Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

MS-100 Questions and Answers

Note! Following MS-100 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is MS-102

MS-100 Questions and Answers

Question # 6

Which migration solution should you recommend for Project1?

A.

From the Microsoft 365 admin center, start a data migration and click Exchange as the data service.

B.

From the Exchange admin center, start a migration and select Cutover migration.

C.

From the Exchange admin center, start a migration and select Staged migration.

D.

From the Microsoft 365 admin center, start a data migration and click Upload PST as the data service.

Full Access
Question # 7

You need to ensure that all the sales department users can authenticate successfully during Project1and Project2.

Which authentication strategy should you implement for the pilot projects?

A.

password hash synchronization and seamless SSO

B.

pass-through authentication

C.

password hash synchronization

D.

pass-through authentication and seamless SSO

Full Access
Question # 8

You have a Microsoft 365 subscription that uses an Azure Directory (Azure AD) tenant named Contoso.com. The tenant contains the users shown in the following table.

You add another user named user5 to the User administrator role.

You need to identify which management tasks User5 can perform.

Which two tasks should you identify? Each correct answer presents a complete solution.

A.

Reset the password of any user in Azure AD.

B.

Delete any user in Azure AD.

C.

Reset the password of User2 and User4 only.

D.

Reset the password of User4 only.

E.

Delete User1, User2, and User4 only.

F.

Delete User2 and User4 only.

Full Access
Question # 9

You are evaluating the required processes for Project1.

You need to recommend which DNS record must be created before you begin the project.

Which DNS record should you recommend?

A.

mail exchanger (MX)

B.

alias (CNAME)

C.

host (A)

D.

host (AAA)

Full Access
Question # 10

You have a Microsoft 365 tenant that contains 300 users.

The users have Domestic and International Calling Plan licenses.

What is the maximum user phone numbers and toll-free service phone numbers can you acquire? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 11

You have a data loss prevention (DLP) policy.

You need to increase the likelihood that the DLP policy will apply to data that contains medical terms from the International Classification of Diseases (ICD-9-CM). The solution must minimize the number of false positives.

Which two settings should you modify? To answer, select the appropriate settings in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 12

You need to create the UserLicenses group. The solution must meet the security requirements.

Which group type and control method should you use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 13

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your company has a Microsoft Office 365 tenant.

You suspect that several Office 365 features were recently updated.

You need to view a list of the features that were recently updated in the tenant.

Solution: You use Monitoring and reports from the Compliance admin center.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 14

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Your network contains an Active Directory forest.

You deploy Microsoft 365.

You plan to implement directory synchronization.

You need to recommend a security solution for the synchronized identities. The solution must meet the following requirements:

* Users must be able to authenticate successfully to Microsoft 365 services if Active Directory becomes unavailable.

* User passwords must be 10 characters or more.

Solution: Implement pass-through authentication and modify the password settings from the Default Domain Policy in Active Directory.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 15

You need to prepare the environment for Project1.

You create the Microsoft 365 tenant.

Which three actions should you perform in sequence next? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Full Access
Question # 16

You need to meet the application requirements for the Office 365 ProPlus applications.

You create an XML files that contains the following settings.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

Full Access
Question # 17

You have a Microsoft 365 subscription that contains the users shown in the following table.

You plan to use Exchange Online to manage email for a DNS domain.

An administrator adds the DNS domain to the subscription.

The DNS domain has a status of incomplete setup.

You need to identify which user can complete the setup of the DNS domain. The solution must use the principle of least privilege.

Which user should you identify?

A.

User1

B.

User2

C.

User3

D.

User4

Full Access
Question # 18

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a hybrid deployment of Microsoft 365 that contains the objects shown in the following table.

Azure AD Connect has the following settings:

  • Password Hash Sync: Enabled
  • Password writeback: Enabled
  • Group writeback: Enabled

You need to add User2 to Group 2.

Solution: From Azure PowerShell, you run the Set-AzureADGroup cmdlet.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 19

You have a Microsoft 365 tenant that contains a Microsoft SharePoint Online site named Projects. You need to get a list of documents in the Documents library by using the Microsoft Graph API. How should you complete the query? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 20

Your network contains an on-premises Active Directory domain.

