Skip to Content

MS-101 Microsoft 365 Mobility and Security Exam Questions and Answers – Page 2

The latest MS-101 Microsoft 365 Mobility and Security certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the MS-101 Microsoft 365 Mobility and Security exam and earn MS-101 Microsoft 365 Mobility and Security certification.

Exam Question 131

Your company uses Microsoft Defender Advanced Threat Protection (ATP). Microsoft Defender ATP contains the device groups shown in the following table.

Rank Machine group Member
1 Group1 Name starts with COMP
2 Group2 Name starts with Comp And OS In Windows 10
3 Group3 OS In Windows Server 2016
Last Ungrouped machines (default) Not applicable

You onboard computers to Microsoft Defender ATP as shown in the following table.

Name Operating system
Computer1 Windows 10
Computer2 Windows Server 2016

Of which groups are Computer1 and Computer2 members? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

Computer1:

  • Group1 only
  • Group2 only
  • Group1 and Group2
  • Ungrouped machines

Computer2:

  • Group1 only
  • Group3 only
  • Group1 and Group3

Correct Answer:

  • Computer1: Group1 and Group2
  • Computer2: Group1 and Group3

Exam Question 132

You have Windows 10 devices that are managed by using Microsoft Endpoint Manager.
You need to configure the security settings in Microsoft Edge.
What should you create in Microsoft Endpoint Manager?

A. an app configuration policy
B. an app
C. a device configuration profile
D. a device compliance policy
Correct Answer:
C. a device configuration profile

Exam Question 133

You have a Microsoft 365 E5 tenant that contains the users shown in the following table.

Name Role
User1 Global admin
User2 None
User3 None

You provision the private store in Microsoft Store for Business.
You assign Microsoft Store for Business roles to the users as shown in the following table.

Name Role
User1 None
User2 Purchaser
User3 Basic Purchaser

You need to identify which users can add apps to the private store, and which users can assign apps from Microsoft Store for Business.
Which users should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

Can add apps to the private store:

  • User2 only
  • User1 and User2 only
  • User2 and User3 only
  • User1, User2, and User3

Can assign apps from Microsoft Store for Business:

  • User2 only
  • User1 and User2 only
  • User2 and User3 only
  • User1, User2, and User3

Correct Answer:

  • Can add apps to the private store: User1 and User2 only
  • Can assign apps from Microsoft Store for Business: User1, User2, and User3

Implement Microsoft 365 security and threat management: Testlet 2: Case Study

Overview

Contoso, Ltd. is a consulting company that has a main office in Montreal and two branch offices in Seattle and New York.
The company has the employees and devices shown in the following table.

Location Employees Laptops Desktops Mobile devices
Montreal 2,500 2,800 300 3,100
Seattle 1,000 1,100 200 1,500
New York 300 320 30 400

Contoso recently purchased a Microsoft 365 E5 subscription.

Existing Environment

The network contains an on-premises Active Directory forest named contoso.com. The forest contains the servers shown in the following table.

Name Configuration
Server1 Domain controller
Server2 Member server
Server3 Network Policy Server (NPS)server
Server4 Remote access server
Server5 Microsoft Azure AD Connect server

All servers run Windows Server 2016. All desktops and laptops run Windows 10 Enterprise and are joined to the domain.
The mobile devices of the users in the Montreal and Seattle offices run Android. The mobile devices of the users in the New York office run iOS.
The domain is synced to Azure Active Directory (Azure AD) and includes the users shown in the following table.

Name Azure AD role
User1 None
User2 Application administrator
User3 Cloud application administrator
User4 Global administrator
User5 Intune administrator

The domain also includes a group named Group1.

Requirements

Planned Changes

Contoso plans to implement the following changes:

  • Implement Microsoft 365.
  • Manage devices by using Microsoft Intune.
  • Implement Azure Advanced Threat Protection (ATP).
  • Every September, apply the latest feature updates to all Windows computers. Every March, apply the latest feature updates to the computers in the New York office only.

Technical Requirements

Contoso identifies the following technical requirements:

  • When a Windows 10 device is joined to Azure AD, the device must enroll in Intune automatically.
  • Dedicated support technicians must enroll all the Montreal office mobile devices in Intune.
  • User1 must be able to enroll all the New York office mobile devices in Intune.
  • Azure ATP sensors must be installed and must NOT use port mirroring.
  • Whenever possible, the principle of least privilege must be used.
  • A Microsoft Store for Business must be created.

Compliance Requirements

Contoso identifies the following compliance requirements:

  • Ensure that the users in Group1 can only access Microsoft Exchange Online from devices that are enrolled in Intune and configured in accordance with the corporate policy.
  • Configure Windows Information Protection (WIP) for the Windows 10 devices.

Exam Question 134

On which server should you install the Azure ATP sensor?

