Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Free IT Exam Dumps

MS-203 Dump Free

Table of Contents

Toggle
  • MS-203 Dump Free – 50 Practice Questions to Sharpen Your Exam Readiness.
  • Access Full MS-203 Dump Free

MS-203 Dump Free – 50 Practice Questions to Sharpen Your Exam Readiness.

Looking for a reliable way to prepare for your MS-203 certification? Our MS-203 Dump Free includes 50 exam-style practice questions designed to reflect real test scenarios—helping you study smarter and pass with confidence.

Using an MS-203 dump free set of questions can give you an edge in your exam prep by helping you:

  • Understand the format and types of questions you’ll face
  • Pinpoint weak areas and focus your study efforts
  • Boost your confidence with realistic question practice

Below, you will find 50 free questions from our MS-203 Dump Free collection. These cover key topics and are structured to simulate the difficulty level of the real exam, making them a valuable tool for review or final prep.

Question 1

You have a Microsoft Exchange Server 2019 hybrid deployment.
You plan to implement Hybrid Modern Authentication (HMA).
You retrieve the Exchange virtual directory settings, and you discover the following output.
 Image
You need to prepare the virtual directories for the planned implementation of HMA.
What should you do?

A. Add OAuth as an authentication method.

B. Remove NTLM as an authentication method.

C. Delete https://mail.contoso.com from the ExternalUrl value.

D. Modify the InternalUrl value to http://mail.contoso.com.

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/microsoft-365/enterprise/configure-exchange-server-for-hybrid-modern-authentication?view=o365-worldwide

Question 2

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft Exchange Server 2019 hybrid deployment. All user mailboxes are hosted in Microsoft 365. All outbound SMTP email is routed through the on-premises Exchange organization.
A corporate security policy requires that you must prevent credit card numbers from being sent to internet recipients by using email.
You need to configure the deployment to meet the security policy requirement.
Solution: From the Exchange organization, you create a data loss prevention (DLP) policy.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-policies?view=o365-worldwide

Question 3

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft Exchange Online tenant that uses an email domain named contoso.com.
You need to prevent all users from performing the following tasks:
✑ Sending out-of-office replies to an email domain named fabrikam.com.
✑ Sending automatic replies to an email domain named adatum.com.
The solution must ensure that all the users can send out-of-office replies and automatic replies to other email domains on the internet.
Solution: You create two sharing policies.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/exchange/mail-flow-best-practices/remote-domains/remote-domains

Question 4

You have a Microsoft Exchange Online tenant that has an email domain named contoso.com. Contoso.com routes all inbound email messages through a third-party email protection service.
You discover that all the inbound email messages contain the source IP address of the email protection service.
You need to ensure that all the inbound email messages retain the source IP address of the original sender.
What should you do?

A. Modify the SPF TXT record of contoso.com.

B. Enable Enhanced Filtering for Connectors.

C. Configure a mail flow rule.

D. Add an entry for a spoofed sender to Tenant Allow/Block Lists.

 


Suggested Answer: B

 

Question 5

You need to recommend an Office 365 solution that meets the technical requirements for email from adatum.com.
Which two components should you recommend configuring from the Exchange admin center in Exchange Online? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

A. a malware filter

B. a connection filter

C. data loss prevention (DLP) policies

D. DKIM signatures

E. a spam filter

 


Suggested Answer: BE

 

Question 6

DRAG DROP -
You have a Microsoft Exchange Server 2019 organization.
All recipients have an SMTP address in the @adatum.com format.
You purchase a new domain named contoso.com.
You need to configure all the recipients to have a primary SMTP address in the @contoso.com format as soon as possible.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 7

DRAG DROP
-
You have a Microsoft Exchange Online tenant that contains two users named User1 and User2.
You need to ensure that the users can perform the tasks shown in the following table.
 Image
The solution must follow the principle of least privilege.
To which role group should you add each user? To answer, drag the appropriate role groups to the correct users. Each role group may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 8

You manage a hybrid deployment between Microsoft Exchange Online and on-premises Exchange Server 2019. The deployment contains a primary SMTP domain named contoso.com.
Users have email addresses that use a syntax of
firstname.lastname@contoso.com
.
A user named Ben Smith receives a new client computer. You configure the computer to access Ben Smith's mailbox. Ben Smith reports that he cannot connect to his mailbox from the new computer.
You verify that other users can connect successfully to their mailbox and that new users can discover their mailboxes by using Autodiscover.
You need to ensure that Ben Smith can connect to his mailbox from the new computer.
What should you do?

A. Modify the primarySmtpAddress property fox the mailbox of Ben Smith.

B. Modify the RemoteRoutingAddress parameter for the mailbox of Ben Smith.

C. Modify the email address of Ben Smith to use a syntax of lastname.firstname@contoso.com.

D. Modify the email address of Ben Smith to use a syntax of firstname.lastname@contoso.onmicrosoft.com.

 


Suggested Answer: B

 

Question 9

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft Exchange Online tenant that contains 1,000 mailboxes.
All the users in the sales department at your company are in a group named Sales.
The company is implementing a new policy to restrict the use of email attachments for the users in the Sales group.
You need to prevent all email messages that contain attachments from being delivered to the users in the Sales group.
Solution: You modify the Exchange Online Protection (EOP) settings.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

You can block common attachments (attachments commonly used as malware) in EOP but not all attachments as required in this question. Instead, you should create a mail flow rule.
Reference:
https://docs.microsoft.com/en-us/exchange/security-and-compliance/mail-flow-rules/common-attachment-blocking-scenarios

Question 10

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your company has a Microsoft Exchange Server 2019 hybrid deployment that contains two Mailbox servers named MBX1 and MBX2.
The company has the departments shown in the following table.
 Image
From the on-premises organization, outbound email is sent directly to the Internet by using DNS lookups.
You are informed that some sales department users send email messages that are identified as spam.
You need to automatically block the sales department users from repeatedly sending spam.
Solution: You modify the outbound spam filter policy in Exchange Online.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

From the on-premises organization, outbound email is sent directly to the Internet by using DNS lookups. Therefore, the Exchange Online outbound spam filter will not scan the emails sent from the on-premises mailboxes.