You have a Microsoft 365 subscription.

You implement a directory synchronization solution that uses pass-through authentication.

You configure Microsoft Azure Active Directory (Azure AD) smart lockout as shown in the following exhibit.

You discover that Active Directory users can use the passwords in the custom banned passwords list.

You need to ensure that banned passwords are effective for all users.

Which three actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

From a domain controller, install the Azure AD Password Protection Proxy.

B.

From a domain controller, install the Microsoft AAD Application Proxy connector.

C.

From Custom banned passwords, modify the Enforce custom list setting.

D.

From Password protection for Windows Server Active Directory, modify the Mode setting.

E.

From all the domain controllers, install the Azure AD Password Protection DC Agent.

F.

From Active Directory, modify the Default Domain Policy.

Full Access
Question # 21

You have a Microsoft 365 subscription.

You view the Service health Overview as shown in the following exhibit.

You need to ensure that a user named User1 can view the advisories to investigate service health issues. Which role should you assign to User1?

A.

Compliance Administrator

B.

Message Center Reader

C.

Service Support Administrator

D.

Reports Reader

Full Access
Question # 22

You have a Microsoft 365 FS subscription that uses Microsoft Intune.

You have the devices shown in the following table.

You plan to use Endpoint analytics to monitor device health and user experience.

Which devices can you monitor?

A.

Device1 only

B.

Device1 and Device2 only

C.

Device1, Device2, and Device3 only

D.

Device1, Device2 and Device4 only

E.

Device1, Device2, Device3, and Device4

Full Access
Question # 23

This question requires that you evaluate the underlined text to determine if it is correct-In Microsoft Word on Windows, before you can sideload a Microsoft Office Add-in, you must firs: upload the manifest to Microsoft OneDrive instructions: Review the underlined text. If it makes the statement correct select "No change is needed," If the statement is incorrect select the answer choice that makes the statement correct

A.

No change is needed.

B.

deploy the manifest to an Azure website

C.

publish the manifest to a trusted network location

D.

set Microsoft Edge to Developer Mode

Full Access
Question # 24

You have a Microsoft 365 tenant.

You have a line-of-business application named App1 that users access by using the My Apps portal.

After some recent security breaches, you implement a conditional access policy for App1 that uses Conditional Access App Control.

You need to be alerted by email if impossible travel is detected for a user of App1. The solution must ensure

that alerts are generated for App1 only.

What should you do?

A.

From Microsoft Cloud App Security, modify the impossible travel alert policy.

B.

From Microsoft Cloud App Security, create a Cloud Discovery anomaly detection policy.

C.

From the Azure Active Directory admin center, modify the conditional access policy.

D.

From Microsoft Cloud App Security, create an app discovery policy.

Full Access
Question # 25

You have a Microsoft 365 subscription that contains a user named User1.

You need to ensure that User1 receives Microsoft 365 feature and service updates before the updates are

released to all users.

What should you do in the Microsoft 365 admin center?

A.

Modify the privileged access management settings.

B.

Modify Office software download settings.

C.

Modify the Release preferences settings.

D.

Submit a new service request.

Full Access
Question # 26

Your network contains an on-premises Active Directory domain.

Your company has a security policy that prevents additional software from being installed on domain

controllers.

You need to monitor a domain controller by using Microsoft Azure Advanced Threat Protection (ATP).

What should you do? More than once choice may achieve the goal. Select the BEST answer.

A.

Deploy an Azure ATP standalone sensor, and then configure port mirroring.

B.

Deploy an Azure ATP standalone sensor, and then configure detections.

C.

Deploy an Azure ATP sensor, and then configure detections.

D.

Deploy an Azure ATP sensor, and then configure port mirroring.

Full Access
Question # 27

You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table.

Multi-factor authentication (MFA) is configured to use 131.107.50/24 for trusted IPs.

The tenant contains the named locations shown in the following table.

