Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

MS-102: Microsoft 365 Administrator Practice questions

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show Microsoft Intune  
🗑
show Microsoft Intune  
🗑
You are a modern desktop administrator for a small business organization. The organization needs to purchase new devices and install Windows on them. Which Windows Edition is the most suitable choice for the organization, considering its size and budget?   show
🗑
show Windows 10 Enterprise  
🗑
show Azure Active Directory (Azure AD)  
🗑
show Azure AD Conditional Access  
🗑
You need to ensure that only authorized users can access sensitive data and applications. Which Azure AD features can you use to manage access to resources?   show
🗑
show Azure AD Connect  
🗑
Your org is implementing a bring-your-own-device (BYOD) policy. You need to ensure that these devices are enrolled in the org's mobile device management (MDM) solution and meet security/compliance policies. Which enrollment method should you recommend?   show
🗑
show Configuration Manager enrollment profile  
🗑
You need to enroll Windows devices in Intune using the Autopilot method. Which of the following is required for Autopilot enrollment?   show
🗑
show Allows for automatic device registration in Intune  
🗑
You need to configure a device profile for all Windows 10 devices that prevents users from using USB storage devices. Which type of device profile should you configure in Intune?   show
🗑
show Device compliance policy  
🗑
show User state migration tool (USMT)  
🗑
show Intune app protection policies  
🗑
You need to ensure that users can install and use only approved applications on their devices. Which Intune feature should you use to accomplish this?   show
🗑
show Required deployment  
🗑
show App protection policies  
🗑
You need to ensure that users have access to the required applications, but you also want to limit their access to only the necessary apps. Which of the following features should you use to achieve this?   show
🗑
You need to ensure that users have access to the latest versions of the applications. Which of the following features should you use to achieve this?   show
🗑
Your organization wants to ensure that users' passwords meet complexity requirements and are changed regularly. Which of the following features should you use to achieve this in Azure Active Directory?   show
🗑
Your organization is concerned about the risk of compromised credentials and wants to implement an additional layer of authentication for accessing sensitive data. Which of the following features should you use to achieve this in Azure Active Directory?   show
🗑
As an endpoint administrator using Azure AD for ID management, you are configuring access to sensitive business apps for new employees. This group should only have access during business hours on company devices. Which solution would you recommend?   show
🗑
show Compliance policies  
🗑
You have configured a compliance policy that requires devices to have the latest security updates installed. Several devices are still non-compliant. What is the most likely cause of the issue?   show
🗑
You have configured a compliance policy that requires devices to have a passcode set. You receive a report that some devices are non-compliant even though they have a passcode set. What is the most likely cause of the issue?   show
🗑
You are tasked with generating compliance reports using Microsoft Endpoint Manager. What is the correct way to generate these reports?   show
🗑
show Re-evaluate the compliance policy to ensure it is configured correctly  
🗑
You need to ensure that all devices have encryption enabled to protect the data. Which solution should you use to meet this requirement?   show
🗑
show Windows Information Protection (WIP)  
🗑
A user reports suspicious email with a link they clicked on. Their device may have been compromised. What action should you take to investigate the incident using Microsoft Defender for Endpoint?   show
🗑
show Use Microsoft Endpoint Configuration Manager to deploy the latest version of Microsoft Defender for Endpoint  
🗑
show Run a quick scan in MS Defender  
🗑
show Open MS Defender, click on "Settings", then click on "Exclusions" and select "Add or remove exclusions".  
🗑
show Microsoft Cloud App Security  
🗑
You want to enable your users to securely share files while maintaining control over who can access them. Which of the following tools would you use to achieve this goal?   show
🗑
show Windows Autopilot for existing devices  
🗑
Which tool can you use to inventory the software and hardware configurations of Windows-based computers in your organiation?   show
🗑
show Microsoft Deployment Toolkit (MDT)  
🗑
show Creating a bootable media  
🗑
You need to deploy a software update to a group of Windows 10 devices in your organization. Which step should you perform in MS Config Manager to achieve this?   show
🗑
You want to deploy an O/S image to a new device using MS Config Manager. Which of the following components is required to perform this task? a. Windows Deployment Services (WDS) b. MS Deployment Toolkit (MDT) c/d. Config Manager Client/Server Package   show
🗑
show Windows Autopilot  
🗑
show Intune Autopilot  
🗑
show Review your existing policies and procedures to ensure that they align with modern endpoint management best practices.  
