Skip to Content

Microsoft 365 Identity and Services MS-100 Exam Questions and Answers – 1

The latest Microsoft 365 Identity and Services MS-100 certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the Microsoft 365 Identity and Services MS-100 exam and earn Microsoft 365 Identity and Services MS-100 certification.

Question 41

Question

Your network contains an on-premises Active Directory domain named contoso.com. The domain contains the users shown in the following table.

The domain syncs to an Azure Active Directory (Azure AD) tenant named contoso.com as shown in the exhibit.

User2 fails to authenticate to Azure AD when signing in as [email protected].
You need to ensure that User2 can access the resources in Azure AD.
Solution: From the on-premises Active Directory domain, you assign User2 the Allow logon locally user right. You instruct User2 to sign in as [email protected].
Does this meet the goal?

A. Yes
B. No

Answer

B. No

Question 42

Question

Your network contains an on-premises Active Directory domain named contoso.com. The domain contains the users shown in the following table.

The domain syncs to an Azure Active Directory (Azure AD) tenant named contoso.com as shown in the exhibit.

User2 fails to authenticate to Azure AD when signing in as [email protected].
You need to ensure that User2 can access the resources in Azure AD.
Solution: From the on-premises Active Directory domain, you set the UPN suffix for User2 to @contoso.com. You instruct User2 to sign in as [email protected].
Does this meet the goal?

A. Yes
B. No

Answer

A. Yes

Question 43

Question

Your network contains an on-premises Active Directory domain named contoso.com. The domain contains the users shown in the following table.

The domain syncs to an Azure Active Directory (Azure AD) tenant named contoso.com as shown in the exhibit.

User2 fails to authenticate to Azure AD when signing in as [email protected].
You need to ensure that User2 can access the resources in Azure AD.
Solution: From the Azure Active Directory admin center, you assign User2 the Security reader role. You instruct User2 to sign in as [email protected].
Does this meet the goal?

A. Yes
B. No

Answer

B. No

Design and Implement Microsoft 365 Services Testlet 2

Overview

Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.

The offices have the users and devices shown in the following table.

Contoso recently purchased a Microsoft 365 E5 subscription.

Existing Environment

The network contains an Active directory forest named contoso.com and a Microsoft Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com.

You recently configured the forest to sync to the Azure AD tenant.

You add and then verify adatum.com as an additional domain name.

All servers run Windows Server 2016.

All desktop computers and laptops run Windows 10 Enterprise and are joined to contoso.com.

All the mobile devices in the Montreal and Seattle offices run Android. All the mobile devices in the New York office run iOS.

Contoso has the users shown in the following table.

Contoso has the groups shown in the following table.

Microsoft Office 365 licenses are assigned only to Group2.

The network also contains external users from a vendor company who have Microsoft accounts that use a suffix of @outlook.com.

Requirements

Planned Changes
Contoso plans to provide email addresses for all the users in the following domains:

  • East.adatum.com
  • Contoso.adatum.com
  • Humongousinsurance.com

Technical Requirements
Contoso identifies the following technical requirements:

  • All new users must be assigned Office 365 licenses automatically.
  • The principle of least privilege must be used whenever possible.

Security Requirements
Contoso identifies the following security requirements:

  • Vendors must be able to authenticate by using their Microsoft account when accessing Contoso resources.
  • User2 must be able to view reports and schedule the email delivery of security and compliance reports.
  • The members of Group1 must be required to answer a security question before changing their password.
  • User3 must be able to manage Office 365 connectors.
  • User4 must be able to reset User3 password.

Question 44

Question

You need to add the custom domain names to Office 365 to support the planned changes as quickly as possible.
What should you create to verify the domain names successfully?

A. three alias (CNAME) records
B. one text (TXT) record
C. one alias (CNAME) record
D. three text (TXT) records

Answer

D. three text (TXT) records

Design and Implement Microsoft 365 Services Testlet 3

Overview

Fabrikam, Inc. is an electronics company that produces consumer products. Fabrikam has 10,000 employees worldwide.

Fabrikam has a main office in London and branch offices in major cities in Europe, Asia, and the United States.

Existing Environment

Active Directory Environment
The network contains an Active Directory forest named fabrikam.com. The forest contains all the identities used for user and computer authentication.

Each department is represented by a top-level organizational unit (OU) that contains several child OUs for user accounts and computer accounts.

All users authenticate to on-premises applications by signing in to their device by using a UPN format of [email protected].

Fabrikam does NOT plan to implement identity federation.

Network Infrastructure

Each office has a high-speed connection to the Internet.

Each office contains two domain controllers. All domain controllers are configured as a DNS server.

The public zone for fabrikam.com is managed by an external DNS server.

All users connect to an on-premises Microsoft Exchange Server 2016 organization. The users access their email by using Outlook Anywhere, Outlook on the web, or the Microsoft Outlook app for iOS. All the Exchange servers have the latest cumulative updates installed.

