Which condition should you add to CAPolicy1?

You have a Microsoft 365 E5 subscription that contains a user named User! and a web app named Appl. App1 must only accept modern authentication requests. You plan to create a Conditional Access policy named CAPolicy1 that will have the following settings: • Assignments ° Users or workload identities: User1...

March 25, 2024 No Comments READ MORE +

What should you include in the recommendation?

HOTSPOT You need to recommend a solution to meet the device management requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Reference: https://github.com/MicrosoftDocs/IntuneDocs/blob/master/intune/app-protection-policy.md https://docs.microsoft.com/en-us/azure/information-protection/configure-usage-rights#do-not-forward-option-for-emails

March 24, 2024 No Comments READ MORE +

What should you do?

You have a Microsoft 365 E5 subscription that contains 500 macOS devices enrolled in Microsoft Intune. You need to ensure that you can apply Microsoft Defender for Endpoint antivirus policies to the macOS devices. The solution must minimize administrative effort. What should you do?A . From the Microsoft Endpoint Manager...

March 24, 2024 No Comments READ MORE +

Which devices have a network boundary of 192.168.1.0/24 applied?

You implement Boundary1 based on the planned changes. Which devices have a network boundary of 192.168.1.0/24 applied?A . Device2 onlyB . Device3 onlyC . Device 1. Device2. and Device5 onlyD . Device 1, Device2, Device3, and Device4 onlyView AnswerAnswer: D Explanation: Reference: https://docs.microsoft.com/en-us/mem/intune/configuration/network-boundary-windows

March 24, 2024 No Comments READ MORE +

You have an Azure AD tenant named contoso.com that contains the users shown in the following table

HOTSPOT You have an Azure AD tenant named contoso.com that contains the users shown in the following table. You have a computer named Computer1 that runs Windows 10. Computer1 is in a workgroup and has the local users shown in the following table. UserA joins Computer1 to Azure AD by...

March 24, 2024 No Comments READ MORE +

Which devices can be upgraded by using each method?

HOTSPOT You have a Microsoft 365 subscription that uses Microsoft Intune Suite. You use Microsoft Intune to manage devices. Azure AD joined Windows devices enroll automatically in Intune. You have the devices shown in the following table. You are preparing to upgrade the devices to Windows 11. All the devices...

March 24, 2024 No Comments READ MORE +

Which setting of the compliance policy should you configure for each requirement?

DRAG DROP You have a Microsoft 365 subscription. The subscription contains computers that run Windows 11 and are enrolled in Microsoft Intune. You need to create a compliance policy that meets the following requirements: • Requires BitLocker Drive Encryption (BitLocker) on each device • Requires a minimum operating system version...

March 24, 2024 No Comments READ MORE +

What is the best recommendation to achieve the goal?

Your company standardizes on Windows 10 Enterprise for all users. Some users purchase their own computer from a retail store. The computers run Windows 10 Pro. You need to recommend a solution to upgrade the computers to Windows 10 Enterprise, join the computers to Azure AD, and install several Microsoft...

March 24, 2024 No Comments READ MORE +

Which users can purchase and assign App1?

Which users can purchase and assign App1?A . User3 onlyB . User1 and User3 onlyC . User1, User2, User3, and User4D . User1, User3, and User4 onlyE . User3 and User4 onlyView AnswerAnswer: B Explanation: Reference: https://docs.microsoft.com/en-us/microsoft-store/acquire-apps-microsoft-store-for-business https://docs.microsoft.com/en-us/microsoft-store/assign-apps-to-employees

March 23, 2024 No Comments READ MORE +

Which compliance policy setting should you configure for each device?

DRAG DROP You have a Microsoft 365 subscription that contains the devices shown in the following table. You need to ensure that only devices running trusted firmware or operating system build can access network resources. Which compliance policy setting should you configure for each device? To answer, drag the appropriate...

March 23, 2024 No Comments READ MORE +