DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Online Microsoft MS-500 Mock Tests & Study Materials, Microsoft 365 Security Administration | SPOTO

Dive into our meticulously designed mock tests and study materials, specifically tailored to equip you with the skills and knowledge required to excel in the MS-500 certification exam. Explore our extensive range of resources, including practice tests, sample questions, and exam dumps, meticulously curated to simulate the exam environment and enhance your understanding of key concepts. Our mock exams provide invaluable insights into your readiness for the real exam, while our study materials cover essential topics such as authentication, access control, threat protection, and compliance enforcement. Stay ahead of the curve with our latest practice tests, continuously updated to align with the evolving exam trends. Let SPOTO be your trusted companion on your journey to becoming a certified Microsoft 365 Security Administrator.
Take other online exams

Question #1
You have a Microsoft 365 E5 subscription. You implement Advanced Threat Protection (ATP) safe attachments policies for all users. User reports that email messages containing attachments take longer than expected to be received. You need to reduce the amount of time it takes to receive email messages that contain attachments. The solution must ensure that all attachments are scanned for malware. Attachments that have malware must be blocked. What should you do from ATP?
A. Set the action to Block
B. Add an exception
C. Add a condition
D. Set the action to Dynamic Delivery
View answer
Correct Answer: D
Question #2
HOTSPOT You are evaluating which devices are compliant in Intune. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
A. Mastered
B. Not Mastered
View answer
Correct Answer: C
Question #3
HOTSPOT You are evaluating which finance department users will be prompted for Azure MFA credentials. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
A. Mastered
B. Not Mastered
View answer
Correct Answer: A
Question #4
You have a Microsoft 365 subscription. You need to ensure that all users who are assigned the Exchange administrator role have multi-factor authentication (MFA) enabled by default. What should you use to achieve the goal?
A. Security & Compliance permissions
B. Microsoft Azure Active Directory (Azure AD) Privileged Identity Management
C. Microsoft Azure AD group management
D. Microsoft Office 365 user management
View answer
Correct Answer: B
Question #5
You have a Microsoft 365 subscription. You need to create data loss prevention (DLP) queries in Microsoft SharePoint Online to find sensitive data stored in sites. Which type of site collection should you create first?
A. Records Center
B. Compliance Policy Center
C. eDiscovery Center
D. Enterprise Search Center
E. Document Center
View answer
Correct Answer: A
Question #6
HOTSPOT You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table. You create and enforce an Azure AD Identity Protection sign-in risk policy that has the following settings: ?Assignments: Include Group1, Exclude Group2 ?Conditions: Sign in risk of Low and above ?Access: Allow access, Require password multi-factor authentication You need to identify how the policy affects User1 and User2. What occurs when each user signs in from an a
A. Mastered
B. Not Mastered
View answer
Correct Answer: A
Question #7
DRAG DROP You have a Microsoft 365 E5 subscription. All computers run Windows 10 and are onboarded to Windows Defender Advanced Threat Protection (Windows Defender ATP). You create a Windows Defender machine group named MachineGroupl. You need to enable delegation for the security settings of the computers in MachineGroupl. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
A. Mastered
B. Not Mastered
View answer
Correct Answer: CE
Question #8
Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a Microsoft 365 tenant. You create a label named CompanyConfidential in
A. Yes
B. No
View answer
Correct Answer: D
Question #9
DRAG DROP You need to configure threat detection for Active Directory. The solution must meet the security requirements. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
A. Mastered
B. Not Mastered
View answer
Correct Answer: A
Question #10
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a Microsoft 365 subscription that contains the users shown in the fol
A. Yes
B. No
View answer
Correct Answer: B
Question #11
You have a Microsoft 365 E5 subscription and a hybrid Microsoft Exchange Server organization. Each member of a group named Executive has an on-premises mailbox. Only the Executive group members have multi-factor authentication (MFA) enabled. Each member of a group named Research has a mailbox in Exchange Online. You need to use Microsoft Office 365 Attack simulator to model a spear-phishing attack that targets the Research group members. The email address that you intend to spoof belongs to the Executive gr
A. From Azure ATP admin center, configure the primary workspace settings
B. From the Microsoft Azure portal, configure the user risk settings in Azure AD Identity Protection
C. Enable MFA for the Research group members
D. Migrate the Executive group members to Exchange Online
View answer
Correct Answer: C
Question #12
You have a hybrid Microsoft 365 environment. All computers run Windows 10 and are managed by using Microsoft Intune. You need to create a Microsoft Azure Active Directory (Azure AD) conditional access policy that will allow only Windows 10 computers marked as compliant to establish a VPN connection to the on- premises network. What should you do first?
A. From the Azure Active Directory admin center, create a new certificate
B. Enable Application Proxy in Azure AD
C. From Active Directory Administrative Center, create a Dynamic Access Control policy
D. From the Azure Active Directory admin center, configure authentication methods
View answer
Correct Answer: A
Question #13
Your company has a Microsoft 365 subscription. The company forbids users to enroll personal devices in mobile device management (MDM). Users in the sales department have personal iOS devices. You need to ensure that the sales department users can use the Microsoft Power BI app from iOS devices to access the Power BI data in your tenant. The users must be prevented from backing up the app’s data to iCloud. What should you create?
A. a conditional access policy in Microsoft Azure Active Directory (Azure AD) that has a device state condition
B. an app protection policy in Microsoft Intune
C. a conditional access policy in Microsoft Azure Active Directory (Azure AD) that has a client apps condition
D. a device compliance policy in Microsoft Intune
View answer
Correct Answer: B
Question #14
You configure several Advanced Threat Protection (ATP) policies in a Microsoft 365 subscription. You need to allow a user named User1 to view ATP reports in the Threat management dashboard. Which role provides User1with the required role permissions?
A. Security reader
B. Message center reader
C. Compliance administrator
D. Information Protection administrator
View answer
Correct Answer: A
Question #15
Your company has 500 computers. You plan to protect the computers by using Windows Defender Advanced Threat Protection (Windows Defender ATP). Twenty of the computers belong to company executives. You need to recommend a remediation solution that meets the following requirements: Windows Defender ATP administrators must manually approve all remediation for the executives Remediation must occur automatically for all other users What should you recommend doing from Windows Defender Security Center?
A. Configure 20 system exclusions on automation allowed/block lists
B. Configure two alert notification rules
C. Download an offboarding package for the computers of the 20 executives
D. Create two machine groups
View answer
Correct Answer: D
Question #16
Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a Microsoft 365 tenant. You create a label named CompanyConfidential in
A. Yes
B. No
View answer
Correct Answer: A
Question #17
You create a data loss prevention (DLP) policy as shown in the following shown: What is the effect of the policy when a user attempts to send an email messages that contains sensitive information?
A. The user receives a notification and can send the email message
B. The user receives a notification and cannot send the email message
C. The email message is sent without a notification
D. The email message is blocked silently
View answer
Correct Answer: B

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: