Title: MS-100-Questions
1MS-100 Microsoft 365 Identity and Services
Version 1.0
Topic 1, Design and Implement Microsoft 365
Services
- QUESTION NO 1
- After your company migrates their on-premises
email solution to Microsoft Exchange Online, you
are tasked with assessing which licenses to
acquire. - You are informed that licenses acquired for the
companys IT and Managers groups should allow
for the following - The IT group needs to have access to the
Microsoft Azure Active Directory (Azure AD)
Privileged Identity Management. - Both the IT and Managers groups should have
access to Microsoft Azure Active Directory
(Azure AD) conditional access. - You need to make sure that the licensing costs
are kept to a minimum. Which two of the
following options should you recommend? (Choose
two) - You should acquire Microsoft 365 E3 licenses for
the Managers group members. - You should acquire Microsoft 365 E5 licenses for
the Managers group members. - You should acquire Microsoft 365 E3 licenses for
the IT group members. - You should acquire Microsoft 365 E5 licenses for
the Managers group members. - Answer A, D
QUESTION NO 2 Your companys Microsoft 365
tenant includes Microsoft Exchange Online. You
have been tasked with enabling calendar sharing
with a partner organization, who also has a
Microsoft 365 tenant.
2- You have to make sure that users in the partner
organization has access to the calendar of every
user instantly. - Which of the following actions should you take?
- Configure a conditional access policy via
Exchange admin center. - Configure a new organization relationship via
Exchange admin center. - Configure the sharing settings via Exchange admin
center. - Run the Set-SPOSite cmdlet.
- Answer B References
- https//docs.microsoft.com/en-us/exchange/sharing/
organization-relationships/create-an-
organization-relationship
- QUESTION NO 3
- Note The question is included in a number of
questions that depicts the identical set-up.
However, every question has a distinctive result.
Establish if the solution satisfies the
requirements. - After acquiring a Microsoft 365 Enterprise
subscription, you are tasked with migrating your
companys Microsoft Exchange Server 2016
mailboxes and groups to Exchange Online. - You have started a new migration batch. You,
subsequently, receive complaints from on-
premises Exchange Server users about slow
performance. - Your analysis shows that the issue has resulted
from the migration. You want to make sure that
the effect the mailbox migration has on users is
decreased. - Solution You create a label policy. Does the
solution meet the goal? - Yes
- No
- Answer B
3- QUESTION NO 4
- Note The question is included in a number of
questions that depicts the identical set-up.
However, every question has a distinctive result.
Establish if the solution satisfies the
requirements. - After acquiring a Microsoft 365 Enterprise
subscription, you are tasked with migrating your
companys Microsoft Exchange Server 2016
mailboxes and groups to Exchange Online. - You have started a new migration batch. You,
subsequently, receive complaints from on-
premises Exchange Server users about slow
performance. - Your analysis shows that the issue has resulted
from the migration. You want to make sure that
the effect the mailbox migration has on users is
decreased. - Solution You create a mail flow rule. Does the
solution meet the goal? - Yes
- No
- Answer B
QUESTION NO 5 Note The question is included in
a number of questions that depicts the identical
set-up. However, every question has a
distinctive result. Establish if the solution
satisfies the requirements. After acquiring a
Microsoft 365 Enterprise subscription, you are
tasked with migrating your companys Microsoft
Exchange Server 2016 mailboxes and groups to
Exchange Online. You have started a new
migration batch. You, subsequently, receive
complaints from on- premises Exchange Server
users about slow performance. Your analysis
shows that the issue has resulted from the
migration. You want to make sure that the effect
the mailbox migration has on users is
decreased. Solution You modify the migration
endpoint settings.
4- Does the solution meet the goal?
- Yes
- No
- Answer A
- QUESTION NO 6
- You need to consider the underlined segment to
establish whether it is accurate. You company
has a Microsoft 365 subscription. - To prevent your company from receiving phishing
email messages, create a new mail flow rule. - Select No adjustment required if the underlined
segment is accurate. If the underlined segment
is inaccurate, select the accurate option. - No adjustment required
- Label policy.
