00:00

QUESTION 86

- (Exam Topic 5)
You have several Microsoft SharePoint document libraries in your on-premises environment. You have a Microsoft 365 tenant that has directory synchronization implemented.
You plan to move all the document libraries to SharePoint Online.
You need to recommend a migration strategy for the document libraries.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
MS-100 dumps exhibit
Solution:
The SharePoint Migration Tool lets you migrate content to SharePoint Online and OneDrive from the following locations:
MS-100 dumps exhibit SharePoint Server 2013
MS-100 dumps exhibit SharePoint Server 2010
MS-100 dumps exhibit Network and local file shares
The first step is to create new SharePoint sites in SharePoint online. These sites will host the document libraries which will host the migrated content.
The second step is to create the document libraries in the SharePoint sites to host the migrated content. The final step is to use the SharePoint Migration Tool to migrate the content.
Reference:
https://docs.microsoft.com/en-us/sharepointmigration/how-to-use-the-sharepoint-migration-tool

Does this meet the goal?

Correct Answer: A

QUESTION 87

- (Exam Topic 5)
You have a Microsoft Azure Active Directory (Azure AD) tenant. Your company implements Windows Information Protection (WIP). You need to modify which users and applications are affected by WIP.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
MS-100 dumps exhibit
Solution:
Microsoft Intune has an easy way to create and deploy a Windows Information Protection (WIP) policy. You can choose which apps to protect, the level of protection, and how to find enterprise data on the network. The devices can be fully managed by Mobile Device Management (MDM), or managed by Mobile Application Management (MAM), where Intune manages only the apps on a user's personal device.
The MAM User scope determines which users are affected by WIP. App protection policies are used to configure which applications are affected by WIP.
Reference:
https://docs.microsoft.com/en-us/windows/security/information-protection/windows-information-protection/crea

Does this meet the goal?

Correct Answer: A

QUESTION 88

- (Exam Topic 5)
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your network contains an Active Directory forest. You deploy Microsoft 365.
You plan to implement directory synchronization.
You need to recommend a security solution for the synchronized identities. The solution must meet the following requirements:
MS-100 dumps exhibit Users must be able to authenticate successfully to Microsoft 365 services if Active Directory becomes unavailable.
MS-100 dumps exhibit Users passwords must be 10 characters or more.
Solution: Implement password hash synchronization and configure password protection in the Azure AD tenant.
Does this meet the goal?

Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-password-hash-synchronization

QUESTION 89

- (Exam Topic 3)
You are evaluating the use of multi-factor authentication (MFA).
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
MS-100 dumps exhibit
Solution:
Text Description automatically generated
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-configure- https://blog.admindroid.com/configuring-and-managing-mfa-in-office-365/

Does this meet the goal?

Correct Answer: A

QUESTION 90

- (Exam Topic 5)
You have a Microsoft 365 subscription.
You recently configured a Microsoft SharePoint Online tenant in the subscription. You plan to create an alert policy.
You need to ensure that an alert is generated only when malware is detected in more than five documents stored in SharePoint Online during a period of 10 minutes.
What should you do first?

Correct Answer: B
An alert policy consists of a set of rules and conditions that define the user or admin activity that generates an alert, a list of users who trigger the alert if they perform the activity, and a threshold that defines how many times the activity has to occur before an alert is triggered.
In this question, we would use the “Malware detected in file” activity in the alert settings then configure the threshold (5 detections) and the time window (10 minutes).
The ability to configure alert policies based on a threshold or based on unusual activity requires Advanced Threat Protection (ATP).
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/alert-policies