Which three actions should you perform?

You are investigating a potential attack that deploys a new ransomware strain.

You plan to perform automated actions on a group of highly valuable machines that contain sensitive information.

You have three custom device groups.

You need to be able to temporarily group the machines to perform actions on the devices.

Which three actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
A . Add a tag to the device group.
B . Add the device users to the admin role.
C . Add a tag to the machines.
D . Create a new device group that has a rank of 1.
E . Create a new admin role.
F . Create a new device group that has a rank of 4.

Answer: ACD

Explanation:

https://docs.microsoft.com/en-us/learn/modules/deploy-microsoft-defender-for-endpoints-environment/4-manage-access

Latest SC-200 Dumps Valid Version with 75 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments