Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Exam Free

MS-101 Practice Exam Free

Table of Contents

Toggle
  • MS-101 Practice Exam Free – 50 Questions to Simulate the Real Exam
  • Free Access Full MS-101 Practice Exam Free

MS-101 Practice Exam Free – 50 Questions to Simulate the Real Exam

Are you getting ready for the MS-101 certification? Take your preparation to the next level with our MS-101 Practice Exam Free – a carefully designed set of 50 realistic exam-style questions to help you evaluate your knowledge and boost your confidence.

Using a MS-101 practice exam free is one of the best ways to:

  • Experience the format and difficulty of the real exam
  • Identify your strengths and focus on weak areas
  • Improve your test-taking speed and accuracy

Below, you will find 50 realistic MS-101 practice exam free questions covering key exam topics. Each question reflects the structure and challenge of the actual exam.

Question 1

HOTSPOT -
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.
You need to create a policy that will generate an email alert when a banned app is detected requesting permission to access user information or data in the subscription.
What should you configure? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: OAuth app –
In addition to the existing investigation of OAuth apps connected to your environment, you can set permission policies so that you get automated notifications when an OAuth app meets certain criteria. For example, you can automatically be alerted when there are apps that require a high permission level and were authorized by more than 50 users.
Box 2: Permission level –
OAuth app policies enable you to investigate which permissions each app requested and which users authorized them for Office 365, Google Workspace, and
Salesforce. You’re also able to mark these permissions as approved or banned. Marking them as banned will revoke permissions for each app for each user who authorized it.
Reference:
https://docs.microsoft.com/en-us/defender-cloud-apps/app-permission-policy

Question 2

You need to meet the technical requirement for large-volume document retrieval.
What should you create?

A. an activity policy from Microsoft Defender for Cloud Apps

B. a data loss prevention (DLP) policy from the Microsoft 365 compliance center

C. a file policy from Microsoft Defender for Cloud Apps

D. an alert policy from the Microsoft 365 compliance center

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/activity-policies-and-alerts

Question 3

You have a Microsoft 365 subscription.
You need to view the IP address from which a user synced a Microsoft SharePoint Online library.
What should you do?

A. From the SharePoint Online admin center, view the usage reports.

B. From the Microsoft 365 compliance center, perform an audit log search.

C. From the Microsoft 365 admin center, view the usage reports.

D. From the Microsoft 365 admin center, view the properties of the user’s user account.

 


Suggested Answer: B

References:
https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-compliance

Question 4

Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named contoso.com. The tenant contains computers that run Windows 10 Enterprise and are managed by using Microsoft Endpoint Manager. The computers are configured as shown in the following table.
 Image
You plan to implement Windows Defender Application Guard for contoso.com.
You need to identify on which two Windows 10 computers Windows Defender Application Guard can be installed.
Which two computers should you identify? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. Computer1

B. Computer3

C. Computer2

D. Computer4

 


Suggested Answer: BC

Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard

Question 5

You have a Microsoft 365 subscription.
You need to configure a compliance solution that meets the following requirements:
•	Defines sensitive data based on existing data samples.
•	Automatically prevents data that matches the samples from being shared externally in Microsoft SharePoint Online or email messages.
Which two components should you configure? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. a trainable classifier

B. a sensitive info type

C. an adaptive policy scope

D. a data loss prevention (DLP) policy

E. an insider risk policy

 


Suggested Answer: BE

 

Question 6

HOTSPOT -
You configure a data loss prevention (DLP) policy named DLP1 as shown in the following exhibit.
 Image
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Using a retention label in a policy is only supported for items in SharePoint Online and OneDrive for Business.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-policies?view=o365-worldwide#using-a-retention-label-as-a-condition-in-a-dlp-
policy

Question 7

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant that contains a user named User1.
Your company purchases a Microsoft 365 subscription.
You need to ensure that User1 is assigned the required role to create file policies and manage alerts in the Defender for Cloud Apps admin center.
Solution: From the Security & Compliance admin center, you assign the Security Administrator role to User1.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

Security Administrator has the required permissions, but it is not assigned from the Security and Compliance Center.
Reference:
https://docs.microsoft.com/en-us/cloud-app-security/manage-admins

Question 8

DRAG DROP -
Your company has a Microsoft 365 E5 tenant.
Users access resources in the tenant by using both personal and company-owned Android devices. Company policies requires that the devices have a threat level of medium or lower to access Microsoft Exchange Online mailboxes.
You need to recommend a solution to identify the threat level of the devices and to control access of the devices to the resources.
What should you include in the solution for each device type? To answer, drag the appropriate components to the correct devices. Each component may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 9

You have a Microsoft 365 E5 subscription that uses Microsoft SharePoint Online.
You need to enable co-authoring for files that are encrypted by using sensitivity labels.
What should you use?

