Question 216

You have a Microsoft 365 E5 subscription.
Users and device objects are added and removed daily. Users in the sales department frequently change their device.
You need to create three following groups:

The solution must minimize administrative effort.
What is the minimum number of groups you should create for each type of membership? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

Question 217

You need to create Group3.
What are two possible ways to create the group?
  • Question 218

    You need to configure threat detection for Active Directory. The solution must meet the security requirements.
    Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

    Question 219

    Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some questions sets might have more than one correct solution, while others might not have a correct solution.
    After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
    You have a Microsoft 365 subscription.
    You have a user named User1. Several users have full access to the mailbox of User1.
    Some email messages sent to User1 appear to have been read and deleted before the user viewed them.
    When you search the audit log in Security & Compliance to identify who signed in to the mailbox of User1, the results are blank.
    You need to ensure that you can view future sign-ins to the mailbox of User1.
    You run the Set-AuditConfig -Workload Exchangecommand.
    Does that meet the goal?
  • Question 220

    You configure several Advanced Threat Protection (ATP) policies in a Microsoft 365 subscription.
    You need to allow a user named User1 to view ATP reports in the Threat management dashboard.
    Which role provides User1with the required role permissions?