Home / Microsoft / MS-102
Latest MS-102 Exam Practice Questions
The practice questions for MS-102 exam was last updated on 2025-04-26 .
Viewing page 1 out of 29 pages.
Viewing questions 1 out of 145 questions.
You have a Microsoft 365 E5 subscription. You create a Conditional Access policy that blocks access to an app named App1 when users trigger a high-risk sign-in event. You need to reduce false positives for impossible travel when the users sign in from the corporate network. What should you configure?
HOTSPOT You have a Microsoft 365 tenant that contains 100 Windows 10 devices. The devices are managed by using Microsoft Endpoint Manager. You plan to create two attack surface reduction (ASR) policies named ASR1 and ASR2. ASR1 will be used to configure Microsoft Defender Application Guard. ASR2 will be used to configure Microsoft Defender SmartScreen. Which ASR profile type should you use for each policy? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
HOTSPOT You have a Microsoft 365 E5 subscription. You need to implement identity protection. The solution must meet the following requirements: Identify when a user's credentials are compromised and shared on the dark web. Provide users that have compromised credentials with the ability to self-remediate. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Explanation: Box 1: A user risk policy Identify when a user's credentials are compromised and shared on the dark web. User risk-based Conditional Access policy Identity Protection analyzes signals about user accounts and calculates a risk score based on the probability that the user has been compromised. If a user has risky sign-in behavior, or their credentials have been leaked, Identity Protection will use these signals to calculate the user risk level. Administrators can configure user risk-based Conditional Access policies to enforce access controls based on user risk, including requirements such as: Block access Allow access but require a secure password change. A secure password change will remediate the user risk and close the risky user event to prevent unnecessary noise for administrators. Box 2: Require password change Provide users that have compromised credentials with the ability to self-remediate. A secure password change will remediate the user risk and close the risky user event to prevent unnecessary noise for administrators Reference: https://learn.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-policies#user-risk-based-conditional-access-policy
Your network contains an on-premises Active Directory domain named contoso.com. The domain contains 1,000 Windows 10 devices. You perform a proof of concept (PoC) deployment of Microsoft Defender for Endpoint for 10 test devices. During the onboarding process, you configure Microsoft Defender for Endpoint-related data to be stored in the United States. You plan to onboard all the devices to Microsoft Defender for Endpoint. You need to store the Microsoft Defender for Endpoint data in Europe. What should you do first?
You implement Microsoft Azure Advanced Threat Protection (Azure ATP). You have an Azure ATP sensor configured as shown in the following exhibit. How long after the Azure ATP cloud service is updated will the sensor update?
Exam Code: MS-102Q & A: 463 Q&AsUpdated: 2025-04-26