A. the Microsoft 365 Defender portal

B. the SharePoint admin center

C. the Microsoft 365 admin center

D. the Microsoft 365 compliance center

 


Suggested Answer: D

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels-coauthoring?view=o365-worldwide

Question 10

HOTSPOT -
You have three devices enrolled in Microsoft Endpoint Manager as shown in the following table.
 Image
The device compliance policies in Endpoint Manager are configured as shown in the following table.
 Image
The device compliance policies have the assignments shown in the following table.
 Image
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 11

Your on-premises network contains the device types shown in the following table.
 Image
You plan to deploy an in-place upgrade to a 64-bit version of Windows 10 Enterprise by using the Microsoft Deployment Toolkit (MDT).
Which device types will support an in-place upgrade?

A. Type4 and Type5 only

B. Type3, Type4, and Type5 only

C. Type1, Type4, and Type5 only

D. Type1, Type2, and Type5 only

 


Suggested Answer: A

MDT has many useful features, such as:
* UEFI support. Supports deployment to machines using Unified Extensible Firmware Interface (UEFI) version 2.3.1.
* Offline BitLocker. Provides the capability to have BitLocker enabled during the Windows Preinstallation Environment (Windows PE) phase, thus saving hours of encryption time.
* Deploy to VHD. Provides ready-made task sequence templates for deploying Windows into a virtual hard disk (VHD) file.
Incorrect:
Not Type1: The upgrade process cannot change from a 32-bit operating system to a 64-bit due to the possible complications with drivers and applications it may bring.
Not Type2, not Type3: Boot images are the Windows Preinstallation Environment (Windows PE) images that are used to start the deployment.
You’re not able to use a custom image of Windows 10 for the In-Place Upgrade scenario. You’d have to use the install.wim image provided with the latest
Windows 10 media that Microsoft has released.
Reference:
https://msendpointmgr.com/2015/10/26/deploy-windows-10-enterprise-using-in-place-upgrade/
https://docs.microsoft.com/en-us/windows/deployment/deploy-windows-mdt/get-started-with-the-microsoft-deployment-toolkit

Question 12

A user receives the following message when attempting to sign in to https://myapps.microsoft.com:
`Your sign-in was blocked. We've detected something unusual about this sign-in. For example, you might be signing in from a new location, device, or app. Before you can continue, we need to verify your identity. Please contact your admin.`
Which configuration prevents the users from signing in?

A. Microsoft Azure Active Directory (Azure AD) Identity Protection policies

B. Microsoft Azure Active Directory (Azure AD) conditional access policies

C. Endpoint Manager compliance policies

D. Security & Compliance data loss prevention (DLP) policies

 


Suggested Answer: B

References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview
https://docs.microsoft.com/en-us/mem/intune/protect/device-compliance-get-started

Question 13

You have a Microsoft 365 tenant.
You plan to manage incidents in the tenant by using the Microsoft 365 Defender.
Which Microsoft service source will appear on the Incidents page of the Microsoft 365 Defender?

A. Microsoft Defender for Cloud Apps

B. Azure Sentinel

C. Azure Web Application Firewall

D. Azure Information Protection

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/defender/investigate-alerts?view=o365-worldwide

Question 14

HOTSPOT
-
You have a Microsoft 365 E5 subscription that contains a user named User1 and the administrators shown in the following table.
 Image
User1 reports that after sending 1,000 email messages in the morning, the user is blocked from sending additional emails.
You need to identify the following:
•	Which administrators can unblock User1
•	What to configure to allow User1 to send at least 2,000 emails per day without being blocked
What should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 15

You have a Microsoft 365 subscription that uses Microsoft Defender for Cloud Apps.
You configure a session control policy to block downloads from SharePoint Online sites.
Users report that they can still download files from SharePoint Online sites.
You need to ensure that file download is blocked while still allowing users to browse SharePoint Online sites.
What should you configure?