You create a conditional access policy that has the following configurations:

  • Users and groups assignment: All users
  • Cloud apps assignment: App1
  • Conditions: Include all trusted locations
  • Grant access: require multi-factor authentication

For each of the following statements, select Yes if the statement is true. otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 28

You have an on-premises Microsoft SharePoint Server 2016 environment.

You create a Microsoft 365 tenant.

You need to migrate some of the SharePoint sites to SharePoint Online. The solution must meet the following requirements:

  • Microsoft OneDrive sites must redirect users to online content.
  • Users must be able to follow both on-premises and cloud-based sites.
  • Users must have a single SharePoint profile for both on-premises and on the cloud.

When users search for a document by using keywords, the results must include online and on-premises results.

From the SharePoint Hybrid Configuration Wizard, you select the following features:

  • Hybrid business to business (B2B) sites
  • Hybrid OneDrive
  • Hybrid Search

Which two requirements are met by using the SharePoint Hybrid Configuration Wizard features? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

Users must have a single SharePoint profile for both on-premises and on the cloud.

B.

OneDrive sites must redirect users to online content.

C.

Users must be able to follow both on-premises and cloud-based sites.

D.

When users search for a document by using keywords, the results must include online and on-premises results.

Full Access
Question # 29

You have a Microsoft 365 subscription.

You need to add additional onmicrosoft.com domains to the subscription. The additional domains must be assignable as email addresses for users.

What is the maximum number of onmicrosoft.com domains the subscription can contain?

A.

1

B.

2

C.

5

D.

10

Full Access
Question # 30

Your company uses a legacy on-premises LDAP directory that contains 100 users.

The company purchases a Microsoft 365 subscription.

You need to import the 100 users into Microsoft 365 by using the Microsoft 365 admin center.

Which type of file should you use and which properties are required? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 31

You have a hybrid deployment of Microsoft 365 and an Azure Active Directory (Azure AD) tenant. The tenant contains the users shown in the following table.

Password protection in Azure AD is configured as shown in the following exhibit.

Which users will be prevented from using the word “Contoso” as part of their password?

A.

User1 only

B.

User1 and User2 only

C.

User1 and User3 only

D.

User1, User2, and User3

Full Access
Question # 32

You have a Microsoft 365 subscription

You have an Azure AD tenant that contains the users shown in the following table.

You configure Tenant properties as shown in the following exhibit

Which users will be contacted by Microsoft if the tenant experiences a data breach?

A.

User1 only

B.

User2 only

C.

User3 only

D.

User1 and User2 only

E.

User2 and User3 only

Full Access
Question # 33

Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.

When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.

Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.

Labs are not timed separately, and this exam may have more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.

Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.

You may now click next to proceed to the lab.

Lab information

Use the following login credentials as needed:

To enter your username, place your cursor in the Sign in box and click on the username below.

To enter your password, place your cursor in the Enter password box and click on the password below.

Microsoft 365 Username:

admin@M365x981607.onmicrosoft.com

Microsoft 365 Password: *yfLo7Ir2&y-

If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.

The following information is for technical support purposes only:

Lab Instance: 10811525

You need to prevent the users in your organization from establishing voice calls from Microsoft Skype for Business to external Skype users.

Full Access
Question # 34

Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.

When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.

Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn’t matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.

Labs are not timed separately, and this exam may have more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.

Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.

You may now click next to proceed to the lab.

Lab information

Use the following login credentials as needed:

To enter your username, place your cursor in the Sign in box and click on the username below.

To enter your password, place your cursor in the Enter password box and click on the password below.

Microsoft 365 Username:

admin@LODSe426243.onmicrosoft.com

Microsoft 365 Password: 3&YWyjse-6-d

If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.

The following information is for technical support purposes only:

Lab Instance: 10887751

You plan to provide an external user named fabrikamuser@fabrikam.com with access to several resources in your Microsoft 365 tenant.

You need to ensure that the external user can be added to Office 365 groups.

Full Access
Question # 35

You have a Microsoft 365 subscription that contains the domains shown in the following exhibit.

Which domain name suffixes can you use when you create users?

