Proper study guides for Avant-garde Microsoft Microsoft 365 Mobility and Security (beta) certified begins with Microsoft MS-101 preparation products which designed to deliver the Validated MS-101 questions by making you pass the MS-101 test at your first time. Try the free MS-101 demo right now.

Check MS-101 free dumps before getting the full version:

NEW QUESTION 1
You need to protect the U.S. PII data to meet the technical requirements. What should you create?

  • A. a data loss prevention (DLP) policy that contains a domain exception
  • B. a Security & Compliance retention policy that detects content containing sensitive data
  • C. a Security & Compliance alert policy that contains an activity
  • D. a data loss prevention (DLP) policy that contains a user override

Answer: C

Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/create-activity-alerts

NEW QUESTION 2
HOTSPOT
You have retention policies in Microsoft 365 as shown in the following table.
MS-101 dumps exhibit
Policy1 is configured as shown in the Policy1 exhibit. (Click the Policy1 tab.)
MS-101 dumps exhibit
Policy2 is configured as shown in the Policy2 exhibit. (Click the Policy2 tab.)
MS-101 dumps exhibit
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
MS-101 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
References:
httpsHYPERLINK "https://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies#the-principles-of-retention-or-what-takes-precedence"://docs.microsoft.com/en-us/office365/securitycompliance/retention-policies#the-principles-of-retention-or-what-takes- precedence

NEW QUESTION 3
HOTSPOT
From the Security & Compliance admin center, you create a retention policy named Policy1. You need to prevent all users from disabling the policy or reducing the retention period.
Which command should you run? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
MS-101 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
References:
https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-retention/set-retentioncompliancepolicy?view=exchange-pHYPERLINK "https://docs.microsoft.com/en-us/powershell/module/exchange/policy-and-compliance-retention/set-retentioncompliancepolicy?view=exchange-ps"s

NEW QUESTION 4
HOTSPOT
You have the Microsoft Azure Active Director (Azure AD) users shown in the following table.
MS-101 dumps exhibit
You create a conditional access policy that has the following settings:
• The Assignments settings are configured as follows:
• Users and groups: Group1
• Cloud apps: Microsoft Office 365 Exchange Online
• Conditions: Include All device state, exclude Device marked as compliant
• Access controls is set to Block access.
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
MS-101 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
MS-101 dumps exhibit

NEW QUESTION 5
HOTSPOT
You have a Microsoft 365 subscription.
You have a group named Support. Users in the Support group frequently send email messages to external users.
The manager of the Support group wants to randomly review messages that contain attachments. You need to provide the manager with the ability to review messages that contain attachments sent from the Support group users to external users. The manager must have access to only 10 percent of the messages.
What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
MS-101 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/supervision-policies

NEW QUESTION 6
You have a Microsoft 365 subscription.
You recently configured a Microsoft SharePoint Online tenant in the subscription. You plan to create an alert policy.
You need to ensure that an alert is generated only when malware is detected in more than five documents stored in SharePoint Online during a period of 10 minutes.
What should you do first?

  • A. Enable Microsoft Office 365 Cloud App Security.
  • B. Deploy Windows Defender Advanced Threat Protection (Windows Defender ATP)
  • C. Enable Microsoft Office 365 Analytics.

Answer: B

NEW QUESTION 7
HOTSPOT
You have Microsoft 365 subscription.
You create an alert policy as shown in the following exhibit.
MS-101 dumps exhibit
Use the drop-down menus to select the answer choice that completes each statement based on the
information presented in the graphic.
NOTE: Each correct selection is worth one point.
MS-101 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
Note: The Aggregation settings has a 120 minute window

NEW QUESTION 8
HOTSPOT
Your company is based in the United Kingdom (UK).
Users frequently handle data that contains Personally Identifiable Information (PII).
You create a data loss prevention (DLP) policy that applies to users inside and outside the company. The policy is configured as shown in the following exhibit.
MS-101 dumps exhibit
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
MS-101 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
References:
https://docs.microsoft.HYPERLINK "https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies"com/en-us/office365/securitycompliance/data-loss-prevention-policies

NEW QUESTION 9
Your company uses Microsoft System Center Configuration Manager (Current Branch) and Microsoft Intune to co-manage devices.
Which two actions can be performed only from Intune? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

  • A. Deploy applications to Windows 10 devices.
  • B. Deploy VPN profiles to iOS devices.
  • C. Deploy VPN profiles to Windows 10 devices.
  • D. Publish applications to Android devices.

