Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Questions Free

MS-101 Practice Questions Free

Table of Contents

Toggle
  • MS-101 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills
  • Free Access Full MS-101 Practice Questions Free

MS-101 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills

Are you preparing for the MS-101 certification exam? Kickstart your success with our MS-101 Practice Questions Free – a carefully selected set of 50 real exam-style questions to help you test your knowledge and identify areas for improvement.

Practicing with MS-101 practice questions free gives you a powerful edge by allowing you to:

  • Understand the exam structure and question formats
  • Discover your strong and weak areas
  • Build the confidence you need for test day success

Below, you will find 50 free MS-101 practice questions designed to match the real exam in both difficulty and topic coverage. They’re ideal for self-assessment or final review. You can click on each Question to explore the details.

Question 1

You have a Microsoft 365 E5 subscription.
You need to identify which users accessed Microsoft Office 365 from anonymous IP addresses during the last seven days.
What should you do?

A. From the Defender for Cloud Apps admin center, select Users and accounts.

B. From the Microsoft 365 Defender, view the Threat tracker.

C. From the Microsoft 365 admin center, view the Security & compliance report.

D. From the Azure Active Directory admin center, view the Risky sign-ins report.

 


Suggested Answer: A

 

Question 2

You enable the Azure AD Identity Protection weekly digest email.
You create the users shown in the following table.
 Image
Which users will receive the weekly digest email automatically?

A. Admin2, Admin3, and Admin4 only

B. Admin1, Admin2, Admin3, and Admin4

C. Admin2 and Admin3 only

D. Admin3 only

E. Admin1 and Admin3 only

 


Suggested Answer: E

By default, all Global Admins receive the email. Any newly created Global Admins, Security Readers or Security Administrators will automatically be added to the recipients list.

Question 3

You have a new Microsoft 365 E5 subscription.
You plan to use Activity explorer to monitor data loss prevention (DLP) rule activity.
You need to ensure that Activity explorer contains data for analysis.
What should you do first?

A. Add a new alert policy.

B. Turn on auditing.

C. Create a sensitivity label.

D. Create a new content search.

 


Suggested Answer: C

 

Question 4

You have a Microsoft 365 subscription.
All users have their email stored in Microsoft Exchange Online.
In the mailbox of a user named User1, you need to preserve a copy of all the email messages that contain the word ProjectX.
What should you do?

A. From the Security & Compliance admin center, create a label and a label policy.

B. From the Exchange admin center, create a mail flow rule.

C. From the Security & Compliance admin center, start a message trace.

D. From Exchange admin center, start a mail flow message trace.

 


Suggested Answer: A

References:
https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-classification

Question 5

You need to create the DLP policy to meet the technical requirements.
What should you configure first?

A. sensitive info types

B. the Insider risk management settings

C. the event types

D. the sensitivity labels

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/create-test-tune-dlp-policy?view=o365-worldwide

Question 6

HOTSPOT -
You use Microsoft Defender for Endpoint.
You have the Microsoft Defender for Endpoint machine groups shown in the following table.
 Image
You plan to onboard computers to Microsoft Defender for Endpoint as shown in the following table.
 Image
To which machine group will each computer be added? To answer, select the appropriate options in the answer are.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 7

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).
You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).
You configure pilot co-management.
You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.
You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.
Solution: You add Device1 to a Configuration Manager device collection.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/mem/configmgr/comanage/tutorial-co-manage-clients

Question 8

You have a Microsoft 365 E5 tenant.
You need to evaluate compliance with European Union privacy regulations for customer data.
What should you do in the Microsoft 365 compliance center?

A. Create a Data Subject Request (DSR)

B. Create a data loss prevention (DLP) policy for General Data Protection Regulation (GDPR) data

C. Create an assessment based on the EU GDPR assessment template

D. Create an assessment based on the Data Protection Baseline assessment template

 


Suggested Answer: C

Reference:
https://docs.microsoft.com/en-us/compliance/regulatory/gdpr#data-protection-impact-assessment
https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager-templates-list?view=o365-worldwide

Question 9

You need to notify the manager of the human resources department when a user in the department shares a file or folder from the department's Microsoft
SharePoint Online site.
What should you do?

A. From the Security & Compliance admin center, create an alert policy.

B. From the SharePoint Online site, create an alert.

C. From the SharePoint Online admin center, modify the sharing settings.

D. From the Security & Compliance admin center, create a data loss prevention (DLP) policy.

 


Suggested Answer: A

References:
https://docs.microsoft.com/en-us/office365/securitycompliance/create-activity-alerts

Question 10

Your company has offices in five cities.
The company has a Microsoft 365 tenant.
Each office is managed by a local administrator.
You plan to deploy Microsoft Intune.
You need to recommend a solution to manage resources in Intune that meets the following requirements:
✑ Local administrators must be able to manage only the resources in their respective office.
✑ Local administrators must be prevented from managing resources in other offices.
✑ Administrative effort must be minimized.
What should you include in the recommendation?

A. scope tags

B. device categories

C. configuration profiles

D. conditional access policies

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/mem/intune/fundamentals/scope-tags

Question 11

Your company uses on-premises Windows Server File Classification Infrastructure (FCI). Some documents on the on-premises file servers are classified as
Confidential.
You migrate the files from the on-premises file servers to Microsoft SharePoint Online.
You need to ensure that you can implement data loss prevention (DLP) policies for the uploaded files based on the Confidential classification.
What should you do first?

A. From the SharePoint admin center, configure hybrid search.

B. From the SharePoint admin center, create a managed property.

C. From the Security & Compliance Center PowerShell, run the New-DataClassification cmdlet.

D. From the Security & Compliance Center PowerShell, run the New-DlpComplianceRule cmdlet.

 


Suggested Answer: D

Reference:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-dlp/new-dataclassification?view=exchange-ps

Question 12

HOTSPOT -
You have a Microsoft 365 subscription that contains three groups named All users, Sales team, and Office users, and two users shown in the following table.
 Image
In Microsoft Endpoint Manager, you have the Policies for Office apps settings shown in the following exhibit.
 Image
The policies use the settings shown in the following table.
 Image
What is the default share folder location for User1 and the default Office theme for User2? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/deployoffice/overview-office-cloud-policy-service

Question 13

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 subscription.
From the Microsoft 365 Defender, you create a role group named US eDiscovery Managers by copying the eDiscovery Manager role group.
You need to ensure that the users in the new role group can only perform content searches of mailbox content for users in the United States.
Solution: From Windows PowerShell, you run the New-ComplianceSecurityFilter cmdlet with the appropriate parameters.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

References:
https://docs.microsoft.com/en-us/office365/securitycompliance/permissions-filtering-for-content-search
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-content-search/new-compliancesecurityfilter?view=exchange-ps

Question 14

From the Microsoft 365 compliance center, you create a content export as shown in the exhibit. (Click the Exhibit tab.)
 Image
What will be excluded from the export?

A. a 75-MB PDF file

B. a 5-KB RTF file

C. an 80-MB PPTX file

D. a 12-MB BMP file

 


Suggested Answer: D

 

Question 15

You need to ensure that User1 can enroll the devices to meet the technical requirements.
What should you do?

A. From the Azure Active Directory admin center, assign User1 the Cloud device administrator role.

B. From the Azure Active Directory admin center, configure the Maximum number of devices per user setting.

C. From the Endpoint Manager admin center, add User1 as a device enrollment manager.

D. From the Endpoint Manager admin center, configure the Enrollment restrictions.

 


Suggested Answer: C

References:
https://docs.microsoft.com/en-us/sccm/mdm/deploy-use/enroll-devices-with-device-enrollment-manager

Question 16

You have a Microsoft 365 subscription.
All users have their email stored in Microsoft Exchange Online.
In the mailbox of a user named User1, you need to preserve a copy of all the email messages that contain the word ProjectX.
What should you do first?

A. From the Microsoft Purview compliance portal, create a label and a label policy.

B. From the Exchange admin center, create a mail flow rule.

C. From the Microsoft Purview compliance portal, create a data loss prevention (DLP) policy.

D. From Microsoft Defender for Cloud Apps, create an activity policy.

 


Suggested Answer: A

 

Question 17

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You create a Microsoft Defender for Identity instance named Contoso.
The tenant contains the users shown in the following table.
 Image
You need to modify the configuration of the Defender for Identity sensors.
Solution: You instruct User1 to modify the Defender for Identity sensor configuration.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

Only Azure ATP administrators can modify the sensors.
References:
https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-role-groups

Question 18

HOTSPOT -
You have a Microsoft 365 E5 tenant that contains the users shown in the following table.
 Image
You purchase the devices shown in the following table.
 Image
In Microsoft Endpoint Manager, you create an enrollment status page profile that has the following settings:
✑ Show app and profile configuration progress: Yes
✑ Allow users to collect logs about installation errors: Yes
✑ Only show page to devices provisioned by out-of-box experience (OOBE): No
✑ Assignments: Group2
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/mem/intune/enrollment/windows-enrollment-status

Question 19

DRAG DROP -
Your network contains an on-premises Active Directory domain that syncs to Azure Active Directory (Azure AD). The domain contains the servers shown in the following table.
 Image
You use Azure Information Protection.
You need to ensure that you can apply Azure Information Protection labels to the file stores on Server1.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/azure/information-protection/install-configure-rms-connector
https://docs.microsoft.com/en-us/azure/information-protection/configure-servers-rms-connector

Question 20

You have a Microsoft 365 E5 subscription that contains the devices shown in the following table.
 Image
You need to implement Windows Information Protection (WIP). The solution must meet the following requirements:
•	Ensure that users on enrolled devices can override the WIP policy settings.
•	Prevent users on unenrolled devices from overriding the WIP policy settings.
What is the minimum number of app protection policies required?

A. 1

B. 2

C. 3

D. 4

 


Suggested Answer: B

 

Question 21

DRAG DROP
-
You have a Microsoft 365 E5 subscription and an on-premises server named Server1.
You plan to configure automatic log upload for continuous reports in Microsoft Defender for Cloud Apps.
You download a Docker log collector image to Server1.
You need integrate Defender for Cloud Apps with the log collector.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 22

DRAG DROP -
You have a Microsoft 365 subscription.
You have the devices shown in the following table.
 Image
You plan to join the devices to Azure Active Directory (Azure AD).
What should you do on each device to support Azure AD join? To answer, drag the appropriate actions to the correct devices. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Disable TPM.
Hybrid Azure AD join is supported for FIPS-compliant TPM 2.0 and not supported for TPM 1.2.
If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with hybrid Azure AD join.
Box 2: Upgrade to Windows 10 Enterprise
Windows 10 Home edition cannot be joined to a domain. First we must upgrade Windows 10 to Professional or Enterprise.
Box 3: Disable bitlocker –
Azure AD join supports Windows 8.1.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/devices/hybrid-azuread-join-plan
https://www.microsoft.com/en-us/windows/compare-windows-10-home-vs-pro

Question 23

You have a Microsoft 365 E5 tenant.
Users store data in the following locations:
Microsoft Teams -
 Image
✑ Microsoft OneDrive
✑ Microsoft Exchange Online
✑ Microsoft SharePoint Online
You need to retain Microsoft 365 data for two years.
What is the minimum number of retention policies that you should create?

A. 1

B. 2

C. 3

D. 4

 


Suggested Answer: D

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/create-retention-policies?view=o365-worldwide

Question 24

You have a Microsoft 365 E5 subscription that contains the groups shown in the following table.
 Image
You create a Policies for Office apps configuration named Policy1.
You need to deploy Policy1.
To which groups can you deploy the configuration?

A. Group3 only

B. Group4 only

C. Group1 and Group2 only

D. Group1 and Group4 only

E. Group1, Group2, Group3, and Group4

 


Suggested Answer: C

 

Question 25

DRAG DROP -
You have the Microsoft Azure Advanced Threat Protection (ATP) workspace shown in the Workspace exhibit. (Click the Workspace tab.)
 Image
The sensors settings for the workspace are configured as shown in the Sensors exhibit. (Click the Sensors tab.)
 Image
You need to ensure that Azure ATP stores data in Asia.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 26

HOTSPOT -
Your company uses Microsoft Defender Advanced Threat Protection (ATP). Microsoft Defender ATP contains the device groups shown in the following table.
 Image
You onboard computers to Microsoft Defender ATP as shown in the following table.
 Image
Of which groups are Computer1 and Computer2 members? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

When a device is matched to more than one group, it is added only to the highest ranked group.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/machine-groups?view=o365-worldwide

