If you are looking for free MS-101 dumps than here we have some sample question answers available. You can prepare from our Microsoft MS-101 exam questions notes and prepare exam with this practice test. Check below our updated MS-101 exam dumps.
DumpsGroup are top class study material providers and our inclusive range of MS-101 Real exam questions would be your key to success in Microsoft Microsoft 365 Certification Exam in just first attempt. We have an excellent material covering almost all the topics of Microsoft MS-101 exam. You can get this material in Microsoft MS-101 PDF and MS-101 practice test engine formats designed similar to the Real Exam Questions. Free MS-101 questions answers and free Microsoft MS-101 study material is available here to get an idea about the quality and accuracy of our study material.
You need to ensure that when a document containing a credit card number is added to the tenant, the document is encrypted.Which policy should you use?
You need to be notified when emails with attachments that contain sensitive personal data are sent to external recipients. Which two policies can you use? Each correct answer presents a complete solution.NOTE: Each correct selection is worth one point.
All users have their email stored in Microsoft Exchange Online.In the mailbox of a user named User 1. You need to preserve a copy of all the email messages that contain the word Project X.WDM should you do?
You have a Microsoft 365 subscriptionAll users are assigned a Microsoft 365 E3 License.You enable auditing for your organization. What is the maximum amount of time data will be retained in the Microsoft 365 audit log?
You have Windows 10 devices that are managed by using Microsoft Endpoint Manager. You need to configure the security settings in Microsoft Edge.What should you create in Microsoft Endpoint Manager?
Your company has five security information and event management (SIEM) appliances. The traffic logs from each appliance are saved to a file share named Logs.You need to analyze the traffic logs.What should you do from Microsoft Cloud App Security?
You have a Microsoft 365 E5 tenant.You need to evaluate compliance with European Union privacy regulations for customer data.What should you do in the Microsoft 365 compliance center?
Your network contains an Active Directory domain named contoso.com. The domain contains 100 Windows 8.1 devices. You plan to deploy a custom Windows 10 Enterprise image to the Windows 8.1 devices. You need to recommend a Windows 10 deployment method. What should you recommend?
You configure sensitivity labels.Users report that the Sensitivity button is unavailability in Microsoft Word for the web. The sensitivity button is available in Word for Microsoft 365.You need to ensure that the users can apply the sensitivity labels when they use Word for the web.What should you do?
You have a Microsoft 365 subscription that contains a user named User1.You need to ensure that User1 can search the Microsoft 365 audit logs from the Security & Compliance admincenter. Which role should you assign to User1?
You have a Microsoft 365 tenant and a LinkedIn company page.You plan to archive data from the LinkedIn page to Microsoft 365 by using the LinkedIn connector.Where can you store data from the LinkedIn connector?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a new Microsoft 365 subscription. You need to prevent users from sending email messages that contain Personally Identifiable Information (PII). Solution: From the Security & Compliance admin center, you create a data loss prevention (DLP) policy.Does this meet the goal?
You have a Microsoft 365 tenant that contains two groups named Group1 and Group2.You need to prevent the members or Group1 from communicating with the members of Group2 by using Microsoft Teams. The solution must comply with regulatory requirements and must not affect other user in the tenant.What should you use?
You have a Microsoft 365 subscription.You configure a data loss prevention (DIP) policy.You discover that users are incorrectly marking content as false positive and bypassing the OLP policy. You need to prevent the users from bypassing the DLP policy. What should you configure?
You have a Microsoft 365 E5 subscription that uses Azure Advanced Threat Protection (ATP).You need to create a detection exclusion in Azure ATP.Which tool should you use?
You have a Microsoft 365 E5 subscription.You plan to implement Microsoft 365 compliance policies to meet the following requirements:Identify documents that are stored in Microsoft Teams and SharePoint Online that contain Personally Identifiable Information (PII). Report on shared documents that contain PII. What should you create?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a Microsoft 365 E5 subscription that contains a user named User1.You need to enable User1 to create Compliance Manager assessments. Solution: From the Microsoft 365 compliance center, you add User1 to the Compliance Manager Assessors role group.Does this meet the goal?
You have a Microsoft 365 tenant. You plan to enable BitLocker Disk Encryption (BitLocker) automatically for all Windows 10 devices that enroll in Microsoft Intune.What should you use?
You have a Microsoft 365 E5 tenant that has sensitivity label support enabled for Microsoft and SharePoint Online. You need to enable unified labeling for Microsoft 365 groups.Which cmdlet should you run?
Your company has a Microsoft 365 subscription. You implement Microsoft Azure Information Protection.You need to automatically protect email messages that contain the word Confidential in the subject line. What should you create?