Question 11

You have a Microsoft Exchange Server 2019 organization.
You plan to migrate all mailboxes to Exchange Online.
You need to provide a user with the ability to perform the mailbox migrations. The solution must use the principle of least privilege.
Which role should you assign to the user?

A. Recipient Management

B. Server Management

C. Help Desk

D. Organization Management

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/exchange/permissions/feature-permissions/recipient-permissions?view=exchserver-2019

Question 12

You need to configure the required objects for the branch office administrators.
What should you create for each administrator?

A. a management role assignment policy and a management role group

B. a management role and a management role assignment policy

C. a management role scope and a management role assignment

D. a management role scope and a management role group

 


Suggested Answer: C

Reference:
https://practical365.com/exchange-server/exchange-server-role-based-access-control-in-action/

Question 13

HOTSPOT -
You have a Microsoft 365 E5 tenant that contains the users shown in the following table.
 Image
You have a connector for a remote domain named contoso.com as shown in the following exhibit.
 Image
You have a transport rule as shown in the following exhibit.
 Image
User1 sends an email message to
user3@contoso.com
that has a subject line containing the word Confidential.
User2 sends an email message to
user4@contoso.com
that has a subject line of New report. The body of the message contains the word confidential.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/compliance/assurance/assurance-encryption-in-transit

Question 14

HOTSPOT
-
You have a Microsoft Exchange Online tenant.
You plan to create a mail flow rule that will forward email messages containing specific words to a user’s manager for approval.
You need to test the rule. The solution must meet the following requirements:
•	Prevent users from being notified that their message was forwarded to their manager.
•	Support the tracking of messages that match the rule by using message tracing.
Which two settings should you modify? To answer, select the settings in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 15

DRAG DROP
-
You have a Microsoft Exchange Online tenant that contains the users shown in the following table.
 Image
You need to create audit retention policies to retain the mailbox activity of all the users.
What is the maximum duration that you can set for each user? To answer, drag the appropriate duration values to the correct users. Each duration value may be used once, more than once, or not at all.
You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 16

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft Exchange Online tenant that uses an email domain named contoso.com.
You need to prevent all users from performing the following tasks:
✑ Sending out-of-office replies to an email domain named fabrikam.com.
✑ Sending automatic replies to an email domain named adatum.com.
The solution must ensure that all the users can send out-of-office replies and automatic replies to other email domains on the internet.
Solution: You create one mail flow rule.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/exchange/mail-flow-best-practices/remote-domains/remote-domains

Question 17

HOTSPOT
-
You have a Microsoft Exchange Online tenant named adatum.com that contains a user named User1.
You plan to perform a new message trace for User1. The message trace must generate an Enhanced summary report.
Which three Delivery status options can be included in the report? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 18

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may have more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
 Image
Use the following login credentials as needed:
To enter your username, place your cursor in the Sign in box and click on the username below.
To enter your password, place your cursor in the Enter password box and click on the password below.
Microsoft 365 Username:
admin@abc.com
Microsoft 365 Password: xxxxxx -
If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.
The following information is for technical support purposes only.
Lab Instance: XXXXXX -
You need to prevent users in your company from sending out-of-office replies to users who use an email address suffix of @contoso.com. The solution must NOT use mail flow rules.
To complete this task, sign in to the Exchange admin center.

 


Suggested Answer: See explanation below.

1. In the Exchange admin center, go to Mail flow > Remote domains.
2. Click + Add a remote domain. The Name the domain screen appears.
3. In the Name text box, enter a descriptive name for the domain.
4. In the Remote Domain text box, enter the full domain name. Use the wildcard character (*) for all subdomains of a specified domain, for example,
*.contoso.com.
5. Click Next. The Email reply types screen appears.
6. Define the following settings:
– In the Out of Office reply types section, specify which type of out-of-office replies should be sent to people at this domain.
– In the Automatic replies section, specify whether you want to allow automatic replies, automatic forwarding, or both.
7. Click Next. The Message reporting screen appears.
8. Specify whether you want to allow delivery reports and non-delivery reports by checking the respective check boxes.
9. Click Next. The Text and character set screen appears.
10.Define the following settings:
– In the Use Rich-text format pane, specify whether to follow each user’s message settings, or whether to always or never preserve RTF formatting.
Selecting Never means that RTF messages are sent as plain text or HTML.
– In the Supported Character Set pane, specify which character set to use (if the message doesn’t specify the character set) by choosing from the MIME character set or Non-MIME character set drop-down list.
11.Click Next. The Review screen appears.
12.Review the remote domain settings, and click Save.
Reference:
https://docs.microsoft.com/en-us/exchange/mail-flow-best-practices/remote-domains/manage-remote-domains
https://docs.microsoft.com/en-us/exchange/troubleshoot/email-delivery/understand-troubleshoot-oof-replies

Question 19

HOTSPOT
-
You have a Microsoft Exchange Online tenant.
Archive mailboxes are enabled for all users.
You need to ensure that the default size of each user’s archive mailbox increases automatically when the mailbox approaches the storage limit. The solution must apply automatically to all current and future mailboxes.
How should you complete the PowerShell command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 20

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may have more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
 Image
Use the following login credentials as needed:
To enter your username, place your cursor in the Sign in box and click on the username below.
To enter your password, place your cursor in the Enter password box and click on the password below.
Microsoft 365 Username:
admin@abc.com
Microsoft 365 Password: xxxxxx -
If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.
The following information is for technical support purposes only.
Lab Instance: XXXXXX -
You need to prevent email messages from a domain named fabrikam.com from being delivered to the mailboxes of your organization.
To complete this task, sign in to the Microsoft 365 admin center.

 


Suggested Answer: See explanation below.