Question 27

HOTSPOT -
You have a Microsoft 365 tenant that contains the groups shown in the following table.
 Image
You plan to create a compliance policy named Compliance1.
You need to identify the groups that meet the following requirements:
✑ Can be added to Compliance1 as recipients of noncompliance notifications
✑ Can be assigned to Compliance1
To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://www.itpromentor.com/devices-or-users-when-to-target-which-policy-type-in-microsoft-endpoint-manager-intune/

Question 28

HOTSPOT -
Your on-premises network contains an Active Directory domain and a Microsoft Endpoint Configuration Manager site.
You have a Microsoft 365 E5 subscription that uses Microsoft Intune.
You use Azure AD Connect to sync user objects and group objects to Azure Active Directory (Azure AD). Password hash synchronization is disabled.
You plan to implement co-management.
You need to configure Azure AD Connect and the domain to support co-management.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Configure Hybrid Azure AD join.
See step 6 below.
Configure a hybrid Azure AD join using Azure AD Connect
1. Get and install the latest version of Azure AD Connect (1.1.819.0 or higher).
2. Launch Azure AD Connect, and then select Configure.
3. On the Additional tasks page, select Configure device options, and then select Next.
4. On the Overview page, select Next.
5. On the Connect to Azure AD page, enter the credentials of a global administrator for Azure AD.
6. On the Device options page, select Configure Hybrid Azure AD join, and then select Next.
7. On the Device operating systems page, select the operating systems used by devices in your Active Directory environment, and then select Next.
8. You can select the option to support Windows downlevel domain-joined devices, but keep in mind that co-management of devices is only supported for
Windows 10 or later.
9. On the SCP page, for each on-premises forest you want Azure AD Connect to configure the service connection point (SCP), do the following steps, and then select Next:
10.Etc.
Box 2: Register a service connection point (SCP)
See step 9 above.
Reference:
https://docs.microsoft.com/en-us/mem/configmgr/comanage/tutorial-co-manage-clients

Question 29

HOTSPOT
-
You have a Microsoft 365 E5 subscription.
You plan to use a mailbox named Mailbox1 to analyze malicious email messages.
You need to configure Microsoft Defender for Office 365 to meet the following requirements:
•	Ensure that incoming email is NOT filtered for Mailbox1.
•	Detect impersonation and spoofing attacks on all other mailboxes in the subscription.
Which two settings should you configure? To answer, select the appropriate settings in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 30

You have a Microsoft 365 tenant and a LinkedIn company page.
You plan to archive data from the LinkedIn page to Microsoft 365 by using the LinkedIn connector.
Where can you store data from the LinkedIn connector?

A. a Microsoft OneDrive for Business folder

B. a Microsoft SharePoint Online document library

C. a Microsoft 365 mailbox

D. Azure Files

 


Suggested Answer: C

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/archive-linkedin-data?view=o365-worldwide

Question 31

HOTSPOT -
Your network contains an Active Directory domain named contoso.com. All client devices run Windows 10 and are joined to the domain.
You update the Windows 10 devices by using Windows Update for Business.
What is the maximum amount of time you can defer Windows 10 updates? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

References:
https://docs.microsoft.com/en-us/windows/deployment/update/waas-manage-updates-wufb

Question 32

DRAG DROP -
You need to meet the requirement for the legal department.
Which three actions should you perform in sequence from the Security & Compliance admin center? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

References:
https://www.sherweb.com/blog/ediscovery-office-365/

Question 33

You have a Microsoft 365 subscription.
From the Microsoft 365 compliance center, you create a content search of all the mailboxes that contain the word ProjectX.
You need to export the results of the content search.
What do you need to download the report?

A. a certification authority (CA) certificate

B. an export key

C. a password

D. a user certificate

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/export-search-results

Question 34

You have a Microsoft 365 tenant that contains the groups shown in the following table.
 Image
You plan to create a new Windows 10 Security Baseline profile.
To which groups can you assign to the profile?