A. an access policy

B. a data loss prevention (DLP) policy

C. an activity policy

D. a Conditional Access policy

 


Suggested Answer: D

 

Question 16

DRAG DROP -
You have a Microsoft 365 E5 tenant.
You need to implement compliance solutions that meet the following requirements:
✑ Use a file plan to manage retention labels.
✑ Identify, monitor, and automatically protect sensitive information.
Capture employee communications for examination by designated reviewers.
 Image
Which solution should you use for each requirement? To answer, drag the appropriate solutions to the correct requirements. Each solution may be used once, more than once, or not at all. You may need to drag the split bat between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide
https://docs.microsoft.com/en-us/microsoft-365/compliance/communication-compliance?view=o365-worldwide
https://docs.microsoft.com/en-us/microsoft-365/compliance/file-plan-manager?view=o365-worldwide

Question 17

HOTSPOT -
You have a Microsoft 365 subscription.
You are planning a threat management solution for your organization.
You need to minimize the likelihood that users will be affected by the following threats:
✑ Opening files in Microsoft SharePoint that contain malicious content
✑ Impersonation and spoofing attacks in email messages
Which policies should you create in the Microsoft 365 Defender? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: ATP Safe Attachments –
ATP Safe Attachments provides zero-day protection to safeguard your messaging system, by checking email attachments for malicious content. It routes all messages and attachments that do not have a virus/malware signature to a special environment, and then uses machine learning and analysis techniques to detect malicious intent. If no suspicious activity is found, the message is forwarded to the mailbox.
Box 2: ATP anti-phishing –
ATP anti-phishing protection detects attempts to impersonate your users and custom domains. It applies machine learning models and advanced impersonation- detection algorithms to avert phishing attacks.
ATP Safe Links provides time-of-click verification of URLs, for example, in emails messages and Office files. Protection is ongoing and applies across your messaging and Office environment. Links are scanned for each click: safe links remain accessible and malicious links are dynamically blocked.
References:
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/office-365-atp#configure-atp-policies

Question 18

Your company has a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You sign for Microsoft Store for Business.
The tenant contains the users shown in the following table.
 Image
Microsoft Store for Business has the following Shopping behavior settings:
✑ Allow users to shop is set to On
✑ Make everyone a Basic Purchaser is set to Off
You need to identify which users can install apps from the Microsoft for Business private store.
Which users should you identify?

A. User3 only

B. User1 only

C. User1 and User2 only

D. User3 and User4 only

 


Suggested Answer: C

Allow users to shop controls the shopping experience in Microsoft Store for Education. When this setting is on, Purchasers and Basic Purchasers can purchase products and services from Microsoft Store for Education.
References:
https://docs.microsoft.com/en-us/microsoft-store/acquire-apps-microsoft-store-for-business

Question 19

HOTSPOT -
You have a Microsoft 365 E5 subscription that uses Microsoft Intune.
You have devices enrolled in Intune as shown in the following table.
 Image
You create the device configuration profiles shown in the following table.
 Image
Which profiles will be applied to each device? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 20

DRAG DROP -
You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1.
You need to automatically label the documents on Site1 that contain credit card numbers.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide#what-label-policies-can-do
https://docs.microsoft.com/en-us/microsoft-365/compliance/apply-sensitivity-label-automatically?view=o365-worldwide

Question 21

HOTSPOT
-
You have a Microsoft 365 E5 tenant.
You create a data loss prevention (DLP) policy to prevent users from using Microsoft Teams to share internal documents with external users.
To which two locations should you apply the policy? To answer, select the appropriate locations in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 22

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You create a Microsoft Defender for Identity instance named Contoso.
The tenant contains the users shown in the following table.
 Image
You need to modify the configuration of the Defender for Identity sensors.
Solution: You instruct User1 to modify the Defender for Identity sensor configuration.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

Only Azure ATP administrators can modify the sensors.
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-role-groups

Question 23

HOTSPOT -
Your network contains an Active Directory domain named contoso.com. The domain contains the file servers shown in the following table.
 Image
A file named File1.abc is stored on Server1. A file named File2.abc is stored on Server2. Three apps named App1, App2 and App3 are installed on a Windows 10 device named Device1. All three apps open files that have the .abc file extension.
You implement Windows Information Protection (WIP) by creating a policy named Policy1 that has the following configuration:
✑ Exempt apps: App2
✑ Protected apps: App1
✑ Windows Information Protection mode: Block
✑ Network boundary: IPv4 range of: 192.168.1.1-192.168.1.255
You ensure that Policy1 applies to Device1.
You need to identify the apps from which you can open File1.abc.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure

Question 24

You have a Microsoft 365 E5 tenant that contains the devices shown in the following table.
 Image
You plan to review device startup performance issues by using Endpoint analytics.
Which devices can you monitor by using Endpoint analytics?