A.

only Sub1.Contoso1919.onmicrosoft.com

B.

only Contoso1919.onmicrosoft.com and Sub2.Contoso1919.onmicrosoft.com

C.

only Contoso1919.onmicrosoft.com, Sub1.Contoso1919.onmicrosoft.com, and Sub2.Contoso1919.onmicrosoft.com

D.

all the domains in the subscription

Full Access
Question # 36

You have a Microsoft 365 subscription.

All users have their email stored in Microsoft Exchange Online

In the mailbox of a user named User, you need to preserve a copy of all the email messages that contain the word ProjectX.

What should you do first?

A.

From the Exchange admin center, start a mail flow message trace.

B.

From the Security & Compliance admin center, start a message trace.

C.

From the Security & Compliance admin center, create a label and label policy.

D.

From the Exchange admin center, create a mail flow rule.

Full Access
Question # 37

You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com.

An external user has a Microsoft account that uses an email address of user1@outlook.com.

An administrator named Admin1 attempts to create a user account for the external user and receives the error message shown in the following exhibit.

You need to ensure that Admin1 can add the user.

What should you do from the Azure Active Directory admin center?

A.

Add a custom domain name named outlook.com.

B.

Modify the Authentication methods.

C.

Modify the External collaboration settings.

D.

Assign Admin1 the Security administrator role.

Full Access
Question # 38

You have a Microsoft 365 subscription.

All users are assigned Microsoft 365 Apps for enterprise licenses.

You need to ensure that reports display the names of users that have activated Microsoft 365 apps and on how many devices

What should you modify in the Microsoft 365 admin center?

A.

Organization information

B.

Org settings for Reports

C.

the Reports reader role

D.

Org settings for Privacy profile

Full Access
Question # 39

You need to configure Microsoft Teams to support the technical requirements tor collaborating with A. Datum What should you configure in the Microsoft Teams admin center?

A.

meeting policies

B.

external access

C.

guest access

D.

messaging policies

Full Access
Question # 40

You need to ensure that Admin4 can use SSPR.

Which tool should you use, and which action should you perform? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 41

You need to ensure that the Microsoft 365 incidents and advisories are reviewed monthly.

Which users can review the incidents and advisories, and which blade should the users use? To answer, select the appropriate options in the answer area

NOTE: Each correct selection is worth one pant

Full Access
Question # 42

You are evaluating the use of multi-factor authentication (MFA).

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 43

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You need to assign User2 the required roles to meet the security requirements.

Solution: From the Office 365 admin center, you assign User2 the Security Reader role.

From the Exchange admin center, you assign User2 the Help Desk role.

Does this meet the goal?

A.

Yes

B.

NO

Full Access
Question # 44

You need to configure just in time access to meet the technical requirements.

What should you use?

A.

access reviews

B.

entitlement management

C.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

D.

Azure Active Directory (Azure AD) Identity Protection

Full Access
Question # 45

You need to configure HRApp to enable users to search for specific jobs by using chat in Microsoft Teams. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Full Access
Question # 46

You need to provide users with access to SalesApp. The solution must meet the technical requirements What should you include in the solution?

A.

Microsoft AppSource

B.

sideloading

C.

Centralized Deployment

D.

App Catalog in SharePoint Online

Full Access
Question # 47

You need to recommend which API object the SharePoint Framework (SPFx) intranet components will use to access the research department s project management solution. What should you recommend?

A.

SPHttpClient

B.

AadHttpClient

C.

HSGraphClient

D.

HttpClient

Full Access
Question # 48

You need to ensure that users can initiate private conversations with HRBot. The solution must meet the technical requirements for HRApp. How should you configure the HRApp manifest?

A.

In the tots section, change the scopes collection value from teams to personal.

B.

In the dots section, add personal to the scopes collection.

C.

In the staticTaes section, add perioral to the scopes collection.

D.

In the conf igur»bl«Tabs section, add groupchat to the scopes collection

Full Access
Question # 49

You need to recommend the development environment and tools for the development of SalesApp.

What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 50

Which role should you assign to User1?

A.

Security Administrator

B.

Records Management

C.