- Threat management policy.
- Spam filter policy.
- Answer C References
- https//docs.microsoft.com/en-us/office365/securit
ycompliance/set-up-anti-phishing- policies - QUESTION NO 7
- You work for a company manages all their
identities in the cloud. - After acquiring a new domain name, you are tasked
with making sure that the primary email address
of all new mailboxes uses the new domain.
5- Update-EmailAddressPolicy
- Update-OfflineAddressBook
- Set-AddressBookPolicy
- Set-EmailAddressPolicy
- Answer D References
- https//docs.microsoft.com/en-us/powershell/module
/exchange/email-addresses-and-
address-books/set-emailaddresspolicy?viewexchange
-ps
- QUESTION NO 8
- You are responsible for your companys Microsoft
365 subscription. - The company introduces a security policy that
requires DLP incident reports to be
automatically sent to legal department users. - You are required to configure the reports to be
delivered via email as often you can. Which of
the following is the option you should use? - Annually
- Monthly
- Weekly
- Quarterly
- Answer C
- QUESTION NO 9
- You have been tasked with detecting all users in
your companys Microsoft 365 subscription who
has a Microsoft Office 365 license as a result of
belonging to a group. - You need to make sure that the group used to
assign the license is included in your results.
Which of the following actions should you take? - You should access the Azure portal, and navigate
to the Licenses blade. - You should access the Microsoft 365 admin center,
and navigate to the Products blade. - You should access the Azure portal, and navigate
to the Monitor blade.
6D. You should access the Microsoft 365 admin
center, and navigate to the Users blade. Answer
A
- QUESTION NO 10
- You have previously accessed the Security
Compliance admin center to upload a number of
archive PST files to Microsoft 365. - When you try to run an import job for the PST
files 45 days later, you find that they have been
removed from Microsoft 365. - Which of the following is the number of days that
Microsoft 365 retains PST file before deleting
them automatically? - 1 day.
- 30 days.
- 15 days.
- 45 days.
- Answer B References
- https//docs.microsoft.com/en-us/office365/securit
ycompliance/faqimporting-pst-files-to-
office-365 - QUESTION NO 11
- You need to consider the underlined segment to
establish whether it is accurate.
7- Windows Autopilot
- Windows Update
- Azure AD Connect
- Answer A References
- https//docs.microsoft.com/en-us/microsoft-365/ent
erprise/windows10-infrastructure
Topic 2, Manage User Identity and Roles
- QUESTION NO 12
- Note The question is included in a number of
questions that depicts the identical set-up.
However, every question has a distinctive result.
Establish if the solution satisfies the
requirements. - Your company currently has an on-premises Active
Directory forest. - You have been tasked with assessing the
application of Microsoft 365 and the utilization
of an authentication strategy. - You have been informed that the authentication
strategy should permit sign in via smart card-
based certificates, and also permitting the use
of SSO to connect to on-premises and Microsoft
365 services. - Solution You recommend the use of pass-through
authentication and seamless SSO with password
hash synchronization as the authentication
strategy. - Does the solution meet the goal?
- Yes
- No
- Answer B
QUESTION NO 13
8- Note The question is included in a number of
questions that depicts the identical set-up.
However, every question has a distinctive result.
Establish if the solution satisfies the
requirements. - Your company currently has an on-premises Active
Directory forest. - You have been tasked with assessing the
application of Microsoft 365 and the utilization
of an authentication strategy. - You have been informed that the authentication
strategy should permit sign in via smart card-
based certificates, and also permitting the use
of SSO to connect to on-premises and Microsoft
365 services. - Solution You recommend the use of password hash
synchronization and seamless SSO as the
authentication strategy. - Does the solution meet the goal?
