Which devices can you monitor by using Endpoint analytics?
You have a Microsoft 365 E5 tenant that contains the devices shown in the following table. You plan to review device startup performance issues by using Endpoint analytics. Which devices can you monitor by using Endpoint analytics?A . Device1 onlyB . Device1 and Device2 onlyC . Device1, Device2, and Device3...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you use?
You need to configure just in time access to meet the technical requirements. What should you use?A . entitlement managementB . Azure AD Privileged Identity Management (PIM)C . access reviewsD . Azure AD Identity ProtectionView AnswerAnswer: B
Litware, Irk. is a consulting company that has a main office in Montreal and a branch office in Seattle?
Topic 5, Litware, Irk Overview Litware, Irk. is a consulting company that has a main office in Montreal and a branch office in Seattle? Ltware collaborates with a third-party company named A) Datum Corporation. The network of Litware contains an Active Directory domain named litware.com. The domain contains three organizational...
Which users will receive the weekly digest email automatically?
You enable the Azure AD Identity Protection weekly digest email. You create the users shown in the following table. Which users will receive the weekly digest email automatically?A . Admin2, Admin3, and Admin4 onlyB . Admin1, Admin2, Admin3, and Admin4C . Admin2 and Admin3 onlyD . Admin3 onlyE . Admin1...
What should you create in the Microsoft Defender Security Center?
Your company has digitally signed applications. You need to ensure that Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) considers the digitally signed applications safe and never analyzes them. What should you create in the Microsoft Defender Security Center?A . a custom detection ruleB . an allowed/blocked list ruleC ....
To which devices can you deploy Microsoft 365 Apps for enterprise?
You have a Microsoft 365 E5 tenant that contains four devices enrolled in Microsoft Intune as shown in the following table. You plan to deploy Microsoft 365 Apps for enterprise by using Microsoft Endpoint Manager. To which devices can you deploy Microsoft 365 Apps for enterprise?A . Device1 onlyB ....
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you include in the recommendation?
You need to recommend a solution for the security administrator. The solution must meet the technical requirements. What should you include in the recommendation?A . Microsoft Azure Active Directory (Azure AD) Privileged Identity ManagementB . Microsoft Azure Active Directory (Azure AD) Identity ProtectionC . Microsoft Azure Active Directory (Azure AD)...
You have a Microsoft 365 E5 subscription linked to an Azure Active Directory (Azure AD) tenant
HOTSPOT You have a Microsoft 365 E5 subscription linked to an Azure Active Directory (Azure AD) tenant. The tenant contains a group named Group1 and the users shown in the following table: The tenant has a conditional access policy that has the following configurations: Name: Policy1 Assignments: - Users and...