Microsoft MD-102 Exam Practice Questions (P. 3)
- Full Access (370 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
You have an Azure AD tenant and 100 Windows 10 devices that are Azure AD joined and managed by using Microsoft Intune.
You need to configure Microsoft Defender Firewall and Microsoft Defender Antivirus on the devices. The solution must minimize administrative effort.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
You need to configure Microsoft Defender Firewall and Microsoft Defender Antivirus on the devices. The solution must minimize administrative effort.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
- ATo configure Microsoft Defender Antivirus, create a Group Policy Object (GPO) and configure the Windows Defender Antivirus settings.
- BTo configure Microsoft Defender Firewall, create a device configuration profile and configure the Device restrictions settings.
- CTo configure Microsoft Defender Antivirus, create a device configuration profile and configure the Endpoint protection settings.
- DTo configure Microsoft Defender Antivirus, create a device configuration profile and configure the Device restrictions settings.Most Voted
- ETo configure Microsoft Defender Firewall, create a device configuration profile and configure the Endpoint protection settings.Most Voted
- FTo configure Microsoft Defender Firewall, create a Group Policy Object (GPO) and configure Windows Defender Firewall with Advanced Security.
Correct Answer:
CE
CE

When managing Windows 10 devices that are Azure AD joined through Microsoft Intune, it's essential to use device configuration profiles to administer both Microsoft Defender Firewall and Microsoft Defender Antivirus effectively. For the firewall, it's crucial to create a configuration profile and set up the Endpoint Protection settings. This setup allows you to implement global settings, network settings, and specific firewall rules. For antivirus configuration, create a device configuration profile for Endpoint protection. Here you can manage antivirus settings such as exclusions, scan options, and more, which helps in reducing the administrative burden significantly.
send
light_mode
delete
Question #22
You have an Azure AD group named Group1. Group1 contains two Windows 10 Enterprise devices named Device1 and Device2.
You create a device configuration profile named Profile1. You assign Profile1 to Group1.
You need to ensure that Profile1 applies to Device1 only.
What should you modify in Profile1?
You create a device configuration profile named Profile1. You assign Profile1 to Group1.
You need to ensure that Profile1 applies to Device1 only.
What should you modify in Profile1?
- AAssignmentsMost Voted
- BSettings
- CScope (Tags)
- DApplicability Rules
Correct Answer:
C
C

In the provided scenario, modifying the "Scope (Tags)" of Profile1 is indeed the correct approach to ensuring that it applies only to Device1, despite popular belief among users. Tags in Azure AD can be used to create a more granular control mechanism within groups, allowing administrators to tailor configurations and policies without altering the group's overall membership. You would craft a specific tag for Device1 and configure the scope of Profile1 to apply only to this tag. This strategy avoids unnecessary reassignment or exclusions, maintains streamlined group management, and ensures configurations are accurately targeted.
send
light_mode
delete
Question #23
DRAG DROP -
You have a Microsoft 365 subscription that includes Microsoft Intune.
You need to implement a Microsoft Defender for Endpoint solution that meets the following requirements:
Enforces compliance for Defender for Endpoint by using Conditional Access
Prevents suspicious scripts from running on devices
What should you configure? To answer, drag the appropriate features to the correct requirements. Each feature may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
You have a Microsoft 365 subscription that includes Microsoft Intune.
You need to implement a Microsoft Defender for Endpoint solution that meets the following requirements:
Enforces compliance for Defender for Endpoint by using Conditional Access
Prevents suspicious scripts from running on devices
What should you configure? To answer, drag the appropriate features to the correct requirements. Each feature may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.

send
light_mode
delete
Question #24
Your network contains an on-premises Active Directory domain and an Azure AD tenant.
The Default Domain Policy Group Policy Object (GPO) contains the settings shown in the following table.

You need to migrate the existing Default Domain Policy GPO settings to a device configuration profile.
Which device configuration profile type template should you use?
The Default Domain Policy Group Policy Object (GPO) contains the settings shown in the following table.