- Yes
- No
- Answer B
QUESTION NO 14 Note The question is included
in a number of questions that depicts the
identical set-up. However, every question has a
distinctive result. Establish if the solution
satisfies the requirements. Your company
currently has an on-premises Active Directory
forest. You have been tasked with assessing the
application of Microsoft 365 and the utilization
of an authentication strategy. You have been
informed that the authentication strategy should
permit sign in via smart card- based
certificates, and also permitting the use of SSO
to connect to on-premises and Microsoft 365
services. Solution You recommend the use of
federation with Active Directory Federation
Services (AD FS) as the authentication strategy.
9- Does the solution meet the goal?
- Yes
- No
- Answer A References
- https//docs.microsoft.com/en-us/azure/security/az
ure-ad-choose-authn
- QUESTION NO 15
- Your companys Microsoft Azure Active Directory
(Azure AD) tenant includes four users. Three of
the users are each configured with the Password
administrator, Security administrator, and the
User administrator roles respectively. The fourth
user has no role configured. - Which of the following are the users that are
able to reset the password of the fourth user? - The users with the Password administrator and the
User administrator roles. - The users with the Security administrator and the
User administrator roles. - The users with the Password administrator and the
Security administrator roles. - The user with the Password administrator role
only. - Answer A References
- https//docs.microsoft.com/en-us/azure/active-dire
ctory/users-groups-roles/directory-
assign-admin-roles
QUESTION NO 16 Your network contains an Active
Directory domain that spans a number of cities
and a multitude of users. After acquiring
Microsoft 365, you intend to deploy quite a few
Microsoft 365 services. You want to make sure
that pass-through authentication and seamless SSO
can be used in your environment. You also decide
that Azure AD Connect wont be configured to be
in staging mode.
10- With regards to redundancy limits, which of the
following is the maximum amount of servers that
can run Azure AD Connect? - 1
- 3
- 5
- 7
- Answer A
- QUESTION NO 17
- Your network contains an Active Directory domain
that spans a number of cities and a multitude of
users. - After acquiring Microsoft 365, you intend to
deploy quite a few Microsoft 365 services. - You want to make sure that pass-through
authentication and seamless SSO can be used in
your environment. You also decide that Azure AD
Connect wont be configured to be in staging
mode. - With regards to redundancy limits, which of the
following is the most amount of servers that can
run standalone Authentication Agents? - 7
- 9
- 11
- 13
- Answer C
- QUESTION NO 18
11- Which of the four roles can be used to create a
guest user account? - The Privileged role administrator role.
- The User administrator role.
- The Security administrator role.
- The Billing administrator role.
- Answer B References
- https//docs.microsoft.com/en-us/azure/active-dire
ctory/users-groups-roles/directory- - assign-admin-roles
- QUESTION NO 19
- Your companys Microsoft Azure Active Directory
(Azure AD) tenant includes four users that are
configured with the Privileged role
administrator, the User administrator, the
Security administrator, and the Billing
administrator roles respectively. - A security group has been included in the tenant
for the purpose of managing administrative
accounts. - Which of the four roles can be used to add a user
with the Security administrator role to the
security group? - The Privileged role administrator role.
- The User administrator role.
- The Security administrator role.
- The Billing administrator role.
- Answer B References
- https//docs.microsoft.com/en-us/azure/active-dire
ctory/users-groups-roles/directory-
assign-admin-roles
QUESTION NO 20 Your company has an Active
Directory domain as well as a Microsoft Azure
Active Directory (Azure AD) tenant.
