Microsoft 365 Administrator Expert Practice Test (MS-102)
Use the form below to configure your Microsoft 365 Administrator Expert Practice Test (MS-102). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Microsoft 365 Administrator Expert MS-102 Information
The Microsoft 365 Administrator Expert certification proves that you can manage Microsoft 365 for a business or school. It shows you understand how to set up accounts, manage identities, handle security, and keep data safe across Microsoft 365 services like Teams, Exchange, and SharePoint. You’ll also learn about managing compliance and using tools to protect sensitive information.
This exam is for IT professionals who already have experience with Microsoft 365 workloads and want to take on larger, organization-wide responsibilities. It covers everything from managing users and groups to configuring policies and monitoring system health. You’ll need to understand both the big picture and the details that keep a Microsoft 365 environment running smoothly every day.
To earn this certification, you’ll take the MS-102 exam, which replaces the older MS-100 and MS-101 tests. The exam focuses on tenant management, identity, security, and compliance. Passing it shows that you can manage Microsoft 365 across multiple services while ensuring a secure and efficient setup for users.
Practice tests and exam preparation
Taking practice tests, practice exams, and using practice questions can make a big difference when preparing for the Microsoft 365 Administrator Expert exam. Practice exams help you learn the format, timing, and difficulty level of real test questions. They also help identify areas where you need more study, such as compliance tools or identity management. At Crucial Exams, you can use Microsoft 365 Administrator Expert practice tests and practice questions to build confidence and improve your score before test day.

Free Microsoft 365 Administrator Expert MS-102 Practice Test
- 20 Questions
- Unlimited
- Deploy and manage a Microsoft 365 tenantImplement and manage Microsoft Entra identity and accessManage security and threats by using Microsoft Defender XDRManage compliance by using Microsoft Purview
Free Preview
This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!
During initial Microsoft 365 sign-up you are asked to provide organization details. Your compliance team requires that all core customer data for Exchange Online, SharePoint Online, and Microsoft Teams is stored in German datacenters by default. No licenses have been purchased yet, and you want to avoid later migration. Which action during the tenant-creation wizard is mandatory to satisfy the requirement and cannot be changed after the tenant is provisioned?
Select a German Azure region for Azure Active Directory before provisioning.
Choose "Germany" as the organization's country/region on the sign-up page.
Purchase and assign Microsoft 365 Multi-Geo licenses, then set Germany as the Preferred Data Location.
Add the custom domain Contoso.de during sign-up so the initial tenant domain ends with .de.onmicrosoft.com.
Answer Description
Microsoft determines the default data-at-rest location for a new tenant from the country/region that you choose on the organization-information page of the sign-up wizard. Selecting Germany causes Microsoft 365 to provision the tenant in the Germany geo, ensuring that Exchange Online, SharePoint Online, and Teams data is stored in German datacenters. The country/region selection becomes permanently tied to the tenant and cannot be edited later.
Specifying an Azure region has no effect on Microsoft 365 data residency, Multi-Geo licenses can add additional geographies only after a tenant exists, and adding a German custom domain does not influence where Microsoft hosts the tenant's data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is selecting the organization's country/region during the tenant-creation wizard so important?
What is Microsoft Multi-Geo, and why can't it be used during the initial tenant setup?
Can the selection of Azure regions overwrite the tenant's data residency in Microsoft 365?
Contoso Ltd. is developing a Conditional Access strategy for its Microsoft Entra ID Premium P2 tenant. Requirements are:
- All guest users must always perform multifactor authentication (MFA) when they access SharePoint Online or OneDrive for Business.
- Internal employees should be prompted for MFA only when their sign-in risk is Medium or High.
- Two emergency "break-glass" administrator accounts must never be blocked or prompted by Conditional Access. What is the most efficient policy design that meets these requirements?
Create three policies:
- Policy 1: targets Guest users and requires MFA.
- Policy 2: targets Employees and requires MFA regardless of risk.
- Policy 3: explicitly blocks the break-glass accounts from using SharePoint Online and OneDrive.
Create two policies:
- Policy 1: targets Guest users, assigns SharePoint Online and OneDrive, and grants access only if MFA is performed.
- Policy 2: targets the Employees group, sets the Sign-in risk condition to Medium or High, and grants access only if MFA is performed. Exclude the break-glass accounts from both policies.
