New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Microsoft Microsoft 365 Certified: Messaging Administrator Associate MS-203 Questions and answers with CertsForce

Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions
Questions # 41:

You need to modify FilesPolicy to prevent users from downloading ASPX files. The solution must meet the technical requirements.

How should you complete the command? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 41


Expert Solution
Questions # 42:

How many default policy tags (DPTs), retention policy tags (RPTs), and personal tags should you create to meet the retention requirements? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 42


Expert Solution
Questions # 43:

You need to perform a remote wipe of the devices of User2 and User3.

You run the following commands.

Clear-MobileDevice -id User2-Device

-NotificationEmailAddress "admin@Fabrikam.com"

Clear-MobileDevice -id User3-Device

-NotificationEmailAddress "admin@Fabrikam.com"

What occurs on each device? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 43


Expert Solution
Questions # 44:

You need to generate a report for the mobile devices that meets the technical requirements.

Which PowerShell cmdlet should you use?

Options:

A.

Get-DevicePolicy


B.

Get-MobileDevice


C.

Get-MobileDeviceStatistics


D.

Get-DeviceTenantPolicy


Expert Solution
Questions # 45:

You need to encrypt email between Fabrikam and Litware to support the planned changes.

What should you configure in the Exchange admin center?

Options:

A.

a connector


B.

an organization relationship


C.

a sharing policy


D.

a remote domain


Expert Solution
Questions # 46:

You need to identify which users clicked the links in the phishing emails.

What should you do?

Options:

A.

Run a message trace and review the results.


B.

Query the mailbox audit log.


C.

Use the URL trace reporting feature.


D.

Review the quarantine mailbox.


Expert Solution
Questions # 47:

User3 leaves the company.

You need to ensure that Admin1 and Admin2 can access the mailbox of User3. The solution must meet the technical requirements.

What should you do?

Options:

A.

Migrate the mailbox of User3 to a distribution group.


B.

Migrate the mailbox of User3 to a Microsoft 365 group.


C.

Convert the mailbox of User3 into a resource mailbox.


D.

Convert the mailbox of User3 into a shared mailbox.


Expert Solution
Questions # 48:

You need to configure the environment to support the planned changes for email addresses.

How should you complete the command? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 48


Expert Solution
Questions # 49:

You need to recommend a solution that meets the security requirements for protecting users.

What should you recommend?

Options:

A.

From the Security & Compliance admin center, create an ATP safe attachments policy.


B.

From the Exchange admin center in Exchange Online, create a spam filter policy.


C.

From the Security & Compliance admin center, create an ATP anti-phishing policy.


D.

From the Security & Compliance admin center, create an ATP Safe Links policy.


Expert Solution
Questions # 50:

You must prevent HelpDeskUser1 from repeating the same mistake.

You need to identify which management role provided HelpDeskUser1 with the necessary permissions to make the mistake identified in the problem statement.

Which two cmdlets should you run? Each correct answer presents part of the solution.

Options:

A.

Get-RoleGroup


B.

Get-ManagementRoleEntry


C.

Get-RoleGroupMember


D.

Get-ManagementRoleAssignment


E.

Get-ManagementRole


Expert Solution
Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions