- (Exam Topic 4)
You have a Microsoft 365 subscription.
You plan to connect to Microsoft Exchange Online PowerShell and run the following cmdlets:
Search-MailboxAuditLog
Test-ClientAccessRule
Set-GroupMailbox
Get-Mailbox
Which cmdlet will generate an entry in the Microsoft Office 365 audit log?
Correct Answer:
C
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance?vi
- (Exam Topic 4)
You have a Microsoft Azure Active Directory (Azure AD) tenant named Contoso.com. You create a Microsoft Defender for identity instance Contoso.
The tenant contains the users shown in the following table.
You need to modify the configuration of the Defender for identify sensors.
Solutions: You instruct User4 to modify the Defender for identity sensor configuration. Does this meet the goal?
Correct Answer:
A
- (Exam Topic 4)
The users at your company use Dropbox to store documents. The users access Dropbox by using the MyApps portal.
You need to ensure that user access to Dropbox is authenticated by using a Microsoft 365 identify. The documents must be protected if the data is downloaded to an untrusted device.
What should you do?
Correct Answer:
B
- (Exam Topic 4)
You have a Microsoft 365 E5 tenant that contains 500 Windows 10 devices and a Windows 10 compliance policy.
You deploy a third-party antivirus solution to the devices. You need to ensure that the devices are marked as compliant.
Which three settings should you modify in the compliance policy? To answer, select the appropriate settings in the answer area.
NOTE: Each correct selection is worth one point.
Solution:
Graphical user interface Description automatically generated
Reference:
https://docs.microsoft.com/en-us/mem/intune/protect/compliance-policy-create-windows
Does this meet the goal?
Correct Answer:
A
- (Exam Topic 4)
You create a Microsoft 36S subscription.
You need to create a deployment plan for Microsoft Azure Advanced Threat Protection (ATP).
Which five actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Solution:
References:
https://blog.ahasayen.com/azure-advanced-threat-protection-deployment/
Does this meet the goal?
Correct Answer:
A