MS-100-Questions - PowerPoint PPT Presentation

About This Presentation
Title:

MS-100-Questions

Description:

After your company migrates their on-premises email solution to Microsoft Exchange Online, you are tasked with assessing which licenses to acquire. – PowerPoint PPT presentation

Number of Views:3
Slides: 28
Provided by: alexablis0
Tags:

less

Transcript and Presenter's Notes

Title: MS-100-Questions


1
MS-100 Microsoft 365 Identity and Services
Version 1.0
Topic 1, Design and Implement Microsoft 365
Services
  • QUESTION NO 1
  • After your company migrates their on-premises
    email solution to Microsoft Exchange Online, you
    are tasked with assessing which licenses to
    acquire.
  • You are informed that licenses acquired for the
    companys IT and Managers groups should allow
    for the following
  • The IT group needs to have access to the
    Microsoft Azure Active Directory (Azure AD)
    Privileged Identity Management.
  • Both the IT and Managers groups should have
    access to Microsoft Azure Active Directory
    (Azure AD) conditional access.
  • You need to make sure that the licensing costs
    are kept to a minimum. Which two of the
    following options should you recommend? (Choose
    two)
  • You should acquire Microsoft 365 E3 licenses for
    the Managers group members.
  • You should acquire Microsoft 365 E5 licenses for
    the Managers group members.
  • You should acquire Microsoft 365 E3 licenses for
    the IT group members.
  • You should acquire Microsoft 365 E5 licenses for
    the Managers group members.
  • Answer A, D

QUESTION NO 2 Your companys Microsoft 365
tenant includes Microsoft Exchange Online. You
have been tasked with enabling calendar sharing
with a partner organization, who also has a
Microsoft 365 tenant.
2
  • You have to make sure that users in the partner
    organization has access to the calendar of every
    user instantly.
  • Which of the following actions should you take?
  • Configure a conditional access policy via
    Exchange admin center.
  • Configure a new organization relationship via
    Exchange admin center.
  • Configure the sharing settings via Exchange admin
    center.
  • Run the Set-SPOSite cmdlet.
  • Answer B References
  • https//docs.microsoft.com/en-us/exchange/sharing/
    organization-relationships/create-an-
    organization-relationship
  • QUESTION NO 3
  • Note The question is included in a number of
    questions that depicts the identical set-up.
    However, every question has a distinctive result.
    Establish if the solution satisfies the
    requirements.
  • After acquiring a Microsoft 365 Enterprise
    subscription, you are tasked with migrating your
    companys Microsoft Exchange Server 2016
    mailboxes and groups to Exchange Online.
  • You have started a new migration batch. You,
    subsequently, receive complaints from on-
    premises Exchange Server users about slow
    performance.
  • Your analysis shows that the issue has resulted
    from the migration. You want to make sure that
    the effect the mailbox migration has on users is
    decreased.
  • Solution You create a label policy. Does the
    solution meet the goal?
  • Yes
  • No
  • Answer B

3
  • QUESTION NO 4
  • Note The question is included in a number of
    questions that depicts the identical set-up.
    However, every question has a distinctive result.
    Establish if the solution satisfies the
    requirements.
  • After acquiring a Microsoft 365 Enterprise
    subscription, you are tasked with migrating your
    companys Microsoft Exchange Server 2016
    mailboxes and groups to Exchange Online.
  • You have started a new migration batch. You,
    subsequently, receive complaints from on-
    premises Exchange Server users about slow
    performance.
  • Your analysis shows that the issue has resulted
    from the migration. You want to make sure that
    the effect the mailbox migration has on users is
    decreased.
  • Solution You create a mail flow rule. Does the
    solution meet the goal?
  • Yes
  • No
  • Answer B