A. Device1 only

B. Device1 and Device2 only

C. Device1, Device2, and Device3 only

D. Device1, Device2, and Device4 only

E. Device1, Device2, Device3, and Device4

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/mem/analytics/overview

Question 25

You enable the Azure AD Identity Protection weekly digest email.
You create the users shown in the following table.
 Image
Which users will receive the weekly digest email automatically?

A. Admin2, Admin3, and Admin4 only

B. Admin1, Admin2, Admin3, and Admin4

C. Admin2 and Admin3 only

D. Admin3 only

E. Admin1 and Admin3 only

 


Suggested Answer: E

By default, all Global Admins receive the email. Any newly created Global Admins, Security Readers or Security Administrators will automatically be added to the recipients list.

Question 26

HOTSPOT -
Your company uses Microsoft Defender for Cloud Apps.
You plan to integrate Defender for Cloud Apps and security information and event management (SIEM).
You need to deploy a SIEM agent on a server that runs Windows Server 2016.
What should you do? To answer, select the appropriate settings in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

References:
https://docs.microsoft.com/en-us/office365/securitycompliance/integrate-your-siem-server-with-office-365-cas

Question 27

You have a Microsoft 365 tenant.
Company policy requires that all Windows 10 devices meet the following minimum requirements:
✑ Require complex passwords.
✑ Require the encryption of data storage devices.
Have Microsoft Defender Antivirus real-time protection enabled.
 Image
You need to prevent devices that do not meet the requirements from accessing resources in the tenant.
Which two components should you create? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. a configuration policy

B. a compliance policy

C. a security baseline profile

D. a conditional access policy

E. a configuration profile

 


Suggested Answer: BD

Reference:
https://docs.microsoft.com/en-us/mem/intune/protect/device-compliance-get-started

Question 28

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer that runs Windows 10.
You need to verify which version of Windows 10 is installed.
Solution: From Device Manager, you view the computer properties.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

Reference:
https://support.microsoft.com/en-us/windows/which-version-of-windows-operating-system-am-i-running-628bec99-476a-2c13-5296-9dd081cdd808

Question 29

You have Windows 10 devices that are managed by using Microsoft Endpoint Manager.
You need to configure the security settings in Microsoft Edge.
What should you create in Microsoft Endpoint Manager?

A. an app configuration policy

B. an app

C. a device configuration profile

D. a device compliance policy

 


Suggested Answer: C

Reference:
https://docs.microsoft.com/en-us/deployedge/configure-edge-with-intune

Question 30

DRAG DROP -
Your company purchases a cloud app named App1.
You need to ensure that you can use Microsoft Defender for Cloud Apps to block downloads in App1. App1 supports session controls.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/cloud-app-security/getting-started-with-cloud-app-security
https://docs.microsoft.com/en-us/defender-for-identity/integrate-mde

Question 31

HOTSPOT -
You have three devices enrolled in Microsoft Endpoint Manager as shown in the following table.
 Image
The device compliance policies in Endpoint Manager are configured as shown in the following table.
 Image
The device compliance policies have the assignments shown in the following table.
 Image
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 32

You need to recommend a solution for the security administrator. The solution must meet the technical requirements.
What should you include in the recommendation?

A. Microsoft Azure Active Directory (Azure AD) Privileged Identity Management

B. Microsoft Azure Active Directory (Azure AD) Identity Protection

C. Microsoft Azure Active Directory (Azure AD) conditional access policies

D. Microsoft Azure Active Directory (Azure AD) authentication methods

 


Suggested Answer: C

References:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/untrusted-networks

Question 33

You have a Microsoft 365 subscription.
All users have their email stored in Microsoft Exchange Online.
In the mailbox of a user named User1, you need to preserve a copy of all the email messages that contain the word ProjectX.
What should you do first?

