🔥 40% Off Crucial Exams Memberships — This Week Only

3 days, 14 hours remaining!
00:20:00

Microsoft 365 Administrator Expert Practice Test (MS-102)

Use the form below to configure your Microsoft 365 Administrator Expert Practice Test (MS-102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for Microsoft 365 Administrator Expert MS-102
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

Microsoft 365 Administrator Expert MS-102 Information

The Microsoft 365 Administrator Expert certification proves that you can manage Microsoft 365 for a business or school. It shows you understand how to set up accounts, manage identities, handle security, and keep data safe across Microsoft 365 services like Teams, Exchange, and SharePoint. You’ll also learn about managing compliance and using tools to protect sensitive information.

This exam is for IT professionals who already have experience with Microsoft 365 workloads and want to take on larger, organization-wide responsibilities. It covers everything from managing users and groups to configuring policies and monitoring system health. You’ll need to understand both the big picture and the details that keep a Microsoft 365 environment running smoothly every day.

To earn this certification, you’ll take the MS-102 exam, which replaces the older MS-100 and MS-101 tests. The exam focuses on tenant management, identity, security, and compliance. Passing it shows that you can manage Microsoft 365 across multiple services while ensuring a secure and efficient setup for users.

Practice tests and exam preparation

Taking practice tests, practice exams, and using practice questions can make a big difference when preparing for the Microsoft 365 Administrator Expert exam. Practice exams help you learn the format, timing, and difficulty level of real test questions. They also help identify areas where you need more study, such as compliance tools or identity management. At Crucial Exams, you can use Microsoft 365 Administrator Expert practice tests and practice questions to build confidence and improve your score before test day.

Microsoft 365 Administrator Expert MS-102 Logo
  • Free Microsoft 365 Administrator Expert MS-102 Practice Test

  • 20 Questions
  • Unlimited time
  • Deploy and manage a Microsoft 365 tenant
    Implement and manage Microsoft Entra identity and access
    Manage security and threats by using Microsoft Defender XDR
    Manage compliance by using Microsoft Purview
Question 1 of 20

While configuring a custom alert policy in the Microsoft 365 Defender portal, you need the policy to generate an alert only after a user receives five or more phishing messages within a 30-minute window. However, the fields to define the number of activities and the time interval are not available in the wizard. Which change enables you to expose and configure these threshold settings?

  • Change the alert category to Malware.

  • Switch the alert trigger to "When activities match rule conditions" instead of "Every time an activity matches."

  • Add the mailbox as a scoped entity instead of applying the policy to all users.

  • Set the policy severity to High.

Question 2 of 20

Your company has Microsoft 365 E5 licenses and Conditional Access policies that mark devices as compliant. You are creating a sensitivity label named Confidential Project and will publish the label to users. When the label is applied to a new SharePoint Online site, users who connect from unmanaged devices must be blocked from accessing the site. Which label setting should you configure?

  • Default sharing link type

  • External sharing for labeled SharePoint sites

  • Access from unmanaged devices

  • Privacy (Public or Private)

Question 3 of 20

Your organization runs two Azure AD Connect servers that perform password hash synchronization from on-premises Active Directory to Microsoft Entra ID. You install the Microsoft Entra Connect Health agents on both servers and wait 24 hours. In the Microsoft Entra admin center you need to verify whether password-hash synchronization latency is within the service-defined threshold for each server. Which blade should you open after selecting Azure AD Connect Health for Sync in the portal?

  • Alerts

  • Sync Errors

  • Password Sync

  • Directory Sync Status

Question 4 of 20

You manage Contoso's Microsoft 365 tenant. The marketing department will collaborate with 50 employees from partner organization Tailspin Toys. Requirements:

  • The partners must sign in by using their existing organizational accounts.
  • All partners must immediately become members of a Microsoft 365 group that secures a SharePoint site.
  • The entire onboarding process must be completed in one automated operation by using data in a CSV file.

Which approach meets all the requirements?

  • Upload the CSV by using the Bulk invite wizard in the Entra admin center.

  • Run a PowerShell script that reads the CSV, calls New-AzureADMSInvitation for each user, and then adds each invited user to the Microsoft 365 group.