QUESTION NO 5 Note The question is included in
a number of questions that depicts the identical
set-up. However, every question has a
distinctive result. Establish if the solution
satisfies the requirements. After acquiring a
Microsoft 365 Enterprise subscription, you are
tasked with migrating your companys Microsoft
Exchange Server 2016 mailboxes and groups to
Exchange Online. You have started a new
migration batch. You, subsequently, receive
complaints from on- premises Exchange Server
users about slow performance. Your analysis
shows that the issue has resulted from the
migration. You want to make sure that the effect
the mailbox migration has on users is
decreased. Solution You modify the migration
endpoint settings.
4
  • Does the solution meet the goal?
  • Yes
  • No
  • Answer A
  • QUESTION NO 6
  • You need to consider the underlined segment to
    establish whether it is accurate. You company
    has a Microsoft 365 subscription.
  • To prevent your company from receiving phishing
    email messages, create a new mail flow rule.
  • Select No adjustment required if the underlined
    segment is accurate. If the underlined segment
    is inaccurate, select the accurate option.
  • No adjustment required
  • Label policy.
  • Threat management policy.
  • Spam filter policy.
  • Answer C References
  • https//docs.microsoft.com/en-us/office365/securit
    ycompliance/set-up-anti-phishing- policies
  • QUESTION NO 7
  • You work for a company manages all their
    identities in the cloud.
  • After acquiring a new domain name, you are tasked
    with making sure that the primary email address
    of all new mailboxes uses the new domain.

5
  • Update-EmailAddressPolicy
  • Update-OfflineAddressBook
  • Set-AddressBookPolicy
  • Set-EmailAddressPolicy
  • Answer D References
  • https//docs.microsoft.com/en-us/powershell/module
    /exchange/email-addresses-and-
    address-books/set-emailaddresspolicy?viewexchange
    -ps
  • QUESTION NO 8
  • You are responsible for your companys Microsoft
    365 subscription.
  • The company introduces a security policy that
    requires DLP incident reports to be
    automatically sent to legal department users.
  • You are required to configure the reports to be
    delivered via email as often you can. Which of
    the following is the option you should use?
  • Annually
  • Monthly
  • Weekly
  • Quarterly
  • Answer C
  • QUESTION NO 9
  • You have been tasked with detecting all users in
    your companys Microsoft 365 subscription who
    has a Microsoft Office 365 license as a result of
    belonging to a group.
  • You need to make sure that the group used to
    assign the license is included in your results.
    Which of the following actions should you take?
  • You should access the Azure portal, and navigate
    to the Licenses blade.
  • You should access the Microsoft 365 admin center,
    and navigate to the Products blade.
  • You should access the Azure portal, and navigate
    to the Monitor blade.

6
D. You should access the Microsoft 365 admin
center, and navigate to the Users blade. Answer
A
  • QUESTION NO 10
  • You have previously accessed the Security
    Compliance admin center to upload a number of
    archive PST files to Microsoft 365.
  • When you try to run an import job for the PST
    files 45 days later, you find that they have been
    removed from Microsoft 365.
  • Which of the following is the number of days that
    Microsoft 365 retains PST file before deleting
    them automatically?
  • 1 day.
  • 30 days.
  • 15 days.
  • 45 days.
  • Answer B References
  • https//docs.microsoft.com/en-us/office365/securit
    ycompliance/faqimporting-pst-files-to-
    office-365
  • QUESTION NO 11
  • You need to consider the underlined segment to
    establish whether it is accurate.

7
  • Windows Autopilot
  • Windows Update
  • Azure AD Connect
  • Answer A References
  • https//docs.microsoft.com/en-us/microsoft-365/ent
    erprise/windows10-infrastructure

Topic 2, Manage User Identity and Roles
  • QUESTION NO 12
  • Note The question is included in a number of
    questions that depicts the identical set-up.
    However, every question has a distinctive result.
    Establish if the solution satisfies the
    requirements.
  • Your company currently has an on-premises Active
    Directory forest.
  • You have been tasked with assessing the
    application of Microsoft 365 and the utilization
    of an authentication strategy.
  • You have been informed that the authentication
    strategy should permit sign in via smart card-
    based certificates, and also permitting the use
    of SSO to connect to on-premises and Microsoft
    365 services.
  • Solution You recommend the use of pass-through
    authentication and seamless SSO with password
    hash synchronization as the authentication
    strategy.
  • Does the solution meet the goal?
  • Yes
  • No
  • Answer B

QUESTION NO 13
8
  • Note The question is included in a number of
    questions that depicts the identical set-up.
    However, every question has a distinctive result.
    Establish if the solution satisfies the
    requirements.
  • Your company currently has an on-premises Active
    Directory forest.
  • You have been tasked with assessing the
    application of Microsoft 365 and the utilization
    of an authentication strategy.
  • You have been informed that the authentication
    strategy should permit sign in via smart card-
    based certificates, and also permitting the use
    of SSO to connect to on-premises and Microsoft
    365 services.
  • Solution You recommend the use of password hash
    synchronization and seamless SSO as the
    authentication strategy.
  • Does the solution meet the goal?
  • Yes
  • No
  • Answer B