12- After configuring directory synchronization for
all users in the organization, you configure a
number of new user accounts to be created
automatically. - You want to run a command to make sure that the
new user accounts synchronize to Azure AD in the
shortest time required. - Which of the following is the command that you
should use? - New-ADSyncRule
- Set-ADSyncSchedulerConnectorOverride
- Start-ADSyncSyncCycle
- Set-ADSyncSchema
- Answer C References
- https//blogs.technet.microsoft.com/rmilne/2014/10
/01/how-to-run-manual-dirsync-azure- - active-directory-sync-updates/
- QUESTION NO 21
- Your companys Microsoft Azure Active Directory
(Azure AD) tenant includes four users. Two of
the users are configured with the Global
administrator, Password administrator roles
respectively. A third user has both the Security
administrator and the Guest inviter roles
configured. The fourth user has no roles
configured. - Which of the following is the user that has the
necessary permissions to alter the password
protection policy? (Choose all that apply) - The user with the Global administrator role.
- The user with the Password administrator role.
- The user with the Security administrator and
Guest inviter roles. - The user with no roles.
- Answer A
QUESTION NO 22 Your companys Microsoft Azure
Active Directory (Azure AD) tenant includes four
users. Two of the users are configured with the
Global administrator, Password administrator roles
13- respectively. A third user has both the Security
administrator and the Guest inviter roles
configured. The fourth user has no roles
configured. - Which of the following is the user that has the
necessary permissions to create guest users?
(Choose all that apply) - The user with the Global administrator role.
- The user with the Password administrator role.
- The user with the Security administrator and
Guest inviter roles. - The user with no roles.
- Answer A, C
- QUESTION NO 23
- You have been tasked with enable Microsoft Azure
Information Protection for your companys
Microsoft 365 subscription. - You are informed that only the members of a
group, named Group1, are able to protect
content. To achieve your goal, you plan to run a
PowerShell cmdlet. - Which of the following is the cmdlet you should
run? - The Add-AadrmRoleBaseAdministrator cmdlet.
- The Set-AadrmDoNotTrackUserGroup cmdlet.
- The Clear-AadrmSuperUserGroup cmdlet.
- The Set-AadrmOnboardingControlPolicy cmdlet.
- Answer D Explanation
- If you dont want all users to be able to protect
documents and emails immediately by using - Azure Rights Management, you can configure user
onboarding controls by using the Set-
AadrmOnboardingControlPolicy - References
- https//docs.microsoft.com/en-us/azure/information
-protection/activate-service
Topic 3, Manage Access and Authentication
14- QUESTION NO 24
- Your company has acquired Microsoft 365 for their
Active Directory domain, which includes five
domain controllers. - Prior to implementing a number of Microsoft 365
services, you are tasked with making use of an
authentication solution that allows users to
access Microsoft 365 by using their on- premises
credentials. The solution should also only make
use of the current server infrastructure.
Furthermore, must allow for all user passwords to
only be stored on-premises, and be highly
available. - Solution You configure the use of password hash
synchronization only. Does the solution meet the
goal? - Yes
- No
- Answer B
- QUESTION NO 25
- Your company has acquired Microsoft 365 for their
Active Directory domain, which includes five
domain controllers. - Prior to implementing a number of Microsoft 365
services, you are tasked with making use of an
authentication solution that allows users to
access Microsoft 365 by using their on- premises
credentials. The solution should also only make
use of the current server infrastructure.
Furthermore, must allow for all user passwords to
only be stored on-premises, and be highly
available. - Solution You configure the use of pass-through
authentication only. Does the solution meet the
goal? - Yes
- No
- Answer B
15- QUESTION NO 26
- Your company has acquired Microsoft 365 for their
Active Directory domain, which includes five
domain controllers. - Prior to implementing a number of Microsoft 365
services, you are tasked with making use of an
authentication solution that allows users to
access Microsoft 365 by using their on- premises
credentials. The solution should also only make
use of the current server infrastructure.
Furthermore, must allow for all user passwords to
only be stored on-premises, and be highly
available. - Solution You configure the use of pass-through
authentication and seamless SSO. Does the
solution meet the goal? - Yes
- No
- Answer A
- QUESTION NO 27
- Your company has a Microsoft Azure Active
Directory (Azure AD) tenant with multi-factor
authentication enabled. - You have also configured the Allow users to
submit fraud alerts, and the Block user when
fraud is reported settings to ON.
