Microsoft Exam, MS-100 Exam Dumps, MS-100 Exam Questions, MS-100 PDF Dumps, MS-100 VCE Dumps

[September-2021]New Braindump2go MS-100 PDF and MS-100 VCE Dumps[Q320-Q354]

September/2021 Latest Braindump2go MS-100 Exam Dumps with PDF and VCE Free Updated Today! Following are some new MS-100 Real Exam Questions!

QUESTION 320
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
After acquiring a Microsoft 365 Enterprise subscription, you are tasked with migrating your company’s Microsoft Exchange Server 2016 mailboxes and groups to Exchange Online.
You have started a new migration batch. You, subsequently, receive complaints from on-premises Exchange Server users about slow performance.
Your analysis shows that the issue has resulted from the migration. You want to make sure that the effect the mailbox migration has on users is decreased.
Solution: You create a label policy.
Does the solution meet the goal?

A. Yes
B. No

Answer: B

QUESTION 321
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
After acquiring a Microsoft 365 Enterprise subscription, you are tasked with migrating your company’s Microsoft Exchange Server 2016 mailboxes and groups to Exchange Online.
You have started a new migration batch. You, subsequently, receive complaints from on-premises Exchange Server users about slow performance.
Your analysis shows that the issue has resulted from the migration. You want to make sure that the effect the mailbox migration has on users is decreased.
Solution: You create a mail flow rule.
Does the solution meet the goal?

A. Yes
B. No

Answer: B

QUESTION 322
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
After acquiring a Microsoft 365 Enterprise subscription, you are tasked with migrating your company’s Microsoft Exchange Server 2016 mailboxes and groups to Exchange Online.
You have started a new migration batch. You, subsequently, receive complaints from on-premises Exchange Server users about slow performance.
Your analysis shows that the issue has resulted from the migration. You want to make sure that the effect the mailbox migration has on users is decreased.
Solution: You modify the migration endpoint settings.
Does the solution meet the goal?

A. Yes
B. No

Answer: A

QUESTION 323
You need to consider the underlined segment to establish whether it is accurate.
You company has a Microsoft 365 subscription.
To prevent your company from receiving phishing email messages, create a new mail flow rule.
Select “No adjustment required” if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option.

A. No adjustment required
B. Label policy.
C. Threat management policy.
D. Spam filter policy.

Answer: C
Explanation:
https://docs.microsoft.com/en-us/office365/securitycompliance/set-up-anti-phishing-policies

QUESTION 324
You work for a company manages all their identities in the cloud.
After acquiring a new domain name, you are tasked with making sure that the primary email address of all new mailboxes uses the new domain.
Which of the following is the Microsoft Exchange Online PowerShell cmdlet that you should run?

A. Update-EmailAddressPolicy
B. Update-OfflineAddressBook
C. Set-AddressBookPolicy
D. Set-EmailAddressPolicy

Answer: D
Explanation:
https://docs.microsoft.com/en-us/powershell/module/exchange/email-addresses-and-address-books/set-emailaddresspolicy?view=exchange-ps

QUESTION 325
You are responsible for your company’s Microsoft 365 subscription.
The company introduces a security policy that requires DLP incident reports to be automatically sent to legal department users.
You are required to configure the reports to be delivered via email as often you can.
Which of the following is the option you should use?

A. Annually
B. Monthly
C. Weekly
D. Quarterly

Answer: C

QUESTION 326
You have been tasked with detecting all users in your company’s Microsoft 365 subscription who has a Microsoft Office 365 license as a result of belonging to a group.
You need to make sure that the group used to assign the license is included in your results.
Which of the following actions should you take?

A. You should access the Azure portal, and navigate to the Licenses blade.
B. You should access the Microsoft 365 admin center, and navigate to the Products blade.
C. You should access the Azure portal, and navigate to the Monitor blade.
D. You should access the Microsoft 365 admin center, and navigate to the Users blade.