1. In the Microsoft 365 Defender portal at https://security.microsoft.com, go to Email & Collaboration > Policies & Rules > Threat policies > Anti-spam in the Policies section. To go directly to the Anti-spam policies page, use https://security.microsoft.com/antispam.
2. On the Anti-spam policies page, click Create policy and then select Inbound from the drop down list.
3. The policy wizard opens. On the Name your policy page, configure these settings:
– Name: Enter a unique, descriptive name for the policy.
– Description: Enter an optional description for the policy.
When you’re finished, click Next.
4. On the Users, groups, and domains page that appears, identify the internal recipients that the policy applies to (recipient conditions):
– Users: The specified mailboxes, mail users, or mail contacts in your organization.
– Groups: The specified distribution groups, mail-enabled security groups, or Microsoft 365 Groups in your organization.
– Domains: All recipients in the specified accepted domains in your organization.
Click in the appropriate box, start typing a value, and select the value that you want from the results. Repeat this process as many times as necessary. To
ֳ—
remove an existing value, click remove
next to the value.
For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users, enter an asterisk (*) by itself to see all available values.
Multiple values in the same condition use OR logic (for example, or ). Different conditions use AND logic (for example, and ).
– Exclude these users, groups, and domains: To add exceptions for the internal recipients that the policy applies to (recipient exceptions), select this option and configure the exceptions. The settings and behavior are exactly like the conditions.
When you’re finished, click Next.
5. On the Bulk email threshold & spam properties page that appears, configure the following settings:
– Bulk email threshold: Specifies the bulk complaint level (BCL) of a message that triggers the specified action for the Bulk spam filtering verdict that you configure on the next page (greater than the specified value, not greater than or equal to). A higher value indicates the message is less desirable (more likely to resemble spam). The default value is 7. For more information, see Bulk complaint level (BCL) in EOP and What’s the difference between junk email and bulk email?.
By default, the PowerShell only setting MarkAsSpamBulkMail is On in anti-spam policies. This setting dramatically affects the results of a Bulk filtering verdict:
✑ MarkAsSpamBulkMail is On: A BCL that’s greater than the threshold is converted to an SCL 6 that corresponds to a filtering verdict of Spam, and the action for the Bulk filtering verdict is taken on the message.
✑ MarkAsSpamBulkMail is Off: The message is stamped with the BCL, but no action is taken for a Bulk filtering verdict. In effect, the BCL threshold and Bulk filtering verdict action are irrelevant.
– Increase spam score, Mark as spam
and Test mode: Advanced Spam Filter (ASF) settings that are turned off by default.
*
The Contains specific languages and from these countries settings are not part of ASF.
– Contains specific languages: Click the box and select On or Off from the drop down list. If you turn it on, a box appears. Start typing the name of a language in the box. A filtered list of supported languages will appear. When you find the language that you’re looking for, select it. Repeat this step as many times
ֳ—
as necessary. To remove an existing value, click remove
next to the value.
– From these countries*: Click the box and select On or Off from the drop down list. If you turn it on, a box appears. Start typing the name of a country in the box. A filtered list of supported countries will appear. When you find the country that you’re looking for, select it. Repeat this step as many times as necessary. To
ֳ—
remove an existing value, click remove
next to the value.
When you’re finished, click Next.
6. On the Actions page that appears, configure the following settings:
– Message actions: Select or review the action to take on messages based on the following spam filtering verdicts:
✑ Spam
✑ High confidence spam
✑ Phishing
✑ High confidence phishing
✑ Bulk
– Retain spam in quarantine for this many days: Specifies how long to keep the message in quarantine if you selected Quarantine message as the action for a spam filtering verdict. After the time period expires, the message is deleted, and is not recoverable. A valid value is from 1 to 30 days.
– Add this X-header text: This box is required and available only if you selected Add X-header as the action for a spam filtering verdict. The value you specify is the header field name that’s added to the message header. The header field value is always This message appears to be spam.
– Prepend subject line with this text: This box is required and available only if you selected Prepend subject line with text as the action for a spam filtering verdict. Enter the text to add to the beginning of the message’s subject line.
– Redirect to this email address: This box is required and available only if you selected the Redirect message to email address as the action for a spam filtering verdict. Enter the email address where you want to deliver the message. You can enter multiple values separated by semicolons (;).
– Enable safety Tips: By default, Safety Tips are enabled, but you can disable them by clearing the checkbox.
– Enable zero-hour auto purge (ZAP): ZAP detects and takes action on messages that have already been delivered to Exchange Online mailboxes.
ZAP is turned on by default. When ZAP is turned on, the following settings are available:
✑ Enable ZAP for phishing messages: By default, ZAP is enabled for phishing detections, but you can disable it by clearing the checkbox.
✑ Enable ZAP for spam messages: By default, ZAP is enabled for spam detections, but you can disable it by clearing the checkbox.
When you’re finished, click Next.
7. On the Allow & block list flyout that appears, you are able to configure message senders by email address or email domain that are allowed to skip spam filtering.
In the Allowed section, you can configure allowed senders and allowed domains. In the Blocked section, you can add blocked senders and blocked domains.
The steps to add entries to any of the lists are the same:
– Click the link for the list that you want to configure:
✑ Allowed > Senders: Click Manage (nn) sender(s).
✑ Allowed > Domains: Click Allow domains.
✑ Blocked > Senders: Click Manage (nn) sender(s).
✑ Blocked > Domains: Click Block domains.
– In the flyout that appears, do the following steps:
+
Click –
✑ Add senders or Add domains.
✑ In the Add senders or Add domains flyout that appears, enter the sender’s email address in the Sender box or the domain in the Domain box. As you’re typing, the value appears below the box. When you’re finished typing the email address or domain, select the value below the box.
ֳ—
Repeat the previous step as many times as necessary. To remove an existing value, click remove
✑ next to the value.
When you’re finished, click Add senders or Add domains.
– Back on the main flyout, the senders or domains that you added are listed on the page. To remove an entry from this page, do the following steps:
✑ Select one or more entries from the list. You can also use the Search box to find values in the list.
✑ After you select at least one entry, the delete icon appears
✑ Click the delete icon to remove the selected entries
When you’re finished, click Done.
Back on the Allow & block list page, click Next when you’re read to continue.
8. On the Review page that appears, review your settings. You can select Edit in each section to modify the settings within the section. Or you can click Back or select the specific page in the wizard.
When you’re finished, click Create.
9. On the confirmation page that appears, click Done.
Reference:https://security.microsoft.com,
go to Email & Collaboration > Policies & Rules > Threat policies > Anti-spam in the Policies section. To go directly to the Anti-spam policies page, use https://security.microsoft.com/antispam.

