MS-101: Microsoft 365 Mobility and Security Quiz Questions and Answers

Your company uses Microsoft System Center Configuration Manager (Current Branch) and Microsoft Intune to co-manage devices. Which two actions can be performed only from Intune?

Answer :
  • Deploy VPN profiles to iOS devices
  • Publish applications to Android devices

You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com. You have a Microsoft 365 subscription. You need to ensure that administrators can manage the configuration settings for all the Windows 10 devices in your organization. What should you configure?

Answer :
  • mobile device management (MDM) authority

Which of the following payloads can be delivered through malware? (Select 3)

Answer :
  • Trojan horse
  • Rootkit
  • Spyware

Which of the following can be used to aid in detecting and preventing unwanted spoofing and phishing? (Select 3)

Answer :
  • DKIM
  • DMARC
  • SPF

You are deploying Microsoft Intune. You successfully enroll Windows 10 devices in Intune. When you try to enroll an iOS device in Intune, you get an error. You need to ensure that you can enroll the iOS device in Intune. Solution: You add your user account as a device enrollment manager. Does this meet the goal?

Answer :
  • No

You are deploying Microsoft Intune. You successfully enroll Windows 10 devices in Intune. When you try to enroll an iOS device in Intune, you get an error. You need to ensure that you can enroll the iOS device in Intune. Solution: You configure the Apple MDM Push certificate. Does this meet the goal?

Answer :
  • Yes

What is the term for malware with an unknown signature?

Answer :
  • Zero-day attack

Where would you find reports and insights for Microsoft 365?

Answer :
  • Security and compliance Center

What are the two main purposes of Secure/Multipurpose Internet Mail Extensions (S/MIME)? (Select 2)

Answer :
  • Ensuring that a message in the recipient’s inbox is the exact message that started with the sender.
  • Ensuring that a message came from the specific sender and not from someone pretending to be the sender.

Fill in the blank. With ______________, users get a consistent view of their messaging data without needing to use PSTs.

Answer :
  • In-place Archiving