To which role should you assign each user?

HOTSPOT You have a Microsoft 365 subscription. You are configuring permissions for Security & Compliance. You need to ensure that the users can perform the tasks shown in the following table. The solution must use the principle of least privilege. To which role should you assign each user? To answer,...

September 22, 2022 No Comments READ MORE +

Your network contains an Active Directory forest named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD)

HOTSPOT Your network contains an Active Directory forest named contoso.com that is synced to Microsoft Azure Active Directory (Azure AD). You use Microsoft System Center Configuration Manager (Current Branch) for device management. You have the Windows 10 devices shown in the following table. You configure Configuration Manager co-management as follows:...

September 22, 2022 No Comments READ MORE +

Which properties of the alerts can you modify?

You have a Microsoft 365 subscription that contains the alerts shown in the following table. Which properties of the alerts can you modify?A . Status only B. Status and Comment only C. Status and Severity only D. Status, Severity, and Comment only E. Status, Severity, Comment and CategoryView AnswerAnswer: B...

September 22, 2022 No Comments READ MORE +

On which server should you install the Azure ATP sensor?

On which server should you install the Azure ATP sensor?A . Server 1 B. Server 2 C. Server 3 D. Server 4 E. Server 5View AnswerAnswer: A Explanation: References: https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-capacity-planning However, if the case study had required that the DCs can't have any s/w installed, then the answer would have...

September 22, 2022 No Comments READ MORE +

What should you identify?

HOTSPOT You have a Microsoft 365 tenant that contains devices enrolled in Microsoft Intune. The devices are configured as shown in the following table. You plan to perform the following device management tasks in Microsoft Endpoint Manager: ✑ Deploy a VPN connection by using a VPN device configuration profile. ✑...

September 22, 2022 No Comments READ MORE +

You have the Microsoft Azure Active Directory (Azure AD) users shown in the following table

HOTSPOT You have the Microsoft Azure Active Directory (Azure AD) users shown in the following table. Your company uses Microsoft Intune. Several devices are enrolled in Intune as shown in the following table. The device compliance policies in Intune are configured as shown in the following table. You create a...

September 22, 2022 No Comments READ MORE +

Which report should the New York office auditors view?

Which report should the New York office auditors view?A . DLP policy matches B. DLP false positives and overrides C. DLP incidents D. Top Senders and RecipientsView AnswerAnswer: C Explanation: References: https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies This report also shows policy matches over time, like the policy matches report. However, the policy matches report...

September 21, 2022 No Comments READ MORE +

Which file format should you use for the exported template?

You have a Microsoft 365 E5 tenant. You plan to create a custom Compliance Manager assessment template based on the ISO 27001:2013 template. You need to export the existing template. Which file format should you use for the exported template?A . CSV B. XLSX C. JSON D. XMLView AnswerAnswer: B...

September 21, 2022 No Comments READ MORE +

You have a document in Microsoft OneDrive that is encrypted by using Microsoft Azure Information Protection as shown in the following exhibit

HOTSPOT You have a document in Microsoft OneDrive that is encrypted by using Microsoft Azure Information Protection as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth...

September 21, 2022 No Comments READ MORE +

Your company uses Windows Defender Advanced Threat Protection (ATP)

HOTSPOT Your company uses Windows Defender Advanced Threat Protection (ATP). Windows Defender ATP includes the machine groups shown in the following table. You onboard a computer named computer1 to Windows Defender ATP as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each...

September 21, 2022 No Comments READ MORE +