Create one Conditional Access policy that targets All users except the break-glass accounts, assigns SharePoint Online and OneDrive, sets the Sign-in risk condition to Medium and above, and requires MFA.
Create two policies:
- Policy 1: targets All users, applies when the sign-in originates outside the trusted network, and requires MFA.
- Policy 2: targets the Employees group, assigns SharePoint Online and OneDrive, and blocks access unless the device is marked compliant. Exclude the break-glass accounts from both policies.
Answer Description
Using two targeted policies provides the fewest objects while meeting every requirement. A dedicated policy that targets the Guest user type, assigns the SharePoint Online and OneDrive for Business cloud apps, and grants access only if MFA is satisfied forces MFA on every guest sign-in to those workloads. A second policy that targets the Employees group, uses the Sign-in risk condition set to Medium and above, and applies the Require MFA grant control satisfies the internal-user requirement. Both policies can exclude the two emergency accounts, ensuring they will not be affected, which is Microsoft's recommended practice for break-glass accounts. A single combined policy cannot enforce an "always MFA" rule for guests while simultaneously applying a risk-based rule for employees, and adding a third policy that blocks or exempts the break-glass accounts is unnecessary because the exclusion capability is built into each policy.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Conditional Access in Microsoft Entra ID?
How does the Sign-in risk condition work in Conditional Access?
What are break-glass accounts, and why are they excluded from Conditional Access policies?
Your company uses Microsoft 365. Legal requires that all email messages be kept for 10 years, after which they must be permanently deleted. End users must be prevented from overriding or shortening the retention period. You also need to exempt the mailboxes of the executive team from this requirement. Which solution meets the requirements with the least administrative effort?
Publish a retention label that retains content for 10 years and then deletes it, and assign the label to all Exchange mailboxes.
Place all mailboxes except the executive team on an eDiscovery hold for 10 years and configure an automatic purge after the hold expires.
Create a retention policy with a 10-year retain and delete action, include all Exchange locations, and add the executive mailboxes to the exclusion list.
Enable a 10-year litigation hold on every mailbox and manually remove the hold from the executive mailboxes.
Answer Description
A Microsoft Purview retention policy applies a fixed retention period to all content in the selected locations and does not rely on user-applied labels, so users cannot change or remove it. A single retention policy can be configured for Exchange email with a 10-year retain-and-delete action, while the executive mailboxes can be added to the policy's exclusion list. Publishing a retention label would require users (or auto-labeling) to apply the label, and they could potentially change it if permitted. eDiscovery holds and litigation holds satisfy preservation but do not provide the automatic 10-year deletion or the same administrative simplicity, and they do not offer straightforward exclusion management within a single configuration.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a retention policy in Microsoft 365?
Can you explain the difference between a retention policy and a retention label in Microsoft 365?
What is an exclusion list in a retention policy?
A company uses a Microsoft Entra tenant that synchronizes on-premises identities by using Microsoft Entra Connect. A Conditional Access policy named Require MFA targets all users and all cloud apps and allows access only if multi-factor authentication (MFA) is satisfied. A user reports that when signing in from a Windows 7 computer that runs Outlook 2010, access is denied without any MFA prompt. You review the sign-in log and see the failure reason AADSTS50079: The user is required to use multi-factor authentication. What is the most likely cause of the failed sign-in?
The user is connecting with a legacy authentication client that cannot perform MFA, so the Conditional Access policy blocks the request.
Per-user MFA is set to Enforced on the account, which conflicts with the Conditional Access policy and denies access.
Self-service password reset (SSPR) is disabled for the user, so MFA registration cannot be completed during sign-in.
The user's password hash has not synchronized to Microsoft Entra ID, preventing the MFA prompt from being issued.
Answer Description
Error AADSTS50079 appears when Azure AD demands MFA but the client cannot complete the challenge. Outlook 2010 uses basic (legacy) authentication, which does not support modern authentication flows capable of presenting an MFA prompt. Because the Conditional Access policy requires MFA, Azure AD blocks the sign-in outright. The failure is therefore caused by the legacy authentication client, not by password-sync issues, SSPR settings, or per-user MFA states.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is legacy authentication in Microsoft Entra ID?
Why does Outlook 2010 use legacy authentication?
How can Conditional Access policies block legacy authentication clients?