You have a Microsoft 365 E5 tenant.You create an auto-labeling policy to encrypt emails that contain a sensitive info type. You specify the locations where the policy will be applied.You need to deploy the policy.What should you do first?
You have a Microsoft 365 subscription. You need to identify which administrative users performed eDiscovery searches during the past week.What should you do from the Security & Compliance admin center?
Your company has a Microsoft 365 E5 tenant that contains a user named User1. You review the company’s compliance score.You need to assign the following improvement action to User1:Enable self-service password reset.What should you do first?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a computer that runs Windows 10. You need to verify which version of Windows 10 is installed. Solution: From Device Manager, you view the computer properties. Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, thesequestions will not appear in the review screen. You have a Microsoft 365 subscription. From the Security & Compliance admin center, you create a role group named US eDiscovery Managers by copying the eDiscovery Manager role group. You need to ensure that the users in the new role group can only perform content searches of mailbox content for users in the United States.Solution: From Windows PowerShell, you run the New-ComplianceSecurityFilter cmdlet with the appropriate parameters.Does this meet the goal?
You have a Microsoft 365 E5 subscription. You plan to implement records management and enable users to designate documents as regulatory records.You need to ensure that the option to mark content as a regulatory record is visible when you create retention labels.What should you do first?
A user receives the following message when attempting to sign in to https://myapps.microsoft.com: "Your sign-in was blocked. We've detected something unusual about this sign-in. For example, you might be signing in from a new location device, or app. Before you can continue, we need to verity your identity. Please contact your admin.”Which configuration prevents the users from signing in?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.Your network contains an Active Directory domain named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD).You manage Windows 10 devices by using Microsoft System Center Configuration Manager (Current Branch).You configure pilot co-management. You add a new device named Device1 to the domain. You install the Configuration Manager client on Device1.You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager.Solution: You add Device1 to an Active Directory group.Does this meet the goal?
You need to grant a user a named User1 access to download compliance reports from the Security & Compliance reports from the Security from the Security & Compliance admin center. The solution must use the principle of least privilege.What should you do?
You have a Microsoft 365 subscription.From the Security & Compliance admin center, you create a content search of all the mailboxes that contain the word Project X.You need to export the results of the content search. What do you need to download the report?
You have a Microsoft 365 tenant that contains 1,000 iOS devices enrolled in Microsoft Intune. You plan to purchase volume-purchased apps and deploy the apps to the devices. You need to track used licenses and manage the apps by using Intune. What should you use to purchase the apps?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screenYou have a Microsoft 365 E5 subscription. You create an account for a new security administrator named SecAdmin1.You need to ensure that SecAdmin1 can manage Microsoft Defender for Office 365 settings and policies for Microsoft Teams, SharePoint, and OneDrive. Solution: From the Microsoft 365 admin center, you assign SecAdmin1 the Exchange admin role.Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals- Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a Microsoft 365 subscription. You discover that some external users accessed content on a Microsoft SharePoint site. You modify the SharePoint shoring policy to prevent sharing outside your organization. You need to be notified if the SharePoint sharing policy is modified m the future.Solution: From the SharePoint admin center, you modify the sharing settings. Does this meet the goal?
You have a Microsoft 365 subscription. You plan to connect to Microsoft Exchange Online PowerShell and run the following cmdlets:Search-MailboxAuditLog Test-ClientAccessRule Set-GroupMailbox Get-Mailbox Which cmdlet will generate an entry in the Microsoft Office 365 audit log?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a Microsoft 365 subscription.From the Security & Compliance admin center, you create a role group named US eDiscovery Managers by copying the eDiscovery Manager role group. You need to ensure that the users in the new role group can only perform content searches of mailbox content for users in the United States.Solution: From the Security & Compliance admin center, you modify the roles of the US eDiscovery Managers role group.Does this meet the goal?
Your company uses Microsoft System Center Configuration Manager (Current Branch) and Microsoft Intune to co-manage devices. Which two actions can be performed only from Intune? Each correct answer presents a complete solution.NOTE: Each correct selection is worth one point.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a Microsoft 365 subscription. You need to prevent users from accessing your Microsoft SharePoint Online sites unless the users are connected to your on-premises network.Solution: From the Endpoint Management admin center, you create a device configuration profile.Does this meet the goal?
You have a Microsoft 365 subscription. You discover that some external users accessed center for a Microsoft SharePoint site. You modify the sharePoint sharing policy to prevent sharing, outside your organization.You need to be notified if the SharePoint sharing policy is modified in the future. Solution: From the Security $ Compliance admin center you create a threat management policy. Does this meet the goal?