A. From the Microsoft Purview compliance portal, create a label and a label policy.

B. From the Exchange admin center, create a mail flow rule.

C. From the Microsoft Purview compliance portal, create a data loss prevention (DLP) policy.

D. From Microsoft Defender for Cloud Apps, create an activity policy.

 


Suggested Answer: A

 

Question 34

In Microsoft 365, you configure a data loss prevention (DLP) policy named Policy1. Policy1 detects the sharing of United States (US) bank account numbers in email messages and attachments.
Policy1 is configured as shown in the exhibit. (Click the Exhibit tab.)
 Image
You need to ensure that internal users can email documents that contain US bank account numbers to external users who have an email suffix of contoso.com.
What should you configure?

A. an exception

B. an action

C. a condition

D. a group

 


Suggested Answer: A

You need to add an exception. In the Advanced Settings of the DLP policy, there is an ‘Add Exception’ button. This gives you several options that you can select as the exception. One of the options is ‘except when recipient domain is’. Select that option and enter the domain name: contoso.com.
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies#how-dlp-policies-work

Question 35

You have a Microsoft 365 E5 subscription.
You need to be notified if users receive email containing a file that has a virus.
What should you do?

A. From the Exchange admin center, create an in-place eDiscovery & hold.

B. From the Exchange admin center, create a spam filter policy.

C. From the Exchange admin center, create an anti-malware policy.

D. From the Exchange admin center, create a mail flow rule.

 


Suggested Answer: C

Reference:
https://docs.microsoft.com/en-us/office365/servicedescriptions/exchange-online-service-description/anti-spam-and-anti-malware-protection

Question 36

HOTSPOT
-
You have a Microsoft 365 E5 tenant.
You need to ensure that administrators are notified when a user receives an email message that contains malware. The solution must use the principle of least privilege.
Which type of policy should you create, and which Microsoft Purview solutions role is required to create the policy? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 37

You plan to use the Security & Compliance admin center to import several PST files into Microsoft 365 mailboxes.
Which three actions should you perform before you import the data? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. From the Exchange admin center, create a public folder.

B. Copy the PST files by using AzCopy.

C. From the Exchange admin center, assign admin roles.

D. From the Microsoft Azure portal, create a storage account that has a blob container.

E. From the Microsoft 365 admin center, deploy an add-in.

F. Create a mapping file that uses the CSV file format.

 


Suggested Answer: BCF

References:
https://docs.microsoft.com/en-us/office365/securitycompliance/use-network-upload-to-import-pst-files

Question 38

You configure a conditional access policy. The locations settings are configured as shown in the Locations exhibit. (Click the Locations tab.)
 Image
The users and groups settings are configured as shown in the Users and Groups exhibit. (Click Users and Groups tab.)
 Image
Members of the Security reader group report that they cannot sign in to Microsoft Active Directory (Azure AD) on their device while they are in the office.
You need to ensure that the members of the Security reader group can sign in in to Azure AD on their device while they are in the office. The solution must use the principle of least privilege.
What should you do?

A. From the conditional access policy, configure the device state.

B. From the Azure Active Directory admin center, create a custom control.

C. From the Endpoint Manager admin center, create a device compliance policy.

D. From the Azure Active Directory admin center, create a named location.

 


Suggested Answer: D

Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition

Question 39

Your company has five security information and event management (SIEM) appliances. The traffic logs from each appliance are saved to a file share named Logs.
You need to analyze the traffic logs.
What should you do from Microsoft Defender for Cloud Apps?

A. Click Investigate, and then click Activity log.

B. Click Control, and then click Policies. Create a file policy.

C. Click Discover, and then click Create snapshot report.

D. Click Investigate, and then click Files.

 


Suggested Answer: C

Reference:
https://docs.microsoft.com/en-us/cloud-app-security/create-snapshot-cloud-discovery-reports

Question 40

You have an Azure AD tenant that contains a user named User1. User1 has the devices shown in the following table.
 Image
The Device settings are configured as shown in the following exhibit.
 Image
How many of the devices can User1 join to Azure AD?

A. 1

B. 2

C. 3

D. 4

 


Suggested Answer: A

 

Question 41

You have a Microsoft 365 tenant that contains 1,000 Windows 10 devices. The devices are enrolled in Microsoft Intune.
Company policy requires that the devices have the following configurations:
✑ Require complex passwords.
✑ Require the encryption of removable data storage devices.
✑ Have Microsoft Defender Antivirus real-time protection enabled.
You need to configure the devices to meet the requirements.
What should you use?