2. On the Anti-spam policies page, click Create policy and then select Inbound from the drop down list.
3. The policy wizard opens. On the Name your policy page, configure these settings:
– Name: Enter a unique, descriptive name for the policy.
– Description: Enter an optional description for the policy.
When you’re finished, click Next.
4. On the Users, groups, and domains page that appears, identify the internal recipients that the policy applies to (recipient conditions):
– Users: The specified mailboxes, mail users, or mail contacts in your organization.
– Groups: The specified distribution groups, mail-enabled security groups, or Microsoft 365 Groups in your organization.
– Domains: All recipients in the specified accepted domains in your organization.
Click in the appropriate box, start typing a value, and select the value that you want from the results. Repeat this process as many times as necessary. To
ֳ—
remove an existing value, click remove
next to the value.
For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users, enter an asterisk (*) by itself to see all available values.
Multiple values in the same condition use OR logic (for example, <recipient1> or <recipient2>). Different conditions use AND logic (for example, <recipient1> and <member of group 1>).
– Exclude these users, groups, and domains: To add exceptions for the internal recipients that the policy applies to (recipient exceptions), select this option and configure the exceptions. The settings and behavior are exactly like the conditions.
When you’re finished, click Next.
5. On the Bulk email threshold & spam properties page that appears, configure the following settings:
– Bulk email threshold: Specifies the bulk complaint level (BCL) of a message that triggers the specified action for the Bulk spam filtering verdict that you configure on the next page (greater than the specified value, not greater than or equal to). A higher value indicates the message is less desirable (more likely to resemble spam). The default value is 7. For more information, see Bulk complaint level (BCL) in EOP and What’s the difference between junk email and bulk email?.
By default, the PowerShell only setting MarkAsSpamBulkMail is On in anti-spam policies. This setting dramatically affects the results of a Bulk filtering verdict:
✑ MarkAsSpamBulkMail is On: A BCL that’s greater than the threshold is converted to an SCL 6 that corresponds to a filtering verdict of Spam, and the action for the Bulk filtering verdict is taken on the message.
✑ MarkAsSpamBulkMail is Off: The message is stamped with the BCL, but no action is taken for a Bulk filtering verdict. In effect, the BCL threshold and Bulk filtering verdict action are irrelevant.
– Increase spam score, Mark as spam
and Test mode: Advanced Spam Filter (ASF) settings that are turned off by default.
*
The Contains specific languages and from these countries settings are not part of ASF.
– Contains specific languages: Click the box and select On or Off from the drop down list. If you turn it on, a box appears. Start typing the name of a language in the box. A filtered list of supported languages will appear. When you find the language that you’re looking for, select it. Repeat this step as many times
ֳ—
as necessary. To remove an existing value, click remove
next to the value.
– From these countries*: Click the box and select On or Off from the drop down list. If you turn it on, a box appears. Start typing the name of a country in the box. A filtered list of supported countries will appear. When you find the country that you’re looking for, select it. Repeat this step as many times as necessary. To
ֳ—
remove an existing value, click remove
next to the value.
When you’re finished, click Next.
6. On the Actions page that appears, configure the following settings:
– Message actions: Select or review the action to take on messages based on the following spam filtering verdicts:
✑ Spam
✑ High confidence spam
✑ Phishing
✑ High confidence phishing
✑ Bulk
– Retain spam in quarantine for this many days: Specifies how long to keep the message in quarantine if you selected Quarantine message as the action for a spam filtering verdict. After the time period expires, the message is deleted, and is not recoverable. A valid value is from 1 to 30 days.
– Add this X-header text: This box is required and available only if you selected Add X-header as the action for a spam filtering verdict. The value you specify is the header field name that’s added to the message header. The header field value is always This message appears to be spam.
– Prepend subject line with this text: This box is required and available only if you selected Prepend subject line with text as the action for a spam filtering verdict. Enter the text to add to the beginning of the message’s subject line.
– Redirect to this email address: This box is required and available only if you selected the Redirect message to email address as the action for a spam filtering verdict. Enter the email address where you want to deliver the message. You can enter multiple values separated by semicolons (;).
– Enable safety Tips: By default, Safety Tips are enabled, but you can disable them by clearing the checkbox.
– Enable zero-hour auto purge (ZAP): ZAP detects and takes action on messages that have already been delivered to Exchange Online mailboxes.
ZAP is turned on by default. When ZAP is turned on, the following settings are available:
✑ Enable ZAP for phishing messages: By default, ZAP is enabled for phishing detections, but you can disable it by clearing the checkbox.
✑ Enable ZAP for spam messages: By default, ZAP is enabled for spam detections, but you can disable it by clearing the checkbox.
When you’re finished, click Next.
7. On the Allow & block list flyout that appears, you are able to configure message senders by email address or email domain that are allowed to skip spam filtering.
In the Allowed section, you can configure allowed senders and allowed domains. In the Blocked section, you can add blocked senders and blocked domains.
The steps to add entries to any of the lists are the same:
– Click the link for the list that you want to configure:
✑ Allowed > Senders: Click Manage (nn) sender(s).
✑ Allowed > Domains: Click Allow domains.
✑ Blocked > Senders: Click Manage (nn) sender(s).
✑ Blocked > Domains: Click Block domains.
– In the flyout that appears, do the following steps:
+
Click –
✑ Add senders or Add domains.
✑ In the Add senders or Add domains flyout that appears, enter the sender’s email address in the Sender box or the domain in the Domain box. As you’re typing, the value appears below the box. When you’re finished typing the email address or domain, select the value below the box.
ֳ—
Repeat the previous step as many times as necessary. To remove an existing value, click remove
✑ next to the value.
When you’re finished, click Add senders or Add domains.
– Back on the main flyout, the senders or domains that you added are listed on the page. To remove an entry from this page, do the following steps:
✑ Select one or more entries from the list. You can also use the Search box to find values in the list.
✑ After you select at least one entry, the delete icon appears
✑ Click the delete icon to remove the selected entries
When you’re finished, click Done.
Back on the Allow & block list page, click Next when you’re read to continue.
8. On the Review page that appears, review your settings. You can select Edit in each section to modify the settings within the section. Or you can click Back or select the specific page in the wizard.
When you’re finished, click Create.
9. On the confirmation page that appears, click Done.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/configure-your-spam-filter-policies?view=o365-worldwide