A. Server1
B. Server2
C. Server3
D. Server4
E. Server5
Correct Answer:
A. Server1

Implement Microsoft 365 security and threat management: Testlet 3: Case Study

Overview

ADatum Corporation is an international financial services company that has 5,000 employees.
ADatum has six offices: a main office in New York and five branch offices in Germany, the United Kingdom, France, Spain, and Italy.
All the offices are connected to each other by using a WAN link. Each office connects directly to the Internet.

Existing Environment

Current Infrastructure

ADatum recently purchased a Microsoft 365 subscription.
All user files are migrated to Microsoft 365.
All mailboxes are hosted in Microsoft 365. The users in each office have email suffixes that include the country of the user, for example, [email protected] or [email protected].
Each office has a security information and event management (SIEM) appliance. The appliance comes from three different vendors.
ADatum uses and processes Personally Identifiable Information (PII).

Problem Statements

ADatum entered into litigation. The legal department must place a hold on all the documents of a user named User1 that are in Microsoft 365.

Requirements

Business Goals

ADatum wants to be fully compliant with all the relevant data privacy laws in the regions where is operates.
ADatum wants to minimize the cost of hardware and software whenever possible.

Technical Requirements

ADatum identifies the following technical requirements:

  • Centrally perform log analysis for all offices.
  • Aggregate all data from the SIEM appliances to a central cloud repository for later analysis.
  • Ensure that a SharePoint administrator can identify who accessed a specific file stored in a document library.
  • Provide the users in the finance department with access to Service assurance information in Microsoft Office 365.
  • Ensure that documents and email messages containing the PII data of European Union (EU) citizens are preserved for 10 years.
  • If a user attempts to download 1,000 or more files from Microsoft SharePoint Online within 30 minutes, notify a security administrator and suspend the user’s user account.
  • A security administrator requires a report that shown which Microsoft 365 users signed in. Based on the report, the security administrator will create a policy to require multi-factor authentication when a sign in is high risk.
  • Ensure that the users in the New York office can only send email messages that contain sensitive U.S. PII data to other New York office uses. Email messages must be monitored to ensure compliance. Auditors in the New York office must have access to reports that show the sent and received email messages containing sensitive U.S. PII data.

Exam Question 135

You need to meet the technical requirement for large-volume document retrieval.
What should you create?

A. an activity policy from Microsoft Cloud App Security
B. a data loss prevention (DLP) policy from the Security & Compliance admin center
C. a file policy from Microsoft Cloud App Security
D. an alert policy from the Security & Compliance admin center
Correct Answer:
A. an activity policy from Microsoft Cloud App Security

Manage Microsoft 365 governance and compliance: Question Set 1

Exam Question 136

You have a new Microsoft 365 subscription.
You need to prevent users from sending email messages that contain Personally Identifiable Information (PII).
Solution: From the Exchange admin center, you create a data loss prevention (DLP) policy.
Does this meet the goal?

A. Yes
B. No
Correct Answer:
A. Yes

Exam Question 137

You have a Microsoft 365 subscription.
Some users have iPads that are managed by your company.
You plan to prevent the iPad users from copying corporate data in Microsoft Word and pasting the data into other applications.
What should you create?

A. A conditional access policy.
B. A compliance policy.
C. An app protection policy.
D. An app configuration policy.
Correct Answer:
C. An app protection policy.

Exam Question 138

You have a new Microsoft 365 subscription.
You need to prevent users from sending email messages that contain Personally Identifiable Information (PII).
Solution: From the Azure portal, you create a Microsoft Azure Information Protection label and an Azure Information Protection policy.
Does this meet the goal?

A. Yes
B. No
Correct Answer:
B. No

Exam Question 139

You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
You create an Azure Advanced Threat Protection (ATP) workspace named Workspace1.
The tenant contains the users shown in the following table.

Name Member of group Azure AD role
User1 Azure ATP Workspace1 Administrator None
User2 Azure ATP Workspace1 Users None
User3 None Security administrator
User4 Azure ATP Workspace1 Users Global administrator

You need to modify the configuration of the Azure ATP sensors.
Solution: You instruct User1 to modify the Azure ATP sensor configuration.
Does this meet the goal?

A. Yes
B. No
Correct Answer:
A. Yes
Answer Description:
Only Azure ATP administrators can modify the sensors.

Exam Question 140

You have a data loss prevention (DLP) policy.
You need to increase the likelihood that the DLP policy will apply to data that contains medical terms from the International Classification of Diseases (ICD-9-CM). The solution must minimize the number of false positives.
Which two settings should you modify? To answer, select the appropriate settings in the answer area.
NOTE: Each correct selection is worth one point.
You need to increase the likelihood that the DLP policy will apply to data that contains medical terms from the International Classification of Diseases (ICD-9-CM).
Correct Answer:
Correct answer: You need to increase the likelihood that the DLP policy will apply to data that contains medical terms from the International Classification of Diseases (ICD-9-CM).