Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Microsoft 365 Administrator Exam

Last Update 13 hours ago Total Questions : 546

The Microsoft 365 Administrator Exam content is now fully updated, with all current exam questions added 13 hours ago. Deciding to include MS-102 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our MS-102 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these MS-102 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Microsoft 365 Administrator Exam practice test comfortably within the allotted time.

Question # 31

You have a Microsoft 365 E5 subscription and use Microsoft Defender for Cloud Apps. The subscription contains users that have Windows 11 devices.

You need to use the Cloud Discovery snapshot report to analyze cloud app usage on the devices. What should you do before generating a report?

A.

Create an activity policy.

B.

Deploy the Azure Monitor Agent on the devices.

C.

Create an app discovery policy.

D.

Export traffic logs from firewalls and proxies.

Question # 32

You are evaluating the use of multi-factor authentication (MFA).

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 33

: 241

You have a Microsoft 365 tenant that contains 1,000 iOS devices enrolled in Microsoft Intune. You plan to purchase volume-purchased apps and deploy the apps to the devices. You need to track used licenses and manage the apps by using Intune. What should you use to purchase the apps?

A.

Microsoft Store for Business

B.

Apple Business Manager

C.

Apple iTunes Store

D.

Apple Configurator

Question # 34

You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365.

A Built-in protection preset security policy is applied to the subscription.

Which two policy types will be applied by the Built-in protection policy? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

Anti-malware

B.

Anti-phishing

C.

Safe Attachments

D.

Anti-spam

E.

Safe Links

Question # 35

You need to configure just in time access to meet the technical requirements.

What should you use?

A.

entitlement management

B.

Azure AD Privileged Identity Management (PIM)

C.

access reviews

D.

Azure AD Identity Protection

Question # 36

You have a Microsoft 365 E5 tenant.

You create an auto-labeling policy to encrypt emails that contain a sensitive info type. You specify the locations where the policy will be applied.

You need to deploy the policy.

What should you do first?

A.

Review the sensitive information in Activity explorer

B.

Turn on the policy

C.

Run the policy in simulation mode

D.

Configure Azure Information Protection analytics

Question # 37

HOTSPOT

You have a Microsoft 365 subscription.

You deploy the anti-phishing policy shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

Question # 38

You have a Microsoft 365 E5 subscription.

You define a retention label that has the following settings:

• Retention period 7 years

• Start the retention period bated on: When items were created

You need to prevent the removal of the label once the label K applied to a lie What should you select in the retention label settings?

A.

Retain items even If users delete

B.

Mark items as a record

C.

Mark items as a regulatory record

D.

Retain items forever

Question # 39

You have a Microsoft 365 Enterprise E5 subscription.

You add a cloud-based app named App1 to the Azure AD enterprise applications list.

You need to ensure that two-step verification is enforced for all user accounts the next time they connect to App1.

Which three settings should you configure from the policy? To answer, select the appropriate settings in the answer area.

NOTE: Each correct selection is worth one point.

Question # 40

You need to ensure that User2 can review the audit logs. The solutions must meet the technical requirements.

To which role group should you add User2, and what should you use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Go to page: