Lead4Pass MS-100 dumps with PDF and VCE are the best practice solution for the exam

ms-100 dumps

Lead4Pass MS-100 dumps are verified and audited by a Microsoft professional team, and they really meet the requirements of the MS-100 certification exam, covering more than 95% of the exam questions in the exam room!

And, offer the most popular study methods: MS-100 dumps PDF, and MS-100 dumps VCE, both study formats contain the latest certification exam questions and answers!

Therefore, the best exam solution is to use MS-100 dumps with PDF and VCE formats: https://www.leads4pass.com/ms-100.html (486 Q&A), to help you practice easily and achieve exam success.

What’s more! Part of the Lead4Pass MS-100 dumps exam questions online for free download: https://drive.google.com/file/d/1bFn70mqiLuR8CPbb5K06sDtlpOfB8w4D/

You can also practice some of the Lead4Pass MS-100 dumps exam questions online

TypeNumber of exam questionsExam nameExam codeLast updated
Free15Microsoft 365 Identity and ServicesMS-100MS-100 dumps
Question 1:

You need to add the custom domain names to Office 365 to support the planned changes as quickly as possible. What should you create to verify the domain names successfully?

A. three alias (CNAME) records

B. one text (TXT) record

C. one alias (CNAME) record

D. three text (TXT) records

 

Correct Answer: D

Contoso plans to provide email addresses for all the users in the following domains:

1.

East.adatum.com

2.

Contoso.adatum.com

3.

Humongousinsurance.com

To verify three domain names, you need to add three TXT records.

Reference:

https://docs.microsoft.com/en-us/office365/admin/setup/add-domain?view=o365-worldwide


Question 2:

 

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while

others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear on the review screen.

You need to assign User2 the required roles to meet the security requirements.

Solution: From the Office 365 admin center, you assign User2 the Security Reader role. From the Exchange admin center, you assign User2 the Compliance Management role.

Does this meet the goal?

A. Yes

B. No

 

Correct Answer: A

User2 must be able to view reports and schedule the email delivery of security and compliance reports.

The Security Reader role can view reports.

The Compliance Management role can schedule the email delivery of security and compliance reports.

Reference:

https://docs.microsoft.com/en-us/exchange/permissions-exo/permissions-exo


Question 3:

 

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear on the review screen.

You need to assign User2 the required roles to meet the security requirements.

Solution: From the Office 365 admin center, you assign User2 the Security Administrator role. From the Exchange admin center, you add User2 to the View-Only Organization Management role.

Does this meet the goal?

A. Yes

B. No

 

Correct Answer: B

User2 must be able to view reports and schedule the email delivery of security and compliance reports.

The Security Administrator role can view reports but not schedule the email delivery of security and compliance reports. The View-Only Organization Management role cannot schedule the email delivery of security and compliance reports.

Reference: https://docs.microsoft.com/en-us/exchange/permissions-exo/permissions-exo


Question 4:

 

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while

others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You need to assign User2 the required roles to meet the security requirements.

Solution: From the Office 365 admin center, you assign User2 the Security Reader role. From the Exchange admin center, you assign User2 the Help Desk role.

Does this meet the goal?

A. Yes

B. No

 

Correct Answer: B

User2 must be able to view reports and schedule the email delivery of security and compliance reports.

The Security Reader role can view reports but not schedule the email delivery of security and compliance reports. The Help Desk role cannot schedule the email delivery of security and compliance reports.

Reference: https://docs.microsoft.com/en-us/exchange/permissions-exo/permissions-exo


Question 5:

 

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while

others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You need to assign User2 the required roles to meet the security requirements.

Solution: From the Office 365 admin center, you assign User2 the Records Management role. From the Exchange admin center, you assign User2 the Help Desk role.

Does this meet the goal?

A. Yes

B. No

 

Correct Answer: B

User2 must be able to view reports and schedule the email delivery of security and compliance reports.

The Records Management role cannot view reports or schedule the email delivery of security and compliance reports. The Help Desk role cannot schedule the email delivery of security and compliance reports.

Reference: https://docs.microsoft.com/en-us/exchange/permissions-exo/permissions-exo


Question 6:

 

To which Azure AD role should you add User4 to meet the security requirement?

A. Password administrator

B. Global administrator

C. Security Administrator

D. Privileged role administrator

 

Correct Answer: B

User4 must be able to reset User3 password.

User3 is assigned the Customer Lockbox Access Approver role. Only global admins can reset the passwords of people assigned to this role as it\’s considered a privileged role.

Reference:

https://techcommunity.microsoft.com/t5/Security-Privacy-and-Compliance/Customer-Lockbox-Approver-Role-Now-Available/ba-p/223393


Question 7:

 

You need to meet the security requirement for Group1. What should you do?

A. Configure all users to sign in by using multi-factor authentication.

B. Modify the properties of Group1.

C. Assign Group1 a management role.

D. Modify the Password reset properties of the Azure AD tenant.

 

Correct Answer: D

The members of Group1 must be required to answer a security question before changing their password.

If SSPR (Self Service Password Reset) is enabled, you must select at least one of the following options for the authentication methods. Sometimes you hear these options referred to as “gates.”

1.

Mobile app notification

2.

Mobile app code

3.

Email

4.

Mobile phone

5.

Office phone

6.

Security questions

You can specify the required authentication methods in the Password reset properties of the Azure AD tenant. In this case, you should set the required authentication method to be ‘Security questions’.

References:

https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-sspr-howitworks


Question 8:

 

You need to meet the security requirement for the vendors. What should you do?

A. From the Azure portal, add an identity provider.

B. From Azure Cloud Shell, run the New-AzureADUser cmdlet and specify the -UserPrincipalName parameter.

C. From the Azure portal, create guest accounts.

D. From Azure Cloud Shell, run the New-AzureADUser cmdlet and specify the -UserType parameter.

 

Correct Answer: C

Vendors must be able to authenticate by using their Microsoft account when accessing Contoso resources.

You can invite guest users to the directory, to a group, or to an application. After you invite a user through any of these methods, the invited user\’s account is added to Azure Active Directory (Azure AD), with a user type of Guest. The guest

user must then redeem their invitation to access resources. An invitation of a user does not expire.

The invitation will include a link to create a Microsoft account. The user can then authenticate using their Microsoft account. In this question, the vendors already have Microsoft accounts so they can authenticate using them.

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/b2b/add-users-administrator


Question 9:

 

You need to assign User2 the required roles to meet the security requirements and the technical requirements. To which two roles should you assign User2? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

A. the Exchange View-only Organization Management role

B. the Microsoft 365 Records Management role

C. the Exchange Online Help Desk role

D. the Microsoft 365 Security Reader role

E. the Exchange Online Compliance Management role

 

Correct Answer: DE

User2 must be able to view reports and schedule the email delivery of security and compliance reports.

The Security Reader role can view reports but not schedule the email delivery of security and compliance reports.

The Exchange Online Compliance Management role can schedule the email delivery of security and compliance reports.

Reference:

https://docs.microsoft.com/en-us/exchange/permissions-exo/permissions-exo


Question 10:

 

You need to meet the security requirement for the vendors. What should you do?

A. From the Azure portal, modify the authentication methods.

B. From Azure Cloud Shell, run the New-AzureADMSInvitation and specify the -InvitedIserEmailAddress cmdlet.

C. From Azure Cloud Shell, run the Set-MsolUserPrincipalNameand specify the -tenantIDparameter.

D. From the Azure portal, add an identity provider.

 

Correct Answer: B

Vendors must be able to authenticate by using their Microsoft account when accessing Contoso resources.

You can invite guest users to the directory, to a group, or to an application. After you invite a user through any of these methods, the invited user\’s account is added to Azure Active Directory (Azure AD), with a user type of Guest. The guest

user must then redeem their invitation to access resources. An invitation of a user does not expire.

The invitation will include a link to create a Microsoft account. The user can then authenticate using their Microsoft account. In this question, the vendors already have Microsoft accounts so they can authenticate using them.

In this solution, we are creating guest account invitations by using the New-AzureADMSInvitationcmdlet and specifying the –InvitedUserEmailAddressparameter.

Note:

There are several versions of this question in the exam. The question has two possible correct answers:

1.

From the Azure portal, create guest accounts.

2.

From Azure Cloud Shell, run the New-AzureADMSInvitationcmdlet and specify the –InvitedUserEmailAddress parameter. Other incorrect answer options you may see on the exam include the following:

1.

From the Azure portal, modify the authentication methods.

2.

From the Azure portal, add an identity provider.

Reference: https://docs.microsoft.com/en-us/azure/active-directory/b2b/add-users-administrator

https://docs.microsoft.com/en-us/powershell/module/azuread/new-azureadmsinvitation?view=azureadps-2.0


Question 11:

 

You need to meet the security requirement for the vendors. What should you do?

A. From Azure Cloud Shell, run the Set-MsolUserPrincipalName and specify the -tenantID parameter.

B. From Azure Cloud Shell, run the Set-AzureADUserExtension cmdlet.

C. Azure Cloud Shell, run the New-AzureADUser cmdlet and specify the-UserPrincipalName parameter.

D. From Azure Cloud Shell, run the New-AzureADMSInvitation cmdlet and specify the -InvitedUserEmailAddress parameter.

 

Correct Answer: D

Vendors must be able to authenticate by using their Microsoft account when accessing Contoso resources.

