MS-102 Actual Exam Questions

Last updated on May 30, 2025.
Vendor:Microsoft
Exam Code:MS-102
Exam Name:Microsoft 365 Administrator
Exam Questions:383
Question #361 Topic 1

You have a Microsoft 365 subscription and use Microsoft Defender for Office 365.

You need to create a policy to ensure that any email messages containing an attachment that has the .extl extension is quarantined for inspection.

Which type of policy should you create?

  • A. anti-phishing
  • B. quarantine
  • C. anti-spam
  • D. anti-malware
Reveal Solution Hide Solution   Discussion   3

Correct Answer: D 🗳️

Community vote distribution
D (100%)

Question #362 Topic 1

HOTSPOT
-

You have a Microsoft 365 E5 subscription that contains the groups shown in the following table.



You plan to create 10 new users and configure group-based licensing to assign each user a Microsoft 365 E5 license.

To which group should you add the users, and which portal should you use to assign the license? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution   Discussion   6

Correct Answer:

Question #363 Topic 1

HOTSPOT
-

You have a Microsoft 365 E5 subscription that contains a Windows 11 device named Device1.
Device1 is onboarded to Microsoft Defender for Endpoint.

You need to ensure that Device1 is blocked from connecting to IP address 131.107.10.15.

What should you configure in the Microsoft Defender Endpoint settings? To answer, select the appropriate settings in the answer area.

NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution   Discussion   3

Correct Answer:

Question #364 Topic 1

HOTSPOT
-

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.



You configure a Multifactor authentication registration policy that has the following settings:

• Assignments:
o Include: Group1
o Exclude: Group2
• Controls: Require Microsoft Entra ID multifactor authentication registration
• Policy enforcement: Enabled

You create a conditional access policy that has the following settings:

• Name: Policy1
• Assignments:
o Include: Group2
o Exclude: Group1
• Grant: Require multifactor authentication
• Enable policy: On

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution   Discussion   11

Correct Answer:

Question #365 Topic 1

HOTSPOT
-

Your company has offices in Montreal, Seattle, and New York City.

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.



The offices have the IP addresses shown in the following table.



From Microsoft Defender for Cloud Apps, you create the activity policy shown in the following exhibit.



For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Reveal Solution Hide Solution   Discussion   5

Correct Answer:

Question #366 Topic 1

You have a Microsoft 365 E5 subscription that contains a user named User1.

You create an anti-phishing policy named Policy1 that has the following settings:

• Include these users, groups and domains: User1
• Phishing email threshold: 3 - More Aggressive

User1 receives the email messages shown in the following table.



Which messages are phishing email?

  • A. Mail4 only
  • B. Mail3 and Mail4 only
  • C. Mail2, Mail3, and Mail4 only
  • D. Mail1, Mail2, Mail3, and Mail4
Reveal Solution Hide Solution   Discussion   4

Correct Answer: C 🗳️

Community vote distribution
C (79%)
B (21%)

Question #367 Topic 1

HOTSPOT
-

You have a Microsoft 365 E5 subscription and use Microsoft Defender for Endpoint. The subscription contains Windows 11 devices.

You need to create a policy to restrict users from accessing the Device security settings and the Account protection settings in Windows Defender Security Center on the devices.

Which type of policy should you create, and which template should you use? To answer, select the appropriate options in the answer area.

Reveal Solution Hide Solution   Discussion   1

Correct Answer:

Question #368 Topic 1

You have a Microsoft 365 subscription that uses Microsoft Defender for Endpoint.

All the devices in your organization are onboarded to Microsoft Defender for Endpoint.

You need to ensure that an alert is generated if malicious activity was detected on a device during the last 24 hours.

What should you do?

  • A. From the Microsoft Purview compliance portal, create a data loss prevention (DLP) policy.
  • B. From the Microsoft Defender portal, create an alert suppression rule and assign an alert.
  • C. From Advanced hunting, create a query and a detection rule.
  • D. From the Microsoft Defender portal, create an Advanced hunting query and a detection rule.
Reveal Solution Hide Solution   Discussion   3

Correct Answer: D 🗳️

Community vote distribution
D (100%)

Question #369 Topic 1

You have a Microsoft 365 subscription that includes Microsoft Defender XDR.

From the Microsoft Defender portal, you review the Microsoft Secure Score improvement actions shown in the following table.



You plan to update the status of the improvement actions as shown in the following table.



How many points will the Secure Score increase after the update?

  • A. 0
  • B. 4
  • C. 7
  • D. 13
  • E. 16
Reveal Solution Hide Solution   Discussion   1

Correct Answer: B 🗳️

Community vote distribution
B (100%)

Question #370 Topic 1

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Endpoint and Microsoft Intune.

All devices run Windows 11 and are Microsoft Entra joined.

You are alerted to a zero-day attack.

You need to identify which devices were affected by the attack and send a request to Intune administrators to update the affected devices.

Which two actions should you perform in the Microsoft Defender portal? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

  • A. From Threat analytics, view the list of vulnerable devices.
  • B. From Incidents & alerts, select the latest incident.
  • C. From Vulnerability management, open the security recommendation.
  • D. Select the affected devices and request remediation.
Reveal Solution Hide Solution   Discussion   4

Correct Answer: AD 🗳️

Community vote distribution
AD (100%)

Previous Questions
file Viewing page 37 out of 39 pages.
Viewing questions 361-370 out of 383 questions
Next Questions
Browse atleast 50% to increase passing rate cup
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Loading ...