shown in the following table.
You have the Azure Information Protection policies shown in the following table.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 64
HOTSPOT
Your company has a Microsoft 365 subscription, a Microsoft Azure subscription, and an Azure Active Directory (Azure AD) tenant named contoso.com.
The company has the offices shown in the following table.
You create the Microsoft Cloud App Security policy shown in the following exhibit.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 65
HOTSPOT
Send notifications to users if they attempt to send attachments that contain EU social security numbers
Prevent any email messages that contain credit card numbers from being sent outside your organization
Block the external sharing of Microsoft OneDrive content that contains EU passport numbers
What is the minimum number of DLP policies and rules you must create to meet the requirements? To answer, select the appropriate options in the
answer area.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 66
You need to prevent the users from downloading, printing, and syncing files.
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 67
You create a data loss prevention (DLP) policy as shown in the following exhibit:
What is the effect of the policy when a user attempts to send an email messages that contains sensitive information?
A. The user receives a notification and can send the email message
B. The user receives a notification and cannot send the email message
C. The email message is sent without a notification
D. The email message is blocked silently
Answer: A
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies
QUESTION 68
A. Records Center
B. Compliance Policy Center
C. eDiscovery Center
D. Enterprise Search Center
E. Document Center
Answer: C
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://support.office.com/en-us/article/overview-of-data-loss-prevention-in-sharepoint-server-2016-80f907bb-b944-448d-b83d-8fec4abcc24c
QUESTION 69
You have a Microsoft 365 subscription that includes a user named User1.
You have a conditional access policy that applies to Microsoft Exchange Online. The conditional access policy is configured to use Conditional Access
App Control.
You need to create a Microsoft Cloud App Security policy that blocks User1 from printing from Exchange Online.
Answer: D
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/cloud-app-security/session-policy-aad
QUESTION 70
HOTSPOT
From Microsoft Azure Active Directory (Azure AD), you create a security group named Group1. You add 10 users to Group1.
You need to apply app enforced restrictions to the members of Group1 when they connect to Microsoft Exchange Online from non-compliant devices,
regardless of their location.
What should you do? To answer, select the appropriate options in the answer area.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/app-based-conditional-access
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/app-based-conditional-access
QUESTION 71
Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet
the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 tenant. You create a label named CompanyConfidential in Microsoft Azure Information Protection.
A user protects an email message by using CompanyConfidential and sends the label to several external recipients. The external recipients report that
they cannot open the email message.
You need to ensure that the external recipients can open protected email messages sent to them.
Solution: You create a new label in the global policy and instruct the user to resend the email message.
A. Yes
B. No
Answer: A
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 72
Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet
the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 tenant. You create a label named CompanyConfidential in Microsoft Azure Information Protection. You add
CompanyConfidential to a global policy.
A user protects an email message by using CompanyConfidential and sends the label to several external recipients. The external recipients report that
they cannot open the email message.
You need to ensure that the external recipients can open protected email messages sent to them.
Solution: You modify the encryption settings of the label.
A. Yes
B. No
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 73
Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet
the stated goals. Some question sets might
have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 tenant. You create a label named CompanyConfidential in Microsoft Azure Information Protection. You add
CompanyConfidential to a global policy.
A user protects an email message by using CompanyConfidential and sends the label to several external recipients. The external recipients report that
they cannot open the email message.
You need to ensure that the external recipients can open protected email messages sent to them.
A. Yes
B. No
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 74
HOTSPOT
Your network contains an on-premises Active Directory domain named contoso.com. The domain contains the groups shown in the following table.
The domain is synced to a Microsoft Azure Active Directory (Azure AD) tenant that contains the groups shown in the following table.
To which groups can you apply Policy1? To answer, select the appropriate options in the answer area.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/azure/information-protection/prepare
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/azure/information-protection/prepare
QUESTION 75
HOTSPOT
You have a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named contoso.com.
OneDrive stores files that are shared with external users. The files are configured as shown in the following table.
You create a data loss prevention (DLP) policy that applies to the content stored in OneDrive accounts. The policy contains the following three rules:
Rule1:
Conditions: Label1, Detect content that's shared with people outside my organization
User notifications: Notify the user who last modified the content
User overrides: On
Priority: 0
Rule2:
Priority: 1
Rule3:
Conditions: Label2, Detect content that's shared with people outside my organization
User notifications: Notify the user who last modified the content
User overrides: On
Priority: 2
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 76
You have a Microsoft 365 subscription for a company named Contoso, Ltd. All data is in Microsoft 365.
Contoso works with a partner company named Litware, Inc. Litware has a Microsoft 365 subscription.
You need to allow users at Contoso to share files from Microsoft OneDrive to specific users at Litware.
Which two actions should you perform from the OneDrive admin center? Each correct answer presents part of the solution.
Answer: BD
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/sharepoint/turn-external-sharing-on-or-off
QUESTION 77
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there
may be additional case studies and sections on this exam.
You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain
exhibits and other resources that provide more information
about the scenario that is described in the case study. Each question is independent of the other questions in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the
next section of the exam. After you begin a new section, you
cannot return to this section.
Contoso, Ltd. is a consulting company that has a main office in Montreal and three branch offices in Seattle, and New York.
Contoso has IT, human resources (HR), legal, marketing, and finance departments. Contoso uses Microsoft 365.
Existing Environment
Infrastructure
The network contains an Active Directory domain named contoso.com that is synced to a Microsoft Azure Active Directory (Azure AD) tenant.
Password writeback is enabled.
The domain contains servers that run Windows Server 2016. The domain contains laptops and desktop computers that run Windows 10 Enterprise.
Each office connects to the Internet by using a NAT device. The offices have the IP addresses shown in the following table.
Azure Multi-Factor Authentication (MFA) is enabled for the users in the finance department.
The devices enrolled in Intune are configured as shown in the following table.
The device compliance policies in Intune are configured as shown in the following table.
The device compliance policies have the assignments shown in the following table.
The Mark devices with no compliance policy assigned as setting is set to Compliant.
Requirements
Technical Requirements
Ensure that User9 can enable and configure Azure AD Privileged Identity Management
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 78
The Global administrator role is assigned to your user account. You have a user named Admin1.
You need to ensure that Admin1 can view the results of Case1.
What should you do first?
A. From the Azure Active Directory admin center, assign a role group to Admin1.
B. From the Microsoft 365 admin center, assign a role to Admin1.
C. From Security & Compliance admin center, assign a role group to Admin1.
Answer: C
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/assign-ediscovery-permissions
QUESTION 79
HOTSPOT
You have a Microsoft 365 subscription. From the Security & Compliance admin center, you create the retention policies shown in the following table.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies?redirectSourcePath=%252fen-us%252farticle%252fOverview-of-
retention-policies-5e377752-700d-4870-9b6d-12bfc12d2423#the-
principles-of-retention-or-what-takes-precedence
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies?redirectSourcePath=%252fen-us%252farticle%252fOverview-of-
retention-policies-5e377752-700d-4870-9b6d-12bfc12d2423#the-
principles-of-retention-or-what-takes-precedence
QUESTION 80
You need to enable auditing for all Microsoft Exchange Online users.
Answer: C
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/enable-mailbox-auditing
QUESTION 81
HOTSPOT
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/meet-data-protection-and-regulatory-reqs-using-microsoft-cloud
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/meet-data-protection-and-regulatory-reqs-using-microsoft-cloud
QUESTION 82
All computers run Windows 10 Enterprise and are managed by using Microsoft Intune.
You need to ensure that only Windows security data is sent to Microsoft.
Answer: A
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/intune/device-restrictions-windows-10#reporting-and-telemetry
QUESTION 83
You create a label that encrypts email data. Users report that they cannot use the label in Outlook on the web to protect the email messages they send.
You need to ensure that the users can use the new label to protect their email.
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 84
You have a Microsoft 365 subscription that includes a user named Admin1.
You need to ensure that Admin1 can preserve all the mailbox content of users, including their deleted items.
A. From the Microsoft 365 admin center, assign the Exchange administrator role to Admin1.
B. From the Exchange admin center, assign the Discovery Management admin role to Admin1.
C. From the Azure Active Directory admin center, assign the Service administrator role to Admin1.
D. From the Exchange admin center, assign the Recipient Management admin role to Admin1.
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 85
All computers run Windows 10 Enterprise and have Microsoft Office 365 ProPlus installed. All the computers are joined to Active Directory.
You have a server named Server1 that runs Windows Server 2016. Server1 hosts the telemetry database. You need to prevent private details in the
telemetry data from being transmitted to Microsoft.
Answer: C
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 86
Your company has a Microsoft 365 subscription that includes a user named User1.
