What are two capabilities of Microsoft Defender for Endpoint? Each correct selection presents a complete solution. NOTE: Each correct selection is worth one point.

What are two capabilities of Microsoft Defender for Endpoint? Each correct selection presents a complete solution. NOTE: Each correct selection is worth one point.A . automated investigation and remediationB . transport encryptionC . shadow IT detectionD . attack surface reductionView AnswerAnswer: AD Explanation: Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender- endpoint? view=o365-worldwide

January 4, 2024 No Comments READ MORE +

Select the answer that correctly completes the sentence

HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/security/benchmark/azure/baselines/cloud-services-security-baseline

January 4, 2024 No Comments READ MORE +

Select the answer that correctly completes the sentence

HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/azure/ddos-protection/ddos-protection-overview

January 4, 2024 No Comments READ MORE +

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point

HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: Yes Azure AD supports custom roles. Box 2: Yes Global Administrator has access to all administrative features in Azure Active...

January 3, 2024 No Comments READ MORE +

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point

HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: Yes A certificate is required that provides a private and a public key. Box 2: Yes The public key is...

January 3, 2024 No Comments READ MORE +

Select the answer that correctly completes the sentence

HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender/incidents-overview?view=o365-worldwide

January 3, 2024 No Comments READ MORE +

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point

HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Reference: https://privacy.microsoft.com/en-US/

January 2, 2024 No Comments READ MORE +

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point

HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/mem/intune/fundamentals/what-is-intune https://docs.microsoft.com/en-us/mem/intune/fundamentals/what-is-device-management

January 2, 2024 No Comments READ MORE +

What is a use case for implementing information barrier policies in Microsoft 365?

What is a use case for implementing information barrier policies in Microsoft 365?A . to restrict unauthenticated access to Microsoft 365B . to restrict Microsoft Teams chats between certain groups within an organizationC . to restrict Microsoft Exchange Online email between certain groups within an organizationD . to restrict data...

January 2, 2024 No Comments READ MORE +

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . text message (SMS)B . Microsoft Authenticator appC . email verificationD . phone callE . security questionView AnswerAnswer: ABD Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-methods

January 2, 2024 No Comments READ MORE +