QUESTION NO 14 Note The question is included
in a number of questions that depicts the
identical set-up. However, every question has a
distinctive result. Establish if the solution
satisfies the requirements. Your company
currently has an on-premises Active Directory
forest. You have been tasked with assessing the
application of Microsoft 365 and the utilization
of an authentication strategy. You have been
informed that the authentication strategy should
permit sign in via smart card- based
certificates, and also permitting the use of SSO
to connect to on-premises and Microsoft 365
services. Solution You recommend the use of
federation with Active Directory Federation
Services (AD FS) as the authentication strategy.
9
  • Does the solution meet the goal?
  • Yes
  • No
  • Answer A References
  • https//docs.microsoft.com/en-us/azure/security/az
    ure-ad-choose-authn
  • QUESTION NO 15
  • Your companys Microsoft Azure Active Directory
    (Azure AD) tenant includes four users. Three of
    the users are each configured with the Password
    administrator, Security administrator, and the
    User administrator roles respectively. The fourth
    user has no role configured.
  • Which of the following are the users that are
    able to reset the password of the fourth user?
  • The users with the Password administrator and the
    User administrator roles.
  • The users with the Security administrator and the
    User administrator roles.
  • The users with the Password administrator and the
    Security administrator roles.
  • The user with the Password administrator role
    only.
  • Answer A References
  • https//docs.microsoft.com/en-us/azure/active-dire
    ctory/users-groups-roles/directory-
    assign-admin-roles

QUESTION NO 16 Your network contains an Active
Directory domain that spans a number of cities
and a multitude of users. After acquiring
Microsoft 365, you intend to deploy quite a few
Microsoft 365 services. You want to make sure
that pass-through authentication and seamless SSO
can be used in your environment. You also decide
that Azure AD Connect wont be configured to be
in staging mode.
10
  • With regards to redundancy limits, which of the
    following is the maximum amount of servers that
    can run Azure AD Connect?
  • 1
  • 3
  • 5
  • 7
  • Answer A
  • QUESTION NO 17
  • Your network contains an Active Directory domain
    that spans a number of cities and a multitude of
    users.
  • After acquiring Microsoft 365, you intend to
    deploy quite a few Microsoft 365 services.
  • You want to make sure that pass-through
    authentication and seamless SSO can be used in
    your environment. You also decide that Azure AD
    Connect wont be configured to be in staging
    mode.
  • With regards to redundancy limits, which of the
    following is the most amount of servers that can
    run standalone Authentication Agents?
  • 7
  • 9
  • 11
  • 13
  • Answer C
  • QUESTION NO 18

11
  • Which of the four roles can be used to create a
    guest user account?
  • The Privileged role administrator role.
  • The User administrator role.
  • The Security administrator role.
  • The Billing administrator role.
  • Answer B References
  • https//docs.microsoft.com/en-us/azure/active-dire
    ctory/users-groups-roles/directory-
  • assign-admin-roles
  • QUESTION NO 19
  • Your companys Microsoft Azure Active Directory
    (Azure AD) tenant includes four users that are
    configured with the Privileged role
    administrator, the User administrator, the
    Security administrator, and the Billing
    administrator roles respectively.
  • A security group has been included in the tenant
    for the purpose of managing administrative
    accounts.
  • Which of the four roles can be used to add a user
    with the Security administrator role to the
    security group?
  • The Privileged role administrator role.
  • The User administrator role.
  • The Security administrator role.
  • The Billing administrator role.
  • Answer B References
  • https//docs.microsoft.com/en-us/azure/active-dire
    ctory/users-groups-roles/directory-
    assign-admin-roles

