MS-500試験無料問題集「Microsoft 365 Security Administration 認定」
You have a Microsoft 365 subscription that contains a Microsoft SharePoint Online site named Site1. Site1 contains the folders shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_239.jpg)
At 09:00, you create a Microsoft Cloud App Security policy named Policy1 as shown in the following exhibit.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_241.jpg)
After you create Policy1, you upload files to Site1 as shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_243.jpg)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_244.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_239.jpg)
At 09:00, you create a Microsoft Cloud App Security policy named Policy1 as shown in the following exhibit.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_241.jpg)
After you create Policy1, you upload files to Site1 as shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_243.jpg)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_244.jpg)
正解:
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_245.jpg)
Explanation
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_247.jpg)
Reference:
https://docs.microsoft.com/en-us/cloud-app-security/data-protection-policies
You have a Microsoft 365 subscription that contains the users shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_166.jpg)
You implement Azure Active Directory (Azure AD) Privileged Identity Management (PIM).
From PIM, you review the Application Administrator role and discover the users shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_167.jpg)
The Application Administrator role is configured to use the following settings in PIM:
Maximum activation duration: 1 hour
Notifications: Disable
Incident/Request ticket: Disable
Multi-Factor Authentication: Disable
Require approval: Enable
Selected approver: No results
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_169.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_166.jpg)
You implement Azure Active Directory (Azure AD) Privileged Identity Management (PIM).
From PIM, you review the Application Administrator role and discover the users shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_167.jpg)
The Application Administrator role is configured to use the following settings in PIM:
Maximum activation duration: 1 hour
Notifications: Disable
Incident/Request ticket: Disable
Multi-Factor Authentication: Disable
Require approval: Enable
Selected approver: No results
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_169.jpg)
正解:
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_170.jpg)
Explanation
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_171.jpg)
You have a Microsoft 365 subscription and a Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) subscription.
You have devices enrolled in Microsoft Endpoint Manager as shown in the following table:
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_461.jpg)
You integrate Microsoft Defender ATP and Endpoint Manager.
You plan to evaluate the Microsoft Defender ATP risk level for the devices.
You need to identify which devices can be evaluated.
Which devices should you identify?
You have devices enrolled in Microsoft Endpoint Manager as shown in the following table:
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_461.jpg)
You integrate Microsoft Defender ATP and Endpoint Manager.
You plan to evaluate the Microsoft Defender ATP risk level for the devices.
You need to identify which devices can be evaluated.
Which devices should you identify?
正解:D
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
You have a Microsoft 365 E5 subscription that contains an Azure Active Directory (Azure AD) tenant named contoso.com.
Azure AD Identity Protection alerts for contoso.com are configured as shown in the following exhibit.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_841.jpg)
A user named User1 is configured to receive alerts from Azure AD Identity Protection.
You create users in contoso.com as shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_843.jpg)
The users perform the sign-ins shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_844.jpg)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_845.jpg)
Azure AD Identity Protection alerts for contoso.com are configured as shown in the following exhibit.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_841.jpg)
A user named User1 is configured to receive alerts from Azure AD Identity Protection.
You create users in contoso.com as shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_843.jpg)
The users perform the sign-ins shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_844.jpg)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_845.jpg)
正解:
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_847.jpg)
Explanation
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_848.jpg)
Box 1: No
User1 will receive the two alerts classified as medium or higher.
Sign-ins from infected device is classified as low. This risk detection identifies IP addresses, not user devices.
If several devices are behind a single IP address, and only some are controlled by a bot network, sign-ins from other devices my trigger this event unnecessarily, which is why this risk detection is classified as Low.
Box 2: No
User2 will receive the two alerts classified as medium or higher.
Email alerts are sent to all global admins, security admins and security readers Sign-ins from infected device is classified as low. This risk detection identifies IP addresses, not user devices.
If several devices are behind a single IP address, and only some are controlled by a bot network, sign-ins from other devices my trigger this event unnecessarily, which is why this risk detection is classified as Low.
Box 3: No
User3 will not receive alters.
