What should you configure from the Cloud Discover settings?
You have a Microsoft 365 subscription. Your company purchases a new financial application named App1. From Cloud Discovery in Microsoft Cloud App Security, you view the Discovered apps page and discover that many applications have a low score because they are missing information about domain registration and consumer popularity. You need to prevent the missing […]
Which role should you assign to the user?
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.com. You need to provide a user with the ability to sign up for Microsoft Store for Business for contoso.com. The solution must use the principle of least privilege. Which role should you assign to the user? A. Cloud application administrator B. Application administrator […]
Which two Group Policy settings should you configure? Each correct answer presents part of the solution.
You have computers that run Windows 10 Enterprise and are joined to the domain. You plan to delay the installation of new Windows builds so that the IT department can test application compatibility. You need to prevent Windows from being updated for the next 30 days. Which two Group Policy settings should you configure? Each […]
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com.
You have a Microsoft Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com. You have a Microsoft 365 subscription. You need to ensure that users can manage the configuration settings for all the Windows 10 devices in your organization. What should you configure? A. the Enrollment restrictions B. the mobile device management (MDM) authority C. the […]
Your company uses Microsoft System Center Configuration Manager (Current Branch) and Microsoft Intune to co-ma
Your company uses Microsoft System Center Configuration Manager (Current Branch) and Microsoft Intune to co-manage devices. Which two actions can be performed only from Intune? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. A. Deploy applications to Windows 10 devices. B. Deploy VPN profiles to iOS devices. C. […]
You need to ensure that when users join their device to Microsoft Azure Active Directory (Azure AD), the devic
You have a Microsoft 365 tenant. All users are assigned the Enterprise Mobility + Security license. You need to ensure that when users join their device to Microsoft Azure Active Directory (Azure AD), the device is enrolled in Microsoft Intune automatically. What should you configure? A. Enrollment restrictions from the Intune admin center B. device […]
What are two prerequisites of the deployment? Each correct answer presents a complete solution.
You have Windows 10 Pro devices that are joined to an Active Directory domain. You plan to create a Microsoft 365 tenant and to upgrade the devices to Windows 10 Enterprise. You are evaluating whether to deploy Windows Hello for Business for SSO to Microsoft 365 services. What are two prerequisites of the deployment? Each […]
You need to integrate Windows Defender ATP and Azure ATP.
Your company uses Microsoft Azure Advanced Threat Protection (ATP) and Windows Defender ATP. You need to integrate Windows Defender ATP and Azure ATP. What should you do? A. From Azure ATP, configure the notifications and reports. B. From Azure ATP, configure the data sources. C. From Windows Defender Security Center, configure the Machine management settings. […]
You need to notify the manager of the human resources department when a user in the department shares a file o
You need to notify the manager of the human resources department when a user in the department shares a file or folder from the department’s Microsoft SharePoint site. What should you do? A. From the Security & Compliance admin center, create an alert policy. B. From the SharePoint site, create an alert. C. From the […]
You need to be notified if users receive email containing a file that has a virus.
You have a Microsoft 365 subscription. You need to be notified if users receive email containing a file that has a virus. What should you do? A. From the Exchange admin center, create an in-place eDiscovery & hold. B. From the Security & Compliance admin center, create a data governance event. C. From the Exchange […]