QUESTION NO 20 Your company has an Active
Directory domain as well as a Microsoft Azure
Active Directory (Azure AD) tenant.
12
  • After configuring directory synchronization for
    all users in the organization, you configure a
    number of new user accounts to be created
    automatically.
  • You want to run a command to make sure that the
    new user accounts synchronize to Azure AD in the
    shortest time required.
  • Which of the following is the command that you
    should use?
  • New-ADSyncRule
  • Set-ADSyncSchedulerConnectorOverride
  • Start-ADSyncSyncCycle
  • Set-ADSyncSchema
  • Answer C References
  • https//blogs.technet.microsoft.com/rmilne/2014/10
    /01/how-to-run-manual-dirsync-azure-
  • active-directory-sync-updates/
  • QUESTION NO 21
  • Your companys Microsoft Azure Active Directory
    (Azure AD) tenant includes four users. Two of
    the users are configured with the Global
    administrator, Password administrator roles
    respectively. A third user has both the Security
    administrator and the Guest inviter roles
    configured. The fourth user has no roles
    configured.
  • Which of the following is the user that has the
    necessary permissions to alter the password
    protection policy? (Choose all that apply)
  • The user with the Global administrator role.
  • The user with the Password administrator role.
  • The user with the Security administrator and
    Guest inviter roles.
  • The user with no roles.
  • Answer A

QUESTION NO 22 Your companys Microsoft Azure
Active Directory (Azure AD) tenant includes four
users. Two of the users are configured with the
Global administrator, Password administrator roles
13
  • respectively. A third user has both the Security
    administrator and the Guest inviter roles
    configured. The fourth user has no roles
    configured.
  • Which of the following is the user that has the
    necessary permissions to create guest users?
    (Choose all that apply)
  • The user with the Global administrator role.
  • The user with the Password administrator role.
  • The user with the Security administrator and
    Guest inviter roles.
  • The user with no roles.
  • Answer A, C
  • QUESTION NO 23
  • You have been tasked with enable Microsoft Azure
    Information Protection for your companys
    Microsoft 365 subscription.
  • You are informed that only the members of a
    group, named Group1, are able to protect
    content. To achieve your goal, you plan to run a
    PowerShell cmdlet.
  • Which of the following is the cmdlet you should
    run?
  • The Add-AadrmRoleBaseAdministrator cmdlet.
  • The Set-AadrmDoNotTrackUserGroup cmdlet.
  • The Clear-AadrmSuperUserGroup cmdlet.
  • The Set-AadrmOnboardingControlPolicy cmdlet.
  • Answer D Explanation
  • If you dont want all users to be able to protect
    documents and emails immediately by using
  • Azure Rights Management, you can configure user
    onboarding controls by using the Set-
    AadrmOnboardingControlPolicy
  • References
  • https//docs.microsoft.com/en-us/azure/information
    -protection/activate-service

Topic 3, Manage Access and Authentication
14
  • QUESTION NO 24
  • Your company has acquired Microsoft 365 for their
    Active Directory domain, which includes five
    domain controllers.
  • Prior to implementing a number of Microsoft 365
    services, you are tasked with making use of an
    authentication solution that allows users to
    access Microsoft 365 by using their on- premises
    credentials. The solution should also only make
    use of the current server infrastructure.
    Furthermore, must allow for all user passwords to
    only be stored on-premises, and be highly
    available.
  • Solution You configure the use of password hash
    synchronization only. Does the solution meet the
    goal?
  • Yes
  • No
  • Answer B
  • QUESTION NO 25
  • Your company has acquired Microsoft 365 for their
    Active Directory domain, which includes five
    domain controllers.
  • Prior to implementing a number of Microsoft 365
    services, you are tasked with making use of an
    authentication solution that allows users to
    access Microsoft 365 by using their on- premises
    credentials. The solution should also only make
    use of the current server infrastructure.
    Furthermore, must allow for all user passwords to
    only be stored on-premises, and be highly
    available.
  • Solution You configure the use of pass-through
    authentication only. Does the solution meet the
    goal?
  • Yes
  • No
  • Answer B

15
  • QUESTION NO 26
  • Your company has acquired Microsoft 365 for their
    Active Directory domain, which includes five
    domain controllers.
  • Prior to implementing a number of Microsoft 365
    services, you are tasked with making use of an
    authentication solution that allows users to
    access Microsoft 365 by using their on- premises
    credentials. The solution should also only make
    use of the current server infrastructure.
    Furthermore, must allow for all user passwords to
    only be stored on-premises, and be highly
    available.
  • Solution You configure the use of pass-through
    authentication and seamless SSO. Does the
    solution meet the goal?
  • Yes
  • No
  • Answer A
  • QUESTION NO 27
  • Your company has a Microsoft Azure Active
    Directory (Azure AD) tenant with multi-factor
    authentication enabled.
  • You have also configured the Allow users to
    submit fraud alerts, and the Block user when
    fraud is reported settings to ON.