You suspect that User1 sent email messages to a competitor detailing company secrets.
You need to recommend a solution to ensure that you can review any email messages sent by User1 to the competitor, including sent items that were
deleted.
What should you include in the recommendation?
Answer: C
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 87
You have a Microsoft 365 subscription.
Yesterday, you created retention labels and published the labels to Microsoft Exchange Online mailboxes.
You need to ensure that the labels will be available for manual assignment as soon as possible.
A. From the Security & Compliance admin center, create a label policy
B. From Exchange Online PowerShell, run Start-RetentionAutoTagLearning
C. From Exchange Online PowerShell, run Start-ManagedFolderAssistant
D. From the Security & Compliance admin center, create a data loss prevention (DLP) policy
Answer: C
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 88
DRAG DROP
You have a site collection named SiteCollection1 that contains a site named Site2. Site2 contains a document library named Customers.
Customers contains a document named Litware.docx. You need to remove Litware.docx permanently.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange
them in the correct order.
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 89
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some questions sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a user named User1. Several users have full access to the mailbox of User1.
Some email messages sent to User1 appear to have been read and deleted before the user viewed them.
When you search the audit log in Security & Compliance to identify who signed in to the mailbox of User1, the results are blank.
You need to ensure that you can view future sign-ins to the mailbox of User1.
A. Yes
B. No
Answer: A
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/exchange/mailboxes/set-mailbox?view=exchange-ps
QUESTION 90
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some questions sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a user named User1. Several users have full access to the mailbox of User1.
Some email messages sent to User1 appear to have been read and deleted before the user viewed them.
When you search the audit log in Security & Compliance to identify who signed in to the mailbox of User1, the results are blank.
You need to ensure that you can view future sign-ins to the mailbox of User1.
A. Yes
B. No
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-audit/set-auditconfig?view=exchange-ps
QUESTION 91
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some questions sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a user named User1. Several users have full access to the mailbox of User1.
Some email messages sent to User1 appear to have been read and deleted before the user viewed them.
When you search the audit log in Security & Compliance to identify who signed in to the mailbox of User1, the results are blank.
You need to ensure that you can view future sign-ins to the mailbox of User1.
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-audit/set-adminauditlogconfig?view=exchange-ps
QUESTION 92
You have a Microsoft SharePoint Online site named Site1. The files in Site1 are protected by using Microsoft Azure Information Protection.
From the Security & Compliance admin center, you create a label that designates personal data.
You need to auto-apply the new label to all the content in Site1.
Answer: D
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/apply-labels-to-personal-data-in-office-365
QUESTION 93
You have a Microsoft 365 subscription.
What should you do from the Security & Compliance admin center?
Answer: C
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/alert-policies
QUESTION 94
A security manager receives an email message every time a data loss prevention (DLP) policy match occurs.
A. From the Security & Compliance admin center, modify the Policy Tips of a DLP policy.
B. From the Cloud App Security admin center, apply a filter to the alerts.
C. From the Security & Compliance admin center, modify the User overrides settings of a DLP policy.
D. From the Security & Compliance admin center, modify the matched activities threshold of an alert policy.
Answer: D
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/alert-policies
QUESTION 95
HOTSPOT
You need to search the audit log to identify why User1 was removed from Group1.
Which two activities should you use in the search? To answer, select the appropriate activities in the answer area.
Hot Area:
A. Answer:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-compliance
QUESTION 96
You create and run a content search from the Security & Compliance admin center.
A. an export key
B. a password
C. a certificate
D. a pin
Answer: A
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/export-search-results
QUESTION 97
HOTSPOT
You have a Microsoft 365 subscription that include three users named User1, User2, and User3.
A file named File1.docx is stored in Microsoft OneDrive. An automated process updates File1.docx every minute.
You create an alert policy named Policy1 as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/alert-policies
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/alert-policies
QUESTION 98
A. 30 days
B. 90 days
C. 365 days
D. 5 years
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-compliance
QUESTION 99
HOTSPOT
You create a retention label named Label1 as shown in the following exhibit.
You publish Label1 to SharePoint sites.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
Hot Area:
A. Answer:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/labels
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/labels
QUESTION 100
You create a retention policy and apply the policy to Exchange Online mailboxes.
You need to ensure that the retention policy tags can be assigned to mailbox items as soon as possible.
Answer: D
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/labels
QUESTION 101
You need to ensure that users can manually designate which content will be subject to data loss prevention (DLP) policies.