  • Create an Entitlement Management access package and send the package link to the partners.

  • Import the CSV by using Users → Bulk create in the Microsoft 365 admin center.

Question 5 of 20

Your organization uses Microsoft Defender for Cloud Apps (MDCA). Security administrators must be notified whenever a SharePoint Online or OneDrive file that carries the Confidential sensitivity label is shared with any external user. The alert must include a direct link to the offending file and automatically revoke the external sharing link. Which MDCA policy configuration should you implement to meet the requirements?

  • Create an Activity policy that detects the "Sharing invitation created" activity for files labeled Confidential and sends an alert.

  • Create an Access policy that uses Conditional Access App Control to block downloads when the file sensitivity label equals Confidential.

  • Enable an Anomaly detection policy that uses the Mass share by user template for files labeled Confidential.

  • Create a File policy that filters on Classification label = Confidential and Exposure = External, then configure the Remove shared link governance action and send an alert.

Question 6 of 20

You have enabled Microsoft Entra ID Protection for all users in your organization. The security team has provided these requirements:

  • If a user's user risk is High, block access until an administrator resets the password.
  • If a user's user risk is Medium, force the user to change the password during sign-in.

You set the User risk policy threshold to High = Block access and Medium = Require password change. However, Medium-risk users are still blocked because they have not registered any authentication methods.

Which additional configuration will meet the requirements with the least administrative effort?

  • Enable the Microsoft Entra multifactor authentication registration policy for all users.

  • Create a Conditional Access policy that blocks access when Medium user risk is detected.

  • Modify the Sign-in risk policy so that Medium sign-in risk requires self-service password reset.

  • Change the User risk policy so that Medium risk allows access and requires multifactor authentication.

Question 7 of 20

You manage a hybrid Microsoft Entra tenant synchronized with an on-premises Active Directory forest. You deployed Microsoft Entra Password Protection by installing the DC agent on every writable domain controller. Several days later, users can still set weak passwords such as Contoso2023, and Event ID 30009 on the DCs indicates that no password policy is available. Which action will enable the domain controllers to download and enforce the banned-password lists?

  • Turn on password hash synchronization in Microsoft Entra Connect Sync.

  • Enable password writeback in the self-service password reset (SSPR) configuration.

  • Install and register the Microsoft Entra Password Protection proxy service on a domain-joined server.

  • Create a firewall rule that allows outbound LDAP (TCP 389) from the domain controllers to Microsoft Entra ID.

Question 8 of 20

Your company's operations team needs near-real-time notifications in a Microsoft Teams channel whenever Microsoft publishes a new incident or advisory that affects Exchange Online or Microsoft Teams in your tenant. You want to implement the solution from the Microsoft 365 admin center without writing custom code. What should you configure?

  • Deploy an Azure Logic Apps workflow that uses a Microsoft Graph change-notification subscription for service communications.

  • Define a network-connectivity health policy scoped to Exchange Online and Microsoft Teams.

  • Configure Message center preferences to send notifications to the email address of the Teams channel.

  • Create a service health alert rule and connect it to the Power Automate template that posts notifications to Microsoft Teams.

Question 9 of 20

You manage a Microsoft 365 tenant that has all corporate Windows 10 devices onboarded to Microsoft Defender for Endpoint (MDE). You are asked to provide continuous Cloud Discovery data in Microsoft Defender for Cloud Apps (MDCA) without deploying any new infrastructure or manually uploading logs. What is the first configuration change you must perform to meet the requirement?

  • Create a Cloud Discovery snapshot report and upload the Microsoft Defender raw events log from each device.

  • Deploy an MDCA log collector in Azure and configure Windows 10 devices to send their HTTPS proxy logs to it.

  • In the Azure portal, enable the Microsoft Defender for Cloud Apps app connector for Microsoft 365.

  • In the MDCA portal, enable the Microsoft Defender for Endpoint toggle under Cloud Discovery automatic log upload.

