How to Pass the M365 Technical Support Engineer Exam

IRAKOZE Yves
20 min readMar 17, 2023

1. A user needs to download a tax document from a financial website. Which of the following is the website MOST likely to use for transmission of the document to the user’s browser?

- HTTP

- HTTPS

- SFTP

- FTP

The financial website is most likely to use HTTPS for transmission of the tax document to the user’s browser. HTTPS is a secure version of HTTP, which encrypts the data being transmitted between the website and the user’s browser. This helps to protect the privacy and security of sensitive information, such as financial documents, during transmission. SFTP (Secure File Transfer Protocol) is also a secure protocol, but it is typically used for transferring files between servers, rather than between a server and a browser. FTP (File Transfer Protocol) is not a secure protocol, as it transmits data in clear text, so it is less likely to be used for transmitting sensitive information.

2. In Office 365 a user or a mailbox can be hard detected via PowerShell

- True

- False

- It is possible only for the user

- It is possible only for Mailbox

The correct answer is True.

In Office 365, it is possible to hard delete a user or mailbox using PowerShell. The command to do so is “Remove-MsolUser” for users and “Remove-Mailbox” for mailboxes. However, please be cautious when using these commands as they permanently delete the user or mailbox and their associated data.

3. Which of the following are valid file systems? Select more than one:

- Ext4

- FAT16

- FAT100

- NTFS

The correct answers are:

Ext4, FAT16, NTFS

Ext4 is a commonly used file system in Linux operating systems. FAT16 and NTFS are file systems used in Windows operating systems. FAT100, however, is not a valid file system.

4. What does NAT stand for?

- Network Address table

- Network Address Translation

- Network Association Table

- None of the above

The correct answer is. Network Address Translation.

NAT stands for Network Address Translation. It is a technique used in networking to map an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. This allows multiple devices to share a single public IP address, enabling them to access the internet.

5. What is cache memory?

- Temporary memory

- Random access memory

- Disk memory

- None of the above

The correct answer is. Temporary memory.

Cache memory is a small, high-speed memory that stores frequently accessed data and instructions closer to the CPU (Central Processing Unit) for quick access. It is a type of temporary memory that helps to improve computer performance by reducing the amount of time it takes to access data from the main memory (RAM). Cache memory is faster than RAM and is more expensive to manufacture. It is commonly used in CPUs, hard drives, and web browsers.

6. What is a Windows Domain?

- A computer network in which all user accounts and computers are registered

- A group of computers sharing data across the network.

- A type of website protocol

- A local network access protocol

The correct answer is. A computer network in which all user accounts and computers are registered.

A Windows Domain is a type of computer network in which all user accounts, computers, and devices are registered with a central directory database called Active Directory. It allows administrators to manage users and computers within a network more efficiently by applying policies and permissions to groups of users or computers. Users can log in to any computer on the network with their domain credentials, and they will have access to their user profile, files, and permissions. The domain controller manages the authentication and authorization of users and computers within the domain.

7. What do Office 365 Groups link and associate with?

- The entire SharePoint Team Site

- Just the document library added

- Only apps associated with the group

- None of the above

The correct answer is. The entire SharePoint Team Site.

Office 365 Groups link and associate with the entire SharePoint Team Site. When an Office 365 Group is created, a SharePoint Team Site is also created with the same name as the group. The Team Site contains a document library, a calendar, and other SharePoint features. The Office 365 Group is used to manage membership and access to the SharePoint Team Site. When a user is added to an Office 365 Group, they are granted access to the SharePoint Team Site and all its associated features. Any documents or files added to the document library of the SharePoint Team Site are also accessible to the members of the Office 365 Group.

8. In Office 365 a native app:

- has been developed for use on Windows

- has been developed for use on a specific platform or device

- has been developed for use on iOS

- has been developed for use on Android

The correct answer is Has been developed for use on a specific platform or device.

In Office 365, a native app is a software application that has been developed specifically for use on a particular platform or device, such as Windows, iOS, or Android. Native apps are designed to provide optimal performance and user experience on a particular platform, taking advantage of the unique features and capabilities of that platform. Office 365 includes a suite of native apps for different platforms, such as Microsoft Word, Excel, and PowerPoint for Windows, iOS, and Android. However, not all Office 365 apps have native versions for every platform. Some apps may only be available for use on specific platforms or devices.