Question 21

You have a Microsoft Exchange Online tenant that contains a user named User1. User1 has a mobile device.
You need to enable Exchange ActiveSync logging for User1 and retrieve the log files.
Which two Exchange Online PowerShell cmdlets should you use? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. Get-ActiveSyncDevice

B. Set-ActiveSyncMailboxPolicy

C. Set-ClientAccessRule

D. Get-MobileDeviceStatistics

E. Set-CASMailbox

 


Suggested Answer: E

Reference:
https://docs.microsoft.com/en-us/exchange/troubleshoot/mobile-devices/issues-for-mobile-devices

Question 22

DRAG DROP -
You have a hybrid deployment of Microsoft Exchange Server 2019.
You need to migrate 500 users to Exchange Online. The details of the users are stored in a file named C:Users.csv.
How should you complete the PowerShell commands? To answer, drag the appropriate cmdlets to the correct targets. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 23

DRAG DROP -
You have a Microsoft Exchange Server 2019 hybrid deployment.
All user mailboxes are migrated to Exchange Online.
You need to migrate the public folders from the on-premises organization to Exchange Online.
Which three actions should you perform in sequence before you create the migration batch? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/Exchange/collaboration/public-folders/migrate-to-exchange-online?view=exchserver-2019

Question 24

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft Exchange Online tenant that contains 1,000 users.
A user named User1 receives a non-delivery report (NDR) when attempting to send an email message to an internal group named
sales@contoso.com
. The NDR contains the following text: `5.7.1 Delivery not authorized.`
You need to ensure that User1 can send email to
sales@contoso.com
successfully.
Solution: You instruct User1 to reduce the size of the email message.

A. Yes

B. No

 


Suggested Answer: B

 

Question 25

You have a Microsoft Exchange Server 2019 organization.
You run the following commands.
 Image
You have a user named Admin1.
You need to ensure that Admin1 can manage the mailboxes of users in the Executives organizational unit (OU) only.
What should you do?

A. Modify the membership of VIP Admins.

B. Add Admin1 to the Recipient Management management role group.

C. Move Admin1 to the Executives OU.

D. Create a custom role group.

 


Suggested Answer: B

Reference:
https://social.technet.microsoft.com/Forums/exchange/en-US/b316a841-c39d-483a-ac8e-64d5904c42e6/how-to-limit-recipient-management-rights-to-users-in-a-
ou-in-exchange-2010-sp1?forum=exchangesvradminlegacy

Question 26

HOTSPOT -
You need to modify FilesPolicy to prevent users from downloading ASPX files. The solution must meet the technical requirements.
How should you complete the command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/powershell/module/exchange/set-owamailboxpolicy?view=exchange-ps

Question 27

You have a Microsoft Exchange Online tenant.
You need to ensure that an email notification is sent to a security team every time an email forwarding rule is created in the tenant.
What should you create in the Microsoft Purview compliance portal?

A. a threat policy

B. a communication compliance policy

C. an alert policy

D. a data loss prevention (DLP) policy

 


Suggested Answer: A

 

Question 28

DRAG DROP -
Your network contains an Active Directory domain and an Azure Active Directory (Azure AD) tenant in a hybrid deployment.
You implement a Microsoft Exchange Online tenant.
You plan to deploy a new on-premises app named App1 to a Windows server. The solution must meet the following requirements:
✑ Use an Active Directory user account named App1service as a service account.
✑ Be able to receive email requests by using an email address of
app1@contoso.com
.
✑ Use App1service to sign in to the mailbox of App1 to view the requests.
In the domain, you create App1service.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 29

You have a hybrid deployment that contains a Microsoft Exchange Online tenant and an on-premises Exchange Server 2019 server named Server1.
Server1 uses a certificate from a third-party certification authority (CA). The certificate is enabled for the SMTP service.
You replace the certificate with a new certificate.
You discover that delivery fails for all email messages sent from Server1 to your Microsoft 365 tenant.
You receive the following error message for all the queued email messages: “450 4.4.101 Proxy session setup failed on Frontend with 451 4.4.0 Primary target IP address responded with 451 5.7.3 STARTTLS is required to send mail.”
You need to ensure that the messages are delivered successfully from Server1 to the Microsoft 365 tenant.
What should you do?

A. From the Exchange admin center, update the certificate thumbprint in the properties of a connector.

B. From Server1, regenerate the certificate and select Make private keys exportable.

C. From Server1, run the iisreset command.

D. From Server1, request a new certificate that support TLS.

 


Suggested Answer: A

 

Question 30

DRAG DROP -
You have a Microsoft Exchange Server 2019 organization.
You need to identify which accounts in Active Directory are assigned permissions to dismount mailbox databases.
How should you complete the command? To answer, drag the appropriate values to the correct targets. Each value may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/powershell/exchange/find-exchange-cmdlet-permissions?view=exchange-ps

Question 31

HOTSPOT
-
You have a Microsoft Exchange Online tenant.
You suspect that an administrator accessed the mailbox of a user named User1.
You need to run a PowerShell command to identify which administrator signed in to the mailbox of User1.
How should you complete the command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 32

You need to recommend a solution that meets the security requirements for protecting users.
What should you recommend?