16References https//docs.microsoft.com/en-us/azure
/active-directory/authentication/howto-mfa-
mfasettingsfraud-alert
- QUESTION NO 28
- Your company has a Microsoft Azure Active
Directory (Azure AD) tenant with multi-factor
authentication enabled. - You have also configured the Allow users to
submit fraud alerts, and the Block user when
fraud is reported settings to ON. - A tenant user has submitted a fraud alert for his
account. After receiving an alert call, the user
needs to enter a special code followed by . - Which of the following is default special code?
- 0
- 9
- C. 0000
- D. 1234
- Answer A References
- https//docs.microsoft.com/en-us/azure/active-dire
ctory/authentication/howto-mfa- - mfasettingsfraud-alert
- QUESTION NO 29
- Your company has a Microsoft Office 365
subscription with a number of Microsoft
SharePoint Online sites. - Currently, users are able to invite external
users to access files on the SharePoint sites.
You are tasked with making sure that users are
only able to authenticated guest users to the
SharePoint sites. - Which of the following actions should you take?
- You should create a threat management policy via
the Security Compliance admin center. - You should run the Set-SPOSite cmdlet.
17C. You should run the Add-SPOUser cmdlet. D. You
should modify the sharing settings via the
SharePoint admin center. Answer D
- QUESTION NO 30
- Your company has a Microsoft 365 subscription.
- You have been tasked with configuring external
collaboration settings for your companys
Microsoft Azure Active Directory (Azure AD)
tenant. - You want to make sure that authorized users are
able to create guest users in the tenant. Which
of the following actions should you take? - Which setting should you modify?
- You should make sure that the Guests can invite
setting is set to NO. - You should make sure that the Guest users
permissions are limited setting is set to Yes. - You should make sure that the Members can invite
setting is set to NO. - You should make sure that the Admins and users in
the guest inviter role can invite setting is set
to Yes. - Answer D References
- https//docs.microsoft.com/en-us/azure/active-dire
ctory/b2b/delegate-invitations
https//docs.microsoft.com/en-us/azure/active-dire
ctory/fundamentals/users-default- - permissions
- QUESTION NO 31
18- Get-AzureADUser
- Get-MsolUser
- New-AzureADMSInvitation
- Set-MsolUserPrincipalName
- Answer B References
- https//docs.microsoft.com/en-us/azure/active-dire
ctory/authentication/howto-mfa- reporting
- QUESTION NO 32
- You need to consider the underlined segment to
establish whether it is accurate. - You have recently configured a conditional access
policy to force mobile device users to use
multi-factor authentication when accessing
Microsoft SharePoint. - To check who used multi-factor authentication to
authenticate, you view the Usage reports from
Azure Active Directory admin center. - Select No adjustment required if the underlined
segment is accurate. If the underlined segment
is inaccurate, select the accurate option. - No adjustment required
- user sign-ins
- event logs
- audit logs
- Answer B References
- https//docs.microsoft.com/en-us/azure/active-dire
ctory/authentication/howto-mfa- reporting
QUESTION NO 33 Your company has an Enterprise
E5 subscription of Microsoft 365.
19- You have been tasked with making sure that sales
department users are compelled to make use of
multi-factor authentication for all cloud-based
applications. - Which of the following actions should you take?
- You should create an DLP.
- You should create a new app registration.
- You should create a session policy.
- You should create a sign-in risk policy.
- Answer D References
- https//docs.microsoft.com/en-us/azure/active-dire
ctory/identity-protection/howto-sign-
in-risk-policy
- QUESTION NO 34
- Your company has a Microsoft 365 subscription.
- After implementing Active Directory Federation
Services (AD FS), you are instructed to
configure AD FS user authentication auditing. - You are preparing to run the Register-AzureADConne
ctHealthSyncAgent cmdlet. Which of the following
is the server that the cmdlet should be run from? - NOTE Each correct selection is worth one point.