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/manage-gdpr-data-subject-requests-with-the-dsr-case-tool#more-information-about-
using-the-dsr-case-tool
QUESTION 102
A user reports that changes were made to several files in Microsoft OneDrive.
You need to identify which files were modified by which users in the user's OneDrive.
A. From the Azure Active Directory admin center, open the audit log
B. From the OneDrive admin center, select Device access
C. From Security & Compliance, perform an eDiscovery search
D. From Microsoft Cloud App Security, open the activity log
Answer: D
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/cloud-app-security/activity-filters
QUESTION 103
HOTSPOT
You are creating a retention policy named Retention1 as shown in the following exhibit.
You apply Retention1 to SharePoint sites and OneDrive accounts.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
Explanation
Explanation/Reference:
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 104
DRAG DROP
A customer requests that you provide her with all documents that reference her by name.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange
them in the correct order.
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/gdpr-dsr-office365
Answer:
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/gdpr-dsr-office365
QUESTION 105
You have a Microsoft 365 subscription. You need to ensure that users can apply retention labels to individual documents in their Microsoft SharePoint
libraries.
Which two actions should you perform? Each correct answer presents part of the solution.
A. From the Cloud App Security admin center, create a file policy.
B. From the SharePoint admin center, modify the Site Settings.
C. From the SharePoint & Compliance admin center, create a label.
D. From the SharePoint admin center, modify the records management settings.
E. From the Security & Compliance admin center, publish a label.
Answer: CE
Explanation/Reference:
Explanation
Explanation/Reference:
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/protect-sharepoint-online-files-with-office-365-labels-and-dlp
QUESTION 106
You recently created and published several labels policies in a Microsoft 365 subscription.
You need to view which labels were applied by users manually and which labels were applied automatically.
What should you do from the Security & Compliance admin center?
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 107
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some questions sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a user named User1. Several users have full access to the mailbox of User1.
Some email messages sent to User1 appear to have been read and deleted before the user viewed them.
When you search the audit log in Security & Compliance to identify who signed in to the mailbox of User1, the results are blank.
You need to ensure that you can view future sign-ins to the mailbox of User1.
A. Yes
B. No
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/powershell/module/exchange/mailboxes/set-mailbox?view=exchange-ps
QUESTION 108
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some questions sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 subscription that contains the users shown in the following table.
You discover that all the users in the subscription can access Compliance Manager reports.
You need to recommend a solution to prevent a user named User5 from accessing the Compliance Manager reports.
Solution: You recommend assigning the Compliance Manager Reader role to User1.
A. Yes
B. No
Answer: A
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/working-with-compliance-manager
QUESTION 109
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some questions sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 subscription that contains the users shown in the following table.
You discover that all the users in the subscription can access Compliance Manager reports.
You need to recommend a solution to prevent a user named User5 from accessing the Compliance Manager reports.
A. Yes
B. No
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/working-with-compliance-manager
QUESTION 110
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some questions sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 subscription that contains the users shown in the following table.
You discover that all the users in the subscription can access Compliance Manager reports.
You need to recommend a solution to prevent a user named User5 from accessing the Compliance Manager reports.
Solution: You recommend assigning the Compliance Manager Reader role to User5.
A. Yes
B. No
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/working-with-compliance-manager
QUESTION 111
You plan to provide a user named Auditor with the ability to review audit logs.
You remove Auditor from the Global administrator role group and enable auditing.
A. Security reader
B. Compliance administrator
C. Security operator
D. Security administrator
Answer: C
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/permissions-in-the-security-and-compliance-center
QUESTION 112
You have a Microsoft 365 subscription.
You need to identify which mailbox and which Microsoft SharePoint site collection are associated to Team1.
A. Get-UnifiedGroup
B. Get-MailUser
C. Get-TeamMessagingSettings
D. Get-TeamChannel
Answer: A
Explanation/Reference:
Explanation
Explanation/Reference:
QUESTION 113
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might
meet the stated goals. Some questions sets
might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 subscription that contains the users shown in the following table.
You discover that all the users in the subscription can access Compliance Manager reports.
You need to recommend a solution to prevent a user named User5 from accessing the Compliance Manager reports.
Solution: You recommend removing User1 from the Compliance Manager Contributor role.
A. Yes
B. No
Answer: B
Explanation/Reference:
Explanation
Explanation/Reference:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/working-with-compliance-manager