A. From the Security & Compliance admin center, create an ATP safe attachments policy.

B. From the Security & Compliance admin center, create an ATP Safe Links policy.

C. From the Security & Compliance admin center, create an ATP anti-phishing policy.

D. From the Exchange admin center in Exchange Online, create a spam filter policy.

 


Suggested Answer: B

✑ All users must be protected from accessing unsecure websites when they click on URLs embedded in email messages.

Question 33

You have a Microsoft 365 subscription for a company named Fabrikam, Inc. The company uses an Exchange Online tenant that has an email domain named fabrikam.com.
Fabrikam works with a partner company named Contoso, Ltd. that uses an email domain named contoso.com.
A new security policy at Contoso states that any email sent from partners to Contoso employees must use TLS encryption.
You need to ensure that email sent from Fabrikam to Contoso uses TLS.
What should you create in the tenant?

A. a new connector that specifies the contoso.com SMTP domain

B. a new connector that specifies the fabrikam.com SMTP domain

C. a remote domain named fabrikam.com

D. a remote domain named contoso.com

 


Suggested Answer: A

Configure a Send connector in Fabrikam to point to Contoso.

Question 34

You need to generate a report for the mobile devices that meets the technical requirements.
Which PowerShell cmdlet should you use?

A. Get-DevicePolicy

B. Get-MobileDevice

C. Get-MobileDeviceStatistics

D. Get-DeviceTenantPolicy

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/powershell/module/exchange/get-mobiledevice?view=exchange-ps

Question 35

You have a hybrid deployment between a Microsoft Exchange Online tenant and an on-premises Exchange Server 2019 organization. The on-premises organization contains several Exchange Server 2019 servers.
You discover that delivery fails for all email messages sent from the on-premises organization to Microsoft 365.
You discover that the certificate for an on-premises Exchange server expired.
You need to resolve the issue as quickly possible. The solution must minimize administrative effort.
What should you do on the on-premises Exchange server?

A. Create a new self-signed certificate.

B. Generate a certificate renewal request.

C. Generate a certificate request.

D. Add the certificate for a new root certification authority (CA).

 


Suggested Answer: B

Reference:
https://practical365.com/exchange-server/how-to-generate-ssl-certificate-request-exchange-2016/

Question 36

You have a Microsoft Exchange Online tenant.
You need to identify any changes made to the Recipient Management role group during the past month.
What should you do?

A. Run the Get-ManagementRole cmdlet.

B. Run a non-owner mailbox access report.

C. Run an administrator role group report.

D. Run the Get-AuditLogSearch cmdlet.

 


Suggested Answer: C

 

Question 37

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft Exchange Online tenant that contains the following email domains:
✑ Adatum.com
✑ Contoso.com
✑ Fabrikam.com
When external recipients receive email messages from the users in the tenant, all the messages are delivered by using the @contoso.com email domain.
You need to ensure that the users send email by using the @fabrikam.com email domain.
Solution: From the Microsoft 365 portal, you set fabrikam.com as the default domain.
Does this meet the goal?

A. No

B. Yes

 


Suggested Answer: A

Changing the default domain would only affect new users. To affect existing users, you need to run the Set-Mailbox cmdlet.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/admin/setup/domains-faq?view=o365-worldwide#how-do-i-set-or-change-the-default-domain-in-microsoft-365

Question 38

HOTSPOT
-
You are configuring a hybrid deployment between a Microsoft Exchange Online tenant and an on-premises Exchange Server 2019 organization.
The Exchange Server organization contains two servers named Server1 and Server2.
You have a proxy server named Proxy1 that is accessible by using http://proxy1:8080.
You install the Microsoft Hybrid Agent on Server1 and Server2.
You need to ensure that the Hybrid Agent uses only Proxy1 to connect to Microsoft Online Services.
How should you complete the PowerShell command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 39

DRAG DROP
-
You have a Microsoft 365 E5 subscription that contains a public folder named Folder1 and two users named User1 and User2.
You need to ensure that the users can perform the actions shown in the following table.
 Image
The solution must use the principle of least privilege and minimize administrative effort.
Which folder permission should you grant to each user? To answer, drag the appropriate permissions to the correct users. Each permission may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 40

You have a Microsoft Exchange Server 2019 organization.
You need to provide a user named User1 with the ability to create and manage transport rules.
To which management role group should you add User1?

A. Server Management

B. Compliance Management

C. Records Management

D. Hygiene Management

 


Suggested Answer: C

Reference:
https://docs.microsoft.com/en-us/exchange/records-management-exchange-2013-help

Question 41

You have a Microsoft Exchange Online tenant that uses a third-party email hygiene system named Service1. Service1 blocks all encrypted email.
All external email is routed through Service1 by using a connector.
Users classify email by using sensitivity labels. Emails classified as Secret are encrypted automatically.
You need to ensure that the users can send emails classified as Secret to external recipients.
Which two items should you create? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. a remote domain

B. a connector

C. a data loss prevention (DLP) policy

D. a mail flow rule

E. a label policy

 


Suggested Answer: BD

Use an additional Connector and a Mail Flow Rule to bypass the third-party email hygiene system for emails that have the Secret sensitivity label.
Emails with the sensitivity label will use the new connector. All other emails will use the existing connector.
Reference:
https://docs.microsoft.com/en-us/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/conditional-mail-routing

