This page was exported from Top Exam Collection [ http://blog.topexamcollection.com ] Export date:Fri Apr 4 9:17:06 2025 / +0000 GMT ___________________________________________________ Title: Get Latest Jan-2024 Conduct effective penetration tests using TopExamCollection MS-101 exam [Q64-Q84] --------------------------------------------------- Get Latest [Jan-2024] Conduct effective penetration tests using TopExamCollection MS-101 Penetration testers simulate MS-101 exam PDF Microsoft MS-101 Certification Exam is intended for IT professionals who have a good understanding of Microsoft 365 services and are looking to validate their skills in managing and securing these services. MS-101 exam covers various topics, including implementing modern device services, implementing Microsoft 365 security and threat management, and managing Microsoft 365 governance and compliance.   QUESTION 64Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named contoso.com. The tenant contains the users shown in the following table.You create a retention label named Label1 that has the following configurations:Retains content for five yearsAutomatically deletes all content that is older than five yearsYou turn on Auto labeling for Label1 by using a policy named Policy1. Policy1 has the following configurations:Applies to content that contains the word MergerSpecifies the OneDrive accounts and SharePoint sites locationsYou run the following command.Set-RetentionCompliancePolicy Policy1 -RestrictiveRetention $true -Force For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Reference:https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-retention/set-retentioncompliancepolicy?view=exchange-psQUESTION 65You implement Microsoft Azure Advanced Threat Protection (Azure ATP).You have an Azure ATP sensor configured as shown in the following exhibit.How long after the Azure ATP cloud service is updated will the sensor update?  1 hour  12 hours  48 hours  7days  72 hours References:https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-whats-newQUESTION 66HOTSPOTYou have a Microsoft 365 subscription.You are planning a threat management solution for your organization.You need to minimize the likelihood that users will be affected by the following threats:* Opening files in Microsoft SharePoint that contain malicious content* Impersonation and spoofing attacks in email messagesWhich policies should you create in the Security & Compliance admin center? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point.Hot Area: Section: [none]Explanation:Box 1: ATP Safe AttachmentsATP Safe Attachments provides zero-day protection to safeguard your messaging system, by checking email attachments for malicious content. It routes all messages and attachments that do not have a virus/malware signature to a special environment, and then uses machine learning and analysis techniques to detect malicious intent. If no suspicious activity is found, the message is forwarded to the mailbox.Box 2: ATP anti-phishingATP anti-phishing protection detects attempts to impersonate your users and custom domains. It applies machine learning models and advanced impersonation-detection algorithms to avert phishing attacks.ATP Safe Links provides time-of-click verification of URLs, for example, in emails messages and Office files.Protection is ongoing and applies across your messaging and Office environment. Links are scanned for each click: safe links remain accessible and malicious links are dynamically blocked.References:https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/office-365-atp#configure-atp- policiesQUESTION 67You have a Microsoft 365 E5 tenant that contains 100 Windows 10 devices.You plan to attack surface reduction (ASR) rules for the Windows 10 devices.You configure the ASR rules in audit mode and collect audit data in a Log Analytics workspace.You need to find the ASR rules that match the activities on the devices.How should you complete the Kusto query? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Reference:https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/demystifying-attack-surface-reduction-rules-part-3/ba-p/1360968QUESTION 68You have a Microsoft 365 subscription.You need to be notified if users receive email containing a file that has a virus.What should you do?  From the Exchange admin center, create a spam filter policy.  From the Security & Compliance admin center, create a data governance event.  From the Security & Compliance admin center, create an alert policy.  