Question 10 of 20

Your organization plans to use Microsoft 365 Backup to protect Exchange Online mailboxes, SharePoint Online sites, and OneDrive accounts. You are assigned the Microsoft 365 Backup Administrator role in Microsoft Entra ID and sign in to the Microsoft 365 admin center.

Which action must you perform before you can create your first backup policy in the Microsoft 365 Backup portal?

  • Create a default storage location in Azure Blob Storage.

  • Grant yourself the SharePoint Administrator role in addition to Backup Administrator.

  • Turn on Microsoft 365 Backup for the tenant in the Microsoft 365 admin center.

  • Assign the Exchange Online Protection license to all users that will be protected.

Question 11 of 20

Your organization uses Microsoft 365. The EmployeeType attribute in Microsoft Entra ID is set to FTE for all full-time employees. You need to ensure that every full-time employee automatically receives a Microsoft 365 E5 license and that the license is removed immediately if the user is no longer a full-time employee. Which solution should you implement?

  • Create a static Microsoft 365 group, assign the E5 license to the group, and run a scheduled PowerShell script to keep membership in sync with the EmployeeType attribute.

  • Configure an entitlement management access package that grants the Microsoft 365 E5 license when a user requests access.

  • Use the Microsoft 365 admin center to enable automatic license assignment from the Licenses page and manually add full-time employees each month.

  • Create a dynamic security group in Microsoft Entra ID with a membership rule where EmployeeType equals FTE, and assign the Microsoft 365 E5 license to the group.

Question 12 of 20

You administer Microsoft Defender for Office 365. The built-in Safe Attachments policy is set to its default values (Block mode, lowest priority). You create a second Safe Attachments policy that:

  • Uses Dynamic Delivery mode
  • Is scoped to a mail-enabled security group named "Finance"
  • Has priority 0.
    A user who belongs to the Finance group receives an email that contains a malicious attachment. What will the recipient experience when the message reaches their mailbox?
  • The message does not appear in the mailbox; both the message and its attachment are quarantined because the built-in Block policy is applied.

  • The message body is delivered immediately; the attachment is replaced by a placeholder and is never released to the user because the file is detected as malicious.

  • The entire message is delivered immediately, and the attachment is available because Dynamic Delivery bypasses scanning for the Finance group.

  • The message and attachment are delivered after scanning completes, causing a delay that is visible to the user.

Question 13 of 20

You manage 25 000 Windows 11 computers that are hybrid Azure AD joined and managed through Microsoft Intune. The devices run Windows 11 22H2 Enterprise (OS build 22621.2134) and are currently not onboarded to Microsoft Defender for Endpoint (MDE).

You must ensure that all existing and future Intune-managed Windows 11 devices are automatically onboarded to MDE without requiring users to run scripts or download onboarding packages. The solution must minimise administrative effort and support centralised off-boarding when devices are retired.

Which Intune configuration profile should you deploy?

  • Endpoint security - Endpoint detection and response (EDR) profile that sets Microsoft Defender for Endpoint to Enable

  • Settings catalog profile that deploys the onboarding package through the OMA-URI OnboardingBlob setting

  • Device configuration - Custom profile that runs WindowsOnboardingScript.cmd as a PowerShell script

  • Endpoint security - Antivirus profile that sets Real-time protection to On

Question 14 of 20

You enable the Microsoft 365 Backup (preview) service in your tenant and need to delegate responsibilities to the collaboration team. The team must be able to do the following:

  • Create and run restore jobs for Exchange Online mailboxes, SharePoint Online sites, and OneDrive accounts.
  • View backup and restore job details, including job history and restore points.

The team must not be able to do any of the following:

  • Change tenant-level backup settings.
  • Create or modify backup policies.
  • Delete backup data.

Which least-privileged Microsoft Entra role meets the requirements?

  • Global Reader

  • Microsoft 365 Backup Reader

  • Microsoft 365 Backup Administrator

  • Microsoft 365 Backup Operator

Question 15 of 20

Your organization uses Microsoft Defender XDR and Microsoft Entra ID. You need to grant several security analysts the ability to investigate incidents, run advanced hunting queries, and take response actions such as isolating devices, but you must prevent them from changing any security settings in the Defender portal. Which built-in role or role group should you assign to meet the requirements?

