Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
Which users can add apps to the private store in Microsoft Store for Business, and which users can install apps from the private store?
HOTSPOT You have a Microsoft 365 E5 tenant that contains the users shown in the following table. Users are assigned Microsoft Store for Business roles as shown in the following table. Which users can add apps to the private store in Microsoft Store for Business, and which users can install...
What should you create?
You need to meet the technical requirement for large-volume document retrieval. What should you create?A . a data loss prevention (DLP) policy from the Security & Compliance admin centerB . an alert policy from the Security & Compliance admin centerC . a file policy from Microsoft Cloud App SecurityD ....
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you create to ensure that the DLP policy can detect the customer IDs?
You have a Microsoft 365 subscription. Your company has a customer ID associated to each customer. The customer IDs contain 10 numbers followed by 10 characters. The following is a sample customer ID: 12-456-7890-abc-de-fghij. You plan to create a data loss prevention (DLP) policy that will detect messages containing customer...
What should you identify?
HOTSPOT You plan to implement the endpoint protection device configuration profiles to support the planned changes. You need to identify which devices will be supported, and how many profiles you should implement. What should you identify? To answer, select the appropriate options in the answer area. NOTE: Each correct selection...
Which authentication strategy should you implement for the pilot projects?
You need to ensure that all the sales department users can authenticate successfully during Project1 and Project2. Which authentication strategy should you implement for the pilot projects?A . pass-through authenticationB . pass-through authentication and seamless SSOC . password hash synchronization and seamless SSOD . password hash synchronizationView AnswerAnswer: C Explanation:...
On which devices can you manage apps by using app configuration policies in Microsoft Endpoint Manager?
You have a Microsoft 365 E5 subscription. Users have the devices shown in the following table. On which devices can you manage apps by using app configuration policies in Microsoft Endpoint Manager?A . Device1, Device4, and Device6B . Device2, Device3, and Device5C . Device1, Device2, Device3, and Device6D . Device1,...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
On which server should you use the Defender for identity sensor?
On which server should you use the Defender for identity sensor?A . Server1B . Server2C . Server3D . Server4E . Servers5View AnswerAnswer: A Explanation: However, if the case study had required that the DCs can't have any s/w installed, then the answer would have been a standalone sensor on Server2....