MS-102: Microsoft 365 Administrator (beta) Part 3
Question #: 213
Topic #: 1
You need to notify the manager of the human resources department when a user in the department shares a file or folder from the department’s Microsoft SharePoint site.
What should you do?
A. From the SharePoint admin center, modify the sharing settings.
B. From the SharePoint site, create an alert.
C. From the Microsoft Purview compliance portal, create a data loss prevention (DLP) policy.
D. From the Microsoft 365 Defender portal, create an alert policy.
Selected Answer: D
Question #: 214
Topic #: 1
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Endpoint.
From Microsoft Defender for Endpoint, you turn on the Allow or block file advanced feature.
You need to block users from downloading a file named File1.exe.
What should you use?
A. a suppression rule
B. an indicator
C. a device configuration profile
Selected Answer: B
Question #: 215
Topic #: 1
You have an Azure AD tenant that contains the users shown in the following table.
You need to compare the permissions of each role. The solution must minimize administrative effort.
Which portal should you use?
A. the Microsoft Purview compliance portal
B. the Microsoft 365 admin center
C. the Microsoft 365 Defender portal
D. the Microsoft Entra admin center
Selected Answer: B
Question #: 217
Topic #: 1
You have a Microsoft 365 E5 subscription that contains a user named User1.
You create a retention label named Retention1 that is published to all locations.
You need to ensure that User1 can label email messages by using Retention1 as soon as possible.
Which cmdlet should you run in Microsoft Exchange Online PowerShell?
A. Start-ManagedFolderAssistant
B. Start-MpScan
C. Start-AppBackgroundTask
D. Start-Process
Selected Answer: A
Question #: 218
Topic #: 1
You have a Microsoft 365 E5 tenant.
You create an auto-labeling policy to encrypt emails that contain a sensitive info type. You specify the locations where the policy will be applied.
You need to deploy the policy.
What should you do first?
A. Run the policy in simulation mode.
B. Configure Azure Information Protection analytics.
C. Review the sensitive information in Activity explorer.
D. Turn on the policy.
Selected Answer: C
Question #: 220
Topic #: 1
You have a Microsoft 365 E5 subscription. The subscription contains users that have the following types of devices:
• Windows 10
• Android
• iOS
On which devices can you configure the Endpoint DLP policies?
A. Windows 10 only
B. Windows 10 and Android only
C. Windows 10 and iOS only
D. Windows 10, Android, and iOS
Selected Answer: A
Question #: 222
Topic #: 1
You are testing a data loss prevention (DLP) policy to protect the sharing of credit card information with external users.
During testing, you discover that a user can share credit card information with external users by using email. However, the user is prevented from sharing files that contain credit card information by using Microsoft SharePoint.
You need to prevent the user from sharing the credit card information by using email and SharePoint.
What should you configure?
A. the locations of the DLP policy
B. the conditions of the DLP policy rule
C. the user overrides of the DLP policy rule
D. the status of the DLP policy
Selected Answer: A
Question #: 224
Topic #: 1
You have a Microsoft 365 subscription that uses retention policies.
You implement a preservation lock on a retention policy that is assigned to all executive users.
Which two actions can you perform on the retention policy after you implemented the preservation lock? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. Add locations to the policy.
B. Reduce the duration of policy.
C. Remove locations from the policy.
D. Extend the duration of the policy.
E. Disable the policy.
Selected Answer: AD
Question #: 225
Topic #: 1
You have a Microsoft 365 subscription that contains an Azure AD tenant named contoso.com. The tenant contains the users shown in the following table.
You create and assign a data loss prevention (DLP) policy named Policy1. Policy1 is configured to prevent documents that contain Personally Identifiable Information (PII) from being emailed to users outside your organization.
To which users can User1 send documents that contain PII?
A. User2 only
B. User2 and User3 only
C. User2, User3, and User4 only
D. User2, User3, User4, and User5
Selected Answer: A
Question #: 226
Topic #: 1
You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365 and contains a mailbox named Mailbox1.
You plan to use Mailbox1 to collect and analyze unfiltered email messages.
You need to ensure that Defender for Office 365 takes no action on any inbound emails delivered to Mailbox1.
What should you do?
