Microsoft 365 Mobility and Security v1.0 (MS-101)

Page:    1 / 14   
Total 205 questions

Case Study -

Overview -
Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.
The company has the employees and devices shown in the following table.


Contoso recently purchased a Microsoft 365 E5 subscription.

Existing Environment -
The network contains an on-premises Active Directory forest named contoso.com. The forest contains the servers shown in the following table.

All servers run Windows Server 2016. All desktops and laptops run Windows 10 Enterprise and are joined to the domain.
The mobile devices of the users in the Montreal and Seattle offices run Android. The mobile devices of the users in the New York office run iOS.
The domain is synced to Azure Active Directory (Azure AD) and includes the users shown in the following table.

The domain also includes a group named Group1.

Requirements -

Planned Changes -
Contoso plans to implement the following changes:
Implement Microsoft 365.
Manage devices by using Microsoft Intune.
Implement Azure Advanced Threat Protection (ATP).
Every September, apply the latest feature updates to all Windows computers. Every March, apply the latest feature updates to the computers in the New York office only.

Technical Requirements -
Contoso identifies the following technical requirements:
When a Windows 10 device is joined to Azure AD, the device must enroll in Intune automatically.
Dedicated support technicians must enroll all the Montreal office mobile devices in Intune.
User1 must be able to enroll all the New York office mobile devices in Intune.
Azure ATP sensors must be installed and must NOT use port mirroring.
Whenever possible, the principle of least privilege must be used.

A Microsoft Store for Business must be created.

Compliance Requirements -
Contoso identifies the following compliance requirements:
Ensure that the users in Group1 can only access Microsoft Exchange Online from devices that are enrolled in Intune and configured in accordance with the corporate policy.
Configure Windows Information Protection (WIP) for the Windows 10 devices.


HOTSPOT -
You need to meet the technical requirements and planned changes for Intune.
What should you do? To answer, select the appropriate options is the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:



Answer :

Reference:
https://docs.microsoft.com/en-us/intune/windows-enroll
Implement modern device services

Case Study -

Overview -
ADatum Corporation is an international financial services company that has 5,000 employees.
ADatum has six offices: a main office in New York and five branch offices in Germany, the United Kingdom, France, Spain, and Italy.
All the offices are connected to each other by using a WAN link. Each office connects directly to the Internet.

Existing Environment -

Current Infrastructure -
ADatum recently purchased a Microsoft 365 subscription.
All user files are migrated to Microsoft 365.
All mailboxes are hosted in Microsoft 365. The users in each office have email suffixes that include the country of the user, for example, [email protected] or [email protected]
Each office has a security information and event management (SIEM) appliance. The appliance comes from three different vendors.
ADatum uses and processes Personally Identifiable Information (PII).

Problem Statements -
ADatum entered into litigation. The legal department must place a hold on all the documents of a user named User1 that are in Microsoft 365.

Requirements -

Business Goals -
ADatum wants to be fully compliant with all the relevant data privacy laws in the regions where is operates.
ADatum wants to minimize the cost of hardware and software whenever possible.

Technical Requirements -
ADatum identifies the following technical requirements:
Centrally perform log analysis for all offices.
Aggregate all data from the SIEM appliances to a central cloud repository for later analysis.
Ensure that a SharePoint administrator can identify who accessed a specific file stored in a document library.
Provide the users in the finance department with access to Service assurance information in Microsoft Office 365.
Ensure that documents and email messages containing the PII data of European Union (EU) citizens are preserved for 10 years.
If a user attempts to download 1,000 or more files from Microsoft SharePoint Online within 30 minutes, notify a security administrator and suspend the user’s user account.
A security administrator requires a report that shown which Microsoft 365 users signed in. Based on the report, the security administrator will create a policy to require multi-factor authentication when a sign-in is high risk.
Ensure that the users in the New York office can only send email messages that contain sensitive U.S. PII data to other New York office uses. Email messages must be monitored to ensure compliance. Auditors in the New York office must have access to reports that show the sent and received email messages containing sensitive U.S. PII data.

You need to recommend a solution for the security administrator. The solution must meet the technical requirements.
What should you include in the recommendation?

  • A. Microsoft Azure Active Directory (Azure AD) Privileged Identity Management
  • B. Microsoft Azure Active Directory (Azure AD) Identity Protection
  • C. Microsoft Azure Active Directory (Azure AD) conditional access policies
  • D. Microsoft Azure Active Directory (Azure AD) authentication methods


Answer : C

References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/untrusted-networks
Implement Microsoft 365 security and threat management

You have a Microsoft 365 subscription.
Your company purchases a new financial application named App1.
From Cloud Discovery in Microsoft Cloud App Security, you view the Discovered apps page and discover that many applications have a low score because they are missing information about domain registration and consumer popularity.
You need to prevent the missing information from affecting the App1 score.
What should you configure from the Cloud Discover settings?

  • A. Organization details
  • B. Default behavior
  • C. Score metrics
  • D. App tags


Answer : D

References:
https://docs.microsoft.com/en-us/cloud-app-security/discovered-app-queries

Your network contains an on-premises Active Directory domain.
Your company has a security policy that prevents additional software from being installed on domain controllers.
You need to monitor a domain controller by using Microsoft Azure Advanced Threat Protection (ATP).
What should you do? More than one answer choice may achieve the goal. Select the BEST answer.

