CMIT 382 Final Exam Fall 2022 (100 questions) correct.
Final Exam 1. Your company has an on-premises Microsoft Exchange Server 2016 organization. The organization is in the company's main office in Melbourne. The main office has a low-bandwidth connection to the Internet. The organization contains 250 mailboxes. You purchase a Microsoft 365 subscription and plan to migrate to Exchange Online next month. In 12 months, you plan to increase the bandwidth available for the Internet connection. You need to recommend the best migration strategy for the organization. The solution must minimize administrative effort. What is the best recommendation to achieve the goal? More than one answer choice may achieve the goal. Select the BEST answer. A. network upload B. cutover migration C. hybrid migration D. staged migration 2. To use Office 365, over which ports do you need to establish unauthenticated connections to the M365 and O365 servers on the Internet? a. Port 80 and port 443 b. Port 43 and port 443 c. Port 80 and port 440 d. Port 83 and port 443 3. Which of the following user roles enables a user to monitor the service health of Office 365 services? a. Billing administrator b. Exchange administrator c. License administrator d. SharePoint administrator 4. Which of the following values indicates an employee of the host organization and a user in the organization's payroll? A a. Guest B b. Microsoft account C I c. nvited user D d. Member 5. Your company has a Microsoft Azure Active Directory (Azure AD) tenant named . You purchase a domain named from a registrar and add all the required DNS records.You create a user account named User1. User1 is configured to sign in as . You need to configure User1 to sign in as . Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. Select and Place: a. Add a custom domain b. verify custom domain c. Modify the username of ucertify user1 d. Run set-msoldomainauthenticattion 6. Which of the following do you need to keep in mind when allowing users to selfprovision software from the Microsoft 365 portal? Each correct answer represents a complete solution. Choose all that apply. a. If Office software is not made available to users, they will see a message informing them that Office installations have been disabled while navigating to the Software page in the Office 365 portal. b. Users need to have local administrator privileges on their computer for installing the software they downloaded from the Office 365 portal. c. Users require an Office 365 license to successfully run Office 365. d. Office 365 ProPlus can only run on Windows 8 or later versions. 7. You need to implement the custom banned password list in your organization. What will you require to accomplish the task? Each correct answer represents a complete solution. Choose two. a. Any of these b. Azure AD Premium P1 license c. Azure AD Premium P2 license d. Azure AD free edition 8. You have a Microsoft 365 Enterprise E5 subscription. You need to enforce multi-factor authentication on all cloud-based applications for the users in the accounts department. What should you do? a. A. Create an activity policy. b. B. Create a sign-in risk policy. c. C. Crease a session policy. d. D. Create an app permission policy. 9. You need to view an email activity report to view the trend over the last seven days in the number of send, receive, and read actions across the organization, with a per-user breakdown. What role should be assigned to you to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.a. Global administrator b. User admin c. Reports reader d. Global reader 10. Your organization's network contains an Active Directory domain and a Microsoft Azure Active Directory (Azure AD) tenant. You implement directory synchronization for all 20,000 users in the organization. You automate the creation of 200 new user accounts and you want that the new user accounts must be synchronized immediately to Azure Active Directory. Which command should you run? a. Start-ADSyncSyncCycle -PolicyType Delta b. Start-ADSyncSyncCycle -PolicyType Initial c. Get-ADSyncConnectorRunStatus d. Set-ADSyncScheduler -SyncCycleEnabled $false 11. Which of the following protocols should you configure between Exchange on-premises and Skype for Business Online if you are having both Exchange and Skype for Business in a hybrid configuration? a. SMTP b. OAuth c. TCP d. HTTPS 12. Instead of giving everybody unrestricted permissions in your Azure subscription or resources, you want to allow only certain actions at a particular scope. You need to create role assignments, and for this, you must have the Microsoft.Authorization/roleAssignments/* permission. How can you grant this permission? Each correct answer represents a complete solution. Choose all that apply. a. Through the owner role b. Through the user access administrator role c. Through the reader role d. Through the contributor role 13. Your network contains an Active Directory domain and a Microsoft Azure AD tenant. You implement directory synchronization for all 10,000 users in the organization. You automate the creation of 100 new user accounts. You need to ensure that the new user accounts synchronize to the Azure AD instance that supports the Office 365 tenancy as fast as possible. You need to force synchronization. How can you accomplish the task? Each correct answer represents a complete solution. Choose all that apply. a. By running the Azure AD Connect Wizard again b. By using the Get-ADSyncScheduler cmdlet c. By using the Start-ADSyncSyncCycle cmdlet d. By using the Synchronization Service Manager 14. Which of the following options is the minimum requirement for computers running AD FS (Active Directory Federation Services) or Web Application Proxy Servers? a. CPU: Core i5 or higher and memory: 2 GB or higher b. CPU: Core i7 or higher and memory: 1 GB or higher c. CPU: Dual-core 1.6 GHz or higher and memory: 1 GB or higherd. CPU: Dual-core 1.6 GHz or higher and memory: 2 GB or higher 15. Which of the following reports provides you with information on how much your users are using peer-to-peer or organized conferencing sessions, or how much they're participating in conferencing sessions? a. Skype for Business activity b. Mailbox usage c. Office 365 groups d. SharePoint activity 16. Which of the following Azure AD roles can create and manage all aspects of enterprise applications, application registrations, and application proxy settings? a. Authentication administrator b. Application developer c. Application administrator d. Directory readers 17. You have a Microsoft 365 subscription. You need the following information: The amount of malware received through e-mail for the reporting period The amount of malware sent and received through the Office 365 subscription for the reporting period The amount of spam based on the content being filtered or the original sending host being blocked What should you do to accomplish the task? a. View the data loss prevention reports. b. View the Office 365 audit log reports. c. View the protection reports. d. View the rules reports. 