You can invite guest users to the directory, to a group, or to an application. After you invite a user through any of these methods, the invited user\’s account is added to Azure Active Directory (Azure AD), with a user type of Guest. The guest

user must then redeem their invitation to access resources. An invitation of a user does not expire.

The invitation will include a link to create a Microsoft account. The user can then authenticate using their Microsoft account. In this question,the vendors already have Microsoft accounts so they can authenticate using them.

In this solution, we are creating guest account invitations by using the New-AzureADMSInvitation cmdlet and specifying the -InvitedUserEmailAddress parameter.

Note:

There are several versions of this question in the exam. The question has two possible correct answers:

1.

From the Azure portal, create guest accounts.

2.

From Azure Cloud Shell, run the New-AzureADMSInvitation cmdlet and specify the ?€andquot;InvitedUserEmailAddress parameter. Other incorrect answer options you may see on the exam include the following:

1.

From the Azure portal, modify the authentication methods.

2.

From the Azure portal, add an identity provider.

Reference: https://docs.microsoft.com/en-us/azure/active-directory/b2b/add-users-administrator https://docs.microsoft.com/enus/powershell/module/azuread/new-azureadmsinvitation?view=azureadps-2.0


Question 12:

 

After your company migrates its on-premises email solution to Microsoft Exchange Online, you are tasked with assessing which licenses to acquire. You are informed that licenses acquired for the company IT and Managers groups should allow for the following:

1.

The IT group needs to have access to the Microsoft Azure Active Directory (Azure AD) Privileged Identity Management.

2.

Both the IT and Managers groups should have access to Microsoft Azure Active Directory (Azure AD) conditional access.

You need to make sure that the licensing costs are kept to a minimum.

Which two of the following options should you recommend? (Choose two.)

A. You should acquire Microsoft 365 E3 licenses for the Managers group members.

B. You should acquire Microsoft 365 E5 licenses for the Managers group members.

C. You should acquire Microsoft 365 E3 licenses for the IT group members.

D. You should acquire Microsoft 365 E5 licenses for the Managers group members.

 

Correct Answer: AD

The Managers group and the IT group require access to conditional access, which is available in Microsoft 365 E3 and higher. The IT group requires access to PIM, which is available in Microsoft 365 E5.


Question 13:

 

Your company’s Microsoft 365 tenant includes Microsoft Exchange Online.

You have been tasked with enabling calendar sharing with a partner organization, which also has a Microsoft 365 tenant.

You have to make sure that users in the partner organization have access to the calendar of every user instantly.

Which of the following actions should you take?

A. Configure a conditional access policy via the Exchange admin center.

B. Configure a new organization relationship via the Exchange admin center.

C. Configure the sharing settings via the Exchange admin center.

D. Run the Set-SPOSite cmdlet.

 

Correct Answer: B

References: https://docs.microsoft.com/en-us/exchange/sharing/organization-relationships/create-an-organization-relationship


Question 14:

 

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.

After acquiring a Microsoft 365 Enterprise subscription, you are tasked with migrating your company’s Microsoft Exchange Server 2016 mailboxes and groups to Exchange Online.

You have started a new migration batch. You, subsequently, receive complaints from on-premises Exchange Server users about slow performance. Your analysis shows that the issue has resulted from the migration. You want to make sure

that the effect the mailbox migration has on users is decreased.

Solution: You create a label policy.

Does the solution meet the goal?

A. Yes

B. No

 

Correct Answer: B


Question 15:

 

Note: The question is included in a number of questions that depicts the identical set-up. However, every question has a distinctive result. Establish if the solution satisfies the requirements.

After acquiring a Microsoft 365 Enterprise subscription, you are tasked with migrating your company’s Microsoft Exchange Server 2016 mailboxes and groups to Exchange Online.

You have started a new migration batch. You, subsequently, receive complaints from on-premises Exchange Server users about slow performance. Your analysis shows that the issue has resulted from the migration. You want to make sure

that the effect the mailbox migration has on users is decreased.

Solution: You create a mail flow rule. Does the solution meet the goal?

A. Yes

B. No

 

Correct Answer: B


 

Lead4Pass MS-100 dumps share two study materials for free: you can download them online and practice exams online!

Now! Download the MS-100 best practice solution! Use Lead4Pass MS-100 dumps with PDF and VCE: https://www.leads4pass.com/ms-100.html Contains 486 latest exam questions and answers to help you pass the exam 100%.

ExamDumpsBase: Free Microsoft Azure, Dynamics 365, Microsoft 365, Microsoft Graph, Windows, Microsoft Power Platform and other IT certification preparation materials to help you test and practice online, And share the advice for passing the exam, for more questions, you can send an email to [email protected]