Microsoft Azure
Microsoft 365 Administrator
MS-102
Popular
Validate your expertise in Microsoft 365 with the MS-102 exam.
147 questions
0 views
Free
Questions 21–30 of 147
What happens when you create a Conditional Access policy in Azure AD?
-
A
All users are immediately denied access.
-
B
Only specified conditions are enforced.
-
C
Policies apply globally, without exceptions.
-
D
It ignores existing security settings.
Explanation
Conditional Access policies enforce rules based on specified conditions, while the others incorrectly imply broad or overriding effects.
Which service should you use for automated backup of Office 365 data?
-
A
Microsoft Azure Backup
-
B
Microsoft 365 Compliance
-
C
Microsoft 365 Defender
-
D
OneDrive for Business
Explanation
Microsoft Azure Backup automates backups for diverse services, whereas the others don't focus on data backup.
A company needs to ensure users can only access specific applications on their device. Which should they implement?
-
A
Conditional Access
-
B
Multi-Factor Authentication
-
C
Self-Service Password Reset
-
D
Azure Active Directory Domain Services
Explanation
Conditional Access policies restrict application access based on conditions, unlike the other options that serve different security needs.
You are configuring a Microsoft Teams meeting. What happens when you select the 'Require login' option for guests?
-
A
Guests can join anonymously
-
B
Guests must authenticate before joining
-
C
Guests cannot join at all
-
D
Guests join without a password
Explanation
'Require login' mandates authentication for guests, while the other options misrepresent guest access scenarios.
You are configuring Azure AD Connect. What is its primary purpose?
-
A
To connect on-premises directories to Azure AD
-
B
To manage network traffic between regions
-
C
To monitor application performance in Azure
-
D
To create a hybrid cloud environment
Explanation
Azure AD Connect synchronizes on-premises directories to Azure AD; others are unrelated functions.
A company needs to ensure that all sensitive emails sent from Microsoft 365 are encrypted. What should they implement?
-
A
Microsoft Defender for Office 365
-
B
Data Loss Prevention (DLP) policies
-
C
Azure Active Directory Identity Protection
-
D
Information Rights Management (IRM)
Explanation
IRM protects sensitive emails with encryption, while others address different security areas.
What happens when a user reaches their SharePoint Online storage quota?
-
A
User can store more files temporarily
-
B
User cannot upload new files
-
C
All access to SharePoint is blocked
-
D
Files start deleting automatically
Explanation
Users cannot upload new files until the quota is reduced; others suggest incorrect actions.
Which service is primarily used for identity and access management in Microsoft 365?
-
A
Azure Active Directory
-
B
Microsoft Endpoint Manager
-
C
SharePoint Online
-
D
Azure Synapse Analytics
Explanation
Azure Active Directory manages identity and access, while the others focus on different functionalities.
A company needs to ensure high availability for its Azure virtual machines during maintenance. What should they implement?
-
A
Availability Zones
-
B
Azure Blob Storage
-
C
Resource Locks
-
D
Public IP Address
Explanation
Availability Zones provide redundancy and high availability, which the other options do not specifically address.
You are configuring Data Loss Prevention (DLP) policies in Microsoft 365. What happens when a DLP policy is triggered?
-
A
Users are notified immediately
-
B
Access to files is revoked
-
C
Content is automatically deleted
-
D
A review is requested from admins
Explanation
Triggered DLP policies notify users, while others do not accurately represent DLP behavior.