A. Configure a retention policy for Mailbox1.
B. Create a mail flow rule.
C. Configure Mailbox1 as a SecOps mailbox.
D. Place a litigation hold on Mailbox1.
Selected Answer: C
Question #: 228
Topic #: 1
You have a Microsoft 365 subscription.
You have a data loss prevention (DLP) policy that blocks sensitive data from being shared in email messages.
You need to modify the policy so that when an email message containing sensitive data is sent to both external and internal recipients, the message is only prevented from being delivered to the external recipients.
What should you modify?
A. the policy rule exceptions
B. the DLP policy locations
C. the policy rule conditions
D. the policy rule actions
Selected Answer: D
Question #: 229
Topic #: 1
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Office 365 and contains a user named User1.
User emails a product catalog in the PDF format to 300 vendors. Only 200 vendors receive the email message, and User1 is blocked from sending email until the next day.
You need to prevent this issue from reoccurring.
What should you configure?
A. anti-spam policies
B. Safe Attachments policies
C. anti-phishing policies
D. anti-malware policies
Selected Answer: A
Question #: 230
Topic #: 1
You have a Microsoft 365 E5 subscription that contains the labels shown in the following table.
You have the items shown in the following table.
Which items can you view in Content explorer?
A. File1 only
B. File1 and File2 only
C. File1 and Mail1 only
D. File2 and Mail2 only
E. File1, File2, Mail1, and Mail2
Selected Answer: E
Question #: 239
Topic #: 1
You have a Microsoft 365 subscription that contains an Azure AD tenant named contoso.com. The tenant includes a user named User1.
You enable Azure AD Identity Protection.
You need to ensure that User1 can review the list in Azure AD Identity Protection of users flagged for risk. The solution must use the principle of least privilege.
To which role should you add User1?
A. Compliance Administrator
B. Security Administrator
C. Service Administrator
D. User Administrator
Selected Answer: B
Question #: 240
Topic #: 1
You have a Microsoft 365 subscription that contains an Azure AD tenant named contoso.com. The tenant includes a user named User1.
You enable Azure AD Identity Protection.
You need to ensure that User1 can review the list in Azure AD Identity Protection of users flagged for risk. The solution must use the principle of least privilege.
To which role should you add User1?
A. Compliance Administrator
B. Security Reader
C. Reports Reader
D. User Administrator
Selected Answer: B
Question #: 241
Topic #: 1
Note: This section contains one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem. You must determine whether the solution meets the stated goals. More than one solution in the set might solve the problem. It is also possible that none of the solutions in the set solve the problem.
After you answer a question in this section, you will NOT be able to return. As a result, these questions do not appear on the Review Screen.
You have a Microsoft 365 E5 subscription.
You integrate Microsoft Defender for Endpoint with Microsoft Intune.
You need to ensure that devices automatically onboard to Defender for Endpoint when they are enrolled in Intune.
Solution: You create a compliance policy.
Does this meet the goal?
A. Yes
B. No
Selected Answer: B
Question #: 248
Topic #: 1
Your network contains an on-premises Active Directory domain.
You have a Microsoft 365 subscription.
You implement a directory synchronization solution that uses pass-through authentication.
You configure Azure AD smart lockout as shown in the following exhibit.
You discover that Active Directory users can use the passwords in the custom banned passwords list.
You need to ensure that banned passwords are banned for all users.
Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A. From a domain controller, install the Azure AD Password Protection Proxy.
B. From Active Directory, modify the Default Domain Policy.
C. From a domain controller, install the Azure AD Application Proxy connector.
D. From all the domain controllers, install the Azure AD Password Protection DC Agent.
E. From Password protection for Windows Server Active Directory, modify the Mode setting.
F. From Custom banned passwords, modify the Enforce custom list setting.
Selected Answer: ADE
Question #: 249
Topic #: 1
Your network contains an Active Directory domain and an Azure AD tenant.
The network uses a firewall that contains a list of allowed outbound domains.
You begin to implement directory synchronization.
You discover that the firewall configuration contains only the following domain names in the list of allowed domains:
• *.microsoft.com
• *.office.com
Directory synchronization fails.
You need to ensure that directory synchronization completes successfully.
What is the best approach to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer.