  • Security operator role group in Microsoft Defender XDR

  • Global administrator role in Microsoft Entra ID

  • Security reader role group in Microsoft Defender XDR

  • Security administrator role group in Microsoft Defender XDR

Question 16 of 20

Your organization is rolling out passwordless authentication. You want help-desk staff to issue a credential that allows new hires to complete initial sign-in and register their own FIDO2 security keys. The credential must be usable only once and must expire 10 minutes after it is issued. In the Microsoft Entra admin center, which authentication method policy and settings should you configure to meet the requirements?

  • Create a Temporary Access Pass authentication method policy, set One-time use to Yes, and Default lifetime to 10 minutes.

  • Enable OATH hardware tokens, upload the seed file, and configure the token lifetime to 10 minutes.

  • Configure Self-service password reset, force a password change on next sign-in, and set a Conditional Access sign-in frequency of 10 minutes.

  • Enable the FIDO2 Security Key authentication method policy, set Enforce attestation to Yes, and restrict key validity to 10 minutes.

Question 17 of 20

Contoso uses Microsoft Defender for Cloud Apps integrated with Microsoft Purview sensitivity labels. You are asked to alert SecOps and automatically quarantine any file labeled "Highly Confidential" when a user creates a sharing link that allows anonymous (Anyone) access in SharePoint Online or OneDrive. Which type of policy should you configure in Defender for Cloud Apps, and which action must the policy include to meet the requirement?

  • Create a File policy that targets the "Highly Confidential" label and public sharing links, then configure the Put in quarantine governance action.

  • Enable the built-in Anomaly detection policy for Suspicious sharing to automatically generate alerts.

  • Create an Activity policy that filters on the Share activity and configure the Send alert action.

  • Create a Session policy that monitors downloads from SharePoint Online and applies a Block control.

Question 18 of 20

You need to onboard 2,000 domain-joined Windows 10 Enterprise devices to Microsoft Defender for Endpoint. The devices are managed exclusively through Group Policy. After downloading the Group Policy onboarding package from the Microsoft 365 Defender portal, you prepare to create a new Group Policy Object that will deploy the onboarding blob to the computers. Before you can configure the required policy settings, which action must you perform on a Windows Server 2019 domain controller?

  • Import the WindowsDefenderATPOnboardingScript.cmd file into the Computer Startup Scripts section of the new GPO.

  • Run the Microsoft Defender for Endpoint onboarding MSI on the domain controller by using the /quiet switch.

  • Copy the WindowsDefenderATP.admx and corresponding .adml files from the onboarding package to the Central Store for Group Policy.

  • Enable the Turn off Windows Defender Antivirus policy in the new GPO to prevent engine conflicts during onboarding.

Question 19 of 20

When defining a custom sensitive information type (SIT) in the Microsoft Purview compliance portal, you want to trigger detections when the word "prototype" appears within five characters of any value that matches a regular expression for a 10-digit product code. Which element must you configure inside the pattern to achieve this proximity requirement?

  • Set a proximity value on the supporting keyword element.

  • Assign a high match accuracy level to the entire pattern.

  • Include an affinity marker in the product code regular expression.

  • Apply a classification rule pack to the keyword list.

Question 20 of 20

You manage Microsoft Entra ID for Contoso. The security team wants to ensure that users who connect from networks that are not part of the company's trusted IP ranges can access Microsoft 365 only if the device is either compliant (Intune-managed) or hybrid Azure AD joined. Access from the trusted IP ranges must remain unrestricted. You create a new Conditional Access policy that targets all users and all cloud apps. Which configuration meets the requirement?

  • Locations condition: Include Trusted named locations; Grant controls: Require password change on next sign-in.

  • Locations condition: Include All locations and exclude Trusted named locations; Grant controls: Require device to be marked as compliant or hybrid Azure AD joined.

  • Locations condition: Include only Trusted named locations; Grant controls: Require device to be marked as compliant or hybrid Azure AD joined.

  • Locations condition: Include All locations; Device state condition: Include Compliant; Grant controls: Block access.