Question: 1
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to assign User2 the required roles to meet the security requirements.
Solution: From the Office 365 admin center, you assign User2 the Security Reader role. From the
Exchange admin center, you assign User2 the Compliance Management role.
Does this meet the goal?
A. Yes
B. NO
Answer: A
Explanation:
User2 must be able to view reports and schedule the email delivery of security and compliance reports.
The Security Reader role can view reports.
The Compliance Management role can schedule the email delivery of security and compliance reports.
Reference:
Question: 2
Note This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to assign User2 the required roles to meet the security requirements.
Solution: From the Office 365 admin center, you assign User2 the Security Administrator role. From the
Exchange admin center, you add User2 to the View-Only Management role.
Does this meet the goal?
A. Yes
B. NO
Answer: B
Explanation:
User2 must be able to view reports and schedule the email delivery of security and compliance reports.
The Security Administrator role can view reports but not schedule the email delivery of security and
compliance reports.
The View-Only Organization Management role cannot schedule the email delivery of security and
compliance reports.
Reference:https://docs.microsoft.com/en-us/exchange/permissions-exo/permissions-exo
Question: 3
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals. Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You need to assign User2 the required roles to meet the security requirements.
Solution: From the Office 365 admin center, you assign User2 the Security Reader role.
From the Exchange admin center, you assign User2 the Help Desk role.
Does this meet the goal?
A. Yes
B. NO
Answer: B
Explanation:
User2 must be able to view reports and schedule the email delivery of security and compliance reports.
The Security Reader role can view reports but not schedule the email delivery of security and
compliance reports.
The Help Desk role cannot schedule the email delivery of security and compliance reports.
Reference:
https://docs.microsoft.com/en-us/exchange/permissions-exo/permissions-exo
Question: 4
Note: This question is part of a series of questions that present the same scenario. Each question in the
series contains a unique solution that might meet the stated goals- Some question sets might have more
than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As m result, these
questions will not appear in the review screen.
You need to assign User2 the required roles to meet the security requirement.
Solution: From the Office 36S admin center, you assign User2 the Records Management role. From the
Exchange 3dmm center, you assign User2 the Help Desk role.
Does that meet the goal?
A. Yes
B. NO
Answer: B
Question: 5
You need to Add the custom domain name* to Office 36S K> support the planned changes as quickly as
possible.
What should you create to verify the domain names successfully?
A. three alias (CNAME) record
B. one text (TXT) record
C. one alias (CNAME) record
D. three text (TXT) record
Answer: D
Explanation:
Contoso plans to provide email addresses for all the users in the following domains:
East.adatum.com
Contoso.adatum.com
Humongousinsurance.com
To verify three domain names, you need to add three TXT records.
Reference:
https://docs.microsoft.com/en-us/office365/admin/setup/add-domain?view=o365-worldwide
Question: 7
You need to meet the security requirement for Group1.
What should you do?
A. Configure all users to sign in by using multi-factor authentication.
B. Modify the properties of Group1.
C. Assign Group1 a management role.
D. Modify the Password reset properties of the Azure AD tenant.
Answer: D
References:
Explanation:
The members of Group1 must be required to answer a security question before changing their
password.
If SSPR (Self Service Password Reset) is enabled, you must select at least one of the following options for
the authentication methods. Sometimes you hear these options referred to as "gates."
Mobile app notification
Mobile app code
Mobile phone
Office phone
Security questions
You can specify the required authentication methods in the Password reset properties of the Azure AD
tenant. In this case, you should set the required authentication method to be ‘Security questions’.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-sspr-howitworks
Question: 8
To which Azure AD role should you add User4 to meet the security requirement?
A. Password administrator
B. Global administrator
C. Security administrator
D. Privileged role administrator
Answer: B
Explanation:
User4 must be able to reset User3 password.
User3 is assigned the Customer Lockbox Access Approver role. Only global admins can reset the
passwords of people assigned to this role as it’s considered a privileged role.
Reference:
https://techcommunity.microsoft.com/t5/Security-Privacy-and-Compliance/Customer-LockboxApprover-Role-Now-Available/ba-p/223393
Question: 10
You need to meet the security requirement for the vendors.
What should you do?
A. From the Azure portal, add an identity provider.
B. From Azure Cloud Shell, run the New-AzureADUser cmdlet and specify the –UserPrincipalName
parameter.
C. From the Azure portal, create guest accounts.
D. From Azure Cloud Shell, run the New-AzureADUser cmdlet and specify the –UserType parameter.
Answer: C
Explanation:
Vendors must be able to authenticate by using their Microsoft account when accessing Contoso
resources.
You can invite guest users to the directory, to a group, or to an application. After you invite a user
through any of these methods, the invited user's account is added to Azure Active Directory (Azure AD),
with a user type of Guest. The guest user must then redeem their invitation to access resources. An
invitation of a user does not expire.
The invitation will include a link to create a Microsoft account. The user can then authenticate using
their Microsoft account. In this question, the vendors already have Microsoft accounts so they can
authenticate using them.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/b2b/add-users-administrator
For More Info:
https://www.realexamdumps.com/microsoft/mb-901-practice-test.html
No comments:
Post a Comment