Answer: A

QUESTION 327
You have previously accessed the Security & Compliance admin center to upload a number of archive PST files to Microsoft 365.
When you try to run an import job for the PST files 45 days later, you find that they have been removed from Microsoft 365.
Which of the following is the number of days that Microsoft 365 retains PST file before deleting them automatically?

A. 1 day.
B. 30 days.
C. 15 days.
D. 45 days.

Answer: B
Explanation:
https://docs.microsoft.com/en-us/office365/securitycompliance/faqimporting-pst-files-to-office-365

QUESTION 328
You need to consider the underlined segment to establish whether it is accurate.
You have been tasked with deploying a Windows 10 Enterprise image to a large number of Windows 8.1 devices. These devices are joined to an Active Directory domain.
You use the in-place upgrade Windows 10 deployment method for the task.
Select “No adjustment required” if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option.
What should you recommend?

A. No adjustment required.
B. Windows Autopilot
C. Windows Update
D. Azure AD Connect

Answer: A
Explanation:
https://docs.microsoft.com/en-us/microsoft-365/enterprise/windows10-infrastructure

QUESTION 329
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
Your company currently has an on-premises Active Directory forest.
You have been tasked with assessing the application of Microsoft 365 and the utilization of an authentication strategy.
You have been informed that the authentication strategy should permit sign in via smart card-based certificates, and also permitting the use of SSO to connect to on-premises and Microsoft 365 services.
Solution: You recommend the use of pass-through authentication and seamless SSO with password hash synchronization as the authentication strategy.
Does the solution meet the goal?

A. Yes
B. No

Answer: B

QUESTION 330
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
Your company currently has an on-premises Active Directory forest.
You have been tasked with assessing the application of Microsoft 365 and the utilization of an authentication strategy.
You have been informed that the authentication strategy should permit sign in via smart card-based certificates, and also permitting the use of SSO to connect to on-premises and Microsoft 365 services.
Solution: You recommend the use of password hash synchronization and seamless SSO as the authentication strategy.
Does the solution meet the goal?

A. Yes
B. No

Answer: B

QUESTION 331
Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.
Your company currently has an on-premises Active Directory forest.
You have been tasked with assessing the application of Microsoft 365 and the utilization of an authentication strategy.
You have been informed that the authentication strategy should permit sign in via smart card-based certificates, and also permitting the use of SSO to connect to on-premises and Microsoft 365 services.
Solution: You recommend the use of federation with Active Directory Federation Services (AD FS) as the authentication strategy.
Does the solution meet the goal?

A. Yes
B. No

Answer: A
Explanation:
https://docs.microsoft.com/en-us/azure/security/azure-ad-choose-authn

QUESTION 332
Your company’s Microsoft Azure Active Directory (Azure AD) tenant includes four users. Three of the users are each configured with the Password administrator, Security administrator, and the User administrator roles respectively. The fourth user has no role configured.
Which of the following are the users that are able to reset the password of the fourth user?

A. The users with the Password administrator and the User administrator roles.
B. The users with the Security administrator and the User administrator roles.
C. The users with the Password administrator and the Security administrator roles.
D. The user with the Password administrator role only.

Answer: A
Explanation:
https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/directory-assign-admin-roles

QUESTION 333
Your network contains an Active Directory domain that spans a number of cities and a multitude of users.
After acquiring Microsoft 365, you intend to deploy quite a few Microsoft 365 services.
You want to make sure that pass-through authentication and seamless SSO can be used in your environment. You also decide that Azure AD Connect won’t be configured to be in staging mode.
With regards to redundancy limits, which of the following is the maximum amount of servers that can run Azure AD Connect?