A. From the firewall, modify the list of allowed outbound domains.
B. From Azure AD Connect, modify the Customize synchronization options task.
C. From the firewall, create a list of allowed inbound domains.
D. Deploy an Azure AD Connect sync server in staging mode.
E. From the firewall, allow the IP address range of the Azure data center for outbound communication.
Selected Answer: A
Question #: 250
Topic #: 1
You have a Microsoft 365 E5 subscription that contains users in the United States, Europe, and Asia.
You use Azure AD Identity Protection.
You have a virtual desktop infrastructure (VDI). All VDI servers are located in the United States.
Users connect to Microsoft 365 from laptops and the VDI.
Some VDI users report that they are blocked from signing in to Microsoft 365 due to a high sign-in risk.
You need to reduce the likelihood that the VDI users will be erroneously blocked from signing in to Microsoft 365. The solution must ensure that sign-ins from the VDI environment are protected by using Identity Protection.
What should you configure?
A. ExpressRoute for Microsoft 365
B. a trusted location
C. a Satellite Geography location
D. a Conditional Access policy
Selected Answer: B
Question #: 252
Topic #: 1
You have a Microsoft 365 subscription that contains more than 2,000 guest users.
You need to ensure that when guest users are added to Microsoft 365 groups in the subscription, their membership is validated by the group owner every 30 days.
What should you configure?
A. group expiration policies
B. retention policies
C. access reviews
D. Conditional Access policies
Selected Answer: C
Question #: 255
Topic #: 1
Your network contains an on-premises Active Directory domain. The domain contains 2,000 computers that run Windows 10.
You purchase a Microsoft 365 subscription.
You implement password hash synchronization and Azure AD Seamless Single Sign-On (Seamless SSO).
You need to ensure that users can use Seamless SSO from the Windows 10 computers.
What should you do?
A. Join the computers to Azure AD.
B. Create a conditional access policy in Azure AD.
C. Modify the Intranet zone settings by using Group Policy.
D. Deploy an Azure AD Connect staging server.
Selected Answer: C
Question #: 256
Topic #: 1
Your network contains an Active Directory domain named adatum.com that is synced to Azure AD.
The domain contains 100 user accounts.
The city attribute for all the users is set to the city where the user resides.
You need to modify the value of the city attribute to the three-letter airport code of each city.
What should you do?
A. From Azure Cloud Shell, run the Get-MsolUser and Set-MsolUser cmdlets.
B. From Windows PowerShell on a domain controller, run the Get-MgUser and Update-MgUser cmdlets.
C. From Active Directory Administrative Center, select the Active Directory users, and then modify the Properties settings.
D. From Azure Cloud Shell, run the Get-MgUser and Update-MgUser cmdlets.
Selected Answer: C
Question #: 257
Topic #: 1
Your network contains an Active Directory domain named adatum.com that is synced to Azure AD.
The domain contains 100 user accounts.
The city attribute for all the users is set to the city where the user resides.
You need to modify the value of the city attribute to the three-letter airport code of each city.
What should you do?
A. From Windows PowerShell on a domain controller, run the Get-ADUser and Set-ADUser cmdlets.
B. From Azure Cloud Shell, run the Get-ADUser and Set-ADUser cmdlets.
C. From Windows PowerShell on a domain controller, run the Get-MgUser and Update-MgUser cmdlets.
D. From the Azure portal, select all the Azure AD users, and then use the User settings blade.
Selected Answer: A
Question #: 260
Topic #: 1
You have a Microsoft 365 E5 tenant.
The Microsoft Secure Score for the tenant is shown in the following exhibit.
You plan to enable Security defaults for Azure AD.
Which three improvement actions will this affect?
NOTE: Each correct selection is worth one point.
A. Require MFA for administrative roles
B. Ensure all users can complete multi-factor authentication for secure access
C. Enable policy to block legacy authentication
D. Enable self-service password reset
E. Use limited administrative roles
Selected Answer: ABC
Question #: 261
Topic #: 1
You have a Microsoft 365 E5 subscription that has Microsoft Defender for Endpoint integrated with Microsoft Intune.
Devices are enrolled to Microsoft Intune and onboarded by using Microsoft Defender for Endpoint.
You plan to block devices based on the results of the machine risk score calculated by Microsoft Defender for Endpoint.
What should you create first?
A. a device configuration policy
B. an endpoint detection and response policy
C. a device compliance policy
Selected Answer: C
Question #: 262
Topic #: 1
You have a Microsoft 365 subscription.
You create a retention label named Retention1 as shown in the following exhibit.
You apply Retention1 to all the Microsoft OneDrive content.
On January 1, 2020, a user stores a file named File1 in OneDrive.
On January 10, 2020, the user modifies File1.
On February 1, 2020, the user deletes File1.
When will File1 be removed permanently and unrecoverable from OneDrive?
A. February 1, 2020
B. July 1, 2020
C. July 10, 2020
D. August 1, 2020
Selected Answer: B
Question #: 263
Topic #: 1
You have a Microsoft 365 subscription that contains an Azure AD tenant named contoso.com. The tenant includes a user named User1.
You enable Azure AD Identity Protection.
You need to ensure that User1 can review the list in Azure AD Identity Protection of users flagged for risk. The solution must use the principle of least privilege.
To which role should you add User1?
A. Global Administrator
B. Service Administrator
C. Security Administrator
D. Reports Reader
Selected Answer: C
Question #: 265
Topic #: 1
You have a Microsoft 365 subscription.
You need to implement a passwordless authentication solution that supports the following device types:
• Windows
• Android
• iOS
The solution must use the same authentication method for all devices.
Which authentication method should you use?
A. the Microsoft Authentication app
B. FIDO2-compliant security keys
C. multi-factor authentication (MFA)
D. Windows Hello for Business
Selected Answer: A
Question #: 268
Topic #: 1
Your company has a Microsoft Entra tenant named contoso.com and a Microsoft 365 subscription.
All users use Windows 10 devices to access Microsoft Office 365 apps.
All the devices are in a workgroup.
You plan to implement password less sign-in to contoso.com.
You need to recommend changes to the infrastructure for the planned implementation.
What should you include in the recommendation?
A. Join all the devices to contoso.com.
B. Deploy Microsoft Entra Application Proxy.
C. Deploy X.509.3 certificates to all the users.
D. Deploy the Microsoft Authenticator app.
Selected Answer: A
Question #: 274
Topic #: 1
You have two Microsoft 365 tenants. Users have accounts in both tenants.
You plan to deploy a single device to each user. Each device will contain the Microsoft Authenticator app.
You need to ensure that the users can use their device to authenticate to both tenants by using passwordless authentication.
Which platform should you provide?
A. iOS
B. Android
C. Windows
D. macOS
Selected Answer: A
Question #: 275
Topic #: 1
Your network contains an Active Directory domain named adatum.com that is synced to a Microsoft Entra tenant.
The domain contains 100 user accounts.
The city attribute for all the users is set to the city where the user resides.
You need to modify the value of the city attribute to the three-letter airport code of each city.
What should you do?
A. From Windows PowerShell on a domain controller, run the Get-ADUser and Set-ADUser cmdlets.
B. From Azure Cloud Shell, run the Get-MgUser and Update-MgUser cmdlets.
C. From the Microsoft Entra admin center, select all the Microsoft Entra users, and then use the User settings blade.
D. From the Microsoft 365 admin center, select the users, and then use the Bulk actions option.
Selected Answer: A
Question #: 282
Topic #: 1
You have a Microsoft 365 E5 subscription.
From the Microsoft 365 Defender portal, you review your company’s Microsoft Secure Score.
You discover a large number of recommended actions.
You need to ensure that the actions can be filtered based on specific department names.
What should you create first?
A. a dynamic security group
B. a tag
C. an administrative unit
D. a custom detection rule
Selected Answer: B
Question #: 283
Topic #: 1
You have a Microsoft 365 E5 subscription that contains the devices shown in the following table.
You plan to create an Endpoint security policy by using the Defender Update controls template.
To which devices can you apply the policy?
A. Device1 only
B. Device1 and Device2 only
C. Device1 and Device3 only
D. Device1, Device2, and Device3
Selected Answer: A
Question #: 284
Topic #: 1
You have a Microsoft 365 tenant.
You plan to manage incidents in the tenant by using the Microsoft Defender XDR.
Which Microsoft service source will appear on the Incidents page of the Microsoft 365 Defender portal?
A. Microsoft Sentinel
B. Microsoft Defender for Cloud
C. Azure Web Application Firewall
D. Microsoft Defender for Identity
Selected Answer: D
Question #: 285
Topic #: 1
You have a Microsoft 365 E5 subscription.