16
References https//docs.microsoft.com/en-us/azure
/active-directory/authentication/howto-mfa-
mfasettingsfraud-alert
  • QUESTION NO 28
  • Your company has a Microsoft Azure Active
    Directory (Azure AD) tenant with multi-factor
    authentication enabled.
  • You have also configured the Allow users to
    submit fraud alerts, and the Block user when
    fraud is reported settings to ON.
  • A tenant user has submitted a fraud alert for his
    account. After receiving an alert call, the user
    needs to enter a special code followed by .
  • Which of the following is default special code?
  • 0
  • 9
  • C. 0000
  • D. 1234
  • Answer A References
  • https//docs.microsoft.com/en-us/azure/active-dire
    ctory/authentication/howto-mfa-
  • mfasettingsfraud-alert
  • QUESTION NO 29
  • Your company has a Microsoft Office 365
    subscription with a number of Microsoft
    SharePoint Online sites.
  • Currently, users are able to invite external
    users to access files on the SharePoint sites.
    You are tasked with making sure that users are
    only able to authenticated guest users to the
    SharePoint sites.
  • Which of the following actions should you take?
  • You should create a threat management policy via
    the Security Compliance admin center.
  • You should run the Set-SPOSite cmdlet.

17
C. You should run the Add-SPOUser cmdlet. D. You
should modify the sharing settings via the
SharePoint admin center. Answer D
  • QUESTION NO 30
  • Your company has a Microsoft 365 subscription.
  • You have been tasked with configuring external
    collaboration settings for your companys
    Microsoft Azure Active Directory (Azure AD)
    tenant.
  • You want to make sure that authorized users are
    able to create guest users in the tenant. Which
    of the following actions should you take?
  • Which setting should you modify?
  • You should make sure that the Guests can invite
    setting is set to NO.
  • You should make sure that the Guest users
    permissions are limited setting is set to Yes.
  • You should make sure that the Members can invite
    setting is set to NO.
  • You should make sure that the Admins and users in
    the guest inviter role can invite setting is set
    to Yes.
  • Answer D References
  • https//docs.microsoft.com/en-us/azure/active-dire
    ctory/b2b/delegate-invitations
    https//docs.microsoft.com/en-us/azure/active-dire
    ctory/fundamentals/users-default-
  • permissions
  • QUESTION NO 31

18
  • Get-AzureADUser
  • Get-MsolUser
  • New-AzureADMSInvitation
  • Set-MsolUserPrincipalName
  • Answer B References
  • https//docs.microsoft.com/en-us/azure/active-dire
    ctory/authentication/howto-mfa- reporting
  • QUESTION NO 32
  • You need to consider the underlined segment to
    establish whether it is accurate.
  • You have recently configured a conditional access
    policy to force mobile device users to use
    multi-factor authentication when accessing
    Microsoft SharePoint.
  • To check who used multi-factor authentication to
    authenticate, you view the Usage reports from
    Azure Active Directory admin center.
  • Select No adjustment required if the underlined
    segment is accurate. If the underlined segment
    is inaccurate, select the accurate option.
  • No adjustment required
  • user sign-ins
  • event logs
  • audit logs
  • Answer B References
  • https//docs.microsoft.com/en-us/azure/active-dire
    ctory/authentication/howto-mfa- reporting

QUESTION NO 33 Your company has an Enterprise
E5 subscription of Microsoft 365.
19
  • You have been tasked with making sure that sales
    department users are compelled to make use of
    multi-factor authentication for all cloud-based
    applications.
  • Which of the following actions should you take?
  • You should create an DLP.
  • You should create a new app registration.
  • You should create a session policy.
  • You should create a sign-in risk policy.
  • Answer D References
  • https//docs.microsoft.com/en-us/azure/active-dire
    ctory/identity-protection/howto-sign-
    in-risk-policy
  • QUESTION NO 34
  • Your company has a Microsoft 365 subscription.
  • After implementing Active Directory Federation
    Services (AD FS), you are instructed to
    configure AD FS user authentication auditing.
  • You are preparing to run the Register-AzureADConne
    ctHealthSyncAgent cmdlet. Which of the following
    is the server that the cmdlet should be run from?
  • NOTE Each correct selection is worth one point.
  • A member server.
  • A domain controller.
  • An Azure AD Connect server.
  • E. An AD FS server.
  • Answer C