Your company's Microsoft 365 tenant contains more than 30,000 users and several security-sensitive teams. Members of the Data Governance team must be able to run Content searches and preview the search results in the Microsoft Purview compliance portal, but they must be blocked from exporting any data or creating new eDiscovery cases. Which approach meets the requirement while following least-privilege and auditable delegation practices?
Assign the Microsoft Entra Security Reader role to the Data Governance team and enable PIM for just-in-time elevation.
Create a custom role group in the Microsoft Purview compliance portal that contains only the Compliance Search role, and add the Data Governance team as members.
Add the Data Governance team to the built-in eDiscovery Manager role group in the Microsoft Purview compliance portal.
Create a role group in Microsoft Defender XDR with the Investigation role and include the Data Governance team.
Answer Description
The ability to run a Content search and preview items is granted by the Compliance Search role in Microsoft Purview. The Export role is required to download results, and Case Management is required to create eDiscovery cases. Because the built-in eDiscovery Manager role group contains all three roles, using it would over-grant permissions. Creating a custom role group in the Purview compliance portal that includes only the Compliance Search role lets the Data Governance team perform the required tasks and nothing more, satisfying least-privilege principles. Assigning Azure AD roles, Microsoft 365 service admin roles, or Defender role groups would not give Content search rights in Purview.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Compliance Search role in Microsoft Purview?
What is the importance of least-privilege delegation in security-sensitive scenarios?
What is the difference between custom role groups and built-in role groups in Microsoft Purview?
You are troubleshooting directory synchronization in a Microsoft Entra tenant. An administrator previously stopped the Azure AD Connect scheduler for planned maintenance, and no objects have been synchronized since. When you run Get-ADSyncScheduler, the output shows SyncCycleEnabled : False and NextSyncCycleStartTime is blank. You need to resume the normal automatic delta sync cycles without performing a full import or re-running the Azure AD Connect wizard. Which PowerShell command should you run?
Set-ADSyncScheduler -SchedulerSuspended $false
Invoke-ADSyncRunProfile -ConnectorName "Azure AD Connector" -RunProfileName "Delta Import"
Start-ADSyncSyncCycle -PolicyType Delta
Set-ADSyncScheduler -SyncCycleEnabled $true
Answer Description
The Azure AD Connect scheduler controls the automatic delta import, delta sync, and export steps. When SyncCycleEnabled is set to False, the scheduler is disabled. Re-enabling it is done by setting the SyncCycleEnabled property back to True with Set-ADSyncScheduler. Start-ADSyncSyncCycle would trigger only a single sync and would not restore the recurring schedule, while Invoke-ADSyncRunProfile targets an individual connector, and SchedulerSuspended is a read-only property that cannot be changed directly. Therefore, running Set-ADSyncScheduler -SyncCycleEnabled $true is the correct action.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of Azure AD Connect Scheduler in directory synchronization?
How is the Set-ADSyncScheduler command used in troubleshooting synchronization?
What is the difference between Start-ADSyncSyncCycle and Set-ADSyncScheduler?
You have a Microsoft 365 E5 subscription with Microsoft Defender for Office 365 Plan 2 enabled. A security requirement states:
- When users select Report message or Report phishing in Outlook, the message must automatically trigger an investigation.
- If the investigation verdict is Malicious, the message must be purged from all mailboxes automatically without requiring analyst approval.
You confirm that user submissions are already enabled.
Which action should you perform next to meet the requirement?
Edit the Automated investigation and response (AIR) settings and configure the remediation action policy to Automatically remediate detected threats.
Create a Quarantine policy that allows end users to release only non-malicious messages.
Create a custom Alert policy that triggers when a user submits a phishing report and sets the action to purge the message.
Assign the Strict preset security policy and turn on Zero-hour auto purge (ZAP).
Answer Description
User-reported messages automatically start an Automated investigation and response (AIR) process when user submissions are enabled. To ensure malicious messages are purged without manual analyst approval, you must configure the AIR remediation action policy to allow pre-approved remediation actions. This setting lets AIR automatically carry out a hard delete or soft delete across all affected mailboxes. A custom alert policy does not start AIR, a quarantine policy operates only after messages are quarantined, and the Strict preset security policy does not modify AIR approval requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Automated Investigation and Response (AIR)?
How do I configure AIR remediation actions?