All shared company documents are stored on a Microsoft SharePoint Server farm.

Requirements

Planned Changes
Fabrikam plans to implement a Microsoft 365 Enterprise subscription and move all email and shared documents to the subscription.

Fabrikam plans to implement two pilot projects:

  • Project1: During Project1, the mailboxes of 100 users in the sales department will be moved to Microsoft 365.
  • Project2: After the successful completion of Project1, Microsoft Teams & Skype for Business will be enabled in Microsoft 365 for the sales department users.

Fabrikam plans to create a group named UserLicenses that will manage the allocation of all Microsoft 365 bulk licenses.

Technical Requirements
Fabrikam identifies the following technical requirements:

  • All users must be able to exchange email messages successfully during Project1 by using their current email address.
  • Users must be able to authenticate to cloud services if Active Directory becomes unavailable.
  • A user named User1 must be able to view all DLP reports from the Microsoft 365 admin center.
  • Microsoft Office 365 ProPlus applications must be installed from a network share only.
  • Disruptions to email access must be minimized.

Application Requirements
Fabrikam identifies the following application requirements:

  • An on-premises web application named App1 must allow users to complete their expense reports online. App1 must be available to users from the My Apps portal.
  • The installation of feature updates for Office 365 ProPlus must be minimized.

Security Requirements
Fabrikam identifies the following security requirements:

  • After the planned migration to Microsoft 365, all users must continue to authenticate to their mailbox and to SharePoint sites by using their UPN.
  • The memberships of UserLicenses must be validated monthly. Unused user accounts must be removed from the group automatically.
  • After the planned migration to Microsoft 365, all users must be signed in to on-premises and cloudbased applications automatically.
  • The principle of least privilege must be used.

Question 45

Question

You are evaluating the required processes for Project1.
You need to recommend which DNS record must be created before adding a domain name for the project.
Which DNS record should you recommend?

A. alias (CNAME)
B. host information (HINFO)
C. host (A)
D. mail exchanger (MX)

Answer

D. mail exchanger (MX)

Question 46

Question

You are evaluating the required processes for Project1.
You need to recommend which DNS record must be created before adding a domain name for the project.
Which DNS record should you recommend?

A. alias (CNAME)
B. text (TXT)
C. host (AAAA)
D. pointer (PTR)

Answer

B. text (TXT)

Manage User Identity and Roles Question Set 1

Question 47

Question

Your network contains a single Active Directory domain and two Microsoft Azure Active Directory (Azure AD) tenants.
You plan to implement directory synchronization for both Azure AD tenants. Each tenant will contain some of the Active Directory users.
You need to recommend a solution for the planned directory synchronization.
What should you include in the recommendation?

A. Deploy two servers that run Azure AD Connect, and then filter the users for each tenant by using organizational unit (OU)-based filtering.
B. Deploy one server that runs Azure AD Connect, and then specify two sync groups.
C. Deploy one server that runs Azure AD Connect, and then filter the users for each tenant by using organizational unit (OU)-based filtering.
D. Deploy one server that runs Azure AD Connect, and then filter the users for each tenant by using domain-based filtering.

Answer

A. Deploy two servers that run Azure AD Connect, and then filter the users for each tenant by using organizational unit (OU)-based filtering.

Question 48

Question

Your company has a Microsoft Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com that contains a user named User1.
You suspect that an imposter is signing in to Azure AD by using the credentials of User1.
You need to ensure that an administrator named Admin1 can view all the sign in details of User1 from the past 24 hours.
To which three roles should you add Admin1? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

A. Security administrator
B. Password administrator
C. User administrator
D. Compliance administrator
E. Reports reader
F. Security reader

Answer

A. Security administrator
E. Reports reader
F. Security reader

Question 49

Question

You have a Microsoft 365 subscription.
You plan to enable Microsoft Azure Information Protection.
You need to ensure that only the members of a group named PilotUsers can protect content.
What should you do?

A. Run the Add-AadrmRoleBaseAdministrator cmdlet.
B. Create an Azure Information Protection policy.
C. Configure the protection activation status for Azure Information Protection.
D. Run the Set-AadrmOnboardingControlPolicy cmdlet.

Answer

D. Run the Set-AadrmOnboardingControlPolicy cmdlet.

Question 50

Question

Your company has a Microsoft 365 subscription.
You need to identify which users performed the following privileged administration tasks:

  • Deleted a folder from the second-stage Recycle Bin if Microsoft SharePoint
  • Opened a mailbox of which the user was not the owner
  • Reset a user password

What should you use?

A. Microsoft Azure Active Directory (Azure AD) audit logs
B. Microsoft Azure Active Directory (Azure AD) sign-ins
C. Security & Compliance content search
D. Security & Compliance audit log search

Answer

A. Microsoft Azure Active Directory (Azure AD) audit logs