QUESTION NO 35 You need to consider the
underlined segment to establish whether it is
accurate.
20
  • Your company has deployed a Microsoft 365 tenant
    and to implemented multi-factor authentication.
  • They have four offices, of which one houses the
    RD department. You have been asked to make sure
    that multi-factor authentication is compulsory
    only for users in the office houses the RD
    department.
  • You create a conditional access policy.
  • Select No adjustment required if the underlined
    segment is accurate. If the underlined segment
    is inaccurate, select the accurate option.
  • No adjustment required
  • password protection
  • DLP
  • label
  • Answer A

Topic 4, Plan Office 365 Workloads and
Applications
  • QUESTION NO 36
  • Your company has configured all user email to be
    stored in Microsoft Exchange Online.
  • You have been tasked with keeping a duplicate of
    all the email messages from a specified user
    that includes a specific word.
  • Solution You start by creating a spam filter
    policy via the Security Compliance admin
    center. Does the solution meet the goal?
  • Yes
  • No
  • Answer B References

21
https//docs.microsoft.com/en-us/azure/information
-protection/configure-policy- classification
  • QUESTION NO 37
  • Your company has configured all user email to be
    stored in Microsoft Exchange Online.
  • You have been tasked with keeping a duplicate of
    all the email messages from a specified user
    that includes a specific word.
  • Solution You start by initiating a message trace
    via the Security Compliance admin center. Does
    the solution meet the goal?
  • Yes
  • No
  • Answer B References
  • https//docs.microsoft.com/en-us/azure/information
    -protection/configure-policy-
  • classification
  • QUESTION NO 38
  • Your company has configured all user email to be
    stored in Microsoft Exchange Online.
  • You have been tasked with keeping a duplicate of
    all the email messages from a specified user
    that includes a specific word.
  • Solution You start by creating a label and label
    policy via the Security Compliance admin
    center.
  • Does the solution meet the goal?
  • Yes
  • No
  • Answer A

22
References https//docs.microsoft.com/en-us/azure
/information-protection/configure-policy-
classification
  • QUESTION NO 39
  • Your company has a Microsoft 365 subscription.
  • You have previously created a group that includes
    users who send email messages to external users
    on a regular basis. The groups manager would
    like to group wants to examine messages that
    include attachments at random.
  • You are required to make sure that the manager
    can achieve his goal, but only make ten out of a
    hundred messages accessible to him.
  • You need to provide the manager with the ability
    to review messages that contain attachments sent
    from the Support group users to external users.
    The manager must have access to only 10 percent
    of the messages.
  • Which of the following should you create?
  • A label policy.
  • A conditional access policy.
  • A DLP policy.
  • A supervisor policy.
  • Answer D References
  • https//docs.microsoft.com/en-us/office365/securit
    ycompliance/supervision-policies

QUESTION NO 40 You need to consider the
underlined segment to establish whether it is
accurate. Your company has recently acquired a
new sales application.
23
  • You navigate to the Discovered apps page in Cloud
    Discovery via Microsoft Cloud App Security to
    check the applications score. You then notice
    that a number of the applications have a low
    score as a result of omitted domain registration
    and consumer popularity data.
  • You want to make sure that the score is not
    affected by the omitted data. You have to
    configure app tags via the Cloud Discover
    settings
  • Select No adjustment required if the underlined
    segment is accurate. If the underlined segment
    is inaccurate, select the accurate option.
  • What should you configure from the?
  • No adjustment required
  • a label
  • App Connector flow
  • a custom key
  • Answer A References
  • https//docs.microsoft.com/en-us/cloud-app-securit
    y/discovered-app-queries