A. Group3 only

B. Group1 and Group3 only

C. Group2 and Group3 only

D. Group1, Group2, and Group3

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/mem/intune/protect/security-baselines-configure#create-the-profile
https://docs.microsoft.com/en-us/microsoft-365/admin/create-groups/compare-groups?view=o365-worldwide

Question 35

DRAG DROP -
You have a Microsoft 365 subscription.
In the Exchange admin center, you have a data loss prevention (DLP) policy named Policy1 that has the following configurations:
✑ Block emails that contain financial data.
✑ Display the following policy tip text: Message blocked.
From the Microsoft 365 compliance center, you create a DLP policy named Policy2 that has the following configurations:
✑ Use the following location: Exchange email.
✑ Display the following policy tip text: Message contains sensitive data.
✑ When a user sends an email, notify the user if the email contains health records.
What is the result of the DLP policies when the user sends an email? To answer, drag the appropriate results to the correct scenarios. Each result may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: The email will be blocked, and the user will receive the policy tip: Message blocked.
If you’ve created DLP policies in the Exchange admin center, those policies will continue to work side by side with any policies for email that you create in the
Security & Compliance Center. But note that rules created in the Exchange admin center take precedence. All Exchange mail flow rules are processed first, and then the DLP rules from the Security & Compliance Center are processed.
Box 2: The email will be allowed, and the user will receive the policy tip: Message contains sensitive data.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/how-dlp-works-between-admin-centers

Question 36

Your network contains an on-premises Active Directory domain named contoso.com. The domain contains 1,000 Windows 10 devices.
You perform a proof of concept (PoC) deployment of Microsoft Defender for Endpoint for 10 test devices. During the onboarding process, you configure Microsoft
Defender for Endpoint-related data to be stored in the United States.
You plan to onboard all the devices to Microsoft Defender for Endpoint.
You need to store the Microsoft Defender for Endpoint data in Europe.
What should you do first?

A. Create a workspace.

B. Onboard a new device.

C. Delete the workspace.

D. Offboard the test devices.

 


Suggested Answer: D

 

Question 37

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a computer that runs Windows 10.
You need to verify which version of Windows 10 is installed.
Solution: From the Settings app, you select Update & Security to view the update history.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

Reference:
https://support.microsoft.com/en-us/windows/which-version-of-windows-operating-system-am-i-running-628bec99-476a-2c13-5296-9dd081cdd808

Question 38

You have a Microsoft 365 subscription that uses Microsoft Defender for Cloud Apps.
You configure a session control policy to block downloads from SharePoint Online sites.
Users report that they can still download files from SharePoint Online sites.
You need to ensure that file download is blocked while still allowing users to browse SharePoint Online sites.
What should you configure?

A. an access policy

B. a data loss prevention (DLP) policy

C. an activity policy

D. a Conditional Access policy

 


Suggested Answer: D

 

Question 39

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.
You need to be notified when a single user downloads more than 50 files during any 60-second period.
What should you configure?

A. a file policy

B. an anomaly detection policy

C. a session policy

D. an activity policy

 


Suggested Answer: B

 

Question 40

You have a Microsoft 365 E5 tenant.
You plan to create a custom Compliance Manager assessment template based on the ISO 27001:2013 template.
You need to export the existing template.
Which file format should you use for the exported template?

A. CSV

B. XLSX

C. JSON

D. XML

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager-templates?view=o365-worldwide#export-a-template

Question 41

You have a Microsoft 365 tenant.
You plan to enable BitLocker Disk Encryption (BitLocker) automatically for all Windows 10 devices that enroll in Microsoft Intune.
What should you use?

A. an attack surface reduction (ASR) policy

B. an app configuration policy

C. a device compliance policy

D. a device configuration profile

 


Suggested Answer: D

Reference:
https://docs.microsoft.com/en-us/mem/intune/protect/encrypt-devices

Question 42

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have an Azure Active Directory (Azure AD) tenant that contains a user named User1.
Your company purchases a Microsoft 365 subscription.
You need to ensure that User1 is assigned the required role to create file policies and manage alerts in the Defender for Cloud Apps admin center.
Solution: From the Azure Active Directory admin center, you assign the Compliance administrator role to User1.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

The Compliance administrator has read-only permissions and can manage alerts, can create and modify file policies, allow file governance actions, and view all the built-in reports under Data Management, but cannot access Security recommendations for cloud platforms.
Reference:
https://docs.microsoft.com/en-us/cloud-app-security/manage-admins

Question 43

You have a Microsoft 365 E5 tenant.
The Microsoft Secure Score for the tenant is shown in the following exhibit.
 Image
You plan to enable Security defaults for Azure Active Directory (Azure AD).
Which three improvement actions will this affect?

