Exams > Microsoft > MS-101: Microsoft 365 Mobility and Security
MS-101: Microsoft 365 Mobility and Security
Page 16 out of 37 pages Questions 151-160 out of 368 questions
Question#151

HOTSPOT
-

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.



In Microsoft Endpoint Manager, you have the Policies for Office apps configurations shown in the following table.



For each of the following statements, select Yes if the statement is true. Otherwise, select No.

Discover Answer Hide Answer

Answer:

Question#152

You plan to use Microsoft Sentinel and Microsoft Defender for Cloud Apps.

You need to connect Microsoft Defender for Cloud Apps to Microsoft Sentinel.

What should you do in the Microsoft Defender for Cloud Apps portal?

  • A. From Automatic log upload, add a data source.
  • B. From Automatic log upload, add a log collector.
  • C. From Connected apps, add an app connector.
  • D. From Security extensions, add a SIEM agent.
Discover Answer Hide Answer

Answer: D

Question#153

You need to notify the manager of the human resources department when a user in the department shares a file or folder from the department's Microsoft SharePoint Online site.

What should you do?

  • A. From the Microsoft 365 Defender portal, create an alert policy.
  • B. From the SharePoint Online admin center, modify the sharing settings.
  • C. From the Microsoft Purview compliance portal, create a data loss prevention (DLP) policy.
  • D. From the SharePoint Online site, create an alert.
Discover Answer Hide Answer

Answer: A

Question#154

You have a Microsoft 365 E5 subscription.

You need to ensure that administrators receive an email when Microsoft 365 Defender detects a sign-in from a risky IP address.

What should you create?

  • A. an incident assignment filter
  • B. a vulnerability notification rule
  • C. an incident notification rule
  • D. an alert
Discover Answer Hide Answer

Answer: D

Question#155

You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365.

You need to ensure that users are prevented from opening or downloading malicious files from Microsoft Teams, OneDrive, or SharePoint Online.

What should you do?

  • A. Configure the Safe Links global settings.
  • B. Create a new Anti-malware policy.
  • C. Configure the Safe Attachments global settings.
  • D. Create a new Anti-phishing policy.
Discover Answer Hide Answer

Answer: C

Question#156

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.

You need to be notified when a single user downloads more than 50 files during any 60-second period.

What should you configure?

  • A. a file policy
  • B. an anomaly detection policy
  • C. a session policy
  • D. an activity policy
Discover Answer Hide Answer

Answer: B

Question#157

HOTSPOT
-

You have a Microsoft 365 E5 subscription that contains a user named User1 and the administrators shown in the following table.



User1 reports that after sending 1,000 email messages in the morning, the user is blocked from sending additional emails.

You need to identify the following:

• Which administrators can unblock User1
• What to configure to allow User1 to send at least 2,000 emails per day without being blocked

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Discover Answer Hide Answer

Answer:

Question#158

You have a Microsoft 365 E3 subscription that uses Microsoft Defender for Endpoint Plan1.

Which two Defender for Endpoint features are available to the subscription? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

  • A. device discovery
  • B. attack surface reduction (ASR)
  • C. advanced hunting
  • D. security reports
  • E. digital certificate assessment
Discover Answer Hide Answer

Answer: BD

Question#159

DRAG DROP
-

You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365.

You need to configure policies to meet the following requirements:

• Customize the common attachments filter.
• Enable impersonation protection for sender domains.

Which type of policy should you configure for each requirement? To answer, drag the appropriate policy types to the correct requirements. Each policy type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Discover Answer Hide Answer

Answer:

Question#160

You have a Microsoft 365 subscription.
All users have their email stored in Microsoft Exchange Online.
In the mailbox of a user named User1, you need to preserve a copy of all the email messages that contain the word ProjectX.
What should you do?

  • A. From the Security & Compliance admin center, create a data loss prevention (DLP) policy.
  • B. From the Security & Compliance admin center, create a label and a label policy.
  • C. From the Security & Compliance admin center, start a message trace.
  • D. From Microsoft Defender for Cloud Apps, create an activity policy.
Discover Answer Hide Answer

Answer: B

chevron rightPrevious Nextchevron right