Email alerts are sent to all global admins, security admins and security readers.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/howto-identity-protection-configure-r
You have a Microsoft 365 subscription.
Your company uses Jamf Pro to manage macOS devices.
You plan to create device compliance policies for the macOS devices based on the Jamf Pro data.
You need to connect Microsoft Endpoint Manager to Jamf Pro.
What should you do first?
Your company uses Jamf Pro to manage macOS devices.
You plan to create device compliance policies for the macOS devices based on the Jamf Pro data.
You need to connect Microsoft Endpoint Manager to Jamf Pro.
What should you do first?
正解:C
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
Refer to exhibit.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_584.jpg)
Microsoft Defender for Endpoint contains the incidents shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_585.jpg)
For each of the following statements, select yes if the statement is true. Otherwise. select No.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_586.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_584.jpg)
Microsoft Defender for Endpoint contains the incidents shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_585.jpg)
For each of the following statements, select yes if the statement is true. Otherwise. select No.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_586.jpg)
正解:
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_587.jpg)
Explanation
Graphical user interface, application Description automatically generated
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_589.jpg)
You have a Microsoft Defender for Endpoint deployment that has custom network indicators turned on.
Microsoft Defender for Endpoint protects two computers that run Windows 10 as shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_347.jpg)
Microsoft Defender foe Endpoint has the device groups shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_349.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_350.jpg)
Microsoft Defender for Endpoint protects two computers that run Windows 10 as shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_347.jpg)
Microsoft Defender foe Endpoint has the device groups shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_349.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_350.jpg)
正解:
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_351.jpg)
Explanation
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_352.jpg)
You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_661.jpg)
You register devices in contoso.com as shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_662.jpg)
You create app protection policies in Intune as shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_664.jpg)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_665.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_661.jpg)
You register devices in contoso.com as shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_662.jpg)
You create app protection policies in Intune as shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_664.jpg)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_665.jpg)
正解:
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_666.jpg)
Explanation
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_668.jpg)
References:
https://docs.microsoft.com/en-us/intune/apps/app-protection-policy
How should you configure Group3? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_27.jpg)
NOTE: Each correct selection is worth one point.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_27.jpg)
正解:
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_29.jpg)
Explanation
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_30.jpg)
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_226.jpg)
Use the following login credentials as needed:
To enter your username, place your cursor in the Sign in box and click on the username below.
To enter your password, place your cursor in the Enter password box and click on the password below.
Microsoft 365 Username:
admin@[email protected]
Microsoft 365 Password: &=Q8v@2qGzYz
If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.
The following information is for technical support only:
Lab instance: 11032396
You need to create a case that prevents the members of a group named Operations from deleting email messages that contain the word IPO.
To complete this task, sign in to the Microsoft Office 365 admin center.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_226.jpg)
Use the following login credentials as needed:
To enter your username, place your cursor in the Sign in box and click on the username below.
To enter your password, place your cursor in the Enter password box and click on the password below.
Microsoft 365 Username:
admin@[email protected]
Microsoft 365 Password: &=Q8v@2qGzYz
If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.
The following information is for technical support only:
Lab instance: 11032396
You need to create a case that prevents the members of a group named Operations from deleting email messages that contain the word IPO.
To complete this task, sign in to the Microsoft Office 365 admin center.
正解:
See explanation below.
Explanation
1. Navigate to the Security & Compliance Center.
2. In the Security & Compliance Center, click eDiscovery > eDiscovery, and then click Create a case.
3. On the New Case page, give the case a name, type an optional description, and then click Save. The case name must be unique in your organization.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_267.jpg)
The new case is displayed in the list of cases on the eDiscovery page.
After you create a case, the next step is to add members to the case. The eDiscovery Manager who created the case is automatically added as a member. Members have to be assigned the appropriate eDiscovery permissions so they can access the case after you add them.
4. In the Security & Compliance Center, click eDiscovery > eDiscovery to display the list of cases in your organization.
5. Click the name of the case that you want to add members to.
The Manage this case flyout page is displayed.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_691.jpg)
6. Under Manage members, click Add to add members to the case.You can also choose to add a role group to the case. Under Manage role groups, click Add.