- A member server.
- A domain controller.
- An Azure AD Connect server.
- E. An AD FS server.
- Answer C
QUESTION NO 35 You need to consider the
underlined segment to establish whether it is
accurate.
20- Your company has deployed a Microsoft 365 tenant
and to implemented multi-factor authentication. - They have four offices, of which one houses the
RD department. You have been asked to make sure
that multi-factor authentication is compulsory
only for users in the office houses the RD
department. - You create a conditional access policy.
- Select No adjustment required if the underlined
segment is accurate. If the underlined segment
is inaccurate, select the accurate option. - No adjustment required
- password protection
- DLP
- label
- Answer A
Topic 4, Plan Office 365 Workloads and
Applications
- QUESTION NO 36
- Your company has configured all user email to be
stored in Microsoft Exchange Online. - You have been tasked with keeping a duplicate of
all the email messages from a specified user
that includes a specific word. - Solution You start by creating a spam filter
policy via the Security Compliance admin
center. Does the solution meet the goal? - Yes
- No
- Answer B References
21https//docs.microsoft.com/en-us/azure/information
-protection/configure-policy- classification
- QUESTION NO 37
- Your company has configured all user email to be
stored in Microsoft Exchange Online. - You have been tasked with keeping a duplicate of
all the email messages from a specified user
that includes a specific word. - Solution You start by initiating a message trace
via the Security Compliance admin center. Does
the solution meet the goal? - Yes
- No
- Answer B References
- https//docs.microsoft.com/en-us/azure/information
-protection/configure-policy- - classification
- QUESTION NO 38
- Your company has configured all user email to be
stored in Microsoft Exchange Online. - You have been tasked with keeping a duplicate of
all the email messages from a specified user
that includes a specific word. - Solution You start by creating a label and label
policy via the Security Compliance admin
center. - Does the solution meet the goal?
- Yes
- No
- Answer A
22References https//docs.microsoft.com/en-us/azure
/information-protection/configure-policy-
classification
- QUESTION NO 39
- Your company has a Microsoft 365 subscription.
- You have previously created a group that includes
users who send email messages to external users
on a regular basis. The groups manager would
like to group wants to examine messages that
include attachments at random. - You are required to make sure that the manager
can achieve his goal, but only make ten out of a
hundred messages accessible to him. - You need to provide the manager with the ability
to review messages that contain attachments sent
from the Support group users to external users.
The manager must have access to only 10 percent
of the messages. - Which of the following should you create?
- A label policy.
- A conditional access policy.
- A DLP policy.
- A supervisor policy.
- Answer D References
- https//docs.microsoft.com/en-us/office365/securit
ycompliance/supervision-policies
QUESTION NO 40 You need to consider the
underlined segment to establish whether it is
accurate. Your company has recently acquired a
new sales application.
23- You navigate to the Discovered apps page in Cloud
Discovery via Microsoft Cloud App Security to
check the applications score. You then notice
that a number of the applications have a low
score as a result of omitted domain registration
and consumer popularity data. - You want to make sure that the score is not
affected by the omitted data. You have to
configure app tags via the Cloud Discover
settings - Select No adjustment required if the underlined
segment is accurate. If the underlined segment
is inaccurate, select the accurate option. - What should you configure from the?
- No adjustment required
- a label
- App Connector flow
- a custom key
- Answer A References
- https//docs.microsoft.com/en-us/cloud-app-securit
y/discovered-app-queries
QUESTION NO 41 You have been tasked with
migrating your companys on-premises Microsoft
Exchange Server 2013 organization to Microsoft
365. You plan to make use of the cutover
migration method. Which of the following is the
maximum recommended number of mailboxes that you
should migrate? A. 2000 B. 1000 C. 150 D.