Answer: BD

Explanation:
References:
https://docs.microsofHYPERLINK "https://docs.microsoft.com/en-us/sccm/comanage/overview"t.com/en-us/sccm/comanage/overview
https://docs.microsoft.com/en-us/sccm/mdm/deploy-use/create-vpn-profiles

NEW QUESTION 10
You have a Microsoft 365 tenant.
All users are assigned the Enterprise Mobility + Security license.
You need to ensure that when users join their device to Microsoft Azure Active Directory (Azure AD), the
device is enrolled in Microsoft Intune automatically.
What should you configure?

  • A. Enrollment restrictions from the Intune admin center
  • B. device enrollment managers from the Intune admin center
  • C. MAM User scope from the Azure Active Directory admin center
  • D. MDM User scope from the Azure Active Directory admin center

Answer: D

Explanation:
References:
https://docs.microsoft.com/en-us/intune/windows-enroll

NEW QUESTION 11
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are deploying Microsoft Intune.
You successfully enroll Windows 10 devices in Intune.
When you try to enroll an iOS device in Intune, you get an error. You need to ensure that you can enroll the iOS device in Intune. Solution: You create an Apple Configurator enrollment profile. Does this meet the goal?

  • A. Yes
  • B. No

Answer: B

NEW QUESTION 12
In Microsoft 365, you configure a data loss prevention (DLP) policy named Policy1. Policy1 detects the sharing of United States (US) bank account numbers in email messages and attachments.
Policy1 is configured as shown in the exhibit. (Click the Exhibit tab.)
MS-101 dumps exhibit
You need to ensure that internal users can email documents that contain US bank account numbers to external users who have an email suffix of contoso.com.
What should you configure?

  • A. an action
  • B. a group
  • C. an exception
  • D. a condition

Answer: A

Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies#how-dlp-policies-work

NEW QUESTION 13
HOTSPOT
Your company uses Microsoft Cloud App Security.
You plan to integrate Cloud App Security and security information and event management (SIEM). You need to deploy a SIEM agent on a server that runs Windows Server 2016.
What should you do? To answer, select the appropriate settings in the answer area. NOTE: Each correct selection is worth one point.
MS-101 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/integrate-your-siem-server-with-office-365-cas

NEW QUESTION 14
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals- Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are deploying Microsoft Intune.
You successfully enroll Windows 10 devices in Intune.
When you try to enroll an iOS device in Intune, you get an error. You need to ensure that you can enroll the iOS device in Intuen. Solution: You create an Apple Configurator enrollment profile. Does this meet the goal?

  • A. Yes
  • B. No

Answer: A

NEW QUESTION 15
You have a Microsoft 365 subscription that contains a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com.
In the tenant, you create a user named User1.
You need to ensure that User1 can publish retention labels from the Security & Compliance admin center. The solution must use the principle of least privilege.
To which role group should you add User1?

  • A. Security Administrator
  • B. Records Management
  • C. Compliance Administrator
  • D. eDiscovery Manager

Answer: B

Explanation:
References:
https://docs.microsoft.com/en-us/office365/securitycompliance/file-plan-manager

NEW QUESTION 16
DRAG DROP
You need to meet the requirement for the legal department
Which three actions should you perform in sequence from the Security & Compliance admin center? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
MS-101 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
References:
https://www.sherweb.com/blog/edisHYPERLINK "https://www.sherweb.com/blog/ediscovery-office-365/"covery-office-365/

NEW QUESTION 17
You need to create the Microsoft Store for Business. Which user can create the store?