From the Exchange admin center, create a mail flow rule. Section: [none]Explanation:You can create alert policies to track malware activity and data loss incidents. We’ve also included several default alert policies that help you monitor activities such as assigning admin privileges in Exchange Online, malware attacks, phishing campaigns, and unusual levels of file deletions and external sharing.The Email messages containing malware removed after delivery default alert generates an alert when any messages containing malware are delivered to mailboxes in your organization.Incorrect answers:A: A spam filter policy includes selecting the action to take on messages that are identified as spam. Spam filter policy settings are applied to inbound messages.B: A data governance event commences when an administrator creates it, following which background processes look for content relating to the event and take the retention action defined in the label. The retention action can be to keep or remove items, or to mark them for manual disposition.D: You can inspect email attachments in your Exchange Online organization by setting up mail flow rules.Exchange Online offers mail flow rules that provide the ability to examine email attachments as a part of your messaging security and compliance needs. However, mail flow rules are not used to detect malware in emails.Reference:https://docs.microsoft.com/en-us/office365/securitycompliance/alert-policiesQUESTION 69You have a data loss prevention (DIP) policy.You need to increase the likelihood that the DLP policy will apply to data that contains medical terms from the International Classification of Diseases (ICD-9-CM). The solution must minimize the number of false positives.Which two settings should you modify? To answer, select the appropriate settings in the answer area.NOTE: Each correct selection is worth one point. Explanation:References:https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policieshttps://docs.microsoft.com/en-us/office365/securitycompliance/what-the-sensitive-information-types-look-for#international-classification-of-diseases-icd-9-cmQUESTION 70You have a Microsoft Azure Active Directory (Azure AD) tenant named sk180818.onmicrosoft.com. The tenant contains the users shown in the following table.In Azure Information Protection, you create a label named Label1 as shown in the following exhibit.Label1 is applied to a file named File1.You send File1 as an email attachment to User1, User2, User3, and User4.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. ExplanationReference:https://docs.microsoft.com/en-us/azure/information-protection/configure-usage-rights#rights-included-in-permissQUESTION 71Your company purchases a cloud app named App1.You need to ensure that you can use Microsoft Cloud App Security to block downloads in App1. App1 supports session controls.Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 1 – From the Cloud App Security admin center,add an app connector.2 – Create a conditional access policy.3 – Sign in to App1.Reference:https://docs.microsoft.com/en-us/cloud-app-security/getting-started-with-cloud-app-securityQUESTION 72You purchase a new Microsoft 365 subscription.You create 100 users who are assigned Microsoft 365 E3 licenses.From the Security & Compliance admin center, you enable auditing.Six months later, a manager sends you an email message asking the following questions:* Question1: Who created a team named Team1 14 days ago?* Question2: Who signed in to the mailbox of User1 30 days ago?* Question3: Who changed the site collection administrators of a site 60 days ago?For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. ExplanationReferences:https://docs.microsoft.com/en-us/office365/securitycompliance/search-the-audit-log-in-security-and-compliance?https://docs.microsoft.com/en-us/office365/securitycompliance/enable-mailbox-auditingQUESTION 73You have a Microsoft 365 E5 tenant that contains a Microsoft SharePoint Online site named Site1. Site1 contains the files shown in the following table.You create a sensitivity label named Sensitivity1 and an auto-label policy that has the following configurations:Name: AutoLabel1Label to auto-apply: Sensitivity1Rules for SharePoint Online sites: Rule1-SPOChoose locations where you want to apply the label: Site1Rule1-SPO is configured as shown in the following exhibit.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Reference:https://docs.microsoft.com/en-us/microsoft-365/compliance/apply-sensitivity-label-automatically?view=o365-worldwidehttps://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwideQUESTION 74You have a Microsoft 365 subscription that contains all the user data.You plan to create the retention policy shown in the Locations exhibit. (Click the Locations tab.)You configure the Advanced retention settings as shown in the Retention exhibit. (Click the Retention tab.)The locations specified in the policy include the groups shown in the following table.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Reference:https://community.spiceworks.com/topic/2150016-can-you-apply-a-retention-policy-to-users-within-a-group-on-o365 Distribution lists and mail-enabled security groups will be expanded so the policy will apply to all the mailboxes in the group. Only the mailboxes that are currently members of these groups will be covered by the policy. Mailboxes added to these groups later won’t be covered, but ones that are removed later will still be covered.QUESTION 75HOTSPOTYou have a Microsoft 365 E5 tenant that contains the users shown in the following table.The tenant contains the devices shown in the following table.You have the apps shown in the following table.You plan to use Microsoft Endpoint Manager to manage the apps for the users.