75 Answer C
24References https//docs.microsoft.com/en-us/excha
nge/mailbox-migration/cutover-migration-to-
office-365
- QUESTION NO 42
- You have recently created a Microsoft 365
Enterprise subscription and assigned all users
licenses for all products. - You want to configure all Microsoft Office 365
ProPlus installations to be done via a network
share. You also want to make sure that users are
prevented from using the Internet to install
Office 365 ProPlus. - Which of the following is the type of file that
you should create? NOTE Each correct selection
is worth one point. - An HTML download file.
- An XML download file.
- An HTTP download file.
- An EXE download file.
- Answer B References
- https//docs.microsoft.com/en-us/deployoffice/over
view-of-the-office-2016-deployment- - tooldownload-the-installation-files-for-office-36
5-proplus-from-a-local-source
QUESTION NO 43 You have recently created a
Microsoft 365 subscription. You have prepared an
XML file for the upcoming Microsoft Office 365
ProPlus deployment. The Channel attribute for
the OfficeClientEdition attribute is set to
Broad, while the Channel attribute for the
Updates element is set to Targeted. Which of the
following the following is the frequency with
which the installation of Office 365 ProPlus
feature updates will occur?
25- Weekly.
- Monthly
- Six monthly
- Annually
- Answer C References
- https//docs.microsoft.com/en-us/deployoffice/conf
iguration-options-for-the-office-2016- - deployment-toolupdates-element
- https//docs.microsoft.com/en-us/deployoffice/over
view-of-update-channels-for-office- 365-proplus
- QUESTION NO 44
- You have recently created a Microsoft 365
subscription. - You have prepared an XML file for the upcoming
Microsoft Office 365 ProPlus deployment. - The Channel attribute for the OfficeClientEdition
attribute is set to Broad, while the Channel
attribute for the Updates element is set to
Targeted. - Which of the following the following are the
months of the year that security updates will be
installed? - January and July.
- March and September
- June and December
- April and October
- Answer B References
- https//docs.microsoft.com/en-us/deployoffice/conf
iguration-options-for-the-office-2016- - deployment-toolupdates-element
- https//docs.microsoft.com/en-us/deployoffice/over
view-of-update-channels-for-office- 365-proplus
26- QUESTION NO 45
- Your companys network contains two Active
Directory forests, with two domains configured
per forest. All workstations are domain-joined
and have Windows 10 installed. - You have created a Microsoft Azure Active
Directory (Azure AD) tenant in preparation for
configuring Hybrid Azure AD join for the
workstations. - You want to make sure that the tenant can be
discovered by the workstations. Which of the
following should you create in each forest? - A migration endpoint.
- A new conditional access policy.
- A new trust relationship.
- A new service connection point (SCP).
- Answer D References
- https//docs.microsoft.com/en-us/azure/active-dire
ctory/devices/hybrid-azuread-join- - manual
- QUESTION NO 46
- After your company acquires a Microsoft 365
subscription, they instruct you to move all email
data from their corporate Gmail to Microsoft
Exchange Online. - The migration will be done via the Exchange admin
center. Which of the following is the migration
method you should use? - Exchange Hybrid
- IMAP migration
- Cutover
- Express migration
- Answer B References
27https//docs.microsoft.com/en-us/exchange/mailbox-
migration/migrating-imap- mailboxes/migrate-g-sui
te-mailboxes
- QUESTION NO 47
- After your company acquires a Microsoft 365
subscription, they instruct you to move all email
data from their corporate Gmail to Microsoft
Exchange Online. - The migration will be done via the Exchange admin
center. - Which of the following is TRUE with regards to
the data included in the migration? - All data will be migrated.
- Only email data will be migrated.
- Email and task data will be migrated.
- Email and contact data will be migrated.
- Answer B References
- https//docs.microsoft.com/en-us/exchange/mailbox-
migration/migrating-imap- - mailboxes/migrate-g-suite-mailboxes