9. Two of the authentication method options Exchange provides are:

- OAuth and HTTP

- Basic and HTTPS

- HTTPS and HTTP

- Basic and NTLM

The correct answer is Basic and NTLM.

Exchange provides several authentication methods to help secure communications between the client and the server. Two of the authentication method options Exchange provides are Basic and NTLM.

Basic authentication is a standard authentication method that requires users to provide a username and password to access the system. It transmits the username and password in plain text over the network, so it is not considered to be a secure method.

NTLM (NT LAN Manager) authentication is a more secure authentication method that uses a challenge-response mechanism to authenticate users. When a user logs in, the server sends a challenge to the client, which is used to encrypt the user’s password. The client then sends the encrypted password back to the server for authentication.

OAuth is a protocol for authorizing third-party applications to access user data without requiring the user to provide their username and password to the third-party application. HTTP and HTTPS are not authentication methods but are protocols used for communication over the network.

10. Which of the following is a common characteristic of open-source software?

- Update cycles are dictated by the manufacture

- Modifications to core functionalities are made by the manufacture

- Can only run on certain manufacturer processors

- Can be modified and shared by the user

The correct answer is. Can be modified and shared by the user.

A common characteristic of open-source software is that it can be modified and shared by the user. Open-source software is software that is made freely available to the public, and its source code is open for anyone to view, modify, and distribute. This allows users to customize the software to suit their needs, fix bugs, and contribute to its development.

In contrast, proprietary software is owned and controlled by the manufacturer, and the source code is not typically made available to the public. Update cycles and modifications to core functionalities are typically dictated by the manufacturer, and users do not have the same level of control and flexibility that they do with open-source software.

The type of processor a software can run on is not typically determined by whether it is open-source or proprietary, but rather by the software’s design and compatibility with the hardware architecture.

11. What is the definition of a LAN?

- A group of devices nearby that is interconnected via hubs, switches, or routers.

- Normally find within a business and school

- These are computers that share resources over a large area

- None of the above

The correct answer is. A group of devices nearby that is interconnected via hubs, switches, or routers.

LAN stands for Local Area Network. It is a group of devices, such as computers, printers, and servers, that are located in a small geographic area and are interconnected via hubs, switches, or routers. The devices are typically owned by a single organization, such as a business, school, or home, and the LAN is used to share resources, such as files, printers, and internet access.

The devices on a LAN can communicate with each other at high speeds, making it an efficient way to share resources and collaborate on projects. In contrast, a WAN (Wide Area Network) is a network that covers a larger geographic area, such as multiple buildings, cities, or countries, and typically uses the internet or other public networks to connect devices.

12. Cloud computing allows you to access information from:

- Notebooks & Smartphones

- Your Desktop Computer

- Video Game Systems

- All of the above

The correct answer is. Notebooks & Smartphones.

Cloud computing allows you to access information and applications from remote servers over the internet, rather than relying on software and data stored on your local computer. This means that you can access your data and applications from anywhere with an internet connection, including laptops, smartphones, and other mobile devices.

While some video game systems may have the capability to access cloud-based services, cloud computing is primarily focused on providing access to software and data from a variety of devices, including laptops, smartphones, and tablets. Your desktop computer can also access cloud-based services, but it is not limited to this method of computing.

13. What is the purpose of DNS?

- A hierarchical naming system for computers, services, and resources connected only to the internet

- A hierarchical naming system for computers, services, and resources connected to the internet or private network

- A hierarchical naming system for computers, services, and resources connected only to private networks.

- None of the above

The correct answer is. A hierarchical naming system for computers, services, and resources connected to the internet or private network.

DNS (Domain Name System) is a hierarchical naming system used to translate domain names, which are easy-to-remember human-readable addresses, into IP (Internet Protocol) addresses, which are numerical addresses used by computers to communicate with each other over the internet or private network.

DNS is used to help users navigate the internet and access resources such as websites, email servers, and other services. When a user types a domain name into their web browser, the browser sends a request to a DNS server, which response with the corresponding IP address for the domain. The browser can then use this IP address to connect to the web server hosting the website or service.

14. What’s an example of Firmware?

- OS

- BIOS

- Open Source

The correct answer is BIOS.

Firmware is a type of software that is embedded into a hardware device, such as a computer’s motherboard, printer, or router and is responsible for controlling and managing the hardware’s functionality. Firmware is typically stored in non-volatile memory, such as ROM or flash memory, and is designed to be long-lasting and not easily modified by the end user.

Examples of firmware include the BIOS (Basic Input/Output System) that is used to boot up a computer, the firmware in a printer that controls the print head and other components, and the firmware in a router that manages network traffic and security settings.

An operating system (OS) is a type of software that manages computer hardware and software resources and provides common services for computer programs. Open source refers to software that is developed in a collaborative, transparent, and publicly accessible manner, where the source code is freely available and can be modified and distributed by anyone.

15. What is RODC stand for?

- Redundant Objective Domain Commands

- Ready-only Domain Controller

- Readable Operating Disk Cache

- Read-only Datacenter

The correct answer is “Read-only Domain Controller (RODC).”

An RODC is a type of domain controller in the Windows Server operating system that is designed to provide an additional layer of security for remote branch offices or other locations where physical security cannot be guaranteed. An RODC has a read-only copy of the Active Directory database and cannot be directly modified, which helps to protect against the risks of data theft or tampering. When a user attempts to authenticate with an RODC, it will forward the authentication request to a writable domain controller in the network.

16. In Active Directory, what is a window, Domain?

- A computer network in which all user accounts and computers are registered

- A peer-to-peer network where user accounts are decentralized and stored on each computer

- A part of the website address

- A part of the local network

The correct answer is 1. A Windows Domain in Active Directory is a computer network in which all user accounts and computers are registered. It provides centralized management of network resources such as users, computers, printers, and security policies.

A Windows Domain in Active Directory is a computer network in which all user accounts and computers are registered. It provides centralized management of network resources such as users, computers, printers, and security policies.

17. Which of the following is NOT a valid distribution of Window Server 2012?

- Premium

- Datacenter

- Essentials

- Standard

All of the options you listed are valid distributions of Windows Server 2012. There are, however, a few other distributions of Windows Server 2012 that is not mentioned, such as Foundation and Web editions.

18. An internet connection is necessary for cloud computing interaction.

- True

- False

True, an internet connection is necessary for cloud computing interaction. Cloud computing typically involves accessing remote computing resources, such as servers or applications, over the internet. Without an internet connection, it would not be possible to interact with these resources.

19. Which of the following cable types should be installed to minimize toxic fumes in the event of a fire?

- Fiber

- STP CAT6

- Plenum

- Coaxial

Plenum cables should be installed to minimize toxic fumes in the event of a fire. Plenum cables are designed to have low smoke and low flame characteristics, and they are typically used in air handling spaces, such as ducts and plenums, where the spread of smoke and toxic fumes can be a major concern in the event of a fire. Fiber optic cables are also a good choice for their resistance to flame and lack of electrical conductivity, but they may not necessarily be designed specifically to minimize toxic fumes. STP CAT6 and coaxial cables are not typically used for their fire safety characteristics.

20. Office 365 (E3 License) includes (choose one):

- Word, Excel, PowerPoint

- Skype, Yammer

- Power BI, one Drive

- All of the above

Office 365 (E3 License) includes all of the options you listed and more, so the correct answer is “4. All of the above.” In addition to Word, Excel, and PowerPoint, Office 365 (E3 License) also includes applications such as Outlook, Access, Publisher, Teams, and SharePoint. It also includes cloud services such as OneDrive for Business, Exchange Online, and Microsoft Stream, as well as security and compliance features.

21. Which of the following technologies allows people to communicate all over the world inexpensively?

- Virtualization

- SSID

- Kinetics

- VoIP

The technology that allows people to communicate all over the world inexpensively is VoIP or Voice over Internet Protocol. VoIP allows voice communications to be transmitted over the internet, rather than over traditional telephone networks, which can be much more expensive. Virtualization is a technology that allows multiple virtual machines to run on a single physical machine and is not directly related to communication. SSID (Service Set Identifier) is a wireless network identifier, and kinetics is the study of motion and forces.