7. In the list of people or role groups that can be added as members of the case, click the check box next to the names of the people or role groups that you want to add.
8. After you select the people or role groups to add as members of the group, click Add.In Manage this case, click Save to save the new list of case members.
9. Click Save to save the new list of case members.
You can use an eDiscovery case to create holds to preserve content that might be relevant to the case. You can place a hold on the mailboxes and OneDrive for Business sites of people who are custodians in the case. You can also place a hold on the group mailbox, SharePoint site, and OneDrive for Business site for an Office 365 Group. Similarly, you can place a hold on the mailboxes and sites that are associated with Microsoft Teams or Yammer Groups. When you place content locations on hold, content is held until you remove the hold from the content location or until you delete the hold.
To create a hold for an eDiscovery case:
1. In the Security & Compliance Center, click eDiscovery > eDiscovery to display the list of cases in your organization.
2. Click Open next to the case that you want to create the holds in.
3. On the Home page for the case, click the Hold tab.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_268.jpg)
4. On the Hold page, click Create.
5. On the Name your hold page, give the hold a name. The name of the hold must be unique in your organization.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_270.jpg)
6. (Optional) In the Description box, add a description of the hold.
7. Click Next.
8. Choose the content locations that you want to place on hold. You can place mailboxes, sites, and public folders on hold.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_272.jpg)
a. Exchange email - Click Choose users, groups, or teams and then click Choose users, groups, or teams again.
to specify mailboxes to place on hold. Use the search box to find user mailboxes and distribution groups (to place a hold on the mailboxes of group members) to place on hold. You can also place a hold on the associated mailbox for a Microsoft Team, a Yammer Group, or an Office 365 Group. Select the user, group, team check box, click Choose, and then click Done.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_696.jpg)
a. In the box under Keywords, type a search query in the box so that only the content that meets the search criteria is placed on hold. You can specify keywords, message properties, or document properties, such as file names. You can also use more complex queries that use a Boolean operator, such as AND, OR, or NOT. If you leave the keyword box empty, then all content located in the specified content locations will be placed on hold.
b. Click Add conditions to add one or more conditions to narrow the search query for the hold. Each condition adds a clause to the KQL search query that is created and run when you create the hold. For example, you can specify a date range so that email or site documents that were created within the date ranged are placed on hold. A condition is logically connected to the keyword query (specified in the keyword box) by the AND operator. That means that items have to satisfy both the keyword query and the condition to be placed on hold.
9. After configuring a query-based hold, click Next.
10. Review your settings, and then click Create this hold.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/ediscovery-cases?view=o365-worldwide
Explanation
1. Navigate to the Security & Compliance Center.
2. In the Security & Compliance Center, click eDiscovery > eDiscovery, and then click Create a case.
3. On the New Case page, give the case a name, type an optional description, and then click Save. The case name must be unique in your organization.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_267.jpg)
The new case is displayed in the list of cases on the eDiscovery page.
After you create a case, the next step is to add members to the case. The eDiscovery Manager who created the case is automatically added as a member. Members have to be assigned the appropriate eDiscovery permissions so they can access the case after you add them.
4. In the Security & Compliance Center, click eDiscovery > eDiscovery to display the list of cases in your organization.
5. Click the name of the case that you want to add members to.
The Manage this case flyout page is displayed.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_691.jpg)
6. Under Manage members, click Add to add members to the case.You can also choose to add a role group to the case. Under Manage role groups, click Add.
7. In the list of people or role groups that can be added as members of the case, click the check box next to the names of the people or role groups that you want to add.
8. After you select the people or role groups to add as members of the group, click Add.In Manage this case, click Save to save the new list of case members.
9. Click Save to save the new list of case members.
You can use an eDiscovery case to create holds to preserve content that might be relevant to the case. You can place a hold on the mailboxes and OneDrive for Business sites of people who are custodians in the case. You can also place a hold on the group mailbox, SharePoint site, and OneDrive for Business site for an Office 365 Group. Similarly, you can place a hold on the mailboxes and sites that are associated with Microsoft Teams or Yammer Groups. When you place content locations on hold, content is held until you remove the hold from the content location or until you delete the hold.
To create a hold for an eDiscovery case:
1. In the Security & Compliance Center, click eDiscovery > eDiscovery to display the list of cases in your organization.
2. Click Open next to the case that you want to create the holds in.
3. On the Home page for the case, click the Hold tab.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_268.jpg)
4. On the Hold page, click Create.
5. On the Name your hold page, give the hold a name. The name of the hold must be unique in your organization.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_270.jpg)
6. (Optional) In the Description box, add a description of the hold.
7. Click Next.
8. Choose the content locations that you want to place on hold. You can place mailboxes, sites, and public folders on hold.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_272.jpg)
a. Exchange email - Click Choose users, groups, or teams and then click Choose users, groups, or teams again.
to specify mailboxes to place on hold. Use the search box to find user mailboxes and distribution groups (to place a hold on the mailboxes of group members) to place on hold. You can also place a hold on the associated mailbox for a Microsoft Team, a Yammer Group, or an Office 365 Group. Select the user, group, team check box, click Choose, and then click Done.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_696.jpg)
a. In the box under Keywords, type a search query in the box so that only the content that meets the search criteria is placed on hold. You can specify keywords, message properties, or document properties, such as file names. You can also use more complex queries that use a Boolean operator, such as AND, OR, or NOT. If you leave the keyword box empty, then all content located in the specified content locations will be placed on hold.
b. Click Add conditions to add one or more conditions to narrow the search query for the hold. Each condition adds a clause to the KQL search query that is created and run when you create the hold. For example, you can specify a date range so that email or site documents that were created within the date ranged are placed on hold. A condition is logically connected to the keyword query (specified in the keyword box) by the AND operator. That means that items have to satisfy both the keyword query and the condition to be placed on hold.
9. After configuring a query-based hold, click Next.
10. Review your settings, and then click Create this hold.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/ediscovery-cases?view=o365-worldwide
You view Compliance Manager as shown in the following exhibit.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_884.jpg)
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_885.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_884.jpg)
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_885.jpg)
正解:
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_887.jpg)
Explanation
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_888.jpg)
Reference:
https://docs.microsoft.com/en-us/office365/securitycompliance/meet-data-protection-and-regulatory-reqs-using-m
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_100.jpg)
Use the following login credentials as needed:
To enter your username, place your cursor in the Sign in box and click on the username below.
To enter your password, place your cursor in the Enter password box and click on the password below.
Microsoft 365 Username:
admin@[email protected]
Microsoft 365 Password: #HSP.ug?$p6un
If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.
The following information is for technical support only:
Lab instance: 11122308
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_103.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_105.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_107.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_109.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_905.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_907.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_908.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_910.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_912.jpg)
You need to create a retention policy that contains a data label. The policy must delete all Microsoft Office
365 content that is older than six months.
To complete this task, sign in to the Microsoft 365 admin center.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Username and password
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_100.jpg)
Use the following login credentials as needed:
To enter your username, place your cursor in the Sign in box and click on the username below.
To enter your password, place your cursor in the Enter password box and click on the password below.
Microsoft 365 Username:
admin@[email protected]
Microsoft 365 Password: #HSP.ug?$p6un
If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.
The following information is for technical support only:
Lab instance: 11122308
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_103.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_105.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_107.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_109.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_905.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_907.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_908.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_910.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_912.jpg)
You need to create a retention policy that contains a data label. The policy must delete all Microsoft Office
365 content that is older than six months.
To complete this task, sign in to the Microsoft 365 admin center.
正解:
See explanation below.
Explanation
Creating Office 356 labels is a two-step process. The first step is to create the actual label which includes the name, description, retention policy, and classifying the content as a record. Once this is completed, the second step requires the deployment of a label using a labelling policy which specifies the specific location to publish and applying the label automatically.
To create an Office 365 label, following these steps:
1. Open Security and Compliance Centre;
2. Click on Classifications;
3. Click on Labels;
4. The label will require configuration including: name your label (Name), add a description for the admins ( Description for Admins), add a description for the users (Description for Users);
5. Click Next once the configuration is completed;
6. Click Label Settings on the left-hand side menu;
7. The Label Settings will need to be configured. On this screen, you can toggle the Retention switch to either
"on" or "off". If you choose "on", then you can answer the question "When this label is applied to content" with one of two options. The first option is to . From the pick boxes, you can choose the length of retention and upon the end of the retention, the action that will take place. The three actions are to delete the data, trigger an approval flow for review, or nothing can be actioned. The second option is to not retain the data after a specified amount of time or based on the age of the data; and
8. The label has now been created.
To create a label policy, follow these steps:
1. Open Security and Compliance Centre
2. Click on Data Governance, Retention
3. Choose Label Policies box at the top of the screen; and
4. There are now two options. The first is to . If your organization wants its end users to apply the label manually, then this is the option you would choose. Note that this is location based. The second option is to Auto-apply Labels. With Auto-apply, you would have the ability to automatically apply a label when it meets the specified criteria.
References:
https://www.maadarani.com/office-365-classification-and-retention-labels/
Explanation
Creating Office 356 labels is a two-step process. The first step is to create the actual label which includes the name, description, retention policy, and classifying the content as a record. Once this is completed, the second step requires the deployment of a label using a labelling policy which specifies the specific location to publish and applying the label automatically.
To create an Office 365 label, following these steps:
1. Open Security and Compliance Centre;
2. Click on Classifications;
3. Click on Labels;
4. The label will require configuration including: name your label (Name), add a description for the admins ( Description for Admins), add a description for the users (Description for Users);
5. Click Next once the configuration is completed;
6. Click Label Settings on the left-hand side menu;
7. The Label Settings will need to be configured. On this screen, you can toggle the Retention switch to either
"on" or "off". If you choose "on", then you can answer the question "When this label is applied to content" with one of two options. The first option is to . From the pick boxes, you can choose the length of retention and upon the end of the retention, the action that will take place. The three actions are to delete the data, trigger an approval flow for review, or nothing can be actioned. The second option is to not retain the data after a specified amount of time or based on the age of the data; and
8. The label has now been created.
To create a label policy, follow these steps:
1. Open Security and Compliance Centre
2. Click on Data Governance, Retention
3. Choose Label Policies box at the top of the screen; and
4. There are now two options. The first is to . If your organization wants its end users to apply the label manually, then this is the option you would choose. Note that this is location based. The second option is to Auto-apply Labels. With Auto-apply, you would have the ability to automatically apply a label when it meets the specified criteria.
References:
https://www.maadarani.com/office-365-classification-and-retention-labels/
You have a Microsoft 365 E5 subscription that contains the users shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_517.jpg)
You plan to implement Azure Active Directory (Azure AD) Identity Protection.
You need to identify which users can perform the following actions:
Configure a user risk policy.
View the risky users report.
Which users should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_519.jpg)
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_517.jpg)
You plan to implement Azure Active Directory (Azure AD) Identity Protection.
You need to identify which users can perform the following actions:
Configure a user risk policy.
View the risky users report.
Which users should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_519.jpg)
正解:
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_520.jpg)
Explanation
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_522.jpg)
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection
You have a Microsoft 165 ES subscription that contains users named User 1 and User2?
You have the audit log retention requirements shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_490.jpg)
You need to create audit retention policies to meet the requirements. The solution must minimize cost and the number of policies.
What is the minimum number of audit retention policies that you should create?
You have the audit log retention requirements shown in the following table.
![](https://www.goshiken.com/uploads/imgs/MS-500 V22.65/img_490.jpg)
You need to create audit retention policies to meet the requirements. The solution must minimize cost and the number of policies.
What is the minimum number of audit retention policies that you should create?
正解:D
解答を投票する
You have a Microsoft 365 subscription linked to an Azure Active Directory (Azure AD) tenant that contains a user named User1. You need to grant User1 permission to search Microsoft 365 audit logs. The solution must use the principle of least privilege. Which rote should you assign to User1?
正解:D
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)