A. 1
B. 3
C. 5
D. 7

Answer: A

QUESTION 334
Your network contains an Active Directory domain that spans a number of cities and a multitude of users.
After acquiring Microsoft 365, you intend to deploy quite a few Microsoft 365 services.
You want to make sure that pass-through authentication and seamless SSO can be used in your environment. You also decide that Azure AD Connect won’t be configured to be in staging mode.
With regards to redundancy limits, which of the following is the most amount of servers that can run standalone Authentication Agents?

A. 7
B. 9
C. 11
D. 13

Answer: C

QUESTION 335
Your company’s Microsoft Azure Active Directory (Azure AD) tenant includes four users that are configured with the Privileged role administrator, the User administrator, the Security administrator, and the Billing administrator roles respectively.
A security group has been included in the tenant for the purpose of managing administrative accounts.
Which of the four roles can be used to create a guest user account?

A. The Privileged role administrator role.
B. The User administrator role.
C. The Security administrator role.
D. The Billing administrator role.

Answer: B
Explanation:
https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/directory-assign-admin-roles

QUESTION 336
Your company’s Microsoft Azure Active Directory (Azure AD) tenant includes four users that are configured with the Privileged role administrator, the User administrator, the Security administrator, and the Billing administrator roles respectively.
A security group has been included in the tenant for the purpose of managing administrative accounts.
Which of the four roles can be used to add a user with the Security administrator role to the security group?

A. The Privileged role administrator role.
B. The User administrator role.
C. The Security administrator role.
D. The Billing administrator role.

Answer: B
Explanation:
https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/directory-assign-admin-roles

QUESTION 337
Your company has an Active Directory domain as well as a Microsoft Azure Active Directory (Azure AD) tenant.
After configuring directory synchronization for all users in the organization, you configure a number of new user accounts to be created automatically.
You want to run a command to make sure that the new user accounts synchronize to Azure AD in the shortest time required.
Which of the following is the command that you should use?

A. New-ADSyncRule
B. Set-ADSyncSchedulerConnectorOverride
C. Start-ADSyncSyncCycle
D. Set-ADSyncSchema

Answer: C
Explanation:
https://blogs.technet.microsoft.com/rmilne/2014/10/01/how-to-run-manual-dirsync-azure-active-directory-sync-updates/

QUESTION 338
Your company’s Microsoft Azure Active Directory (Azure AD) tenant includes four users. Two of the users are configured with the Global administrator, Password administrator roles respectively. A third user has both the Security administrator and the Guest inviter roles configured. The fourth user has no roles configured.
Which of the following is the user that has the necessary permissions to alter the password protection policy? (Choose all that apply.)

A. The user with the Global administrator role.
B. The user with the Password administrator role.
C. The user with the Security administrator and Guest inviter roles.
D. The user with no roles.

Answer: A

QUESTION 339
Your company’s Microsoft Azure Active Directory (Azure AD) tenant includes four users. Two of the users are configured with the Global administrator, Password administrator roles respectively. A third user has both the Security administrator and the Guest inviter roles configured. The fourth user has no roles configured.
Which of the following is the user that has the necessary permissions to create guest users? (Choose all that apply.)

A. The user with the Global administrator role.
B. The user with the Password administrator role.
C. The user with the Security administrator and Guest inviter roles.
D. The user with no roles.

Answer: AC

QUESTION 340
You have been tasked with enable Microsoft Azure Information Protection for your company’s Microsoft 365 subscription.
You are informed that only the members of a group, named Group1, are able to protect content. To achieve your goal, you plan to run a PowerShell cmdlet.
Which of the following is the cmdlet you should run?

A. The Add-AadrmRoleBaseAdministrator cmdlet.
B. The Set-AadrmDoNotTrackUserGroup cmdlet.
C. The Clear-AadrmSuperUserGroup cmdlet.
D. The Set-AadrmOnboardingControlPolicy cmdlet.

