Your network contains an on-premises Active Directory forest named contoso.com. The forest contains a user named User1 and two computers named Computer1 and Computer2 that run Windows 10

HOTSPOT Your network contains an on-premises Active Directory forest named contoso.com. The forest contains a user named User1 and two computers named Computer1 and Computer2 that run Windows 10. User1 is configured as shown in the following exhibit. You rename file \Server1ProfilesUser1.V6NTUSER.DAT as NTUSER.MAN. For each of the following statements,...

October 27, 2022No CommentsREAD MORE +

You have 500 computers that run Windows 10. The computers are joined to Microsoft Azure Active Directory (Azure AD) and enrolled in Microsoft Intune.

You have 500 computers that run Windows 10. The computers are joined to Microsoft Azure Active Directory (Azure AD) and enrolled in Microsoft Intune. You plan to distribute certificates to the computers by using Simple Certificate Enrollment Protocol (SCEP). You have the servers shown in the following table. NDES issues...

October 27, 2022No CommentsREAD MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

October 27, 2022No CommentsREAD MORE +

Which two settings should you configure in Device restrictions?

HOTSPOT You have 100 computers that run Windows 10. The computers are joined to Microsoft Azure Active Directory (Azure AD) and enrolled in Microsoft Intune. You need to configure the following device restrictions: ✑ Block users from browsing to suspicious websites. ✑ Scan all scripts loaded into Microsoft Edge. Which...

October 26, 2022No CommentsREAD MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

October 26, 2022No CommentsREAD MORE +

What should you use?

You have 100 computers that run Windows 8.1. You need to create a report that will assess the Windows 10 readiness of the computers. What should you use?A . Windows Assessment and Deployment Kit (Windows ADK) B. Microsoft Assessment and Planning (MAP) Toolkit C. Windows Deployment Services (WDS) D. Microsoft...

October 26, 2022No CommentsREAD MORE +

Which object should you create in Intune?

You need to meet the technical requirements for the iOS devices. Which object should you create in Intune?A . A compliance policy B. An app protection policy C. A Deployment profile D. A device profileView AnswerAnswer: D Explanation: References: https://docs.microsoft.com/en-us/intune/device-restrictions-configure https://docs.microsoft.com/en-us/intune/device-restrictions-ios

October 26, 2022No CommentsREAD MORE +

What should you use to meet the technical requirements for Azure DevOps?

What should you use to meet the technical requirements for Azure DevOps?A . An app protection policy B. Windows Information Protection (WIP) C. Conditional access D. A device configuration profileView AnswerAnswer: C Explanation: References: https://docs.microsoft.com/en-us/azure/devops/organizations/accounts/manage-conditional-access?view=azure-devops

October 26, 2022No CommentsREAD MORE +

What should you create?

Your company implements Microsoft Azure Active Directory (Azure AD), Microsoft 365, Microsoft Intune, and Azure Information Protection. The company’s security policy states the following: ✑ Personal devices do not need to be enrolled in Intune. ✑ Users must authenticate by using a PIN before they can access corporate email data....

October 25, 2022No CommentsREAD MORE +

Which Event Viewer log should you view?

You enable controlled folder access in audit mode for several computers that run Windows 10. You need to review the events audited by controlled folder access. Which Event Viewer log should you view?A . Applications and ServicesMicrosoftWindowsKnown FoldersOperational B. Applications and ServicesMicrosoftWindowsWindows DefenderOperational C. WindowsSecurityView AnswerAnswer: B Explanation: Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/evaluate-controlled-folder-access?view=o365-worldwide

October 25, 2022No CommentsREAD MORE +