A. an app configuration policy

B. a compliance policy

C. a security baseline profile

D. a conditional access policy

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/mem/intune/protect/device-compliance-get-started

Question 42

HOTSPOT -
Your network contains an Active Directory domain named contoso.com that uses Microsoft System Center Configuration Manager (Current Branch).
You have Windows 10 and Windows 8.1 devices.
You need to ensure that you can analyze the upgrade readiness of all the Windows 8.1 devices and analyze the update compliance of all the Windows 10 devices.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

References:
https://docs.microsoft.com/en-us/windows/deployment/upgrade/upgrade-readiness-get-started
https://docs.microsoft.com/en-us/windows/deployment/update/update-compliance-get-started

Question 43

You have a Microsoft 365 E5 subscription that contains 500 users. Two hundred users have personal devices that run either Android, Windows 10, or macOS. Three hundred users have corporate-owned devices that run either Windows 10 or macOS.
You plan to configure device enrollment.
You need to ensure that you can apply separate policies to the corporate-owned devices and the personal devices. The solution must minimize administrative effort.
What should you create first?

A. a dynamic device group

B. a dynamic user group

C. a deployment package

D. a Microsoft 365 group

 


Suggested Answer: A

 

Question 44

Your company has a Microsoft 365 subscription. The subscription contains 500 devices that run Windows 10 and 100 devices that run iOS.
You need to create Microsoft Endpoint Manager device configuration profiles to meet the following requirements:
✑ Configure Wi-Fi connectivity to a secured network named ContosoNet.
✑ Require passwords of at least six characters to lock the devices.
What is the minimum number of device configuration profiles that you should create?

A. 4

B. 2

C. 1

 


Suggested Answer: B

 

Question 45

You need to create the Safe Attachments policy to meet the technical requirements.
Which option should you select?

A. Replace

B. Enable redirect

C. Block

D. Dynamic Delivery

 


Suggested Answer: D

Reference:
https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-365/security/office-365-security/safe-attachments.md

Question 46

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a new Microsoft 365 subscription.
You need to prevent users from sending email messages that contain Personally Identifiable Information (PII).
Solution: From the Microsoft 365 compliance center, you create a data loss prevention (DLP) policy.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

In Microsoft 365, you can create a data loss prevention (DLP) policy in two different admin centers:
✑ In the Security & Compliance admin center (now known as the Microsoft 365 Compliance Center), you can create a single DLP policy to help protect content in
SharePoint, OneDrive, Exchange, Teams, and now Endpoint Devices.
✑ In the Exchange admin center, you can create a DLP policy to help protect content only in Exchange.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/how-dlp-works-between-admin-centers?view=o365-worldwide

Question 47

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a new Microsoft 365 subscription.
You need to prevent users from sending email messages that contain Personally Identifiable Information (PII).
Solution: From the Azure portal, you create a Microsoft Azure Information Protection label and an Azure Information Protection policy.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

 

Question 48

HOTSPOT -
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You have three applications named App1, App2, and App3. The apps use files that have the same file extensions.
Your company uses Windows Information Protection (WIP). WIP has the following configurations:
✑ Windows Information Protection mode: Silent
✑ Protected apps: App1
✑ Exempt apps: App2
From App1, you create a file named File1.
What is the effect of the configurations? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

References:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure

Question 49

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 subscription.
You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are connected to your on-premises network.
Solution: From the Device Management admin center, you create a device configuration profile.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

 

Question 50

HOTSPOT
-
You configure a data loss prevention (DLP) policy named DLP1 with a rule configured as shown in the following exhibit.
 Image
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Free Access Full MS-101 Practice Exam Free

Looking for additional practice? Click here to access a full set of MS-101 practice exam free questions and continue building your skills across all exam domains.

Our question sets are updated regularly to ensure they stay aligned with the latest exam objectives—so be sure to visit often!

Good luck with your MS-101 certification journey!

Share18Tweet11
Previous Post

MS-100 Practice Exam Free

Next Post

MS-102 Practice Exam Free

Next Post

MS-102 Practice Exam Free

MS-203 Practice Exam Free

MS-500 Practice Exam Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.