How many VPN connections will there be for User1 when the user signs in to Device 1 and Devke2?

HOTSPOT You implement the planned changes for Connection1 and Connection2 How many VPN connections will there be for User1 when the user signs in to Device 1 and Devke2? To answer select the appropriate options in the answer area. NOTE; Each correct selection is worth one point. View AnswerAnswer:

September 25, 2021 No Comments READ MORE +

What should you configure?

Your network contains an Active Directory domain. The domain contains 100 computers that run Windows 10. You need to prevent users and apps from accessing dangerous websites. What should you configure?A . Microsoft Defender Application ControlB . Microsoft Defender Exploit GuardC . Microsoft Defender Application GuardD . Microsoft Defender FirewallView...

September 25, 2021 No Comments READ MORE +

What should you use?

You have 200 computers that run Windows 10. The computers are joined to Microsoft Azure Active Directory (Azure AD) and enrolled in Microsoft Intune. You need to ensure that only applications that you explicitly allow can run on the computers. What should you use?A . Windows Defender Credential GuardB ....

September 25, 2021 No Comments READ MORE +

What should you create in Azure and what should you configure on the computers?

HOTSPOT Your company has computers that run Windows 10 and are Microsoft Azure Active Directory (Azure AD)-joined. The company purchases an Azure subscription. You need to collect Windows events from the Windows 10 computers in Azure. The solution must enable you to create alerts based on the collected events. What...

September 24, 2021 No Comments READ MORE +

How should you configure the update settings?

HOTSPOT You need to resolve the performance issues in the Los Angeles office. How should you configure the update settings? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

September 24, 2021 No Comments READ MORE +

Topic 2, Contoso Ltd

Topic 2, Contoso Ltd This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that...

September 24, 2021 No Comments READ MORE +

What should you configure in an app protection policy for each requirement?

HOTSPOT You have a Microsoft 365 subscription. Users have iOS devices that are not enrolled in Microsoft 365 Device Management. You create an app protection policy for the Microsoft Outlook app as shown in the exhibit. (Click the Exhibit tab.) You need to configure the policy to meet the following...

September 24, 2021 No Comments READ MORE +

What should you do?

You have an Azure Active Directory (Azure AD) tenant named adatum.com that contains two computers named Computer1 and Computer2. The computers run Windows 10 and are members of a group named GroupA. The tenant contains a user named User1 that is a member of a group named Group 1. You...

September 24, 2021 No Comments READ MORE +

Which encryption type should you use for each device, and which role-based access control (RBAQ role in Intune should you use to manage the encryption keys?

HOTSPOT You have a Microsoft 365 tenant that uses Microsoft Intune and contains the devices shown in the following table. In Endpoint security, you need to configure a disk encryption policy for each device. Which encryption type should you use for each device, and which role-based access control (RBAQ role...

September 24, 2021 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

September 24, 2021 No Comments READ MORE +