  • A. User2
  • B. User3
  • C. User4
  • D. User5

Answer: C

Explanation:
References:
https://docs.microsoft.com/en-us/microsoft-store/roles-and-permissions-microsoft-store-for- business
Case Study: 2
A. Datum Case Study: Overview
Existing Environment
This is a case study Case studies are not timed separately. You can use as much exam time as you
would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is
provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section.
To start the case study
To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question. Current Infrastructure
A. Datum recently purchased a Microsoft 365 subscription. All user files are migrated to Microsoft 365.
All mailboxes are hosted in Microsoft 365. The users in each office have email suffixes that include the country of the user, for example, user1@us.adatum.com or user2#uk.ad3tum.com.
Each office has a security information and event management (SIEM) appliance. The appliances come from three different vendors.
A. Datum uses and processes Personally Identifiable Information (PII).
Problem Statements Requirements
A. Datum entered into litigation. The legal department must place a hold on all the documents of a
user named User1 that are in Microsoft 365. Business Goals
A. Datum warns to be fully compliant with all the relevant data privacy laws in the regions where it operates.
A. Datum wants to minimize the cost of hardware and software whenever possible.
Technical Requirements
A. Datum identifies the following technical requirements:
• Centrally perform log analysis for all offices.
•Aggregate all data from the SIEM appliances to a central cloud repository for later analysis.
•Ensure that a SharePoint administrator can identify who accessed a specific file stored in a document library.
•Provide the users in the finance department with access to Service assurance information in Microsoft Office 365.
•Ensure that documents and email messages containing the PII data of European Union (EU) citizens are preserved for 10 years.
•If a user attempts to download 1,000 or more files from Microsoft SharePoint Online within 30 minutes, notify a security administrator and suspend the user's user account.
•A security administrator requires a report that shows which Microsoft 36S users signed in Based on the report, the security administrator will create a policy to require multi-factor authentication when a sign in is high risk.
•Ensure that the users in the New York office can only send email messages that contain sensitive US. PII data to other New York office users. Email messages must be monitored to ensure compliance. Auditors in the New York office must have access to reports that show the sent and received email messages containing sensitive U.S. PII data.

NEW QUESTION 18
HOTSPOT
You have three devices enrolled in Microsoft Intune as shown in the following table.
MS-101 dumps exhibit
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
MS-101 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
MS-101 dumps exhibit

NEW QUESTION 19
HOTSPOT
Your network contains an Active Directory domain named contoso.com that uses Microsoft System Center Configuration Manager (Current Branch).
You have Windows 10 and Windows 8.1 devices.
You need to ensure that you can analyze the upgrade readiness of all the Windows 8.1 devices and analyze the update compliance of all the Windows 10 devices.
What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
MS-101 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
References:
https://docs.microsoft.com/en-us/windows/deployment/upgrade/upgrade-readiness-get-started https://docs.microsoft.com/en-us/windows/deployment/update/update-compliance-get-started

NEW QUESTION 20
HOTSPOT
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com. Your company implements Windows Information Protection (WIP).
You need to modify which users and applications are affected by WIP.
What should you do? To answer, select the appropriate options m the answer area.
NOTE: Each correct selection is worth one point.
MS-101 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
References:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protectHYPERLINK "https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure"ion/create-wip- policy-using-intune-azure

NEW QUESTION 21
You have a Microsoft 365 subscription.
You plan to enable Microsoft Azure Information Protection.
You need to ensure that only the members of a group named PilotUsers can protect content. What should you do?

  • A. Run the Add-AadrmRoleBasedAdministrator cmdlet.
  • B. Create an Azure Information Protection policy.
  • C. Configure the protection activation status for Azure Information Protection.
  • D. Run the Set-AadrmOnboardingControlPolicy cmdlet.

Answer: D

Explanation:
References:
https://docs.microsoft.com/en-us/azure/information-protection/activate-service

NEW QUESTION 22
......

P.S. 2passeasy now are offering 100% pass ensure MS-101 dumps! All MS-101 exam questions have been updated with correct answers: https://www.2passeasy.com/dumps/MS-101/ (146 New Questions)