Free MS-101 Exam Braindumps (page: 31)

Page 31 of 104

HOTSPOT (Drag and Drop is not supported).
You have a Microsoft 365 subscription.
You are planning a threat management solution for your organization.
You need to minimize the likelihood that users will be affected by the following threats:
Opening les in Microsoft SharePoint that contain malicious content
Impersonation and spoo ng attacks in email messages
Which policies should you create in the Microsoft 365 Defender? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Box 1: ATP Safe Attachments -
ATP Safe Attachments provides zero-day protection to safeguard your messaging system, by checking email attachments for malicious content. It routes all messages and attachments that do not have a virus/malware signature to a special environment, and then uses machine learning and analysis techniques to detect malicious intent. If no suspicious activity is found, the message is forwarded to the mailbox.

Box 2: ATP anti-phishing -
ATP anti-phishing protection detects attempts to impersonate your users and custom domains. It applies machine learning models and advanced impersonation- detection algorithms to avert phishing attacks.
ATP Safe Links provides time-of-click veri cation of URLs, for example, in emails messages and O ce les. Protection is ongoing and applies across your messaging and O ce environment. Links are scanned for each click: safe links remain accessible and malicious links are dynamically blocked.


Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/o ce-365-security/o ce-365-atp#con gure-atp-policies



You have a Microsoft 365 subscription.
All users have their email stored in Microsoft Exchange Online.
In the mailbox of a user named User1, you need to preserve a copy of all the email messages that contain the word ProjectX.
What should you do rst?

  1. From Microsoft Defender for Cloud Apps, create an access policy.
  2. From the Security & Compliance admin center, create an eDiscovery case.
  3. From Microsoft Defender for Cloud Apps, create an activity policy.
  4. From the Security & Compliance admin center, create a data loss prevention (DLP) policy.

Answer(s): B

Explanation:

A DLP policy contains a few basic things:
Where to protect the content: locations such as Exchange Online, SharePoint Online, and OneDrive for Business sites, as well as Microsoft Teams chat and channel messages.
When and how to protect the content by enforcing rules comprised of:
Conditions the content must match before the rule is enforced. For example, a rule might be con gured to look only for content containing Social Security numbers that's been shared with people outside your organization.
Actions that you want the rule to take automatically when content matching the conditions is found. For example, a rule might be con gured to block access to a document and send both the user and compliance o cer an email noti cation.


Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-policies



You have a Microsoft 365 subscription.
From the subscription, you perform an audit log search, and you download all the results.
You plan to review the audit log data by using Microsoft Excel.
You need to ensure that each audited property appears in a separate Excel column.
What should you do rst?

  1. From Power Query Editor, transform the JSON data.
  2. Format the Operations column by using conditional formatting.
  3. Format the AuditData column by using conditional formatting.
  4. From Power Query Editor, transform the XML data.

Answer(s): A

Explanation:

After you search the O ce 365 audit log and download the search results to a CSV le, the le contains a column named AuditData, which contains additional information about each event. The data in this column is formatted as a JSON object, which contains multiple properties that are con gured as property:value pairs separated by commas. You can use the JSON transform feature in the Power Query Editor in Excel to split each property in the JSON object in the
AuditData column into multiple columns so that each property has its own column. This lets you sort and lter on one or more of these properties


Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/export-view-audit-log-records



You have a Microsoft 365 subscription.
You need to be noti ed if users receive email containing a le that has a virus.
What should you do?

  1. From the Exchange admin center, create a spam lter policy.
  2. From the Security & Compliance admin center, create a data governance event.
  3. From the Security & Compliance admin center, create an alert policy.
  4. From the Exchange admin center, create a mail ow rule.

Answer(s): C

Explanation:

You can create alert policies to track malware activity and data loss incidents. We've also included several default alert policies that help you monitor activities such as assigning admin privileges in Exchange Online, malware attacks, phishing campaigns, and unusual levels of le deletions and external sharing.
The Email messages containing malware removed after delivery default alert generates an alert when any messages containing malware are delivered to mailboxes in your organization.
Incorrect answers:
A: A spam lter policy includes selecting the action to take on messages that are identi ed as spam. Spam lter policy settings are applied to inbound messages.
B: A data governance event commences when an administrator creates it, following which background processes look for content relating to the event and take the retention action de ned in the label. The retention action can be to keep or remove items, or to mark them for manual disposition.
D: You can inspect email attachments in your Exchange Online organization by setting up mail ow rules. Exchange Online offers mail ow rules that provide the ability to examine email attachments as a part of your messaging security and compliance needs. However, mail ow rules are not used to detect malware in emails.


Reference:

https://docs.microsoft.com/en-us/o ce365/securitycompliance/alert-policies



Page 31 of 104



Post your Comments and Discuss Microsoft MS-101 exam with other Community members:

Phil commented on December 08, 2022
i have a lot of experience but what comes in the exam is totally different from the practical day to day tasks. so i thought i would rather rely on these brain dumps rather failing the exam.
GERMANY
upvote

Marco commented on June 12, 2023
I paid and downloaded my files. So far everything looks promising.
SPAIN
upvote

Fang commented on June 04, 2023
Same exam dumps as other sites. But the 50% off make is much cheaper. I bought 2 exams to get the 50% discount. I passed one exam now preparing for my second test.
SINGAPORE
upvote

Justina commented on May 30, 2023
If you are serious about acing your exams, I urge you to give these exam dumps a try. They surpassed all my expectations, providing me with everything I needed to prepare and pass my exam. And the 50% sale is a cool deal!
UNITED STATES
upvote

Phil commented on December 08, 2022
I have a lot of experience but what comes in the exam is totally different from the practical day to day tasks. So I thought I would rather rely on these brain dumps rather failing the exam.
GERMANY
upvote