00:20:00

Microsoft 365 Administrator Expert Practice Test (MS-102)

Use the form below to configure your Microsoft 365 Administrator Expert Practice Test (MS-102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for Microsoft 365 Administrator Expert MS-102
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

Microsoft 365 Administrator Expert MS-102 Information

The Microsoft 365 Administrator Expert certification proves that you can manage Microsoft 365 for a business or school. It shows you understand how to set up accounts, manage identities, handle security, and keep data safe across Microsoft 365 services like Teams, Exchange, and SharePoint. You’ll also learn about managing compliance and using tools to protect sensitive information.

This exam is for IT professionals who already have experience with Microsoft 365 workloads and want to take on larger, organization-wide responsibilities. It covers everything from managing users and groups to configuring policies and monitoring system health. You’ll need to understand both the big picture and the details that keep a Microsoft 365 environment running smoothly every day.

To earn this certification, you’ll take the MS-102 exam, which replaces the older MS-100 and MS-101 tests. The exam focuses on tenant management, identity, security, and compliance. Passing it shows that you can manage Microsoft 365 across multiple services while ensuring a secure and efficient setup for users.

Practice tests and exam preparation

Taking practice tests, practice exams, and using practice questions can make a big difference when preparing for the Microsoft 365 Administrator Expert exam. Practice exams help you learn the format, timing, and difficulty level of real test questions. They also help identify areas where you need more study, such as compliance tools or identity management. At Crucial Exams, you can use Microsoft 365 Administrator Expert practice tests and practice questions to build confidence and improve your score before test day.

Microsoft 365 Administrator Expert MS-102 Logo
  • Free Microsoft 365 Administrator Expert MS-102 Practice Test

  • 20 Questions
  • Unlimited
  • Deploy and manage a Microsoft 365 tenant
    Implement and manage Microsoft Entra identity and access
    Manage security and threats by using Microsoft Defender XDR
    Manage compliance by using Microsoft Purview
Question 1 of 20

Your company allows self-service creation of Microsoft 365 groups from Teams, Outlook, and other workloads. You must enforce the following requirements: Every group name must start with the owner's department abbreviation followed by a hyphen (for example, HR- or FIN-). Users must not be able to include the words "CEO", "Legal", or "M&A" anywhere in a group name. You need to implement the solution with the least administrative effort. Which feature should you configure?

  • Create a Microsoft Teams messaging policy that bans the specified words and appends a prefix to group names.

  • Create an Exchange Online transport rule that rewrites subject lines containing the blocked words.

  • Configure an Azure AD group naming policy that uses the Department attribute and a blocked-words list.

  • Enable a Microsoft 365 groups expiration policy and set a custom naming convention.

Question 2 of 20

You are investigating an incident in the Microsoft Defender portal. From the Incidents & alerts page, you open the incident and launch Guided hunting. The first recommended KQL query returns several devices that attempted to run the same suspicious executable within the last 24 hours. You must immediately contain every affected endpoint without leaving the Guided hunting experience. Which action should you take in the query results pane to achieve this goal?

  • Select the devices and start a Live Response session from the Device details fly-out.

  • Select all listed devices and choose Isolate device from the Take action menu.

  • Export the query to CSV, then bulk-import the device IDs into an Intune dynamic group that enforces network isolation.

  • Add a unique device tag to each device so automated investigation can quarantine them on the next evaluation cycle.

Question 3 of 20

You manage a Microsoft Entra tenant for Contoso Ltd. The SalesGroup users must use either FIDO2 security keys or Windows Hello for Business when signing in to Microsoft 365 from unmanaged devices. Other MFA methods, such as SMS, must not satisfy this requirement. You decide to enforce the requirement by using a single Conditional Access policy. Within the policy's Grant controls, which action should you configure?

  • Select Require multi-factor authentication.

  • Select Require authentication strength and choose Phishing-resistant MFA.

  • Select Block access.

  • Select Require device to be marked compliant and hybrid Azure AD joined.

Question 4 of 20

Your organization uses Microsoft 365 E5. Legal requirements dictate that any Teams chat or channel message containing a U.S. Social Security Number (SSN) must be blocked if the message is addressed to external recipients, while internal communication must be allowed. To reduce false positives, detection should be limited to matches at the High confidence level. Which DLP rule configuration meets the requirements?

  • Condition: Content contains U.S. Social Security Number (High confidence, minimum 1 occurrence) AND any recipient is outside the organization; Action: Notify the sender only (no block).

