Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you create in the Microsoft Defender Security Center?
Your company has digitally signed applications. You need to ensure that Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) considers the digitally signed applications safe and never analyzes them. What should you create in the Microsoft Defender Security Center?A . a custom detection ruleB . an allowed/blocked list ruleC ....
Which type of policy should you configure, and how many policies should you configure?
HOTSPOT You need to configure the information governance settings to meet the technical requirements. Which type of policy should you configure, and how many policies should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:
On which devices can you manage apps by using app configuration policies in Microsoft Endpoint Manager?
You have a Microsoft 365 E5 subscription. Users have the devices shown in the following table. On which devices can you manage apps by using app configuration policies in Microsoft Endpoint Manager?A . Device1, Device4, and Device6B . Device2, Device3, and Device5C . Device1, Device2, Device3, and Device6D . Device1,...
On which server should you install the Azure ATP sensor?
On which server should you install the Azure ATP sensor?A . Server 1B . Server 2C . Server 3D . Server 4E . Server 5View AnswerAnswer: A Explanation: Reference: https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-capacity-planning However, if the case study had required that the DCs can't have any s/w installed, then the answer would have...
What should you do?
HOTSPOT You have an Azure subscription and an on-premises Active Directory domain. The domain contains 50 computers that run Windows 10. You need to centrally monitor System log events from the computers. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you create?
You need to meet the technical requirement for large-volume document retrieval. What should you create?A . a data loss prevention (DLP) policy from the Security & Compliance admin centerB . an alert policy from the Security & Compliance admin centerC . a file policy from Microsoft Cloud App SecurityD ....
You are evaluating the use of multi-factor authentication (MFA)
HOTSPOT You are evaluating the use of multi-factor authentication (MFA). For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer:
You have a Microsoft 365 E5 tenant that contains two users named User1 and User2 and the groups shown in the following table
HOTSPOT You have a Microsoft 365 E5 tenant that contains two users named User1 and User2 and the groups shown in the following table. You have a Microsoft Intune enrollment policy that has the following settings: MDM user scope: Some Groups: Group1 MAM user scope: Some Groups: Group2 You purchase...