|Microsoft 365 Messaging
|Microsoft 365 Certified: Messaging Administrator Associate
Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time.
When the Next button is available, click it to access the lab section. In this section, you will perform a set of tasks in a live environment. While most functionality will be available to you as it would be in a live environment, some functionality (e.g., copy and paste, ability to navigate to external websites) will not be possible by design.
Scoring is based on the outcome of performing the tasks stated in the lab. In other words, it doesn't matter how you accomplish the task, if you successfully perform it, you will earn credit for that task.
Labs are not timed separately, and this exam may have more than one lab that you must complete. You can use as much time as you would like to complete each lab. But, you should manage your time appropriately to ensure that you are able to complete the lab(s) and all other sections of the exam in the time provided.
Please note that once you submit your work by clicking the Next button within a lab, you will NOT be able to return to the lab.
Use the following login credentials as needed:
To enter your username, place your cursor in the Sign in box and click on the username below.
To enter your password, place your cursor in the Enter password box and click on the password below.
Microsoft 365 Username: email@example.com
Microsoft 365 Password: xxxxxx
If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.
The following information is for technical support purposes only.
Lab Instance: XXXXXX
You need to prevent email messages that contain attachments that have the .js file extension from being delivered to any recipients in your organization.
To complete this task, sign in to the Microsoft 365 admin center.
You have a Microsoft Exchange Online tenant that uses Microsoft 365 Defender.
You plan to use Attack simulation training to simulate the following attack against users:
• Send an email message that contains a URL.
• If the users click the URL, redirect them to a website that requests a username and password.
Which technique should you use for the simulation?
You have a Microsoft Exchange Online tenant that contains two users named User! and User2.
User1 receives an email message that appears to come from User2.
You discover that the message did NOT originate from User2.
You need to prevent email impersonation in the Exchange environment.
Which type of policy should you use, and which setting should you configure? To answer, select the appropriate options in the answer area.
You have a Microsoft Exchange Online tenant that contains a user named User1.
You need to ensure that User1 receives an email notification and can take corrective action when the Fix possible mail loop insight is generated
What should you use, and to which role group should you add User1? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point