What should you include in the recommendation?

HOTSPOT You need to recommend a solution to meet the device management requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:

October 22, 2022 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

October 22, 2022 No Comments READ MORE +

What should you do first?

You have a computer named Computer1 that runs Windows 10. Computer is used by a user named User1. You need to ensure that when User1 opens websites from untrusted locations by using Microsoft Edge, Microsoft Edge runs in isolated container. What should you do first?A . From Windows Features, turn...

October 22, 2022 No Comments READ MORE +

What will be the state of the computer when the user signs in?

HOTSPOT You have computers that run Windows 10 and are configured by using Windows AutoPilot. A user performs the following tasks on a computer named Computer1: ✑ Creates a VPN connection to the corporate network ✑ Installs a Microsoft Store app named App1 ✑ Connects to a Wi-Fi network You...

October 22, 2022 No Comments READ MORE +

Which encryption type should you use for each device, and which role-based access control (RBAQ role in Intune should you use to manage the encryption keys?

HOTSPOT You have a Microsoft 365 tenant that uses Microsoft Intune and contains the devices shown in the following table. In Endpoint security, you need to configure a disk encryption policy for each device. Which encryption type should you use for each device, and which role-based access control (RBAQ role...

October 21, 2022 No Comments READ MORE +

Which devices have a network boundary of 192.168.1.0/24 applied?

Topic 3, Contoso, Ltd. (NEW) Case Study This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time...

October 21, 2022 No Comments READ MORE +

Which three actions should you perform in sequence?

DRAG DROP You have a Microsoft Deployment Toolkit (MDT) deployment share named DS1. You import a Windows 10 image to DS1. You have an executable installer for an application named App1. You need to ensure that App1 will be installed for all the task sequences that deploy the image. Which...

October 21, 2022 No Comments READ MORE +

Which two actions should you perform?

You have 10 computers that run Windows 7 and have the following configurations: ✑ A single MBR disk ✑ A disabled TPM chip ✑ Disabled hardware virtualization ✑ UEFI firmware running in BIOS mode ✑ Enabled Data Execution Prevention (DEP) You plan to upgrade the computers to Windows 10. You...

October 20, 2022 No Comments READ MORE +

What should you do?

You have a Microsoft 365 subscription. You have 10 computers that run Windows 10 and are enrolled in mobile device management (MDM) You need to deploy the Microsoft Office 365 ProPlus suite to all the computers. What should you do?A . From Microsoft Azure Active Directory (Azure AD), add an...

October 20, 2022 No Comments READ MORE +

You have unrooted devices enrolled in Microsoft Intune as shown in the following table

HOTSPOT You have unrooted devices enrolled in Microsoft Intune as shown in the following table. The devices are members of a group named Group1. In Intune, you create a device compliance location that has the following configurations: ✑ Name: Network1 ✑ IPv4 range: 192.168.0.0/16 In Intune, you create a device...

October 20, 2022 No Comments READ MORE +