🗑
You are an endpoint administrator at a company that has recently adopted Windows 365. You need to manage the Windows 365 deployments for your organization. Name one task that can be performed using the Windows 365 admin center.   show
🗑
show Create a virtual network and subnet for the VM  
🗑
A company has recently deployed Windows 10 on all the desktop computers in their organization. They have asked you to recommend an upgrade method for their current Windows 7 laptops. What is one of the better options to achieve this?   show
🗑
show Azure AD Premium P1 license  
🗑
You are a system admin who needs to choose an appropriate edition of Windows for an enterprise environment. Which Windows edition should you choose if you need to support running virtual machines on a workstation?   show
🗑
show Windows 10 in S mode  
🗑
show Search for the user account-->Click on More-->Click on Block sign-in-->Confirm the action  
🗑
show Click on Users --> Click on New User --> Enter the user details -->Click on Save  
🗑
Directory for ID Management. You need to configure the self-service password reset policy. You want to ensure that users are prompted to register their mobile phone number while signing up for password reset. What authentication method should be used?   show
🗑
You need to provide access to a group of users to a specific application in Azure. However, you do not want these users to have access to other applications in Azure. Which type of access management should you configure?   show
🗑
show Certificate-based authentication  
🗑
show The device must have a valid PKI certificate.  
🗑
show Allow only users who are members of a specific Azure AD group to enroll devices  
🗑
show Automatic Enrollment  
🗑
show Device Restriction Profile  
🗑
You need to configure a device profile to prevent users from accessing the camera on their company-owned devices. Which profile settings should you use?   show
🗑
As an IT Admin, you configure a profile for a group of users requiring access to specific apps and settings on their devices. Which type of profile should you use? a. User b. Device c. Shared device configuration d. Endpoint protection   show
🗑
show Block screen capture  
🗑
The company has a custom app that they want to deploy to their devices. What is the maximum size of the app that can be deployed via Microsoft Intune?   show
🗑
Using MS Endpoint Configuration Manager, you deploy an application requiring a specific version of .NET framework. What is the best way to ensure the required version is installed on devices prior to deployment?   show
🗑
When deploying new versions of apps to devices, they require a newer version of a DLL file that is not on some devices. Using MS Endpoint Configuration Manager to deploy. How can you ensure that the required DLL file is isntalled prior to deployment?   show
🗑
show Microsoft Endpoint Configuration manager Distribution Point  
🗑
show Microsoft Store for Business  
🗑
You have been tasked with configuring password policies to ensure IDs are protected. What is true regarding pwd policies? a. Can be set to never expire b. Must be changed every 180 days c. Can be set using simple words d. Can be set to use only #   show
🗑
When implementing multi-factor authentication (MFA) for all user accounts, which method is valid for MFA in Azure Active Directory? a. Phone call verification b. Captcha verification c. SMS verification d. Email verification   show
🗑
After adopting Zero Trust security models to ensure security across all devices, you need to ensure authentication before granting access to company resources. Which authentication method should you use? a. Passwords b. Biometric Authentication c. MFA   show
🗑
You need to ensure that temporary contractors have access to specific resources only. To regulate their access, which Azure AD feature should you use? a. Conditional Access b. Privileged ID Management c. Azure AD ID Protection d. Azure AD B2B collab   show
🗑
To ensure that all mobile devices that access company data requires encryption, which action should you take?   show
🗑
To ensure that all Windows 10 devices are compliant with the Bitlocker enabled requirement which method should you use to check compliance?   show
🗑
show Windows Analytics  
🗑
To generate a report that shows the software installed on all devices managed by MEM in your organization, which report should you generate? a. Software inventory b. Hardware Inventory c. Compliance d. Configuration Manager Dashboard   show
🗑
show BitLocker Drive Encryption  
🗑
show BitLocker Drive Encryption  
🗑
show Check device history in MS Defender Security Center  
🗑
show They block potentially unwanted applications from running.  
🗑
show Use MS Intune to deploy a policy that configures exclusions for the specific folder on all Windows client devices.  
🗑
show Use MS Intune to deploy a policy that configures the threat detection and response settings on all Windows client devices.  
🗑
MS Defender for Cloud Apps: To manage security policies for cloud apps, which process should be used to create a new security policy?   show
🗑
show Cloud app security policies  
🗑
show Microsoft Assessment and Planning (MAP) Toolkit  
🗑
show Windows Assessment and Deployment Kit (ADK)  
🗑
show Create a task sequence that includes the Windows 10 installation and Office 365 installation, and then deploy the task sequence to the target devices.  