You have a Microsoft 365 subscription.You discover that some external users accessed center for a Microsoft SharePoint site.You modify the sharePoint sharing policy to prevent sharing, outside your organization. You need to be notified if the SharePoint sharing policy is modified in the future. Solution: From the Security $ Compliance admin center you create a threat management policy.Does this meet the goal?
You have a Microsoft 365 subscription. You need to create a data loss prevention (DLP) policy that is configured to use the Set headers action.To which location can the policy be applied?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals- Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a Microsoft 365 subscription. You discover that some external users accessed content on a Microsoft SharePoint site. You modify the SharePoint shoring policy to prevent sharing outside your organization.You need to be notified if the SharePoint sharing policy is modified m the future. Solution: From the SharePoint site, you create an alert. Does this meet the goal?
You deploy Microsoft Azure Information Protection. You need to ensure that a security administrator named SecAdmin1 can always read and inspect dataprotected by Azure Rights Management (Azure RMS). What should you do?
You have a Microsoft 365 tenant. You plan to manage incidents in the tenant by using the Microsoft 365 security center.Which Microsoft service source will appear on the Incidents page of the Microsoft 365 security center?
Your company has 5,000 Windows 10 devices. All the devices are protected by using Windows DefenderAdvanced Threat Protection (ATP).You need to view which Windows Defender ATP alert events have a high severity and occurred during the last seven days. What should you use in Windows Defender ATP?
Your company has a Microsoft 365 tenant. The company sells products online and processes credit card information.You need to be notified if a file stored in Microsoft SharePoint Online contains credit card information. The file must be removed automatically from its current location until an administrator can review its contents. What should you use?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a computer that runs Windows 10.You need to verify which version of Windows 10 is installed. Solution: From the Settings app, you select Update & Security to view the update history.Does this meet the goal?
Your company has offices in five cities. The company has a Microsoft 365 tenant.Each office is managed by a local administrator. You plan to deploy Microsoft Intune. You need to recommend a solution to manage resources in intune that meets the following requirements: Local administrators must be able to manage only the resources in their respective officeLocal administrators must be prevented from managing resources in other offices. Administrative effort must be minimized.What should you include in the recommendation?
You purchase a new computer that has Windows 10,version 2004 preinstalled. You need to ensure that the computer is up-to-date.The solution must minimize the number of updates installed.What should you do on the computer?
You have a Microsoft 365 E5 subscription. You need to identify which users accessed Microsoft Office 365 from anonymous IP addresses during the last seven days.What should you do?
Your company has 10 offices. The network contains an Active Directory domain named contoso.com. The domain contains 500 client computers. Each office is configured as a separate subnet.You discover that one of the offices has the following:Computers that have several preinstalled applications Computers that use nonstandard computer names Computers that have Windows 10 preinstalledComputers that are in a workgroup You must configure the computers to meet the following corporate requirements: All the computers must be joined to the domain.All the computers must have computer names that use a prefix of CONTOSO. All the computers must only have approved corporate applications installed. You need to recommend a solution to redeploy the computers. The solution must minimize the deployment time. What should you recommend?
You have a Microsoft 365 E5 subscription that has Microsoft Defender for Endpoint integrated with Microsoft Endpoint Manager. Devices are onboarded by using Microsoft Defender for Endpoint. You plan to block devices based on the results of the machine risk score calculated by Microsoft Defender for Endpoint.What should you create first?
On which server should you use the Defender for identity sensor?
You need to create the DLP policy to meet the technical requirements.What should you configure first?
You need to configure Office on the web to meet the technical requirements.What should you do?
You need to configure the compliance settings to meet the technical requirements.What should you do in the Microsoft Endpoint Manager admin center?
You create the planned DLP policies.You need to configure notifications to meet the technical requirements.What should you do?
You need to create the Safe Attachments policy to meet the technical requirements.Which option should you select?
You have a Microsoft 365 subscription that contains a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com. In the tenant, you create a user named User1. You need to ensure that User1 can publish retention labels from the Security & Compliance admin center. The solution must use the principle of least privilege.To which role group should you add User1?
You have a Microsoft 365 E5 subscription. You run an eDiscovery search that returns the following Azure Rights Management (Azure RMS) – encrypted content: Microsoft Exchange emails Microsoft OneDrive documents Microsoft SharePoint documentsWhich content can be decrypted when you export the eDiscovery search results?
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com. You have a Microsoft 365 subscription. You need to ensure that users can manage the configuration settings for all the Windows 10 devices in your organization.What should you configure?
Your company uses Microsoft Azure Advanced Threat Protection (ATP) and Windows Defender ATP. You need to integrate Windows Defender ATP and Azure ATP.What should you do?