What is Zero-hour Auto Purge (ZAP), and why is it not suitable for this scenario?
Your company is about to deploy Microsoft Entra Connect Sync to synchronize 45 000 user accounts and several thousand groups from an on-premises Active Directory forest to Microsoft 365. As part of the preparation phase, you will run the IdFix tool. Which statement about using IdFix in this scenario aligns with Microsoft recommendations?
IdFix connects to Azure AD to compare objects that have already been synchronized and flags any mismatches it finds.
IdFix must be installed and executed on a writable domain controller in every domain of the forest to return complete results.
IdFix can only be run after the initial full synchronization so that it can detect errors based on Azure AD feedback.
IdFix identifies duplicates, invalid characters, and formatting errors in attributes that will be synchronized and can optionally commit the corrections directly to Active Directory before the first sync.
Answer Description
IdFix is designed to be executed before directory synchronization begins. It queries on-premises Active Directory, detects issues such as duplicate values, unsupported characters, and format problems in attributes that will be synchronized (for example userPrincipalName, proxyAddresses, and mailNickname), and can optionally write the corrected values back to Active Directory. It does not query Azure AD, does not have to be installed on a domain controller, and should be used before any synchronization run rather than afterward.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the IdFix tool used for in Microsoft Entra Connect Sync?
Which Active Directory attributes does IdFix check?
Does IdFix need to be installed on a domain controller to function correctly?
You manage identity synchronization for a Microsoft Entra tenant by using Microsoft Entra Connect Sync. After a recent migration, several new user accounts fail to synchronize to the tenant. In Synchronization Service Manager, the export stage shows error "AttributeValueMustBeUnique". You must quickly locate and remediate the duplicate attribute values in on-premises Active Directory before the next synchronization cycle. Which tool should you use?
Troubleshooting task in the Azure AD Connect wizard
Azure AD Connect Health portal
IdFix directory synchronization error remediation tool
Active Directory Sites and Services console
Answer Description
The IdFix utility is designed specifically to scan on-premises Active Directory for issues that prevent objects from synchronizing to Microsoft Entra ID, including duplicate or invalid values that trigger the AttributeValueMustBeUnique error. Running IdFix lists the offending attributes and lets administrators correct them in bulk before the next sync.
Azure AD Connect Health surfaces service health and performance data but does not enumerate individual duplicate attribute values.
The Troubleshooting task in the Azure AD Connect wizard collects diagnostics; it does not discover directory-level duplicates.
Active Directory Sites and Services provides replication configuration and cannot identify duplicate attribute values.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does the IdFix tool resolve synchronization errors?
What does the 'AttributeValueMustBeUnique' error mean?
When should Azure AD Connect Health be used instead of IdFix?
Your organization uses Microsoft Purview to enforce sensitivity labels across Microsoft 365. A compliance administrator needs to do the following:
- Identify which users removed the "Highly Confidential" sensitivity label from any file during the past 14 days and export that information.
- Generate a current inventory of all SharePoint Online files that still have the "Highly Confidential" label applied. Which Microsoft Purview tools should the administrator use for each requirement?
Use Audit search for the removal events and Content explorer for the current SharePoint inventory.
Use Content explorer for the removal events and Activity explorer for the current SharePoint inventory.
Use Activity explorer for the removal events and Content explorer for the current SharePoint inventory.
Use the sensitivity label usage report for the removal events and Activity explorer for the current SharePoint inventory.
Answer Description
Activity explorer records individual labeling events (such as a user applying or removing a sensitivity label) for the last 30 days and lets administrators export the filtered results, making it the correct choice for requirement 1. Content explorer shows a snapshot of the current items stored in Microsoft 365 workloads and the sensitivity labels applied to them, so it is the right tool for producing the inventory described in requirement 2. Label usage reports offer aggregated statistics only, and Audit search or the compliance audit log does not provide an at-a-glance inventory of currently labeled content.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Microsoft Purview Activity Explorer used for?
How does Microsoft Purview Content Explorer work?
What is the difference between Activity Explorer and Content Explorer?
Your organization uses Microsoft Entra ID Protection. You must ensure that when an account is assessed as High user risk, the user can continue the sign-in only after completing a secure password reset. The sign-in must not be blocked outright. Which remedial action should you configure in the User risk policy to meet the requirement?
