Which devices will support the ASR rules?
You have a Microsoft 365 E5 tenant that contains the devices shown in the following table. You plan to implement attack surface reduction (ASR) rules. Which devices will support the ASR rules?A . Device 1, Device2, and Device3 onlyB . Device3 onlyC . Device2 and Device3 onlyD . Device1, Device2,...
Which DNS record should you recommend?
Topic 4, Fabrikam Overview Fabrikam, Inc. is an electronics company that produces consumer products. Fabrikam has 10,000 employees worldwide. Fabrikam has a main office in London and branch offices in major cities in Europe, Asia, and the United States. Existing Environment Active Directory Environment The network contains an Active Directory...
Which users will receive the weekly digest email automatically?
You enable the Azure AD Identity Protection weekly digest email. You create the users shown in the following table. Which users will receive the weekly digest email automatically?A . Admin2, Admin3, and Admin4 onlyB . Admin1, Admin2, Admin3, and Admin4C . Admin2 and Admin3 onlyD . Admin3 onlyE . Admin1...
Which role should you assign to User1?
Which role should you assign to User1? Available Choices (select all choices that are correct)A . Hygiene ManagementB . Security ReaderC . Security AdministratorD . Records ManagementView AnswerAnswer: C Explanation: A user named User1 must be able to view all DLP reports from the Microsoft 365 admin center. Users with...
What is the minimum number of data sources and log collectors you should create from Microsoft Cloud App Security?
HOTSPOT You need to meet the technical requirement for log analysis. What is the minimum number of data sources and log collectors you should create from Microsoft Cloud App Security? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:...
What should you create to ensure that the DLP policy can detect the customer IDs?
You have a Microsoft 365 subscription. Your company has a customer ID associated to each customer. The customer IDs contain 10 numbers followed by 10 characters. The following is a sample customer ID: 12-456-7890-abc-de-fghij. You plan to create a data loss prevention (DLP) policy that will detect messages containing customer...
What will be excluded from the export?
From the Security & Compliance admin center, you create a content export as shown in the exhibit. (Click the Exhibit tab.) What will be excluded from the export?A . a 10-MB XLSX fileB . a 5-MB MP3 fileC . a 5-KB RTF fileD . an 80-MB PPTX fileView AnswerAnswer: B...
What should you do?
You need to configure Office on the web to meet the technical requirements. What should you do?A . Assign the Global reader role to User1.B . Enable sensitivity labels for Office files in SharePoint Online and OneDrive.C . Configure an auto-labeling policy to apply the sensitivity labels.D . Assign the...
What should you use to purchase the apps?
You have a Microsoft 365 tenant that contains 1,000 iOS devices enrolled in Microsoft Intune. You plan to purchase volume-purchased apps and deploy the apps to the devices. You need to track used licenses and manage the apps by using Intune. What should you use to purchase the apps?A ....
On which server should you install the Azure ATP sensor?
On which server should you install the Azure ATP sensor?A . Server 1B . Server 2C . Server 3D . Server 4E . Server 5View AnswerAnswer: A Explanation: Reference: https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-capacity-planning However, if the case study had required that the DCs can't have any s/w installed, then the answer would have...