Which devices will support the ASR rules?
You have a Microsoft 365 E5 tenant that contains the devices shown in the following table. You plan to implement attack surface reduction (ASR) rules. Which devices will support the ASR rules?A . Device 1, Device2, and Device3 onlyB . Device3 onlyC . Device2 and Device3 onlyD . Device1, Device2,...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you configure in the profile?
You have a Microsoft 365 E5 tenant that contains 100 Windows 10 devices. You plan to deploy a Windows 10 Security Baseline profile that will protect secrets stored in memory. What should you configure in the profile?A . Microsoft Defender Credential GuardB . BitLocker Drive Encryption (BitLocker)C . Microsoft DefenderD...
To which location can the policy be applied?
You have a Microsoft 365 subscription. You need to create a data loss prevention (DLP) policy that is configured to use the Set headers action. To which location can the policy be applied?A . OneDrive accountsB . Exchange emailC . Teams chat and channel messagesD . SharePoint sitesView AnswerAnswer: B
You configure a data loss prevention (DLP) policy named DLP1 as shown in the following exhibit
HOTSPOT You configure a data loss prevention (DLP) policy named DLP1 as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Using...
Which tool should you use?
You have a Microsoft 365 E5 subscription that uses Azure Advanced Threat Protection (ATP). You need to create a detection exclusion in Azure ATP. Which tool should you use?A . the Security & Compliance admin centerB . Microsoft Defender Security CenterC . the Microsoft 365 admin centerD . the Azure...
What should you create?
Topic 2, A Datum Case Study: Overview Existing Environment This is a case study Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage...
Which report should the New York office auditors view?
Which report should the New York office auditors view?A . DLP policy matchesB . DLP false positives and overridesC . DLP incidentsD . Top Senders and RecipientsView AnswerAnswer: C Explanation: Reference: https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies This report also shows policy matches over time, like the policy matches report. However, the policy matches report...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you identify?
HOTSPOT You have a Microsoft 365 tenant that contains devices enrolled in Microsoft Intune. The devices are configured as shown in the following table. You plan to perform the following device management tasks in Microsoft Endpoint Manager: Deploy a VPN connection by using a VPN device configuration profile. Configure security...