Security Reader

D.

Hygiene Management

Full Access
Question # 51

You need to modify the HRApp manifest to provide a tab that supports querying the third-party HR system.

Which section of the manifest should you modify, and which value should you set as the scope? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 52

You need to recommend which type of Office Add-in must be used for SalesApp.

What should you recommend?

A.

module extension

B.

task pane

C.

custom function

D.

contextual

Full Access
Question # 53

You need to recommend the development environment and tools for the redesign of the research department’s SharePoint Online sites.

What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 54

You need to recommend a model for the expense claims solution. What should you recommend?

A.

actionable messages via connectors that use an actionable message card

B.

actionable messages via email that uses an adaptive card

C.

actionable messages via connectors that use an adaptive card

D.

actionable messages via email that uses an actionable message card

Full Access
Question # 55

You need to meet the security requirement for Group1.

What should you do?

A.

Configure all users to sign in by using multi-factor authentication.

B.

Modify the properties of Group1.

C.

Assign Group1 a management role.

D.

Modify the Password reset properties of the Azure AD tenant.

Full Access
Question # 56

You need to assign User2 the required roles to meet the security requirements and the technical requirements.

To which two roles should you assign User2? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

the Exchange View-only Organization Management role

B.

the Microsoft 365 Records Management role

C.

the Exchange Online Help Desk role

D.

the Microsoft 365 Security Reader role

E.

the Exchange Online Compliance Management role

Full Access
Question # 57

Note This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You need to assign User2 the required roles to meet the security requirements.

Solution: From the Office 365 admin center, you assign User2 the Security Administrator role. From the Exchange admin center, you add User2 to the View-Only Management role.

Does this meet the goal?

A.

Yes

B.

NO

Full Access
Question # 58

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You need to assign User2 the required roles to meet the security requirements.

Solution: From the Office 365 admin center, you assign User2 the Security Reader role. From the Exchange admin center, you assign User2 the Compliance Management role.

Does this meet the goal?

A.

Yes

B.

NO

Full Access
Question # 59

You need to meet the security requirement for the vendors.

What should you do?

A.

From the Azure portal, modify the authentication methods.

B.

From Azure Cloud Shell, run the New-AzureADMSInvitation and specify the –InvitedIserEmailAddress cmdlet.

C.

From Azure Cloud Shell, run the Set-MsolUserPrincipalName and specify the –tenantID parameter.

D.

From the Azure portal, add an identity provider.

Full Access
Question # 60

You need to meet the security requirement for the vendors.

What should you do?

A.

From the Azure portal, add an identity provider.

B.

From Azure Cloud Shell, run the New-AzureADUser cmdlet and specify the –UserPrincipalName parameter.

C.

From the Azure portal, create guest accounts.

D.

From Azure Cloud Shell, run the New-AzureADUser cmdlet and specify the –UserType parameter.

Full Access
Question # 61

You need to Add the custom domain name* to Office 36S K> support the planned changes as quickly as possible.

What should you create to verify the domain names successfully?

A.

three alias (CNAME) record

B.

one text (TXT) record

C.

one alias (CNAME) record

D.

three text (TXT) record

Full Access
Question # 62

To which Azure AD role should you add User4 to meet the security requirement?

A.

Password administrator

B.

Global administrator

C.

Security administrator

D.

Privileged role administrator

Full Access
Question # 63

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals- Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As m result, these questions will not appear in the review screen.

You need to assign User2 the required roles to meet the security requirement.

Solution: From the Office 36S admin center, you assign User2 the Records Management role. From the Exchange 3dmm center, you assign User2 the Help Desk role.

Does that meet the goal?

A.

Yes

B.

NO

Full Access
Question # 64

You have a Microsoft 365 tenant that contains the users shown in the following table.

Microsoft Exchange Online has the mail flow rules shown in the following table

Rule1 has the following settings:

Full Access
Question # 65

You need to meet the technical requirements for the user licenses.

Which two properties should you configure for each user? To answer, select the appropriate properties in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 66

You need to meet the security requirements for User3. The solution must meet the technical requirements.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access