  • Condition: Content contains U.S. Social Security Number (High confidence, minimum 1 occurrence) AND Sender is outside the organization AND any recipient is inside the organization; Action: Block the message.

  • Condition: Content contains U.S. Social Security Number (High confidence, minimum 1 occurrence) AND Sender is inside the organization AND any recipient is outside the organization; Action: Block the message.

  • Condition: Content contains U.S. Social Security Number (Low confidence, minimum 1 occurrence) AND Sender is inside the organization AND any recipient is outside the organization; Action: Block the message.

Question 5 of 20

Your organization uses group-based licensing in Microsoft Entra ID. One group assigns Microsoft 365 E3 with every service plan enabled. A second group assigns the same product but with the Exchange Online service plan disabled. A user is a member of both groups. After the group assignments are evaluated, what is the resulting license configuration for the user?

  • The user is placed in a conflict state and no license is applied until an administrator resolves the mismatch.

  • Two Microsoft 365 E3 licenses are consumed-one from each group-and Exchange Online remains disabled.

  • The user receives a single Microsoft 365 E3 license with Exchange Online disabled because the most restrictive assignment is applied.

  • The user receives a single Microsoft 365 E3 license with Exchange Online enabled because the service plans from the two assignments are combined.

Question 6 of 20

Your Microsoft 365 tenant already hosts contoso.com. The company acquires Litware, which uses the public domain litware.com and still delivers all email to an on-premises Exchange organization. You must add litware.com to Microsoft 365 so Litware users can sign in with their existing email addresses, without disrupting current mail flow. Which action should you perform first in the Microsoft 365 admin center?

  • Start the Add Domain wizard for litware.com and select the option to manually add a TXT record for verification only.

  • Start the Add Domain wizard for litware.com and allow Microsoft 365 to automatically update all required DNS records at the registrar.

  • Create a mail flow connector in Exchange Online that routes outbound messages for litware.com through the on-premises SMTP gateway.

  • Create an accepted domain of type Internal Relay for litware.com in Exchange Online.

Question 7 of 20

Your organization uses Microsoft 365 E5. You must give an external vendor team permission to review, but not modify, all security incidents in Microsoft Defender XDR and to run searches in the unified audit log in Microsoft Purview. The vendor must have no other security or compliance privileges. Which set of role group assignments meets the requirements?

  • Security Operator in Microsoft Defender XDR and Compliance Data Administrator in Microsoft Purview

  • Security Reader in Microsoft Defender XDR and View-Only Audit Logs in Microsoft Purview

  • Incident Responder in Microsoft Defender XDR and eDiscovery Manager in Microsoft Purview

  • Security Administrator in Microsoft Defender XDR and Audit Reader in Microsoft Purview

Question 8 of 20

Your organization operates a Microsoft 365 tenant. Management wants new Microsoft 365 feature updates to be exposed first only to an internal pilot group before the remainder of the users receive them. You need to configure this behavior by using settings in the Microsoft 365 admin center, without requiring additional tools or licenses. Which configuration meets the requirement?

  • Create a Windows Update ring in Intune set to the Preview channel and assign it to the pilot group.

  • Enable Security & privacy → Customer Lockbox and assign the pilot group as approvers.

  • Turn on Preview features in Message center and subscribe the pilot group to notifications.

  • Set Organization profile → Release preferences to "Targeted release for selected users" and add the pilot group.

Question 9 of 20

You are a Microsoft 365 administrator for an organization that uses Microsoft Defender XDR. While reviewing the Endpoints report in the Microsoft 365 Defender portal, you notice that the Devices missing critical security updates tile shows several unmanaged Windows 10 clients. You need to start a remediation action directly from the report so that the required updates are deployed without opening separate change-management tickets. What should you do from the report page?

  • Export the list of affected devices to a CSV file and import it into a Windows Update for Business deployment ring.

  • Isolate each affected device from the network directly from the report to force patch installation.

  • Send the result set to Advanced Hunting and run the ExecuteRemediation cmdlet against the returned devices.

  • Open the tile, then in the filtered Device inventory select Take action and create a remediation activity for the missing updates.

Question 10 of 20

Your company uses Microsoft 365. Security policy states that only a small set of project managers may invite external users (guests) to the tenant; all other employees must be blocked from sending invitations. Global administrators should retain the ability to invite guests. You plan to implement the change in the Microsoft Entra admin center. What should you do first to meet the requirement?