18. You have a Microsoft 365 subscription. You need to assign appropriate roles and permissions to the users to enable them to perform the tasks shown in the following table: Table 1: Users and their tasks Name Task User1 Make purchases, manage subscriptions, manage support tickets, and monitor service health. User2 Create and manage all aspects of enterprise applications, application registrations, and application proxy. What role should you assign to each user? a. The license administrator role to User1 and the cloud application administrator role to User 2 b. The authentication administrator role to User1 and the application administrator role to User 2 c. The billing administrator role to User1 and the application administrator role to User2 d. The billing administrator role to User1 and the cloud application administrator role to User2 19. Which of the following Security & Compliance Center role groups' members can control permissions for accessing the Security & Compliance Center and manage settings for device management, data loss prevention, reports, and preservation? a. Organization Management b. Records Management c. reviewerd. eDiscovery Manager 20. What is the prerequisite of installing the Azure AD Application Proxy connector? a. Computers hosting the connectors must be able to send outbound requests to the Internet on UDP port 371. b. Computers must not be able to communicate with the on-premises servers that host the application that will be accessed by remote clients. c. Windows Server needs to have TLS 1.2 enabled. d. The on-premises server must be running the Windows Server 2008 R2. 21. In which of the following scenarios will you use the minimal hybrid migration method to migrate mailboxes? a. For Exchange 2007 having less than 2,000 mailboxes b. For Exchange 2007 to Exchange 2019 having less than 2,000 mailboxes c. For Exchange 2010 or later with no ongoing directory synchronization having an undefined maximum number of mailboxes d. For a Non-Exchange on-premises messaging system having an undefined maximum number of mailboxes 22. Which of the following statements are correct about FastTrack? Each correct answer represents a complete solution. Choose all that apply a. It offers an ongoing repeatable benefit included in your subscription. b. It offers online resources and tools available to all customers. c. It offers end-to-end guidance from Microsoft engineering. d. It is only available for Microsoft 365 and Azure. 23. You are required to install Azure Active Directory Connect. You can either use custom settings or express settings for the installation process. When will you use express settings? a. If you have multiple forests b. If you have a single-forest topology and password hash synchronization for authentication c. If you want to configure optional features not covered otherwise d. In all cases where the express installation option does not satisfy your deployment or topology 24. Which of the following commands will you run to trigger a full sync cycle? a. Start-ADSyncSyncCycle -PolicyType Delta b. Start-ADSyncSyncCycle -PolicyType Initial c. Get-MsolUser Unlicensed Users Only | Set-MsolUser UsageLocation <location> d. Get-MsolUser -UnlicensedUsersOnly 25. Which of the following user roles must a user performing the move have when migrating users from an on-premises environment to the cloud? a. Both User Administrator and Skype for Business Administrator b. CsLocationAdministrator c. Only Skype for Business Administrator d. Only User Administrator 26. Your company uses Gmail as a corporate email solution. You purchase a Microsoft 365 subscription and plan to move all email data to Microsoft Exchange Online. You plan toperform the IMAP migration by using the Exchange admin center. Which type of data can you migrate? a. Email only b. Email, calendar, contacts, and tasks c. Email, calendar, and contacts only d. Email and calendar only 27. What refers to a geographically distributed network that consists of proxy and file servers in data centers connected by high-speed backbone networks? a. CDN b. KMS c. ODT d. SOE 28. Your network contains an on-premises Active Directory forest and you are evaluating the implementation of Microsoft 365 and the deployment of an authentication strategy. You are required to recommend an authentication strategy that meets the following requirements: Allows users to sign in by using smart card-based certificates Allows users to connect to on-premises and Microsoft 365 services by using SSO Requires an SSL certificate Which authentication strategy should you recommend? a. None of these b. Password hash synchronization + seamless SSO c. Federation with Active Directory Federation Services (AD FS) d. Pass-through authentication + seamless SSO 29. Your organization has a Microsoft 365 subscription. Your Microsoft 365 user passwords are, by default, configured to Never Expire. You want to set user passwords to expire after a specific amount of time by configuring the password policy. What steps should you perform to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply. a. In the Days before passwords expire text box, type how often passwords should expire. b. Uncheck the checkbox next to Set user passwords to expire after a number of days. c. Navigate to Microsoft 365 admin center > Settings > Settings and go to the Security & privacy page and select Password expiration policy. d. Select the checkbox next to Set user passwords to expire after a number of days. e. In the Days before a user is notified about expiration text box, type when users are notified that their password will expire, and then click Save changes. 30. Which of the following options allows you to regularly generate reports according to a schedule? a. Message Center b. Security & Compliance Center c. Exchange Admin Center d. Microsoft OneDrive31. You have the latest version of the Office Deployment Tool (ODT). While running ODT, you need to install the downloaded Office 365 ProPlus products and languages on a client computer. In which mode should you run ODT? a. Packager b. Customize c. Download d. Configure 32. What steps should you perform before configuring Office 365 Data Loss Prevention to build out information protection for Microsoft 365 Enterprise? Each correct answer represents a part of the solution. Choose all that apply. a. Configure Windows Information Protection. b. Configure email encryption. c. Configure classification for your environment. d. Define security and information protection levels. e. Configure increased security for Office 365 33. you need to control how frequently Office ProPlus will be updated with new features. You want the most recent features of Office as soon as those features are available. What update channel should you use to accomplish the task? a. Semi-annual channel b. Weekly channel c. Monthly channel d. Semi-annual channel (targeted) 34. you are planning to use the SharePoint Migration Tool. If you select the file share option to migrate data, what will you be required to specify? a. File share location b. All of these c. Document library within the site that will host the files d. URL of the SharePoint Online site 35. Which of the following statements are correct about how Azure AD B2B collaboration works? Each correct answer represents a complete solution. Choose two. a. Azure AD B2B collaboration adds users to the directory once users have redeemed their invitations. b. The redemption experience in OneDrive and SharePoint Online looks similar to that in Azure AD B2B collaboration. c. When you are using Azure AD B2B collaboration, users are added immediately on invitation so that they show up everywhere. d. Azure AD B2B collaboration invited users can be picked from the OneDrive and SharePoint Online sharing dialog boxes. 36. You have a Microsoft 365 subscription. You have a global admin permission and you sign into the Azure portal. You have to add an enterprise application from the gallery. What should you do accomplish the task? a. In the search result pane, click the application that you want to add by clicking Add. b. All of these are correct.c. In the Azure Active Directory admin center, go to Enterprise applications > All applications > New application. d. In the Add an application window, type the name of the application that you want to add. 37. Which of the following optional features of Azure AD Connect provides you with the ability to be more selective about which attributes are synchronized between the onpremises environment and Azure AD? a. Directory extension attribute sync b. Password hash synchronization c. Password writeback d. Azure AD app and attribute filtering 38. Which of the following statements are correct about Azure Active Directory (AD) Privileged Identity Management (PIM)? Each correct answer represents a complete solution. Choose all that apply. a. It is a service that allows you to make role assignment temporary and contingent on approval, instead of making it permanent. b. Using PIM, duties can be segregated within your team, and only that amount of access is granted to users that they need to perform their jobs. c. It provides fine-grained access management of Azure resources, such as virtual machines and storage accounts. d. Azure AD P1 is required for PIM, and you must enable it before it can be configured. 39. Which of the following is a role group whose members can manage device management settings, data loss prevention reports, and preservation? a. Reviewer b. Records management c. Supervisory review d. Compliance administrator 40. Which of the following technologies assists you in blocking out attackers who are trying to brute force user passwords to get in? a. Azure AD smart lockout b. Azure AD password protection c. self-service password reset d. Password-less phone sign-in 41. Which of the following PowerShell commands from the AzureAD module can be used for managing Azure AD Groups? a. Get-AzureADGroup b. Add-AzureADGroupPermission c. Add-AzureADGroupOwner d. Add-AzureADGroupMsolGroup 42. You need to enable Conditional Access based on devices to AD FS (2012 R2 or higher) protected devices. What should you do? a. Enable the password hash synchronization feature. b. Enable the group writeback feature.c. Enable the device writeback feature. d. Enable the password writeback feature. 43. In which of the following authentication methods does Azure AD hand off the authentication process to a separate trusted authentication system? a. Cloud authentication b. Password hash synchronization c. Pass-through authentication d. Federated authentication 44. You have a Microsoft 365 tenant that contains Microsoft Exchange Online. You are planning to share calendar information with an external business partner named . The external business partner also has a Microsoft 365 tenant. You are required to ensure that the calendar of every user is available to the users in immediately. What should you do? a. From the Microsoft 365 admin center, modify the organization profile settings. b. From the Exchange admin center, create a new organization relationship. c. From the Exchange admin center, create a sharing policy. d. From the Microsoft 365 admin center, configure external site sharing. 45. Which of the following PowerShell commands will you use to disable modern authentication?
Written for
- Institution
-
Marymount University
- Module
-
CMIT 382
Document information
- Uploaded on
- September 30, 2022
- Number of pages
- 19
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cmit 382 final exam fall 2022 100 questions correct
-
1 your company has an on premises microsoft exchange server 2016 organization the organization is in the companys main office in melbourne