Get MD-102 Manage endpoint security Microsoft Quiz Answers
In this learning path, students will learn about data protection and protecting endpoints against threats. This path will also cover the key capabilities of Microsoft Defender solutions.
Prerequisites:
Students should have:
- Strong technical skills installing, maintaining, and troubleshooting the Windows 10 OS or later
- Strong understanding of computer networking, client security, and application concepts
- Experience using Active Directory Domain Services
Enroll on Microsoft
Module 1: Deploy device data protection
This module describes how you can use Intune to create and manage WIP policies that manage this protection. The module also covers implementing BitLocker and Encrypting File System.
Learning objectives:
After this module, you should be able to:
- Describe Windows Information Protection
- Plan for Windows Information Protection usage
- Implement and use Windows Information Protection
- Describe the Encrypting File System (EFS)
- Describe BitLocker
Prerequisites:
- Strong technical skills installing, maintaining, and troubleshooting the Windows 10 OS or later
- Strong understanding of computer networking, client security, and application concepts
- Experience using Active Directory Domain Services
This module is part of these learning paths:
Quiz 1: Knowledge check
Q1. Contoso wants to implement EFS to provide transparent file encryption and decryption. When implementing EFS, what’s the most important task that Contoso must complete?
- Properly manage EFS certificates for users
- Include a strong password policy and user education to protect EFS-encrypted files
- Configure the network traffic to be encrypted by using Internet Protocol Security (IPSec)
Q2. You want to create a Windows Information Protection (WIP) policy in Intune. In the policy, you defined which applications are protected and the level of protection provided. What’s another parameter that must be defined in the WIP policy?
- Revoke encryption keys on unenroll setting
- Use Azure RMS for WIP setting
- Where apps can find organizational data on your network
Module 2: Manage Microsoft Defender for Endpoint
This module explores using Microsoft Defender for Endpoint to provide additional protection and monitor devices against threats.
Learning objectives:
After this module, you should be able to:
- Describe Microsoft Defender for Endpoint
- Describe key capabilities of Microsoft Defender for Endpoint
- Describe Microsoft Defender Application Guard
- Describe Microsoft Defender Exploit Guard
- Describe Windows Defender System Guard
Prerequisites:
- Strong technical skills installing, maintaining, and troubleshooting the Windows 10 OS or later
- Strong understanding of computer networking, client security, and application concepts
- Experience using Active Directory Domain Services
This module is part of these learning paths:
Quiz 1: Knowledge Check
Q1. Fabrikam wants to isolate enterprise-defined untrusted sites for the purpose of protecting the company while its employees browse the internet. What feature of Microsoft Defender for Endpoint provides this functionality?
- Microsoft Defender Exploit Guard
- Windows Defender Application Control
- Microsoft Defender Application Guard
Q2. Northwind Traders wants to use Microsoft Defender for Endpoint to help prevent, detect, investigate, and respond to advanced threats against its corporate network. What feature of Microsoft Defender for Endpoint will help Northwind Traders to assess the security posture of the organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface within the company?
- Endpoint detection and response capabilities
- the Secure score dashboard
- Auto investigation and remediation
Module 3: Manage Microsoft Defender in Windows client
This module explains the built-in security features of Windows clients and how to implement them using policies.
Learning objectives:
After this module, you should be able to:
- Describe Windows Security capabilities
- Describe Windows Defender Credential Guard
- Manage Microsoft Defender Antivirus
- Manage Windows Defender Firewall
- Manage Windows Defender Firewall with Advanced Security
Prerequisites:
- Strong technical skills installing, maintaining, and troubleshooting the Windows 10 OS or later
- Strong understanding of computer networking, client security, and application concepts
- Experience using Active Directory Domain Services
This module is part of these learning paths:
Quiz 1: Knowledge check
Q1. Contoso has implemented Microsoft Defender Antivirus on all company devices to help prevent spyware and other unwanted software from running on any of its computers. As a best practice, Contoso schedules a daily Quick scan on each device. When running a scan using Microsoft Defender Antivirus, what does Microsoft Defender do when it detects a potentially harmful file?
- Flags it as being potentially infected
- Removes the file
- Moves the file to a quarantine area
Q2. What feature of Windows Defender Credential Guard blocks the credential theft attack techniques and tools used in many targeted attacks?
- Virtualization-based security
- Local Security Authority (LSA)
- Group Policy
Module 4: Manage Microsoft Defender for Cloud Apps
This module covers Microsoft Defender for Cloud Apps, focusing on securing sensitive data, its relevance in dynamic work settings, and effective utilization for improved security posture.
Learning objectives:
- Describe Microsoft Defender for Cloud Apps
- Plan for Microsoft Defender for Cloud Apps usage
- Implement and use Microsoft Defender for Cloud Apps
Prerequisites:
- Strong technical skills installing, maintaining, and troubleshooting the Windows 10 OS or later
- Strong understanding of computer networking, client security, and application concepts
- Experience using Active Directory Domain Services
This module is part of these learning paths:
Quiz 1: Knowledge check
Q1. What are the four primary pillars of capabilities that a Cloud Access Security Broker (CASB) offers to safeguard an organization’s environment?
- Incident response, application security, data protection, and identity management.
- Visibility, threat protection, data protection, and regulatory compliance.
- Visibility, threat protection, data protection, and identity and access management.
Q2. Which of the following are benefits of using Microsoft Defender for Cloud Apps?
- Accelerated processing speed of cloud applications.
- Reduced storage requirements for cloud services.
- Enhanced security for sensitive data and protection against cyber threats.
Q3. What are the seven steps required to initiate the use of Microsoft Defender for Cloud Apps?
- Access the portal, integrate with Microsoft Defender for Endpoint, create snapshot Cloud Discovery reports, deploy Conditional Access App Control for catalog apps, personalize your experience, set up data loss prevention policies, and organize the data according to your needs.
- Access the portal, protect sensitive information with DLP policies, configure Cloud Discovery, set instant visibility, protection, and governance actions for your apps, deploy Conditional Access App Control for catalog apps, personalize your experience, and organize the data according to your needs.
- Access the portal, set instant visibility, protection, and governance actions for your apps, protect sensitive information with DLP policies, control cloud apps with policies, set up Cloud Discovery, deploy Conditional Access App Control for catalog apps, personalize your experience, and organize the data according to your needs.
Conclusion:
I hope this MD-102 Manage endpoint security Microsoft Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.
This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.
Keep Learning!
More Coding Solutions >>
Cognitive Class Answer
CodeChef Solution
Microsoft Learn