You discover that Policy1 failed to apply to the Executives group.
You need to ensure that Policy1 is applied to all the members of the Executives group.
What should you do?
A. Increase the priority of Policy1.
B. Decrease the priority of Strict Preset Security Policy.
C. Remove the Executives group from the Strict protection preset security policy.
D. Modify the Strict protection preset security policy to match Policy? and assign the Strict protection preset security policy to contoso.com.
You have a Microsoft Exchange Online tenant.
You plan to place a hold on all email messages stored in the mailbox of a user named User1.
What should you create first?
A. an eDiscovery case
B. sensitive info type
C. a data loss prevention (DLP) policy
D. an information barrier segment
You have two servers named EXCH1 and EXCH2 that run Windows Server 2012 R2 and have Microsoft Exchange 2016 installed.
You purchase a Microsoft 365 subscription.
You plan to configure a hybrid deployment between an Exchange Online tenant and the on- premises Exchange Server Organization.
You need to identify the prerequisites to installing the Microsoft Hybrid Agent on EXCH1 and EXCH2.
Which two prerequisites should you identify?
Each correct answer presents part of the solution.
A. All outbound HTTPS connections to Microsoft Online Services
B. Enable Hybrid Modern Authentication (HMA).
C. Upgrade the operating system of EXCH1 and EXCH2 to Windows Server 2019.
D. Enable TLS 1.2.
You have a Microsoft Exchange Online tenant that uses an email domain named contoso.corn.
An in-caning email messages route through an third-party filtering service named Filter1 to connector named Connector
You discover that incoming messages contain headers that specify the source IP address as Filter1.
You to ensure that incoming email messages contain headers that specify source IP address of the original sender. The solution must prevent any charges to the service.
What should you do?
A. From Microsoft 365 Defender portal configure enhanced filtering for Connector1.
B. Configure Connector to authenticate messages by using the IP address of Filter service.
C. Configure the MX Of contoso.com to point to contoso-can.mailgotection.outbok.com.
D. From the Exchange admin center. create a transport rule to rewrite header for incoming messages.
You have a Microsoft Exchange Online tenant that contains a custom role group named RGI.
You need to prevent users assigned to RGI from running a specific cmdlet.
Which cmdlet should you run to modify RG1?
A. Remove Entry
B. Remove -ManagementRoleAssignment
C. Set-ManagementScope
D. Disable -Cmd1etExtensionAgent
You have a hybrid deployment between a Microsoft Exchange Online tenant and an onpremises Exchange Server 2019 organization.
Users report that email messages between the Exchange Server organization and the Exchange Online tenant are undelivered.
You install and enable a new certificate from a different trusted certification authority (CA). You
need to ensure that mail flow between Exchange Server and Exchange Online is restored.
Which two PowerShell cmdlets should you run? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A. Set-SendConnector
B. Set-IntraOrganirationConnector
C. Update-Hybridconfiguration
D. Set-ReceiveConnector
You have a Microsoft Exchange Online tenant that uses Microsoft Defender for Office 365. You have the policies shown in the following table.
You need to track any modifications made to Policy! by the identifying following:
1.
The name of the user that modified the policy
2.
The old and new values of settings modified in Policy!
3.
How the modifications compare to the baseline settings of Standard Preset Security Policy What should you use in the Microsoft 365 Defender portal?
A. Threat tracker
B. Threat analytics
C. Audit
D. Configuration analyzer
You have a Microsoft Exchange Online tenant that uses Microsoft Defender for Office 365.
You need to create a new Safe Attachments policy named Policy1 that meets the following requirements:
1.
Immediately delivers email messages that contain attachments and replaces the attachments with placeholders
2.
Reattaches the attachments after scanning is complete
3.
Quarantines malicious attachments Which action should you select for Policy1?
A. Monitor
B. Block
C. Dynamic Delivery
D. Replace
You need to configure the Exchange organization to meet the security requirements for sending email messages to distribution groups.
Which cmdlet should you run?
A. Set-OrganizationConfig
B. Set-DistributionGroup
C. Set-Mailbox
D. New-PolicyipConfig
You need to recommend a solution for the public folders that supports the planned changes and meets the technical requirements. What should you recommend?
A. Office 365 groups
B. Resource mailboxes
C. Public folder replicas
D. Microsoft SharePoint site mailboxes
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MS-203 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.