  • Disable guest invitations in Organizational relationships and rely on Entitlement Management access packages for the project managers.

  • Convert the project managers' accounts to privileged role administrators and leave the default guest invite setting unchanged.

  • Create a Conditional Access policy that blocks the "External user invitation" operation for all users except the project managers.

  • Set External collaboration "Guest invite settings" to "Admins and users in the Guest Inviter role" and assign the project managers to the Guest Inviter role.

Question 11 of 20

You are designing a script to license 800 existing cloud-only users in Microsoft Entra ID. The UPNs are stored in C:\temp\upns.csv, which contains a column named userPrincipalName. You already connected to Microsoft Graph PowerShell and stored the Microsoft 365 E5 SKU ID in the variable $skuId. You must assign this license to every user using a single pipeline that relies only on currently supported modules. Which PowerShell command should you use?

  • Get-Content C:\temp\upns.csv | Set-MsolUserLicense -AddLicenses $skuId

  • Import-Csv C:\temp\upns.csv | ForEach-Object { Update-MgUser -UserId $_.userPrincipalName -AssignedLicenses @($skuId) }

  • Import-Csv C:\temp\upns.csv | ForEach-Object { Grant-AzureADMSLicense -UserId $_.userPrincipalName -SkuId $skuId }

  • Import-Csv C:\temp\upns.csv | ForEach-Object { Set-MgUserLicense -UserId $_.userPrincipalName -AddLicenses @ -RemoveLicenses @() }

Question 12 of 20

You administer a hybrid identity environment that uses Microsoft Entra Connect Sync to synchronize an on-premises Active Directory forest to a Microsoft Entra tenant. New users created yesterday in Active Directory are not present in Entra ID. In Synchronization Service Manager on the Azure AD connector, the export step shows several objects with status Error and the message "ConstraintViolationError: attributeValueMustBeUnique (mail)". You need to restore successful synchronization with the least administrative effort. Which action should you perform first?

  • Start a full synchronization cycle by running Start-ADSyncSyncCycle -PolicyType Initial on the Azure AD Connect server.

  • Create a custom Azure AD Connect outbound synchronization rule to stop exporting the mail attribute.

  • Enable staging mode on the current Azure AD Connect server and build a new production server for a fresh full sync.

  • Run the IdFix tool against Active Directory and correct any duplicate mail or proxyAddresses values.

Question 13 of 20

Contoso wants to automate remediation of risky sign-ins by using Microsoft Entra ID Protection. The security team has agreed on these rules:

  1. Block access when sign-in risk is High.
  2. Require multifactor authentication (MFA) when sign-in risk is Medium.
  3. Allow access without additional requirements when sign-in risk is Low.

You need to configure the environment to meet the requirements while keeping the design as simple as possible. What should you do?

  • Turn on Microsoft Entra security defaults to enforce MFA and block High-risk sign-ins automatically.

  • Enable the user risk policy and set the remediation action to require a password change for Medium and above risk.

  • Enable the built-in sign-in risk policy and configure it to block High risk and require MFA for Medium risk within the same policy.

  • Create two Conditional Access policies that use the sign-in risk condition: one blocking High risk sign-ins and another requiring MFA for Medium risk sign-ins.

Question 14 of 20

While investigating a phishing campaign, you locate a newly delivered message in Microsoft 365 Defender's Threat Explorer. The tenant is licensed for Microsoft Defender for Office 365 Plan 2 and Automated Investigation and Response (AIR) is enabled. You must remove the message from every affected mailbox and have Microsoft 365 automatically analyze related senders, URLs, and attachments so that similar threats are blocked in the future with the least manual effort. Which action should you take first in Threat Explorer?

  • Add the sender's domain to the Exchange Online Protection blocked senders list.

  • Submit the message to Microsoft for analysis in the Submissions portal.

  • Create a transport (mail flow) rule that deletes messages containing the malicious URL.

  • Select the message and choose "Trigger automated investigation".

Question 15 of 20

Your organization is rolling out passwordless authentication. You want help-desk staff to issue a credential that allows new hires to complete initial sign-in and register their own FIDO2 security keys. The credential must be usable only once and must expire 10 minutes after it is issued. In the Microsoft Entra admin center, which authentication method policy and settings should you configure to meet the requirements?

  • Enable the FIDO2 Security Key authentication method policy, set Enforce attestation to Yes, and restrict key validity to 10 minutes.

