Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
In this learning path, students will learn about data protection and protecting endpoints against threats. This path will also cover the key capabilities of Microsoft Defender solutions.
This learning path helps prepare you for Exam MD-101: Managing Modern Desktops.
Prerequisites:
This module describes how you can use Intune to create and manage WIP policies that manage this protection. The module also covers implementing BitLocker and Encrypting File System.
Learning objectives:
After this module, you should be able to:
Prerequisites:
This module is part of these learning paths:
Q1. Contoso wants to implement EFS to provide transparent file encryption and decryption. When implementing EFS, what’s the most important task that Contoso must complete?
Q2. You want to create a Windows Information Protection (WIP) policy in Intune. In the policy, you defined which applications are protected and the level of protection provided. What’s another parameter that must be defined in the WIP policy?
This module explores using Microsoft Defender for Endpoint to provide additional protection and monitor devices against threats.
Learning objectives:
After this module, you should be able to:
Prerequisites:
This module is part of these learning paths:
Q1. Fabrikam wants to isolate enterprise-defined untrusted sites for the purpose of protecting the company while its employees browse the internet. What feature of Microsoft Defender for Endpoint provides this functionality?
Q2. Northwind Traders wants to use Microsoft Defender for Endpoint to help prevent, detect, investigate, and respond to advanced threats against its corporate network. What feature of Microsoft Defender for Endpoint will help Northwind Traders to assess the security posture of the organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface within the company?
This module explains the built-in security features of Windows clients and how to implement them using policies.
Learning objectives:
After this module, you should be able to:
Prerequisites:
This module is part of these learning paths:
Q1. Contoso has implemented Microsoft Defender Antivirus on all company devices to help prevent spyware and other unwanted software from running on any of its computers. As a best practice, Contoso schedules a daily Quick scan on each device. When running a scan using Microsoft Defender Antivirus, what does Microsoft Defender do when it detects a potentially harmful file?
Q2. What feature of Windows Defender Credential Guard blocks the credential theft attack techniques and tools used in many targeted attacks?
I hope this MD-101 Manage Windows client security Microsoft Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.
This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.
Keep Learning!
More Coding Solutions >>