Exams > Microsoft > MS-101: Microsoft 365 Mobility and Security
MS-101: Microsoft 365 Mobility and Security
Page 15 out of 37 pages Questions 141-150 out of 368 questions
Question#141

Your company has a Microsoft 365 E5 subscription.

Users in the research department work with sensitive data.

You need to prevent the research department users from accessing potentially unsafe websites by using hyperlinks embedded in email messages and documents. Users in other departments must not be restricted.

What should you do?

  • A. Create a data loss prevention (DLP) policy that has a Content is shared condition.
  • B. Create a new safe links policy.
  • C. Create a data loss prevention (DLP) policy that has a Content contains condition.
Discover Answer Hide Answer

Answer: B

Question#142

You have a Microsoft 365 E5 tenant.

You need to create a policy that will trigger an alert when unusual Microsoft Office 365 usage patterns are detected.

What should you use to create the policy?

  • A. the Microsoft 365 admin center
  • B. the Microsoft 365 compliance center
  • C. the Microsoft Defender for Cloud Apps portal
  • D. the Microsoft Apps admin center
Discover Answer Hide Answer

Answer: B

Question#143

You have a Microsoft 365 tenant.

You plan to manage incidents in the tenant by using the Microsoft 365 Defender.

Which Microsoft service source will appear on the Incidents page of the Microsoft 365 Defender portal?

  • A. Azure Information Protection
  • B. Azure Arc
  • C. Microsoft Sentinel
  • D. Microsoft Defender for Identity
Discover Answer Hide Answer

Answer: D

Question#144

HOTSPOT
-

You have a Microsoft 365 E3 subscription.

You plan to launch Attack simulation training for all users.

Which social engineering technique and training experience will be available? To answer, select the appropriate option.

NOTE: Each correct selection is worth one point.

Discover Answer Hide Answer

Answer:

Question#145

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Office 365.

You have the policies shown in the following table.



All the policies are configured to send malicious email messages to quarantine.

Which policies support a customized quarantine retention period?

  • A. Policy1 and Policy3 only
  • B. Policy2 and Policy4 only
  • C. Policy1 and Policy2 only
  • D. Policy3 and Policy4 only
Discover Answer Hide Answer

Answer: C

Question#146

HOTSPOT
-

You have a Microsoft 365 E5 subscription.

You plan to use a mailbox named Mailbox1 to analyze malicious email messages.

You need to configure Microsoft Defender for Office 365 to meet the following requirements:

• Ensure that incoming email is NOT filtered for Mailbox1.
• Detect impersonation and spoofing attacks on all other mailboxes in the subscription.

Which two settings should you configure? To answer, select the appropriate settings in the answer area.

NOTE: Each correct selection is worth one point.

Discover Answer Hide Answer

Answer:

Question#147

You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365.

A Built-in protection preset security policy is applied to the subscription.

Which two policy types will be applied by the Built-in protection policy? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

  • A. Safe Links
  • B. Anti-malware
  • C. Anti-phishing
  • D. Anti-spam
  • E. Safe Attachments
Discover Answer Hide Answer

Answer: AE

Question#148

You have a Microsoft 365 tenant.

You plan to implement Endpoint Protection device configuration profiles.

Which platform can you manage by using the profiles?

  • A. Android
  • B. Android Enterprise
  • C. CentOS Linux
  • D. macOS
Discover Answer Hide Answer

Answer: D

Question#149

You have a Microsoft 365 tenant.

You plan to implement Endpoint Protection device configuration profiles.

Which platform can you manage by using the profiles?

  • A. macOS
  • B. Ubuntu Linux
  • C. CentOS Linux
  • D. Windows 8.1
Discover Answer Hide Answer

Answer: A

Question#150

You have a Microsoft 365 E5 subscription.

You need to be alerted when Microsoft 365 Defender detects high-severity incidents.

What should you use?

  • A. a threat policy
  • B. a custom detection rule
  • C. an alert policy
  • D. a notification rule
Discover Answer Hide Answer

Answer: C

chevron rightPrevious Nextchevron right