CORRECT TEXT

CORRECT TEXT You need to implement a solution to manage when users select links in documents or email messages from Microsoft Office 365 ProPlus applications or Android devices. The solution must meet the following requirements: ✑ Block access to a domain named fabrikam.com ✑ Store information when the users select...

June 19, 2022 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

June 19, 2022 No Comments READ MORE +

Which user should you identify?

You have a Microsoft 365 subscription that contains the users shown in the following table. You enable self-service password reset for Group1 and configure security questions as the only authentication method for self-service password reset. You need to identify which user must answer security questions to reset his password. Which...

June 19, 2022 No Comments READ MORE +

What should you do?

You need to enable and configure Microsoft Defender for Endpoint to meet the security requirements . What should you do?A . Configure port mirroringB . Create the ForceDefenderPassiveMode registry settingC . Download and install the Microsoft Monitoring AgentD . Run WindowsDefenderATPOnboardingScripc.cmdView AnswerAnswer: C

June 19, 2022 No Comments READ MORE +

You are evaluating which devices are compliant in Intune

HOTSPOT You are evaluating which devices are compliant in Intune. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer:

June 19, 2022 No Comments READ MORE +

Which role should you assign to User1?

Which role should you assign to User1?A . Global administratorB . User administratorC . Privileged role administratorD . Security administratorView AnswerAnswer: D Explanation: https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-give-access-to-pim

June 19, 2022 No Comments READ MORE +

Topic 4, Misc. Questions

Topic 4, Misc. Questions HOTSPOT You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table. You add internal as a blocked word in the group naming policy for contoso.com. You add Contoso- as prefix in the group naming policy for...

June 19, 2022 No Comments READ MORE +

Which devices should you identify?

You have a Microsoft 365 subscription and a Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) subscription. You have devices enrolled in Microsoft Endpoint Manager as shown in the following table: You integrate Microsoft Defender ATP and Endpoint Manager. You plan to evaluate the Microsoft Defender ATP risk level for...

June 19, 2022 No Comments READ MORE +

What should you do?

You have a Microsoft 365 E5 subscription without a Microsoft Azure subscription. Some users are required to use an authenticator app to access Microsoft SharePoint Online. You need to view which users have used an authenticator app to access SharePoint Online. The solution must minimize costs. What should you do?A...

June 19, 2022 No Comments READ MORE +

Which IP address space should you include in the MFA configuration?

Which IP address space should you include in the MFA configuration?A . 131.107.83.0/28B . 192.168.16.0/20C . 172.16.0.0/24D . 192.168.0.0/20View AnswerAnswer: B

June 18, 2022 No Comments READ MORE +