  • A. Deploy an Azure ATP sensor, and then configure port mirroring.
  • B. Deploy an Azure ATP sensor, and then configure detections.
  • C. Deploy an Azure ATP standalone sensor, and then configure detections.
  • D. Deploy an Azure ATP standalone sensor, and then configure port mirroring.


Answer : D

References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/install-atp-step5

DRAG DROP -
You create a Microsoft 365 subscription.
You need to create a deployment plan for Microsoft Azure Advanced Threat Protection (ATP).
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:




Answer :

References:
https://blog.ahasayen.com/azure-advanced-threat-protection-deployment/

You implement Microsoft Azure Advanced Threat Protection (Azure ATP).
You have an Azure ATP sensor configured as shown in the following exhibit.


How long after the Azure ATP cloud service is updated will the sensor update?

  • A. 72 hours
  • B. 12 hours
  • C. 48 hours
  • D. 7 days
  • E. 24 hours


Answer : E

References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-whats-new

HOTSPOT -
Your company uses Microsoft Defender Advanced Threat Protection (ATP). Microsoft Defender ATP contains the device groups shown in the following table.


You onboard computers to Microsoft Defender ATP as shown in the following table.

Of which groups are Computer1 and Computer2 members? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:



Answer :

DRAG DROP -
You have a Microsoft 365 subscription.
You have the devices shown in the following table.


You need to onboard the devices to Microsoft Defender Advanced Threat Protection (ATP). The solution must avoid installing software on the devices whenever possible.
Which onboarding method should you use for each operating system? To answer, drag the appropriate methods to the correct operating systems. Each method may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:



Answer :

References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/configure-endpoints-windows-defender-advanced-threat-protection https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat- protection

The users at your company use Dropbox Business to store documents. The users access Dropbox Business by using the MyApps portal.
You need to ensure that user access to Dropbox Business is authenticated by using a Microsoft 365 identity. The documents must be protected if the data is downloaded to a device that is not trusted.
What should you do?

  • A. From the Device Management admin center, configure conditional access settings.
  • B. From the Azure Active Directory admin center, configure the device settings.
  • C. From the Azure Active Directory admin center, configure application proxy settings.
  • D. From the Device Management admin center, configure device enrollment settings.


Answer : C

Explanation:
Azure Active Directory's Application Proxy provides secure remote access to on-premises web applications. After a single sign-on to Azure AD, users can access both cloud and on-premises applications through an external URL or an internal application portal.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/application-proxy

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 subscription.
You discover that some external users accessed content on a Microsoft SharePoint site. You modify the SharePoint sharing policy to prevent sharing outside your organization.
You need to be notified if the SharePoint sharing policy is modified in the future.
Solution: From the SharePoint admin center, you modify the sharing settings.
Does this meet the goal?

  • A. Yes
  • B. No


Answer : B

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 subscription.
You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are connected to your on-premises network.
Solution: From the Device Management admin center, you create a trusted location and a compliance policy
Does this meet the goal?

  • A. Yes
  • B. No


Answer : B

Explanation:
Conditional Access in SharePoint Online can be configured to use an IP Address white list to allow access.
References:
https://techcommunity.microsoft.com/t5/Microsoft-SharePoint-Blog/Conditional-Access-in-SharePoint-Online-and-OneDrive-for/ba-p/46678

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 subscription.
You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are connected to your on-premises network.
Solution: From the Microsoft 365 admin center, you configure the Organization profile settings.
Does this meet the goal?

  • A. Yes
  • B. No


Answer : B

Explanation:
Conditional Access in SharePoint Online can be configured to use an IP Address white list to allow access.
References:
https://techcommunity.microsoft.com/t5/Microsoft-SharePoint-Blog/Conditional-Access-in-SharePoint-Online-and-OneDrive-for/ba-p/46678A

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 subscription.
You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are connected to your on-premises network.
Solution: From the Azure Active Directory admin center, you create a trusted location and a conditional access policy.
Does this meet the goal?

  • A. Yes
  • B. No


Answer : A

Explanation:
Conditional Access in SharePoint Online can be configured to use an IP Address white list to allow access.
References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition https://techcommunity.microsoft.com/t5/Microsoft-SharePoint-Blog/Conditional-Access-in-SharePoint-Online-and-OneDrive-for/ba-p/46678

HOTSPOT -
You have Microsoft 365 subscription.
You create an alert policy as shown in the following exhibit.


Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Hot Area:



Answer :

Explanation:
Note: The Aggregation settings has a 120 minute window

You have a Microsoft 365 subscription.
All users have their email stored in Microsoft Exchange Online.
In the mailbox of a user named User1, you need to preserve a copy of all the email messages that contain the word ProjectX.
What should you do?

  • A. From the Security & Compliance admin center, create a label and a label policy.
  • B. From the Exchange admin center, create a mail flow rule.
  • C. From the Security & Compliance admin center, start a message trace.
  • D. From Exchange admin center, start a mail flow message trace.


Answer : A

References:
https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-classification

Page:    1 / 14   
Total 205 questions