CORRECT TEXT
CORRECT TEXT You need to implement a solution to manage when users select links in documents or email messages from Microsoft Office 365 ProPlus applications or Android devices. The solution must meet the following requirements: ✑ Block access to a domain named fabrikam.com ✑ Store information when the users select...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
Which user should you identify?
You have a Microsoft 365 subscription that contains the users shown in the following table. You enable self-service password reset for Group1 and configure security questions as the only authentication method for self-service password reset. You need to identify which user must answer security questions to reset his password. Which...
What should you do?
You need to enable and configure Microsoft Defender for Endpoint to meet the security requirements . What should you do?A . Configure port mirroringB . Create the ForceDefenderPassiveMode registry settingC . Download and install the Microsoft Monitoring AgentD . Run WindowsDefenderATPOnboardingScripc.cmdView AnswerAnswer: C
You are evaluating which devices are compliant in Intune
HOTSPOT You are evaluating which devices are compliant in Intune. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer:
Which role should you assign to User1?
Which role should you assign to User1?A . Global administratorB . User administratorC . Privileged role administratorD . Security administratorView AnswerAnswer: D Explanation: https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-give-access-to-pim
Topic 4, Misc. Questions
Topic 4, Misc. Questions HOTSPOT You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table. You add internal as a blocked word in the group naming policy for contoso.com. You add Contoso- as prefix in the group naming policy for...
Which devices should you identify?
You have a Microsoft 365 subscription and a Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) subscription. You have devices enrolled in Microsoft Endpoint Manager as shown in the following table: You integrate Microsoft Defender ATP and Endpoint Manager. You plan to evaluate the Microsoft Defender ATP risk level for...
What should you do?
You have a Microsoft 365 E5 subscription without a Microsoft Azure subscription. Some users are required to use an authenticator app to access Microsoft SharePoint Online. You need to view which users have used an authenticator app to access SharePoint Online. The solution must minimize costs. What should you do?A...
Which IP address space should you include in the MFA configuration?
Which IP address space should you include in the MFA configuration?A . 131.107.83.0/28B . 192.168.16.0/20C . 172.16.0.0/24D . 192.168.0.0/20View AnswerAnswer: B