Answer: D
Explanation:
If you don’t want all users to be able to protect documents and emails immediately by using Azure Rights Management, you can configure user onboarding controls by using the Set-AadrmOnboardingControlPolicy
References:
https://docs.microsoft.com/en-us/azure/information-protection/activate-service

QUESTION 341
Your company has acquired Microsoft 365 for their Active Directory domain, which includes five domain controllers.
Prior to implementing a number of Microsoft 365 services, you are tasked with making use of an authentication solution that allows users to access Microsoft 365 by using their on-premises credentials. The solution should also only make use of the current server infrastructure. Furthermore, must allow for all user passwords to only be stored on-premises, and be highly available.
Solution: You configure the use of password hash synchronization only.
Does the solution meet the goal?

A. Yes
B. No

Answer: B

QUESTION 342
Your company has acquired Microsoft 365 for their Active Directory domain, which includes five domain controllers.
Prior to implementing a number of Microsoft 365 services, you are tasked with making use of an authentication solution that allows users to access Microsoft 365 by using their on-premises credentials. The solution should also only make use of the current server infrastructure. Furthermore, must allow for all user passwords to only be stored on-premises, and be highly available.
Solution: You configure the use of pass-through authentication only.
Does the solution meet the goal?

A. Yes
B. No

Answer: B

QUESTION 343
Your company has acquired Microsoft 365 for their Active Directory domain, which includes five domain controllers.
Prior to implementing a number of Microsoft 365 services, you are tasked with making use of an authentication solution that allows users to access Microsoft 365 by using their on-premises credentials. The solution should also only make use of the current server infrastructure. Furthermore, must allow for all user passwords to only be stored on-premises, and be highly available.
Solution: You configure the use of pass-through authentication and seamless SSO.
Does the solution meet the goal?

A. Yes
B. No

Answer: A

QUESTION 344
Your company has a Microsoft Azure Active Directory (Azure AD) tenant with multi-factor authentication enabled.
You have also configured the Allow users to submit fraud alerts, and the Block user when fraud is reported settings to ON.
A tenant user has submitted a fraud alert for his account.
Which of the following is the length of time that the user’s account will automatically be blocked for?

A. 24 hours
B. 90 days
C. 1 month
D. 1 week

Answer: B
Explanation:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings#fraud-alert

QUESTION 345
Your company has a Microsoft Azure Active Directory (Azure AD) tenant with multi-factor authentication enabled.
You have also configured the Allow users to submit fraud alerts, and the Block user when fraud is reported settings to ON.
A tenant user has submitted a fraud alert for his account. After receiving an alert call, the user needs to enter a special code followed by #.
Which of the following is default special code?

A. 0
B. 9
C. 0000
D. 1234

Answer: A
Explanation:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings#fraud-alert

QUESTION 346
Your company has a Microsoft Office 365 subscription with a number of Microsoft SharePoint Online sites.
Currently, users are able to invite external users to access files on the SharePoint sites. You are tasked with making sure that users are only able to authenticated guest users to the SharePoint sites.
Which of the following actions should you take?

A. You should create a threat management policy via the Security & Compliance admin center.
B. You should run the Set-SPOSite cmdlet.
C. You should run the Add-SPOUser cmdlet.
D. You should modify the sharing settings via the SharePoint admin center.

Answer: D

QUESTION 347
Your company has a Microsoft 365 subscription.
You have been tasked with configuring external collaboration settings for your company’s Microsoft Azure Active Directory (Azure AD) tenant.
You want to make sure that authorized users are able to create guest users in the tenant.
Which of the following actions should you take?
Which setting should you modify?

A. You should make sure that the Guests can invite setting is set to NO.
B. You should make sure that the Guest users permissions are limited setting is set to Yes.
C. You should make sure that the Members can invite setting is set to NO.
D. You should make sure that the Admins and users in the guest inviter role can invite setting is set to Yes.

Answer: D
Explanation:
https://docs.microsoft.com/en-us/azure/active-directory/b2b/delegate-invitations
https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/users-default-permissions

QUESTION 348
After acquiring a Microsoft 365 subscription, you configure the use of Microsoft Azure Multi-Factor Authentication (MFA) for all users in the Azure Active Directory (Azure AD) tenant.
You want to produce a report that includes all the users who finished the Azure MFA registration process.
You want to make use of an Azure Cloud Shell cmdlet.
Which of the following is the cmdlet you should use?

A. Get-AzureADUser
B. Get-MsolUser
C. New-AzureADMSInvitation
D. Set-MsolUserPrincipalName

Answer: B
Explanation:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-reporting

QUESTION 349
You need to consider the underlined segment to establish whether it is accurate.
You have recently configured a conditional access policy to force mobile device users to use multi-factor authentication when accessing Microsoft SharePoint.
To check who used multi-factor authentication to authenticate, you view the Usage reports from Azure Active Directory admin center.
Select “No adjustment required” if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option.

A. No adjustment required
B. user sign-ins
C. event logs
D. audit logs

Answer: B
Explanation:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-reporting

QUESTION 350
Your company has an Enterprise E5 subscription of Microsoft 365.
You have been tasked with making sure that sales department users are compelled to make use of multi-factor authentication for all cloud-based applications.
Which of the following actions should you take?

A. You should create an DLP.
B. You should create a new app registration.
C. You should create a session policy.
D. You should create a sign-in risk policy.

Answer: D
Explanation:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-sign-in-risk-policy

QUESTION 351
Your company has a Microsoft 365 subscription.
After implementing Active Directory Federation Services (AD FS), you are instructed to configure AD FS user authentication auditing.
You are preparing to run the Register-AzureADConnectHealthSyncAgent cmdlet.
Which of the following is the server that the cmdlet should be run from?
NOTE: Each correct selection is worth one point.

A. A member server.
B. A domain controller.
C. An Azure AD Connect server.
D. An AD FS server.

Answer: C

QUESTION 352
You need to consider the underlined segment to establish whether it is accurate.
Your company has deployed a Microsoft 365 tenant and to implemented multi-factor authentication.
They have four offices, of which one houses the R&D department. You have been asked to make sure that multi-factor authentication is compulsory only for users in the office houses the R&D department.
You create a conditional access policy.
Select “No adjustment required” if the underlined segment is accurate. If the underlined segment is inaccurate, select the accurate option.

A. No adjustment required
B. password protection
C. DLP
D. label

Answer: A

QUESTION 353
Your company has configured all user email to be stored in Microsoft Exchange Online.
You have been tasked with keeping a duplicate of all the email messages from a specified user that includes a specific word.
Solution: You start by creating a spam filter policy via the Security & Compliance admin center.
Does the solution meet the goal?

A. Yes
B. No

Answer: B
Explanation:
https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-classification

QUESTION 354
Your company has configured all user email to be stored in Microsoft Exchange Online.
You have been tasked with keeping a duplicate of all the email messages from a specified user that includes a specific word.
Solution: You start by initiating a message trace via the Security & Compliance admin center.
Does the solution meet the goal?

A. Yes
B. No

Answer: B
Explanation:
https://docs.microsoft.com/en-us/azure/information-protection/configure-policy-classification


Resources From:

1.2021 Latest Braindump2go MS-100 Exam Dumps (PDF & VCE) Free Share:
https://www.braindump2go.com/ms-100.html

2.2021 Latest Braindump2go MS-100 PDF and MS-100 VCE Dumps Free Share:
https://drive.google.com/drive/folders/15vjCBbT_dSXLdZo7Ua_XgRuKT6WqjGC0?usp=sharing

3.2021 Free Braindump2go MS-100 Exam Questions Download:
https://www.braindump2go.com/free-online-pdf/MS-100-PDF-Dumps(314-334).pdf
https://www.braindump2go.com/free-online-pdf/MS-100-VCE-Dumps(335-354).pdf

Free Resources from Braindump2go,We Devoted to Helping You 100% Pass All Exams!