QUESTION NO 41 You have been tasked with
migrating your companys on-premises Microsoft
Exchange Server 2013 organization to Microsoft
365. You plan to make use of the cutover
migration method. Which of the following is the
maximum recommended number of mailboxes that you
should migrate? A. 2000 B. 1000 C. 150 D.
75 Answer C
24
References https//docs.microsoft.com/en-us/excha
nge/mailbox-migration/cutover-migration-to-
office-365
  • QUESTION NO 42
  • You have recently created a Microsoft 365
    Enterprise subscription and assigned all users
    licenses for all products.
  • You want to configure all Microsoft Office 365
    ProPlus installations to be done via a network
    share. You also want to make sure that users are
    prevented from using the Internet to install
    Office 365 ProPlus.
  • Which of the following is the type of file that
    you should create? NOTE Each correct selection
    is worth one point.
  • An HTML download file.
  • An XML download file.
  • An HTTP download file.
  • An EXE download file.
  • Answer B References
  • https//docs.microsoft.com/en-us/deployoffice/over
    view-of-the-office-2016-deployment-
  • tooldownload-the-installation-files-for-office-36
    5-proplus-from-a-local-source

QUESTION NO 43 You have recently created a
Microsoft 365 subscription. You have prepared an
XML file for the upcoming Microsoft Office 365
ProPlus deployment. The Channel attribute for
the OfficeClientEdition attribute is set to
Broad, while the Channel attribute for the
Updates element is set to Targeted. Which of the
following the following is the frequency with
which the installation of Office 365 ProPlus
feature updates will occur?
25
  • Weekly.
  • Monthly
  • Six monthly
  • Annually
  • Answer C References
  • https//docs.microsoft.com/en-us/deployoffice/conf
    iguration-options-for-the-office-2016-
  • deployment-toolupdates-element
  • https//docs.microsoft.com/en-us/deployoffice/over
    view-of-update-channels-for-office- 365-proplus
  • QUESTION NO 44
  • You have recently created a Microsoft 365
    subscription.
  • You have prepared an XML file for the upcoming
    Microsoft Office 365 ProPlus deployment.
  • The Channel attribute for the OfficeClientEdition
    attribute is set to Broad, while the Channel
    attribute for the Updates element is set to
    Targeted.
  • Which of the following the following are the
    months of the year that security updates will be
    installed?
  • January and July.
  • March and September
  • June and December
  • April and October
  • Answer B References
  • https//docs.microsoft.com/en-us/deployoffice/conf
    iguration-options-for-the-office-2016-
  • deployment-toolupdates-element
  • https//docs.microsoft.com/en-us/deployoffice/over
    view-of-update-channels-for-office- 365-proplus

26
  • QUESTION NO 45
  • Your companys network contains two Active
    Directory forests, with two domains configured
    per forest. All workstations are domain-joined
    and have Windows 10 installed.
  • You have created a Microsoft Azure Active
    Directory (Azure AD) tenant in preparation for
    configuring Hybrid Azure AD join for the
    workstations.
  • You want to make sure that the tenant can be
    discovered by the workstations. Which of the
    following should you create in each forest?
  • A migration endpoint.
  • A new conditional access policy.
  • A new trust relationship.
  • A new service connection point (SCP).
  • Answer D References
  • https//docs.microsoft.com/en-us/azure/active-dire
    ctory/devices/hybrid-azuread-join-
  • manual
  • QUESTION NO 46
  • After your company acquires a Microsoft 365
    subscription, they instruct you to move all email
    data from their corporate Gmail to Microsoft
    Exchange Online.
  • The migration will be done via the Exchange admin
    center. Which of the following is the migration
    method you should use?
  • Exchange Hybrid
  • IMAP migration
  • Cutover
  • Express migration
  • Answer B References

27
https//docs.microsoft.com/en-us/exchange/mailbox-
migration/migrating-imap- mailboxes/migrate-g-sui
te-mailboxes
  • QUESTION NO 47
  • After your company acquires a Microsoft 365
    subscription, they instruct you to move all email
    data from their corporate Gmail to Microsoft
    Exchange Online.
  • The migration will be done via the Exchange admin
    center.
  • Which of the following is TRUE with regards to
    the data included in the migration?
  • All data will be migrated.
  • Only email data will be migrated.
  • Email and task data will be migrated.
  • Email and contact data will be migrated.
  • Answer B References
  • https//docs.microsoft.com/en-us/exchange/mailbox-
    migration/migrating-imap-
  • mailboxes/migrate-g-suite-mailboxes
Write a Comment
User Comments (0)
About PowerShow.com