  • Enable OATH hardware tokens, upload the seed file, and configure the token lifetime to 10 minutes.

  • Configure Self-service password reset, force a password change on next sign-in, and set a Conditional Access sign-in frequency of 10 minutes.

  • Create a Temporary Access Pass authentication method policy, set One-time use to Yes, and Default lifetime to 10 minutes.

Question 16 of 20

Your company manages 5,000 hybrid Azure AD-joined Windows 10 devices by using Microsoft Intune, and every device is onboarded to Microsoft Defender for Endpoint. A recent incident revealed that several users, who had obtained local administrator rights, disabled Microsoft Defender Antivirus real-time protection through registry edits. You must block any local or remote attempts to modify Microsoft Defender Antivirus settings while ensuring that Intune can continue to configure those settings in the future. What should you do?

  • Create a Settings catalog device restriction that disables Windows Security Center notifications.

  • Enable Controlled Folder Access in an Endpoint security Attack surface reduction policy.

  • Deploy an Endpoint security Firewall policy that enables stateful inspection for all profiles.

  • Deploy an Endpoint security Antivirus policy in Intune that sets Tamper Protection to Enable.

Question 17 of 20

Your company has a Microsoft 365 E5 subscription. All corporate Windows 11 devices are onboarded to Microsoft Defender for Endpoint (MDE). After running Cloud Discovery in Microsoft Defender for Cloud Apps, you identify several high-risk services that must be blocked when accessed from managed devices, but employees must remain free to use the same services from personal or unmanaged devices. You need to implement the solution without deploying additional proxies, network appliances, or browser extensions. Which action should you take in Microsoft Defender for Cloud Apps?

  • Create a Conditional Access policy that applies Conditional Access App Control in Block mode to the identified services.

  • Deploy the Defender for Cloud Apps log collector appliance to ingest firewall logs and configure an anomaly detection policy for the services.

  • Create a Defender for Cloud Apps session policy that blocks upload and download traffic for the services and set the apps to Monitored.

  • Enable the Microsoft Defender for Endpoint integration, turn on automatic blocking of unsanctioned apps, and mark the identified services as Unsanctioned.

Question 18 of 20

You manage a hybrid Microsoft Entra tenant synchronized with an on-premises Active Directory forest. You deployed Microsoft Entra Password Protection by installing the DC agent on every writable domain controller. Several days later, users can still set weak passwords such as Contoso2023, and Event ID 30009 on the DCs indicates that no password policy is available. Which action will enable the domain controllers to download and enforce the banned-password lists?

  • Install and register the Microsoft Entra Password Protection proxy service on a domain-joined server.

  • Enable password writeback in the self-service password reset (SSPR) configuration.

  • Create a firewall rule that allows outbound LDAP (TCP 389) from the domain controllers to Microsoft Entra ID.

  • Turn on password hash synchronization in Microsoft Entra Connect Sync.

Question 19 of 20

Contoso implements Microsoft Entra Connect with Pass-through Authentication (PTA) and Seamless Single Sign-On (SSO). The CIO wants to ensure that users can still sign in to Microsoft 365 services if every PTA agent or the entire corporate network becomes unreachable for several hours. The existing sign-in behavior must remain unchanged while the PTA infrastructure is healthy, and administrators are willing to take manual action if an outage occurs.

Which action should you take to provide a backup authentication method that can be switched to during an extended PTA outage without affecting day-to-day sign-ins?

  • Enable Password Hash Synchronization and retain Pass-through Authentication as the primary sign-in method.

  • Enable a Seamless SSO policy that forces Azure AD to fall back to cloud-only authentication when PTA becomes unavailable.

  • Deploy two additional PTA agents on separate servers and place them in the same Active Directory site.

  • Configure federation with AD FS and set Azure AD to use federation as a secondary authentication method.

Question 20 of 20

Your company's Microsoft 365 tenant is on the Standard release track. You want a pilot team of 50 users to receive new Microsoft 365 features before the rest of the organization so they can validate compatibility and update training material. You must meet the following requirements:

  • New features must arrive early only for the pilot users.
  • Other users must continue to receive features on the default schedule. Which action should you take in the Microsoft 365 admin center to meet these requirements?
  • Change the release track to "Targeted release for everyone".

  • Assign Microsoft 365 E5 licenses to the 50 pilot users to place them on the early release ring.

  • Enable preview messages in the Message center and subscribe the pilot users to Message center emails.

  • Select "Targeted release for selected users" and add the 50 pilot users.