You need to migrate the existing Default Domain Policy GPO settings to a device configuration profile.
Which device configuration profile type template should you use?
- AAdministrative Templates
- BEndpoint protection
- CDevice restrictionsMost Voted
- DCustom
Correct Answer:
C
C
send
light_mode
delete
Question #25
You have 100 computers that run Windows 10 and connect to an Azure Log Analytics workspace.
Which three types of data can you collect from the computers by using Log Analytics? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
Which three types of data can you collect from the computers by using Log Analytics? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
- Afailure events from the Security log
- Bthe list of processes and their execution timesMost Voted
- Cthe average processor utilizationMost Voted
- Derror events from the System logMost Voted
- Ethird-party application logs stored as text files
Correct Answer:
CDE
CDE

When using Azure Log Analytics with the Log Analytics Agent, it's interesting to note which types of data can be effectively collected from Windows 10 computers. While security events, like those from the Security log, are not captured by default, the system effectively retrieves detailed information on system error events, process-related data like execution times, and third-party application logs, provided they aren’t just plain text files. These collected data types empower admins to extensively monitor and tweak system performance and resolve issues efficiently.
send
light_mode
delete
Question #26
You have a Microsoft 365 E5 subscription. The subscription contains 25 computers that run Windows 11 and are enrolled in Microsoft Intune.
You need to onboard the devices to Microsoft Defender for Endpoint.
What should you create in the Microsoft Intune admin center?
You need to onboard the devices to Microsoft Defender for Endpoint.
What should you create in the Microsoft Intune admin center?
- Aan attack surface reduction (ASR) policy
- Ba security baseline
- Can endpoint detection and response (EDR) policyMost Voted
- Dan account protection policy
- Ean antivirus policy
Correct Answer:
C
C

When onboarding devices to Microsoft Defender for Endpoint using a Microsoft 365 E5 subscription, it's essential to utilize the endpoint security policies specifically designed for endpoint detection and response (EDR). These policies in Microsoft Intune manage EDR settings and effectively onboard Windows 11 devices. This integration ensures robust defense mechanisms are aligned with your cybersecurity protocols.
send
light_mode
delete
Question #27
Your company uses Microsoft Intune to manage devices.
You need to ensure that only Android devices that use Android work profiles can enroll in Intune.
Which two configurations should you perform in the device enrollment restrictions? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
You need to ensure that only Android devices that use Android work profiles can enroll in Intune.
Which two configurations should you perform in the device enrollment restrictions? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
- AFrom Platform Settings, set Android device administrator Personally Owned to Block.
- BFrom Platform Settings, set Android Enterprise (work profile) to Allow.Most Voted
- CFrom Platform Settings, set Android device administrator Personally Owned to Allow.
- DFrom Platform Settings, set Android device administrator to Block.Most Voted
Correct Answer:
BD
BD

To ensure only Android devices using work profiles can enroll in Intune, it's crucial to configure the platform settings accurately. By setting Android Enterprise (work profile) to 'Allow', you permit the enrollment of devices specifically with a work profile. Conversely, by setting the Android device administrator to 'Block', you effectively prevent the enrollment of devices under this older management method, which Microsoft is phasing out. This strategy ensures a streamlined and secure management environment solely for modern Android work profiles.
send
light_mode
delete
Question #28
HOTSPOT -
You have the device configuration profile shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
You have the device configuration profile shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.

send
light_mode
delete
Question #29
HOTSPOT -
You have 100 Windows 10 devices enrolled in Microsoft Intune.
You need to configure the devices to retrieve Windows updates from the internet and from other computers on a local network.
Which Delivery Optimization setting should you configure, and which type of Intune object should you create? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You have 100 Windows 10 devices enrolled in Microsoft Intune.
You need to configure the devices to retrieve Windows updates from the internet and from other computers on a local network.
Which Delivery Optimization setting should you configure, and which type of Intune object should you create? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

send
light_mode
delete
Question #30
HOTSPOT -
You have an Azure AD tenant that contains the users shown in the following table.

You have devices enrolled in Microsoft Intune as shown in the following table.

From Intune, you create and send a custom notification named Notification1 to Group1.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
You have an Azure AD tenant that contains the users shown in the following table.

You have devices enrolled in Microsoft Intune as shown in the following table.

From Intune, you create and send a custom notification named Notification1 to Group1.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.

send
light_mode
delete
All Pages