🗑
MS Deployment Toolkit: To deploy Windows 10 to multiple devices, you need to ensure efficiency, and that updates include the latest software and security patches. What is the sequence of steps to achieve this?   show
🗑
show Baseline configuration  
🗑
MS Configuration Manager: To ensure that applications are installed only if the computer meets specific requirements (processor speed, RAM or HD Space) What feature should you use to achieve this?   show
🗑
EPM Admin Role: Using Windows Autopilot for deployments, you prep your devices and have uploaded their information to the MS EPM Admin Center. What is the next step to complete the deployment process?   show
🗑
EPM Admin Role: To deploy Windows 10 devices using Autopilot, you implement a dynamic method to make the process more efficient. Which option would you choose to achieve this?   show
🗑
Transition to Modern EPM using MS SCCM: When planning the transition, which option should you consider for the transition?   show
🗑
show Credential Guard  
🗑
Azure Virtual Desktop as Sys Admin: To ensure that apps are only accessible to specific users, which step do you perform to achieve this? a. Assign app to app group and grant access to users b. Install the app on each user's device individually   show
🗑
show All of the above  
🗑
show Notify to schedule restart  
🗑
EPM Admin with multiple editions of Windows: To deploy new version of Windows to all devices and ensure compatibility, which tool will help to determine compatibility? a. Windows Assessment and Deployment Kit (ADK) b. Windows Upgrade Analytics   show
🗑
EPM Admin using WIndows 10 Pro: To upgrade all devices to Windows 10 Enterprise using Windows Configuration Designer to create an upgrade package, which step should you take before creating the upgrade package?   show
🗑
Azure Active Directory (Azure AD) implementation: OS installs include Windows 10, MacOS and iOS devices. Which authentication method is recommend for iOS devices? a. Password hash synchronization b. Certificate-based authentication   show
🗑
With a recent migration using on-prem Active Directory (AD) ingrastructure to Azure AD, how can you use to enforce the 90 day password renewal policy? a. Password writeback b. Password Hash Sync c. Azure AD Connect Health d. Azure AD ID Protection   show
🗑
As an EPM Admin managing Azure Active Directory, to ensure that users from both merged organizations can access necessary resources and the appropriate level of access. Using AAD to manage access, which group types should you use?   show
🗑
show Create a resource group>Create a Custom role>Define the scope of the role>Assign the role to a user or group  
🗑
As an EPM Admin managing device authentication, to ensure that enrolled devices use secure authentication, what method would you choose for device enrollment?   show
🗑
show Both Windows and non-Windows devices  
🗑
While enrolling a new device in MS Intune, you notice it has an unsupported OS. What action would you take to remedy this?   show
🗑
show Configure the enrollment restrictions for the device  
🗑
show Device Configuration profile type, deployed to all devices using an enrollment restriction policy.  
🗑
As an EPM Admin using InTune for management, you need to ensure that all devices have a specific set of Wi-Fi profiles configured. To configure and enforce these profiles, which action should you perform?   show
🗑
As an EPM Admin using InTune for management, you need to ensure that users can securely access resources from their devices. What is the best solution for configuring user profiles?   show
🗑
show Required  
🗑
Using Microsoft InTune for Mobile Device Management, you hear that some users are unable to install a recently deployed app. To troubleshoot the issue, which InTune report should you use to check installation status?   show
🗑
As an EPM Admin, what deployment method should you use to deploy an app to a group of users with Windows 10 devices?   show
🗑
show Microsoft Installer Package  
🗑
show Check the application's configuration settings on the user's device.  
🗑
While deploying new apps to user groups, you want to ensure the app does not interfere with other apps currently installed on their devices. Which deployment method should you use?   show
🗑
Using Azure Active Directory, you need to ensure that user's identities are protected and that security policies are being followed. Which Azure AD feature should you enable?   show
🗑
After a data breach, you are investigating to find out which users were affected. Which Azure AD feature can you use to view sign-in logs and audit logs for user accounts?   show
🗑
As an EPM Admin in a large organization using MS 365, you need to enable access for users for specific apps and services in Azure AD. Which access policies should you use to achieve this?   show
🗑
show Azure AD Application Proxy  
🗑
Your Windows 10 devices require passwords of at least 8 characters, including upper and lowercase letters and special characters. To enforce this policy, you create a device compliance policy in Microsoft InTune. Which settings should you configure?   show
🗑
show Device health  
🗑
show InTune Device Compliance report  
🗑
As an EPM Admin, what tools can you use to generate detailed inventory reports for all devices?   show
🗑
As an EPM manager of Windows 10 devices, what is the best option to deploy device data protection to ensure that data is protected?   show
🗑
show Iimplement conditional access policies  
🗑
show Configure Endpoint Detection and Response (EDR) capabilities  
🗑
show Configure antivirus protection policies  
🗑
As an EPM Admin, you want to configure Windows Defender Antivirus to perform periodic full scans. what option would you use to configure MS Defender Endpoint   show
🗑
As the EPM Admin, what option would you use to configure Microsoft Defender Application Guard for specific websites?   show
🗑
show Monitoring app usage analytics  
🗑
show Real-time notifications for suspicious activities  
🗑
show Microsoft Assessment and Planning (MAP) Toolkit  
🗑
show MDT can create custom Windows images that include updates, drivers and applications.  
🗑
show MDT can customize deployment images based on hardware specifications.  
🗑
As an IT Admin, you have created a custom deployment image to test prior to deploying to a large number of devices using Microsoft Deployment Toolkit (MDT). What is the correct method to test the deployment image using MDT?   show
🗑
As an EPM, you have created a task sequence and specified the OS image to use for Windows 10 deployment to several devices using MS Configuration Manager. What should you do to specify the device drivers for each device?   show
🗑
As an EPM Admin, you need to ensure that devices meet minimum hardware requirements for the OS. What should you do to deploy Windows 10 to several devices using MS Configuration Manager and meet these requirements?   show
🗑
show The autopilot profile is not configured correctly.  
🗑
show Windows Update for Business  
🗑
As an EPM Admin for an organization with both Windows and Mac OS devices, you need to plan a deployment strategy for the Windows 10 devices. Which approach is recommended for this?   show
🗑
As an EPM Admin, you are migrating to Windows 365 and want to ensure that devices can access Windows 365 efficiently. What is the most appropriate action to take?   show
🗑
show A virtual machine running Windows Server 2019 with the Remote Desktop Services (RDS) role installed.  
🗑
The IT team is considering different desktop management solutions for your organization, including MS Intune and System Center Configuration Manager (SCCM). After the IT team has completed research and testing, they recommend MS Intune. Do you agree?   show
🗑
show Agree  
🗑
show Agree  
🗑
show Agree  
🗑
show Agree  
🗑
show Disagree  
🗑
To ensure that only authorized devices are allowed to enroll in the org's MS Intune service, you are thinking about using a Group Policy Object to configure the Device Registration Service. Is this a good solution?   show
🗑
show Disagree  
🗑
show Disagree  
🗑
show There may be some conflicting policies between the group policy and the profile.  
🗑
As an EP Admin you are reviewing a device profile that specifies mandatory proxy server for all devices. Some users can't access certain websites and applications using this server. Is it a good idea to disable the mandatory proxy server for these users?   show
🗑
When deploying mobile apps using MS Intune, one app requires a specific version of iOS not supported by some company devices. Should you block the application from being installed?   show
🗑
show Agree  
🗑
As the EP Admin, you hear that some users cannot access updated versions of applications that were deploying using MS Intune. The versions in question have been successfully deployed in Intune. What might be the issue and the solution?   show
🗑
show There may be conflicts between the new application update and existing applications on the devices. Create a dependency rule for the new app update and the existing apps.  
🗑
show Check user group membership for app installations. If they are not members, add them to the authorized group  
🗑
show Verify the application's compatibility with the O/S and install the latest updates  
🗑
show Agree  
🗑
Using Azure AD as ID provider to ensure user compliance with security policies, the company has decided to restrict access sensitive data based on user location using conditional access policies. Is this a good solution?   show
🗑
Using Azure AD for ID Management and Authentication, they want to give external partners conditional access to sensitive data. What would be a good solution?   show
🗑
show Agree  
🗑
Users are reporting issues with their devices not being compliant, even though they are compliant with the recently implemented policies. Should the compliance policies be adjusted to resolve this issue?   show
🗑
show Disagree  
🗑
show Agree  
🗑
To ensure device updates are current for security and policy, you have configured compliance policies in MS Intune to enforce device compliance. Is this a good solution?   show
🗑
To protect Windows 10 device data, Bitlocker encryption has been implemented on all devices. To prevent users from disabling this or using weak encryption methods, they propose deploying MS Defender for Endpoint to enforce encryption. Will this work?   show
🗑
show Agree  
🗑
Some devices are not receiving security updates, and this raises concerns about security breaches. Using Microsoft Defender for Windows client, how can you ensure that all devices are up to date on security?   show
🗑
show Agree  
🗑
show Agree  
🗑
show Agree  
🗑
During Windows 10 device deployments using Windows Autopilot, some devices are failing to enroll in Azure Active Directory, and not being auto configured with apps and policies. What is a good solution for this?   show
🗑
show First, assess specific organizational needs; Microsoft Intune is good for an org with a large number of remote or mobile users. MS EP Mngr is good if there is a mix of Windows and non-Windows devices.  
🗑
show Assess compatibility for legacy apps in the new environment. For apps that are incompatible, research options to bridge needs, such as compatibility shims, upgrading to a newer version of the app, or using virtualization techniques.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: jquraishi