22. Which of the following examples is NOT a DNS Zone type of record?

- TXT

- A

- SOA

- SPF

All of these are valid DNS zone-type records, so the answer is none of the above.

A TXT record is used to associate any text with a domain or a subdomain.

An A record is used to map a domain name to the IP address of a web server.

An SOA (Start of Authority) record is a type of DNS record that provides administrative information about a DNS zone, such as the primary name server for the zone.

An SPF (Sender Policy Framework) record is a type of DNS record used to identify which mail servers are authorized to send emails on behalf of a particular domain.

23. In exchange, a transport pipeline is –

- A collection of services, connections, and components working together.

- A queue file where all messages are stored.

- A service in charge of sending the email to internet

- An inbound connector

In Exchange, a transport pipeline is a collection of services, connections, and components working together to route and process messages. The transport pipeline is responsible for processing all messages that enter and exit the Exchange organization, including email messages, calendar invites, and other types of data.

The transport pipeline consists of several stages, each with its own set of services and components that perform specific tasks such as message categorization, content inspection, and delivery. The pipeline also includes connectors, which are responsible for establishing connections with other email systems and routing messages to their intended destinations.

24. A customer complains that an email is sent to the Junk folder when it shouldn’t be. Which step should be used to troubleshoot the issue?

- Check for Inbox rules.

- Check for Transport rules.

- Check the sender’s SPF record.

- All of the Above

The correct answer to your question is “4. All of the Above” as all three steps can help troubleshoot the issue.

Check for Inbox rules: The user may have created a rule that is causing the email to be sent to the Junk folder. It’s important to check the user’s Inbox rules to see if this is the case.

Check for Transport rules: The organization may have a transport rule that is causing the email to be marked as spam. It’s important to check the transport rules to see if this is the case.

Check the sender’s SPF record: If the email is being sent from a domain other than the recipient’s domain, the recipient’s email system may be marking it as spam because the sender’s domain doesn’t have a valid SPF record. Checking the SPF record can help determine if this is the case.

25. What are the four basic components of a computer?

- Input devices, output devices, printing, and typing

- Input device, processing unit, storage, and output devices

- Input devices, CPU, output devices, and memory

The correct answer is “ Input device, processing unit, storage, and output devices.”

The four basic components of a computer are:

Input devices: These are used to input data or information into the computer, such as a keyboard, mouse, scanner, or microphone.

Processing unit: This is the central processing unit (CPU) which is responsible for processing the data entered through the input devices.

Storage: This refers to the devices that are used to store data or information, such as hard drives, solid-state drives (SSD), and flash drives.

Output devices: These are used to output or display data or information processed by the computer, such as a monitor, printer, or speaker.

26. When you save a file, it is permanently saved on the –

- CPU

- Hard driver

- Monitor

- RAM

When you save a file, it is permanently saved on the “Hard drive”.

The hard drive is a storage device that stores data permanently, even when the computer is turned off. When a file is saved, it is written to the hard drive, which allows it to be accessed later. The CPU (Central Processing Unit) is responsible for processing data and does not store data permanently. The monitor is an output device used to display information, and the RAM (Random Access Memory) is a temporary storage device used by the computer to store data temporarily while the computer is running.

27. Which of the following is NOT an OSI Layer?

- Session

- Transport

- Authentication

- Data Link

The correct answer is “Authentication”.

The Open Systems Interconnection (OSI) model is a conceptual model that describes the communication functions of a telecommunication or computing system. It has seven layers, each responsible for a specific set of functions.

The layers of the OSI model are:

1. Physical

2. Data Link

3. Network

4. Transport

5. Session

6. Presentation

7. Application

28. What is stored in ROM?

- End User applications

- The operating system

- Basic Input/Output system

The correct answer is “ Basic Input/Output System (BIOS)”.

ROM stands for Read-Only Memory, and it is a type of computer memory that is used to store permanent instructions. These instructions are usually stored by the manufacturer and cannot be modified by the user. The BIOS is firmware that is stored in ROM, and it is responsible for starting up the computer and initializing hardware components such as the hard drive, keyboard, and mouse. It also performs a series of self-tests to make sure that the computer is functioning properly.

End-user applications and the operating system are typically stored in other types of memory, such as the hard drive or solid-state drive. These types of memory are non-permanent and can be modified or replaced by the user.

29. Which PowerShell command do you use to change a user’s name in office 365?

- Change-MsolUser

- Set-MsolUser

- Change-MsolUserPrincipalName

- Set- MsolUserPrincipalName

The correct PowerShell command to change a user’s name in Office 365 is “Set-MsolUser”.

The “Set-MsolUser” command is used to modify user account information in Azure Active Directory, including changing the display name, first name, last name, and other attributes. To change a user’s name in Office 365 using this command, you would need to specify the user’s identity (either by user principal name or object ID) and the new values for the attributes you want to modify.

The other options you provided, “Change-MsolUser”, “Set-MsoUser”, and “Change-MsolUserPrincipalName”, are not valid PowerShell commands in Office 365.

30. Is It possible to change the SharePoint Online URL of a site collection and subsite?

- Yes

- No

- It is possible only for a site collection

- It is possible only for sub-site

The correct answer to your question is “No”.

It is not possible to change the SharePoint Online URL of a site collection or subsite after it has been created. The URL of a site collection or subsite in SharePoint Online is determined by the name that was specified when it was created, and this name cannot be changed after the fact.

31. Which Office 365 subscription plan provides live phone support 24/7 and includes enterprise voice capabilities?

- Office 365 E1 Plan

- Office 365 E5 Plan

- Office 365 E2 Plan

- Office 365 E3 Plan

The correct answer is “Office 365 E5 Plan “.

The Office 365 subscription plan that provides live phone support 24/7 and includes enterprise voice capabilities is the Office 365 E5 Plan.

32. What does OWA stand for?

- Open Web Analytics

- Open Wireless Architecture

- Outlook Web App.

- None of the above

OWA stands for “Outlook Web App”.

33. What is a Firewall in a computer network?

- The physical boundary of the network.

- A type of web browsing software.

- A system designed to prevent unauthorized access.

- A network operating system

The correct answer is “ A system designed to prevent unauthorized access.”

A firewall is a system designed to prevent unauthorized access to or from a private network by filtering incoming and outgoing network traffic based on a set of rules.

34. In Office 365 licensing, once the user has been removed is the license reusable?

- Only for the available time left

- Yes, licenses can be reused

- If the license is reset for a new user

- None of the above

Once a user has been removed from an Office 365 subscription, the license associated with that user can be reused for another user. However, there may be a delay of up to 24 hours before the right becomes available for use again. Additionally, some Office 365 plans have a limit on the number of times a license can be reassigned within a certain period.

35. The — — — system is built directly on the hardware

- Environment

- Application

- Operating

36. What is the main purpose of Active Directory?

- Providing information about the company’s management.

- It manages access to a forest domain.

- Managing documents

- Directing information traffic

The main purpose of Active Directory is to manage access to a forest domain. It is a directory service developed by Microsoft that stores information about objects on a network, including users, computers, and other resources. It provides a centralized location for network administrators to manage user accounts, security settings, and other resources within a network.

37. What is SharePoint?

- A customer Relationship Management System from Microsoft

- An operating system from Microsoft

- A web-based, collaborative platform that integrated most of the Microsoft solutions.

- An IP central

38. What does LAN stand for?

- Local Area Network

- Low Area Network

- Local Arial Net

39. Which of the following is not an administrative role in office 365?

- Global Admin

- SharePoint Admin

- System Admin

- Exchange Admin

The correct answer is “System Admin

There are different types of administrative roles in Office 365, and the roles may vary depending on the specific subscription and services provided. Several administrative roles in Office 365, including:

Global admin: Has access to all administrative features and settings in Office 365.

SharePoint admin: Manages SharePoint sites, site collections, and tenant-level settings.

Exchange admin: Manages Exchange Online mailboxes, email addresses, and distribution groups.

Teams admin: Manages Microsoft Teams settings and policies.

Security admin: Manages security and compliance features in Office 365, including data loss prevention, eDiscovery, and threat management.

Billing admin: Manages billing and subscription-related tasks for an Office 365 tenant.

Power Platform admin: Manages Power Platform environments and resources.

User management admin: Manages user accounts, licenses, and groups in Office 365.

40. What is Active Directory?

- A server role to manage identity and access rights on a network.

- A database containing users’ credentials that will be used to authenticate them.

- A network protocol that provides services to another computer.

- A software that analyzes and supports server performance

The correct answer is “A server role to manage identity and access rights on a network.

Active Directory is a server role to manage identity and access rights on a network. It is a directory service developed by Microsoft that stores information about objects on a network, such as user accounts, computers, groups, and organizational units, and provides authentication and authorization services for users and computers in a Windows domain. It also supports the management of network resources and allows administrators to deploy software, manage policies, and perform other administrative tasks on a network.

41. In Office 365, what is the difference between E1 and E3 licensing?

- The ability to add exchange accounts

- Ability to install Office ProPlus

- Azure Active Directory

- None of these

Office 365 E1 and E3 licensing differ in several ways, including the ability to install Office ProPlus. E1 includes online versions of Office applications such as Word, Excel, and PowerPoint, but does not include desktop versions of Office applications. E3 includes both online and desktop versions of Office applications, including the ability to install Office ProPlus on up to five devices per user. Other differences include additional security and compliance features in E3, as well as more advanced analytics and reporting capabilities.

FYI (For your information)

Both E1 and E3 licensing plans in Office 365 allow access to web-based versions of Office applications, such as Word, Excel, and PowerPoint. However, the main differences between the two plans are:

1. E3 includes desktop versions of the Office applications (Office ProPlus), while E1 does not.

2. E3 includes advanced security and compliance features, such as Data Loss Prevention, eDiscovery, and Advanced Threat Protection, while E1 has basic security and compliance features.

3. E3 allows for unlimited email archiving, while E1 has a limited archiving capability.

4. E3 includes Azure Active Directory Premium P1, while E1 includes only basic Azure Active Directory features.

Overall, E3 provides more features and capabilities than E1 but is also more expensive.

42. What are examples of storage devices?

- Keyboards, flash drive, printer

- Flash drive, RAM, DVD-ROM

- Hard drive, DVD-ROM Flash drive

The correct answer is “Hard drive, DVD-ROM Flash drive

43. Which of the following are special features of SharePoint?

- Social features, business search engine, outlook integration

- Email. IP central, chat

- Finance, and accounting capabilities

- Software design and development

44. True or False

Application software consists of programs that perform specific tasks for users. Examples include Microsoft Word and Internet Explorer.

- True

- False

45. Approximately how many bytes make one Megabyte?

- One million

- Ten thousand

- One hundred

- One thousand

One million bytes make one megabyte

46. It is possible to change the default tenant (Office 365) language (choose one):

- True

- False

- It is possible only for SharePoint Online

- It is possible only for Exchange Online

True, it is possible to change the default tenant (Office 365) language.

47. Can we control the storage on Office 365 and decrease the quotas given by default?

- Yes

- No

Yes, it is possible to control the storage on Office 365 and decrease the quotas given by default. Administrators can manage storage limits for individual users and groups and set quotas for specific SharePoint sites and OneDrive accounts.

48. True or False? “A thread can contain many processes. / A process can contain many threads.”

- True / True

- True / False

- False / False

- False / True

The correct answer is “False / True”

49. What does IMAP Stand For?

- International Messaging Acceptance Protocol

- Internet Mail Access Protocol

- Internet Message Activity Plan

IMAP Stand for Internet Mail Access Protocol

50. What is an example of system software?

- Adobe Photoshop

- Microsoft word

- Firmware

Here an example of system software is firmware

51. What are some common tools for troubleshooting name resolution? (Select all that apply)

- Nslookup, Dnscmd, Dnslint

- Ping, Ipconfig

- Boot logging, Device Manager

- None of the above

--

--