Exam4Training

Which two actions should you perform?

Employees are permitted to bring personally owned portable Windows 10 Enterprise computers to the office. They are permitted to install corporate applications by using the management infrastructure agent and access corporate email by using the Mail app.

An employee’s personally owned portable computer is stolen.

You need to protect the corporate applications and email messages on the computer.

Which two actions should you perform? Each correct answer presents part of the solution.
A . Prevent the computer from connecting to the corporate wireless network.
B . Change the user’s password.
C . Disconnect the computer from the management infrastructure.
D . Initiate a remote wipe.

Answer: B,D

Explanation:

The personally owned portable Windows10Enterprise computers being managed by the management infrastructure agent enables the use of remote wipe. By initiating a remote wipe, we can erase all company data including email from the stolen device.

Microsoft Intune provides selective wipe, full wipe, remote lock, and passcode reset capabilities. Because mobile devices can store sensitive corporate data and provide access to many corporate resources, you can issue a remote device wipe command from the Microsoft Intune administrator console to wipe a lost or stolen device.

Changing the user’s password should be the first step. If the stolen computer is accessed before the remote wipe happens, the malicious user could be able to access company resources if the laptop has saved passwords.

Latest 70-697 Dumps Valid Version with 339 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version