Set sign-in frequency to 1 hour
Require multifactor authentication
Block access
Require password change
Answer Description
In a User risk policy, the remedial action "Require password change" prompts the affected user to perform a secure password reset (protected by MFA) before access is granted. This allows the user to continue the sign-in flow after successful password change, rather than blocking the sign-in completely. The "Block access" option would stop the sign-in with no opportunity for remediation, while "Require multifactor authentication" and settings such as sign-in frequency are not available remediation actions in a User risk policy.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Microsoft Entra ID Protection and how does it assess user risk?
How does requiring a password change mitigate High user risk in Microsoft Entra ID Protection?
Why isn’t blocking access or requiring multifactor authentication sufficient for addressing High user risk in this scenario?
Your organization uses Microsoft Defender XDR. While reviewing the Security operations dashboard, you need a report that shows currently active, publicly disclosed threats, summarizes how those threats are affecting your tenant, and lists recommended mitigation actions that analysts can follow. Which Microsoft Defender XDR capability should you open to obtain this information?
Threat analytics
Microsoft Secure Score
Incidents queue
Device inventory
Answer Description
Threat analytics is a dedicated workspace in Microsoft Defender XDR that continuously monitors high-profile, publicly disclosed threats. For each threat it shows prevalence in your environment, impacted assets, and step-by-step recommended actions, allowing analysts to assess exposure and respond from the same portal. The Secure Score, Incidents queue, and Device inventory do not aggregate intelligence on emerging threats or provide the same contextual recommendations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Microsoft Defender XDR?
How does Threat Analytics differ from Microsoft Secure Score?
How can Threat Analytics help mitigate risks?
Your organization has deployed Microsoft 365 to 70 branch offices worldwide. In the Microsoft 365 admin center you open Reports > Network connectivity and only see a single overall tenant score. You need the dashboard to show network insights and scores for each branch location on the world map so that local issues become visible. Which prerequisite configuration must you complete first?
Enable Microsoft 365 unified audit logging so telemetry can be correlated with user sign-ins.
Deploy Endpoint analytics in Microsoft Intune to collect client network performance data from all devices.
Upload an office locations CSV that maps every public egress IP range to its physical site in Network connectivity settings.
Create an Azure Virtual WAN hub for each branch and link it to Microsoft 365 via Service Endpoints.
Answer Description
The Network connectivity dashboard can generate per-site insights only when Microsoft 365 knows where your users are egressing to the Internet. Administrators therefore have to upload a CSV file that maps each public egress IP range (or CIDR) to a friendly office name, city, latitude and longitude. After the locations file is accepted, the service can attribute collected telemetry to individual sites and calculate a score for each one. Enabling audit logging, deploying Endpoint analytics or configuring a virtual WAN does not register egress locations and therefore will not populate the map.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an egress IP range?
How do I format the CSV file for Network connectivity settings?
Why doesn't enabling audit logging or Endpoint analytics help with branch-level insights?
Your company enabled Microsoft Entra security defaults six months ago. Now the security team wants to require phishing-resistant MFA (FIDO2 security keys or Windows Hello for Business) for all members of the Privileged Authentication Administrator and Global Administrator roles, while keeping other users on the existing MFA requirement. You must also exclude two emergency break-glass accounts from any MFA enforcement. What should you do?
Keep security defaults enabled and add an authentication strength policy that requires phishing-resistant MFA for the privileged roles.
Create an access review that requires users in the privileged roles to register a FIDO2 security key before they can sign in.
Disable security defaults and create a Conditional Access policy that targets the privileged roles, applies the Phishing-resistant MFA authentication strength, and excludes the break-glass accounts.
Enable per-user MFA for the privileged roles and configure it to allow only FIDO2 authentication.
Answer Description
Security defaults enforce one fixed set of Conditional Access rules and cannot be modified, scoped to particular roles, or paired with authentication strength requirements. To target only specific administrative roles and to mandate a phishing-resistant method, you must first turn security defaults off. You can then create a Conditional Access policy that is scoped to the desired directory roles, applies the Phishing-resistant MFA authentication strength, and explicitly excludes the designated break-glass accounts. Per-user MFA cannot restrict authentication to FIDO2 or Windows Hello, and access reviews do not set authentication requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are security defaults in Microsoft Entra?
What is a Conditional Access policy?