A. Require MFA for administrative roles.

B. Ensure all users can complete multi-factor authentication for secure access

C. Enable policy to block legacy authentication

D. Enable self-service password reset

E. Use limited administrative roles

 


Suggested Answer: ABC

Reference:
https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/concept-fundamentals-security-defaults

Question 44

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 subscription.
You discover that some external users accessed content on a Microsoft SharePoint site. You modify the SharePoint sharing policy to prevent sharing outside your organization.
You need to be notified if the SharePoint sharing policy is modified in the future.
Solution: From the Security & Compliance admin center, you create a threat management policy.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

From the Security & Compliance admin center, Alerts, you create a new alert policy.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/alert-policies

Question 45

You have a Microsoft 365 tenant that contains devices registered for mobile device management. The devices are configured as shown in the following table.
 Image
You plan to enable VPN access for the devices.
What is the minimum number of configuration policies required?

A. 1

B. 3

C. 4

D. 5

 


Suggested Answer: C

Create one configuration policies for each platform.
Platform: Choose the platform of your devices. Your options:
Android device administrator –
Android Enterprise –
iOS/iPadOS
macOS
Windows 10 and later –
You create a custom profile for Android device administrator, Android Enterprise, iOS/iPadOS, macOS, and Windows respectively.
Reference:
https://docs.microsoft.com/en-us/mem/intune/configuration/custom-settings-configure
https://docs.microsoft.com/en-us/mem/intune/configuration/vpn-settings-configure

Question 46

From the Microsoft 365 compliance center, you create a content export shown in the exhibit. (Click the Exhibit tab.)
 Image
What will be excluded from the export?

A. a 100-MB VSDX file

B. a 5-MB MP3 file

C. a 10-MB XLSX file

D. a 75-MB PDF file

 


Suggested Answer: B

 

Question 47

HOTSPOT -
You have a new Microsoft 365 subscription.
A user named User1 has a mailbox in Microsoft Exchange Online.
You need to log any changes to the mailbox folder permissions of User1.
Which command should you run? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

To enable auditing for a single mailbox (in this example, belonging to Holly Sharp), use this PowerShell command: Set-Mailbox username -AuditEnabled $true
References:
https://support.microsoft.com/en-us/help/4026501/office-auditing-in-office-365-for-admins
https://docs.microsoft.com/en-us/powershell/module/exchange/mailboxes/set-mailbox?view=exchange-ps

Question 48

HOTSPOT -
You have a Microsoft Azure Activity Directory (Azure AD) tenant that contains the users shown in the following table.
 Image
Your company uses Microsoft Defender for Endpoint. Microsoft Defender for Endpoint contains the roles shown in the following table.
 Image
Microsoft Defender for Endpoint contains the device groups shown in the following table.
 Image
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

References:
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/user-roles-windows-defender-advanced-threat-protection

Question 49

You have a Microsoft 365 subscription.
All users have their email stored in Microsoft Exchange Online.
In the mailbox of a user named User1, you need to preserve a copy of all the email messages that contain the word ProjectX.
What should you do?

A. From Microsoft Defender for Cloud Apps, create an activity policy.

B. From the Security & Compliance admin center, create a data loss prevention (DLP) policy.

C. From the Exchange admin center, start a mail flow message trace.

D. From the Security & Compliance admin center, create an eDiscovery case.

 


Suggested Answer: D

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/create-ediscovery-holds?view=o365-worldwide

Question 50

You have a Microsoft 365 E5 tenant that contains four devices enrolled in Microsoft Intune as shown in the following table.
 Image
You plan to deploy Microsoft 365 Apps for enterprise by using Microsoft Endpoint Manager.
To which devices can you deploy Microsoft 365 Apps for enterprise?

A. Device1 only

B. Device1 and Device3 only

C. Device2 and Device4 only

D. Device1, Device2, and Device3 only

E. Device1, Device2, Device3, and Device4

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/mem/intune/apps/apps-add

Free Access Full MS-101 Practice Questions Free

Want more hands-on practice? Click here to access the full bank of MS-101 practice questions free and reinforce your understanding of all exam objectives.

We update our question sets regularly, so check back often for new and relevant content.

Good luck with your MS-101 certification journey!

Share18Tweet11
Previous Post

MS-100 Practice Questions Free

Next Post

MS-102 Practice Questions Free

Next Post

MS-102 Practice Questions Free

MS-203 Practice Questions Free

MS-500 Practice Questions Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.