What are two capabilities of Microsoft Defender for Endpoint? Each correct selection presents a complete solution. NOTE: Each correct selection is worth one point.
What are two capabilities of Microsoft Defender for Endpoint? Each correct selection presents a complete solution. NOTE: Each correct selection is worth one point.A . automated investigation and remediationB . transport encryptionC . shadow IT detectionD . attack surface reductionView AnswerAnswer: AD Explanation: Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender- endpoint? view=o365-worldwide
Select the answer that correctly completes the sentence
HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/security/benchmark/azure/baselines/cloud-services-security-baseline
Select the answer that correctly completes the sentence
HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/azure/ddos-protection/ddos-protection-overview
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: Yes Azure AD supports custom roles. Box 2: Yes Global Administrator has access to all administrative features in Azure Active...
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Box 1: Yes A certificate is required that provides a private and a public key. Box 2: Yes The public key is...
Select the answer that correctly completes the sentence
HOTSPOT Select the answer that correctly completes the sentence. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender/incidents-overview?view=o365-worldwide
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Reference: https://privacy.microsoft.com/en-US/
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point
HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/mem/intune/fundamentals/what-is-intune https://docs.microsoft.com/en-us/mem/intune/fundamentals/what-is-device-management
What is a use case for implementing information barrier policies in Microsoft 365?
What is a use case for implementing information barrier policies in Microsoft 365?A . to restrict unauthenticated access to Microsoft 365B . to restrict Microsoft Teams chats between certain groups within an organizationC . to restrict Microsoft Exchange Online email between certain groups within an organizationD . to restrict data...
Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . text message (SMS)B . Microsoft Authenticator appC . email verificationD . phone callE . security questionView AnswerAnswer: ABD Explanation: Reference: https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-methods