You are creating a data loss prevention (DLP) policy applied to the locations as shown in the following exhibit.
Which condition can you use in the DLP rules of the policy?
A. sensitive info types
B. sensitivity labels
C. keywords
D. content search queries
Selected Answer: A
Question #: 286
Topic #: 1
You have a Microsoft 365 subscription.
You need to implement a passwordless authentication solution that supports the following device types:
• Windows
• Android
• iOS
The solution must use the same authentication method for all devices.
Which authentication method should you use?
A. the Microsoft Authentication app
B. Voice call
C. multi-factor authentication (MFA)
D. Windows Hello for Business
Selected Answer: A
Question #: 288
Topic #: 1
You need to notify the manager of the human resources department when a user in the department shares a file or folder from the department’s Microsoft SharePoint site.
What should you do?
A. From the SharePoint site, create an alert.
B. From the Microsoft Defender portal, create an alert policy.
C. From the SharePoint admin center, modify the sharing settings
D. From the Microsoft 365 admin center, configure SharePoint.org settings.
Selected Answer: B
Question #: 289
Topic #: 1
You have a Microsoft 365 E5 tenant.
You create an auto-labeling policy to encrypt emails that contain a sensitive info type. You specify the locations where the policy will be applied.
You need to deploy the policy.
What should you do first?
A. Run the policy in simulation mode.
B. Turn on co-authoring for files with sensitivity labels.
C. Review the sensitive information in Activity explorer.
D. Turn on the policy.
Selected Answer: A
Question #: 290
Topic #: 1
You have a Microsoft 365 E5 subscription.
You create a data loss prevention (DLP) policy named DLP1.
You need to ensure that endpoint rule actions are available in the advanced DLP rules for DLP1.
To which location should you apply DLP1?
A. Instances
B. OneDrive accounts
C. On-premises repositories
D. Devices
Selected Answer: D
Question #: 291
Topic #: 1
You have a Microsoft 365 subscription that uses Microsoft Defender for Endpoint.
All the devices in your organization are onboarded to Microsoft Defender for Endpoint.
You need to ensure that an alert is generated if malicious activity was detected on a device during the last 24 hours.
What should you do?
A. From the Microsoft Defender portal, create an alert suppression rule and assign an alert.
B. From the Microsoft Purview compliance portal, create an audit log search.
C. From the Microsoft Purview compliance portal, create a data loss prevention (DLP) policy.
D. From the Microsoft Defender portal, create an Advanced hunting query and a detection rule.
Selected Answer: D
Question #: 292
Topic #: 1
You have a Microsoft 365 E5 subscription that contains a domain named contoso.com.
You deploy a new Microsoft Defender for Office 365 anti-phishing policy named Policy1 that has user impersonation protection enabled for a user named user1@contoso.com.
You discover that Policy1 blocks email messages from a regular contact named user1@fabnkam.com.
You need to ensure that the messages are delivered successfully.
What should you do for Policy1?
A. Select Enable domains to protect.
B. Configure the Phishing email threshold setting.
C. Configure which users to protect.
D. Select Enable mailbox intelligence.
Selected Answer: D
Question #: 294
Topic #: 1
Your company has a Microsoft Entra tenant named contoso.com and a Microsoft 365 subscription.
All users use Windows 10 devices to access Microsoft Office 365 apps.
All the devices are in a workgroup.
You plan to implement password less sign-in to contoso.com.
You need to recommend changes to the infrastructure for the planned implementation.
What should you include in the recommendation?
A. Join all the devices to contoso.com.
B. Deploy Microsoft Entra Application Proxy.
C. Deploy the Microsoft Entra Connect provisioning agent.
D. Deploy the Microsoft Authenticator app.
Selected Answer: A
Question #: 295
Topic #: 1
You have a Microsoft 365 E5 subscription.
You plan to implement an authentication policy that will user FIDO2 security key as a user authentication method.
You need to ensure that during enrollment, each FIDO2 security key is verified by using the FIDO Alliance Metadata Service.
Which setting should you enable?
A. Allow self-service setup
B. Restrict specific keys
C. Enforce attestation
D. Enforce key restrictions
Selected Answer: C
Question #: 297
Topic #: 1
You have a Microsoft 365 E5 subscription.
You create the users shown in the following table.
You plan to use Microsoft Entra ID Protection.
Which users will be added automatically to the User at risk detected alerts list?
A. Admin1 only
B. Admin2 only
C. Admin1 and Admin2 only
D. Admin1 and Admin3 only
E. Admin1, Admin2, and Admin3
Selected Answer: D
Question #: 299
Topic #: 1
You have a Microsoft 365 E5 subscription.
You create a user named Admin1.
You need to ensure that Admin1 can view Endpoint security policies from the Microsoft Defender portal. The solution must follow the principle of least privilege.
Which Microsoft Entra role should you assign to Admin1?
A. Cloud Device Administrator
B. Security Reader
C. Global Reader
D. Security Administrator
E. Security Operator
Selected Answer: B
Question #: 300
Topic #: 1
You have a Microsoft 365 E5 subscription.
You plan to configure multi-factor authentication (MFA).
You need to select an authentication method for users. The solution must ensure that each time a user is prompted for MFA, the application name that requires MFA is provided.
What should you select?
A. SMS
B. Microsoft Authenticator
C. a voice call
D. email OTP
E. a FIDO2 security key
Selected Answer: B
Question #: 301
Topic #: 1
You have a Microsoft 365 E5 subscription.
You plan to use Microsoft Entra ID Protection.
You need to ensure that account passwords must be changed if account credentials are leaked.
What should you configure?
A. a user risk policy
B. Password protection
C. a sign-in risk policy
D. self-service password reset (SSPR)
Selected Answer: A
Question #: 304
Topic #: 1
You have a Microsoft 365 E5 subscription.
You plan to ingest syslog data from a supported firewall device to Microsoft Defender for Cloud Apps.
You need to configure automatic log upload.
Which two components should you configure for the log collector? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. the receiver type
B. the data source
C. the username and password
D. a connection string
E. the host IP address or FQDN
Selected Answer: BE
Question #: 305
Topic #: 1
You have a Microsoft 365 subscription that uses Microsoft Defender XDR.
From Automatic remediation in the Microsoft Defender portal, you set Automation level to Semi – require approval for non-temp folders for the endpoints.
You need to identify the impact of the Automation level setting on the endpoints.
Which two actions will occur based on the remediation settings? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. Devices will be remediated only after end-user approval.
B. Devices will be remediated automatically if a threat is detected in the \program files (X86)\* folder
C. Devices will be remediated automatically if a threat is detected in the \windows\ folder.
D. Devices will be remediated automatically if a threat is detected in the \users\*\downloads\* folder.
Selected Answer: CD
Question #: 306
Topic #: 1
You have a Microsoft 365 E5 subscription that contains devices onboarded to Microsoft Defender for Endpoint.
You integrate Microsoft Defender for Cloud Apps with Defender for Endpoint.
You need identify which cloud apps and services were used most during the last 30 days.
What should you do?
A. Generate a monthly security summary report.
B. Generate a Cloud Discovery snapshot report.
C. Create a threat analytics alert notification.
D. Generate a Cloud Discovery executive report.
Selected Answer: B
Question #: 307
Topic #: 1
You have a Microsoft 365 E5 subscription that contains a user named User1.
You create an outbound anti-spam policy named Policy1 as shown in the following exhibit.
You assign Policy1 to User1.
What is the maximum number of email messages that User1 can send in a 24-hour period?
A. 30
B. 720
C. 1000
D. 1030
Selected Answer: B
Question #: 309
Topic #: 1
You have a Microsoft 365 E5 subscription. The subscription contains a Microsoft SharePoint Online site named Site1.
Site1 contains the following files:
• File.docx
• ImportantFile.docx
• File_Important.docx
From Microsoft Defender Cloud Apps, you create a file policy named Policy that has the filter shown in the following exhibit.
To which files will Policy1 apply?
A. ImportantFile.docx and File_Important.docx only
B. File.docx only
C. File_Important.docx only
D. ImportantFile.docx only
E. File.docx, ImportantFile.docx, and File_Important.docx
Selected Answer: C
Question #: 310
Topic #: 1
You have a Microsoft 365 E5 subscription. The subscription contains users that have the following types of devices:
• Windows 10
• Android
• iOS
To which devices can you apply Endpoint DLP policies?
A. Windows 10 only
B. Windows 10 and Android only
C. Windows 10 and iOS only
D. Windows 10, Android, and iOS
Selected Answer: C