Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

April 17, 2023 No Comments READ MORE +

What should you do?

You configure a conditional access policy. The locations settings are configured as shown in the Locations exhibit. (Click the Locations tab.) The users and groups settings are configured as shown in the Users and Groups exhibit. (Click Users and Groups tab.) Members of the Security reader group report that they...

April 17, 2023 No Comments READ MORE +

What should you include in the solution?

You have a Microsoft 365 E5 tenant. You plan to deploy a monitoring solution that meets the following requirements: ✑ Captures Microsoft Teams channel messages that contain threatening or violent language. ✑ Alerts a reviewer when a threatening or violent message is identified. What should you include in the solution?A...

April 17, 2023 No Comments READ MORE +

Which two computers should you identify?

Your company has a Microsoft 365 subscription that uses an Azure Active Directory (Azure AD) tenant named contoso.com. The tenant contains computers that run Windows 10 Enterprise and are managed by using Microsoft Intune. The computers are configured as shown in the following table. You plan to implement Windows Defender...

April 17, 2023 No Comments READ MORE +

Does this meet the goal?

You have a Microsoft Azure Active Directory (Azure AD) tenant named Contoso.com. You create a Microsoft Defender for identity instance Contoso. The tenant contains the users shown in the following table. You need to modify the configuration of the Defender for identify sensors. Solutions: You instruct User1 to modify the...

April 16, 2023 No Comments READ MORE +

You have a Microsoft 365 E5 subscription that contains the devices shown in the following table

HOTSPOT You have a Microsoft 365 E5 subscription that contains the devices shown in the following table. All the devices are onboarded To Microsoft Defender for Endpoint You plan to use Microsoft Defender Vulnerability Management to meet the following requirements: • Detect operating system vulnerabilities. View AnswerAnswer:

April 16, 2023 No Comments READ MORE +

Which devices will support the ASR rules?

You have a Microsoft 365 E5 tenant that contains the devices shown in the following table. You plan to implement attack surface reduction (ASR) rules. Which devices will support the ASR rules?A . Device 1, Device2, and Device3 only B. Device3 only C. Device2 and Device3 only D. Device1, Device2,...

April 16, 2023 No Comments READ MORE +

Which command should you run?

Topic 4, Misc. Questions HOTSPOT You have a new Microsoft 365 subscription. A user named User1 has a mailbox in Microsoft Exchange Online. You need to log any changes to the mailbox folder permissions of User1. Which command should you run? To answer, select the appropriate options in the answer...

April 16, 2023 No Comments READ MORE +

What should you create?

You have a Microsoft 365 subscription. Some users have iPads that are managed by your company. You plan to prevent the ipad users from copying corporate data in Microsoft Word and pasting the data into other applications. What should you create?A . an app configuration policy B. a compliance policy...

April 16, 2023 No Comments READ MORE +

What should you configure?

HOTSPOT You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps. You need to create a policy that will generate an email alert when a banned app is detected requesting permission to access user information or data in the subscription. What should you configure? To answer,...

April 15, 2023 No Comments READ MORE +