What are break-glass accounts, and why are they excluded from MFA enforcement?
You are investigating an incident in the Microsoft Defender portal. From the Incidents & alerts page, you open the incident and launch Guided hunting. The first recommended KQL query returns several devices that attempted to run the same suspicious executable within the last 24 hours. You must immediately contain every affected endpoint without leaving the Guided hunting experience. Which action should you take in the query results pane to achieve this goal?
Select all listed devices and choose Isolate device from the Take action menu.
Export the query to CSV, then bulk-import the device IDs into an Intune dynamic group that enforces network isolation.
Add a unique device tag to each device so automated investigation can quarantine them on the next evaluation cycle.
Select the devices and start a Live Response session from the Device details fly-out.
Answer Description
Guided hunting opens the Advanced hunting interface pre-populated with investigation queries scoped to entities in the incident. Results returned by any of these queries support the same entity-level response actions that are available in standard Advanced hunting. For device entities, selecting the relevant rows and choosing Isolate device from the Take action menu immediately contains the endpoints by blocking all inbound and outbound network traffic except those connections required for Defender communication. The other options either do not exist in the Guided hunting results pane (running Live Response session directly, moving devices to an Intune group) or cannot initiate containment (adding a device tag is only a labeling operation).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Guided hunting in Microsoft Defender?
What does the 'Isolate device' action do in Microsoft Defender?
How does Advanced Hunting complement Guided hunting in Microsoft Defender?
Your organization operates a Microsoft 365 tenant. Management wants new Microsoft 365 feature updates to be exposed first only to an internal pilot group before the remainder of the users receive them. You need to configure this behavior by using settings in the Microsoft 365 admin center, without requiring additional tools or licenses. Which configuration meets the requirement?
Enable Security & privacy → Customer Lockbox and assign the pilot group as approvers.
Set Organization profile → Release preferences to "Targeted release for selected users" and add the pilot group.
Turn on Preview features in Message center and subscribe the pilot group to notifications.
Create a Windows Update ring in Intune set to the Preview channel and assign it to the pilot group.
Answer Description
The rollout cadence for Microsoft 365 service updates is controlled from the Organization profile section of the Microsoft 365 admin center. By setting Release preferences to "Targeted release for selected users," you can specify a group of pilot users who will receive new features earlier than everyone else. Customer Lockbox only governs data-access requests, Intune update rings apply to Windows and not Microsoft 365 services, and enabling Preview features in Message center gives administrators early visibility to change information but does not alter when end users receive the features.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'Targeted release for selected users' mean in Microsoft 365?
How do I create a pilot group for targeted release in Microsoft 365?
Why is Customer Lockbox not suitable for controlling feature rollouts in Microsoft 365?
You have connected your Microsoft 365 tenant to Microsoft Defender for Cloud Apps (MDCA). A security alert notifies you that an Azure AD-registered application named Contoso-Reports was granted Organization.Read.All permission. You need to determine exactly who, when, and from where this permission was granted by using the MDCA activity log. Which filter combination should you apply first to quickly locate the relevant event in the activity log?
Activity type equals OAuth privilege escalation and App equals Office 365
Activity type equals Create service principal and App equals Azure Active Directory
Device tag equals Unmanaged and Activity type equals User login
Activity type equals Consent to application and Application equals Contoso-Reports
Answer Description
In the Defender for Cloud Apps activity log, the event that records a user or administrator granting OAuth permissions to an Azure AD application is "Consent to application." Filtering the log for this Activity type immediately narrows the results to permission-grant events only. Adding a filter for the Application ID or display name (Contoso-Reports) ensures that only events involving the suspicious app are shown. Once the single event is isolated, the log columns reveal the acting user (granted by), the date/time, the source IP address, and other context. The other options either reference activity types that are not written for OAuth consent (such as service principal creation or privilege escalation) or use filters (App equals Office 365, Device tag, etc.) that would return many unrelated events, making the investigation slower and potentially missing the consent event entirely.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the MDCA activity log used for?
What does 'Consent to application' mean?
How do 'Activity type' filters benefit investigations in MDCA?
Contoso Ltd. uses a Microsoft Entra tenant. You are planning Conditional Access. Requirements: 1) Enforce MFA for all privileged directory roles. 2) The control should apply only when sign-ins come from outside the head-office public IP ranges. 3) Emergency break-glass accounts must remain unaffected. What is the best way to scope the new policy?