Question 42

DRAG DROP -
You have a hybrid deployment between a Microsoft Exchange Online tenant and an on-premises Exchange Server 2013 organization. The deployment contains the public folders shown in following table.
 Image
You need to configure the deployment to meet the following requirements:
✑ Exchange Server 2013 mailboxes must be able to access PF2.
✑ Exchange Online mailboxes must be able to access PF1.
Which PowerShell script should you run from an Exchange Server 2013 server to meet each requirement? To answer, drag the appropriate scripts to the correct requirements. Each script may be used once, more than once, or at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/exchange/hybrid-deployment/set-up-exo-hybrid-public-folders
https://docs.microsoft.com/en-us/exchange/hybrid-deployment/set-up-modern-hybrid-public-folders

Question 43

HOTSPOT -
You need to migrate 10 Microsoft Outlook.com users to the adatum.com tenant.
Which type of migration should you perform, and which items can be migrated? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Cutover –
Migrate email to Exchange Online using the Exchange cutover method.
As part of a Microsoft 365 or Office 365 deployment, you can migrate the contents of user mailboxes from a source email system to Microsoft 365 or Office 365.
When you do this all at one time, it’s called a cutover migration.
How does cutover migration work?
The main steps you perform for a cutover migration are shown in the following illustration.
Reference Image
Box 2: Mail folder items, contacts, calendar items, and tasks.
Incorrect:
* IMAP
With IMAP only the mail folder items are migrated.
Limitations of the Manual Method
The manual migration of Outlook.com to Microsoft 365 has certain drawbacks that users should know beforehand.
A technical and long process –
Migrates only emails and not calendars, contacts, tasks, etc.
Maximum allowed email size for migration is 35MB
Maximum 500, 000 items are allowed to migrate from a user mailbox
Reference: alt=”Reference Image” />
Box 2: Mail folder items, contacts, calendar items, and tasks.
Incorrect:
* IMAP
With IMAP only the mail folder items are migrated.
Limitations of the Manual Method
The manual migration of Outlook.com to Microsoft 365 has certain drawbacks that users should know beforehand.
A technical and long process –
Migrates only emails and not calendars, contacts, tasks, etc.
Maximum allowed email size for migration is 35MB
Maximum 500, 000 items are allowed to migrate from a user mailbox
Reference:
https://docs.microsoft.com/en-us/exchange/mailbox-migration/cutover-migration-to-office-365
https://docs.microsoft.com/en-us/exchange/mailbox-migration/migrating-imap-mailboxes/migrating-your-outlook-com-account
https://www.nucleustechnologies.com/blog/migrate-outlook-com-account-to-microsoft-365/

Question 44

HOTSPOT -
You have a Microsoft Exchange Online tenant.
You need to use the DANE protocol to protect against mail server spoofing.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: DNSSEC –
DANE has direct dependencies on DNSSEC, which works by digitally signing records for DNS lookups using public key cryptography. DNSSEC checks occur on recursive DNS resolvers, the DNS servers that make DNS queries for clients. DNSSEC ensures that DNS records aren’t tampered with and are authentic.
Box 2: TLSA –
DANE for SMTP RFC 7672 uses the presence of a Transport Layer Security Authentication (TLSA) record in a domain’s DNS record set to signal a domain and its mail server(s) support DANE. If there is no TLSA record present, DNS resolution for mail flow will work as usual without any DANE checks being attempted.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/how-smtp-dane-works?view=o365-worldwide

Question 45

SIMULATION -
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may have more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
 Image
Use the following login credentials as needed:
To enter your username, place your cursor in the Sign in box and click on the username below.
To enter your password, place your cursor in the Enter password box and click on the password below.
Microsoft 365 Username:
admin@abc.com
Microsoft 365 Password: xxxxxx -
If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.
The following information is for technical support purposes only.
Lab Instance: XXXXXX -
You need to prevent email messages that contain attachments that have the .js file extension from being delivered to any recipients in your organization.
To complete this task, sign in to the Microsoft 365 admin center.

 


Suggested Answer: See explanation below.

1. Go to Mail flow > Rules.
2. Create the rule by using one of the following options:
– To create a rule from a template, click Add and select a template.
Reference Image
– To copy a rule, select the rule, and then select Copy .
Reference Image
– To create a new rule from scratch, Add and then select Create a new rule.
Reference Image
3. In the New rule dialog box, name the rule, and then select the conditions and actions for this rule:
– In Apply this rule if…, select the condition you want from the list of available conditions:
✑ Some conditions require you to specify values. For example, if you select The sender is… condition, you must specify a sender address. If you’re adding a word or phrase, note that trailing spaces are not allowed.
✑ If the condition you want isn’t listed, or if you need to add exceptions, select More options. Additional conditions and exceptions will be listed.
✑ If you don’t want to specify a condition, and want this rule to apply to every message in your organization, select [Apply to all messages] condition.
– In Do the following…, select the action you want the rule to take on messages matching the criteria from the list of available actions:
✑ Some of the actions will require you to specify values. For example, if you select the Forward the message for approval to… condition, you will need to select a recipient in your organization.
If the condition you want isn’t listed, select More options. Additional conditions will be listed.
Reference Image
– Specify how rule match data for this rule is displayed in the Data Loss Prevention (DLP) reports and the Mail protection reports.
– Set the mode for the rule. You can use one of the two test modes to test the rule without impacting mail flow. In both test modes, when the conditions are met, an entry is added to the message trace:
✑ Enforce: This turns on the rule and it starts processing messages immediately. All actions on the rule will be performed.
✑ Test with Policy Tips: This turns on the rule, and any Policy Tip actions ( Notify the sender with a Policy Tip) will be sent, but no actions related to message delivery will be performed. Data Loss Prevention (DLP) is required in order to use this mode.
✑ Test without Policy Tips: Only the Generate incident report action will be enforced. No actions related to message delivery are performed.
Exchange Online admins can create mail flow rules in the Exchange admin center (EAC) at Mail flow > Rules. You need permissions to do this procedure. After you start to create a new rule, you can see the full list of attachment-related conditions by clicking More options > Any attachment under Apply this rule if. The attachment-related options are shown in the following diagram.
Reference Image
Reference: alt=”Reference Image” />
– To copy a rule, select the rule, and then select Copy .
Reference Image
– To create a new rule from scratch, Add and then select Create a new rule.
Reference Image
3. In the New rule dialog box, name the rule, and then select the conditions and actions for this rule:
– In Apply this rule if…, select the condition you want from the list of available conditions:
✑ Some conditions require you to specify values. For example, if you select The sender is… condition, you must specify a sender address. If you’re adding a word or phrase, note that trailing spaces are not allowed.
✑ If the condition you want isn’t listed, or if you need to add exceptions, select More options. Additional conditions and exceptions will be listed.
✑ If you don’t want to specify a condition, and want this rule to apply to every message in your organization, select [Apply to all messages] condition.
– In Do the following…, select the action you want the rule to take on messages matching the criteria from the list of available actions:
✑ Some of the actions will require you to specify values. For example, if you select the Forward the message for approval to… condition, you will need to select a recipient in your organization.
If the condition you want isn’t listed, select More options. Additional conditions will be listed.
Reference Image
– Specify how rule match data for this rule is displayed in the Data Loss Prevention (DLP) reports and the Mail protection reports.
– Set the mode for the rule. You can use one of the two test modes to test the rule without impacting mail flow. In both test modes, when the conditions are met, an entry is added to the message trace:
✑ Enforce: This turns on the rule and it starts processing messages immediately. All actions on the rule will be performed.
✑ Test with Policy Tips: This turns on the rule, and any Policy Tip actions ( Notify the sender with a Policy Tip) will be sent, but no actions related to message delivery will be performed. Data Loss Prevention (DLP) is required in order to use this mode.
✑ Test without Policy Tips: Only the Generate incident report action will be enforced. No actions related to message delivery are performed.
Exchange Online admins can create mail flow rules in the Exchange admin center (EAC) at Mail flow > Rules. You need permissions to do this procedure. After you start to create a new rule, you can see the full list of attachment-related conditions by clicking More options > Any attachment under Apply this rule if. The attachment-related options are shown in the following diagram.
<img src=”https://www.examtopics.com/assets/media/exam-media/04329/0041200004.png” alt=”Reference Image” />
Reference:
https://docs.microsoft.com/en-us/exchange/security-and-compliance/mail-flow-rules/manage-mail-flow-rules
https://docs.microsoft.com/en-us/exchange/security-and-compliance/mail-flow-rules/inspect-message-attachments

Question 46

You have a Microsoft Exchange Online tenant that has an email domain named contoso.com.
You collaborate with a partner company that has an email domain named adatum.com.
You need to ensure that all the email messages sent to and received from adatum.com are encrypted in transit.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct answer is worth one point.

A. Create a connector from adatum.com to Microsoft Office 365 and configure the connector to use SMTP relay.

B. Create a connector from adatum.com to Microsoft Office 365 and configure the connector to require TLS.

C. Create a connector from Microsoft Office 365 to adatum.com and configure the connector to require TLS.

D. Issue S/MIME certificates to all the users in contoso.com.

E. Configure Exchange Online to use direct send to adatum.com.

 


Suggested Answer: BC

 

Question 47

HOTSPOT -
You have a Microsoft Exchange Server 2019 organization and a Microsoft 365 E5 subscription.
From the Microsoft 365 admin center, you open Data migration as shown in the following exhibit.
 Image
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://www.stellarinfo.com/blog/hybrid-migration-migrate-exchange-mailboxes-office-365/
https://www.kerneldatarecovery.com/blog/migrate-from-exchange-on-premises-to-exchange-online-in-hybrid-environment/

Question 48

You have a Microsoft 365 subscription that contains a verified domain named contoso.com.
You have an app named App1 that sends meeting invitations on behalf of users. The invitations are sent from a Microsoft Exchange Online mailbox that has a sender address of
app1@contoso.com
and a reply-to address of the user scheduling the meeting.
You create an anti-phishing policy named Policy1 that includes all the users in contoso.com. Policy1 is configured to protect the domain against impersonation.
You discover that email messages sent from App1 are quarantined.
You need to ensure that App1 can send messages that impersonate any contoso.com user.
How should you modify Policy1?

A. Add app1@contoso.com as a trusted sender.

B. Enable spoof intelligence.

C. Add app1@contoso.com as an excluded user.

D. Enable mailbox intelligence.

 


Suggested Answer: C

 

Question 49

HOTSPOT
-
You have a Microsoft Exchange Online tenant.
You need to be notified when more than 1,000 email messages are queued in Exchange for more than one hour.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 50

Your company has the offices and subnets shown in the following table.
 Image
Each office has an IT department.
You have a Microsoft Exchange Online tenant.
You need to ensure that only users in the IT department who sign in from the London office can access the Exchange admin center.
What should you use?

A. a Conditional Access policy

B. named locations

C. a client access rule

D. a custom role group

 


Suggested Answer: B

Named locations –
Locations are named in the Azure portal under Azure Active Directory > Security > Conditional Access > Named locations. These named network locations may include locations like an organization’s headquarters network ranges, VPN network ranges, or ranges that you wish to block. Named locations can be defined by
IPv4/IPv6 address ranges or by countries.
Incorrect:
Not A: First define a named location, then use it in a Conditional Access policy.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-condition

Access Full MS-203 Dump Free

Looking for even more practice questions? Click here to access the complete MS-203 Dump Free collection, offering hundreds of questions across all exam objectives.

We regularly update our content to ensure accuracy and relevance—so be sure to check back for new material.

Begin your certification journey today with our MS-203 dump free questions — and get one step closer to exam success!

Share18Tweet11
Previous Post

MS-102 Dump Free

Next Post

MS-500 Dump Free

Next Post

MS-500 Dump Free

MS-700 Dump Free

MS-900 Dump Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.