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point.Hot Area: Section: [none]Explanation/Reference:https://docs.microsoft.com/en-us/mem/intune/apps/apps-deployhttps://docs.microsoft.com/en-us/mem/intune/apps/apps-windows-10-app-deployQUESTION 76Your company purchases a cloud app named App1.You plan to publish App1 by using a conditional access policy named Policy1.You need to ensure that you can control access to App1 by using a Microsoft Cloud App Security session policy.Which two settings should you modify in Policy1? To answer, select the appropriate settings in the answer area.NOTE: Each correct selection is worth one point. Reference:https://docs.microsoft.com/en-us/cloud-app-security/proxy-deployment-aadQUESTION 77You configure an anti-phishing policy as shown in the following exhibit.Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.NOTE: Each correct selection is worth one point. Explanation:https://docs.microsoft.com/en-us/office365/securitycompliance/set-up-anti-phishing-policies#learn-about-atp-anti-phishing-policy-optionsQUESTION 78Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.Your network contains an on-premises Active Directory domain. The domain contains 2,000 computers that run Windows 8.1 and have applications installed as shown in the following table.You enroll all the computers in Upgrade Readiness.You need to ensure that App1 and App2 have an UpgradeDecision status of Ready to upgrade.Solution: You set the ReadyForWindows status of App2 to Highly adopted.Does this meet the goal?  Yes  No App1 has a “low install count” (2% or less) so will be Ready to upgrade. We just need to change the setting for App2.https://docs.microsoft.com/en-us/windows/deployment/upgrade/upgrade-readiness-identify-appsQUESTION 79You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com.Your company implements Windows Information Protection (WIP).You need to modify which users and applications are affected by WIP.What should you do? To answer, select the appropriate options m the answer area.NOTE: Each correct selection is worth one point. Reference:https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azureQUESTION 80You have a Microsoft 365 tenant.You plan to implement device configuration profiles in Microsoft Intune.Which platform can you manage by using the profiles?  Ubuntu Linux  macOS  Android Enterprise  Windows 8.1 QUESTION 81You configure a conditional access policy. The locations settings are configured as shown in the Locations exhibit. (Click the Locations tab.)The users and groups settings are configured as shown in the Users and Groups exhibit. (Click Users and Groups tab.)Members of the Security reader group report that they cannot sign in to Microsoft Active Directory (Azure AD) on their device while they are in the office.You need to ensure that the members of the Security reader group can sign in in to Azure AD on their device while they are in the office. The solution must use the principle of least privilege.What should you do?  From the conditional access policy, configure the device state.  From the Azure Active Directory admin center, create a custom control.  From the Intune admin center, create a device compliance policy.  From the Azure Active Directory admin center, create a named location. ExplanationReferences:https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/location-conditionQUESTION 82You have a Microsoft 365 tenant.You plan to create a retention policy as shown in the following exhibit.Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.NOTE: Each correct selection is worth one point. ExplanationQUESTION 83You have a Microsoft 365 E5 tenant that contains two users named User1 and User2 and the groups shown in the following table.You have a Microsoft Intune enrollment policy that has the following settings:* MDM user scope: Some* Groups: Group1* MAM user scope: Some* Groups: Group2You purchase the devices shown in the following table.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. ExplanationGraphical user interface, text, application, email Description automatically generatedReference:https://docs.microsoft.com/en-us/mem/intune/enrollment/windows-enrollhttps://docs.microsoft.com/en-us/mem/intune/enrollment/android-enroll-device-administratorQUESTION 84You create a Microsoft 36S subscription.You need to create a deployment plan for Microsoft Azure Advanced Threat Protection (ATP).Which five actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. Reference:https://blog.ahasayen.com/azure-advanced-threat-protection-deployment/ Loading … Microsoft MS-101 (Microsoft 365 Mobility and Security) Certification Exam is a globally recognized certification program designed for IT professionals who are looking to validate their skills in managing and securing Microsoft 365 services. Microsoft 365 Mobility and Security certification exam is a part of Microsoft's Modern Workplace certification path, which focuses on empowering IT professionals with the skills required to manage and secure modern workplace technologies.   Tested Material Used To MS-101 Test Engine: https://www.topexamcollection.com/MS-101-vce-collection.html --------------------------------------------------- Images: https://blog.topexamcollection.com/wp-content/plugins/watu/loading.gif https://blog.topexamcollection.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2024-01-12 12:53:57 Post date GMT: 2024-01-12 12:53:57 Post modified date: 2024-01-12 12:53:57 Post modified date GMT: 2024-01-12 12:53:57