Target a security group that contains the privileged accounts, include only the head-office named location, and grant Require multifactor authentication.
Target All guest users, scope the policy to the Microsoft Azure Management cloud app, exclude the head-office location, and grant Require multifactor authentication.
Target All users, set a Sign-in risk condition of Medium and above, require multifactor authentication, and exclude the break-glass accounts.
Target the built-in directory roles in Users and groups, exclude the break-glass accounts, define a named location for the head-office IP ranges and exclude it, and set Grant controls to Require multifactor authentication.
Answer Description
Conditional Access can be assigned directly to built-in directory roles. By selecting the privileged roles in the Users and groups pane, every current and future holder of those roles is covered without manual group maintenance. Excluding the emergency accounts prevents lockout. Defining the head-office IP ranges as a named location and excluding it ensures MFA is required only when the sign-in originates elsewhere. Alternatives that target all users, risk levels, or guest users either affect too many identities or fail to meet the location requirement, while a static security group requires ongoing upkeep and still enforces MFA inside the trusted network.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a break-glass account in Microsoft Entra?
What is a named location in Conditional Access policies?
How does scoping Conditional Access policies to directory roles simplify management?
Contoso implements Microsoft Entra Connect with Pass-through Authentication (PTA) and Seamless Single Sign-On (SSO). The CIO wants to ensure that users can still sign in to Microsoft 365 services if every PTA agent or the entire corporate network becomes unreachable for several hours. The existing sign-in behavior must remain unchanged while the PTA infrastructure is healthy, and administrators are willing to take manual action if an outage occurs.
Which action should you take to provide a backup authentication method that can be switched to during an extended PTA outage without affecting day-to-day sign-ins?
Configure federation with AD FS and set Azure AD to use federation as a secondary authentication method.
Deploy two additional PTA agents on separate servers and place them in the same Active Directory site.
Enable a Seamless SSO policy that forces Azure AD to fall back to cloud-only authentication when PTA becomes unavailable.
Enable Password Hash Synchronization and retain Pass-through Authentication as the primary sign-in method.
Answer Description
Enabling Password Hash Synchronization (PHS) while retaining Pass-through Authentication keeps PTA as the active sign-in method as long as the agents are healthy, so users experience no change in normal operation. Because user password hashes are continuously synchronized to Microsoft Entra ID, an administrator can quickly switch the tenant's sign-in method to PHS using Microsoft Entra Connect or PowerShell if every PTA agent or the corporate network becomes unreachable. Deploying extra PTA agents does not help when the network itself is down. AD FS introduces additional infrastructure and does not provide an easier fallback path. Seamless SSO does not include an independent setting for cloud-only fallback.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Pass-through Authentication (PTA) in Microsoft Entra Connect?
What is Password Hash Synchronization (PHS) and why is it important?
How does Seamless Single Sign-On (SSO) work in a Microsoft 365 environment?
In Microsoft Defender Exposure Management, you find an improvement action that recommends disabling legacy authentication. Because a critical line-of-business app still relies on legacy authentication, you mark the improvement action as "Risk accepted - will not fix" for 12 months. Which outcome should you expect immediately after saving the exception?
Secure Score remains unchanged, but the recommendation is highlighted in red as an acknowledged risk on every device timeline.
Defender automatically creates a remediation task in Microsoft Intune but freezes the score impact until the task is completed.
All devices that rely on legacy authentication are moved to a restricted network segment by Microsoft Defender Firewall rules.
The recommendation is removed from Secure Score and Exposure Score computations, and it appears only under the exceptions filter.
Answer Description
When an improvement action is set to Risk accepted - will not fix, Defender Exposure Management (formerly Threat & Vulnerability Management) excludes the recommendation from both Secure Score and Exposure Score calculations during the exception period. The recommendation and its related CVEs are still retained in the portal, but they are visible only when you filter for exceptions. Device exposure and pending improvement actions lists refresh within minutes to reflect the revised scores. No quarantine, enforcement, or automatic remediation is triggered; only the scoring and visibility change. Choosing to postpone or approve remediation would instead keep the item in scope and affect score differently.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is legacy authentication?
What is Microsoft Defender Secure Score?
What happens when an improvement action is marked as 'Risk accepted - will not fix'?
Neat!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.